CN106506476A - The method and system of safety modification facility information - Google Patents
The method and system of safety modification facility information Download PDFInfo
- Publication number
- CN106506476A CN106506476A CN201610939682.1A CN201610939682A CN106506476A CN 106506476 A CN106506476 A CN 106506476A CN 201610939682 A CN201610939682 A CN 201610939682A CN 106506476 A CN106506476 A CN 106506476A
- Authority
- CN
- China
- Prior art keywords
- facility information
- equipment
- key
- encrypted
- checking mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
A kind of the present embodiments relate to communication technical field, more particularly to method and system of safety modification facility information.For improving the safety of modification facility information process.In the embodiment of the present invention, the first equipment is encrypted to facility information request using the key that is arranged with the second equipment, and the facility information request of broadcast enciphering;First equipment receives the facility information response that the use key of the second equipment return is encrypted;First equipment is decrypted to the facility information response for receiving using key, obtains the facility information of the second equipment;First equipment is responded according to facility information, changes message to the second equipment unicast using the facility information that key is encrypted;Facility information modification message includes the amended facility information of the second equipment;Facility information modification message is used for making the second equipment that facility information is revised as amended facility information.Effectively prevent facility information request, facility information response and facility information modification message in transmitting procedure to be tampered.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to the method and system of safety modification facility information.
Background technology
Due to the resettlement of machine room, the replacing of equipment, add new equipment, change of the network address etc., be required for same
The facility information of the equipment in individual network is modified, than if desired for because special Internet protocol (Internet Protocol,
Referred to as:IP) address is modified.The facility information of other multiple equipments can be repaiied by an equipment in prior art
Change.In the prior art, the specific embodiment of the facility information of modification equipment:
First equipment is used for described in second device request to multiple second device broadcasts of first equipment control
The request message of the facility information of the second equipment;After each second equipment receives request message, by way of unicast to
First equipment returns the message of the facility information for including second equipment;First equipment receives including for each second equipment return
After the message of the facility information of each the second equipment, to the second equipment transmission for needing to change facility information by way of unicast
The message of the facility information of modification equipment;After second equipment receives the message of modification facility information, second equipment is changed
Facility information.
In due to prior art, during the modification of facility information, the transmission of request message is used in plain text, and is not had
There is associated verification mechanism, therefore, be easy to analyze by packet capturing in prior art, the methods such as message information distorted to the second equipment
Facility information carry out malicious modification and cause network obstructed, it could even be possible to sending invalid message so as to stealing the power of the second equipment
Limit.
Content of the invention
The embodiment of the present invention provides a kind of method and system of safety modification facility information, for improving modification facility information
The safety of process.
The embodiment of the present invention provides a kind of method of safety modification facility information, including:
First equipment is using being encrypted to facility information request with the key of second equipment agreement, and broadcast enciphering sets
Standby information request;Facility information request includes the request message of the facility information for the second equipment of request, use and second
The first checking mark that the algorithm of equipment agreement is obtained after calculating to request message, and the user name of second equipment
And password;First equipment receives the facility information response that the use key of the second equipment return is encrypted;Wherein, facility information response
The second equipment using key to the facility information request successful decryption that receives and to the first checking identity verification for obtaining into
Work(and to after the user name and the password authentification success return;Facility information response includes setting for the second equipment
Standby the first equipment of information is decrypted to the facility information response for receiving using key, obtains the facility information of the second equipment;
First equipment is responded according to facility information, changes message to the second equipment unicast using the facility information that key is encrypted;Wherein, if
Standby information modification message includes the new facility information of the second equipment;Facility information changes message, for making the second equipment by the
The facility information of two equipment is revised as the new facility information of the second equipment described in the facility information modification message.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message
Checking mark.Alternatively, the first equipment is decrypted to the facility information response for receiving using key, obtains the second equipment
Facility information, including:First equipment is decrypted to the facility information response for receiving using key, obtains setting for the second equipment
Standby information and the second checking mark.Alternatively, the first equipment is responded according to facility information, is added to the second equipment unicast using key
Close facility information modification message, including:First equipment is responded according to facility information, and generating includes the facility information of the second equipment
Facility information modification message with the second checking mark.Alternatively, the first equipment is entered to facility information modification message using key
Row encryption, and message is changed to the second equipment unicast using the facility information that key is encrypted, so that the second equipment is to receiving
The first equipment send the second checking identity verification success when, the facility information of itself is revised as in apparatus modifications message the
The new facility information of two equipment.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption.Alternatively, the first equipment is carried out to the facility information response for receiving using key
Decryption, obtains facility information and the second checking mark of the second equipment, including:First equipment is using key to the equipment that receives
Information response is decrypted, and obtains the facility information of the second equipment, and the second checking mark using public key encryption.Optional
Ground, the first equipment obtain second using being decrypted to the second checking mark using public key encryption with the private key of public key match
Checking mark.
The embodiment of the present invention provides a kind of method of safety modification facility information, including:
The facility information that the key that the use of the second equipment the first device broadcasts of reception is arranged with the second equipment is encrypted
Request;Facility information request include request message for from the facility information to second the second equipment of device request, using with
The first checking mark that the algorithm of the second equipment agreement is obtained after calculating to request message, and the use of second equipment
Name in an account book and password;Second equipment is decrypted to the facility information for receiving using key, is asked after successful decryption
The username and password of message, the first checking mark and second equipment;After second equipment uses the algorithm that arranges to decryption
The request message for obtaining is calculated, and obtains checking mark to be verified;And determining checking mark to be verified with the first checking mark
The first checking identity verification success to obtaining is determined when knowledge content is consistent;Second equipment is added to the first equipment unicast using key
Close facility information response;Wherein, facility information response includes the facility information of the second equipment;Second equipment receives first and sets
Facility information that is standby responding unicast according to facility information and being encrypted using key changes message;Wherein, facility information modification report
Text includes the amended facility information of the second equipment;Second equipment changes message using key to the facility information for receiving
Be decrypted, the new facility information of the second equipment is obtained after successful decryption;The facility information of itself is changed by the second equipment
For the new facility information of the second equipment described in facility information modification message.
