CN109510798A - Method for authenticating and control equipment, middle control service equipment - Google Patents
Method for authenticating and control equipment, middle control service equipment Download PDFInfo
- Publication number
- CN109510798A CN109510798A CN201710828196.7A CN201710828196A CN109510798A CN 109510798 A CN109510798 A CN 109510798A CN 201710828196 A CN201710828196 A CN 201710828196A CN 109510798 A CN109510798 A CN 109510798A
- Authority
- CN
- China
- Prior art keywords
- equipment
- key
- current time
- service equipment
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to a kind of method for authenticating, which comprises controls service equipment in foundation and controls the network connection between equipment;Equipment is controlled according to current time stamp and corresponding to the control password of the middle control service equipment, first key is generated using Encryption Algorithm, and the first key is sent to the middle control service equipment;The middle control service equipment receives the first key, and according to current time stamp and it is stored in the middle control password for controlling service equipment, second key is generated using the Encryption Algorithm as control equipment, received first key is compared with the second key generated to judge whether authentication succeeds.The present invention also provides control service equipment in one kind.The method for authenticating, middle control service equipment, control equipment, key is based on current time stamp and control password generates, and has higher safety.
Description
Technical field
The present invention relates to middle control field more particularly to a kind of control equipment, middle control service equipment and its network connection authentication
Method.
Background technique
Current most middle control service equipment (for example, projector) is all with network module, such as LAN or Wi-Fi module, in
Control service equipment may be coupled to local area network or internet;In order to easy to control, the middle control service equipment of networking supports network control
Agreement processed that is, can be with the equipment (such as computer, plate or cell phone apparatus) of local area network or internet such as the PJLINK agreement of standard
Corresponding middle control service equipment is connected and controlled by network protocol TCP/UPD etc..
In order to guarantee network security, the safety of service equipment is controlled in protection, can generally be increased in Network Control Protocol
Authentication mechanism could be connected and be controlled by the equipment of middle control service equipment authorization and control service equipment in this.Existing authentication machine
System generallys use control password and is authenticated, but this authentication mechanism is easy to be stolen there are password leads to authentication security not
It is high.
Summary of the invention
The present invention provides a kind of control equipment, middle control service equipment and its network connection method for authenticating.
A kind of method for authenticating is applied to middle control service equipment, the middle control service equipment and control equipment communication connection, institute
The method of stating includes:
Establish the network connection with the control equipment;
The authentication order from the control equipment is received, the authentication order includes first key;
The second key is generated according to current time stamp and control password;And
Compare it is described authentication order in first key and generate the second key it is whether consistent, if unanimously, authenticate at
Function, if inconsistent, failed authentication.
In one embodiment, the first key and the second key are generated using a kind of following Encryption Algorithm: mark
Quasi- MD5, crc32, SHA.
In one embodiment, the method also includes: if failed authentication, disconnect with it is described control equipment network connect
It connects.
In one embodiment, before receiving the authentication order, the method also includes: generate current time
Stamp saves the current time stamp in the middle control service equipment, and sends the current time stamp to the control equipment.
In one embodiment, the authentication order includes the current time stamp generated in the control equipment, institute
State method further include: if the middle control service equipment can obtain its current time, compare the current time stamp in authentication order
With it is described it is middle control service equipment current time, if the current time stamp be more than preset duration range, failed authentication;If institute
Its current time cannot be obtained by stating middle control service equipment, then compare current time stamp in authentication order and last authentication when
Between stab, if the two is consistent, failed authentication.
Service equipment is controlled in one kind, the middle control service equipment includes the first authenticating unit and first network module, wherein
First authenticating unit includes the first receiving module, the first sending module, authentication execution module, and first receiving module is used
In receiving authentication order from control equipment by the first network module, the authentication order includes first key, the mirror
It weighs execution module to be used to generate the second key according to control password and current time stamp, and according to the first key and described the
Whether two keys are unanimously authenticated, and first sending module is for sending authenticating result to controlling equipment.
In one embodiment, the middle control service equipment is projector.
In one embodiment, the authentication order includes the current time stamp generated in the control equipment, institute
It states authentication execution module to be also used to further be authenticated according to the current time stamp in the authentication order: if the middle control clothes
Business equipment can obtain its current time, compare current time stamp in authentication order and the middle control service equipment it is current when
Between, if the current time stamp is more than preset duration range, failed authentication;If the middle control service equipment cannot obtain it and work as
The preceding time compares the timestamp of the current time stamp and last authentication in authentication order, if the two is consistent, failed authentication.
A kind of method for authenticating is applied to control equipment, and the control equipment and middle control service equipment communicate to connect, the side
Method includes:
Establish the network connection with the middle control service equipment;
First key is generated according to current time stamp and the control password corresponding to the middle control service equipment, and sends packet
Authentication order containing the first key is to the middle control service equipment;
Authenticating result is received from the middle control service equipment, if the first key and middle second for controlling service equipment and generating
Key agreement, then authenticating result is to authenticate successfully;If the first key and the second key that middle control service equipment generates are different
It causes, then authenticating result is failed authentication.
In one embodiment, the current time stamp is to be generated by the control equipment or taken from the middle control
Equipment of being engaged in is received.
A kind of method for authenticating, comprising:
Service equipment is controlled in foundation and controls the network connection between equipment;
Equipment is controlled according to current time stamp and corresponding to the control password of the middle control service equipment, using Encryption Algorithm
First key is generated, and the first key is sent to the middle control service equipment;
The control equipment receives the first key, and according to current time stamp and is stored in the middle control service equipment
Control password, using with control equipment as Encryption Algorithm generate the second key, by received first key and generate
Second key is compared to judge whether authentication succeeds.
In one embodiment, the current time stamp is generated by control equipment or is generated by middle control service equipment.
In one embodiment, if current time stamp generates in the control equipment, the method also includes:
The middle control service equipment compares current time stamp and the middle control service equipment from the control equipment
Current time, if the current time stamp is more than preset duration range, failed authentication.
A kind of control equipment, the control equipment includes the second authenticating unit and the second network module, wherein described second
Authenticating unit includes the second sending module and key production module, and the key production module is used for according to current time stamp and control
Password processed generates first key, then generates authentication order further according to first key, second sending module is for sending mirror
Power order is to the middle control service equipment, and the authentication order includes the first key, and the current time stamp is by the control
Control equipment is generated or is received from the middle control service equipment.
Compared with prior art, the method for authenticating and middle control service equipment, key are based on current time stamp and control
Password generates, and has higher safety.
Detailed description of the invention
Fig. 1 is the frame structure schematic diagram of the network connection right discriminating system of the embodiment of the present invention.
Fig. 2 is the module diagram of the first authenticating unit of the embodiment of the present invention.
Fig. 3 is the module diagram of the second authenticating unit of the embodiment of the present invention.
Fig. 4 is the network connection method for authenticating flow chart of first embodiment of the invention.
Fig. 5 is the network connection method for authenticating flow chart of second embodiment of the invention.
Main element symbol description
Middle control service equipment 1
First processor 10
First memory 12
First authenticating unit 13
First receiving module 130
First sending module 132
Authenticate execution module 134
First network module 14
Control equipment 2
Second processor 20
Second memory 22
Second authenticating unit 23
Second receiving module 230
Second sending module 232
Key production module 234
Second network module 24
The present invention that the following detailed description will be further explained with reference to the above drawings.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
It should be noted that it can be directly on another component when component is referred to as " being fixed on " another component
Or there may also be components placed in the middle.When a component is considered as " connection " another component, it, which can be, is directly connected to
To another component or it may be simultaneously present component placed in the middle.When a component is considered as " being set to " another component, it
It can be and be set up directly on another component or may be simultaneously present component placed in the middle.Term as used herein is " vertical
", " horizontal ", "left", "right" and similar statement for illustrative purposes only.
System embodiment discussed below is only schematical, the division of the module or circuit, only one
Kind logical function partition, there may be another division manner in actual implementation.Furthermore, it is to be understood that one word of " comprising " is not excluded for other lists
Member or step, odd number are not excluded for plural number.The multiple units or device stated in system claims can also be by the same units
Or device is implemented through software or hardware.The first, the second equal words are used to indicate names, and are not offered as any specific
Sequentially.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention
The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term " and or " used herein includes one or more phases
Any and all combinations of the listed item of pass.
Referring to Fig. 1, Fig. 1 is the frame structure schematic diagram of inventive network connection right discriminating system.The network connection mirror
Power system 1000 includes that service equipment 1 and at least one control equipment 2 are controlled at least one.
Middle control service equipment 1 described in the embodiment of the present invention can be any electronic device with network-connectivity, example
Such as projector, printer, household electrical appliance.
Control equipment 2 described in the embodiment of the present invention can be any electricity with data-handling capacity and network-connectivity
Sub-device, such as computer, mobile phone, plate, personal digital assistant (Personal Digital Assistant, PDA) etc..One
Middle control service equipment 1 can be controlled by one or more control equipment 2, to execute under the control of one or more control equipment 2
Specific task;It is one or more of to control that one control equipment 2 also can control control service equipment 1 in one or more
Middle control service equipment 1 executes predetermined operation.
In an example of the present invention, the middle control service equipment 1 be projector, user can by computer, mobile phone,
The control equipment 2 such as plate issues control instruction to control the projector work, to realize remote control or replacement remote
It is operated.
The middle control service equipment 1 includes first processor 10, first memory 12, the first authenticating unit 13 and the first net
Network module 14.
The first memory 12 can be used for storing computer program and/or module, and the first processor 10 passes through fortune
Row executes the computer program and/or module being stored in the first memory 12, and calls and be stored in the first storage
Data in device 12 realize the various functions (such as projection of projector) of the middle control service equipment 1.The first memory
12 can mainly include storing program area and storage data area, wherein storing program area can storage program area, at least one function
Required application program (such as projecting function, printing function of printer of projector etc.) etc.;Storage data area can store root
Created data (such as data for projection, print data etc.) etc. are used according to middle control service equipment 1.In addition, first memory
12 may include high-speed random access memory, can also be hard including nonvolatile memory, such as hard disk, memory, plug-in type
Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card
(Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
The first processor 10 can be central processing unit (Central Processing Unit, CPU), may be used also
To be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
The control centre of the middle control service equipment 1 Deng, the first processor 10, using various interfaces and connection it is entire in
Control the various pieces of service equipment 1.
The middle control service equipment 1 further includes the first authenticating unit 13 and at least one first network module 14.
Wherein, first authenticating unit 13 by the first network module 14 with the control equipment 2 for being communicated
To be authenticated to the network connection between the middle control service equipment 1 and the control equipment 2.In some embodiments, institute
It states the first authenticating unit 13 and generates current time stamp, the control equipment 2 is raw according to the current time stamp, control password encryption
Authentication order is generated at first key, and according to the first key, first authenticating unit 13 is according to from the control
The authentication command analysis of equipment 2 goes out first key, generates further according to the current time stamp and control password for being stored in local
Second key compares the second key of generation to determine whether with the first key from the control equipment 2 received
It authenticates successfully.In some embodiments, the control equipment 2 generates current time stamp, then according to the current time stamp, control
Password encryption processed generates first key, and generates authentication order according to the first key.First authenticating unit, 13 basis
From it is described control equipment 2 and according to the first key generate authentication command analysis go out first key and current time stamp,
Generate the second key further according to the current time stamp and control password, by the second key of generation with receive from described
The first key for controlling equipment 2 is compared to determine whether to authenticate successfully.
The first network module 14 can be wire communication device and be also possible to wireless communication device.It is wherein described wired
Communication device includes communication port, such as universal serial bus (universal serial bus, USB), controller LAN
(Inter- between (Controller area network, CAN), the network connection of serial and/or other standards, integrated circuit
Integrated Circuit, I2C) bus etc..The wireless communication system of any classification, example can be used in the wireless communication device
Such as, bluetooth, infrared ray, Wireless Fidelity (Wireless Fidelity, WiFi), cellular technology, satellite, and broadcast.It is wherein described
Cellular technology may include the mobile communication technologies such as the second generation (2G), the third generation (3G), forth generation (4G) or the 5th generation (5G).
The control equipment 2 includes second processor 20, second memory 22, the second authenticating unit 23 and the second network mould
Block 24.
The second memory 22 can be used for storing computer program and/or module, and the second processor 20 passes through fortune
Row executes the computer program and/or module being stored in the second memory 22, and calls and be stored in the second storage
Data in device 22 realize the various functions (such as projection of projector) of the control equipment 2.The second memory 22 can
It mainly include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function
Application program (such as projecting function, printing function of printer of projector etc.) etc.;Storage data area can be stored according to control
Control equipment 2 uses created data (such as data for projection, print data etc.) etc..In addition, second memory 22 can wrap
High-speed random access memory is included, can also include nonvolatile memory, such as hard disk, memory, plug-in type hard disk, intelligently deposit
Card storage (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card),
At least one disk memory, flush memory device or other volatile solid-state parts.
The second processor 20 can be central processing unit (Central Processing Unit, CPU), may be used also
To be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
It is the control centre of the control equipment 2 Deng, the second processor 20, is entirely controlled and set using various interfaces and connection
Standby 2 various pieces.
The control equipment 2 further includes the second authenticating unit 23 and at least one second network module 24.
Wherein, second authenticating unit 23 is used for through second network module 24 and first authenticating unit 13
Communication is to generate the required first key of authentication.Second authenticating unit 23 is used for raw according to current time stamp and control password
At first key.In some embodiments, the current time stamp is generated by second authenticating unit 23.In other implementations
In example, the current time stamp is generated by first authenticating unit 13 and is then sent to institute by the first network module 14
State the second authenticating unit 23.
Second network module 24 is corresponding with the first network module 14, is the network of same type.In some realities
Apply in example, the middle control service equipment 1 includes one or more first network modules 14, the control equipment 2 including one or
Multiple second network modules 24, one of them second network of at least one first network module 14 and the control equipment 2
24 same type of module.
It will be understood by those skilled in the art that the schematic diagram is only the network connection right discriminating system 1000, middle control
Service equipment 1, the example for controlling equipment 2 are not constituted and are set to network connection right discriminating system 1000, middle control service equipment 1, control
Standby 2 restriction may include components more more or fewer than diagram, perhaps combine certain components or different components, such as
It can also include input-output equipment, display device etc. that the middle control service equipment 1/ controls equipment 2 according to actual needs.It is described
Input-output equipment may include the input equipment of any suitable, including but not limited to, mouse, keyboard, touch screen or contactless
Input, for example, gesture input, voice input etc..The display device can be touching liquid crystal display (Liquid Crystal
Display, LCD), light emitting diode (Light Emitting Diode, LED) display screen, Organic Electricity laser display screen
(Organic Light-Emitting Diode, OLED) or other suitable display screens.
Wherein first authenticating unit 13 and second authenticating unit 23 can respectively include that one can be divided into
Or the computer program of multiple modules, the computer program can be stored in the first memory 12 and second memory 22
In, and can be executed by the first processor 10 and second processor 20.In some embodiments, first authenticating unit
13 and second authenticating unit 23 also may include controller independently of the first processor 10, second processor 20,
Above-mentioned computer program is executed by the controller.
It please refers to shown in Fig. 2, is the module diagram of first authenticating unit 13 of one embodiment of the invention.First mirror
Weighing unit 13 includes the first receiving module 130, the first sending module 132, authentication execution module 134.First receiving module
130 for receiving authentication order, the authentication order packet from second authenticating unit 23 by the first network module 14
Include the first key.The authentication execution module 134 is used to be authenticated according to authentication order.Described first sends mould
Block 132 is for sending authenticating result to second authenticating unit 23.
It in one embodiment, further include current time stamp from the order of second authenticating unit 23 received authentication, it is described
It authenticates execution module 134 and second key is generated according to the current time stamp and control password, then by the second key of generation
It is compared with the first key in the authentication order, if unanimously, authenticating success, if inconsistent, failed authentication.If mirror
Power failure, the authentication execution module 134 control the net of first network module 14 disconnection and second network module 24
Network connection.If authenticating successfully, first receiving module 130 is allowed to receive control command, the control from the control equipment 2
System order can control the middle control service equipment 1 and execute scheduled operation.
In one embodiment, the authentication execution module 134 generates current time stamp and saves, and the current time stamp can
Be stored in the first memory 12, also can be reserved for independently of the first memory 12 and with first authentication it is single
In the memory of 13 connection of member.The current time stamp of generation is sent to second authenticating unit 23 by the first sending module 132,
Second authenticating unit 23 generates first key according to the current time stamp and control password and is sent to first reception
Module 130.The authentication execution module 134 generates the second key according to the current time stamp and control password of preservation, so
The second key of generation is compared with the first key in the authentication order afterwards, if unanimously, authenticating success, if different
It causes, then failed authentication.If failed authentication, the authentication execution module 134 control the first network module 14 disconnect with it is described
The network connection of second network module 24.If authenticating successfully, allow first receiving module 130 from the control equipment 2
Control command is received, the control command can control the middle control service equipment 1 and execute scheduled operation.
It please refers to shown in Fig. 3, is the module diagram of second authenticating unit 23 of one embodiment of the invention.Second mirror
Weighing unit 23 includes the second receiving module 230, the second sending module 232, key production module 234.Second receiving module
230 for receiving current time stamp from first authenticating unit 13 by second network module 24.The key generates
Module 234 is used to generate first key according to the current time stamp and control password that receive, then close further according to described first
Key generates authentication order.Second sending module 232 is for sending the authentication order to first authenticating unit 13, institute
Stating authentication order includes the first key.
In one embodiment, the current time stamp is generated by the key production module 234, the key production module
234 generate first key according to the current time stamp and control password of generation, then generate and authenticate further according to the first key
Order.Second sending module 232 is for sending the authentication order to first authenticating unit 13, the authentication order
Including the first key and the current time stamp.
In above-described embodiment, the generation of the key is generated using Encryption Algorithm, such as Encryption Algorithm can disappearing for standard
It ceases digest algorithm the 5th edition (Message Digest Algorithm, MD5), cyclic redundancy check (Cyclic Redundancy
Check, crc32), secure hash algorithm SHA (Secure Hash Algorithm, SHA) etc..
Second receiving module 230 is also used to receive authenticating result from first authenticating unit 13, if authenticating result
To authenticate successfully, second sending module 232 is also used to send control command to first authenticating unit 13.It is wherein described
Control command is generated by the second processor 20, and the second processor 20 can be instructed based on the input of user and generate the control
System order.
Fig. 4 is the method for authenticating flow chart of first embodiment of the invention.
It should be noted that internetwork connection mode of the invention for example it is above-mentioned it is as described in the examples can be multiple network class
Type, as follows for ease of description, being illustrated by taking the network connection based on ICP/IP protocol as an example.
Step 401, the port IP, TCP/UDP is arranged in the middle control service equipment 1, controls password.The IP is the middle control
The IP address of service equipment 1.The control password is the control password of the middle control service equipment 1, controls service equipment 1 in every
With a control password, only know that the control equipment 2 of the control password just can control the middle control service equipment 1.It sets
The port IP, TCP/UDP, control password be stored in it is described it is middle control service equipment memory in.
Step 402, TCP service is opened, whether listening port receives information.
Step 420 and step 403, the control equipment 2 are established with the middle control service equipment 1 and are connected to the network.It is real one
The step of applying in example, establishing network connection are as follows: the control equipment sends TCP connection request, institute to the middle control service equipment 1
The port of middle control service equipment 1 is stated when receiving the connection request, returns to the response message for agreeing to connection, the control equipment receipts
Send the response message of connection after to the response message to the middle control service equipment 1 again, the middle control service equipment 1 receives
The network connection with the control equipment 2 is established after controlling the response message of equipment 2.
Step 421, the control equipment 2 generates first key and authentication order.Specifically, described 2 Mr. of control equipment
At current time stamp, then according to current time stamp and the control password of the middle control service equipment, it is based on a preset encryption
Algorithm generates the first key.The Encryption Algorithm includes, but are not limited to the md5 of standard, crc32, SHA etc..The authentication
Order is the data packet generated on the basis of the first key and the current time stamp, and general TCP number can be used
According to the form of packet.
Step 404, the middle control service equipment 1, which receives the authentication order and parses the authentication order, obtains described work as
Preceding timestamp and the first key.
Step 405, the current time stamp and save in memory that the middle control service equipment 1 is obtained using parsing
Control password, using as control terminal Encryption Algorithm generate the second key.
Step 406, the middle control service equipment 1 compares the obtained first key of parsing and the second key generated and right
Whether updated than current time stamp, returns to authenticating result.The authenticating result includes authenticating successfully and failed authentication.If when current
Between the current time of stamp and the middle control service equipment 1 be separated by duration more than preset range (such as 20 seconds, 30 seconds, 1 minute, 5 points
Clock etc.), then failed authentication.If current time stamp and it is described it is middle control service equipment 1 current time be separated by duration be less than it is default
The first key and the second key agreement generated that range and parsing obtain, then authenticate success, otherwise, failed authentication.Some
In embodiment, when the middle control service equipment 1 can not obtain its current time, the middle control service equipment 1 can obtain to be deposited in advance
Time when carrying out upper primary authentication with the control equipment on the middle control service equipment 1 is stored up, when then comparing current
Between stamp and last authentication time, if the two is consistent, failed authentication.Net can be further prevented by comparing current time stamp
The false authentication behavior that network steals the current time stamp of the control equipment to carry out.
Step 422, the control equipment 2 receives authenticating result, carries out next step operation according to authenticating result.Specifically,
If the authenticating result is to authenticate successfully, the next step operation may be to send control command to control the middle control service
Equipment executes predetermined operation.If the authenticating result is failed authentication, the next step operation may be detection failed authentication
The reason of and re-initiate authorizing procedure.
Step 407, the middle control service equipment 1 executes corresponding operation according to authenticating result.Specifically, if authentication is lost
It loses, then closes TCP connection.Continue listening port successfully if authenticating to receive the control command from the control equipment 2.
Fig. 5 is the method for authenticating flow chart of second embodiment of the invention.
It should be noted that internetwork connection mode of the invention for example it is above-mentioned it is as described in the examples can be multiple network class
Type, as follows for ease of description, being illustrated by taking the network connection based on ICP/IP protocol as an example.
Step 501, the port IP, TCP/UDP is arranged in the middle control service equipment 1, controls password.The IP is the middle control
The IP address of service equipment 1.The control password is the control password of the middle control service equipment 1, controls service equipment 1 in every
With a control password, only know that the control equipment 2 of the control password just can control the middle control service equipment 1.It sets
The port IP, TCP/UDP, control password be stored in it is described it is middle control service equipment memory in.
Step 502, TCP service is opened, whether listening port receives information.
Step 520 and step 503, the control equipment 2 are established with the middle control service equipment 1 and are connected to the network.It is real one
The step of applying in example, establishing network connection are as follows: the control equipment sends TCP connection request, institute to the middle control service equipment 1
The port of middle control service equipment 1 is stated when receiving the connection request, returns to the response message for agreeing to connection, the control equipment receipts
Send the response message of connection after to the response message to the middle control service equipment 1 again, the middle control service equipment 1 receives
The network connection with the control equipment 2 is established after controlling the response message of equipment 2.
Step 504, the middle control service equipment 1 generates current time stamp, and current time stamp is stored in the middle control
In the memory of service equipment 1 and it is sent to the control equipment 2.
Step 521, the control equipment 2 generates first key and authentication order.Specifically, 2 basis of control equipment
The control password of the current time stamp that receives and the middle control service equipment generates described the based on a preset Encryption Algorithm
One key.The Encryption Algorithm includes but is not limited to the md5 of standard, crc32, SHA etc..Authentication order is described the
The form of general TCP data packet can be used in the data packet generated on the basis of one key and current time stamp.
Step 505, the middle control service equipment 1, which receives the authentication and orders and parse the authentication and order, obtains described the
One key.
Step 506, the middle control service equipment 1 using the current time stamp saved in memory and is stored in memory
In control password, using as control terminal Encryption Algorithm generate the second key.
Step 507, the middle control service equipment 1 compares the first key and the second key generated that parsing obtains, and returns
Authenticating result.The authenticating result includes authenticating successfully and failed authentication.If parse obtained first key and generate second
Key agreement then authenticates success, if inconsistent, failed authentication.
Step 522, the control equipment 2 receives authenticating result, carries out next step operation according to authenticating result.Specifically,
If the authenticating result is to authenticate successfully, the next step operation may be to send control command to control the middle control service
Equipment executes predetermined operation.If the authenticating result is failed authentication, the next step operation may be detection failed authentication
The reason of and re-initiate authorizing procedure.
Step 508, the middle control service equipment 1 executes corresponding operation according to authenticating result.Specifically, if authentication is lost
It loses, then closes TCP connection.Continue listening port successfully if authenticating to receive the control command from the control equipment 2.
If module/unit that middle control service equipment 1 described in above-described embodiment and the control equipment 2 integrate is with soft
The form of part functional unit realizes and when sold or used as an independent product, can store and computer-readable deposits at one
In storage media.Based on this understanding, the present invention realizes all or part of the process in method for authenticating described in above-described embodiment,
Relevant hardware can also be instructed to complete by computer program, the computer program can be stored in a computer can
It reads in storage medium, the computer program is when being executed by processor, it can be achieved that step described in embodiment of the method above.Its
In, the computer program includes computer program code, and the computer program code can be source code form, object generation
Code form, executable file or certain intermediate forms etc..The computer-readable medium may include: that can carry the calculating
It is any entity or device of machine program code, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only
Memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier wave
Signal, telecommunication signal and software distribution medium etc..It should be noted that the content that the computer-readable medium includes can be with
According to making laws in jurisdiction and the requirement of patent practice carries out increase and decrease appropriate, such as in certain jurisdictions, according to
Legislation and patent practice, computer-readable medium do not include electric carrier signal and telecommunication signal.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (10)
1. a kind of method for authenticating is applied to middle control service equipment, the middle control service equipment and control equipment communication connection, special
Sign is, which comprises
Establish the network connection with the control equipment;
The authentication order from the control equipment is received, the authentication order includes first key;
The second key is generated according to current time stamp and control password;And
Whether the first key compared in the authentication order is consistent with the second key of generation, if unanimously, authenticating success, if
It is inconsistent, then failed authentication.
2. the method as described in claim 1, which is characterized in that the first key and the second key are added using following one kind
Close algorithm generates: the MD5 of standard, crc32, SHA.
3. the method as described in claim 1, which is characterized in that before receiving the authentication order from the control equipment,
The method also includes: current time stamp is generated, saves the current time stamp in the middle control service equipment, and described in transmission
Current time stamp is to the control equipment.
4. the method as described in claim 1, which is characterized in that the authentication order includes generating in the control equipment
Current time stamp, the method also includes: if the middle control service equipment can obtain its current time, compare in authentication order
Current time stamp and it is described it is middle control service equipment current time, if the current time stamp be more than preset duration range,
Failed authentication;If the middle control service equipment cannot obtain its current time, compare authentication order in current time stamp with
The timestamp of last time authentication, if the two is consistent, failed authentication.
5. controlling service equipment in one kind, which is characterized in that the middle control service equipment includes the first authenticating unit and first network
Module, wherein first authenticating unit include the first receiving module, the first sending module, authentication execution module, described first
Receiving module is used to receive authentication order from control equipment by the first network module, and the authentication order includes first close
Key, the authentication execution module are used to generate the second key according to control password and current time stamp, and close according to described first
Whether key is unanimously authenticated with second key, and first sending module is for sending authenticating result to controlling equipment.
6. controlling service equipment in as claimed in claim 5, which is characterized in that the middle control service equipment is projector.
7. controlling service equipment in as claimed in claim 5, which is characterized in that the authentication order is included in the control equipment
The current time stamp of middle generation, it is described authentication execution module be also used to according to it is described authentication order in current time stamp carry out into
One step authentication: if the middle control service equipment can obtain its current time, compare authentication order in current time stamp with it is described
The current time of middle control service equipment, if the current time stamp is more than preset duration range, failed authentication;If the middle control
Service equipment cannot obtain its current time, compare the timestamp of the current time stamp and last authentication in authentication order, if
The two is consistent, then failed authentication.
8. a kind of method for authenticating is applied to control equipment, the control equipment and middle control service equipment are communicated to connect, and feature exists
In, which comprises
Establish the network connection with the middle control service equipment;
First key is generated according to current time stamp and the control password corresponding to the middle control service equipment, and sending includes institute
The authentication order of first key is stated to the middle control service equipment;
Authenticating result is received from the middle control service equipment, if the second key that the first key and middle control service equipment generate
Unanimously, then authenticating result is to authenticate successfully;If the first key and the second key that middle control service equipment generates are inconsistent,
Authenticating result is failed authentication.
9. method according to claim 8, which is characterized in that the current time stamp be by the control equipment generate or
It is received from the middle control service equipment.
10. a kind of control equipment, which is characterized in that the control equipment includes the second authenticating unit and the second network module,
Described in the second authenticating unit include the second sending module and key production module, the key production module is used for according to current
Timestamp and control password generate first key, then generate authentication order, second sending module further according to first key
For sending authentication order to the middle control service equipment, the authentication order includes the first key, the current time
Stamp is generated by the control equipment or is received from the middle control service equipment.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710828196.7A CN109510798A (en) | 2017-09-14 | 2017-09-14 | Method for authenticating and control equipment, middle control service equipment |
PCT/CN2017/114743 WO2019052027A1 (en) | 2017-09-14 | 2017-12-06 | Authentication method, control device, and central control service device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710828196.7A CN109510798A (en) | 2017-09-14 | 2017-09-14 | Method for authenticating and control equipment, middle control service equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109510798A true CN109510798A (en) | 2019-03-22 |
Family
ID=65723470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710828196.7A Pending CN109510798A (en) | 2017-09-14 | 2017-09-14 | Method for authenticating and control equipment, middle control service equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109510798A (en) |
WO (1) | WO2019052027A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519764A (en) * | 2019-09-19 | 2019-11-29 | 京东方科技集团股份有限公司 | A kind of safe verification method of communication equipment, system, computer equipment and medium |
CN113301537A (en) * | 2021-05-19 | 2021-08-24 | 闪耀现实(无锡)科技有限公司 | Method, apparatus, electronic device and storage medium for establishing communication connection |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889434A (en) * | 2006-07-21 | 2007-01-03 | 胡祥义 | Method for safety efficient network user identity discrimination |
CN101094056A (en) * | 2007-05-30 | 2007-12-26 | 重庆邮电大学 | Security system of wireless industrial control network, and method for implementing security policy |
CN105227516A (en) * | 2014-05-28 | 2016-01-06 | 中兴通讯股份有限公司 | The access method of Smart Home, control centre's equipment and dress terminal |
CN106790064A (en) * | 2016-12-20 | 2017-05-31 | 北京工业大学 | The method that both sides are communicated in credible root server cloud computing server model |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9106426B2 (en) * | 2008-11-26 | 2015-08-11 | Red Hat, Inc. | Username based authentication and key generation |
US20110191161A1 (en) * | 2010-02-02 | 2011-08-04 | Xia Dai | Secured Mobile Transaction Device |
CN105072132B (en) * | 2015-08-27 | 2019-05-14 | 宇龙计算机通信科技(深圳)有限公司 | Verification method, verifying system and communication equipment |
-
2017
- 2017-09-14 CN CN201710828196.7A patent/CN109510798A/en active Pending
- 2017-12-06 WO PCT/CN2017/114743 patent/WO2019052027A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889434A (en) * | 2006-07-21 | 2007-01-03 | 胡祥义 | Method for safety efficient network user identity discrimination |
CN101094056A (en) * | 2007-05-30 | 2007-12-26 | 重庆邮电大学 | Security system of wireless industrial control network, and method for implementing security policy |
CN105227516A (en) * | 2014-05-28 | 2016-01-06 | 中兴通讯股份有限公司 | The access method of Smart Home, control centre's equipment and dress terminal |
CN106790064A (en) * | 2016-12-20 | 2017-05-31 | 北京工业大学 | The method that both sides are communicated in credible root server cloud computing server model |
Non-Patent Citations (1)
Title |
---|
刘剑鸣: "基于DES算法远程控制口令鉴别系统的JAVA实现", 《微计算机信息》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519764A (en) * | 2019-09-19 | 2019-11-29 | 京东方科技集团股份有限公司 | A kind of safe verification method of communication equipment, system, computer equipment and medium |
WO2021052145A1 (en) * | 2019-09-19 | 2021-03-25 | 京东方科技集团股份有限公司 | Security verification method and system, computer device and medium |
CN113301537A (en) * | 2021-05-19 | 2021-08-24 | 闪耀现实(无锡)科技有限公司 | Method, apparatus, electronic device and storage medium for establishing communication connection |
CN113301537B (en) * | 2021-05-19 | 2023-09-15 | 闪耀现实(无锡)科技有限公司 | Method, device, electronic equipment and storage medium for establishing communication connection |
Also Published As
Publication number | Publication date |
---|---|
WO2019052027A1 (en) | 2019-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112733107B (en) | Information verification method, related device, equipment and storage medium | |
US11509485B2 (en) | Identity authentication method and system, and computing device | |
CN110399713B (en) | Information authentication method and related device | |
US10579790B2 (en) | Authentication of a device | |
CN110417543B (en) | Data encryption method, device and storage medium | |
CN101414909B (en) | System, method and mobile communication terminal for verifying network application user identification | |
US20200021596A1 (en) | Cloud Device Account Configuration Method, Apparatus and System, and Data Processing Method | |
CN108462710B (en) | Authentication and authorization method, device, authentication server and machine-readable storage medium | |
US9344896B2 (en) | Method and system for delivering a command to a mobile device | |
CN106845177A (en) | Cipher management method and system | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
CN103220148A (en) | Method and system for electronic signature token to respond operation request, and electronic signature token | |
CN105554013A (en) | Separate identity authentication apparatus based on USB device, system and method | |
CN103036681A (en) | Password safety keyboard device and system | |
CN103684797A (en) | Subscriber and subscriber terminal equipment correlation authentication method and system | |
KR20100099625A (en) | Method and apparatus for storing subscriber information at machine-to-machine module | |
KR20130031435A (en) | Method and apparatus for generating and managing of encryption key portable terminal | |
CN104506481A (en) | Authentication method of mobile communication network | |
CN109510798A (en) | Method for authenticating and control equipment, middle control service equipment | |
CN105095727A (en) | Device administrator permission application method, server and system | |
EP2658297A1 (en) | Method and system for accessing a service | |
CN105095773A (en) | Architecture for platform security using a dedicated security device for user interaction | |
CN107943622B (en) | Standby operation and maintenance method, device and system | |
CN104980569A (en) | Electronic ink shell system capable of communicating with mobile phone | |
CN108711055B (en) | Security authentication method, security authentication equipment and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190322 |