CN107920053A - Managing device and method based on Internet of Things - Google Patents
Managing device and method based on Internet of Things Download PDFInfo
- Publication number
- CN107920053A CN107920053A CN201710671843.8A CN201710671843A CN107920053A CN 107920053 A CN107920053 A CN 107920053A CN 201710671843 A CN201710671843 A CN 201710671843A CN 107920053 A CN107920053 A CN 107920053A
- Authority
- CN
- China
- Prior art keywords
- intelligent hardware
- data
- verification
- things
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Abstract
The present invention gives a kind of management method based on Internet of Things, the use mandate of Intelligent hardware is completed by following verification:Data verification is carried out between user front end and Intelligent hardware;Data verification is carried out between user and Intelligent hardware;Interrelated verification is carried out between the secret key system of at least two quantity in Intelligent hardware;Interrelated verification is carried out between physics chapter impression block and electronics chapter impression block in Intelligent hardware;Carry out that use is mutually authenticated between Intelligent hardware.
Description
Technical field
It is especially a kind of to be based on Internet of Things the present invention relates to a kind of management of enterprise operation device and method based on Internet of Things
Managing device and method.
Background technology
U-shield is present more common secret key mechanism, is widely used in organ of bank, the tax etc., though U-shield
So to operation carried out certain safety guarantee, once but the user of its U-shield be spoofed, then U-shield can not equally play really
Protect the effect of safe operation.
And during the use of Zhang Yin, it is same easily to produce security breaches problem caused by after user is spoofed, although
Occurs more intelligent seal equipment now, but it can only carry out relevant management and control to the place that uses, time, people substantially
Record, does not carry out defence used in connection with actively.
The content of the invention
The technical problem to be solved in the present invention is to provide a kind of electronic invoice safely and efficiently based on intelligent seal to issue
Method and platform.
In order to solve the above technical problems, the present invention provides a kind of managing device based on Internet of Things, including tool between each other
The Intelligent hardware and cloud server of standby signal transfer function;The Intelligent hardware integrated authentication system, chapter print system and secret key
System.
As the improvement to the managing device of the present invention based on Internet of Things, the secret key system includes but not limited to
The U-shield of at least two quantity.
A kind of management method based on Internet of Things of the managing device based on Internet of Things, the use mandate of Intelligent hardware pass through
Following verification is completed:Data verification is carried out between user front end and Intelligent hardware;Carried out between user and Intelligent hardware
Data verification;Interrelated verification is carried out between the secret key system of at least two quantity in Intelligent hardware;Intelligent hardware
Interrelated verification is carried out between interior physics chapter impression block and electronics chapter impression block;Between Intelligent hardware be mutually authenticated making
With.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the user front end
It is as follows that data verification implementation steps are carried out between Intelligent hardware:User front end initiate verification, cloud server establish with it is right
Answer the communication port of Intelligent hardware;Intelligent hardware completes data verification, and passes through cloud server feedback result to front end.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, user is hard to intelligence
Part carries out the data verification inputted based on secret key I, and completes Intelligent hardware unlock;It is described that Intelligent hardware progress secret key I is inputted
Data include numeral, figure, word, action, biometric feature.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, described at least two with
It is as follows that interrelated verification step is carried out between the secret key system of upper quantity:Intelligent hardware reads any secret key system data, and
The data are uploaded into cloud server, pass through other key information data progress stored up with cloud server databases
Match somebody with somebody.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the physics Zhang Yinmo
Verification step is as follows between block and electronics chapter impression block:Operational data in Intelligent hardware reading database, and by necessarily calculating
Method completes picture mosaic;Intelligent hardware carries out camera shooting and sampling to physical module;Matched by the sample of camera shooting and sampling with picture mosaic.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the Intelligent hardware it
Between preferred value is high to be completed to the low authority checking of preferred value by being carried out between Intelligent hardware the step of carrying out that use is mutually authenticated, its
Step is as follows:Preferred value height is carried out between Intelligent hardware and arrives the low authority checking of preferred value, the low Intelligent hardware of priority passes through cloud
Server is held to be initiated to the high Intelligent hardware of priority using request;The high Intelligent hardware of priority is fed back by cloud server
Authorization result, and data record is carried out by cloud server.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the Intelligent hardware it
Between the step of carrying out that use is mutually authenticated it is as follows:The use of chapter print system is completed by Intelligent hardware, and is recorded using data;By it
The chapter print system of his Intelligent hardware complete it is corresponding using data affix one's seal request when, taken by other Intelligent hardwares by high in the clouds
Business device is initiated to use and asked to record using the Intelligent hardware of data;Record is taken using the Intelligent hardware of data by high in the clouds
Device be engaged in the Intelligent hardware feedback Authorization result for initiating to ask, and data record is carried out by cloud server.
Improved as to a kind of the further of management method based on Internet of Things of the present invention, the front end initiates to test
When card, which integrates the unique identifier of front end, user corresponds to secret key I, Intelligent hardware corresponds to secret key II;Institute
Secret key II is stated as numeral, figure or word.
Existing U-shield product is carried out Internet of Things networking integration first, is passed to by the present invention during specific implementation
Networking is licensed, and avoids U-shield from being used alone and cause the generation of economic loss;Secondly, the present invention is by the daily need of enterprise
Intelligence seal to be used etc. equipment carries out priority classification, and e.g., setting official seal is first priority, then, other Zhang Yin's
Using the mandate being required to by official seal, and record so that Zhang Yin's has mark to look into using track, and prevents individually making for Zhang Yin
With and cause the skimble-scamble situation of information to occur.Finally, the present invention detects its chapter automatically by a series of Information Authentication flow
Mould, avoids authorizing the situation that Zhang Yin is not inconsistent in actual mechanical process and occurs.
Brief description of the drawings
The embodiment of the present invention is described in further detail below in conjunction with the accompanying drawings.
Fig. 1 is the main flow schematic diagram of the present invention.
Embodiment
Embodiment 1, Fig. 1 provide a kind of managing device and method based on Internet of Things.
The present invention is improved based on existing intelligent seal and U-shield product using the defects of process, it is mainly logical
Cross and are carried out by multiple-authentication, reaches the function of Initiative Defense, its specific composition for intelligent apparatus, such as correlation module in intelligence seal
It is as follows:
Including possessing the Intelligent hardware of signal transfer function (such as intelligent seal) and cloud server between each other;The intelligence
Hardware integration verification system, chapter print system and secret key system, the secret key system include U-shield, and in the present invention, by some U-shields
Product is integrated in same intelligence system, when use, by judging the relevant information of any U-shield product, then
Function is mutually authenticated with reference to the physics Zhang Mo in the intellectual product and electronics Zhang Mo, it can be ensured that the Zhang Yinwei changes without hardware
Intelligent hardware, and pass through verification.
The step of it is implemented is as follows:
1st, data verification is carried out between user front end and Intelligent hardware;
User by front end initiates verification, and (unique identification codes of verification data including the front end, Intelligent hardware make
With the origin of an incident, people's information used in connection with, by numeral or figure constitution with the one-to-one secret key of Intelligent hardware), high in the clouds clothes
Business device is established and the communication port of corresponding Intelligent hardware (carrying out data-pushing by the secret key);Intelligent hardware completes data verification
(verification refer to the front end unique identification code whether built in Intelligent hardware databases storage, user's information be
The no databases storage built in Intelligent hardware), and (after data verification, tied by cloud server feedback result to front end
Fruit matches, then feedback license, as a result mismatches, then feedback validation does not pass through).
2nd, data verification is carried out between user and Intelligent hardware;
Secret key I is carried out to Intelligent hardware, and (secret key I is word, numeral, figure, the other information of biological sound etc., passes through user
Directly Intelligent hardware is inputted) input, and complete Intelligent hardware unlock (once the data built in secret key I and Intelligent hardware
The data of storehouse memory storage are mutually matched, you can by the way that the data of the secret key I can be deposited as the database built in Intelligent hardware
Storage, can also be sent in Intelligent hardware, and stored in database when step 1 by front end);It is described to intelligence
The secret key I that energy hardware is carried out during secret key I inputs includes numeral, figure, word, action, biometric feature.
3rd, mutually closed between some secret keys in Intelligent hardware (in the present embodiment, which is U-shield) system
Connection verification;
Intelligent hardware reads some secret key systems, and (U-shield includes U shield for bank system, taxation authority's U-shield system, social security mechanism U
Shield system) data, and some secret key system datas are uploaded into cloud server, by being stored up with cloud server databases
Information matched (carry out U shield for bank system use when, by the Intelligent hardware carry out the U shield for bank system with
Taxation authority's U-shield system, the data of social security mechanism U-shield system are matched, and have the original of unique U-shield system by unique unit
Then, once the data of other U-shield systems mismatch, then illustrate that the U-shield system has the risk replaced by hardware), complete of data
With when, feedback validation passes through.
4th, interrelated verification is carried out between the physics chapter impression block in Intelligent hardware and electronics chapter impression block;
Operational data in Intelligent hardware reading database, and picture mosaic is completed by certain algorithm;Intelligent hardware is to physics
Module carries out camera shooting and sampling;Matched with picture mosaic by the sample of camera shooting and sampling (since Intelligent hardware preserves in client's hand,
Therefore, it is impossible to prevent client from transforming Intelligent hardware, others Zhang Mo is replaced;And carry out database data replacement when
Wait, then data safety can be confirmed by means such as encryptions, once distorted to data, phase can be passed through
Close algorithm to destroy data, it can not be completed the replacement of data Zhang Mo, further, pass through data Zhang Mo and entity chapter
The matching of mould, can prevent voluntarily to carry out the risk of entity chapter mould replacement).
5th, carry out that use is mutually authenticated between Intelligent hardware, mainly having two ways, (data of two kinds of verifications pass through step 1
Edit and send at the use origin of an incident of total Intelligent hardware):
The first carries out preferred value height between Intelligent hardware and arrives the low authority checking of preferred value, its step is as follows:
The low Intelligent hardware of priority is initiated using request by cloud server to the high Intelligent hardware of priority;Preferentially
Weigh high Intelligent hardware and Authorization result is fed back by cloud server, and data record is carried out by cloud server.
The first is as follows to the mode using data correlation, its step:
Contract chapter produce business, when payment step is carried out, legal person's finance seal by being associated with contract chapter, this
When, legal person's finance seal is associated with the payment information that seal for contractual uses completes the use of time, to the contract of the seal for contractual uses into
, it is necessary to using finance seal when row disbursement and sattlement, finance seal at this time associates seal for contractual uses first, and verifies corresponding number
According to, once data are not met, then refusal information is fed back by intelligent seal, once data fit, then fed back by intelligent seal and used
Information, and flow of affixing one's seal is carried out by user.This mode defines the use rule between Zhang Yin to a certain extent, makes it
Operation is with the trackability more strengthened.When step described above uses, by Intelligent hardware record it is all affix one's seal make
Use information.
Above-described front end refers to a smart machine for cutting with information transfer capability, and when verification is initiated in front end, this is tested
Demonstrate,prove the unique identifier of information integration front end, user corresponds to secret key, Intelligent hardware corresponds to secret key;The Intelligent hardware corresponds to secret
Key is numeral, figure or word.
Finally, it should also be noted that it is listed above be only the present invention a specific embodiment.Obviously, it is of the invention
Above example is not limited to, there can also be many deformations.Those of ordinary skill in the art can be straight from present disclosure
Export or all deformations associated are connect, are considered as protection scope of the present invention.
Claims (10)
1. the managing device based on Internet of Things, it is characterised in that including possessing the Intelligent hardware of signal transfer function between each other
And cloud server;
The Intelligent hardware integrated authentication system, chapter print system and secret key system.
2. the managing device according to claim 1 based on Internet of Things, it is characterised in that the secret key system is included but not
It is limited to the U-shield of at least two quantity.
3. the management method according to claim 1 based on Internet of Things, it is characterised in that the use mandate of Intelligent hardware is led to
Following verification is crossed to complete:
Data verification is carried out between user front end and Intelligent hardware;
Data verification is carried out between user and Intelligent hardware;
Interrelated verification is carried out between the secret key system of at least two quantity in Intelligent hardware;
Interrelated verification is carried out between physics chapter impression block and electronics chapter impression block in Intelligent hardware;
Carry out that use is mutually authenticated between Intelligent hardware.
4. the management method according to claim 3 based on Internet of Things, it is characterised in that the user front end and intelligence
It is as follows that data verification implementation steps are carried out between hardware:
Verification is initiated in user front end, and cloud server establishes the communication port with corresponding Intelligent hardware;
Intelligent hardware completes data verification, and passes through cloud server feedback result to front end.
5. the management method according to claim 3 based on Internet of Things, it is characterised in that user carries out Intelligent hardware
The data verification inputted based on secret key I, and complete Intelligent hardware unlock;
The data that the input of secret key I is carried out to Intelligent hardware include numeral, figure, word, action, biometric feature.
6. the management method according to claim 3 based on Internet of Things, it is characterised in that at least two quantity
Secret key system between to carry out interrelated verification step as follows:
Intelligent hardware reads any secret key system data, and the data are uploaded to cloud server, by with cloud server
Other key information data of databases storage are matched.
7. the management method according to claim 3 based on Internet of Things, it is characterised in that the physics chapter impression block and electricity
Verification step is as follows between sub- chapter impression block:
Operational data in Intelligent hardware reading database, and picture mosaic is completed by certain algorithm;
Intelligent hardware carries out camera shooting and sampling to physical module;
Matched by the sample of camera shooting and sampling with picture mosaic.
8. the management method according to claim 3 based on Internet of Things, it is characterised in that carried out between the Intelligent hardware
The step of use is mutually authenticated is high to the low authority checking completion of preferred value by carrying out preferred value between Intelligent hardware, its step is such as
Under:
The low Intelligent hardware of priority is initiated using request by cloud server to the high Intelligent hardware of priority;
The high Intelligent hardware of priority feeds back Authorization result by cloud server, and carries out data note by cloud server
Record.
9. the management method according to claim 3 based on Internet of Things, it is characterised in that carried out between the Intelligent hardware
The step of use is mutually authenticated is as follows:
The use of chapter print system is completed by Intelligent hardware, and is recorded using data;
By the chapter print system of other Intelligent hardwares complete it is corresponding using data affix one's seal request when, led to by other Intelligent hardwares
Cloud server is crossed to initiate using request using the Intelligent hardware of data to record;
Record feeds back Authorization result by cloud server using the Intelligent hardware of data to the Intelligent hardware for initiating request, and
Data record is carried out by cloud server.
10. the management method according to claim 3 based on Internet of Things, it is characterised in that initiate verification in the front end
When, which integrates the unique identifier of front end, user corresponds to secret key I, Intelligent hardware corresponds to secret key II;
The secret key II is numeral, figure or word.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710671843.8A CN107920053B (en) | 2017-08-08 | 2017-08-08 | Management device and method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710671843.8A CN107920053B (en) | 2017-08-08 | 2017-08-08 | Management device and method based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107920053A true CN107920053A (en) | 2018-04-17 |
CN107920053B CN107920053B (en) | 2020-11-24 |
Family
ID=61898581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710671843.8A Active CN107920053B (en) | 2017-08-08 | 2017-08-08 | Management device and method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107920053B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108768658A (en) * | 2018-05-15 | 2018-11-06 | 胡金钱 | Intelligent and safe chip |
CN110570609A (en) * | 2019-07-22 | 2019-12-13 | 北京票通信息技术有限公司 | intelligent terminal equipment based on tax bureau invoice issuing U shield invoice issuing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980121A (en) * | 2005-11-29 | 2007-06-13 | 北京书生国际信息技术有限公司 | Electronic signing mobile terminal, system and method |
KR101446504B1 (en) * | 2014-07-30 | 2014-11-04 | 주식회사위즈베라 | Digital Signature Method Executed By Client Program Which Is Operated Independently From Web Browser |
CN104268742A (en) * | 2014-10-20 | 2015-01-07 | 陕西万宇电子信息科技有限公司 | Official seal fake detection method and device based on network digital certificate and network lookup |
CN205311102U (en) * | 2015-12-23 | 2016-06-15 | 童迎伟 | Cloud intelligence seal based on thing networking |
CN106921489A (en) * | 2015-12-25 | 2017-07-04 | 中国移动通信集团公司 | A kind of data ciphering method and device |
-
2017
- 2017-08-08 CN CN201710671843.8A patent/CN107920053B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980121A (en) * | 2005-11-29 | 2007-06-13 | 北京书生国际信息技术有限公司 | Electronic signing mobile terminal, system and method |
KR101446504B1 (en) * | 2014-07-30 | 2014-11-04 | 주식회사위즈베라 | Digital Signature Method Executed By Client Program Which Is Operated Independently From Web Browser |
CN104268742A (en) * | 2014-10-20 | 2015-01-07 | 陕西万宇电子信息科技有限公司 | Official seal fake detection method and device based on network digital certificate and network lookup |
CN205311102U (en) * | 2015-12-23 | 2016-06-15 | 童迎伟 | Cloud intelligence seal based on thing networking |
CN106921489A (en) * | 2015-12-25 | 2017-07-04 | 中国移动通信集团公司 | A kind of data ciphering method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108768658A (en) * | 2018-05-15 | 2018-11-06 | 胡金钱 | Intelligent and safe chip |
CN110570609A (en) * | 2019-07-22 | 2019-12-13 | 北京票通信息技术有限公司 | intelligent terminal equipment based on tax bureau invoice issuing U shield invoice issuing |
Also Published As
Publication number | Publication date |
---|---|
CN107920053B (en) | 2020-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8832800B2 (en) | Method for producing an electro-biometric signature allowing legal interaction between and identification of persons | |
CN110060037B (en) | Distributed digital identity system based on block chain | |
CN108540449B (en) | Intelligent seal control method and system and computer storage medium | |
CN110226165A (en) | Pass through updatable data structure detection electronic penetration person | |
CN109637637A (en) | Medical management system based on block chain | |
CN108711051A (en) | A kind of intellectual property transaction shared platform and method based on block chain | |
CN107637015A (en) | Digital identity system | |
CN101140648A (en) | Method for bank bill online authorisation and off line trading | |
KR20160142032A (en) | Customized financial management system using of a sub-certification | |
CN107094154B (en) | Intelligent password network real-name system identity management method and platform | |
CN110223068A (en) | A kind of electronic evidence based on block chain intelligence contract deposits card method | |
CN105447931A (en) | Remote access control authorization method, device and system | |
US20130332296A1 (en) | System and Method for Creation and Distribution of Author Signed Electronic Books | |
CN103208148A (en) | Currency verification system and method thereof | |
CN106911722B (en) | Intelligent password signature identity authentication bidirectional authentication method and system | |
CN101986355B (en) | Method, system and terminal for managing transaction authority of bank card | |
US20180375847A1 (en) | Stored value user identification system using blockchain or math-based function | |
WO2021011054A1 (en) | System and method for authentication using biometric hash strings | |
CN113111330A (en) | Enterprise legal identity authentication management method and system based on enterprise chain code | |
CN107920053A (en) | Managing device and method based on Internet of Things | |
CN107181753B (en) | Mobile terminal financial system and method | |
Onyesolu et al. | Improving security using a three-tier authentication for automated teller machine (ATM) | |
EP2254093B1 (en) | Method and system for confirming the identity of a user | |
US20190087824A1 (en) | System and method for mitigating effects of identity theft | |
CN110581820B (en) | Financial technology application system and method based on IPV6 and biological recognition technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |