CN108400964A - Equipment room encryption connection method - Google Patents
Equipment room encryption connection method Download PDFInfo
- Publication number
- CN108400964A CN108400964A CN201711437935.6A CN201711437935A CN108400964A CN 108400964 A CN108400964 A CN 108400964A CN 201711437935 A CN201711437935 A CN 201711437935A CN 108400964 A CN108400964 A CN 108400964A
- Authority
- CN
- China
- Prior art keywords
- equipment
- code
- logging
- physical address
- connection method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of equipment room encryption connection methods, include the following steps:(A1) the first equipment acquires the ID of the second equipment, and ID and the first equipment physical address are sent to network server;(A2) network server verifies physical address, if the physical address of request is matched with the physical address stored in server, then network server sends a logging-in code corresponding to ID to the first equipment, while being labeled in the server to the logging-in code and forbidding reusing;(A3) logging-in code of acquisition is sent to the second equipment by the first equipment, and the second device authentication logging-in code establishes communication link if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside;(A4) the second equipment starts timing, marks the logging-in code of storage inside after timing time to be achieved, and the logging-in code is forbidden to reuse.The present invention has many advantages, such as that cipher round results are good.
Description
Technical field
The present invention relates to equipment connections, more particularly to equipment room encryption connection method.
Background technology
Apparatus in use, generally requires to establish communication connection therewith with terminal device, carries out parameter setting
It is read with information, in order to ensure the safety of apparatus operation, it is ensured that do not connected apparatus arbitrarily by other people and endanger
The setting of evil property, it will usually take following methods, exist simultaneously corresponding problem:
1. increasing password authentification when connection, connection could be established after inputting proper password and is configured.It is this
The password of method is fixed, is very easy to leakage, and encipherment protection effect is simultaneously bad.
2. apparatus is made to have network savvy, apparatus and net are needed when there is terminal device to establish connection therewith
Network server is interacted and is verified.This method good confidentiality, but apparatus must have network connecting function, if
Network signal is bad, and verification may be caused to fail, can influence normally to use instead.
Invention content
In order to solve the deficiency in above-mentioned prior art, the present invention provides a kind of equipment that encipherment protection effect is good
Between encryption connection method.
A kind of equipment room encryption connection method, the equipment room encryption connection method include the following steps:
(A1) the first equipment acquires the ID of the second equipment, and the ID of the second equipment and the first equipment physical address are sent to
Network server;
(A2) network server verifies terminals physical address, if the first equipment physical address and server of request
The physical address of middle storage matches, then sent corresponding to the ID of second equipment to the first equipment one of network server steps on
Code is recorded, while the logging-in code is labeled in the server and forbids reusing;
(A3) logging-in code obtained from network server is sent to the second equipment by the first equipment, the second device authentication this step on
Record code establishes communication link if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside;
(A4) the second equipment starts timing while establishing communication link, and storage inside is marked after timing time to be achieved
Logging-in code, and the logging-in code is forbidden to reuse.
According to above-mentioned equipment room encryption connection method, it is preferable that the acquisition mode of the ID is:It scans the two-dimensional code or item
It is any in shape code or input ID numbers.
According to above-mentioned equipment room encryption connection method, optionally, pre-stored first sets in the network server
Standby physical address distinguishes the terminal of different operation authority, and the first equipment physical address of different rights gets different rights correspondence
Logging-in code, the first equipment will establish and be operated with the communication of the second equipment different rights and setting.
According to above-mentioned equipment room encryption connection method, it is preferable that stored in the network server and the second equipment
Logging-in code is that one group of array or one form the function uniquely mapped with ID number.
According to above-mentioned equipment room encryption connection method, optionally, in step (A3), if the logging-in code of the request and the
The logging-in code of two equipment storage insides matches, then display logins successfully interface on the first device, and establishes communication link.
According to above-mentioned equipment room encryption connection method, it is preferable that first equipment is terminal, and the second equipment is analysis
Instrument.
According to above-mentioned equipment room encryption connection method, it is preferable that the terminal is PDA or mobile phone or PAD, the analysis
Instrument is semiconductor laser gas analyzer.
Compared with prior art, the device have the advantages that being:
1. going to verify using the physical address of the first equipment and the ID number of the second equipment, and set in network server and second
Be stored in standby it is corresponding log in code, to improve the effect of encryption connection;
2. encryption connection can be realized without network.
Description of the drawings
With reference to attached drawing, the disclosure will be easier to understand.Skilled addressee readily understands that be:This
A little attached drawings are used only for the technical solution illustrated the present invention, and are not intended to and are construed as limiting to protection scope of the present invention.
In figure:
Fig. 1 is the schematic diagram of equipment room encryption connection method according to the ... of the embodiment of the present invention.
Specific implementation mode
Fig. 1 and following description describe the present invention optional embodiment with instruct those skilled in the art how to implement and
Reproduce the present invention.In order to instruct technical solution of the present invention, some conventional aspects are simplified or have been omitted.Those skilled in the art answer
The understanding is originated from the modification of these embodiments or replacement will within the scope of the invention.Under those skilled in the art should understand that
Stating feature can combine in various ways to form multiple modifications of the present invention.The invention is not limited in following optional as a result,
Embodiment, and be only limited by the claims and their equivalents.
Embodiment 1:
Fig. 1 schematically illustrates the schematic diagram of encryption connection method between the equipment of the embodiment of the present invention, as shown in Figure 1, institute
Equipment room encryption connection method is stated to include the following steps:
(A1) the first equipment acquire the second equipment ID, such as by scan the two-dimensional code bar code or input ID number, and
The ID of second equipment and the first equipment physical address are sent to network server;
(A2) the first equipment of network server pair physical address is verified, if the first equipment physical address of request and clothes
The physical address matching stored in business device, then network server sends one corresponding to the ID of second equipment to the first equipment
A logging-in code, while the logging-in code is labeled in the server and forbids reusing;The network server and second
The logging-in code stored in equipment is that one group of array or one form the function uniquely mapped with ID number
(A3) logging-in code obtained from network server is sent to the second equipment by the first equipment, the second device authentication this step on
Record code establishes communication link if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside;
(A4) the second equipment starts timing while establishing communication link, and storage inside is marked after timing time to be achieved
Logging-in code, and the logging-in code is forbidden to reuse.
Embodiment 2:
Application examples of the according to embodiments of the present invention 1 equipment room encryption connection method in laser gas analyzer.
In the application examples, the first equipment uses mobile phone, and the second equipment is formula laser gas analyzer in place;Mobile phone and
Decryption connection method includes the following steps between the formula laser gas analyzer of position:
(A1) mobile phone acquires the ID of formula laser gas analyzer in place, such as by scan the two-dimensional code bar code or input ID
Number, and the ID of formula laser gas analyzer in place and mobile phone physical address are sent to network server;
(A2) network server verifies mobile phone physical address, if the mobile phone physical address of request is deposited with server
The physical address of storage matches, then network server sends one corresponding to the ID of the formula laser gas analyzer in place to mobile phone
A logging-in code, it is one group of array that this, which logs in code, or with the unique corresponding functions of ID, while the logging-in code is carried out in the server
It marks and forbids reusing;
(A3) logging-in code obtained from network server is sent to formula laser gas analyzer in place by mobile phone, and formula in place swashs
Light gas analyzer verifies the logging-in code, if the login of the logging-in code of the request and formula laser gas analyzer storage inside in place
Code matching, then display logs in successfully interface on mobile phone, and establishes the communication chain between mobile phone and formula laser gas analyzer in place
Road;
(A4) formula laser gas analyzer in place starts timing while establishing communication link, after timing time to be achieved
The logging-in code of storage inside is marked, and the logging-in code is forbidden to reuse;
Pre-stored mobile phone physical address distinguishes the terminal of different operation authority, different rights in the network server
Mobile phone physical address get the corresponding logging-in code of different rights, mobile phone will be established and laser gas analyzer different rights
Communication and setting operation.
Claims (7)
1. a kind of equipment room encryption connection method, the equipment room encryption connection method includes the following steps:
(A1) the first equipment acquires the ID of the second equipment, and the ID of the second equipment and the first equipment physical address are sent to network
Server;
(A2) network server verifies terminals physical address, if the first equipment physical address of request is deposited with server
The physical address of storage matches, then network server sends a login corresponding to the ID of second equipment to the first equipment
Code, while the logging-in code is labeled in the server and forbids reusing;
(A3) logging-in code obtained from network server is sent to the second equipment, the second device authentication login by the first equipment
Code, if the logging-in code of the request is matched with the logging-in code of the second equipment storage inside, establishes communication link;
(A4) the second equipment starts timing while establishing communication link, and stepping on for storage inside is marked after timing time to be achieved
Code is recorded, and the logging-in code is forbidden to reuse.
2. equipment room encryption connection method according to claim 1, it is characterised in that:The acquisition mode of the ID is:It sweeps
It retouches any in Quick Response Code or bar code or input ID numbers.
3. equipment room encryption connection method according to claim 1, it is characterised in that:It is deposited in advance in the network server
First equipment physical address of storage distinguishes the terminal of different operation authority, and the first equipment physical address of different rights is got not
The corresponding logging-in code with permission, the first equipment is by the communication established with the second equipment different rights and operation is arranged.
4. equipment room encryption connection method according to claim 1, it is characterised in that:The network server and second is set
The logging-in code of standby middle storage is that one group of array or one form the function uniquely mapped with ID number.
5. equipment room encryption connection method according to claim 1, it is characterised in that:In step (A3), if the request
Logging-in code matched with the logging-in code of the second equipment storage inside, then display logins successfully interface on the first device, and establishes
Communication link.
6. equipment room encryption connection method according to claim 1, it is characterised in that:First equipment is terminal, the
Two equipment are analytical instrument.
7. equipment room encryption connection method according to claim 6, it is characterised in that:The terminal be PDA or mobile phone or
PAD, the analytical instrument are semiconductor laser gas analyzers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711437935.6A CN108400964A (en) | 2017-12-26 | 2017-12-26 | Equipment room encryption connection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711437935.6A CN108400964A (en) | 2017-12-26 | 2017-12-26 | Equipment room encryption connection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108400964A true CN108400964A (en) | 2018-08-14 |
Family
ID=63094438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711437935.6A Pending CN108400964A (en) | 2017-12-26 | 2017-12-26 | Equipment room encryption connection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108400964A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112019489A (en) * | 2019-05-31 | 2020-12-01 | 华为技术有限公司 | Verification method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103518205A (en) * | 2013-03-27 | 2014-01-15 | 华为技术有限公司 | Method for limiting operation authority and automation device |
US20140089671A1 (en) * | 2012-09-22 | 2014-03-27 | Nest Labs, Inc. | Multi-Tiered Authentication Methods For Facilitating Communications Amongst Smart Home Devices and Cloud-Based Servers |
CN104144168A (en) * | 2014-08-15 | 2014-11-12 | 深圳市蜂联科技有限公司 | Method for binding user account and gateway equipment on basis of open-type intelligent gateway platform |
CN104580235A (en) * | 2015-01-21 | 2015-04-29 | 北京深思数盾科技有限公司 | Authentication method and authentication system for equipment connection |
-
2017
- 2017-12-26 CN CN201711437935.6A patent/CN108400964A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140089671A1 (en) * | 2012-09-22 | 2014-03-27 | Nest Labs, Inc. | Multi-Tiered Authentication Methods For Facilitating Communications Amongst Smart Home Devices and Cloud-Based Servers |
CN103518205A (en) * | 2013-03-27 | 2014-01-15 | 华为技术有限公司 | Method for limiting operation authority and automation device |
CN104144168A (en) * | 2014-08-15 | 2014-11-12 | 深圳市蜂联科技有限公司 | Method for binding user account and gateway equipment on basis of open-type intelligent gateway platform |
CN104580235A (en) * | 2015-01-21 | 2015-04-29 | 北京深思数盾科技有限公司 | Authentication method and authentication system for equipment connection |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112019489A (en) * | 2019-05-31 | 2020-12-01 | 华为技术有限公司 | Verification method and device |
CN112019489B (en) * | 2019-05-31 | 2022-03-04 | 华为技术有限公司 | Verification method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230308477A1 (en) | Methods and systems for detecting and preventing compromised network connections | |
CN104378145B (en) | The matching method and system of bluetooth equipment | |
US10693648B2 (en) | System and method for dynamic grid authentication | |
CN104717218B (en) | A kind of Wifi Verification Systems and method | |
JP5601729B2 (en) | How to log into a mobile radio network | |
Bartoli et al. | Evil twins and WPA2 enterprise: A coming security disaster? | |
CN104363250B (en) | A kind of method and system for equipment connection | |
CN106534143A (en) | Method and system capable of realizing cross-application authentication authorization | |
ES2766856T3 (en) | Procedure, device and WiFi network authentication system | |
CN104994118A (en) | WiFi authentication system and method based on dynamic password | |
US11337067B2 (en) | Systems and methods for providing wireless access security by interrogation | |
US10212144B2 (en) | Digital credential with embedded authentication instructions | |
CN109040070A (en) | Document sending method, equipment and computer readable storage medium | |
CN107360125A (en) | Access authentication method, WAP and user terminal | |
CN105898743A (en) | Network connection method, device and system | |
CN104618356B (en) | Auth method and device | |
CN108924818A (en) | Mobile subscriber identification method based on SIM card and equipment related parameters | |
CN105828454A (en) | Method for connecting network, device and WiFi routing equipment | |
CN104378368B (en) | A kind of barcode scanning login method and system | |
CN109284599A (en) | It the use of portable electronic device is the method and system that user creates strong authentication | |
CN108900306A (en) | A kind of production method and system of wireless router digital certificate | |
CN106101188B (en) | A kind of data processing method of network cloud USB flash disk | |
CN107835162A (en) | The method that software digital permit server signs and issues software digital permissions | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN108400964A (en) | Equipment room encryption connection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180814 |
|
WD01 | Invention patent application deemed withdrawn after publication |