CN108833342A - device authentication method, authentication server and computer readable storage medium - Google Patents

device authentication method, authentication server and computer readable storage medium Download PDF

Info

Publication number
CN108833342A
CN108833342A CN201810393458.6A CN201810393458A CN108833342A CN 108833342 A CN108833342 A CN 108833342A CN 201810393458 A CN201810393458 A CN 201810393458A CN 108833342 A CN108833342 A CN 108833342A
Authority
CN
China
Prior art keywords
smart machine
cloud service
service smart
equipment
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810393458.6A
Other languages
Chinese (zh)
Inventor
朱秀军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN201810393458.6A priority Critical patent/CN108833342A/en
Publication of CN108833342A publication Critical patent/CN108833342A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of device authentication method, this method includes:Receive the certification request of the cloud service smart machine of access server forwarding;Obtain the facility information in the certification request;According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access server.The present invention also provides a kind of authentication server and computer readable storage mediums.Device authentication method, authentication server and computer readable storage medium provided by the invention can verify fake equipment or the illegal equipment for entering market, ensure user benefit and usage experience.

Description

Device authentication method, authentication server and computer readable storage medium
Technical field
The present invention relates to block chain technical field more particularly to a kind of device authentication methods, authentication server and computer Readable storage medium storing program for executing.
Background technique
Cloud service smart machine, such as mine machine (mining machine) are frequent in block chain (Blockchain) network The electronic equipment that will use.In practical applications, the cloud service smart machine (mountain vallage equipment) for having forgery comes into the market, The sale of legitimate device is caused to impact, and is likely to influence user and uses and product public praise.Even and legitimate device, also have Market may be entered by back door, disrupted the market.
Summary of the invention
In view of this, the present invention proposes a kind of device authentication method, authentication server and computer readable storage medium, with Solve the problems, such as how to prevent that equipment is forged and legitimate device illegally enters market.
Firstly, to achieve the above object, the present invention proposes a kind of device authentication method, it is applied in authentication server, it should Method includes step:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server; And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access service Device.
Optionally, this method further includes step when verifying the cloud service smart machine is legitimate device:
The cloud service smart machine is judged whether in inventory record according to the facility information, if in inventory record In, it indicates that the cloud service smart machine is to enter market by legal means, executes the legal notice of the feedback and connect to described The step of entering server, if indicating that the cloud service smart machine is not to enter city by legal means not in inventory record , execute described the step of feeding back illegal notice to the access server.
It optionally, include the facility information of the cloud service smart machine, the facility information packet in the certification request Include device mac address, device identification, equipment cipher mode.
Optionally, described to judge that the step of whether the cloud service smart machine is the equipment of legal manufacture includes:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is that blacklist is set according to the device mac address or the device identification It is standby.
Optionally, described to judge whether the step in inventory record includes the cloud service smart machine:
The device mac address or the device identification are verified whether in a predetermined facility registration list, If so, the cloud service smart machine is determined in inventory record, otherwise for not in inventory record.
In addition, to achieve the above object, it is described the present invention also provides a kind of authentication server, including memory, processor The device authentication program that can be run on the processor is stored on memory, the device authentication program is by the processor Following steps are realized when execution:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server; And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access service Device.
Optionally, step is also realized when the device authentication program is executed by the processor:
When verifying the cloud service smart machine is legitimate device, the cloud service is judged according to the facility information Whether smart machine is in inventory record, if indicating that the cloud service smart machine is to pass through legal means in inventory record Into market, described the step of feeding back legal notice to the access server is executed, if not in inventory record, described in expression Cloud service smart machine is not to enter market by legal means, executes the illegal notice of the feedback to the access server The step of.
It optionally, include the facility information of the cloud service smart machine, the facility information packet in the certification request Include device mac address, device identification, equipment cipher mode.
Optionally, described to judge that the step of whether the cloud service smart machine is the equipment of legal manufacture includes:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is that blacklist is set according to the device mac address or the device identification It is standby.
Optionally, described to judge whether the step in inventory record includes the cloud service smart machine:
The device mac address or the device identification are verified whether in a predetermined facility registration list, If so, the cloud service smart machine is determined in inventory record, otherwise for not in inventory record.
Further, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computers Readable storage medium storing program for executing is stored with device verification system, and the device verification system can be executed by least one processor, so that institute At least one processor is stated to execute such as the step of above-mentioned device authentication method.
Compared to the prior art, device authentication method proposed by the invention, authentication server and computer-readable storage Medium can carry out legitimate verification and storage verifying, to verify according to the facility information of cloud service smart machine to it Fake equipment or the illegal equipment for entering market, reduce impact of the fake equipment to market, guarantee the interests of equipment holder And usage experience, Maintenance Market order.
Detailed description of the invention
Fig. 1 is the optional application environment schematic diagram of each embodiment one of the invention;
Fig. 2 is the schematic diagram of the optional hardware structure of authentication server one in Fig. 1;
Fig. 3 is the program module schematic diagram of present device verifying system first embodiment and second embodiment;
Fig. 4 is the flow diagram of present device verification method first embodiment;
Fig. 5 is the flow diagram of present device verification method second embodiment.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
As shown in fig.1, being the optional application environment schematic diagram of each embodiment one of the invention.
In the present embodiment, present invention can apply to include but are not limited to, data center 1, authentication server 2, access Server 3, cloud service smart machine 4 application environment in.The data center 1, authentication server 2, access server 3, cloud Data communication is carried out by network between Intelligent Service equipment 4.
Wherein, cloud service smart machine 4 is used to send certification request to the access server 3, and receives the access The feedback of server 3 is connected with the long of the access server to establish after the legitimacy for verifying itself, is provided for user The service at the end APP.The cloud service smart machine 4 can be mine machine (mining machine) etc..
Access server 3 is used to receive the certification request that the cloud service smart machine 4 is sent, and is transmitted to the verifying Server 2 determines whether and the cloud service intelligence then after the feedback for receiving authentication server 2 according to the feedback Equipment 4 keeps connection.
Authentication server 2 is used to receive the certification request that the access server 3 forwards, and is mentioned according to the data center 1 The rule and list of confession judge whether the cloud service smart machine 4 is legal and whether is put in storage, to be the access service Whether device 3 keeps connecting with the cloud service smart machine 4 provides foundation.
Data center 1 is used to provide the rule and list for verifying the cloud service smart machine 4 for the authentication server 2 Etc. data, and provide other data that the authentication server 2, access server 3, cloud service smart machine 4 need.
The access server 3, authentication server 2, data center 1 can be computer, be also possible to single network clothes Business device, the server group of multiple network servers composition or being made of a large amount of hosts or network server based on cloud computing Cloud.
As shown in fig.2, being the schematic diagram of the optional hardware structure of authentication server 2 one in Fig. 1.In the present embodiment, institute Stating authentication server 2 may include, but be not limited only to, and connection memory 11, processor 12, net can be in communication with each other by system bus Network interface 13.It should be pointed out that Fig. 2 illustrates only the authentication server 2 with component 11-13, it should be understood that simultaneously All components shown realistic are not applied, the implementation that can be substituted is more or less component.
Wherein, the memory 11 includes at least a type of readable storage medium storing program for executing, and the readable storage medium storing program for executing includes Flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), it is static with Machine accesses memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable Read memory (PROM), magnetic storage, disk, CD etc..In some embodiments, the memory 11 can be described test Demonstrate,prove the internal storage unit of server 2, such as the hard disk or memory of the authentication server 2.In further embodiments, described to deposit It is hard that reservoir 11 is also possible to the plug-in type being equipped on the External memory equipment of the authentication server 2, such as the authentication server 2 Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, the memory 11 can also both include the internal storage unit of the authentication server 2 or wrap Include its External memory equipment.In the present embodiment, the memory 11 is installed on the behaviour of the authentication server 2 commonly used in storage Make system and types of applications software, such as the program code of device verification system 200 etc..In addition, the memory 11 can be with For temporarily storing the Various types of data that has exported or will export.
The processor 12 can be in some embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is commonly used in testing described in control Demonstrate,prove the overall operation of server 2.In the present embodiment, the processor 12 is for running the program generation stored in the memory 11 Code or processing data, such as run the device verification system 200 etc..
The network interface 13 may include radio network interface or wired network interface, which is commonly used in Communication connection is established between the authentication server 2 and other electronic equipments.In the present embodiment, the network interface 13 is mainly used In the authentication server 2 is connected with one or more data centers 1, access server 3 by network, tested described Data transmission channel and communication link are established between card server 2 and one or more of data centers 1, access server 3 It connects.
So far, oneself is through describing the application environment of each embodiment of the present invention and the hardware configuration and function of relevant device in detail Energy.In the following, above-mentioned application environment and relevant device will be based on, each embodiment of the invention is proposed.
Firstly, the present invention proposes a kind of device verification system 200.
As shown in fig.3, being the program module of present device verifying system 200 first embodiment and second embodiment Figure.
In the first embodiment, the device verification system 200 includes a series of meter being stored on memory 11 Calculation machine program instruction, when the computer program instructions are executed by processor 12, equipment that various embodiments of the present invention may be implemented Verification operation.In some embodiments, the specific operation realized based on the computer program instructions each section, device authentication System 200 can be divided into one or more modules.For example, the device verification system 200 can be divided in Fig. 3 At receiving module 201, obtain module 202, judgment module 203, feedback module 204.Wherein:
The receiving module 201, the certification request of the cloud service smart machine 4 for receiving the forwarding of access server 3.
Specifically, when the cloud service smart machine 4 needs to request service to the access server 3, it is necessary first to Certification request is sent to the access server 3, to verify itself legitimacy.It include the cloud service in the certification request The facility information of smart machine 4, the facility information may include device mac address, device identification, equipment cipher mode etc.. In the present embodiment, can 4 first time of cloud service smart machine to the access server 3 issue connection request when, Simultaneously send the certification request, after this is proved to be successful, it is subsequent request again connection when, can not have to verify again.It is described to connect Enter after server 3 receives the certification request, is forwarded to the authentication server 2.
The acquisition module 202, for obtaining the facility information in the certification request.
Specifically, receiving module 201 receive access server 3 forwarding the certification request after, obtain module 202 from The middle facility information for obtaining the cloud service smart machine 4, i.e. device mac address, device identification, equipment cipher mode etc..
The judgment module 203, for judging whether the cloud service smart machine 4 is legal according to the facility information The equipment of manufacture.
Specifically, mainly from the following aspects judge the cloud service smart machine 4 whether be legal manufacture equipment:
(1) confirm whether the encryption rule of the cloud service smart machine 4 is correct according to the equipment cipher mode.
(2) whether the device identification for detecting the cloud service smart machine 4 meets predetermined mark rule, described to set Standby mark can be product ID (Serial Number, SN).
(3) verify whether the cloud service smart machine 4 is the equipment for walking process shipment according to the device identification.
(4) confirm whether the cloud service smart machine 4 is blacklist equipment.For example, verify the device mac address or Whether person's device identification is in a predetermined blacklist.
The data such as the encryption rule, mark rule, blacklist can be obtained from the data center 1.When above-mentioned four When kind mode is verified, indicates that the cloud service smart machine 4 is legitimate device, be otherwise illegality equipment, that is, forge and set It is standby.In other embodiments, standard of any combination in above-mentioned four kinds of modes as the legitimate verification can also be chosen.
The feedback module 204, for when verifying the cloud service smart machine 4 is legitimate device, it to be legal to feed back It notifies to the access server 3.It is also used to when verifying the cloud service smart machine 4 is illegality equipment, feedback does not conform to Method is notified to the access server 3.When the access server 3 receives legal notice, with the cloud service smart machine 4 Keep long connection.(or refusal) when the access server 3 receives illegal notice, is disconnected intelligently to set with the cloud service Standby 4 connection.
Further, in a second embodiment, the judgment module 203 is also used to intelligent when verifying the cloud service When equipment 4 is legitimate device, further judges whether the cloud service smart machine 4 is put in storage according to the facility information and (exist In inventory record).
Specifically, judgment module 203 checks that the purpose whether the cloud service smart machine 4 is put in storage is the confirmation cloud clothes Whether business smart machine 4 is the equipment of regular shipment, that is, enters from legal means the equipment in market.For example, calibration equipment Whether MAC Address or device identification are in a predetermined facility registration list, if so, determination has been put in storage, otherwise Not to be put in storage.Similarly, the facility registration list can be obtained from the data center 1.
The feedback module 204 is also used to verify the cloud service smart machine 4 and is legitimate device and has been put in storage When, legal notice is fed back to the access server 3.And when verify the cloud service smart machine 4 be illegality equipment or When person is not put in storage, illegal notice is fed back to the access server 3.
In addition, the present invention also proposes a kind of device authentication method, it is applied in the authentication server 2.
As shown in fig.4, being the flow diagram of present device verification method first embodiment.In the present embodiment, The execution sequence of the step in flow chart shown in Fig. 4 can change according to different requirements, and certain steps can be omitted.It should Method includes the following steps:
Step S100 receives the certification request for the cloud service smart machine 4 that access server 3 forwards.
Specifically, when the cloud service smart machine 4 needs to request service to the access server 3, it is necessary first to Certification request is sent to the access server 3, to verify itself legitimacy.It include the cloud service in the certification request The facility information of smart machine 4, the facility information may include device mac address, device identification, equipment cipher mode etc.. In the present embodiment, can 4 first time of cloud service smart machine to the access server 3 issue connection request when, Simultaneously send the certification request, after this is proved to be successful, it is subsequent request again connection when, can not have to verify again.It is described to connect Enter after server 3 receives the certification request, is forwarded to the authentication server 2.
Step S102 obtains the facility information in the certification request.
Specifically, after authentication server 2 receives the certification request that access server 3 forwards, therefrom described in acquisition The facility information of cloud service smart machine 4, i.e. device mac address, device identification, equipment cipher mode etc..
Step S104, according to the facility information judge the cloud service smart machine 4 whether be legal manufacture equipment. If legal, S106 is thened follow the steps.If it is illegal, S108 is thened follow the steps.
Specifically, mainly from the following aspects judge the cloud service smart machine 4 whether be legal manufacture equipment:
(1) confirm whether the encryption rule of the cloud service smart machine 4 is correct according to the equipment cipher mode.
(2) whether the device identification for detecting the cloud service smart machine 4 meets predetermined mark rule, described to set Standby mark can be SN.
(3) verify whether the cloud service smart machine 4 is the equipment for walking process shipment according to the device identification.
(4) confirm whether the cloud service smart machine 4 is blacklist equipment.For example, verify the device mac address or Whether person's device identification is in a predetermined blacklist.
The data such as the encryption rule, mark rule, blacklist can be obtained from the data center 1.When above-mentioned four When kind mode is verified, indicates that the cloud service smart machine 4 is legitimate device, be otherwise illegality equipment, that is, forge and set It is standby.In other embodiments, standard of any combination as verifying in above-mentioned four kinds of modes can also be chosen.
Step S106 feeds back legal notice to the access server 3.
Specifically, when verifying the cloud service smart machine 4 is legitimate device, authentication server 2 is to access service Device 3 feeds back the legal notice that the cloud service smart machine 4 is legitimate device, then the access server 3 and the cloud service Smart machine 4 keeps long connection.
Step S108 feeds back illegal notice to the access server 3.
Specifically, when verifying the cloud service smart machine 4 is illegality equipment, authentication server 2 is to access service Device 3 feeds back the illegal notice that the cloud service smart machine 4 is illegality equipment, then the access server 3, which disconnects, (or refuses Absolutely) with the connection of the cloud service smart machine 4.In the present embodiment, described to be connected as TCP (Transmission Control Protocol, transmission control protocol) connection.The access server 3 is by the cloud service smart machine 4 from TCP It is rejected in connection list.
Device authentication method provided in this embodiment can close it according to the facility information of cloud service smart machine Method verifying reduces impact of the fake equipment to market to verify fake equipment, guarantees the interests of equipment holder and makes With experience.
As shown in figure 5, being the flow diagram of the second embodiment of present device verification method.In the present embodiment, institute It is similar to state the step of part steps of device authentication method are with first embodiment, difference is that this method further includes step S206。
This approach includes the following steps:
Step S200 receives the certification request for the cloud service smart machine 4 that access server 3 forwards.
Specifically, when the cloud service smart machine 4 needs to request service to the access server 3, it is necessary first to Certification request is sent to the access server 3, to verify itself legitimacy.It include the cloud service in the certification request The facility information of smart machine 4, the facility information may include device mac address, device identification, equipment cipher mode etc.. In the present embodiment, can 4 first time of cloud service smart machine to the access server 3 issue connection request when, Simultaneously send the certification request, after this is proved to be successful, it is subsequent request again connection when, can not have to verify again.It is described to connect Enter after server 3 receives the certification request, is forwarded to the authentication server 2.
Step S202 obtains the facility information in the certification request.
Specifically, after authentication server 2 receives the certification request that access server 3 forwards, therefrom described in acquisition The facility information of cloud service smart machine 4, i.e. device mac address, device identification, equipment cipher mode etc..
Step S204, according to the facility information judge the cloud service smart machine 4 whether be legal manufacture equipment. If legal, S206 is thened follow the steps.If it is illegal, S210 is thened follow the steps.
Specifically, mainly from the following aspects judge the cloud service smart machine 4 whether be legal manufacture equipment:
(1) confirm whether the encryption rule of the cloud service smart machine 4 is correct according to the equipment cipher mode.
(2) whether the device identification for detecting the cloud service smart machine 4 meets predetermined mark rule, described to set Standby mark can be SN.
(3) verify whether the cloud service smart machine 4 is the equipment for walking process shipment according to the device identification.
(4) confirm whether the cloud service smart machine 4 is blacklist equipment.For example, verify the device mac address or Whether person's device identification is in a predetermined blacklist.
The data such as the encryption rule, mark rule, blacklist can be obtained from the data center 1.When above-mentioned four When kind mode is verified, indicates that the cloud service smart machine 4 is legitimate device, be otherwise illegality equipment, that is, forge and set It is standby.In other embodiments, standard of any combination as verifying in above-mentioned four kinds of modes can also be chosen.
Step S206 judges whether the cloud service smart machine 4 is put in storage (in inventory record according to the facility information In).If being put in storage, S208 is thened follow the steps.If not being put in storage, S210 is thened follow the steps.
Specifically, authentication server 2 checks that the purpose whether the cloud service smart machine 4 is put in storage is the confirmation cloud clothes Whether business smart machine 4 is the equipment of regular shipment, that is, enters from legal means the equipment in market.For example, calibration equipment Whether MAC Address or device identification are in a predetermined facility registration list, if so, determination has been put in storage, otherwise Not to be put in storage.Similarly, the facility registration list can be obtained from the data center 1.
Step S208 feeds back legal notice to the access server 3.
Specifically, be legitimate device and when being put in storage when verifying the cloud service smart machine 4, authentication server 2 to Access server 3 feeds back the legal notice that the cloud service smart machine 4 is legitimate device and has been put in storage, the then access service Device 3 and the cloud service smart machine 4 keep long connection.
Step S210 feeds back illegal notice to the access server 3.
It specifically, is illegality equipment or when not being put in storage, authentication server 2 when verifying the cloud service smart machine 4 The illegal notice that the cloud service smart machine 4 is illegality equipment or is not put in storage, the then access are fed back to access server 3 Server 3 disconnects the connection of (or refusal) with the cloud service smart machine 4.In the present embodiment, described to be connected as TCP company It connects.The access server 3 rejects the cloud service smart machine 4 from TCP connection list.
Device authentication method provided in this embodiment, can be on the basis of equipment validity be verified, further according to cloud The facility information of Intelligent Service equipment carries out storage verifying to it, to verify fake equipment or illegal setting into market It is standby, impact of the fake equipment to market is reduced, guarantees the interests and usage experience of equipment holder, Maintenance Market order.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a client (can be mobile phone, computer, verifying Server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (11)

1. a kind of device authentication method is applied to authentication server, which is characterized in that the method includes the steps:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access server.
2. device authentication method as described in claim 1, which is characterized in that this method is intelligently set verifying the cloud service It further include step when for being legitimate device:
According to the facility information judge the cloud service smart machine whether in inventory record, if in inventory record, table Show that the cloud service smart machine is to enter market by legal means, executes the legal notice of the feedback to the access service The step of device, executes if indicating that the cloud service smart machine is not to enter market by legal means not in inventory record The step of illegal notice of feedback to access server.
3. device authentication method as claimed in claim 1 or 2, which is characterized in that taken in the certification request comprising the cloud The facility information of business smart machine, the facility information includes device mac address, device identification, equipment cipher mode.
4. device authentication method as claimed in claim 3, which is characterized in that described whether to judge the cloud service smart machine For legal manufacture equipment the step of include:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is blacklist equipment according to the device mac address or the device identification.
5. device authentication method as claimed in claim 2, which is characterized in that described whether to judge the cloud service smart machine Step in inventory record includes:
The device mac address or the device identification are verified whether in a predetermined facility registration list, if so, The cloud service smart machine is then determined in inventory record, otherwise for not in inventory record.
6. a kind of authentication server, the authentication server includes memory, processor, which is characterized in that on the memory It is stored with the device authentication program that can be run on the processor, it is real when the device authentication program is executed by the processor Existing following steps:
Receive the certification request of the cloud service smart machine of access server forwarding;
Obtain the facility information in the certification request;
According to the facility information judge the cloud service smart machine whether be legal manufacture equipment;
When verifying the cloud service smart machine is legitimate device, legal notice is fed back to the access server;And
When verifying the cloud service smart machine is illegality equipment, illegal notice is fed back to the access server.
7. authentication server as claimed in claim 6, which is characterized in that the device authentication program is executed by the processor When also realize step:
When verifying the cloud service smart machine is legitimate device, the cloud service intelligence is judged according to the facility information Whether equipment is in inventory record, if indicating that the cloud service smart machine is entered by legal means in inventory record Market executes described the step of feeding back legal notice to the access server, if indicating the cloud clothes not in inventory record Business smart machine is not to enter market by legal means, executes the step of the illegal notice of the feedback to the access server Suddenly.
8. authentication server as claimed in claims 6 or 7, which is characterized in that include the cloud service in the certification request The facility information of smart machine, the facility information include device mac address, device identification, equipment cipher mode.
9. authentication server as claimed in claim 8, which is characterized in that it is described judge the cloud service smart machine whether be The step of equipment of legal manufacture includes:
Confirm whether the encryption rule of the cloud service smart machine is correct according to the equipment cipher mode;
Whether the device identification for detecting the cloud service smart machine meets predetermined mark rule;
Verify whether the cloud service smart machine is the equipment for walking process shipment according to the device identification;And/or
Confirm whether the cloud service smart machine is blacklist equipment according to the device mac address or the device identification.
10. authentication server as claimed in claim 7, which is characterized in that described whether to judge the cloud service smart machine Step in inventory record includes:
The device mac address or the device identification are verified whether in a predetermined facility registration list, if so, The cloud service smart machine is then determined in inventory record, otherwise for not in inventory record.
11. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has device authentication Program, the device authentication program can be executed by least one processor, so that at least one described processor executes such as right It is required that described in any one of 1-5 the step of device authentication method.
CN201810393458.6A 2018-04-27 2018-04-27 device authentication method, authentication server and computer readable storage medium Pending CN108833342A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810393458.6A CN108833342A (en) 2018-04-27 2018-04-27 device authentication method, authentication server and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810393458.6A CN108833342A (en) 2018-04-27 2018-04-27 device authentication method, authentication server and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108833342A true CN108833342A (en) 2018-11-16

Family

ID=64155615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810393458.6A Pending CN108833342A (en) 2018-04-27 2018-04-27 device authentication method, authentication server and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108833342A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617895A (en) * 2018-12-27 2019-04-12 东莞见达信息技术有限公司 Access safety control method and system
CN113438261A (en) * 2020-03-23 2021-09-24 未来穿戴技术有限公司 Connection method and device of wearable massage instrument, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980233A (en) * 2010-10-15 2011-02-23 上海聚力传媒技术有限公司 Method and equipment for authenticating service based on equipment identifier
US20150067777A1 (en) * 2013-09-04 2015-03-05 Facebook, Inc. Systems and methods for authenticating nodes
CN106856497A (en) * 2015-12-09 2017-06-16 北京奇虎科技有限公司 The binding method and device of a kind of mobile device and accessory

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980233A (en) * 2010-10-15 2011-02-23 上海聚力传媒技术有限公司 Method and equipment for authenticating service based on equipment identifier
US20150067777A1 (en) * 2013-09-04 2015-03-05 Facebook, Inc. Systems and methods for authenticating nodes
CN106856497A (en) * 2015-12-09 2017-06-16 北京奇虎科技有限公司 The binding method and device of a kind of mobile device and accessory

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617895A (en) * 2018-12-27 2019-04-12 东莞见达信息技术有限公司 Access safety control method and system
CN113438261A (en) * 2020-03-23 2021-09-24 未来穿戴技术有限公司 Connection method and device of wearable massage instrument, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110602096B (en) Data processing method, device, storage medium and equipment in block chain network
CN103905194B (en) Identity traceability authentication method and system
US20080301444A1 (en) Apparatus and Method for Providing Personal Information Sharing Service Using Signed Callback Url Message
US11533625B2 (en) Authentication method and network device
CN104052775B (en) Right management method, device and the system of a kind of cloud platform service
CN106302346A (en) The safety certifying method of API Calls, device, system
JP6880055B2 (en) Message anti-counterfeiting implementation method and device
CN109889469B (en) Short message verification method, device, storage medium, short message verification system and terminal
CN111490981A (en) Access management method and device, bastion machine and readable storage medium
CN111461720B (en) Identity verification method and device based on blockchain, storage medium and electronic equipment
CN104079562A (en) Safety authentication method based on payment terminal and related device
CN112615854B (en) Terminal access control method, device, access server and storage medium
EP1561301B1 (en) Software integrity test in a mobile telephone
CN113259429A (en) Session keeping control method, device, computer equipment and medium
CN109951437A (en) Safety certifying method, device and server based on recognition of face
CN108833342A (en) device authentication method, authentication server and computer readable storage medium
CN110855688B (en) Block chain information processing method and related equipment
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN105812380A (en) Verification method and device
CN101257518B (en) Method and system for preventing lawless ordering without through charging gateway in WAP platform
CN108574658B (en) Application login method and device
CN103812859A (en) Network admission method, terminal admission method, network admission device and terminal
CN108462672A (en) A kind of authentication protection method and system of reply network attack
CN112541820A (en) Digital asset management method, device, computer equipment and readable storage medium
CN114554251B (en) Multimedia data requesting method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116

RJ01 Rejection of invention patent application after publication