CN108833342A - device authentication method, authentication server and computer readable storage medium - Google Patents
device authentication method, authentication server and computer readable storage medium Download PDFInfo
- Publication number
- CN108833342A CN108833342A CN201810393458.6A CN201810393458A CN108833342A CN 108833342 A CN108833342 A CN 108833342A CN 201810393458 A CN201810393458 A CN 201810393458A CN 108833342 A CN108833342 A CN 108833342A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- cloud service
- service smart
- equipment
- legal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of device authentication method, this method includes:Receive the certification request of the cloud service smart machine of access server forwarding;Obtain the facility information in the certification request;According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access server.The present invention also provides a kind of authentication server and computer readable storage mediums.Device authentication method, authentication server and computer readable storage medium provided by the invention can verify fake equipment or the illegal equipment for entering market, ensure user benefit and usage experience.
Description
Technical field
The present invention relates to block chain technical field more particularly to a kind of device authentication methods, authentication server and computer
Readable storage medium storing program for executing.
Background technique
Cloud service smart machine, such as mine machine (mining machine) are frequent in block chain (Blockchain) network
The electronic equipment that will use.In practical applications, the cloud service smart machine (mountain vallage equipment) for having forgery comes into the market,
The sale of legitimate device is caused to impact, and is likely to influence user and uses and product public praise.Even and legitimate device, also have
Market may be entered by back door, disrupted the market.
Summary of the invention
In view of this, the present invention proposes a kind of device authentication method, authentication server and computer readable storage medium, with
Solve the problems, such as how to prevent that equipment is forged and legitimate device illegally enters market.
Firstly, to achieve the above object, the present invention proposes a kind of device authentication method, it is applied in authentication server, it should
Method includes step:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;
And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access service
Device.
Optionally, this method further includes step when verifying the cloud service smart machine is legitimate device:
The cloud service smart machine is judged whether in inventory record according to the facility information, if in inventory record
In, it indicates that the cloud service smart machine is to enter market by legal means, executes the legal notice of the feedback and connect to described
The step of entering server, if indicating that the cloud service smart machine is not to enter city by legal means not in inventory record
, execute described the step of feeding back illegal notice to the access server.
It optionally, include the facility information of the cloud service smart machine, the facility information packet in the certification request
Include device mac address, device identification, equipment cipher mode.
Optionally, described to judge that the step of whether the cloud service smart machine is the equipment of legal manufacture includes:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is that blacklist is set according to the device mac address or the device identification
It is standby.
Optionally, described to judge whether the step in inventory record includes the cloud service smart machine:
The device mac address or the device identification are verified whether in a predetermined facility registration list,
If so, the cloud service smart machine is determined in inventory record, otherwise for not in inventory record.
In addition, to achieve the above object, it is described the present invention also provides a kind of authentication server, including memory, processor
The device authentication program that can be run on the processor is stored on memory, the device authentication program is by the processor
Following steps are realized when execution:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;
And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access service
Device.
Optionally, step is also realized when the device authentication program is executed by the processor:
When verifying the cloud service smart machine is legitimate device, the cloud service is judged according to the facility information
Whether smart machine is in inventory record, if indicating that the cloud service smart machine is to pass through legal means in inventory record
Into market, described the step of feeding back legal notice to the access server is executed, if not in inventory record, described in expression
Cloud service smart machine is not to enter market by legal means, executes the illegal notice of the feedback to the access server
The step of.
It optionally, include the facility information of the cloud service smart machine, the facility information packet in the certification request
Include device mac address, device identification, equipment cipher mode.
Optionally, described to judge that the step of whether the cloud service smart machine is the equipment of legal manufacture includes:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is that blacklist is set according to the device mac address or the device identification
It is standby.
Optionally, described to judge whether the step in inventory record includes the cloud service smart machine:
The device mac address or the device identification are verified whether in a predetermined facility registration list,
If so, the cloud service smart machine is determined in inventory record, otherwise for not in inventory record.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers
Readable storage medium storing program for executing is stored with device verification system, and the device verification system can be executed by least one processor, so that institute
At least one processor is stated to execute such as the step of above-mentioned device authentication method.
Compared to the prior art, device authentication method proposed by the invention, authentication server and computer-readable storage
Medium can carry out legitimate verification and storage verifying, to verify according to the facility information of cloud service smart machine to it
Fake equipment or the illegal equipment for entering market, reduce impact of the fake equipment to market, guarantee the interests of equipment holder
And usage experience, Maintenance Market order.
Detailed description of the invention
Fig. 1 is the optional application environment schematic diagram of each embodiment one of the invention;
Fig. 2 is the schematic diagram of the optional hardware structure of authentication server one in Fig. 1;
Fig. 3 is the program module schematic diagram of present device verifying system first embodiment and second embodiment;
Fig. 4 is the flow diagram of present device verification method first embodiment;
Fig. 5 is the flow diagram of present device verification method second embodiment.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot
It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims
Protection scope within.
As shown in fig.1, being the optional application environment schematic diagram of each embodiment one of the invention.
In the present embodiment, present invention can apply to include but are not limited to, data center 1, authentication server 2, access
Server 3, cloud service smart machine 4 application environment in.The data center 1, authentication server 2, access server 3, cloud
Data communication is carried out by network between Intelligent Service equipment 4.
Wherein, cloud service smart machine 4 is used to send certification request to the access server 3, and receives the access
The feedback of server 3 is connected with the long of the access server to establish after the legitimacy for verifying itself, is provided for user
The service at the end APP.The cloud service smart machine 4 can be mine machine (mining machine) etc..
Access server 3 is used to receive the certification request that the cloud service smart machine 4 is sent, and is transmitted to the verifying
Server 2 determines whether and the cloud service intelligence then after the feedback for receiving authentication server 2 according to the feedback
Equipment 4 keeps connection.
Authentication server 2 is used to receive the certification request that the access server 3 forwards, and is mentioned according to the data center 1
The rule and list of confession judge whether the cloud service smart machine 4 is legal and whether is put in storage, to be the access service
Whether device 3 keeps connecting with the cloud service smart machine 4 provides foundation.
Data center 1 is used to provide the rule and list for verifying the cloud service smart machine 4 for the authentication server 2
Etc. data, and provide other data that the authentication server 2, access server 3, cloud service smart machine 4 need.
The access server 3, authentication server 2, data center 1 can be computer, be also possible to single network clothes
Business device, the server group of multiple network servers composition or being made of a large amount of hosts or network server based on cloud computing
Cloud.
As shown in fig.2, being the schematic diagram of the optional hardware structure of authentication server 2 one in Fig. 1.In the present embodiment, institute
Stating authentication server 2 may include, but be not limited only to, and connection memory 11, processor 12, net can be in communication with each other by system bus
Network interface 13.It should be pointed out that Fig. 2 illustrates only the authentication server 2 with component 11-13, it should be understood that simultaneously
All components shown realistic are not applied, the implementation that can be substituted is more or less component.
Wherein, the memory 11 includes at least a type of readable storage medium storing program for executing, and the readable storage medium storing program for executing includes
Flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), it is static with
Machine accesses memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable
Read memory (PROM), magnetic storage, disk, CD etc..In some embodiments, the memory 11 can be described test
Demonstrate,prove the internal storage unit of server 2, such as the hard disk or memory of the authentication server 2.In further embodiments, described to deposit
It is hard that reservoir 11 is also possible to the plug-in type being equipped on the External memory equipment of the authentication server 2, such as the authentication server 2
Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card) etc..Certainly, the memory 11 can also both include the internal storage unit of the authentication server 2 or wrap
Include its External memory equipment.In the present embodiment, the memory 11 is installed on the behaviour of the authentication server 2 commonly used in storage
Make system and types of applications software, such as the program code of device verification system 200 etc..In addition, the memory 11 can be with
For temporarily storing the Various types of data that has exported or will export.
The processor 12 can be in some embodiments central processing unit (Central Processing Unit,
CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is commonly used in testing described in control
Demonstrate,prove the overall operation of server 2.In the present embodiment, the processor 12 is for running the program generation stored in the memory 11
Code or processing data, such as run the device verification system 200 etc..
The network interface 13 may include radio network interface or wired network interface, which is commonly used in
Communication connection is established between the authentication server 2 and other electronic equipments.In the present embodiment, the network interface 13 is mainly used
In the authentication server 2 is connected with one or more data centers 1, access server 3 by network, tested described
Data transmission channel and communication link are established between card server 2 and one or more of data centers 1, access server 3
It connects.
So far, oneself is through describing the application environment of each embodiment of the present invention and the hardware configuration and function of relevant device in detail
Energy.In the following, above-mentioned application environment and relevant device will be based on, each embodiment of the invention is proposed.
Firstly, the present invention proposes a kind of device verification system 200.
As shown in fig.3, being the program module of present device verifying system 200 first embodiment and second embodiment
Figure.
In the first embodiment, the device verification system 200 includes a series of meter being stored on memory 11
Calculation machine program instruction, when the computer program instructions are executed by processor 12, equipment that various embodiments of the present invention may be implemented
Verification operation.In some embodiments, the specific operation realized based on the computer program instructions each section, device authentication
System 200 can be divided into one or more modules.For example, the device verification system 200 can be divided in Fig. 3
At receiving module 201, obtain module 202, judgment module 203, feedback module 204.Wherein:
The receiving module 201, the certification request of the cloud service smart machine 4 for receiving the forwarding of access server 3.
Specifically, when the cloud service smart machine 4 needs to request service to the access server 3, it is necessary first to
Certification request is sent to the access server 3, to verify itself legitimacy.It include the cloud service in the certification request
The facility information of smart machine 4, the facility information may include device mac address, device identification, equipment cipher mode etc..
In the present embodiment, can 4 first time of cloud service smart machine to the access server 3 issue connection request when,
Simultaneously send the certification request, after this is proved to be successful, it is subsequent request again connection when, can not have to verify again.It is described to connect
Enter after server 3 receives the certification request, is forwarded to the authentication server 2.
The acquisition module 202, for obtaining the facility information in the certification request.
Specifically, receiving module 201 receive access server 3 forwarding the certification request after, obtain module 202 from
The middle facility information for obtaining the cloud service smart machine 4, i.e. device mac address, device identification, equipment cipher mode etc..
The judgment module 203, for judging whether the cloud service smart machine 4 is legal according to the facility information
The equipment of manufacture.
Specifically, mainly from the following aspects judge the cloud service smart machine 4 whether be legal manufacture equipment:
(1) confirm whether the encryption rule of the cloud service smart machine 4 is correct according to the equipment cipher mode.
(2) whether the device identification for detecting the cloud service smart machine 4 meets predetermined mark rule, described to set
Standby mark can be product ID (Serial Number, SN).
(3) verify whether the cloud service smart machine 4 is the equipment for walking process shipment according to the device identification.
(4) confirm whether the cloud service smart machine 4 is blacklist equipment.For example, verify the device mac address or
Whether person's device identification is in a predetermined blacklist.
The data such as the encryption rule, mark rule, blacklist can be obtained from the data center 1.When above-mentioned four
When kind mode is verified, indicates that the cloud service smart machine 4 is legitimate device, be otherwise illegality equipment, that is, forge and set
It is standby.In other embodiments, standard of any combination in above-mentioned four kinds of modes as the legitimate verification can also be chosen.
The feedback module 204, for when verifying the cloud service smart machine 4 is legitimate device, it to be legal to feed back
It notifies to the access server 3.It is also used to when verifying the cloud service smart machine 4 is illegality equipment, feedback does not conform to
Method is notified to the access server 3.When the access server 3 receives legal notice, with the cloud service smart machine 4
Keep long connection.(or refusal) when the access server 3 receives illegal notice, is disconnected intelligently to set with the cloud service
Standby 4 connection.
Further, in a second embodiment, the judgment module 203 is also used to intelligent when verifying the cloud service
When equipment 4 is legitimate device, further judges whether the cloud service smart machine 4 is put in storage according to the facility information and (exist
In inventory record).
Specifically, judgment module 203 checks that the purpose whether the cloud service smart machine 4 is put in storage is the confirmation cloud clothes
Whether business smart machine 4 is the equipment of regular shipment, that is, enters from legal means the equipment in market.For example, calibration equipment
Whether MAC Address or device identification are in a predetermined facility registration list, if so, determination has been put in storage, otherwise
Not to be put in storage.Similarly, the facility registration list can be obtained from the data center 1.
The feedback module 204 is also used to verify the cloud service smart machine 4 and is legitimate device and has been put in storage
When, legal notice is fed back to the access server 3.And when verify the cloud service smart machine 4 be illegality equipment or
When person is not put in storage, illegal notice is fed back to the access server 3.
In addition, the present invention also proposes a kind of device authentication method, it is applied in the authentication server 2.
As shown in fig.4, being the flow diagram of present device verification method first embodiment.In the present embodiment,
The execution sequence of the step in flow chart shown in Fig. 4 can change according to different requirements, and certain steps can be omitted.It should
Method includes the following steps:
Step S100 receives the certification request for the cloud service smart machine 4 that access server 3 forwards.
Specifically, when the cloud service smart machine 4 needs to request service to the access server 3, it is necessary first to
Certification request is sent to the access server 3, to verify itself legitimacy.It include the cloud service in the certification request
The facility information of smart machine 4, the facility information may include device mac address, device identification, equipment cipher mode etc..
In the present embodiment, can 4 first time of cloud service smart machine to the access server 3 issue connection request when,
Simultaneously send the certification request, after this is proved to be successful, it is subsequent request again connection when, can not have to verify again.It is described to connect
Enter after server 3 receives the certification request, is forwarded to the authentication server 2.
Step S102 obtains the facility information in the certification request.
Specifically, after authentication server 2 receives the certification request that access server 3 forwards, therefrom described in acquisition
The facility information of cloud service smart machine 4, i.e. device mac address, device identification, equipment cipher mode etc..
Step S104, according to the facility information judge the cloud service smart machine 4 whether be legal manufacture equipment.
If legal, S106 is thened follow the steps.If it is illegal, S108 is thened follow the steps.
Specifically, mainly from the following aspects judge the cloud service smart machine 4 whether be legal manufacture equipment:
(1) confirm whether the encryption rule of the cloud service smart machine 4 is correct according to the equipment cipher mode.
(2) whether the device identification for detecting the cloud service smart machine 4 meets predetermined mark rule, described to set
Standby mark can be SN.
(3) verify whether the cloud service smart machine 4 is the equipment for walking process shipment according to the device identification.
(4) confirm whether the cloud service smart machine 4 is blacklist equipment.For example, verify the device mac address or
Whether person's device identification is in a predetermined blacklist.
The data such as the encryption rule, mark rule, blacklist can be obtained from the data center 1.When above-mentioned four
When kind mode is verified, indicates that the cloud service smart machine 4 is legitimate device, be otherwise illegality equipment, that is, forge and set
It is standby.In other embodiments, standard of any combination as verifying in above-mentioned four kinds of modes can also be chosen.
Step S106 feeds back legal notice to the access server 3.
Specifically, when verifying the cloud service smart machine 4 is legitimate device, authentication server 2 is to access service
Device 3 feeds back the legal notice that the cloud service smart machine 4 is legitimate device, then the access server 3 and the cloud service
Smart machine 4 keeps long connection.
Step S108 feeds back illegal notice to the access server 3.
Specifically, when verifying the cloud service smart machine 4 is illegality equipment, authentication server 2 is to access service
Device 3 feeds back the illegal notice that the cloud service smart machine 4 is illegality equipment, then the access server 3, which disconnects, (or refuses
Absolutely) with the connection of the cloud service smart machine 4.In the present embodiment, described to be connected as TCP (Transmission
Control Protocol, transmission control protocol) connection.The access server 3 is by the cloud service smart machine 4 from TCP
It is rejected in connection list.
Device authentication method provided in this embodiment can close it according to the facility information of cloud service smart machine
Method verifying reduces impact of the fake equipment to market to verify fake equipment, guarantees the interests of equipment holder and makes
With experience.
As shown in figure 5, being the flow diagram of the second embodiment of present device verification method.In the present embodiment, institute
It is similar to state the step of part steps of device authentication method are with first embodiment, difference is that this method further includes step
S206。
This approach includes the following steps:
Step S200 receives the certification request for the cloud service smart machine 4 that access server 3 forwards.
Specifically, when the cloud service smart machine 4 needs to request service to the access server 3, it is necessary first to
Certification request is sent to the access server 3, to verify itself legitimacy.It include the cloud service in the certification request
The facility information of smart machine 4, the facility information may include device mac address, device identification, equipment cipher mode etc..
In the present embodiment, can 4 first time of cloud service smart machine to the access server 3 issue connection request when,
Simultaneously send the certification request, after this is proved to be successful, it is subsequent request again connection when, can not have to verify again.It is described to connect
Enter after server 3 receives the certification request, is forwarded to the authentication server 2.
Step S202 obtains the facility information in the certification request.
Specifically, after authentication server 2 receives the certification request that access server 3 forwards, therefrom described in acquisition
The facility information of cloud service smart machine 4, i.e. device mac address, device identification, equipment cipher mode etc..
Step S204, according to the facility information judge the cloud service smart machine 4 whether be legal manufacture equipment.
If legal, S206 is thened follow the steps.If it is illegal, S210 is thened follow the steps.
Specifically, mainly from the following aspects judge the cloud service smart machine 4 whether be legal manufacture equipment:
(1) confirm whether the encryption rule of the cloud service smart machine 4 is correct according to the equipment cipher mode.
(2) whether the device identification for detecting the cloud service smart machine 4 meets predetermined mark rule, described to set
Standby mark can be SN.
(3) verify whether the cloud service smart machine 4 is the equipment for walking process shipment according to the device identification.
(4) confirm whether the cloud service smart machine 4 is blacklist equipment.For example, verify the device mac address or
Whether person's device identification is in a predetermined blacklist.
The data such as the encryption rule, mark rule, blacklist can be obtained from the data center 1.When above-mentioned four
When kind mode is verified, indicates that the cloud service smart machine 4 is legitimate device, be otherwise illegality equipment, that is, forge and set
It is standby.In other embodiments, standard of any combination as verifying in above-mentioned four kinds of modes can also be chosen.
Step S206 judges whether the cloud service smart machine 4 is put in storage (in inventory record according to the facility information
In).If being put in storage, S208 is thened follow the steps.If not being put in storage, S210 is thened follow the steps.
Specifically, authentication server 2 checks that the purpose whether the cloud service smart machine 4 is put in storage is the confirmation cloud clothes
Whether business smart machine 4 is the equipment of regular shipment, that is, enters from legal means the equipment in market.For example, calibration equipment
Whether MAC Address or device identification are in a predetermined facility registration list, if so, determination has been put in storage, otherwise
Not to be put in storage.Similarly, the facility registration list can be obtained from the data center 1.
Step S208 feeds back legal notice to the access server 3.
Specifically, be legitimate device and when being put in storage when verifying the cloud service smart machine 4, authentication server 2 to
Access server 3 feeds back the legal notice that the cloud service smart machine 4 is legitimate device and has been put in storage, the then access service
Device 3 and the cloud service smart machine 4 keep long connection.
Step S210 feeds back illegal notice to the access server 3.
It specifically, is illegality equipment or when not being put in storage, authentication server 2 when verifying the cloud service smart machine 4
The illegal notice that the cloud service smart machine 4 is illegality equipment or is not put in storage, the then access are fed back to access server 3
Server 3 disconnects the connection of (or refusal) with the cloud service smart machine 4.In the present embodiment, described to be connected as TCP company
It connects.The access server 3 rejects the cloud service smart machine 4 from TCP connection list.
Device authentication method provided in this embodiment, can be on the basis of equipment validity be verified, further according to cloud
The facility information of Intelligent Service equipment carries out storage verifying to it, to verify fake equipment or illegal setting into market
It is standby, impact of the fake equipment to market is reduced, guarantees the interests and usage experience of equipment holder, Maintenance Market order.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a client (can be mobile phone, computer, verifying
Server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (11)
1. a kind of device authentication method is applied to authentication server, which is characterized in that the method includes the steps:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access server.
2. device authentication method as described in claim 1, which is characterized in that this method is intelligently set verifying the cloud service
It further include step when for being legitimate device:
According to the facility information judge the cloud service smart machine whether in inventory record, if in inventory record, table
Show that the cloud service smart machine is to enter market by legal means, executes the legal notice of the feedback to the access service
The step of device, executes if indicating that the cloud service smart machine is not to enter market by legal means not in inventory record
The step of illegal notice of feedback to access server.
3. device authentication method as claimed in claim 1 or 2, which is characterized in that taken in the certification request comprising the cloud
The facility information of business smart machine, the facility information includes device mac address, device identification, equipment cipher mode.
4. device authentication method as claimed in claim 3, which is characterized in that described whether to judge the cloud service smart machine
For legal manufacture equipment the step of include:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is blacklist equipment according to the device mac address or the device identification.
5. device authentication method as claimed in claim 2, which is characterized in that described whether to judge the cloud service smart machine
Step in inventory record includes:
The device mac address or the device identification are verified whether in a predetermined facility registration list, if so,
The cloud service smart machine is then determined in inventory record, otherwise for not in inventory record.
6. a kind of authentication server, the authentication server includes memory, processor, which is characterized in that on the memory
It is stored with the device authentication program that can be run on the processor, it is real when the device authentication program is executed by the processor
Existing following steps:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access server.
7. authentication server as claimed in claim 6, which is characterized in that the device authentication program is executed by the processor
When also realize step:
When verifying the cloud service smart machine is legitimate device, the cloud service intelligence is judged according to the facility information
Whether equipment is in inventory record, if indicating that the cloud service smart machine is entered by legal means in inventory record
Market executes described the step of feeding back legal notice to the access server, if indicating the cloud clothes not in inventory record
Business smart machine is not to enter market by legal means, executes the step of the illegal notice of the feedback to the access server
Suddenly.
8. authentication server as claimed in claims 6 or 7, which is characterized in that include the cloud service in the certification request
The facility information of smart machine, the facility information include device mac address, device identification, equipment cipher mode.
9. authentication server as claimed in claim 8, which is characterized in that it is described judge the cloud service smart machine whether be
The step of equipment of legal manufacture includes:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is blacklist equipment according to the device mac address or the device identification.
10. authentication server as claimed in claim 7, which is characterized in that described whether to judge the cloud service smart machine
Step in inventory record includes:
The device mac address or the device identification are verified whether in a predetermined facility registration list, if so,
The cloud service smart machine is then determined in inventory record, otherwise for not in inventory record.
11. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has device authentication
Program, the device authentication program can be executed by least one processor, so that at least one described processor executes such as right
It is required that described in any one of 1-5 the step of device authentication method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810393458.6A CN108833342A (en) | 2018-04-27 | 2018-04-27 | device authentication method, authentication server and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810393458.6A CN108833342A (en) | 2018-04-27 | 2018-04-27 | device authentication method, authentication server and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108833342A true CN108833342A (en) | 2018-11-16 |
Family
ID=64155615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810393458.6A Pending CN108833342A (en) | 2018-04-27 | 2018-04-27 | device authentication method, authentication server and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833342A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617895A (en) * | 2018-12-27 | 2019-04-12 | 东莞见达信息技术有限公司 | Access safety control method and system |
CN113438261A (en) * | 2020-03-23 | 2021-09-24 | 未来穿戴技术有限公司 | Connection method and device of wearable massage instrument, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101980233A (en) * | 2010-10-15 | 2011-02-23 | 上海聚力传媒技术有限公司 | Method and equipment for authenticating service based on equipment identifier |
US20150067777A1 (en) * | 2013-09-04 | 2015-03-05 | Facebook, Inc. | Systems and methods for authenticating nodes |
CN106856497A (en) * | 2015-12-09 | 2017-06-16 | 北京奇虎科技有限公司 | The binding method and device of a kind of mobile device and accessory |
-
2018
- 2018-04-27 CN CN201810393458.6A patent/CN108833342A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101980233A (en) * | 2010-10-15 | 2011-02-23 | 上海聚力传媒技术有限公司 | Method and equipment for authenticating service based on equipment identifier |
US20150067777A1 (en) * | 2013-09-04 | 2015-03-05 | Facebook, Inc. | Systems and methods for authenticating nodes |
CN106856497A (en) * | 2015-12-09 | 2017-06-16 | 北京奇虎科技有限公司 | The binding method and device of a kind of mobile device and accessory |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617895A (en) * | 2018-12-27 | 2019-04-12 | 东莞见达信息技术有限公司 | Access safety control method and system |
CN113438261A (en) * | 2020-03-23 | 2021-09-24 | 未来穿戴技术有限公司 | Connection method and device of wearable massage instrument, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110602096B (en) | Data processing method, device, storage medium and equipment in block chain network | |
CN103905194B (en) | Identity traceability authentication method and system | |
US20080301444A1 (en) | Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message | |
US11533625B2 (en) | Authentication method and network device | |
CN104052775B (en) | Right management method, device and the system of a kind of cloud platform service | |
CN106302346A (en) | The safety certifying method of API Calls, device, system | |
JP6880055B2 (en) | Message anti-counterfeiting implementation method and device | |
CN109889469B (en) | Short message verification method, device, storage medium, short message verification system and terminal | |
CN111490981A (en) | Access management method and device, bastion machine and readable storage medium | |
CN111461720B (en) | Identity verification method and device based on blockchain, storage medium and electronic equipment | |
CN104079562A (en) | Safety authentication method based on payment terminal and related device | |
CN112615854B (en) | Terminal access control method, device, access server and storage medium | |
EP1561301B1 (en) | Software integrity test in a mobile telephone | |
CN113259429A (en) | Session keeping control method, device, computer equipment and medium | |
CN109951437A (en) | Safety certifying method, device and server based on recognition of face | |
CN108833342A (en) | device authentication method, authentication server and computer readable storage medium | |
CN110855688B (en) | Block chain information processing method and related equipment | |
CN112651044B (en) | Business transaction method, system and storage medium based on block chain technology | |
CN105812380A (en) | Verification method and device | |
CN101257518B (en) | Method and system for preventing lawless ordering without through charging gateway in WAP platform | |
CN108574658B (en) | Application login method and device | |
CN103812859A (en) | Network admission method, terminal admission method, network admission device and terminal | |
CN108462672A (en) | A kind of authentication protection method and system of reply network attack | |
CN112541820A (en) | Digital asset management method, device, computer equipment and readable storage medium | |
CN114554251B (en) | Multimedia data requesting method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181116 |
|
RJ01 | Rejection of invention patent application after publication |