CN103795560A - A method for managing networking device IDs and networking devices - Google Patents

A method for managing networking device IDs and networking devices Download PDF

Info

Publication number
CN103795560A
CN103795560A CN201210430227.0A CN201210430227A CN103795560A CN 103795560 A CN103795560 A CN 103795560A CN 201210430227 A CN201210430227 A CN 201210430227A CN 103795560 A CN103795560 A CN 103795560A
Authority
CN
China
Prior art keywords
networked devices
server
key
shared key
device information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210430227.0A
Other languages
Chinese (zh)
Inventor
吴铭辉
梁益华
罗启铭
林毓声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yun Yong Science And Technology Co Ltd
Original Assignee
Yun Yong Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yun Yong Science And Technology Co Ltd filed Critical Yun Yong Science And Technology Co Ltd
Priority to CN201210430227.0A priority Critical patent/CN103795560A/en
Publication of CN103795560A publication Critical patent/CN103795560A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method for managing networking device IDs and networking devices. The method comprises the networking devices send device information to a server; the server generates and stores device IDs of the corresponding networking devices based on the received device information; the server sends the generated device IDs to the networking devices; and the networking devices store the received device IDs. The method for managing the networking device IDs can enable the networking devices to pre-store the device IDs but not at the time of leaving factory; the server is allowed to pre-log in and maintain the device IDs of all networking devices but not at the time of leaving factory; and the server can be re-requested to generate device IDs when the networking devices are started, so that the storage space of the server is saved, and the device IDs can be managed flexibly.