Alternatively, also include that the second checking is identified in facility information response;Also include second in facility information modification message
Checking mark.Alternatively, before the facility information response that the second equipment is encrypted to the first equipment unicast using key, also include:
Second equipment generates the second checking mark.Alternatively, the second equipment is carried out to facility information and the second checking mark using key
Encryption, obtains responding using the facility information that key is encrypted;Second equipment is encrypted to facility information response using key, is obtained
To the facility information response that is encrypted using key.Alternatively, the facility information of itself is revised as the equipment letter by the second equipment
Described in breath modification message before the new facility information of the second equipment, also include:Second equipment is using key to making for receiving
The facility information modification message that is encrypted with key is decrypted, and obtains the second checking mark after successful decryption;Second equipment
Determine that the second checking mark for receiving is consistent with the second checking mark content in facility information response.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption.Alternatively, the second equipment using key to facility information and second checking identify into
Row encryption, obtains responding using the facility information that key is encrypted, including:Second equipment is carried out to the second checking mark using public key
Encryption, obtains the second checking mark of public key encryption;Second equipment is tested to the second of facility information and public key encryption using key
Card mark is encrypted, and obtains responding using the facility information that key is encrypted.
The system that the embodiment of the present invention provides safety modification facility information, including the first equipment and multiple second equipment;
First equipment, for using the key with the second equipment agreement to be encrypted facility information request, and extensively
Broadcast the facility information request of encryption;Receive the facility information response that use that second equipment returns key is encrypted;Make
Facility information response is decrypted with the key, obtains the facility information of second equipment;According to the equipment
Information response, changes message to second equipment unicast using the facility information that the key is encrypted;Wherein, the equipment letter
Breath modification message includes the amended facility information of second equipment;Wherein, the facility information request includes using
The algorithm that request message, use in the facility information for asking second equipment is arranged with the second equipment is to the request message
The the first checking mark obtained after being calculated, and the username and password of second equipment;
Second equipment, for receiving the facility information request of the first device broadcasts;Set to described using the key
Standby information is decrypted, and obtains the request message, the first checking mark and second equipment after successful decryption
Username and password;The request message obtained after decryption is calculated using the algorithm of the agreement, obtain treating school
Checking mark;And determine to obtaining when the checking mark to be verified is determined and the described first checking mark content is consistent
The first checking identity verification success;The username and password of second equipment for receiving is verified, and is verified
Success;Responded to first equipment unicast using the facility information that the key is encrypted;Wherein, in the facility information response
Facility information including second equipment;
Second equipment, is additionally operable to equipment that is receiving the first equipment unicast and being encrypted using the key and is believed
Breath modification message;Facility information modification message is decrypted using the key, is obtained after successful decryption described
The new facility information of second equipment;The facility information of second equipment is revised as described in the facility information modification message
The new facility information of second equipment.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message
Checking mark.Alternatively, the first equipment, for being decrypted to the facility information response for receiving using key, obtains second
The facility information of equipment and the second checking mark;Responded according to facility information, generating includes the facility information of the second equipment and the
The facility information modification message of two checking marks;Facility information modification message is encrypted using key, and to the second equipment
Unicast changes message using the facility information that key is encrypted;Second equipment, for being verified to facility information and second using key
Mark is encrypted, and obtains responding using the facility information that key is encrypted;Facility information response is encrypted using key, is obtained
To the facility information response that is encrypted using key;Message is changed using the facility information that key is encrypted to the use key for receiving
Be decrypted, the second checking mark is obtained after successful decryption;Determine that the second checking mark for receiving is rung with facility information
The second checking mark content in answering is consistent.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption.Alternatively, the first equipment, for the facility information response using key to receiving
It is decrypted, obtains the facility information of the second equipment, and the second checking mark using public key encryption;Using with public key match
Private key to using public key encryption second checking mark be decrypted, obtain the second checking mark;Second equipment, for using
Public key is encrypted to the second checking mark, obtains the second checking mark of public key encryption;Using key to facility information and public affairs
Second checking mark of key encryption is encrypted, and obtains responding using the facility information that key is encrypted.
In the embodiment of the present invention, as facility information request, facility information response and facility information modification message are carried out
Encryption, effectively prevent facility information request, facility information response and facility information modification message in transmitting procedure and is usurped
Change;And as facility information modification message is encryption, even if being stolen, cannot also obtain real facility information modification report
Text, therefore cannot carry out the modification of malice to the facility information of equipment.Further, certification machine with the addition of in facility information request
The username and password of system and the access rights of the second equipment, i.e., the first checking mark and the second equipment, if facility information request
It is tampered or steals, then the second equipment can not obtains the first checking mark after calculating to request message by using the algorithm that arranges
Know, so as to the second equipment can be verified mark to determine whether facility information request is tampered by checking first;And second
Equipment is just responded to the first equipment unicast facility information, effectively after the username and password that checking is received is proved to be successful
Prevent lack of competence other equipment obtain the second equipment facility information;Thus, further increasing setting for modification equipment
The safety of standby information process.
Description of the drawings
Fig. 1 is a kind of configuration diagram of communication system provided in an embodiment of the present invention;
Fig. 2 is a kind of method flow schematic diagram of safety modification facility information provided in an embodiment of the present invention;
Fig. 3 is the method flow schematic diagram of another kind of safety modification facility information provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of equipment provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another kind of equipment provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of safety modification facility information system provided in an embodiment of the present invention.
Specific embodiment
In order that the purpose of the present invention, technical scheme and beneficial effect become more apparent, below in conjunction with accompanying drawing and enforcement
Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only in order to explaining this
Bright, it is not intended to limit the present invention.
Fig. 1 shows a kind of configuration diagram of communication system of the application embodiment of the present invention.As shown in figure 1, the system
Framework can include the first equipment 101, the second equipment 102.Can be by wirelessly or having between first equipment and multiple second equipment
The mode of line is attached.
First equipment 101 can be provided with the equipment for managing the second device software, and the first equipment is used for managing communication system
The second equipment in system, such as the first equipment can be checked or change the facility information of the second equipment, title etc..
Second equipment 102 can through wireless access network (Radio Access Network, referred to as:RAN) with one or many
Individual core net is communicated.Second equipment can be multiple equipment, and such as the second equipment 102a, the second equipment 102b, second set
Standby 102c, the second equipment 102d, second equipment 102e etc..It can be cell phone, wireless phone, session to access the second equipment
Startup agreement (Session Initiation Protocol, referred to as:SIP) phone, WLL (Wireless
Local Loop, referred to as:WLL) stand, personal digital assistant (Personal Digital Assistant, referred to as:PDA), have
The handheld device of radio communication function, computing device or be connected to other processing equipments of radio modem, mobile unit,
Wearable device, the terminal unit, or switch, hub, bridge, router, gateway, network in following 5G networks
Interface card, WAP, modem etc..
Based on the system architecture shown in Fig. 1, Fig. 2 illustrates a kind of safety modification provided in an embodiment of the present invention and sets
The method flow schematic diagram of standby information, as shown in Fig. 2 the method for the safety modification facility information is comprised the following steps:
Step 201, the first equipment are encrypted to facility information request using the key that is arranged with the second equipment, and are broadcasted
The facility information request of encryption;Facility information request includes the request message of the facility information for the second equipment of request, makes
The the first checking mark obtained after being calculated to request message with the algorithm that arranges with the second equipment, and the use of the second equipment
Name in an account book and password;The equipment letter that the key that the use of the second equipment the first device broadcasts of reception is arranged with the second equipment is encrypted
Breath request;
Step 202, the second equipment are decrypted to the facility information for receiving using key, are obtained after successful decryption
The username and password of request message, the first checking mark and the second equipment;
It should be noted that the algorithm that the first checking is identified by arranging is calculated to request message, in request
In message, also included Data Identification has:For recognizing the protocol-identifier and protocol version mark of used agreement, being used for identifying
The datagram length mark of whole datagram length, source physical address (Media Access Control, referred to as:MAC) identify,
Source device message identification, target MAC (Media Access Control) address mark, purpose equipment message identification and protocol massages type identification;Alternatively, agreement
Type of message mark can ask facility information, the facility information comprising facility information, modification equipment:Second equipment is such as changed
The address information of IP;
Step 203, the second equipment are calculated to the request message obtained after decryption using the algorithm of agreement, obtain treating school
Checking mark;And verify that mark content determines the first checking to obtaining when consistent determining that checking to be verified is identified with first
Identity verification success;The username and password of the second equipment that the second equipment interconnection is received is verified, and is verified successfully;
Step 204, the second equipment are responded to the first equipment unicast using the facility information that key is encrypted;Wherein, equipment letter
Breath response includes the facility information of the second equipment;First equipment receives the equipment letter that the use key of the second equipment return is encrypted
Breath response;Wherein, to be the second equipment to the facility information request successful decryption that receives and right using key for facility information response
First for obtaining verifies identity verification success and to return after the user name and the password authentification success;
Step 205, the first equipment are decrypted to the facility information response for receiving using key, obtain the second equipment
Facility information;
Alternatively, the facility information of the second equipment includes:The IP address of the second equipment;
Step 206, the first equipment are responded according to facility information, to the facility information that the second equipment unicast is encrypted using key
Modification message;Wherein, facility information modification message includes the new facility information of the second equipment;Facility information changes message, uses
The facility information of the second equipment is revised as new facility information in the second equipment is made;
Step 207, the second equipment are decrypted to the facility information modification message for receiving using key, in successful decryption
Second equipment new facility information is obtained afterwards;
Step 208, it is new that the facility information of itself is revised as the second equipment in facility information modification message by the second equipment
Facility information.
In the embodiment of the present invention, as facility information request, facility information response and facility information modification message are carried out
Encryption, effectively prevent facility information request, facility information response and facility information modification message in transmitting procedure and is usurped
Change;And as facility information modification message is encryption, even if being stolen, cannot also obtain real facility information modification report
Text, therefore cannot carry out the modification of malice to the facility information of equipment.Further, certification machine with the addition of in facility information request
The username and password of system and the access rights of the second equipment, i.e., the first checking mark and the second equipment, if facility information request
It is tampered or steals, then the second equipment can not obtains the first checking mark after calculating to request message by using the algorithm that arranges
Know, so as to the second equipment can be verified mark to determine whether facility information request is tampered by checking first;And second
Equipment is just responded to the first equipment unicast facility information, effectively after the username and password that checking is received is proved to be successful
Prevent lack of competence other equipment obtain the second equipment facility information;Thus, further increasing setting for modification equipment
The safety of standby information process.
Alternatively, also include that the second checking is identified in facility information response;Also include second in facility information modification message
Checking mark;Before the facility information response that second equipment is encrypted to the first equipment unicast using key, also include:Second equipment
Generate the second checking mark;Second equipment is encrypted to facility information and the second checking mark using key, is obtained using close
The facility information response of key encryption;Second equipment is encrypted to facility information response using key, obtains encrypting using key
Facility information response.The facility information of itself is revised as second equipment the equipment letter that the second equipment is new in apparatus modifications message
Before breath, also include:Second equipment is changed message using the facility information that key is encrypted to the use key for receiving and is solved
Close, the second checking mark is obtained after successful decryption;Second equipment determines the second checking mark and facility information for receiving
The second checking mark content in response is consistent.
Correspondingly, alternatively, also include that the second checking is identified in facility information response;Also wrap in facility information modification message
Include the second checking mark.First equipment is decrypted to the facility information response for receiving using key, obtains the second equipment
Facility information, including:First equipment is decrypted to the facility information response for receiving using key, obtains setting for the second equipment
Standby information and the second checking mark.First equipment is responded according to facility information, to the second equipment unicast using setting that key is encrypted
Standby information changes message, including:First equipment is responded according to facility information, and generating includes the facility information and second of the second equipment
The facility information modification message of checking mark;First equipment is encrypted to facility information modification message using key, and to the
Two equipment unicasts change message using the facility information that key is encrypted, so that the second equipment is sent in the first equipment to receiving
Second checking identity verification success when, the facility information of itself is revised as the new equipment of the second equipment in apparatus modifications message
Information.
Alternatively, the second checking mark can be the certification mark of the second equipment.Second equipment generates the second checking mark,
Second checking mark can indicate that the second equipment, and can indicate that the power of the username and password that the first equipment is used
Limit.When the second equipment is responded to the first equipment unicast facility information, the certification mark of the second equipment is enrolled facility information sound
Ying Zhong.If the first equipment is wanted to modify the facility information of the second equipment, the first equipment is set to the second equipment unicast
Standby information changes the certification mark for carrying the second equipment in message, only when the second equipment determine entrained in modification message
The second certification mark correctness after, just the facility information of itself can be modified.First can be effectively prevented
Equipment is arbitrarily changed to the facility information of the second equipment.
Give an example, the second equipment receives the facility information request including username and password, according to default including many
The list of individual different username and password, verifies to the username and password in facility information request, determines the equipment
When the username and password that information request includes has the authority of modification facility information, the second equipment generates the second checking mark
Know, and the second checking mark is sent to the first equipment.When the second equipment receives second testing including this for the first equipment unicast
During the facility information modification message of card mark, the second equipment is verified to the second checking mark, and the second equipment can be according to equipment
The second checking mark that information modification message includes, determines whether oneself executes the modification of facility information.Such as, the second equipment
Determine that the second checking mark indicates that the username and password that facility information request includes has the power for changing facility information
In limited time, determine that oneself executes the modification of facility information.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption;First equipment is decrypted to the facility information response for receiving using key, is obtained
Facility information and second to the second equipment verifies mark, including:First equipment is rung to the facility information for receiving using key
Should be decrypted, obtain the facility information of the second equipment, and the second checking mark using public key encryption;First equipment is used
The second checking mark using public key encryption is decrypted with the private key of public key match, obtains the second checking mark.
Correspondingly, alternatively, also include in facility information request:The public key that first equipment is generated;In facility information response
Also include:The second checking mark using public key encryption.Second equipment using key to facility information and second checking identify into
Row encryption, obtains responding using the facility information that key is encrypted, including:Second equipment is carried out to the second checking mark using public key
Encryption, obtains the second checking mark of public key encryption;Second equipment is tested to the second of facility information and public key encryption using key
Card mark is encrypted, and obtains responding using the facility information that key is encrypted.
It should be noted that the first equipment generates public key, public key one is carried when the first device broadcasts facility information is asked
Rise and send.Using the public key is generated to the second equipment second, second equipment verifies that mark is encrypted;First, it can be ensured that
During two equipment are responded to the first equipment unicast facility information, even if the second checking mark is stolen, can not obtain true
2 sections real of the second authenticator;Modification message can be avoided to be analyzed by packet capturing;Secondly, the second checking mark is carried out using public key
Encryption, the mode of different keys further increase the safety that facility information changes process.
Fig. 2 illustrates a kind of scheme that the embodiment of the present invention is provided, main by the first checking mark, key
And second the username and password of equipment communicated, in order to further improve safety, also provide in the embodiment of the present invention
The scheme communicated by public key and the second checking mark on the basis of above-mentioned communication plan, in order to clearer introduction should
Safety better method flow process, Fig. 3 illustrate another kind of safety modification facility information provided in an embodiment of the present invention
Method.In the embodiment, the first equipment can be equipped with PC (Personal Computer, the letter of IP research tools
Claim:PC).First equipment manages the second equipment in network, the mistake of safety modification facility information by the IP research tools of PC sides
Journey sees below content.As shown in figure 3, the method includes:
Step 301, the first equipment are encrypted to facility information request using the key that is arranged with the second equipment;Wherein,
Facility information request includes request message, the first checking mark, the username and password of the second equipment, public key;
It should be noted that request message be used for ask the second equipment facility information, first checking mark be using with
The algorithm of the second equipment agreement is obtained after calculating to request message, the public key that the first equipment is generated, the use of the second equipment
Name in an account book and password are the username and passwords of the authority with modification facility information;
Step 302, the facility information request of the first device broadcasts encryption;Second equipment receives the encryption of the first device broadcasts
Facility information request;
Step 303, the second equipment are decrypted to the facility information for receiving using key;Obtain after successful decryption
Request message, the first checking mark, the username and password of the second equipment, public key;Second equipment is using the algorithm that arranges to solution
The request message obtained after close is calculated, and obtains checking mark to be verified;
Step 304, determines whether checking mark to be verified is consistent with the first checking mark content;If content is consistent, hold
Row step 305;If content is inconsistent, execution step 306;
Step 305, the username and password of the second equipment that the second equipment interconnection is received are verified, if verifying successfully
When, then execution step 307;If verification failure, execution step 306;
The username and password of the second equipment that the second equipment interconnection is received carries out verification and refers to the second equipment according to certainly
Username and password is verified to the username and password in the facility information request of the first device broadcasts.If verifying into
Work(, then execution step 307.
It should be noted that for the safety of the facility information process that further improves modification equipment, to avoid to setting
Standby facility information carries out malicious modification, and facility information request includes the username and password of the second equipment;Second equipment
Username and password be used for make the second equipment using key to receive facility information request successful decryption, to obtain first
Returning equipment information response after verifying identity verification success and username and password being proved to be successful.
Step 306, abandons the facility information request of encryption;
Step 307, the second equipment use Key Encryption device information response;Wherein, facility information response includes second
The facility information of equipment, the second checking mark for using public key encryption;
Alternatively, the second checking mark that facility information response includes, can indicate that the equipment of the first device broadcasts
Authority of the username and password in information request to the second equipment:Such as access rights, modification authority;
Step 308, the second equipment are responded to the first equipment unicast using the facility information that key is encrypted;
Step 309, after the first equipment receives the facility information response of the encryption of the second equipment unicast;Docked using key
The facility information response for receiving is decrypted, and obtains the facility information of the second equipment, and verifies using the second of public key encryption
Mark;
To second using public key encryption, step 310, the first equipment verify that mark is carried out using with the private key of public key match
Decryption, obtains the second checking mark;
Step 311, the first equipment generate facility information modification message, and facility information modification message are carried out using key
Encryption;Wherein, facility information modification message includes the facility information of the second checking mark and the second equipment;
Step 312, the first equipment are responded according to facility information, to the facility information that the second equipment unicast is encrypted using key
Modification message;
It is understood that facility information modification message can be modification IP address of equipment message.Alternatively, facility information
Modification message includes the new IP address of the second equipment, and the first checking is identified, the username and password of the second equipment, public key, the
Two checking marks;
Step 313, after the second equipment receives the facility information modification message of encryption;Using key to the equipment that receives
Information modification message be decrypted, obtain after successful decryption the second checking mark and the new facility information of the second equipment,;
Step 314, the second checking mark that the second equipment interconnection is received are verified, if verifying successfully, execute step 316;
If verification failure, execution step 315;
Step 315, abandons the facility information modification message of encryption;
The facility information of itself is revised as new facility information by step 316, the second equipment.
In a kind of alternatively implementation, the corresponding list of the second equipment, the list include the second equipment multiple not
Same username and password, different username and passwords have different authorities, such as, the first user that the list includes
Name and the authority corresponding to first password are the authority of the facility information that the first equipment has the second equipment of modification;Wrap in the list
Authority corresponding to the second user name for including and the second password is the facility information that the first equipment can check the second equipment, but
The authority of the facility information of the second equipment can not be changed.In the embodiment of the present invention, the first equipment adds in facility information request and uses
Name in an account book and password, so as to make the second equipment determine the authority that the first equipment has to the second equipment.
For example, the username and password of the second equipment that the second equipment interconnection is received is verified in step 305, specifically
Can be that the second equipment judges whether the username and password of the second equipment for receiving has the power of checking to the second equipment
Limit, if having check authority, it is determined that verify successfully;If not checking authority, it is determined that verification failure.In step 316
In, before the facility information of itself is revised as new facility information by the second equipment, the second equipment judges that the first equipment is wide again
Whether the username and password in the facility information request that broadcasts is the power of the facility information that the first equipment has the second equipment of modification
The username and password of limit, if the username and password in the facility information request of the first device broadcasts does not have modification authority,
Facility information modification is not then carried out, if the username and password in the facility information request of the first device broadcasts is the first equipment
During the username and password of the authority of the facility information with the second equipment of modification, then the facility information of itself is repaiied by the second equipment
It is changed to new facility information.
Alternatively, according to the second checking mark for receiving, the second equipment determines that the facility information of the first device broadcasts please
When username and password in asking is the username and password of the authority of the facility information that the first equipment has the second equipment of modification,
The facility information of itself is revised as the new facility information of the second equipment in apparatus modifications message by the second equipment;
It can be seen from the above:In the embodiment of the present invention, due to facility information being asked, being set in the embodiment of the present invention
Standby information response and facility information modification message are encrypted, effectively prevent in transmitting procedure facility information request,
Facility information response and facility information modification message are tampered;And due to facility information modification message be encryption, even if quilt
Steal, cannot also obtain real facility information modification message, the modification of malice therefore cannot be carried out to the facility information of equipment.
Further, the username and password of the first checking mark and the second equipment is with the addition of in facility information request, if facility information
Request is tampered or steals, then the second equipment can not obtain the first checking after calculating to request message by using the algorithm that arranges
Mark, so as to the second equipment can be verified mark to determine whether facility information request is tampered by checking first;And the
Two equipment are in the authority for determining that the username and password for receiving is the facility information that the first equipment has the second equipment of modification
During username and password, the facility information of itself is revised as the new facility information of the second equipment in apparatus modifications message;And
And second equipment in the power for determining that the username and password that receives is the facility information that the first equipment has the second equipment of modification
During the username and password of limit, the facility information of itself is revised as the equipment letter that the second equipment is new in apparatus modifications message
Breath;Thus, further increasing the safety of the facility information process of modification equipment.
Fig. 4 illustrates a kind of structural representation of equipment provided in an embodiment of the present invention.
Same idea is based on, the embodiment of the present invention provides a kind of equipment, as shown in figure 4, the first equipment 400 includes processing list
Unit 401, transmitting element 402 and receiving unit 403.Wherein:
Processing unit, for using the key with the second equipment agreement to be encrypted facility information request;Using key
The facility information response for receiving is decrypted, the facility information of the second equipment is obtained;
Transmitting element, the facility information for broadcast enciphering are asked;Facility information request includes setting for request second
The request message of standby facility information, using with the second equipment agreement algorithm request message is calculated after obtain first
Checking mark, and the username and password of second equipment;To the facility information that the second equipment unicast is encrypted using key
Modification message;Wherein, facility information modification message includes the new facility information of the second equipment;Facility information changes message, uses
After making the second equipment that the facility information of second equipment to be revised as modification described in the new facility information of second equipment
Facility information;
Receiving unit, for receiving the facility information response that the use key that the second equipment is returned is encrypted;Wherein, equipment letter
Breath response is that facility information of second equipment using key to receiving asks successful decryption and the first checking mark to obtaining
It is proved to be successful and to return after the user name and the password authentification success;Facility information response includes that second sets
Standby facility information.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message
Checking mark.Alternatively, processing unit, specifically for:The facility information response for receiving is decrypted using key, is obtained
The facility information of the second equipment and the second checking mark;Responded according to facility information, generating includes the facility information of the second equipment
Facility information modification message with the second checking mark;Facility information modification message is encrypted using key.Alternatively, send out
Unit is sent, specifically for:Message is changed to the second equipment unicast using the facility information that key is encrypted, so that the second equipment is right
During the second checking identity verification success that the transmitting element for receiving sends, the facility information of itself is revised as described second and is set
Amended facility information described in standby new facility information.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption.Alternatively, processing unit, specifically for:The equipment for receiving is believed using key
Breath response is decrypted, and obtains the facility information of the second equipment, and the second checking mark using public key encryption;Using with public affairs
The private key of key coupling is decrypted to the second checking mark using public key encryption, obtains the second checking mark.
Fig. 5 illustrates the structural representation of another kind of equipment provided in an embodiment of the present invention.
Same idea is based on, the embodiment of the present invention provides another kind of equipment, as shown in figure 5, the second equipment 500 includes receiving
Unit 501, processing unit 502 and transmitting element 503.Wherein:
Receiving unit, for receiving the facility information that the key that the use of the first device broadcasts is arranged is encrypted with equipment
Request;Facility information request include request message for from the facility information to device request equipment, using and equipment agreement
Algorithm request message is calculated after the first checking mark for obtaining, and the username and password of second equipment;
Receive facility information that is that the first equipment responds unicast according to facility information and encrypting using key and change message;Wherein, equipment
Information modification message includes the new facility information of second equipment;
Processing unit, for being decrypted to the facility information for receiving using key, is asked after successful decryption
Seek the username and password of message, the first checking mark and second equipment;Algorithm using agreement is to obtaining after decryption
Request message is calculated, and obtains checking mark to be verified;And determining checking mark to be verified with the first checking mark content
The first checking identity verification success to obtaining is determined when consistent;The facility information modification message for receiving is carried out using key
Decryption, obtains the amended facility information of equipment after successful decryption;The facility information of itself is revised as described second
Amended facility information described in the new facility information of equipment;
Transmitting element, for being responded to the first equipment unicast using the facility information that key is encrypted;Wherein, facility information rings
The facility information of equipment should be included.
Alternatively, also include that the second checking is identified in facility information response;Also include that second tests in IP address modification message
Card mark.Alternatively, processing unit, is additionally operable to:Generate the second checking mark;Using key to facility information and the second checking mark
Knowledge is encrypted, and obtains responding using the facility information that key is encrypted;Facility information response is encrypted using key, is obtained
Responded using the facility information that key is encrypted;Message is changed using the facility information that key encrypts the use key for receiving to enter
Row decryption, obtains the second checking mark after successful decryption;Determine that the second checking mark for receiving is responded with facility information
In second checking mark content consistent.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption.Processing unit, is additionally operable to:The second checking mark is encrypted using public key, is obtained
The second checking mark to public key encryption;The second checking mark of facility information and public key encryption is encrypted using key,
Obtain responding using the facility information that key is encrypted.
Fig. 6 illustrates a kind of structural representation of the system of safety modification facility information provided in an embodiment of the present invention
Figure.
Same idea is based on, the embodiment of the present invention provides a kind of system of safety modification facility information, as shown in fig. 6, peace
The system 600 of full modification facility information includes the first equipment 601 and multiple second equipment 602.Wherein:
First equipment, for use with the second equipment agreement key to facility information request be encrypted, and broadcast plus
Close facility information request;Receive the facility information response that the use key of the second equipment return is encrypted;Using key to equipment
Information response is decrypted, and obtains the facility information of the second equipment;Responded according to facility information, to the second equipment unicast using close
The facility information modification message of key encryption;Wherein, facility information modification message includes the amended equipment letter of the second equipment
Breath;Wherein, facility information request includes the request message of the facility information for the second equipment of request, uses and the second equipment
The first checking mark that the algorithm of agreement is obtained after calculating to request message, and the username and password of the second equipment;
Second equipment, for receiving the facility information request of the first device broadcasts;Facility information is solved using key
Close, the username and password of request message, the first checking mark and the second equipment is obtained after successful decryption;Using agreement
Algorithm is calculated to the request message obtained after decryption, obtains checking mark to be verified;And determining checking mark to be verified
The first checking identity verification success to obtaining is determined when consistent with the first checking mark content;To the second equipment for receiving
Username and password is verified, and is verified successfully;Responded to the first equipment unicast using the facility information that key is encrypted;Receive
First equipment unicast and the facility information encrypted using key changes message;Facility information modification message is entered using key
Row decryption, obtains the new facility information of the second equipment after successful decryption;The facility information of the second equipment is revised as described
The new facility information of second equipment described in facility information modification message;Wherein, facility information response includes the second equipment
Facility information.
Alternatively, also include in facility information response:Second checking mark;Also include second in facility information modification message
Checking mark;Alternatively, the first equipment, is also used for facility information response of the key to receiving and is decrypted, obtain the
The facility information of two equipment and the second checking mark;Responded according to facility information, generate include the facility information of the second equipment with
The facility information modification message of the second checking mark;Facility information modification message is encrypted using key, and is set to second
Standby unicast changes message using the facility information that key is encrypted;Second equipment, is also used for key to facility information and second
Checking mark is encrypted, and obtains responding using the facility information that key is encrypted;Using key to facility information response carry out plus
Close, obtain responding using the facility information that key is encrypted;The facility information that the use key for receiving is encrypted is repaiied using key
Change message to be decrypted, the second checking mark is obtained after successful decryption;Determine the second checking mark and equipment for receiving
The second checking mark content in information response is consistent.
Alternatively, also include in facility information request:The public key that first equipment is generated;Also include in facility information response:
The second checking mark using public key encryption;Alternatively, the first equipment, is also used for facility information of the key to receiving and rings
Should be decrypted, obtain the facility information of the second equipment, and the second checking mark using public key encryption;Using with public key
The private key that matches somebody with somebody is decrypted to the second checking mark using public key encryption, obtains the second checking mark;Second equipment, is additionally operable to
The second checking mark is encrypted using public key, obtains the second checking mark of public key encryption;Using key to facility information
It is encrypted with the second checking mark of public key encryption, obtains responding using the facility information that key is encrypted.
It can be seen from the above:In the embodiment of the present invention, in the embodiment of the present invention, due to facility information request, set
Standby information response and facility information modification message are encrypted, effectively prevent in transmitting procedure facility information request,
Facility information response and facility information modification message are tampered;And due to facility information modification message be encryption, even if quilt
Steal, cannot also obtain real facility information modification message, the modification of malice therefore cannot be carried out to the facility information of equipment.
Further, the access rights of authentication mechanism and the second equipment are with the addition of in facility information request, i.e., the first checking mark and the
The username and password of two equipment, if facility information request is tampered or steals, algorithm of second equipment by using agreement
The first checking mark can not be obtained to request message after calculating, so as to the second equipment can be by checking the first checking mark come really
Whether locking equipment information request is tampered;And second equipment after the username and password that receives of checking is proved to be successful,
Just respond to the first equipment unicast facility information, the other equipment for being effectively prevented lack of competence obtains the equipment letter of the second equipment
Breath;Thus, further increasing the safety of the facility information process of modification equipment.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method or computer program.
Therefore, the present invention can adopt complete hardware embodiment, complete software embodiment or with reference to software and hardware in terms of embodiment
Form.And, the present invention can be adopted to can use in one or more computers for wherein including computer usable program code and be deposited
The shape of the upper computer program that implements of storage media (including but not limited to disk memory, CD-ROM, optical memory etc.)
Formula.
The present invention is the flow process with reference to method according to embodiments of the present invention, equipment (system) and computer program
Figure and/or block diagram are describing.It should be understood that can be by computer program instructions flowchart and/or each stream in block diagram
Journey and/or the combination of square frame and flow chart and/or the flow process in block diagram and/or square frame.These computer programs can be provided
Instruct the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices
The device of the function of specifying in present one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory is produced to be included referring to
Make the manufacture of device, the command device realize in one flow process of flow chart or one square frame of multiple flow processs and/or block diagram or
The function of specifying in multiple square frames.
These computer program instructions can be also loaded in computer or other programmable data processing devices so that in meter
Series of operation steps is executed on calculation machine or other programmable devices to produce computer implemented process, so as in computer or
The instruction executed on other programmable devices is provided for realization in one flow process of flow chart or multiple flow processs and/or block diagram one
The step of function of specifying in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described
Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to include excellent
Select embodiment and fall into the had altered of the scope of the invention and change.
Obviously, those skilled in the art can carry out the essence of various changes and modification without deviating from the present invention to the present invention
God and scope.So, if these modifications of the present invention and modification belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising these changes and modification.
Claims (10)
1. a kind of method that safety changes facility information, it is characterised in that include:
First equipment is encrypted to facility information request using the key that is arranged with the second equipment, and the equipment letter of broadcast enciphering
Breath request;The facility information request includes the request message of the facility information for the second equipment of request, use and second
The first checking mark that the algorithm of equipment agreement is obtained after calculating to the request message, and the use of second equipment
Name in an account book and password;
First equipment receives the facility information response that use that second equipment returns key is encrypted;Wherein, institute
State facility information response be second equipment using the key to the facility information request successful decryption that receives and
Identity verification success is verified to obtain described first and to return after the user name and the password authentification success;
The facility information response includes the facility information of second equipment;
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set
Standby facility information;
First equipment is responded according to the facility information, to the equipment that second equipment unicast is encrypted using the key
Information changes message;Wherein, the facility information modification message includes the new facility information of second equipment;The equipment
Information changes message, and for making second equipment be revised as the facility information of second equipment, the facility information is repaiied
Change the new facility information of the second equipment described in message.
2. the method for claim 1, it is characterised in that also include in the facility information response:Second checking mark;
Also include the second checking mark in the facility information modification message;
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set
Standby facility information, including:
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set
Standby facility information and the second checking mark;
First equipment is responded according to the facility information, to the equipment that second equipment unicast is encrypted using the key
Information changes message, including:
First equipment is responded according to facility information, and generating includes the facility information of second equipment and second checking
The facility information modification message of mark;
First equipment is encrypted to facility information modification message using the key, and to second tables of equipment
Broadcast and message is changed using the facility information that the key is encrypted, so that second equipment is in first equipment to receiving
During the second checking identity verification success for sending, the facility information of itself is revised as the amended facility information.
3. method as claimed in claim 2, it is characterised in that also include in the facility information request:First equipment
The public key of generation;Also include in the facility information response:The second checking mark using the public key encryption;
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set
Standby facility information and the second checking mark, including:
First equipment is decrypted to the facility information response for receiving using the key, is obtained described second and is set
Standby facility information, and the second checking mark using the public key encryption;
First equipment verifies mark using with the private key of the public key match to described second using the public key encryption
It is decrypted, obtains the second checking mark.
4. the method as described in any one of claims 1 to 3, it is characterised in that the facility information includes second equipment
IP address.
5. a kind of method that safety changes facility information, it is characterised in that include:
The facility information that the key that the use of the second equipment the first device broadcasts of reception is arranged with second equipment is encrypted
Request;The facility information request is included for the request to the facility information of the second equipment described in second device request
The first checking mark that the algorithm that message, use are arranged with the second equipment is obtained after calculating to the request message, and
The username and password of second equipment;
Second equipment is decrypted to the facility information for receiving using the key, is obtained after successful decryption
The username and password of the request message, the first checking mark and second equipment;
Second equipment is calculated to the request message obtained after decryption using the algorithm of the agreement, obtains treating school
Checking mark;And determine to obtaining when the checking mark to be verified is determined and the described first checking mark content is consistent
The first checking identity verification success;
The username and password of second equipment that second equipment interconnection is received is verified, when verifying successfully, institute
Stating the second equipment, the facility information response that encrypts using the key is sent to first equipment;Wherein, the facility information
Response includes the facility information of second equipment;
Second equipment is received that first equipment responds unicast according to the facility information and is encrypted using the key
Facility information modification message;Wherein, the facility information modification message includes the new facility information of second equipment;
Second equipment is decrypted to the facility information modification message for receiving using the key, in successful decryption
The amended facility information of second equipment is obtained afterwards;
It is new that the facility information of itself is revised as the second equipment described in the facility information modification message by second equipment
Facility information.
6. method as claimed in claim 5, it is characterised in that also include that the second checking is identified in the facility information response;
Also include the second checking mark in the facility information modification message;
Before the facility information response that second equipment is encrypted to first equipment unicast using the key, also include:
Second equipment is encrypted to the facility information and the second checking mark using the key, is obtained using described
The facility information response of key encryption;
Second equipment is encrypted to facility information response using the key, obtains encrypting using the key
Facility information is responded;
Before the facility information of itself is revised as the amended facility information by second equipment, also include:
Second equipment is changed message using the facility information that the key is encrypted to the use for the receiving key and is carried out
Decryption, obtains the second checking mark after successful decryption;
Second equipment determines that the second checking mark for receiving verifies mark with second in facility information response
Know content consistent.
7. method as claimed in claim 6, it is characterised in that also include in the facility information request:First equipment
The public key of generation;Also include in the facility information response:The second checking mark using the public key encryption;
Second equipment is encrypted to the facility information and the second checking mark using the key, is used
The facility information response of the key encryption, including:
Second equipment is encrypted to the described second checking mark using the public key, obtains the second checking of public key encryption
Mark;
Second equipment the second checking mark of the facility information and the public key encryption is carried out using the key plus
Close, obtain responding using the facility information that the key is encrypted.
8. the system that a kind of safety changes facility information, it is characterised in that including the first equipment and multiple second equipment;
First equipment, for use with the second equipment agreement key to facility information request be encrypted, and broadcast plus
Close facility information request;Receive the facility information response that use that second equipment returns key is encrypted;Using institute
State key to be decrypted facility information response, obtain the facility information of second equipment;According to the facility information
Response, changes message to second equipment unicast using the facility information that the key is encrypted;Wherein, the facility information is repaiied
Changing message includes the amended facility information of second equipment;Wherein, facility information request is included for please
Seek the request message of the facility information of second equipment, the request message carried out using the algorithm that arranges with the second equipment
The the first checking mark obtained after calculating, and the username and password of second equipment;
Second equipment, for receiving the facility information request of the first device broadcasts;The equipment is believed using the key
Breath is decrypted, and obtains the use of the request message, the first checking mark and second equipment after successful decryption
Name in an account book and password;The request message obtained after decryption is calculated using the algorithm of the agreement, obtain to be verified testing
Card mark;And determine to described in obtaining when the checking mark to be verified is determined and the described first checking mark content is consistent
First checking identity verification success;The username and password of second equipment for receiving is verified, and is verified successfully;
Responded to first equipment unicast using the facility information that the key is encrypted;Wherein, the facility information response includes
The facility information of second equipment;
Second equipment, is additionally operable to facility information that is receiving the first equipment unicast and being encrypted using the key and is repaiied
Change message;Facility information modification message is decrypted using the key, described second is obtained after successful decryption
The new facility information of equipment;The facility information of second equipment is revised as second described in the facility information modification message
The new facility information of equipment.
9. system as claimed in claim 8, it is characterised in that also include in the facility information response:Second checking mark;
Also include the second checking mark in the facility information modification message;
First equipment, is also used for the facility information response of the key to receiving and is decrypted, obtain institute
State the facility information of the second equipment and the second checking mark;Responded according to facility information, generating includes second equipment
Facility information and the second checking mark facility information modification message;Using the key to the facility information
Modification message is encrypted, and changes message to second equipment unicast using the facility information that the key is encrypted;
Second equipment, is also used for the key and the facility information and the second checking mark is encrypted,
Obtain responding using the facility information that the key is encrypted;Facility information response is encrypted using the key, is obtained
To the facility information response that is encrypted using the key;The equipment that the use for the receiving key is encrypted using the key
Information modification message is decrypted, and obtains the second checking mark after successful decryption;Determine described second for receiving
Checking mark is consistent with the second checking mark content in facility information response.
10. system as claimed in claim 9, it is characterised in that also include in the facility information request:First equipment
The public key of generation;Also include in the facility information response:The second checking mark using the public key encryption;
First equipment, is also used for the facility information response of the key to receiving and is decrypted, obtain institute
State the facility information of the second equipment, and the second checking mark using the public key encryption;Using with the public key
The private key that matches somebody with somebody is decrypted to the second checking mark using the public key encryption, obtains the second checking mark;
Second equipment, is also used for the public key and the described second checking mark is encrypted, obtain public key encryption
Second checking mark;The second checking mark of the facility information and the public key encryption is encrypted using the key,
Obtain responding using the facility information that the key is encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939682.1A CN106506476B (en) | 2016-10-24 | 2016-10-24 | The method and system of safety modification facility information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939682.1A CN106506476B (en) | 2016-10-24 | 2016-10-24 | The method and system of safety modification facility information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106506476A true CN106506476A (en) | 2017-03-15 |
CN106506476B CN106506476B (en) | 2019-07-23 |
Family
ID=58319121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610939682.1A Active CN106506476B (en) | 2016-10-24 | 2016-10-24 | The method and system of safety modification facility information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106506476B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113099446A (en) * | 2021-04-02 | 2021-07-09 | 广东海聊科技有限公司 | Safety verification method and system for Beidou short message terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010083629A1 (en) * | 2009-01-24 | 2010-07-29 | 上海贝尔股份有限公司 | Method and apparatus for realizing remote control of devices through network address configuration server |
CN105471974A (en) * | 2015-11-18 | 2016-04-06 | 北京京东世纪贸易有限公司 | Intelligent equipment capable of realizing remote control, terminal equipment and method |
CN105516948A (en) * | 2014-09-26 | 2016-04-20 | 华为技术有限公司 | Device control method and device control unit |
-
2016
- 2016-10-24 CN CN201610939682.1A patent/CN106506476B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010083629A1 (en) * | 2009-01-24 | 2010-07-29 | 上海贝尔股份有限公司 | Method and apparatus for realizing remote control of devices through network address configuration server |
CN105516948A (en) * | 2014-09-26 | 2016-04-20 | 华为技术有限公司 | Device control method and device control unit |
CN105471974A (en) * | 2015-11-18 | 2016-04-06 | 北京京东世纪贸易有限公司 | Intelligent equipment capable of realizing remote control, terminal equipment and method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113099446A (en) * | 2021-04-02 | 2021-07-09 | 广东海聊科技有限公司 | Safety verification method and system for Beidou short message terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106506476B (en) | 2019-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110086608B (en) | User authentication method, device, computer equipment and computer readable storage medium | |
EP2314090B1 (en) | Portable device association | |
CN103685311B (en) | A kind of login validation method and equipment | |
US9009463B2 (en) | Secure delivery of trust credentials | |
EP2316097B1 (en) | Protocol for device to station association | |
CN105554098B (en) | A kind of equipment configuration method, server and system | |
US11539690B2 (en) | Authentication system, authentication method, and application providing method | |
US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
CN112425136B (en) | Internet of things security with multiparty computing (MPC) | |
TW201706900A (en) | Method and device for authentication using dynamic passwords | |
CN106899410A (en) | A kind of method and device of equipment identities certification | |
CN107612889B (en) | Method for preventing user information leakage | |
CN107979514A (en) | A kind of method and apparatus bound to equipment | |
CN108880822A (en) | A kind of identity identifying method, device, system and a kind of intelligent wireless device | |
CN105227537A (en) | Method for authenticating user identity, terminal and service end | |
WO2015003503A1 (en) | Network device, terminal device and information security improving method | |
CN110933484A (en) | Management method and device of wireless screen projection equipment | |
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
TWI526871B (en) | Server, user device, and user device and server interaction method | |
CN109962777A (en) | The key in block catenary system is permitted to generate, obtain the method and apparatus of key | |
CN107948186A (en) | A kind of safety certifying method and device | |
CN111901303A (en) | Device authentication method and apparatus, storage medium, and electronic apparatus | |
CN106941405A (en) | A kind of method and apparatus of terminal authentication in a wireless local area network | |
CN105656854B (en) | A kind of method, equipment and system for verifying Wireless LAN user sources | |
CN113965425B (en) | Access method, device and equipment of Internet of things equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |