CN108400964A - Equipment room encryption connection method - Google Patents

Equipment room encryption connection method Download PDF

Info

Publication number
CN108400964A
CN108400964A CN201711437935.6A CN201711437935A CN108400964A CN 108400964 A CN108400964 A CN 108400964A CN 201711437935 A CN201711437935 A CN 201711437935A CN 108400964 A CN108400964 A CN 108400964A
Authority
CN
China
Prior art keywords
equipment
code
logging
physical address
connection method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711437935.6A
Other languages
Chinese (zh)
Inventor
俞大海
章瑜
朱峰
邓新欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Focused Photonics Hangzhou Inc
Original Assignee
Focused Photonics Hangzhou Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Focused Photonics Hangzhou Inc filed Critical Focused Photonics Hangzhou Inc
Priority to CN201711437935.6A priority Critical patent/CN108400964A/en
Publication of CN108400964A publication Critical patent/CN108400964A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of equipment room encryption connection methods, include the following steps:(A1) the first equipment acquires the ID of the second equipment, and ID and the first equipment physical address are sent to network server;(A2) network server verifies physical address, if the physical address of request is matched with the physical address stored in server, then network server sends a logging-in code corresponding to ID to the first equipment, while being labeled in the server to the logging-in code and forbidding reusing;(A3) logging-in code of acquisition is sent to the second equipment by the first equipment, and the second device authentication logging-in code establishes communication link if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside;(A4) the second equipment starts timing, marks the logging-in code of storage inside after timing time to be achieved, and the logging-in code is forbidden to reuse.The present invention has many advantages, such as that cipher round results are good.

Description

Equipment room encryption connection method
Technical field
The present invention relates to equipment connections, more particularly to equipment room encryption connection method.
Background technology
Apparatus in use, generally requires to establish communication connection therewith with terminal device, carries out parameter setting It is read with information, in order to ensure the safety of apparatus operation, it is ensured that do not connected apparatus arbitrarily by other people and endanger The setting of evil property, it will usually take following methods, exist simultaneously corresponding problem:
1. increasing password authentification when connection, connection could be established after inputting proper password and is configured.It is this The password of method is fixed, is very easy to leakage, and encipherment protection effect is simultaneously bad.
2. apparatus is made to have network savvy, apparatus and net are needed when there is terminal device to establish connection therewith Network server is interacted and is verified.This method good confidentiality, but apparatus must have network connecting function, if Network signal is bad, and verification may be caused to fail, can influence normally to use instead.
Invention content
In order to solve the deficiency in above-mentioned prior art, the present invention provides a kind of equipment that encipherment protection effect is good Between encryption connection method.
A kind of equipment room encryption connection method, the equipment room encryption connection method include the following steps:
(A1) the first equipment acquires the ID of the second equipment, and the ID of the second equipment and the first equipment physical address are sent to Network server;
(A2) network server verifies terminals physical address, if the first equipment physical address and server of request The physical address of middle storage matches, then sent corresponding to the ID of second equipment to the first equipment one of network server steps on Code is recorded, while the logging-in code is labeled in the server and forbids reusing;
(A3) logging-in code obtained from network server is sent to the second equipment by the first equipment, the second device authentication this step on Record code establishes communication link if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside;
(A4) the second equipment starts timing while establishing communication link, and storage inside is marked after timing time to be achieved Logging-in code, and the logging-in code is forbidden to reuse.
According to above-mentioned equipment room encryption connection method, it is preferable that the acquisition mode of the ID is:It scans the two-dimensional code or item It is any in shape code or input ID numbers.
According to above-mentioned equipment room encryption connection method, optionally, pre-stored first sets in the network server Standby physical address distinguishes the terminal of different operation authority, and the first equipment physical address of different rights gets different rights correspondence Logging-in code, the first equipment will establish and be operated with the communication of the second equipment different rights and setting.
According to above-mentioned equipment room encryption connection method, it is preferable that stored in the network server and the second equipment Logging-in code is that one group of array or one form the function uniquely mapped with ID number.
According to above-mentioned equipment room encryption connection method, optionally, in step (A3), if the logging-in code of the request and the The logging-in code of two equipment storage insides matches, then display logins successfully interface on the first device, and establishes communication link.
According to above-mentioned equipment room encryption connection method, it is preferable that first equipment is terminal, and the second equipment is analysis Instrument.
According to above-mentioned equipment room encryption connection method, it is preferable that the terminal is PDA or mobile phone or PAD, the analysis Instrument is semiconductor laser gas analyzer.
Compared with prior art, the device have the advantages that being:
1. going to verify using the physical address of the first equipment and the ID number of the second equipment, and set in network server and second Be stored in standby it is corresponding log in code, to improve the effect of encryption connection;
2. encryption connection can be realized without network.
Description of the drawings
With reference to attached drawing, the disclosure will be easier to understand.Skilled addressee readily understands that be:This A little attached drawings are used only for the technical solution illustrated the present invention, and are not intended to and are construed as limiting to protection scope of the present invention. In figure:
Fig. 1 is the schematic diagram of equipment room encryption connection method according to the ... of the embodiment of the present invention.
Specific implementation mode
Fig. 1 and following description describe the present invention optional embodiment with instruct those skilled in the art how to implement and Reproduce the present invention.In order to instruct technical solution of the present invention, some conventional aspects are simplified or have been omitted.Those skilled in the art answer The understanding is originated from the modification of these embodiments or replacement will within the scope of the invention.Under those skilled in the art should understand that Stating feature can combine in various ways to form multiple modifications of the present invention.The invention is not limited in following optional as a result, Embodiment, and be only limited by the claims and their equivalents.
Embodiment 1:
Fig. 1 schematically illustrates the schematic diagram of encryption connection method between the equipment of the embodiment of the present invention, as shown in Figure 1, institute Equipment room encryption connection method is stated to include the following steps:
(A1) the first equipment acquire the second equipment ID, such as by scan the two-dimensional code bar code or input ID number, and The ID of second equipment and the first equipment physical address are sent to network server;
(A2) the first equipment of network server pair physical address is verified, if the first equipment physical address of request and clothes The physical address matching stored in business device, then network server sends one corresponding to the ID of second equipment to the first equipment A logging-in code, while the logging-in code is labeled in the server and forbids reusing;The network server and second The logging-in code stored in equipment is that one group of array or one form the function uniquely mapped with ID number
(A3) logging-in code obtained from network server is sent to the second equipment by the first equipment, the second device authentication this step on Record code establishes communication link if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside;
(A4) the second equipment starts timing while establishing communication link, and storage inside is marked after timing time to be achieved Logging-in code, and the logging-in code is forbidden to reuse.
Embodiment 2:
Application examples of the according to embodiments of the present invention 1 equipment room encryption connection method in laser gas analyzer.
In the application examples, the first equipment uses mobile phone, and the second equipment is formula laser gas analyzer in place;Mobile phone and Decryption connection method includes the following steps between the formula laser gas analyzer of position:
(A1) mobile phone acquires the ID of formula laser gas analyzer in place, such as by scan the two-dimensional code bar code or input ID Number, and the ID of formula laser gas analyzer in place and mobile phone physical address are sent to network server;
(A2) network server verifies mobile phone physical address, if the mobile phone physical address of request is deposited with server The physical address of storage matches, then network server sends one corresponding to the ID of the formula laser gas analyzer in place to mobile phone A logging-in code, it is one group of array that this, which logs in code, or with the unique corresponding functions of ID, while the logging-in code is carried out in the server It marks and forbids reusing;
(A3) logging-in code obtained from network server is sent to formula laser gas analyzer in place by mobile phone, and formula in place swashs Light gas analyzer verifies the logging-in code, if the login of the logging-in code of the request and formula laser gas analyzer storage inside in place Code matching, then display logs in successfully interface on mobile phone, and establishes the communication chain between mobile phone and formula laser gas analyzer in place Road;
(A4) formula laser gas analyzer in place starts timing while establishing communication link, after timing time to be achieved The logging-in code of storage inside is marked, and the logging-in code is forbidden to reuse;
Pre-stored mobile phone physical address distinguishes the terminal of different operation authority, different rights in the network server Mobile phone physical address get the corresponding logging-in code of different rights, mobile phone will be established and laser gas analyzer different rights Communication and setting operation.

Claims (7)

1. a kind of equipment room encryption connection method, the equipment room encryption connection method includes the following steps:
(A1) the first equipment acquires the ID of the second equipment, and the ID of the second equipment and the first equipment physical address are sent to network Server;
(A2) network server verifies terminals physical address, if the first equipment physical address of request is deposited with server The physical address of storage matches, then network server sends a login corresponding to the ID of second equipment to the first equipment Code, while the logging-in code is labeled in the server and forbids reusing;
(A3) logging-in code obtained from network server is sent to the second equipment, the second device authentication login by the first equipment Code, if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside, establishes communication link;
(A4) the second equipment starts timing while establishing communication link, and stepping on for storage inside is marked after timing time to be achieved Code is recorded, and the logging-in code is forbidden to reuse.
2. equipment room encryption connection method according to claim 1, it is characterised in that:The acquisition mode of the ID is:It sweeps It retouches any in Quick Response Code or bar code or input ID numbers.
3. equipment room encryption connection method according to claim 1, it is characterised in that:It is deposited in advance in the network server First equipment physical address of storage distinguishes the terminal of different operation authority, and the first equipment physical address of different rights is got not The corresponding logging-in code with permission, the first equipment is by the communication established with the second equipment different rights and operation is arranged.
4. equipment room encryption connection method according to claim 1, it is characterised in that:The network server and second is set The logging-in code of standby middle storage is that one group of array or one form the function uniquely mapped with ID number.
5. equipment room encryption connection method according to claim 1, it is characterised in that:In step (A3), if the request Logging-in code matched with the logging-in code of the second equipment storage inside, then display logins successfully interface on the first device, and establishes Communication link.
6. equipment room encryption connection method according to claim 1, it is characterised in that:First equipment is terminal, the Two equipment are analytical instrument.
7. equipment room encryption connection method according to claim 6, it is characterised in that:The terminal be PDA or mobile phone or PAD, the analytical instrument are semiconductor laser gas analyzers.
CN201711437935.6A 2017-12-26 2017-12-26 Equipment room encryption connection method Pending CN108400964A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711437935.6A CN108400964A (en) 2017-12-26 2017-12-26 Equipment room encryption connection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711437935.6A CN108400964A (en) 2017-12-26 2017-12-26 Equipment room encryption connection method

Publications (1)

Publication Number Publication Date
CN108400964A true CN108400964A (en) 2018-08-14

Family

ID=63094438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711437935.6A Pending CN108400964A (en) 2017-12-26 2017-12-26 Equipment room encryption connection method

Country Status (1)

Country Link
CN (1) CN108400964A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019489A (en) * 2019-05-31 2020-12-01 华为技术有限公司 Verification method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103518205A (en) * 2013-03-27 2014-01-15 华为技术有限公司 Method for limiting operation authority and automation device
US20140089671A1 (en) * 2012-09-22 2014-03-27 Nest Labs, Inc. Multi-Tiered Authentication Methods For Facilitating Communications Amongst Smart Home Devices and Cloud-Based Servers
CN104144168A (en) * 2014-08-15 2014-11-12 深圳市蜂联科技有限公司 Method for binding user account and gateway equipment on basis of open-type intelligent gateway platform
CN104580235A (en) * 2015-01-21 2015-04-29 北京深思数盾科技有限公司 Authentication method and authentication system for equipment connection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140089671A1 (en) * 2012-09-22 2014-03-27 Nest Labs, Inc. Multi-Tiered Authentication Methods For Facilitating Communications Amongst Smart Home Devices and Cloud-Based Servers
CN103518205A (en) * 2013-03-27 2014-01-15 华为技术有限公司 Method for limiting operation authority and automation device
CN104144168A (en) * 2014-08-15 2014-11-12 深圳市蜂联科技有限公司 Method for binding user account and gateway equipment on basis of open-type intelligent gateway platform
CN104580235A (en) * 2015-01-21 2015-04-29 北京深思数盾科技有限公司 Authentication method and authentication system for equipment connection

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019489A (en) * 2019-05-31 2020-12-01 华为技术有限公司 Verification method and device
CN112019489B (en) * 2019-05-31 2022-03-04 华为技术有限公司 Verification method and device

Similar Documents

Publication Publication Date Title
US20230308477A1 (en) Methods and systems for detecting and preventing compromised network connections
CN104378145B (en) The matching method and system of bluetooth equipment
US10693648B2 (en) System and method for dynamic grid authentication
CN104717218B (en) A kind of Wifi Verification Systems and method
JP5601729B2 (en) How to log into a mobile radio network
Bartoli et al. Evil twins and WPA2 enterprise: A coming security disaster?
CN104363250B (en) A kind of method and system for equipment connection
CN106534143A (en) Method and system capable of realizing cross-application authentication authorization
ES2766856T3 (en) Procedure, device and WiFi network authentication system
CN104994118A (en) WiFi authentication system and method based on dynamic password
US11337067B2 (en) Systems and methods for providing wireless access security by interrogation
US10212144B2 (en) Digital credential with embedded authentication instructions
CN109040070A (en) Document sending method, equipment and computer readable storage medium
CN107360125A (en) Access authentication method, WAP and user terminal
CN105898743A (en) Network connection method, device and system
CN104618356B (en) Auth method and device
CN108924818A (en) Mobile subscriber identification method based on SIM card and equipment related parameters
CN105828454A (en) Method for connecting network, device and WiFi routing equipment
CN104378368B (en) A kind of barcode scanning login method and system
CN109284599A (en) It the use of portable electronic device is the method and system that user creates strong authentication
CN108900306A (en) A kind of production method and system of wireless router digital certificate
CN106101188B (en) A kind of data processing method of network cloud USB flash disk
CN107835162A (en) The method that software digital permit server signs and issues software digital permissions
CN110166471A (en) A kind of portal authentication method and device
CN108400964A (en) Equipment room encryption connection method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180814

WD01 Invention patent application deemed withdrawn after publication