Description

The management method of networked devices identifier and networked devices
Technical field
The present invention relates to the Internet and database management technology, particularly a kind of management method and networked devices of device identification (Device ID) of the terminal installation (hereinafter to be referred as networked devices) that possesses networking function.
Background technology
Commercially available electronic installation, comprise various computers, electrical equipment and consumer electronic device, manufacturer, for managing the device that dispatches from the factory, often distributes the unique device identification (Device ID) to installing to each device, and device identification is stored in to device firmware in the time dispatching from the factory.In addition, for each device that dispatches from the factory, also device identification and other device informations are stored in to facility database, for record, inquiry being provided and following the trail of.For example: manufacturer can facility database whether entering device identifier determines whether legitimate device, and can further provide maintenance, system update or other services for legitimate device; In addition, with work Internet service development, manufacturer often develops exclusive Internet service for networked devices, server can facility database whether entering device identifier determines whether legitimate device, and provide legitimate device exclusive Internet service.
Fig. 1 is the system configuration schematic diagram of the device identification management system of prior art, and as shown in Figure 1, the system of prior art can comprise: the first networked devices 100, the second networked devices 200, server 300 and facility database 400.
The first networked devices 100, comprises that the first memory module 110, the first memory modules 110 are for storing first device identifier 111 and first device information 112.
The second networked devices 200, comprises that the second memory module 210, the second memory modules 210 are for storing the second device identification 211 and the second device information 212.
Server 300, for receive the network service request of the first networked devices 100, the second networked devices 200 by network, and to facility database 400 inquiry unit device identification.
Facility database 400, for storage device data 410, first device identifier 111, first device information 112, the second device identification 211 and second device information 212 of login while dispatching from the factory that 410 of data of device are included in the first networked devices 100, the second networked devices 200.
In prior art, the first networked devices 100, the second networked devices 200 send respectively first device identifier 111, the second device identification 211 to server 300, and ask network service to server 300 respectively.Whether 300 of servers comprise the first networked devices 100, the second networked devices 200 with the first device identifier 111 and the second device identification 211 that receive in facility database 400 inquiry unit data 410, and judge according to Query Result whether the first networked devices 100 and the second networked devices 200 have the authority of network service, if there is authority to respond the network service request of the first networked devices 100, the second networked devices 200.
In addition, in prior art, the first networked devices 100, the second networked devices 200 can also transmit respectively first device identifier 111, first device information 112 and the second device identification 211, the second device information 212 is to server 300 and ask updating device information, server 300 server 300 first device identifier 111 and the second device identification 211 first networked devices 100 in facility database 400 inquiry unit data 410 with reception, the device data of the second networked devices 200, and can be further with the first networked devices 100 in the first device information 112 that receives and the second device information 212 updating device data 410, the device data of the second networked devices 200.
But, the problem of prior art is that all networked devices are in the time dispatching from the factory, also do not sell also and be not activated, not necessity of management devices information, just need to build facility database, the device identification of all networked devices, device information logined in advance in facility database and safeguarded, causing the waste of memory space, and device management complicated and there is no elasticity.
Summary of the invention
The invention provides a kind of management method and networked devices of networked devices identifier, to save the memory space of server and to make the management of device identification there is elasticity.
Concrete technical scheme is as follows:
A method of managing networked devices identifier, is applied to server, said method comprising the steps of:
A, receive from the first device information of the first networked devices;
The first device identifier of the first device Information generation that B, reference receive corresponding described the first networked devices of storage;
The first device identifier that C, transmission generate is to described the first networked devices.
Further, described server and described the first networked devices are shared one group of shared key, described shared key is pre-stored within described the first networked devices, and described the first networked devices sends to described server after encrypting described first device information with described shared key.
In addition, described steps A also comprises the first device information receiving with described shared key deciphering;
In addition, described step C further comprises the first device identifier of encrypting generation with described shared key.
In aforesaid way, described step B further comprises the first device key that generates corresponding described the first networked devices;
In addition, described step C also comprises the first device key of encrypting generation with described shared key, and sends the first device key of encrypting to described the first networked devices.
Manage a method for networked devices identifier, after said method, comprising:
Receive from the first networked devices the second device information with described first device secret key encryption, and the second device information receiving with described first device secret key decryption;
Described the second device information of reference also generates the second device identification;
The second device identification generating with described first device secret key encryption, and send second device identification of encrypting to described the first networked devices.
Manage a method for networked devices identifier, be applied to the first networked devices, said method comprising the steps of:
A, transmission first device information are to server;
B, reception are also stored the first device identifier that described server returns, and wherein said first device identifier generates with reference to described first device information for described server.
Further, described server and described the first networked devices are shared one group of shared key, and described shared key is pre-stored within the first networked devices, and therefore described method more specifically comprises:
Steps A more specifically comprises with described the first networked devices and the shared shared key of described server encrypts described first device information, and sends the first device information of encrypting extremely;
First device identifier in step B is further encrypted with described shared key by described server, and in addition, step B more specifically comprises the first device identifier receiving with described shared key deciphering.
Further, described server generates the first device key of one group of corresponding described first networked devices, and be sent to described the first networked devices after encrypting with described shared key, in addition, step B more specifically comprises the first device key receiving with described shared key deciphering, and the first device key of store decrypted.
Manage a method for networked devices identifier, after said method, comprising:
Receive the second device information of encrypting with described shared key from the second networked devices, and the second device information receiving with described shared key deciphering;
With the second device information described in described first device secret key encryption, and send the second device information of encrypting to described server;
Receive that described server generates with reference to described the second device information and with the second device identification of described first device secret key encryption, and the second device identification receiving with described first device secret key decryption;
With the second device identification of described shared key encrypting and decrypting, and send second device identification of encrypting to described the second networked devices.
Receive first networked devices from the device identification of server, comprising:
Memory module, for storing first device information;
Sending module, for sending described first device information to server;
Receiver module, for the first device identifier that receives the described server described first device Information generation of reference and return.
Further, described server and described the first networked devices are shared one group of shared key, and described shared key is pre-stored within the first networked devices.In addition, described memory module is also for storing the shared shared key of described the first networked devices and described server; More specifically, the described first device identifier that described the first receiver module receives is that described server is encrypted with described shared key.
In aforesaid way, more specifically, described the first networked devices also comprises:
Encrypting module, for encrypting described first device information with described shared key;
Deciphering module, for the described first device identifier receiving with described shared key deciphering.
Further, described server generates the first device key of one group of corresponding described first networked devices, and is sent to described the first networked devices after encrypting with described shared key, and in addition, described receiver module is also for receiving described first device key; Described deciphering module is the first device key for receiving with shared key deciphering also; Described memory module is also for the first device key of store decrypted.
Further, described the first networked devices can receive after the first device identifier of described server generation, first device key, receive the second device information that the second networked devices is encrypted with described shared key, and to be sent to described server after described first device secret key encryption, and send the second device identification to the second networked devices that described server generates and returns with reference to the second device information.
More specifically, described the first networked devices also comprises following characteristics:
Described receiver module is also for receiving the second device information of encrypting with described shared key from the second networked devices; Described deciphering module is the second device information for receiving with described shared key deciphering also; Described encrypting module is also for the second device information described in described first device secret key encryption; Described sending module is also for being sent to described server by the second device information of described encryption.In addition, described receiver module is also for receiving described the second device information generation of described server reference the second device identification with described first device secret key encryption; Described deciphering module is the second device identification for receiving with described first device secret key decryption also; Described encrypting module is also for encrypting described the second device identification with described shared key; Described sending module is also for sending extremely described second networked devices of the second device identification of encryption.As can be seen from the above technical solutions, the present invention sees through network with networked devices and submits to device information to server, make server according to being back to networked devices after the device information generating apparatus identifier of submitting to, be finishing device identifier dynamic login with distribute, make server without safeguard at the beginning all networked devices device identification and device information etc. install data.
Accompanying drawing explanation
Fig. 1 is the system configuration schematic diagram of the device identification management system of prior art;
Fig. 2 is the structural representation of device identification management system provided by the invention before generating apparatus identifier;
Fig. 3 is the structural representation of device identification management system provided by the invention after generating apparatus identifier;
The structural representation of the device identification management system that Fig. 4 provides for the embodiment of the present invention one before generating apparatus identifier;
The structural representation of the device identification management system that Fig. 5 provides for the embodiment of the present invention one after generating apparatus identifier;
The structural representation of the device identification management system that Fig. 6 provides for the embodiment of the present invention two before generating apparatus identifier;
The structural representation of the device identification management system that Fig. 7 provides for the embodiment of the present invention two after generating apparatus identifier;
The networked devices structural representation that Fig. 8 provides for the embodiment of the present invention three;
The another kind of structural representation of networked devices that Fig. 9 provides for the embodiment of the present invention three;
The detailed method flow chart that Figure 10 provides for the embodiment of the present invention four;
The detailed method flow chart that is applied to server that Figure 11 provides for the embodiment of the present invention four;
The detailed method flow chart that is applied to networked devices that Figure 12 provides for the embodiment of the present invention four;
The detailed method flow chart that Figure 13 provides for the embodiment of the present invention five;
The detailed method flow chart that is applied to server that Figure 14 provides for the embodiment of the present invention five;
The detailed method flow chart that is applied to networked devices that Figure 15 provides for the embodiment of the present invention five;
The detailed method flow chart that Figure 16 provides for the embodiment of the present invention six;
The detailed method flow chart that Figure 17 provides for the embodiment of the present invention seven.
Embodiment
In order to make the object, technical solutions and advantages of the present invention clearer, describe the present invention below in conjunction with the drawings and specific embodiments.
Device identification management system provided by the invention can be as shown in Figure 2 and Figure 3, wherein Fig. 2 is the structural representation of device identification management system provided by the invention before generating apparatus identifier, and Fig. 3 is the structural representation of device identification management system provided by the invention after generating apparatus identifier, described system can comprise: the first networked devices 100, server 300 and facility database 400.
The first networked devices 100, comprises the first memory module 110, and wherein the first memory module 110 is for storing first device information 112, and the first networked devices 100 can see through network and sends first device information 112 to server 300; In addition, the first device identifier 111 that the first networked devices 100 also can reception server returns, and first device identifier 111 can be stored in to the first memory module 110.Wherein, the first networked devices 100 can be the computer installation that can access (Access) network, comprises the hand-held devices such as desktop computer, notebook computer, panel computer or personal digital assistant, smart mobile phone; The first networked devices 100 can be also the network equipments such as the interconnection devices such as modulator-demodulator (modem), gateway (gateway), router (router), network sharing device, WAP (wireless access point) (access point), hotspot (hot spot) or femto cell base station (femtocell), or network attached storage (NAS), fire compartment wall (firewall), work station or proxy server (proxy server); In addition, can also comprise web-enabled input, the output devices such as network camera (IP Cam, Web Cam), wireless speaker (WiFi Speaker), TV (TV), Set Top Box (Set top Box) and wireless senser.Wherein, the first memory module 110 can be the embedded or external storage device of the first networked devices 100, can comprise portable hard drive, hard disk, solid state hard disc or mixing type hard disk, can be also the computer-readable mediums such as ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc; The first device information 112 that the first memory module 110 is stored, can comprise the hardware relevant informations such as label, model, firmware version number, or further comprise the software relevant information such as application program, application programming interface (API) version, or can further comprise the network information such as the network address (IP Address), network service port (Web Service Port Number).
Server 300, for receiving the first device information 112 of the first networked devices 100, and generates the first device identifier 111 of corresponding the first networked devices 100, and returns to first device identifier 111 with reference to first device information 112; In addition, server 300 is access device database 400 further, and first device identifier 111 and first device information 112 are stored to facility database 400.Wherein, server 300 also can be made up of server server zone or data center.
Facility database 400, for storage device data 410; Wherein, device data 410 initially comprise device identification field (field) and device information field (field) as shown in Figure 2, and do not comprise first device identifier 111 and first device information 112, at server 300, first device identifier 111 and first device information 112 are stored to after facility database 400, install data 410 and comprise as shown in Figure 3 first device identifier 111 and first device information 112.Wherein, facility database 400 can run on server 300, or runs on another computer installation, and server 300 can this computer installation of access; Wherein, facility database logon data 410 can be the data form (Table) of relational database (Relational Database), the field (Column) of data form can comprise the device information such as device identification and hardware, software or network, the row (Row) of data form can be the data record of networked devices, and wherein device identification also can be used as the index (Index) of data form.But those skilled in the art are also appreciated that not necessarily relational database of facility database 400 provided by the invention, facility database 400 of the present invention, except relational data model, also can adopt network model, object model or hierarchy type model etc.
System architecture shown in above-mentioned Fig. 2, Fig. 3 is for a system architecture that networked devices is performed, further, server can receive the device information of all networked devices, and generate respectively unique device identification of corresponding each device with reference to the device information of each device, and the device identification of each device and device information can be stored in to facility database.In addition, for server and networked devices transfer of data, also can see through encryption technology device information, device identification are carried out to encryption and decryption, improve fail safe.
Below by specific embodiment, said system is described in detail.
Embodiment mono-,
The structural representation of the device identification management system that Fig. 4 provides for the embodiment of the present invention one before generating apparatus identifier, the structural representation of the device identification management system that Fig. 5 provides for the embodiment of the present invention one after generating apparatus identifier, as Fig. 4, shown in Fig. 5, described system can more specifically comprise: Fig. 2, the first networked devices 100 shown in Fig. 3, server 300 and facility database 400, wherein the first networked devices 100, server 300 is shared one group of shared key, be respectively the shared key 113 and the shared key 113 that is stored in server 300 that are stored in the first networked devices 100, the data that wherein shared key 113 can be used for encrypting with shared key 310 are decrypted, and the data that shared key 310 also can be used for encrypting with shared key 113 are decrypted.
The first networked devices 100, comprise the first memory module 110, wherein the first memory module 110 is for storing first device information 112 and shared key 113, and the first networked devices 100 can shared key 113 and first device information 112 is encrypted, and sees through network and be sent to server 300.In addition, the first device identifier 111 that the first networked devices 100 also can reception server returns and encrypts with shared key 310, and can see through shared key 113 and decipher, and with the first device identifier 111 of the first memory module 110 store decrypted.
Server 300, can pre-stored shared key 310, when receiving the first networked devices 100 first device information 112 of encrypting with shared key 113, can shared key 310 decipher, and generate the first device identifier 111 of corresponding the first networked devices 100 with reference to the first device information 112 of deciphering, and see through the first device identifier 111 of shared key 310 encryption generations and return; In addition, server 300 is access device database 400 further, and first device identifier 111 and first device information 112 are stored to facility database 400.
Facility database 400, for storage device data 410; Wherein, device data 410 initially comprise device identification field (field) and device information field (field) as shown in Figure 4, and do not comprise first device identifier 111 and first device information 112, at server 300, first device identifier 111 and first device information 112 are stored to after facility database 400, install data 410 and comprise as shown in Figure 5 first device identifier 111 and first device information 112.
Shared key 113 and shared key 310 that the embodiment of the present invention one provides can be symmetric keys, and shared key 113 is identical with shared key 310; In addition, shared key 113 can be also unsymmetrical key with shared key 310, now: shared key 113 comprises that the first networked devices 100 makes for the private key (Private Key) deciphered and in order to encrypt the PKI (Public Key) that server 300 can private key deciphering; In like manner, shared key 310 comprises the private key (Private Key) of server 300 in order to deciphering, and in order to encrypt make the first networked devices 100 can private key the PKI (Public Key) of deciphering.Preferably, all networked devices can pre-stored shared key 113 in the time dispatching from the factory, and the data encryption of the present invention's system being transmitted in acquisition device identifier (ID) process with pre-stored shared key 113, and server 300 is returned to the data deciphering of encrypting with shared key 310.
Preferably, device identification management system of the present invention can be as shown in Figure 4, Figure 5, server 300 can further produce the unique one group of first device key 114 of corresponding the first networked devices 100, and after encrypting with shared key 310, return to first device key 114 to first networked devices 100 of encryption, server 300 can further be stored first device key 114 to facility database 400 in addition, and device data 410 can comprise device keys field as shown in Figure 5, and after storage, comprise first device key 114; In addition, the first networked devices 100 can shared key 113 be deciphered the first device key 114 of reception, and further the first device key 114 of store decrypted in the first memory module 110.
Wherein, first device key 114 can be symmetric key, can be also unsymmetrical key.Preferably, the first networked devices 100 is being obtained after first device key 114, can be resent to server 300 to data encryption by first device key 114, server 300 can be obtained first device key 114 from facility database 400, and with first device key 114 to being decrypted from the data of the first networked devices 100.
Embodiment bis-,
The structural representation of the device identification management system that Fig. 6 provides for the embodiment of the present invention two before generating apparatus identifier; The structural representation of the device identification management system that Fig. 7 provides for the embodiment of the present invention two after generating apparatus identifier, embodiment mono-continues, as shown in Figure 6, Figure 7, described system can more specifically comprise: the first networked devices 100 shown in Fig. 5, server 300 and facility database 400, and more comprise the second networked devices 200.Wherein, the first networked devices 100, the second networked devices 200 are shared one group of shared key, be respectively the shared key 113 and the shared key 213 that is stored in the second networked devices 200 that are stored in the first networked devices 100, the data that wherein shared key 113 can be used for encrypting with shared key 213 are decrypted, and the data that shared key 213 also can be used for encrypting with shared key 113 are decrypted.
The second networked devices 200, comprise the second memory module 210, wherein the second memory module 210 is for storing the second device information 212 and shared key 213, and the second networked devices 200 can shared key 213 and the second device information 212 is encrypted, and see through network and be sent to the first networked devices 100.In addition, the second networked devices 200 also can receive the second device identification 211 that the first networked devices 100 returns and encrypts with shared key 113, and can see through shared key 213 and decipher, and with the second device identification 211 of the second memory module 210 store decrypted.
The first networked devices 100, comprise the first memory module 110, wherein the first memory module 110 is for storing first device information 111, first device information 112, shared key 113 and first device key 114, when receiving the second device information 212 of encrypting with shared key 213 of the second networked devices 200, can shared key 113 decipher, and the second device information 212 of network transmission encryption is encrypted and seen through to the second device information 212 of deciphering with first device key 114 is to server 300; In addition, the second device identification 211 that the first networked devices 100 also can reception server returns and encrypts with first device key 114, and can see through after first device key 114 deciphering, with the second device identification 211 of the store decrypted of shared key 113 encrypting and decryptings and see through network and be sent to the second networked devices 200.
Server 300, for receiving the secondth device information 212 that the first networked devices 100 is encrypted with first device key 114, and decipher from facility database 400 acquisition device keys 114, and generate the second device identification 211 of corresponding the first networked devices 100 with reference to the second device information 212 of deciphering, and see through first device key 114 and encrypt the two devices identifier 211 generating and return; In addition, server 300 can further be stored to facility database 400 by the second device identification 211 and the second device information 212.
Facility database 400, for storage device data 410; Wherein, device data 410 initially comprise device identification field, device information field and device keys field as shown in Figure 6, and comprise first device identifier 111, first device information 112 and first device key 114, at server 300, the second device identification 211 and the second device information 212 are stored to after facility database 400, install data 410 and comprise as shown in Figure 7 the second device identification 211 and the second device information 212.
Wherein, the embodiment of the present invention two provides shared key 113 and shared key 213 can be unsymmetrical key.Preferably, shared key 113 is symmetric keys with shared key 213, be that shared key 113 is identical with shared key 213, further, all networked devices can be also shared keys 213 the pre-stored shared key 113(while in the time dispatching from the factory), now only need to prepare one group of shared key can be used for the data encryption that all networked devices transmit in acquisition device identifier process.
Preferably, device identification management system of the present invention can be as shown in Figure 6, Figure 7, server 300 can further produce unique one group of second device keys 214 of corresponding the second networked devices 200, and after encrypting with first device key 114, return to the second device keys 214 to first networked devices 100 of encryption, and can further store the second device keys 214 to facility database 400, make device data 410 comprise as shown in Figure 5 the second device keys 214; In addition, the first networked devices 100 can first device key 114 be deciphered the second device keys 214 receiving, and can after shared key 113 encryptions, be sent to the second networked devices 200; In addition, the second device keys 214 that the second networked devices 200 can shared key 213 enabling decryption of encrypted, and further the second device keys 214 of store decrypted in the second memory module 210.
Wherein, the second device keys 214 can be symmetric key, can be also unsymmetrical key.Preferably, the second networked devices 200 is being obtained after the second device keys 214, can the second device keys 214 be resent to server 300 to data encryption, server 300 can be obtained the second device keys 214 from facility database 400, and with the second device keys 214 to being decrypted from the data of the second networked devices 200.
Embodiment tri-,
The networked devices structural representation that Fig. 8 provides for the embodiment of the present invention three, as shown in Figure 8, described networked devices is the first networked devices 100, can specifically comprise: the first memory module 110 and first device information 112, the first sending module 120 and the first receiver module 130 shown in Fig. 2.
The first memory module 110, for storing first device information 112, and the further first device identifier 111 of storing received;
The first sending module 120, sends first device information 112 that the first memory module 110 stores to server 300 for seeing through network;
The first receiver module 130, the first device identifier 111 that generates and return with reference to first device information 112 for reception server 300, and the first device identifier 111 of reception is sent to the first memory module 110 stores.
Wherein, the first sending module 120, the first receiver module 130 that the embodiment of the present invention three provides can be respectively receiver (Receiver), the transmitter (Transmitter) of the first networked devices 100 for access network, or merge into transceiver (Transceiver), in order to access the signal of wired or wireless network.In addition, the first sending module 120, the first receiver module 130 also with soft (Gu) part form is stored in the computer-readable mediums such as ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc, preferably, described computer-readable medium can be also the first memory module 110; In addition, the first sending module 120, the first receiver module 130 are also present in semiconductor device or circuit board with circuit form, such as application integrated circuit (ASIC) or printed circuit board (PCB) (PCB) etc.
Further, as the embodiment of the present invention one provides, server 300 and the first networked devices 100 can be shared one group of shared key, be respectively shared key 113 and shared key 310, wherein shared key 113 is pre-stored within the first memory block 110 of the first networked devices 100, shared key 310 storage servers 300, the data that shared key 113 can decryption server 300 be encrypted with shared key 310, and server 300 can be deciphered the data of encrypting with shared key 113.The networked devices structural representation that Fig. 9 provides for the embodiment of the present invention three, as shown in Figure 9, described the first networked devices 100 more specifically comprises:
The first encrypting module 140, for encrypt the first device information 112 that the first memory module 110 is stored with shared key 113, and first device information 112 to first sending modules 120 that transmission is encrypted send;
The first deciphering module 150, is received from for decipher the first receiver module 130 with shared key 113 the first device identifier 111 that server 300 is encrypted with shared key 310, and transmits first device identifier 111 to first memory modules 110 of deciphering and store.
Wherein, the first encrypting module 140, the first deciphering module 150 that the embodiment of the present invention three provides can anyly be encrypted, decipherment algorithm sees through key (Key) by information and is encrypted and deciphers, and can soft (tough) bodily form formula be stored in the computer-readable mediums such as ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc, in some aspect of the present invention, aforementioned computer-readable medium can be also the first memory module 110; The first encrypting module 140, the first deciphering module 150 also can be present in semiconductor device or circuit board by circuit form, such as Application Specific Integrated Circuit (ASIC) or printed circuit board (PCB) (PCB) etc.
Preferably, server 300 can further generate the first device key 114 of one group of corresponding first networked devices 100, and first device key 114 to first networked devices 100 of encrypting with described shared key 310 encrypting and transmitting, therefore the first receiver module 120 is also for receiving the first device key 114 of encrypting with shared key 310 from server 300; The first deciphering module 150 is also for deciphering the first device key 114 receiving and be sent to the first storage module 110 with shared key 113; In addition, the first memory module 110 is also for the first device key 114 of store decrypted.
More preferably, store after first device key 114 in the first memory module 110, the first networked devices 100 can further comprise following characteristics:
The first device key 114 that the first encrypting module 140 is stored with the first memory module 110 is further to data encryption, and first device key 114 to first sending modules 130 of transmission encryption;
The first sending module 120 sends first device key 114 that the first encrypting module 140 encrypts further to server 300;
The first receiver module 130 data that reception server 300 responds and encrypts with first device key 114 further;
The data deciphering that the first deciphering module 150 receives the first receiver module 130 with first device key 114 further.
More preferably, as the embodiment of the present invention two provides, after first device identifier 111 that the first networked devices 100 can generate at reception server 300, first device key 114, receive the second device information 212 that the second networked devices 200 is encrypted with shared key 213, and be sent to server 300, concurrent the second device identification 211 to second networked devices that send server 300 to generate and return with reference to the second device information 212 after encrypting with first device key 114.
Therefore, the first networked devices 100 also can more specifically comprise following characteristics:
The first memory module 110 is also for storing first device key 114;
The first receiver module 130 is also for receiving the second device information 212 of encrypting with shared key 213 from the second networked devices 200;
The second device information 212 that the first deciphering module 150 also receives for decipher the first receiver module 130 with shared key 113;
The second device information 212 that the first encrypting module 140 is also deciphered for encrypt the first deciphering module 140 with first device key 114;
The first sending module 120 is also sent to server 300 for the second device information 212 that the first encrypting module 140 is encrypted;
And, server receives after 300 second device informations 212, as described in the embodiment of the present invention two, generate the second device identification 211 with reference to the second device information 212, and encrypt with first device key 114 the second device identification 211 to first networked devices 100 that the rear passback of the second device identification 211 is encrypted.Therefore, the first networked devices 100 also can more specifically comprise following characteristics:
The second device identification 211 that the first receiver module 130 also generates and encrypts with first device key 114 with reference to described the second device information 212 for reception server 300;
The second device identification 211 that the first deciphering module 150 also receives for decipher the first receiver module 130 with first device key 114;
The second device identification 211 that the first encrypting module 140 is also deciphered for encrypt the first deciphering module 150 with shared key 113;
The second device identification 211 to second networked devices 200 that the first sending module 120 is also encrypted for sending the first encrypting module 140.
More preferably, as the embodiment of the present invention two provides, server 300 can further produce unique one group of second device keys 214 of corresponding the second networked devices 200, and after encrypting with first device key 114, return to the second device keys 214 to first networked devices 100 of encryption, and the first networked devices 100 can first device key 114 be deciphered the second device keys 214 receiving, and can after shared key 113 encryptions, be sent to the second networked devices 200.Therefore, the first networked devices 100 also can more specifically comprise following characteristics:
The second device keys 214 that the first receiver module 130 also generates for reception server 300 and encrypts with first device key 114;
The second device keys 214 that the first deciphering module 150 also receives for decipher the first receiver module 130 with first device key 114;
The second device keys 214 that the first encrypting module 140 is also deciphered for encrypt the first deciphering module 150 with shared key 113;
The second device keys 214 to second networked devices 200 that the first sending module 120 is also encrypted for sending the first encrypting module 140.
Embodiment tetra-,
The detailed method flow chart that Figure 10 provides for the embodiment of the present invention four, as shown in figure 10, the method can specifically comprise the following steps:
Step S110: the first networked devices sends first device information to server.
First device information can comprise the hardware relevant informations such as label, model, firmware version number, or further comprise the software relevant information such as application program, application programming interface (API) version, or can further comprise the network information such as the network address (IP Address), network service port (Web Service Port Number).Preferably, hardware relevant information and software relevant information can be pre-stored within the first networked devices, and can take a step forward and obtain after the network information such as the network address (IP Address), network service port (Web Service Port Number) at execution step S110, hardware-related information and software relevant information are together sent to server.
Step S120: server is with reference to first device Information generation and store a first device identifier of corresponding the first networked devices.
Server can be with reference to first device information, and generate unique first device identifier of corresponding the first networked devices with specific coding rule or random fashion.Preferably, server can further be stored first device identifier and first device information to facility database.
Step S130: server sends first device identifier to the first networked devices.
Step S140: the first networked devices storage first device identifier.
In addition, the detailed method that the embodiment of the present invention four provides can as shown in figure 11, be applied to server.The detailed method flow chart that is applied to server that Figure 11 provides for the embodiment of the present invention four, as shown in figure 11, the method can specifically comprise the following steps:
Step S210: receive the first device information from the first networked devices.
Step S220: produce the unique first device identifier of corresponding the first networked devices with reference to first device information, and can further store first device identifier.
Preferably, can as shown in Figure 3, first device identifier and first device information be sent to facility database storage.
Step S230: send first device identifier to the first networked devices.
In addition, the detailed method that the embodiment of the present invention four provides can be as shown in figure 12, is applied to the first networked devices.The detailed method flow chart that is applied to the first networked devices that Figure 12 provides for the embodiment of the present invention four, as shown in figure 12, the method can specifically comprise the following steps:
Step S310: judge whether existing first device identifier: if so, do not need to carry out the method that the embodiment of the present invention four provides, can finish; , The execution step S320 if not.
Step S320: send first device information to server.
Step S330: receive the first device identifier from server.
Step S340: storage first device identifier.
The method that the embodiment of the present invention four provides, can be in the time that the first networked devices be restarted (Reset), first device identifier can because of restart deleted after, make the first networked devices can obtain again another one device identification; Therefore, if the first networked devices through keeping in repair and restarting for non-defective unit, identifier management method that can the present invention directly obtains new device identification, and need in facility database, not search the first networked devices and revise or first device information.
In addition, method provided by the invention can program language the computer program mode of programming exist, for example: computer program source code, computer program can perform document form etc.Described computer program can be carried out by computer installation, or can further be stored in computer-readable medium, comprise ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc, floppy disk, CD-ROM, DVD-ROM or other forms of electronics, electromagnetism or optically-readable media, and can read the included step of rear execution method provided by the invention by computer installation.
Embodiment five,
The detailed method flow chart that Figure 13 provides for the embodiment of the present invention five, as shown in figure 13, the method can specifically comprise the following steps:
Step S410: the first networked devices is encrypted first device information and is sent to server with shared key.
Shared key provided by the invention is the group key that the first networked devices and server are shared, and is pre-stored within the first networked devices and server, can be that symmetric key can be also unsymmetrical key.In the time that described shared key is unsymmetrical key: the shared key of the first networked devices storage comprises the private key for the PKI deciphering to server stores, and for encrypting the PKI that makes the private key deciphering that server can store; In like manner, the shared key of server stores comprises the private key for the PKI deciphering to the first networked devices storage, and for encrypting the PKI that makes the private key deciphering that the first networked devices can store.Preferably, all networked devices can pre-stored same group of shared key in the time dispatching from the factory, and data encryption and the deciphering in the method step embodiment of the present invention five being provided with pre-stored shared key, transmitted.
Step S420: the first device information that server receives with shared key deciphering, and with reference to the first device Information generation of deciphering and a first device identifier of corresponding the first networked devices of storage.
Preferably, server can further be stored first device identifier and first device information to facility database.
Step S430: server is encrypted the first device identifier generating with shared key, and send first device identifier to the first networked devices of encrypting.
Step S440: the first device identifier that the first networked devices receives with shared key deciphering the first device identifier of store decrypted.
In addition, the detailed method that the embodiment of the present invention five provides can as shown in figure 14, be applied to server.The detailed method flow chart that is applied to server that Figure 14 provides for the embodiment of the present invention five, as shown in figure 14, the method can specifically comprise the following steps:
Step S510: receive the first device information of encrypting with shared key from the first networked devices.
Step S520: the first device information receiving with shared key deciphering.
Step S530: with reference to the unique first device identifier of corresponding the first networked devices of first device Information generation of deciphering, and can further store first device identifier.
Preferably, can as shown in Figure 3, first device identifier and first device information be sent to facility database storage.
Step S540: encrypt the first device identifier generating and be sent to the first networked devices with shared key.
In addition, the detailed method that the embodiment of the present invention five provides can be as shown in figure 15, is applied to the first networked devices.The detailed method flow chart that is applied to the first networked devices that Figure 15 provides for the embodiment of the present invention five, as shown in figure 15, the method can specifically comprise the following steps:
Step S610: judge whether existing first device identifier: if so, do not need to carry out the method that the embodiment of the present invention five provides, can finish; , The execution step S620 if not.
Step S620: encrypt first device information and be sent to server with shared key.
Step S630: receive the first device identifier of encrypting with shared key from server.
Step S640: the first device identifier receiving with shared key deciphering the first device identifier of store decrypted.
In the method that the embodiment of the present invention five provides, preferably, shared key can be pre-stored within the firmware of the first networked devices, when being restarted, shared key can't be deleted the first networked devices, when in the time that the first networked devices is restarted, first device identifier can because of restart deleted after, can make the first networked devices can obtain again another one device identification, and in the process of acquisition device identifier, the data of the first networked devices and server transmission are encrypted with shared key, put forward raw information security.
In addition, method provided by the invention can program language the computer program mode of programming exist, for example: computer program source code, computer program can perform document form etc.Described computer program can be carried out by computer installation, or can further be stored in computer-readable medium, comprise ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc, floppy disk, CD-ROM, DVD-ROM or other forms of electronics, electromagnetism or optically-readable media, and can read the included step of rear execution method provided by the invention by computer installation.
Embodiment six,
The detailed method flow chart that Figure 16 provides for the embodiment of the present invention six, as shown in figure 16, the method can specifically comprise the following steps:
Step S710: the first networked devices is encrypted first device information and is sent to server with shared key.
Shared key provided by the invention is the group key that the first networked devices and server are shared, and is pre-stored within the first networked devices and server, can be that symmetric key can be also unsymmetrical key.Preferably, all networked devices can pre-stored same group of shared key in the time dispatching from the factory, and data encryption and the deciphering in the method step embodiment of the present invention six being provided with pre-stored shared key, transmitted.
Step S720: the first device information that server receives with shared key deciphering, and with reference to the first device Information generation of deciphering and a first device identifier and the first device key of corresponding the first networked devices of storage.
Preferably, server can further be stored first device identifier, first device information and first device key to facility database.Device keys provided by the invention is for obtaining to server log after first device identifier and first device key when the first networked devices, can first device secret key encryption and deciphering and server between the data transmitted, improve fail safe, wherein, first device key is can be that symmetric key can be also unsymmetrical key.Preferably, all networked devices have an exclusive device keys, between the first networked devices and server for different for the second device keys of encrypt and decrypt data between the first device key of encrypt and decrypt data and any one the second networked devices and server, after can further preventing that one group of device keys from leaking, affect the fail safe of other networked devices.
Step S730: server is encrypted the first device identifier, the first device key that generate with shared key, and send first device identifier, first device key to the first networked devices encrypted.
Step S740: first device identifier, the first device key of first device identifier, first device key store decrypted that the first networked devices receives with shared key deciphering.
In addition, the detailed method that the embodiment of the present invention six provides can be applied to server, described in be applied to server method can specifically comprise the following steps:
Step 1: receive the first device information of encrypting with shared key from the first networked devices.
Step 2: the first device information receiving with shared key deciphering.
Step 3: with reference to the unique first device identifier of corresponding the first networked devices of first device Information generation of deciphering, and generate the unique one group of first device key of corresponding the first networked devices, and can further store first device identifier, first device key.
Preferably, can as shown in Figure 3, first device identifier, first device information and first device key be sent to facility database storage.
Step 4: encrypt first device identifier and the first device key generating and be sent to the first networked devices with shared key.
In addition, the detailed method that the embodiment of the present invention six provides can be applied to the first networked devices.The described method that is applied to the first networked devices can specifically comprise the following steps:
Step 1: judge whether existing first device identifier: if so, do not need to carry out the method that the embodiment of the present invention six provides, can finish; , The execution step two if not.
Step 2: encrypt first device information and be sent to server with shared key.
Step 3: receive first device identifier, the first device key encrypted with shared key from server.
Step 4: the first device identifier receiving with shared key deciphering and first device identifier and the first device key of first device key store decrypted.
In the method that the embodiment of the present invention six provides, preferably, shared key can be pre-stored within the firmware of the first networked devices, when being restarted, shared key can't be deleted the first networked devices, when in the time that the first networked devices is restarted, first device identifier can because of restart deleted after, can make the first networked devices can obtain again another one device identification, and in the process of acquisition device identifier, the data of the first networked devices and server transmission are encrypted with shared key, improving information safety.
More preferably, in upper type, described the first networked devices can see through described first device secret key encryption data or network service request and send the data of encrypting or network service request to server; In addition, described server can be obtained described first device key from facility database, and the data or the network service request that receive with described first device secret key decryption; In addition, described server can further respond data or the network service request of deciphering, and generate corresponding data or network service, more preferably, described server can first device secret key encryption described in data or network service, and see through network and send the data of encrypting or network service to described the first networked devices.
In addition, method provided by the invention can program language the computer program mode of programming exist, for example: computer program source code, computer program can perform document form etc.Described computer program can be carried out by computer installation, or can further be stored in computer-readable medium, comprise ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc, floppy disk, CD-ROM, DVD-ROM or other forms of electronics, electromagnetism or optically-readable media, and can read the included step of rear execution method provided by the invention by computer installation.
Embodiment seven,
The detailed method flow chart that Figure 17 provides for the embodiment of the present invention seven, wherein, after the method that the embodiment of the present invention seven provides is applied to the method that the embodiment of the present invention six provides, as shown in figure 17, the method can specifically comprise the following steps:
Step S810: the second networked devices is encrypted the second device information and is sent to the first networked devices with shared key.
The second device information that the embodiment of the present invention seven provides can comprise the hardware relevant informations such as label, model, firmware version number, or further comprise the software relevant information such as application program, application programming interface (API) version, or can further comprise the network information such as the network address (IP Address), network service port (Web Service Port Number).Preferably, hardware relevant information and software relevant information can be pre-stored within the second networked devices, and can take a step forward and obtain after the network information such as the network address (IP Address), network service port (Web Service Port Number) at execution step S810, hardware-related information and software relevant information are together sent to the first networked devices.
In addition, the shared key that the embodiment of the present invention seven provides is the group key that the first networked devices and the second networked devices are shared, be pre-stored within the first networked devices and take the second networked devices, and can be that symmetric key can be also unsymmetrical key.Preferably, all networked devices can pre-stored same group of shared key in the time dispatching from the factory, the first networked devices is identical with the second networked devices, and can further share described shared key with server, and data encryption and the deciphering in the method step embodiment of the present invention seven being provided with pre-stored shared key, transmitted.
Step S820: the second device information that the first networked devices receives with shared key deciphering, and with first device key, the second device information of deciphering is encrypted, and send the second device information control server of encrypting.
Wherein, as described in the embodiment of the present invention six, the data of the first device key that the embodiment of the present invention seven provides for transmitting between encrypt and decrypt the first networked devices and server, improve fail safe, wherein, first device key is can be that symmetric key can be also unsymmetrical key.Preferably, all networked devices have an exclusive device keys, between the first networked devices and server for different for the second device keys of encrypt and decrypt data between the first device key of encrypt and decrypt data and any one the second networked devices and server, after can further preventing that one group of device keys from leaking, affect the fail safe of other networked devices.
Step S830: the second device information that server receives with first device secret key decryption, and one second device identification that generates and store corresponding the second networked devices with reference to the second device information of deciphering, and one group of second device keys that can further generate and store corresponding the second networked devices.
Preferably, server can further be stored the second device identification, the second device information and the second device keys to facility database.As in the previous paragraph, the data of the second device keys that the embodiment of the present invention seven provides for transmitting between encrypt and decrypt the second networked devices and server, improve fail safe, and wherein, the second device keys is can be that symmetric key can be also unsymmetrical key.
Step S840: the second device identification, the second device keys that server generates with first device secret key encryption, and send the second device identification, the second device keys to the first networked devices encrypted.
Step S850: the second device identification, the second device keys shared key that the first networked devices receives with first device secret key decryption, and after encrypting with shared key, the second device identification of transmission encryption, the second device keys shared key are to bis-Even net arrangement.
Step S850: the second networked devices is with the second device identification, second device keys of shared key deciphering store decrypted.
In addition, the detailed method that the embodiment of the present invention seven provides can be applied to server, described in be applied to server method can specifically comprise the following steps:
Step 1: receive the second device information with first device secret key encryption from the first networked devices.
Step 2: the second device information receiving with first device secret key decryption.
Preferably, described first device key storage is in facility database, and the first device key of further getting from facility database between step 1 and step 2 is in order to the second device information of deciphering reception.
Step 3: generate unique second device identification of corresponding the second networked devices and can further store the second device identification with reference to the second device information of deciphering.
Preferably, further generate unique one group of second device keys of corresponding the second networked devices and can further store the second device keys.More preferably, can as shown in Figure 6, the second device identification, the second device information and the second device keys be sent to facility database storage.
Step 4: the second device identification generating with first device secret key encryption is also sent to the first networked devices.
Preferably, the second device keys further generating with first device secret key encryption is also sent to the first networked devices.
In addition, the detailed method that the embodiment of the present invention seven provides can be applied to the first networked devices.The described method that is applied to the first networked devices can specifically comprise the following steps:
Step 1: receive the second device information of encrypting with shared key from the second networked devices.
Step 2: decipher the second device information with shared key, and with first device key by deciphering the second device information encrypting and transmitting to server.
Step 3: receive from server the second device identification with first device secret key encryption.
Preferably, further receive from server the second device keys with first device secret key encryption.
Step 4: the second device identification receiving with first device secret key decryption, and with shared key, the second device identification of deciphering is encrypted, and send the second device identification to the second networked devices of encrypting.
Preferably, the second device keys further receiving with first device secret key decryption, and with shared key, the second device keys of deciphering is encrypted, and send the second device keys to the second networked devices of encrypting.
In the method that the embodiment of the present invention seven provides, preferably, the first networked devices and the second networked devices are present in a Local Area Network, wherein the first networked devices is logined first device identifier and obtains first device identifier and first device key with the method for the embodiment of the present invention six, the second networked devices is in the time connecting described local-area network, by the second device information to share golden key encrypting and transmitting to described Local Area Network, the first networked devices receives obtains the second device identification and the second device keys after described the second device information in the above described manner to the second networked devices, make the transmission of data can see through the exclusive first device secret key encryption of the first networked devices, the further fail safe of lifting information.
More preferably, in upper type, the second networked devices can see through the second device keys enciphered data or network service request and send the data of encrypting or network service request to server; Server can be obtained the second device keys from facility database, and the data or the network service request that receive with the second device keys deciphering; Server can further respond data or the network service request of deciphering, and generate corresponding data or network service, more preferably, server can the second device keys be encrypted described data or network service, and sees through data or network service to the second networked devices that network transmission is encrypted.
In addition, in addition, method provided by the invention can program language the computer program mode of programming exist, for example: computer program source code, computer program can perform document form etc.Described computer program can be carried out by computer installation, or can further be stored in computer-readable medium, comprise ROM, RAM, EPROM, EEPROM, hard disk, solid state hard disc, floppy disk, CD-ROM, DVD-ROM or other forms of electronics, electromagnetism or optically-readable media, and can read the included step of rear execution method provided by the invention by computer installation.
For convenience of description, while describing above device, being divided into various modules with function describes respectively.Certainly, in the time implementing the embodiment of the present invention, the function of each module can be realized in same or multiple software and/or hardware.
Be to be understood that, although this specification is described according to execution mode, but be not that each execution mode only comprises an independently technical scheme, this narrating mode of specification is only for clarity sake, those skilled in the art should make specification as a whole, technical scheme in each execution mode also can, through appropriately combined, form other execution modes that it will be appreciated by those skilled in the art that.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of making, be equal to replacement, improvement etc., within all should being included in the scope of protection of the invention.

Claims (12)

1. a management method for networked devices identifier, is applied to a server, it is characterized in that, described method comprises:
A, receive from the first device information of the first networked devices;
The first device identifier of B, the described first device Information generation of reference corresponding described the first networked devices of storage; And
C, send described first device identifier to described the first networked devices.
2. method according to claim 1, is characterized in that:
Described first device information is shared with described server and described the first networked devices and is pre-stored within that the shared key of described the first networked devices encrypted for described the first networked devices;
Described steps A also comprises with described shared key deciphers described first device information; And
Described step C also comprises with described shared key and encrypts described first device identifier.
3. method according to claim 2, is characterized in that:
Described step B also comprises the first device key that generates corresponding described the first networked devices; And
Described step C also comprises with described shared key and encrypts described first device key, and sends described first device key to described the first networked devices.
4. a management method for networked devices identifier, is applied to server, it is characterized in that, after method claimed in claim 3, comprising:
D, reception be the second device information with described first device secret key encryption from described the first networked devices, and with the second device information described in described first device secret key decryption;
E, described the second device information of reference also generate the second device identification; And
F, with the second device identification described in described first device secret key encryption, and send described the second device identification to described the first networked devices.
5. manage a method for networked devices identifier, be applied to the first networked devices, it is characterized in that, described method comprises:
A, transmission first device information are to server; And
B, reception are also stored the first device identifier that described server returns, and wherein said first device identifier generates with reference to described first device information for described server.
6. method according to claim 5, is characterized in that:
Described steps A also comprises with described the first networked devices and the shared shared key of described server encrypts described first device information, and wherein said shared key is pre-stored within described the first networked devices; And
Described first device identifier in described step B is encrypted with described shared key by described server, and described step B also comprises with described shared key and deciphers described first device identifier.
7. method according to claim 6, is characterized in that:
Described step B also comprises the first device key that receives described server generation and encrypt with described shared key, and deciphers described first device key with described shared key, and stores described first device key.
8. manage a method for networked devices identifier, be applied to the first networked devices, it is characterized in that, after method claimed in claim 7, comprising:
The second device information that C, reception are encrypted with described shared key from the second networked devices, and decipher described the second device information with described shared key, wherein said the second networked devices is stored described shared key and described the second device information, and encrypts described the second device information and be sent to described the first networked devices with described shared key;
D, with the second device information described in described first device secret key encryption, and send described the second device information to described server;
E, receive second device identification of described server with described first device secret key encryption, and with the second device identification described in described first device secret key decryption; And
F, encrypt described the second device identification with described shared key, and send described the second device identification to described the second networked devices;
Wherein, described the second device identification is that described server generates with reference to described the second device information.
9. first networked devices, is characterized in that, described the first networked devices comprises:
Memory module, for storing first device information;
Sending module, for sending described first device information to server; And
Receiver module, the first device identifier returning for receiving described server, and transmit described first device identifier to described memory module;
Wherein, described first device identifier generates with reference to described first device information for described server;
Wherein, described memory module is also for storing described first device identifier.
10. the first networked devices according to claim 9, is characterized in that:
Described memory module, also for storing the shared shared key of described the first networked devices and described server;
The described first device identifier that described receiver module receives is that described server is encrypted with described shared key; And
Described the first networked devices also comprises:
Encrypting module, for encrypt described first device information with described shared key, and is sent to described sending module; And
Deciphering module, the described first device identifier receiving for decipher described receiver module with described shared key, and be sent to described memory module.
11. the first networked devices according to claim 10, is characterized in that:
Described receiver module, the first device key of also encrypting with described shared key for receiving described server;
Described deciphering module, also for deciphering described first device key and being sent to described memory module with described shared key; And
Described memory module, also for storing described first device key.
12. the first networked devices according to claim 11, is characterized in that:
Described receiver module, also for receiving the second device information of encrypting with described shared key from the second networked devices, wherein said the second networked devices is stored described shared key and described the second device information, and encrypts described the second device information and be sent to described the first networked devices with described shared key;
Described deciphering module, the second device information also receiving for decipher described receiver module with described shared key;
Described encrypting module, also for the second device information with deciphering module deciphering described in described first device secret key encryption;
Described sending module, is also sent to described server for the second device information that described encrypting module is encrypted; And
Described receiver module, also for receiving second device identification of described server with described first device secret key encryption, wherein said the second identifier is that described server generates with reference to described the second device information;
Described deciphering module, also the second device identification for receiving with receiver module described in described first device secret key decryption;
Described encrypting module, also for encrypting the second device identification of described deciphering module deciphering with described shared key; And
Described sending module, extremely described the second networked devices of the second device identification of also encrypting for sending described encrypting module.
CN201210430227.0A 2012-11-01 2012-11-01 A method for managing networking device IDs and networking devices Pending CN103795560A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210430227.0A CN103795560A (en) 2012-11-01 2012-11-01 A method for managing networking device IDs and networking devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210430227.0A CN103795560A (en) 2012-11-01 2012-11-01 A method for managing networking device IDs and networking devices

Publications (1)

Publication Number Publication Date
CN103795560A true CN103795560A (en) 2014-05-14

Family

ID=50670886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210430227.0A Pending CN103795560A (en) 2012-11-01 2012-11-01 A method for managing networking device IDs and networking devices

Country Status (1)

Country Link
CN (1) CN103795560A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577680A (en) * 2016-01-18 2016-05-11 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analyzing method, devices and key managing center
CN106465050A (en) * 2014-05-23 2017-02-22 因温特奥股份公司 Configuring terminal devices
CN107395442A (en) * 2017-08-31 2017-11-24 广东美的制冷设备有限公司 The configuration system and collocation method and production server of identity type mark

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273399A1 (en) * 2004-06-08 2005-12-08 Sony Corporation Content distribution server, content distribution method, and program
CN101142570A (en) * 2004-06-14 2008-03-12 约维申有限公司 Network security and fraud detection system and method
CN101178671A (en) * 2007-12-11 2008-05-14 北大方正集团有限公司 Method and system for dynamically configuring service treatment progress on server terminal
CN101373504A (en) * 2008-08-04 2009-02-25 北京大学 Management method and system for downloading digital content
CN102118392A (en) * 2011-01-18 2011-07-06 南京朗睿软件科技有限公司 Encryption/decryption method and system for data transmission
CN102571766A (en) * 2010-12-23 2012-07-11 微软公司 Registration and network access control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273399A1 (en) * 2004-06-08 2005-12-08 Sony Corporation Content distribution server, content distribution method, and program
CN101142570A (en) * 2004-06-14 2008-03-12 约维申有限公司 Network security and fraud detection system and method
CN101178671A (en) * 2007-12-11 2008-05-14 北大方正集团有限公司 Method and system for dynamically configuring service treatment progress on server terminal
CN101373504A (en) * 2008-08-04 2009-02-25 北京大学 Management method and system for downloading digital content
CN102571766A (en) * 2010-12-23 2012-07-11 微软公司 Registration and network access control
CN102118392A (en) * 2011-01-18 2011-07-06 南京朗睿软件科技有限公司 Encryption/decryption method and system for data transmission

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106465050A (en) * 2014-05-23 2017-02-22 因温特奥股份公司 Configuring terminal devices
CN105577680A (en) * 2016-01-18 2016-05-11 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analyzing method, devices and key managing center
CN105577680B (en) * 2016-01-18 2021-03-26 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analysis method, device and key management center
CN107395442A (en) * 2017-08-31 2017-11-24 广东美的制冷设备有限公司 The configuration system and collocation method and production server of identity type mark

Similar Documents

Publication Publication Date Title
US8984295B2 (en) Secure access to electronic devices
KR101941049B1 (en) Method and system for encrypted communications
KR101765917B1 (en) Method for authenticating personal network entity
KR20190099066A (en) Digital certificate management method and device
WO2012100677A1 (en) Identity management method and device for mobile terminal
EP2856789B1 (en) Method for tracking a mobile device onto a remote displaying unit via a mobile switching center and a head-end
CN103733599A (en) Apparatus and method for supporting family cloud in cloud computing system
CN103797830A (en) Systems and methods for encoding exchanges with a set of shared ephemeral key data
CN101651684A (en) Systems and methods for providing network devices
CN102739643A (en) Permitting access to a network
KR20180119201A (en) Electronic device for authentication system
KR101835640B1 (en) Method for authentication of communication connecting, gateway apparatus thereof, and communication system thereof
TW201236387A (en) Authentication and authorization of cognitive radio devices
CN111726801B (en) Network security control method
KR20100071209A (en) Verification of device using device tag
US7099476B2 (en) Method for updating a network ciphering key
US20030221098A1 (en) Method for automatically updating a network ciphering key
CN1672385A (en) Security system for apparatuses in a network
KR102171377B1 (en) Method of login control
CN103795560A (en) A method for managing networking device IDs and networking devices
WO2016035466A1 (en) Communication system, program for server device, recording medium recording this program, program for communication device, recording medium recording this program, program for terminal device, and recording medium recording this program
US20050021469A1 (en) System and method for securing content copyright
KR100505481B1 (en) Certification system for WEB service access using a mobile terminal
CN106972928B (en) Bastion machine private key management method, device and system
KR101172876B1 (en) System and method for performing mutual authentication between user terminal and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140514