CN107920053A - Managing device and method based on Internet of Things - Google Patents

Managing device and method based on Internet of Things Download PDF

Info

Publication number
CN107920053A
CN107920053A CN201710671843.8A CN201710671843A CN107920053A CN 107920053 A CN107920053 A CN 107920053A CN 201710671843 A CN201710671843 A CN 201710671843A CN 107920053 A CN107920053 A CN 107920053A
Authority
CN
China
Prior art keywords
intelligent hardware
data
verification
things
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710671843.8A
Other languages
Chinese (zh)
Other versions
CN107920053B (en
Inventor
胡金钱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710671843.8A priority Critical patent/CN107920053B/en
Publication of CN107920053A publication Critical patent/CN107920053A/en
Application granted granted Critical
Publication of CN107920053B publication Critical patent/CN107920053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The present invention gives a kind of management method based on Internet of Things, the use mandate of Intelligent hardware is completed by following verification:Data verification is carried out between user front end and Intelligent hardware;Data verification is carried out between user and Intelligent hardware;Interrelated verification is carried out between the secret key system of at least two quantity in Intelligent hardware;Interrelated verification is carried out between physics chapter impression block and electronics chapter impression block in Intelligent hardware;Carry out that use is mutually authenticated between Intelligent hardware.

Description

Managing device and method based on Internet of Things
Technical field
It is especially a kind of to be based on Internet of Things the present invention relates to a kind of management of enterprise operation device and method based on Internet of Things Managing device and method.
Background technology
U-shield is present more common secret key mechanism, is widely used in organ of bank, the tax etc., though U-shield So to operation carried out certain safety guarantee, once but the user of its U-shield be spoofed, then U-shield can not equally play really Protect the effect of safe operation.
And during the use of Zhang Yin, it is same easily to produce security breaches problem caused by after user is spoofed, although Occurs more intelligent seal equipment now, but it can only carry out relevant management and control to the place that uses, time, people substantially Record, does not carry out defence used in connection with actively.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of electronic invoice safely and efficiently based on intelligent seal to issue Method and platform.
In order to solve the above technical problems, the present invention provides a kind of managing device based on Internet of Things, including tool between each other The Intelligent hardware and cloud server of standby signal transfer function;The Intelligent hardware integrated authentication system, chapter print system and secret key System.
As the improvement to the managing device of the present invention based on Internet of Things, the secret key system includes but not limited to The U-shield of at least two quantity.
A kind of management method based on Internet of Things of the managing device based on Internet of Things, the use mandate of Intelligent hardware pass through Following verification is completed:Data verification is carried out between user front end and Intelligent hardware;Carried out between user and Intelligent hardware Data verification;Interrelated verification is carried out between the secret key system of at least two quantity in Intelligent hardware;Intelligent hardware Interrelated verification is carried out between interior physics chapter impression block and electronics chapter impression block;Between Intelligent hardware be mutually authenticated making With.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the user front end It is as follows that data verification implementation steps are carried out between Intelligent hardware:User front end initiate verification, cloud server establish with it is right Answer the communication port of Intelligent hardware;Intelligent hardware completes data verification, and passes through cloud server feedback result to front end.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, user is hard to intelligence Part carries out the data verification inputted based on secret key I, and completes Intelligent hardware unlock;It is described that Intelligent hardware progress secret key I is inputted Data include numeral, figure, word, action, biometric feature.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, described at least two with It is as follows that interrelated verification step is carried out between the secret key system of upper quantity:Intelligent hardware reads any secret key system data, and The data are uploaded into cloud server, pass through other key information data progress stored up with cloud server databases Match somebody with somebody.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the physics Zhang Yinmo Verification step is as follows between block and electronics chapter impression block:Operational data in Intelligent hardware reading database, and by necessarily calculating Method completes picture mosaic;Intelligent hardware carries out camera shooting and sampling to physical module;Matched by the sample of camera shooting and sampling with picture mosaic.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the Intelligent hardware it Between preferred value is high to be completed to the low authority checking of preferred value by being carried out between Intelligent hardware the step of carrying out that use is mutually authenticated, its Step is as follows:Preferred value height is carried out between Intelligent hardware and arrives the low authority checking of preferred value, the low Intelligent hardware of priority passes through cloud Server is held to be initiated to the high Intelligent hardware of priority using request;The high Intelligent hardware of priority is fed back by cloud server Authorization result, and data record is carried out by cloud server.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the Intelligent hardware it Between the step of carrying out that use is mutually authenticated it is as follows:The use of chapter print system is completed by Intelligent hardware, and is recorded using data;By it The chapter print system of his Intelligent hardware complete it is corresponding using data affix one's seal request when, taken by other Intelligent hardwares by high in the clouds Business device is initiated to use and asked to record using the Intelligent hardware of data;Record is taken using the Intelligent hardware of data by high in the clouds Device be engaged in the Intelligent hardware feedback Authorization result for initiating to ask, and data record is carried out by cloud server.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the front end initiates to test When card, which integrates the unique identifier of front end, user corresponds to secret key I, Intelligent hardware corresponds to secret key II;Institute Secret key II is stated as numeral, figure or word.
Existing U-shield product is carried out Internet of Things networking integration first, is passed to by the present invention during specific implementation Networking is licensed, and avoids U-shield from being used alone and cause the generation of economic loss;Secondly, the present invention is by the daily need of enterprise Intelligence seal to be used etc. equipment carries out priority classification, and e.g., setting official seal is first priority, then, other Zhang Yin's Using the mandate being required to by official seal, and record so that Zhang Yin's has mark to look into using track, and prevents individually making for Zhang Yin With and cause the skimble-scamble situation of information to occur.Finally, the present invention detects its chapter automatically by a series of Information Authentication flow Mould, avoids authorizing the situation that Zhang Yin is not inconsistent in actual mechanical process and occurs.
Brief description of the drawings
The embodiment of the present invention is described in further detail below in conjunction with the accompanying drawings.
Fig. 1 is the main flow schematic diagram of the present invention.
Embodiment
Embodiment 1, Fig. 1 provide a kind of managing device and method based on Internet of Things.
The present invention is improved based on existing intelligent seal and U-shield product using the defects of process, it is mainly logical Cross and are carried out by multiple-authentication, reaches the function of Initiative Defense, its specific composition for intelligent apparatus, such as correlation module in intelligence seal It is as follows:
Including possessing the Intelligent hardware of signal transfer function (such as intelligent seal) and cloud server between each other;The intelligence Hardware integration verification system, chapter print system and secret key system, the secret key system include U-shield, and in the present invention, by some U-shields Product is integrated in same intelligence system, when use, by judging the relevant information of any U-shield product, then Function is mutually authenticated with reference to the physics Zhang Mo in the intellectual product and electronics Zhang Mo, it can be ensured that the Zhang Yinwei changes without hardware Intelligent hardware, and pass through verification.
The step of it is implemented is as follows:
1st, data verification is carried out between user front end and Intelligent hardware;
User by front end initiates verification, and (unique identification codes of verification data including the front end, Intelligent hardware make With the origin of an incident, people's information used in connection with, by numeral or figure constitution with the one-to-one secret key of Intelligent hardware), high in the clouds clothes Business device is established and the communication port of corresponding Intelligent hardware (carrying out data-pushing by the secret key);Intelligent hardware completes data verification (verification refer to the front end unique identification code whether built in Intelligent hardware databases storage, user's information be The no databases storage built in Intelligent hardware), and (after data verification, tied by cloud server feedback result to front end Fruit matches, then feedback license, as a result mismatches, then feedback validation does not pass through).
2nd, data verification is carried out between user and Intelligent hardware;
Secret key I is carried out to Intelligent hardware, and (secret key I is word, numeral, figure, the other information of biological sound etc., passes through user Directly Intelligent hardware is inputted) input, and complete Intelligent hardware unlock (once the data built in secret key I and Intelligent hardware The data of storehouse memory storage are mutually matched, you can by the way that the data of the secret key I can be deposited as the database built in Intelligent hardware Storage, can also be sent in Intelligent hardware, and stored in database when step 1 by front end);It is described to intelligence The secret key I that energy hardware is carried out during secret key I inputs includes numeral, figure, word, action, biometric feature.
3rd, mutually closed between some secret keys in Intelligent hardware (in the present embodiment, which is U-shield) system Connection verification;
Intelligent hardware reads some secret key systems, and (U-shield includes U shield for bank system, taxation authority's U-shield system, social security mechanism U Shield system) data, and some secret key system datas are uploaded into cloud server, by being stored up with cloud server databases Information matched (carry out U shield for bank system use when, by the Intelligent hardware carry out the U shield for bank system with Taxation authority's U-shield system, the data of social security mechanism U-shield system are matched, and have the original of unique U-shield system by unique unit Then, once the data of other U-shield systems mismatch, then illustrate that the U-shield system has the risk replaced by hardware), complete of data With when, feedback validation passes through.
4th, interrelated verification is carried out between the physics chapter impression block in Intelligent hardware and electronics chapter impression block;
Operational data in Intelligent hardware reading database, and picture mosaic is completed by certain algorithm;Intelligent hardware is to physics Module carries out camera shooting and sampling;Matched with picture mosaic by the sample of camera shooting and sampling (since Intelligent hardware preserves in client's hand, Therefore, it is impossible to prevent client from transforming Intelligent hardware, others Zhang Mo is replaced;And carry out database data replacement when Wait, then data safety can be confirmed by means such as encryptions, once distorted to data, phase can be passed through Close algorithm to destroy data, it can not be completed the replacement of data Zhang Mo, further, pass through data Zhang Mo and entity chapter The matching of mould, can prevent voluntarily to carry out the risk of entity chapter mould replacement).
5th, carry out that use is mutually authenticated between Intelligent hardware, mainly having two ways, (data of two kinds of verifications pass through step 1 Edit and send at the use origin of an incident of total Intelligent hardware):
The first carries out preferred value height between Intelligent hardware and arrives the low authority checking of preferred value, its step is as follows:
The low Intelligent hardware of priority is initiated using request by cloud server to the high Intelligent hardware of priority;Preferentially Weigh high Intelligent hardware and Authorization result is fed back by cloud server, and data record is carried out by cloud server.
The first is as follows to the mode using data correlation, its step:
Contract chapter produce business, when payment step is carried out, legal person's finance seal by being associated with contract chapter, this When, legal person's finance seal is associated with the payment information that seal for contractual uses completes the use of time, to the contract of the seal for contractual uses into , it is necessary to using finance seal when row disbursement and sattlement, finance seal at this time associates seal for contractual uses first, and verifies corresponding number According to, once data are not met, then refusal information is fed back by intelligent seal, once data fit, then fed back by intelligent seal and used Information, and flow of affixing one's seal is carried out by user.This mode defines the use rule between Zhang Yin to a certain extent, makes it Operation is with the trackability more strengthened.When step described above uses, by Intelligent hardware record it is all affix one's seal make Use information.
Above-described front end refers to a smart machine for cutting with information transfer capability, and when verification is initiated in front end, this is tested Demonstrate,prove the unique identifier of information integration front end, user corresponds to secret key, Intelligent hardware corresponds to secret key;The Intelligent hardware corresponds to secret Key is numeral, figure or word.
Finally, it should also be noted that it is listed above be only the present invention a specific embodiment.Obviously, it is of the invention Above example is not limited to, there can also be many deformations.Those of ordinary skill in the art can be straight from present disclosure Export or all deformations associated are connect, are considered as protection scope of the present invention.

Claims (10)

1. the managing device based on Internet of Things, it is characterised in that including possessing the Intelligent hardware of signal transfer function between each other And cloud server;
The Intelligent hardware integrated authentication system, chapter print system and secret key system.
2. the managing device according to claim 1 based on Internet of Things, it is characterised in that the secret key system is included but not It is limited to the U-shield of at least two quantity.
3. the management method according to claim 1 based on Internet of Things, it is characterised in that the use mandate of Intelligent hardware is led to Following verification is crossed to complete:
Data verification is carried out between user front end and Intelligent hardware;
Data verification is carried out between user and Intelligent hardware;
Interrelated verification is carried out between the secret key system of at least two quantity in Intelligent hardware;
Interrelated verification is carried out between physics chapter impression block and electronics chapter impression block in Intelligent hardware;
Carry out that use is mutually authenticated between Intelligent hardware.
4. the management method according to claim 3 based on Internet of Things, it is characterised in that the user front end and intelligence It is as follows that data verification implementation steps are carried out between hardware:
Verification is initiated in user front end, and cloud server establishes the communication port with corresponding Intelligent hardware;
Intelligent hardware completes data verification, and passes through cloud server feedback result to front end.
5. the management method according to claim 3 based on Internet of Things, it is characterised in that user carries out Intelligent hardware The data verification inputted based on secret key I, and complete Intelligent hardware unlock;
The data that the input of secret key I is carried out to Intelligent hardware include numeral, figure, word, action, biometric feature.
6. the management method according to claim 3 based on Internet of Things, it is characterised in that at least two quantity Secret key system between to carry out interrelated verification step as follows:
Intelligent hardware reads any secret key system data, and the data are uploaded to cloud server, by with cloud server Other key information data of databases storage are matched.
7. the management method according to claim 3 based on Internet of Things, it is characterised in that the physics chapter impression block and electricity Verification step is as follows between sub- chapter impression block:
Operational data in Intelligent hardware reading database, and picture mosaic is completed by certain algorithm;
Intelligent hardware carries out camera shooting and sampling to physical module;
Matched by the sample of camera shooting and sampling with picture mosaic.
8. the management method according to claim 3 based on Internet of Things, it is characterised in that carried out between the Intelligent hardware The step of use is mutually authenticated is high to the low authority checking completion of preferred value by carrying out preferred value between Intelligent hardware, its step is such as Under:
The low Intelligent hardware of priority is initiated using request by cloud server to the high Intelligent hardware of priority;
The high Intelligent hardware of priority feeds back Authorization result by cloud server, and carries out data note by cloud server Record.
9. the management method according to claim 3 based on Internet of Things, it is characterised in that carried out between the Intelligent hardware The step of use is mutually authenticated is as follows:
The use of chapter print system is completed by Intelligent hardware, and is recorded using data;
By the chapter print system of other Intelligent hardwares complete it is corresponding using data affix one's seal request when, led to by other Intelligent hardwares Cloud server is crossed to initiate using request using the Intelligent hardware of data to record;
Record feeds back Authorization result by cloud server using the Intelligent hardware of data to the Intelligent hardware for initiating request, and Data record is carried out by cloud server.
10. the management method according to claim 3 based on Internet of Things, it is characterised in that initiate verification in the front end When, which integrates the unique identifier of front end, user corresponds to secret key I, Intelligent hardware corresponds to secret key II;
The secret key II is numeral, figure or word.
CN201710671843.8A 2017-08-08 2017-08-08 Management device and method based on Internet of things Active CN107920053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710671843.8A CN107920053B (en) 2017-08-08 2017-08-08 Management device and method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710671843.8A CN107920053B (en) 2017-08-08 2017-08-08 Management device and method based on Internet of things

Publications (2)

Publication Number Publication Date
CN107920053A true CN107920053A (en) 2018-04-17
CN107920053B CN107920053B (en) 2020-11-24

Family

ID=61898581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710671843.8A Active CN107920053B (en) 2017-08-08 2017-08-08 Management device and method based on Internet of things

Country Status (1)

Country Link
CN (1) CN107920053B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768658A (en) * 2018-05-15 2018-11-06 胡金钱 Intelligent and safe chip
CN110570609A (en) * 2019-07-22 2019-12-13 北京票通信息技术有限公司 intelligent terminal equipment based on tax bureau invoice issuing U shield invoice issuing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980121A (en) * 2005-11-29 2007-06-13 北京书生国际信息技术有限公司 Electronic signing mobile terminal, system and method
KR101446504B1 (en) * 2014-07-30 2014-11-04 주식회사위즈베라 Digital Signature Method Executed By Client Program Which Is Operated Independently From Web Browser
CN104268742A (en) * 2014-10-20 2015-01-07 陕西万宇电子信息科技有限公司 Official seal fake detection method and device based on network digital certificate and network lookup
CN205311102U (en) * 2015-12-23 2016-06-15 童迎伟 Cloud intelligence seal based on thing networking
CN106921489A (en) * 2015-12-25 2017-07-04 中国移动通信集团公司 A kind of data ciphering method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980121A (en) * 2005-11-29 2007-06-13 北京书生国际信息技术有限公司 Electronic signing mobile terminal, system and method
KR101446504B1 (en) * 2014-07-30 2014-11-04 주식회사위즈베라 Digital Signature Method Executed By Client Program Which Is Operated Independently From Web Browser
CN104268742A (en) * 2014-10-20 2015-01-07 陕西万宇电子信息科技有限公司 Official seal fake detection method and device based on network digital certificate and network lookup
CN205311102U (en) * 2015-12-23 2016-06-15 童迎伟 Cloud intelligence seal based on thing networking
CN106921489A (en) * 2015-12-25 2017-07-04 中国移动通信集团公司 A kind of data ciphering method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768658A (en) * 2018-05-15 2018-11-06 胡金钱 Intelligent and safe chip
CN110570609A (en) * 2019-07-22 2019-12-13 北京票通信息技术有限公司 intelligent terminal equipment based on tax bureau invoice issuing U shield invoice issuing

Also Published As

Publication number Publication date
CN107920053B (en) 2020-11-24

Similar Documents

Publication Publication Date Title
US8832800B2 (en) Method for producing an electro-biometric signature allowing legal interaction between and identification of persons
CN110060037B (en) Distributed digital identity system based on block chain
CN108540449B (en) Intelligent seal control method and system and computer storage medium
CN110226165A (en) Pass through updatable data structure detection electronic penetration person
CN109637637A (en) Medical management system based on block chain
CN108711051A (en) A kind of intellectual property transaction shared platform and method based on block chain
CN107637015A (en) Digital identity system
CN101140648A (en) Method for bank bill online authorisation and off line trading
KR20160142032A (en) Customized financial management system using of a sub-certification
CN107094154B (en) Intelligent password network real-name system identity management method and platform
CN110223068A (en) A kind of electronic evidence based on block chain intelligence contract deposits card method
CN105447931A (en) Remote access control authorization method, device and system
US20130332296A1 (en) System and Method for Creation and Distribution of Author Signed Electronic Books
CN103208148A (en) Currency verification system and method thereof
CN106911722B (en) Intelligent password signature identity authentication bidirectional authentication method and system
CN101986355B (en) Method, system and terminal for managing transaction authority of bank card
US20180375847A1 (en) Stored value user identification system using blockchain or math-based function
WO2021011054A1 (en) System and method for authentication using biometric hash strings
CN113111330A (en) Enterprise legal identity authentication management method and system based on enterprise chain code
CN107920053A (en) Managing device and method based on Internet of Things
CN107181753B (en) Mobile terminal financial system and method
Onyesolu et al. Improving security using a three-tier authentication for automated teller machine (ATM)
EP2254093B1 (en) Method and system for confirming the identity of a user
US20190087824A1 (en) System and method for mitigating effects of identity theft
CN110581820B (en) Financial technology application system and method based on IPV6 and biological recognition technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant