CN106506476A - The method and system of safety modification facility information - Google Patents

The method and system of safety modification facility information Download PDF

Info

Publication number
CN106506476A
CN106506476A CN201610939682.1A CN201610939682A CN106506476A CN 106506476 A CN106506476 A CN 106506476A CN 201610939682 A CN201610939682 A CN 201610939682A CN 106506476 A CN106506476 A CN 106506476A
Authority
CN
China
Prior art keywords
facility information
equipment
key
encrypted
checking mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610939682.1A
Other languages
Chinese (zh)
Other versions
CN106506476B (en
Inventor
杜彦南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kyland Technology Co Ltd
Original Assignee
Kyland Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kyland Technology Co Ltd filed Critical Kyland Technology Co Ltd
Priority to CN201610939682.1A priority Critical patent/CN106506476B/en
Publication of CN106506476A publication Critical patent/CN106506476A/en
Application granted granted Critical
Publication of CN106506476B publication Critical patent/CN106506476B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

A kind of the present embodiments relate to communication technical field, more particularly to method and system of safety modification facility information.For improving the safety of modification facility information process.In the embodiment of the present invention, the first equipment is encrypted to facility information request using the key that is arranged with the second equipment, and the facility information request of broadcast enciphering;First equipment receives the facility information response that the use key of the second equipment return is encrypted;First equipment is decrypted to the facility information response for receiving using key, obtains the facility information of the second equipment;First equipment is responded according to facility information, changes message to the second equipment unicast using the facility information that key is encrypted;Facility information modification message includes the amended facility information of the second equipment;Facility information modification message is used for making the second equipment that facility information is revised as amended facility information.Effectively prevent facility information request, facility information response and facility information modification message in transmitting procedure to be tampered.

Description

The method and system of safety modification facility information
Technical field
The present embodiments relate to communication technical field, more particularly to the method and system of safety modification facility information.
Background technology
Due to the resettlement of machine room, the replacing of equipment, add new equipment, change of the network address etc., be required for same The facility information of the equipment in individual network is modified, than if desired for because special Internet protocol (Internet Protocol, Referred to as:IP) address is modified.The facility information of other multiple equipments can be repaiied by an equipment in prior art Change.In the prior art, the specific embodiment of the facility information of modification equipment:
First equipment is used for described in second device request to multiple second device broadcasts of first equipment control The request message of the facility information of the second equipment;After each second equipment receives request message, by way of unicast to First equipment returns the message of the facility information for including second equipment;First equipment receives including for each second equipment return After the message of the facility information of each the second equipment, to the second equipment transmission for needing to change facility information by way of unicast The message of the facility information of modification equipment;After second equipment receives the message of modification facility information, second equipment is changed Facility information.
In due to prior art, during the modification of facility information, the transmission of request message is used in plain text, and is not had There is associated verification mechanism, therefore, be easy to analyze by packet capturing in prior art, the methods such as message information distorted to the second equipment Facility information carry out malicious modification and cause network obstructed, it could even be possible to sending invalid message so as to stealing the power of the second equipment Limit.
Content of the invention
The embodiment of the present invention provides a kind of method and system of safety modification facility information, for improving modification facility information The safety of process.
The embodiment of the present invention provides a kind of method of safety modification facility information, including:
First equipment is using being encrypted to facility information request with the key of second equipment agreement, and broadcast enciphering sets Standby information request;Facility information request includes the request message of the facility information for the second equipment of request, use and second The first checking mark that the algorithm of equipment agreement is obtained after calculating to request message, and the user name of second equipment And password;First equipment receives the facility information response that the use key of the second equipment return is encrypted;Wherein, facility information response The second equipment using key to the facility information request successful decryption that receives and to the first checking identity verification for obtaining into Work(and to after the user name and the password authentification success return;Facility information response includes setting for the second equipment Standby the first equipment of information is decrypted to the facility information response for receiving using key, obtains the facility information of the second equipment; First equipment is responded according to facility information, changes message to the second equipment unicast using the facility information that key is encrypted;Wherein, if Standby information modification message includes the new facility information of the second equipment;Facility information changes message, for making the second equipment by the The facility information of two equipment is revised as the new facility information of the second equipment described in the facility information modification message.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message Checking mark.Alternatively, the first equipment is decrypted to the facility information response for receiving using key, obtains the second equipment Facility information, including:First equipment is decrypted to the facility information response for receiving using key, obtains setting for the second equipment Standby information and the second checking mark.Alternatively, the first equipment is responded according to facility information, is added to the second equipment unicast using key Close facility information modification message, including:First equipment is responded according to facility information, and generating includes the facility information of the second equipment Facility information modification message with the second checking mark.Alternatively, the first equipment is entered to facility information modification message using key Row encryption, and message is changed to the second equipment unicast using the facility information that key is encrypted, so that the second equipment is to receiving The first equipment send the second checking identity verification success when, the facility information of itself is revised as in apparatus modifications message the The new facility information of two equipment.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption.Alternatively, the first equipment is carried out to the facility information response for receiving using key Decryption, obtains facility information and the second checking mark of the second equipment, including:First equipment is using key to the equipment that receives Information response is decrypted, and obtains the facility information of the second equipment, and the second checking mark using public key encryption.Optional Ground, the first equipment obtain second using being decrypted to the second checking mark using public key encryption with the private key of public key match Checking mark.
The embodiment of the present invention provides a kind of method of safety modification facility information, including:
The facility information that the key that the use of the second equipment the first device broadcasts of reception is arranged with the second equipment is encrypted Request;Facility information request include request message for from the facility information to second the second equipment of device request, using with The first checking mark that the algorithm of the second equipment agreement is obtained after calculating to request message, and the use of second equipment Name in an account book and password;Second equipment is decrypted to the facility information for receiving using key, is asked after successful decryption The username and password of message, the first checking mark and second equipment;After second equipment uses the algorithm that arranges to decryption The request message for obtaining is calculated, and obtains checking mark to be verified;And determining checking mark to be verified with the first checking mark The first checking identity verification success to obtaining is determined when knowledge content is consistent;Second equipment is added to the first equipment unicast using key Close facility information response;Wherein, facility information response includes the facility information of the second equipment;Second equipment receives first and sets Facility information that is standby responding unicast according to facility information and being encrypted using key changes message;Wherein, facility information modification report Text includes the amended facility information of the second equipment;Second equipment changes message using key to the facility information for receiving Be decrypted, the new facility information of the second equipment is obtained after successful decryption;The facility information of itself is changed by the second equipment For the new facility information of the second equipment described in facility information modification message.
Alternatively, also include that the second checking is identified in facility information response;Also include second in facility information modification message Checking mark.Alternatively, before the facility information response that the second equipment is encrypted to the first equipment unicast using key, also include: Second equipment generates the second checking mark.Alternatively, the second equipment is carried out to facility information and the second checking mark using key Encryption, obtains responding using the facility information that key is encrypted;Second equipment is encrypted to facility information response using key, is obtained To the facility information response that is encrypted using key.Alternatively, the facility information of itself is revised as the equipment letter by the second equipment Described in breath modification message before the new facility information of the second equipment, also include:Second equipment is using key to making for receiving The facility information modification message that is encrypted with key is decrypted, and obtains the second checking mark after successful decryption;Second equipment Determine that the second checking mark for receiving is consistent with the second checking mark content in facility information response.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption.Alternatively, the second equipment using key to facility information and second checking identify into Row encryption, obtains responding using the facility information that key is encrypted, including:Second equipment is carried out to the second checking mark using public key Encryption, obtains the second checking mark of public key encryption;Second equipment is tested to the second of facility information and public key encryption using key Card mark is encrypted, and obtains responding using the facility information that key is encrypted.
The system that the embodiment of the present invention provides safety modification facility information, including the first equipment and multiple second equipment;
First equipment, for using the key with the second equipment agreement to be encrypted facility information request, and extensively Broadcast the facility information request of encryption;Receive the facility information response that use that second equipment returns key is encrypted;Make Facility information response is decrypted with the key, obtains the facility information of second equipment;According to the equipment Information response, changes message to second equipment unicast using the facility information that the key is encrypted;Wherein, the equipment letter Breath modification message includes the amended facility information of second equipment;Wherein, the facility information request includes using The algorithm that request message, use in the facility information for asking second equipment is arranged with the second equipment is to the request message The the first checking mark obtained after being calculated, and the username and password of second equipment;
Second equipment, for receiving the facility information request of the first device broadcasts;Set to described using the key Standby information is decrypted, and obtains the request message, the first checking mark and second equipment after successful decryption Username and password;The request message obtained after decryption is calculated using the algorithm of the agreement, obtain treating school Checking mark;And determine to obtaining when the checking mark to be verified is determined and the described first checking mark content is consistent The first checking identity verification success;The username and password of second equipment for receiving is verified, and is verified Success;Responded to first equipment unicast using the facility information that the key is encrypted;Wherein, in the facility information response Facility information including second equipment;
Second equipment, is additionally operable to equipment that is receiving the first equipment unicast and being encrypted using the key and is believed Breath modification message;Facility information modification message is decrypted using the key, is obtained after successful decryption described The new facility information of second equipment;The facility information of second equipment is revised as described in the facility information modification message The new facility information of second equipment.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message Checking mark.Alternatively, the first equipment, for being decrypted to the facility information response for receiving using key, obtains second The facility information of equipment and the second checking mark;Responded according to facility information, generating includes the facility information of the second equipment and the The facility information modification message of two checking marks;Facility information modification message is encrypted using key, and to the second equipment Unicast changes message using the facility information that key is encrypted;Second equipment, for being verified to facility information and second using key Mark is encrypted, and obtains responding using the facility information that key is encrypted;Facility information response is encrypted using key, is obtained To the facility information response that is encrypted using key;Message is changed using the facility information that key is encrypted to the use key for receiving Be decrypted, the second checking mark is obtained after successful decryption;Determine that the second checking mark for receiving is rung with facility information The second checking mark content in answering is consistent.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption.Alternatively, the first equipment, for the facility information response using key to receiving It is decrypted, obtains the facility information of the second equipment, and the second checking mark using public key encryption;Using with public key match Private key to using public key encryption second checking mark be decrypted, obtain the second checking mark;Second equipment, for using Public key is encrypted to the second checking mark, obtains the second checking mark of public key encryption;Using key to facility information and public affairs Second checking mark of key encryption is encrypted, and obtains responding using the facility information that key is encrypted.
In the embodiment of the present invention, as facility information request, facility information response and facility information modification message are carried out Encryption, effectively prevent facility information request, facility information response and facility information modification message in transmitting procedure and is usurped Change;And as facility information modification message is encryption, even if being stolen, cannot also obtain real facility information modification report Text, therefore cannot carry out the modification of malice to the facility information of equipment.Further, certification machine with the addition of in facility information request The username and password of system and the access rights of the second equipment, i.e., the first checking mark and the second equipment, if facility information request It is tampered or steals, then the second equipment can not obtains the first checking mark after calculating to request message by using the algorithm that arranges Know, so as to the second equipment can be verified mark to determine whether facility information request is tampered by checking first;And second Equipment is just responded to the first equipment unicast facility information, effectively after the username and password that checking is received is proved to be successful Prevent lack of competence other equipment obtain the second equipment facility information;Thus, further increasing setting for modification equipment The safety of standby information process.
Description of the drawings
Fig. 1 is a kind of configuration diagram of communication system provided in an embodiment of the present invention;
Fig. 2 is a kind of method flow schematic diagram of safety modification facility information provided in an embodiment of the present invention;
Fig. 3 is the method flow schematic diagram of another kind of safety modification facility information provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of equipment provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another kind of equipment provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of safety modification facility information system provided in an embodiment of the present invention.
Specific embodiment
In order that the purpose of the present invention, technical scheme and beneficial effect become more apparent, below in conjunction with accompanying drawing and enforcement Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only in order to explaining this Bright, it is not intended to limit the present invention.
Fig. 1 shows a kind of configuration diagram of communication system of the application embodiment of the present invention.As shown in figure 1, the system Framework can include the first equipment 101, the second equipment 102.Can be by wirelessly or having between first equipment and multiple second equipment The mode of line is attached.
First equipment 101 can be provided with the equipment for managing the second device software, and the first equipment is used for managing communication system The second equipment in system, such as the first equipment can be checked or change the facility information of the second equipment, title etc..
Second equipment 102 can through wireless access network (Radio Access Network, referred to as:RAN) with one or many Individual core net is communicated.Second equipment can be multiple equipment, and such as the second equipment 102a, the second equipment 102b, second set Standby 102c, the second equipment 102d, second equipment 102e etc..It can be cell phone, wireless phone, session to access the second equipment Startup agreement (Session Initiation Protocol, referred to as:SIP) phone, WLL (Wireless Local Loop, referred to as:WLL) stand, personal digital assistant (Personal Digital Assistant, referred to as:PDA), have The handheld device of radio communication function, computing device or be connected to other processing equipments of radio modem, mobile unit, Wearable device, the terminal unit, or switch, hub, bridge, router, gateway, network in following 5G networks Interface card, WAP, modem etc..
Based on the system architecture shown in Fig. 1, Fig. 2 illustrates a kind of safety modification provided in an embodiment of the present invention and sets The method flow schematic diagram of standby information, as shown in Fig. 2 the method for the safety modification facility information is comprised the following steps:
Step 201, the first equipment are encrypted to facility information request using the key that is arranged with the second equipment, and are broadcasted The facility information request of encryption;Facility information request includes the request message of the facility information for the second equipment of request, makes The the first checking mark obtained after being calculated to request message with the algorithm that arranges with the second equipment, and the use of the second equipment Name in an account book and password;The equipment letter that the key that the use of the second equipment the first device broadcasts of reception is arranged with the second equipment is encrypted Breath request;
Step 202, the second equipment are decrypted to the facility information for receiving using key, are obtained after successful decryption The username and password of request message, the first checking mark and the second equipment;
It should be noted that the algorithm that the first checking is identified by arranging is calculated to request message, in request In message, also included Data Identification has:For recognizing the protocol-identifier and protocol version mark of used agreement, being used for identifying The datagram length mark of whole datagram length, source physical address (Media Access Control, referred to as:MAC) identify, Source device message identification, target MAC (Media Access Control) address mark, purpose equipment message identification and protocol massages type identification;Alternatively, agreement Type of message mark can ask facility information, the facility information comprising facility information, modification equipment:Second equipment is such as changed The address information of IP;
Step 203, the second equipment are calculated to the request message obtained after decryption using the algorithm of agreement, obtain treating school Checking mark;And verify that mark content determines the first checking to obtaining when consistent determining that checking to be verified is identified with first Identity verification success;The username and password of the second equipment that the second equipment interconnection is received is verified, and is verified successfully;
Step 204, the second equipment are responded to the first equipment unicast using the facility information that key is encrypted;Wherein, equipment letter Breath response includes the facility information of the second equipment;First equipment receives the equipment letter that the use key of the second equipment return is encrypted Breath response;Wherein, to be the second equipment to the facility information request successful decryption that receives and right using key for facility information response First for obtaining verifies identity verification success and to return after the user name and the password authentification success;
Step 205, the first equipment are decrypted to the facility information response for receiving using key, obtain the second equipment Facility information;
Alternatively, the facility information of the second equipment includes:The IP address of the second equipment;
Step 206, the first equipment are responded according to facility information, to the facility information that the second equipment unicast is encrypted using key Modification message;Wherein, facility information modification message includes the new facility information of the second equipment;Facility information changes message, uses The facility information of the second equipment is revised as new facility information in the second equipment is made;
Step 207, the second equipment are decrypted to the facility information modification message for receiving using key, in successful decryption Second equipment new facility information is obtained afterwards;
Step 208, it is new that the facility information of itself is revised as the second equipment in facility information modification message by the second equipment Facility information.
In the embodiment of the present invention, as facility information request, facility information response and facility information modification message are carried out Encryption, effectively prevent facility information request, facility information response and facility information modification message in transmitting procedure and is usurped Change;And as facility information modification message is encryption, even if being stolen, cannot also obtain real facility information modification report Text, therefore cannot carry out the modification of malice to the facility information of equipment.Further, certification machine with the addition of in facility information request The username and password of system and the access rights of the second equipment, i.e., the first checking mark and the second equipment, if facility information request It is tampered or steals, then the second equipment can not obtains the first checking mark after calculating to request message by using the algorithm that arranges Know, so as to the second equipment can be verified mark to determine whether facility information request is tampered by checking first;And second Equipment is just responded to the first equipment unicast facility information, effectively after the username and password that checking is received is proved to be successful Prevent lack of competence other equipment obtain the second equipment facility information;Thus, further increasing setting for modification equipment The safety of standby information process.
Alternatively, also include that the second checking is identified in facility information response;Also include second in facility information modification message Checking mark;Before the facility information response that second equipment is encrypted to the first equipment unicast using key, also include:Second equipment Generate the second checking mark;Second equipment is encrypted to facility information and the second checking mark using key, is obtained using close The facility information response of key encryption;Second equipment is encrypted to facility information response using key, obtains encrypting using key Facility information response.The facility information of itself is revised as second equipment the equipment letter that the second equipment is new in apparatus modifications message Before breath, also include:Second equipment is changed message using the facility information that key is encrypted to the use key for receiving and is solved Close, the second checking mark is obtained after successful decryption;Second equipment determines the second checking mark and facility information for receiving The second checking mark content in response is consistent.
Correspondingly, alternatively, also include that the second checking is identified in facility information response;Also wrap in facility information modification message Include the second checking mark.First equipment is decrypted to the facility information response for receiving using key, obtains the second equipment Facility information, including:First equipment is decrypted to the facility information response for receiving using key, obtains setting for the second equipment Standby information and the second checking mark.First equipment is responded according to facility information, to the second equipment unicast using setting that key is encrypted Standby information changes message, including:First equipment is responded according to facility information, and generating includes the facility information and second of the second equipment The facility information modification message of checking mark;First equipment is encrypted to facility information modification message using key, and to the Two equipment unicasts change message using the facility information that key is encrypted, so that the second equipment is sent in the first equipment to receiving Second checking identity verification success when, the facility information of itself is revised as the new equipment of the second equipment in apparatus modifications message Information.
Alternatively, the second checking mark can be the certification mark of the second equipment.Second equipment generates the second checking mark, Second checking mark can indicate that the second equipment, and can indicate that the power of the username and password that the first equipment is used Limit.When the second equipment is responded to the first equipment unicast facility information, the certification mark of the second equipment is enrolled facility information sound Ying Zhong.If the first equipment is wanted to modify the facility information of the second equipment, the first equipment is set to the second equipment unicast Standby information changes the certification mark for carrying the second equipment in message, only when the second equipment determine entrained in modification message The second certification mark correctness after, just the facility information of itself can be modified.First can be effectively prevented Equipment is arbitrarily changed to the facility information of the second equipment.
Give an example, the second equipment receives the facility information request including username and password, according to default including many The list of individual different username and password, verifies to the username and password in facility information request, determines the equipment When the username and password that information request includes has the authority of modification facility information, the second equipment generates the second checking mark Know, and the second checking mark is sent to the first equipment.When the second equipment receives second testing including this for the first equipment unicast During the facility information modification message of card mark, the second equipment is verified to the second checking mark, and the second equipment can be according to equipment The second checking mark that information modification message includes, determines whether oneself executes the modification of facility information.Such as, the second equipment Determine that the second checking mark indicates that the username and password that facility information request includes has the power for changing facility information In limited time, determine that oneself executes the modification of facility information.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption;First equipment is decrypted to the facility information response for receiving using key, is obtained Facility information and second to the second equipment verifies mark, including:First equipment is rung to the facility information for receiving using key Should be decrypted, obtain the facility information of the second equipment, and the second checking mark using public key encryption;First equipment is used The second checking mark using public key encryption is decrypted with the private key of public key match, obtains the second checking mark.
Correspondingly, alternatively, also include in facility information request:The public key that first equipment is generated;In facility information response Also include:The second checking mark using public key encryption.Second equipment using key to facility information and second checking identify into Row encryption, obtains responding using the facility information that key is encrypted, including:Second equipment is carried out to the second checking mark using public key Encryption, obtains the second checking mark of public key encryption;Second equipment is tested to the second of facility information and public key encryption using key Card mark is encrypted, and obtains responding using the facility information that key is encrypted.
It should be noted that the first equipment generates public key, public key one is carried when the first device broadcasts facility information is asked Rise and send.Using the public key is generated to the second equipment second, second equipment verifies that mark is encrypted;First, it can be ensured that During two equipment are responded to the first equipment unicast facility information, even if the second checking mark is stolen, can not obtain true 2 sections real of the second authenticator;Modification message can be avoided to be analyzed by packet capturing;Secondly, the second checking mark is carried out using public key Encryption, the mode of different keys further increase the safety that facility information changes process.
Fig. 2 illustrates a kind of scheme that the embodiment of the present invention is provided, main by the first checking mark, key And second the username and password of equipment communicated, in order to further improve safety, also provide in the embodiment of the present invention The scheme communicated by public key and the second checking mark on the basis of above-mentioned communication plan, in order to clearer introduction should Safety better method flow process, Fig. 3 illustrate another kind of safety modification facility information provided in an embodiment of the present invention Method.In the embodiment, the first equipment can be equipped with PC (Personal Computer, the letter of IP research tools Claim:PC).First equipment manages the second equipment in network, the mistake of safety modification facility information by the IP research tools of PC sides Journey sees below content.As shown in figure 3, the method includes:
Step 301, the first equipment are encrypted to facility information request using the key that is arranged with the second equipment;Wherein, Facility information request includes request message, the first checking mark, the username and password of the second equipment, public key;
It should be noted that request message be used for ask the second equipment facility information, first checking mark be using with The algorithm of the second equipment agreement is obtained after calculating to request message, the public key that the first equipment is generated, the use of the second equipment Name in an account book and password are the username and passwords of the authority with modification facility information;
Step 302, the facility information request of the first device broadcasts encryption;Second equipment receives the encryption of the first device broadcasts Facility information request;
Step 303, the second equipment are decrypted to the facility information for receiving using key;Obtain after successful decryption Request message, the first checking mark, the username and password of the second equipment, public key;Second equipment is using the algorithm that arranges to solution The request message obtained after close is calculated, and obtains checking mark to be verified;
Step 304, determines whether checking mark to be verified is consistent with the first checking mark content;If content is consistent, hold Row step 305;If content is inconsistent, execution step 306;
Step 305, the username and password of the second equipment that the second equipment interconnection is received are verified, if verifying successfully When, then execution step 307;If verification failure, execution step 306;
The username and password of the second equipment that the second equipment interconnection is received carries out verification and refers to the second equipment according to certainly Username and password is verified to the username and password in the facility information request of the first device broadcasts.If verifying into Work(, then execution step 307.
It should be noted that for the safety of the facility information process that further improves modification equipment, to avoid to setting Standby facility information carries out malicious modification, and facility information request includes the username and password of the second equipment;Second equipment Username and password be used for make the second equipment using key to receive facility information request successful decryption, to obtain first Returning equipment information response after verifying identity verification success and username and password being proved to be successful.
Step 306, abandons the facility information request of encryption;
Step 307, the second equipment use Key Encryption device information response;Wherein, facility information response includes second The facility information of equipment, the second checking mark for using public key encryption;
Alternatively, the second checking mark that facility information response includes, can indicate that the equipment of the first device broadcasts Authority of the username and password in information request to the second equipment:Such as access rights, modification authority;
Step 308, the second equipment are responded to the first equipment unicast using the facility information that key is encrypted;
Step 309, after the first equipment receives the facility information response of the encryption of the second equipment unicast;Docked using key The facility information response for receiving is decrypted, and obtains the facility information of the second equipment, and verifies using the second of public key encryption Mark;
To second using public key encryption, step 310, the first equipment verify that mark is carried out using with the private key of public key match Decryption, obtains the second checking mark;
Step 311, the first equipment generate facility information modification message, and facility information modification message are carried out using key Encryption;Wherein, facility information modification message includes the facility information of the second checking mark and the second equipment;
Step 312, the first equipment are responded according to facility information, to the facility information that the second equipment unicast is encrypted using key Modification message;
It is understood that facility information modification message can be modification IP address of equipment message.Alternatively, facility information Modification message includes the new IP address of the second equipment, and the first checking is identified, the username and password of the second equipment, public key, the Two checking marks;
Step 313, after the second equipment receives the facility information modification message of encryption;Using key to the equipment that receives Information modification message be decrypted, obtain after successful decryption the second checking mark and the new facility information of the second equipment,;
Step 314, the second checking mark that the second equipment interconnection is received are verified, if verifying successfully, execute step 316; If verification failure, execution step 315;
Step 315, abandons the facility information modification message of encryption;
The facility information of itself is revised as new facility information by step 316, the second equipment.
In a kind of alternatively implementation, the corresponding list of the second equipment, the list include the second equipment multiple not Same username and password, different username and passwords have different authorities, such as, the first user that the list includes Name and the authority corresponding to first password are the authority of the facility information that the first equipment has the second equipment of modification;Wrap in the list Authority corresponding to the second user name for including and the second password is the facility information that the first equipment can check the second equipment, but The authority of the facility information of the second equipment can not be changed.In the embodiment of the present invention, the first equipment adds in facility information request and uses Name in an account book and password, so as to make the second equipment determine the authority that the first equipment has to the second equipment.
For example, the username and password of the second equipment that the second equipment interconnection is received is verified in step 305, specifically Can be that the second equipment judges whether the username and password of the second equipment for receiving has the power of checking to the second equipment Limit, if having check authority, it is determined that verify successfully;If not checking authority, it is determined that verification failure.In step 316 In, before the facility information of itself is revised as new facility information by the second equipment, the second equipment judges that the first equipment is wide again Whether the username and password in the facility information request that broadcasts is the power of the facility information that the first equipment has the second equipment of modification The username and password of limit, if the username and password in the facility information request of the first device broadcasts does not have modification authority, Facility information modification is not then carried out, if the username and password in the facility information request of the first device broadcasts is the first equipment During the username and password of the authority of the facility information with the second equipment of modification, then the facility information of itself is repaiied by the second equipment It is changed to new facility information.
Alternatively, according to the second checking mark for receiving, the second equipment determines that the facility information of the first device broadcasts please When username and password in asking is the username and password of the authority of the facility information that the first equipment has the second equipment of modification, The facility information of itself is revised as the new facility information of the second equipment in apparatus modifications message by the second equipment;
It can be seen from the above:In the embodiment of the present invention, due to facility information being asked, being set in the embodiment of the present invention Standby information response and facility information modification message are encrypted, effectively prevent in transmitting procedure facility information request, Facility information response and facility information modification message are tampered;And due to facility information modification message be encryption, even if quilt Steal, cannot also obtain real facility information modification message, the modification of malice therefore cannot be carried out to the facility information of equipment. Further, the username and password of the first checking mark and the second equipment is with the addition of in facility information request, if facility information Request is tampered or steals, then the second equipment can not obtain the first checking after calculating to request message by using the algorithm that arranges Mark, so as to the second equipment can be verified mark to determine whether facility information request is tampered by checking first;And the Two equipment are in the authority for determining that the username and password for receiving is the facility information that the first equipment has the second equipment of modification During username and password, the facility information of itself is revised as the new facility information of the second equipment in apparatus modifications message;And And second equipment in the power for determining that the username and password that receives is the facility information that the first equipment has the second equipment of modification During the username and password of limit, the facility information of itself is revised as the equipment letter that the second equipment is new in apparatus modifications message Breath;Thus, further increasing the safety of the facility information process of modification equipment.
Fig. 4 illustrates a kind of structural representation of equipment provided in an embodiment of the present invention.
Same idea is based on, the embodiment of the present invention provides a kind of equipment, as shown in figure 4, the first equipment 400 includes processing list Unit 401, transmitting element 402 and receiving unit 403.Wherein:
Processing unit, for using the key with the second equipment agreement to be encrypted facility information request;Using key The facility information response for receiving is decrypted, the facility information of the second equipment is obtained;
Transmitting element, the facility information for broadcast enciphering are asked;Facility information request includes setting for request second The request message of standby facility information, using with the second equipment agreement algorithm request message is calculated after obtain first Checking mark, and the username and password of second equipment;To the facility information that the second equipment unicast is encrypted using key Modification message;Wherein, facility information modification message includes the new facility information of the second equipment;Facility information changes message, uses After making the second equipment that the facility information of second equipment to be revised as modification described in the new facility information of second equipment Facility information;
Receiving unit, for receiving the facility information response that the use key that the second equipment is returned is encrypted;Wherein, equipment letter Breath response is that facility information of second equipment using key to receiving asks successful decryption and the first checking mark to obtaining It is proved to be successful and to return after the user name and the password authentification success;Facility information response includes that second sets Standby facility information.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message Checking mark.Alternatively, processing unit, specifically for:The facility information response for receiving is decrypted using key, is obtained The facility information of the second equipment and the second checking mark;Responded according to facility information, generating includes the facility information of the second equipment Facility information modification message with the second checking mark;Facility information modification message is encrypted using key.Alternatively, send out Unit is sent, specifically for:Message is changed to the second equipment unicast using the facility information that key is encrypted, so that the second equipment is right During the second checking identity verification success that the transmitting element for receiving sends, the facility information of itself is revised as described second and is set Amended facility information described in standby new facility information.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption.Alternatively, processing unit, specifically for:The equipment for receiving is believed using key Breath response is decrypted, and obtains the facility information of the second equipment, and the second checking mark using public key encryption;Using with public affairs The private key of key coupling is decrypted to the second checking mark using public key encryption, obtains the second checking mark.
Fig. 5 illustrates the structural representation of another kind of equipment provided in an embodiment of the present invention.
Same idea is based on, the embodiment of the present invention provides another kind of equipment, as shown in figure 5, the second equipment 500 includes receiving Unit 501, processing unit 502 and transmitting element 503.Wherein:
Receiving unit, for receiving the facility information that the key that the use of the first device broadcasts is arranged is encrypted with equipment Request;Facility information request include request message for from the facility information to device request equipment, using and equipment agreement Algorithm request message is calculated after the first checking mark for obtaining, and the username and password of second equipment; Receive facility information that is that the first equipment responds unicast according to facility information and encrypting using key and change message;Wherein, equipment Information modification message includes the new facility information of second equipment;
Processing unit, for being decrypted to the facility information for receiving using key, is asked after successful decryption Seek the username and password of message, the first checking mark and second equipment;Algorithm using agreement is to obtaining after decryption Request message is calculated, and obtains checking mark to be verified;And determining checking mark to be verified with the first checking mark content The first checking identity verification success to obtaining is determined when consistent;The facility information modification message for receiving is carried out using key Decryption, obtains the amended facility information of equipment after successful decryption;The facility information of itself is revised as described second Amended facility information described in the new facility information of equipment;
Transmitting element, for being responded to the first equipment unicast using the facility information that key is encrypted;Wherein, facility information rings The facility information of equipment should be included.
Alternatively, also include that the second checking is identified in facility information response;Also include that second tests in IP address modification message Card mark.Alternatively, processing unit, is additionally operable to:Generate the second checking mark;Using key to facility information and the second checking mark Knowledge is encrypted, and obtains responding using the facility information that key is encrypted;Facility information response is encrypted using key, is obtained Responded using the facility information that key is encrypted;Message is changed using the facility information that key encrypts the use key for receiving to enter Row decryption, obtains the second checking mark after successful decryption;Determine that the second checking mark for receiving is responded with facility information In second checking mark content consistent.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption.Processing unit, is additionally operable to:The second checking mark is encrypted using public key, is obtained The second checking mark to public key encryption;The second checking mark of facility information and public key encryption is encrypted using key, Obtain responding using the facility information that key is encrypted.
Fig. 6 illustrates a kind of structural representation of the system of safety modification facility information provided in an embodiment of the present invention Figure.
Same idea is based on, the embodiment of the present invention provides a kind of system of safety modification facility information, as shown in fig. 6, peace The system 600 of full modification facility information includes the first equipment 601 and multiple second equipment 602.Wherein:
First equipment, for use with the second equipment agreement key to facility information request be encrypted, and broadcast plus Close facility information request;Receive the facility information response that the use key of the second equipment return is encrypted;Using key to equipment Information response is decrypted, and obtains the facility information of the second equipment;Responded according to facility information, to the second equipment unicast using close The facility information modification message of key encryption;Wherein, facility information modification message includes the amended equipment letter of the second equipment Breath;Wherein, facility information request includes the request message of the facility information for the second equipment of request, uses and the second equipment The first checking mark that the algorithm of agreement is obtained after calculating to request message, and the username and password of the second equipment;
Second equipment, for receiving the facility information request of the first device broadcasts;Facility information is solved using key Close, the username and password of request message, the first checking mark and the second equipment is obtained after successful decryption;Using agreement Algorithm is calculated to the request message obtained after decryption, obtains checking mark to be verified;And determining checking mark to be verified The first checking identity verification success to obtaining is determined when consistent with the first checking mark content;To the second equipment for receiving Username and password is verified, and is verified successfully;Responded to the first equipment unicast using the facility information that key is encrypted;Receive First equipment unicast and the facility information encrypted using key changes message;Facility information modification message is entered using key Row decryption, obtains the new facility information of the second equipment after successful decryption;The facility information of the second equipment is revised as described The new facility information of second equipment described in facility information modification message;Wherein, facility information response includes the second equipment Facility information.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message Checking mark;Alternatively, the first equipment, is also used for facility information response of the key to receiving and is decrypted, obtain the The facility information of two equipment and the second checking mark;Responded according to facility information, generate include the facility information of the second equipment with The facility information modification message of the second checking mark;Facility information modification message is encrypted using key, and is set to second Standby unicast changes message using the facility information that key is encrypted;Second equipment, is also used for key to facility information and second Checking mark is encrypted, and obtains responding using the facility information that key is encrypted;Using key to facility information response carry out plus Close, obtain responding using the facility information that key is encrypted;The facility information that the use key for receiving is encrypted is repaiied using key Change message to be decrypted, the second checking mark is obtained after successful decryption;Determine the second checking mark and equipment for receiving The second checking mark content in information response is consistent.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response: The second checking mark using public key encryption;Alternatively, the first equipment, is also used for facility information of the key to receiving and rings Should be decrypted, obtain the facility information of the second equipment, and the second checking mark using public key encryption;Using with public key The private key that matches somebody with somebody is decrypted to the second checking mark using public key encryption, obtains the second checking mark;Second equipment, is additionally operable to The second checking mark is encrypted using public key, obtains the second checking mark of public key encryption;Using key to facility information It is encrypted with the second checking mark of public key encryption, obtains responding using the facility information that key is encrypted.
It can be seen from the above:In the embodiment of the present invention, in the embodiment of the present invention, due to facility information request, set Standby information response and facility information modification message are encrypted, effectively prevent in transmitting procedure facility information request, Facility information response and facility information modification message are tampered;And due to facility information modification message be encryption, even if quilt Steal, cannot also obtain real facility information modification message, the modification of malice therefore cannot be carried out to the facility information of equipment. Further, the access rights of authentication mechanism and the second equipment are with the addition of in facility information request, i.e., the first checking mark and the The username and password of two equipment, if facility information request is tampered or steals, algorithm of second equipment by using agreement The first checking mark can not be obtained to request message after calculating, so as to the second equipment can be by checking the first checking mark come really Whether locking equipment information request is tampered;And second equipment after the username and password that receives of checking is proved to be successful, Just respond to the first equipment unicast facility information, the other equipment for being effectively prevented lack of competence obtains the equipment letter of the second equipment Breath;Thus, further increasing the safety of the facility information process of modification equipment.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method or computer program. Therefore, the present invention can adopt complete hardware embodiment, complete software embodiment or with reference to software and hardware in terms of embodiment Form.And, the present invention can be adopted to can use in one or more computers for wherein including computer usable program code and be deposited The shape of the upper computer program that implements of storage media (including but not limited to disk memory, CD-ROM, optical memory etc.) Formula.
The present invention is the flow process with reference to method according to embodiments of the present invention, equipment (system) and computer program Figure and/or block diagram are describing.It should be understood that can be by computer program instructions flowchart and/or each stream in block diagram Journey and/or the combination of square frame and flow chart and/or the flow process in block diagram and/or square frame.These computer programs can be provided Instruct the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices The device of the function of specifying in present one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter Series of operation steps is executed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or The instruction executed on other programmable devices is provided for realization in one flow process of flow chart or multiple flow processs and/or block diagram one The step of function of specifying in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to include excellent Select embodiment and fall into the had altered of the scope of the invention and change.
Obviously, those skilled in the art can carry out the essence of various changes and modification without deviating from the present invention to the present invention God and scope.So, if these modifications of the present invention and modification belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising these changes and modification.

Claims (10)

1. a kind of method that safety changes facility information, it is characterised in that include:
First equipment is encrypted to facility information request using the key that is arranged with the second equipment, and the equipment letter of broadcast enciphering Breath request;The facility information request includes the request message of the facility information for the second equipment of request, use and second The first checking mark that the algorithm of equipment agreement is obtained after calculating to the request message, and the use of second equipment Name in an account book and password;
First equipment receives the facility information response that use that second equipment returns key is encrypted;Wherein, institute State facility information response be second equipment using the key to the facility information request successful decryption that receives and Identity verification success is verified to obtain described first and to return after the user name and the password authentification success; The facility information response includes the facility information of second equipment;
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set Standby facility information;
First equipment is responded according to the facility information, to the equipment that second equipment unicast is encrypted using the key Information changes message;Wherein, the facility information modification message includes the new facility information of second equipment;The equipment Information changes message, and for making second equipment be revised as the facility information of second equipment, the facility information is repaiied Change the new facility information of the second equipment described in message.
2. the method for claim 1, it is characterised in that also include in the facility information response:Second checking mark; Also include the second checking mark in the facility information modification message;
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set Standby facility information, including:
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set Standby facility information and the second checking mark;
First equipment is responded according to the facility information, to the equipment that second equipment unicast is encrypted using the key Information changes message, including:
First equipment is responded according to facility information, and generating includes the facility information of second equipment and second checking The facility information modification message of mark;
First equipment is encrypted to facility information modification message using the key, and to second tables of equipment Broadcast and message is changed using the facility information that the key is encrypted, so that second equipment is in first equipment to receiving During the second checking identity verification success for sending, the facility information of itself is revised as the amended facility information.
3. method as claimed in claim 2, it is characterised in that also include in the facility information request:First equipment The public key of generation;Also include in the facility information response:The second checking mark using the public key encryption;
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set Standby facility information and the second checking mark, including:
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set Standby facility information, and the second checking mark using the public key encryption;
First equipment verifies mark using with the private key of the public key match to described second using the public key encryption It is decrypted, obtains the second checking mark.
4. the method as described in any one of claims 1 to 3, it is characterised in that the facility information includes second equipment IP address.
5. a kind of method that safety changes facility information, it is characterised in that include:
The facility information that the key that the use of the second equipment the first device broadcasts of reception is arranged with second equipment is encrypted Request;The facility information request is included for the request to the facility information of the second equipment described in second device request The first checking mark that the algorithm that message, use are arranged with the second equipment is obtained after calculating to the request message, and The username and password of second equipment;
Second equipment is decrypted to the facility information for receiving using the key, is obtained after successful decryption The username and password of the request message, the first checking mark and second equipment;
Second equipment is calculated to the request message obtained after decryption using the algorithm of the agreement, obtains treating school Checking mark;And determine to obtaining when the checking mark to be verified is determined and the described first checking mark content is consistent The first checking identity verification success;
The username and password of second equipment that second equipment interconnection is received is verified, when verifying successfully, institute Stating the second equipment, the facility information response that encrypts using the key is sent to first equipment;Wherein, the facility information Response includes the facility information of second equipment;
Second equipment is received that first equipment responds unicast according to the facility information and is encrypted using the key Facility information modification message;Wherein, the facility information modification message includes the new facility information of second equipment;
Second equipment is decrypted to the facility information modification message for receiving using the key, in successful decryption The amended facility information of second equipment is obtained afterwards;
It is new that the facility information of itself is revised as the second equipment described in the facility information modification message by second equipment Facility information.
6. method as claimed in claim 5, it is characterised in that also include that the second checking is identified in the facility information response; Also include the second checking mark in the facility information modification message;
Before the facility information response that second equipment is encrypted to first equipment unicast using the key, also include:
Second equipment is encrypted to the facility information and the second checking mark using the key, is obtained using described The facility information response of key encryption;
Second equipment is encrypted to facility information response using the key, obtains encrypting using the key Facility information is responded;
Before the facility information of itself is revised as the amended facility information by second equipment, also include:
Second equipment is changed message using the facility information that the key is encrypted to the use for the receiving key and is carried out Decryption, obtains the second checking mark after successful decryption;
Second equipment determines that the second checking mark for receiving verifies mark with second in facility information response Know content consistent.
7. method as claimed in claim 6, it is characterised in that also include in the facility information request:First equipment The public key of generation;Also include in the facility information response:The second checking mark using the public key encryption;
Second equipment is encrypted to the facility information and the second checking mark using the key, is used The facility information response of the key encryption, including:
Second equipment is encrypted to the described second checking mark using the public key, obtains the second checking of public key encryption Mark;
Second equipment the second checking mark of the facility information and the public key encryption is carried out using the key plus Close, obtain responding using the facility information that the key is encrypted.
8. the system that a kind of safety changes facility information, it is characterised in that including the first equipment and multiple second equipment;
First equipment, for use with the second equipment agreement key to facility information request be encrypted, and broadcast plus Close facility information request;Receive the facility information response that use that second equipment returns key is encrypted;Using institute State key to be decrypted facility information response, obtain the facility information of second equipment;According to the facility information Response, changes message to second equipment unicast using the facility information that the key is encrypted;Wherein, the facility information is repaiied Changing message includes the amended facility information of second equipment;Wherein, facility information request is included for please Seek the request message of the facility information of second equipment, the request message carried out using the algorithm that arranges with the second equipment The the first checking mark obtained after calculating, and the username and password of second equipment;
Second equipment, for receiving the facility information request of the first device broadcasts;The equipment is believed using the key Breath is decrypted, and obtains the use of the request message, the first checking mark and second equipment after successful decryption Name in an account book and password;The request message obtained after decryption is calculated using the algorithm of the agreement, obtain to be verified testing Card mark;And determine to described in obtaining when the checking mark to be verified is determined and the described first checking mark content is consistent First checking identity verification success;The username and password of second equipment for receiving is verified, and is verified successfully; Responded to first equipment unicast using the facility information that the key is encrypted;Wherein, the facility information response includes The facility information of second equipment;
Second equipment, is additionally operable to facility information that is receiving the first equipment unicast and being encrypted using the key and is repaiied Change message;Facility information modification message is decrypted using the key, described second is obtained after successful decryption The new facility information of equipment;The facility information of second equipment is revised as second described in the facility information modification message The new facility information of equipment.
9. system as claimed in claim 8, it is characterised in that also include in the facility information response:Second checking mark; Also include the second checking mark in the facility information modification message;
First equipment, is also used for the facility information response of the key to receiving and is decrypted, obtain institute State the facility information of the second equipment and the second checking mark;Responded according to facility information, generating includes second equipment Facility information and the second checking mark facility information modification message;Using the key to the facility information Modification message is encrypted, and changes message to second equipment unicast using the facility information that the key is encrypted;
Second equipment, is also used for the key and the facility information and the second checking mark is encrypted, Obtain responding using the facility information that the key is encrypted;Facility information response is encrypted using the key, is obtained To the facility information response that is encrypted using the key;The equipment that the use for the receiving key is encrypted using the key Information modification message is decrypted, and obtains the second checking mark after successful decryption;Determine described second for receiving Checking mark is consistent with the second checking mark content in facility information response.
10. system as claimed in claim 9, it is characterised in that also include in the facility information request:First equipment The public key of generation;Also include in the facility information response:The second checking mark using the public key encryption;
First equipment, is also used for the facility information response of the key to receiving and is decrypted, obtain institute State the facility information of the second equipment, and the second checking mark using the public key encryption;Using with the public key The private key that matches somebody with somebody is decrypted to the second checking mark using the public key encryption, obtains the second checking mark;
Second equipment, is also used for the public key and the described second checking mark is encrypted, obtain public key encryption Second checking mark;The second checking mark of the facility information and the public key encryption is encrypted using the key, Obtain responding using the facility information that the key is encrypted.
CN201610939682.1A 2016-10-24 2016-10-24 The method and system of safety modification facility information Active CN106506476B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610939682.1A CN106506476B (en) 2016-10-24 2016-10-24 The method and system of safety modification facility information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610939682.1A CN106506476B (en) 2016-10-24 2016-10-24 The method and system of safety modification facility information

Publications (2)

Publication Number Publication Date
CN106506476A true CN106506476A (en) 2017-03-15
CN106506476B CN106506476B (en) 2019-07-23

Family

ID=58319121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610939682.1A Active CN106506476B (en) 2016-10-24 2016-10-24 The method and system of safety modification facility information

Country Status (1)

Country Link
CN (1) CN106506476B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113099446A (en) * 2021-04-02 2021-07-09 广东海聊科技有限公司 Safety verification method and system for Beidou short message terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010083629A1 (en) * 2009-01-24 2010-07-29 上海贝尔股份有限公司 Method and apparatus for realizing remote control of devices through network address configuration server
CN105471974A (en) * 2015-11-18 2016-04-06 北京京东世纪贸易有限公司 Intelligent equipment capable of realizing remote control, terminal equipment and method
CN105516948A (en) * 2014-09-26 2016-04-20 华为技术有限公司 Device control method and device control unit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010083629A1 (en) * 2009-01-24 2010-07-29 上海贝尔股份有限公司 Method and apparatus for realizing remote control of devices through network address configuration server
CN105516948A (en) * 2014-09-26 2016-04-20 华为技术有限公司 Device control method and device control unit
CN105471974A (en) * 2015-11-18 2016-04-06 北京京东世纪贸易有限公司 Intelligent equipment capable of realizing remote control, terminal equipment and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113099446A (en) * 2021-04-02 2021-07-09 广东海聊科技有限公司 Safety verification method and system for Beidou short message terminal

Also Published As

Publication number Publication date
CN106506476B (en) 2019-07-23

Similar Documents

Publication Publication Date Title
CN110086608B (en) User authentication method, device, computer equipment and computer readable storage medium
EP2314090B1 (en) Portable device association
CN103685311B (en) A kind of login validation method and equipment
US9009463B2 (en) Secure delivery of trust credentials
EP2316097B1 (en) Protocol for device to station association
CN105554098B (en) A kind of equipment configuration method, server and system
US11539690B2 (en) Authentication system, authentication method, and application providing method
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN112425136B (en) Internet of things security with multiparty computing (MPC)
TW201706900A (en) Method and device for authentication using dynamic passwords
CN106899410A (en) A kind of method and device of equipment identities certification
CN107612889B (en) Method for preventing user information leakage
CN107979514A (en) A kind of method and apparatus bound to equipment
CN108880822A (en) A kind of identity identifying method, device, system and a kind of intelligent wireless device
CN105227537A (en) Method for authenticating user identity, terminal and service end
WO2015003503A1 (en) Network device, terminal device and information security improving method
CN110933484A (en) Management method and device of wireless screen projection equipment
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
TWI526871B (en) Server, user device, and user device and server interaction method
CN109962777A (en) The key in block catenary system is permitted to generate, obtain the method and apparatus of key
CN107948186A (en) A kind of safety certifying method and device
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
CN106941405A (en) A kind of method and apparatus of terminal authentication in a wireless local area network
CN105656854B (en) A kind of method, equipment and system for verifying Wireless LAN user sources
CN113965425B (en) Access method, device and equipment of Internet of things equipment and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant