CN109547584B - IP address management method and device and electronic equipment - Google Patents

IP address management method and device and electronic equipment Download PDF

Info

Publication number
CN109547584B
CN109547584B CN201811517956.3A CN201811517956A CN109547584B CN 109547584 B CN109547584 B CN 109547584B CN 201811517956 A CN201811517956 A CN 201811517956A CN 109547584 B CN109547584 B CN 109547584B
Authority
CN
China
Prior art keywords
key
card
address
password
password input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811517956.3A
Other languages
Chinese (zh)
Other versions
CN109547584A (en
Inventor
易开军
高俊雄
全嫚丽
郑腾伟
陈卫先
殷杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Hongshi Technologies Co ltd
Original Assignee
Wuhan Hongshi Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Hongshi Technologies Co ltd filed Critical Wuhan Hongshi Technologies Co ltd
Priority to CN201811517956.3A priority Critical patent/CN109547584B/en
Publication of CN109547584A publication Critical patent/CN109547584A/en
Application granted granted Critical
Publication of CN109547584B publication Critical patent/CN109547584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5053Lease time; Renewal aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Abstract

The embodiment of the invention provides an IP address management method, an IP address management device and electronic equipment. According to the scheme, the modification authority is obtained through the secret key, the IP address is locally modified, and connection with an upper computer is not needed. The situation that when the access control machine and the upper computer are not in the same network segment, the access control machine cannot be continuously remotely controlled to complete operations such as network parameter modification under the condition that the connection between the access control machine and the upper computer is interrupted is avoided.

Description

IP address management method and device and electronic equipment
Technical Field
The invention relates to the field of computer security, in particular to an IP address management method and device and electronic equipment.
Background
With the rapid development of economy and science and technology, the requirements of people on the home environment have met simple living from the beginning to pay attention to humanization requirements, and intelligent communities such as safety, comfort, rapidness and convenience appear, wherein the safety is the primary index. Besides human factors, the realization of the security of the intelligent residential area is an indispensable important measure for setting an access control system.
In the actual maintenance process of the access control system, modifying the IP address is also a common operation, such as: when the network address changes, the address or the equipment changes, the IP address needs to be reset and changed, and in the actual application process, the upper computer is connected by using the Secure Shell (SSH), the internet (World Wide Web, Web) and other IP address connection modes, and the upper computer is used to modify the network parameters of the access control machine (such as IP address modification, function management and the like).
Once the IP address of the access control machine is modified, the connection between the access control machine and the upper computer is immediately interrupted under the condition that the access control machine and the upper computer are not in the same network segment, and the access control machine cannot be continuously remotely controlled to complete the operations of network parameter modification and the like.
Disclosure of Invention
In view of the foregoing, an object of the present invention is to provide an IP address management method, device and electronic device to improve the above problem.
The embodiment of the application provides an IP address management method, which is applied to access control equipment, wherein an original IP address is prestored in the access control equipment, and the method comprises the following steps:
receiving a first administrator password input by a user on a first password input interface, opening a card swiping authority, identifying and acquiring a first secret key in a first IC card, writing the acquired first secret key into a memory in the access control equipment, opening a second administrator login authority, and displaying a second password input interface;
receiving a second administrator password input by a user on the second password input interface, and displaying an operation interface;
identifying and acquiring a second key in a second IC card, verifying the second key, starting the authority of modifying the IP address after the second key passes verification, and displaying an IP modification interface;
and receiving a new IP address input by a user on the IP modification interface, and replacing the original IP address with the new IP address.
Further, a first local password is prestored in the access control device, a first administrator password input by a user on a first password input interface is received, and the step of opening the card swiping permission comprises the following steps:
receiving a first administrator password input by a user on a first password input interface;
and judging whether the first administrator password is the same as the first local password or not, if the first administrator password is different from the first local password, displaying matching failure information, and if the first administrator password is the same as the first local password, opening card swiping permission.
Further, the steps of identifying and acquiring a first key in a first IC card, writing the acquired first key into a memory in the access control device, opening a second administrator login right, and displaying a second password input interface include:
identifying an IC card to be identified, if at least two keys are stored in the IC card to be identified, judging the IC card to be identified as a first IC card, acquiring a first key of the first IC card, and writing the acquired first key into a memory in access control equipment;
and opening the login authority of a second administrator, and displaying a second password input interface.
Further, a second local password is prestored in the access control device, the administrator password input by the user on the second password input interface is received, and the step of displaying the operation interface includes:
receiving a second administrator password input by the user on the second password input interface;
and judging whether the second administrator password is the same as the second local password, if so, displaying matching failure information, and if so, displaying an operation interface.
Further, the step of identifying and acquiring the second key in the second IC card includes:
and identifying the IC card to be identified, if one secret key is identified to be stored in the IC card to be identified, judging that the IC card to be identified is a second IC card, and acquiring a second secret key of the second IC card.
Further, the identifying and obtaining a second key in a second IC card, verifying the second key, and after the second key passes verification, opening an IP address modification right, and displaying an IP modification interface includes:
identifying and acquiring a second key in a second IC card, and comparing the second key with the first original key to verify the second key, wherein the second key and the first key are symmetric keys;
and if the second key is matched with the first key, the verification of the second key is passed, the authority for modifying the IP address is started, and an IP modification interface is displayed.
An embodiment of the present invention further provides a processor for applying an IP address management apparatus to an access control device, where an original IP address is pre-stored in the access control device, and the apparatus includes:
the first acquisition and verification module is used for receiving a first administrator password input by a user on a first password input interface, opening a card swiping authority, identifying and acquiring a first secret key in a first IC card, writing the acquired first secret key into a memory in the access control equipment, opening a second administrator login authority and displaying a second password input interface;
the first receiving module is used for receiving a second administrator password input by the user on the second password input interface and displaying an operation interface;
the second obtaining and verifying module is used for identifying and obtaining a second key in a second IC card, verifying the second key, starting the authority of modifying the IP address and displaying an IP modifying interface after the second key passes verification;
and the second receiving module is used for receiving a new IP address input by the user on the IP modification interface and replacing the original IP address with the new IP address.
Further, a first local password is prestored in the access control device, and the first acquisition and verification module includes:
the data receiving unit is used for receiving a first administrator password input by a user on a first password input interface;
the data verification unit is used for judging whether the first administrator password is the same as the first local password or not, displaying matching failure information if the first administrator password is different from the first local password, and opening card swiping permission if the first administrator password is the same as the first local password;
the identification acquisition unit is used for identifying an IC card to be identified, if at least two keys are stored in the IC card to be identified, the IC card to be identified is judged to be a first IC card, the first key of the first IC card is acquired, and the acquired first key is written into a memory in the access control equipment;
and the permission opening unit is used for opening the login permission of the second administrator and displaying a second password input interface.
An embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the above-mentioned method steps.
An embodiment of the present invention further provides a readable storage medium, where a computer program is stored, and when the computer program is executed, the IP address management method is implemented.
The embodiment of the invention provides an IP address management method, an IP address management device and electronic equipment. According to the scheme, the modification authority is obtained through the secret key, the IP address is locally modified, and connection with an upper computer is not needed. The situation that when the access control machine and the upper computer are not in the same network segment, the access control machine cannot be continuously remotely controlled to complete operations such as network parameter modification under the condition that the connection between the access control machine and the upper computer is interrupted is avoided.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a block diagram of an electronic device according to an embodiment of the present disclosure.
Fig. 2 is a flowchart of an IP address management method according to an embodiment of the present application.
Fig. 3 is a flowchart of the substeps of step S100 in fig. 2.
Fig. 4 is a flowchart of the substeps of step S200 in fig. 2.
Fig. 5 is a flowchart of the substeps of step S300 in fig. 2.
Fig. 6 is a functional block diagram of an IP address management apparatus according to an embodiment of the present application.
Icon: 100-an electronic device; 110-IP address management means; 120-a processor; 130-a memory; 131-a first acquisition verification module; 132-a first receiving module; 133-a second acquisition verification module; 134-second receiving module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The inventor practices show that the IP address of the entrance guard equipment needs to be set or modified under the condition that the entrance guard equipment leaves a factory without fixing the IP address or under the condition that a network address changes and the address or equipment changes, and an upper computer cannot be kept in the same network segment with the equipment in the debugging process of a user, so that the upper computer cannot be connected with the entrance guard equipment, configuration work cannot be carried out, serious business safety problems are caused, the entrance guard equipment cannot normally use all functions, and the user cannot obtain good experience.
Referring to fig. 1, an embodiment of the present invention provides an electronic device 100 based on the above research findings, where the electronic device 100 includes a memory 130, a processor 120, and an IP address management apparatus 110.
The memory 130 is electrically connected to the processor 120 directly or indirectly to enable data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The IP address management device 110 includes at least one software function module that can be stored in the memory 130 in the form of software or firmware (firmware). The processor 120 is configured to execute executable computer programs stored in the memory 130, such as software functional modules and computer programs included in the IP address management apparatus 110, so as to implement an IP address management method.
The Memory 130 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 130 is used for storing a program, and the processor 120 executes the program after receiving the execution instruction.
The processor 120 may be an integrated circuit chip having signal processing capabilities. The Processor 120 may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor 120 may be any conventional processor or the like.
It is to be understood that the configuration shown in fig. 1 is merely exemplary, and that the electronic device 100 may include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
Specifically, in the embodiment of the present invention, the electronic device 100 is an access control device.
With reference to fig. 2, an embodiment of the present invention further provides an IP address management method applicable to the electronic device 100. Wherein the method steps defined by the method-related flow may be implemented by the processor 120. The specific process shown in fig. 2 will be described in detail below.
S100, receiving a first administrator password input by a user on a first password input interface, opening a card swiping authority, identifying and obtaining a first secret key in a first IC card, writing the obtained first secret key into a memory in the access control equipment, opening a second administrator login authority, and displaying a second password input interface.
In the embodiment of the invention, the original IP address is prestored in the access control equipment, the first IC card is a non-contact CPU card, and the CPU card (intelligent IC card) belongs to an active card. It is capable of not only managing various input/output data, verifying a personal Password (PIN) input from an interface device. But also can actively identify the interface equipment connected with the application system according to the requirement of the application system.
The CPU card comprises a memory unit, and the memory unit comprises a random access memory, a read-only memory and a programmable program memory. And the read-only memory and the programmable program memory of the first IC card are both pre-stored with keys stored by a reader-writer.
Optionally, the first IC card may also be a logic encryption card, and the logic encryption card has simple logic encryption and PIN verification, and may be selected according to requirements in practical application.
In this embodiment of the present invention, the electronic device 100 further includes a reader, a display connected to the processor 120, and an input device.
Specifically, the access control device is also pre-stored with a first local password, and first receives a first administrator password input by a user on a first password input interface. And judging whether the first administrator password is the same as the first local password or not, if the first administrator password is different from the first local password, displaying matching failure information, and if the first administrator password is the same as the first local password, opening card swiping permission.
Referring to fig. 3, S100 includes S101 and S102.
S101, identifying an IC card to be identified, if at least two keys are stored in the IC card to be identified, judging that the IC card to be identified is a first IC card, acquiring a first key of the first IC card, and writing the acquired first key into a memory in entrance guard equipment.
And S102, starting the login authority of the second administrator, and displaying a second password input interface.
In the embodiment of the invention, the reader-writer sends a radio frequency signal with a specific frequency through a transmitting antenna, when the first IC enters an effective working range of the reader-writer, an induced current is generated, so that energy is activated, the first IC card sends out self coding information through a built-in radio frequency antenna, the reader-writer receives the coding information sent by the first IC card, when the IC card to be identified is identified, if at least two keys are stored in the IC card to be identified, the IC card to be identified is judged to be the first IC card, and the obtained first key is written into a memory in the access control equipment.
And S200, receiving a second administrator password input by the user on the second password input interface, and displaying an operation interface.
Referring to fig. 4, specifically, the access control device further has a local password pre-stored therein, and S200 includes S201 and S202.
S201, receiving a second administrator password input by the user on the second password input interface.
S202, judging whether the second administrator password is the same as the second local password. If the second administrator password is different from the second local password, S203 is executed, and if the administrator password is the same as the local password, S204 is executed.
And S203, displaying matching failure information.
And S204, displaying an operation interface.
S300, identifying and acquiring a second key in a second IC card, verifying the second key, starting the authority of modifying the IP address after the second key passes verification, and displaying an IP modification interface.
In the embodiment of the present invention, the second IC card is a non-contact CPU card, and a secret key stored by a reader/writer is prestored in a read-only memory or a programmable program memory of the second IC card.
Optionally, the second IC card may also be a logic encryption card, and the logic encryption card has simple logic encryption and PIN verification, and in practical application, may be selected according to requirements.
Specifically, referring to fig. 5, S300 includes S301 and S302.
S301, identifying and acquiring a second key in a second IC card, and comparing the second key with the first key to verify the second key.
In the embodiment of the invention, the reader-writer sends a radio frequency signal with a specific frequency through a transmitting antenna, when a second IC enters an effective working range of the reader-writer, induced current is generated, so that energy is activated, the second IC card sends out self coding information through a built-in radio frequency antenna, the reader-writer receives the coding information sent by the second IC card, the IC card to be identified is identified, if a secret key is identified to be stored in the IC card to be identified, the IC card to be identified is determined to be the second IC card, the second secret key of the second IC card is obtained, and the coding information sent by the second IC card is demodulated and decoded by using a symmetric secret key.
S302, if the second key is matched with the first key, the verification of the second key is passed, the authority of modifying the IP address is opened, and an IP modification interface is displayed.
Specifically, if the first key matches the second key, the first key and the second key are symmetric keys. If the first key is not matched with the first original key, the reader-writer cannot demodulate and decode the signal sent by the first IC card, at the moment, error information is returned, and the display displays matching failure information.
It should be noted that the display may display the matching failure information in a text manner or an icon manner.
S400, receiving a new IP address input by a user on the IP modification interface, and replacing the original IP address with the new IP address.
Specifically, at the IP modification interface, the original IP address is replaced by a command according to the new IP address by using the new IP address input by the input device.
It should be noted that the input device may be a keyboard, and has 12 keys, and the function of each key is defined as: number keys 0-9, a confirm key and a cancel key. A handwriting input board, a voice input device, a touch panel, and the like may be used.
An embodiment of the present invention further provides an IP address management apparatus, which is applied to an access control device, where an original IP address is pre-stored in the access control device, and the apparatus includes:
the first obtaining and verifying module 131 is configured to receive a first administrator password input by a user on a first password input interface, open a card swiping right, identify and obtain a first key in a first IC card, write the obtained first key into a memory in the access control device, open a second administrator login right, and display a second password input interface.
The first receiving module 132 is configured to receive the second administrator password input by the user on the second password input interface, and display an operation interface.
And a second obtaining and verifying module 133, configured to identify and obtain a second key in a second IC card, verify the second key, and after the second key passes verification, start an IP address modification authority and display an IP modification interface.
A second receiving module 134, configured to receive a new IP address input by the user on the IP modification interface, and replace the original IP address with the new IP address.
Specifically, a first local password is prestored in the access control device, and the first acquisition and verification module comprises a data receiving unit, a data verification unit, an identification acquisition unit and a permission opening unit.
And the data receiving unit is used for receiving a first administrator password input by a user on the first password input interface.
And the data verification unit is used for judging whether the first administrator password is the same as the first local password or not, displaying matching failure information if the first administrator password is different from the first local password, and opening card swiping permission if the first administrator password is the same as the first local password.
The identification acquisition unit is used for identifying an IC card to be identified, if at least two keys are stored in the IC card to be identified, the IC card to be identified is judged to be a first IC card, the first key of the first IC card is acquired, and the acquired first key is written into a memory in the access control equipment.
And the permission opening unit is used for opening the login permission of the second administrator and displaying a second password input interface.
It can be understood that, for the specific operation method of each functional module in this embodiment, reference may be made to the detailed description of the corresponding step in the foregoing method embodiment, and no repeated description is provided herein.
An embodiment of the present invention further provides a readable storage medium, where a computer program is stored, and when the computer program is executed, the IP address management method is implemented.
In summary, embodiments of the present invention provide an IP address management method, an IP address management apparatus, and an electronic device, in which a secret key in a first IC card and a secret key in a second IC card are respectively obtained, an IP address modification authority is started after the secret keys are successfully compared, an IP address modification interface is displayed, a new IP address input by a user on the IP address modification interface is finally received, and the original IP address is replaced with the new IP address. According to the scheme, the modification authority is obtained through the secret key, the IP address is locally modified, and connection with an upper computer is not needed. The situation that when the access control machine and the upper computer are not in the same network segment, the access control machine cannot be continuously remotely controlled to complete operations such as network parameter modification under the condition that the connection between the access control machine and the upper computer is interrupted is avoided.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (9)

1. An IP address management method is applied to access control equipment, and is characterized in that an original IP address is prestored in the access control equipment, and the method comprises the following steps:
receiving a first administrator password input by a user on a first password input interface, opening a card swiping authority, identifying and acquiring a first secret key in a first IC card, writing the acquired first secret key into a memory in the access control equipment, opening a second administrator login authority, and displaying a second password input interface;
receiving a second administrator password input by a user on the second password input interface, and displaying an operation interface;
identifying and acquiring a second key in a second IC card, verifying the second key, starting the authority of modifying the IP address after the second key passes verification, and displaying an IP modification interface;
receiving a new IP address input by a user on the IP modification interface, and replacing the original IP address with the new IP address;
the identification and acquisition of a second key in a second IC card, the verification of the second key, the opening of the authority of modifying the IP address after the verification of the second key is passed, and the display of an IP modification interface comprises the following steps:
identifying and acquiring a second key in a second IC card, and comparing the second key with the first key to verify the second key, wherein the second key and the first key are symmetric keys;
and if the second key is matched with the first key, the verification of the second key is passed, the authority for modifying the IP address is started, and an IP modification interface is displayed.
2. The IP address management method of claim 1, wherein the access control device is further pre-stored with a first local password, and the step of receiving a first administrator password input by a user on a first password input interface and opening the card swiping right comprises:
receiving a first administrator password input by a user on a first password input interface;
and judging whether the first administrator password is the same as the first local password or not, if the first administrator password is different from the first local password, displaying matching failure information, and if the first administrator password is the same as the first local password, opening card swiping permission.
3. The IP address management method according to claim 1, wherein the identifying and obtaining a first key in a first IC card, writing the obtained first key into a memory in the access control device, opening a second administrator login right, and displaying a second password input interface includes:
identifying an IC card to be identified, if at least two keys are stored in the IC card to be identified, judging the IC card to be identified as a first IC card, acquiring a first key of the first IC card, and writing the acquired first key into a memory in access control equipment;
and opening the login authority of a second administrator, and displaying a second password input interface.
4. The IP address management method according to claim 1, wherein a second local password is prestored in the access control device, the second administrator password input by the user on the second password input interface is received, and the step of displaying the operation interface includes:
receiving a second administrator password input by the user on the second password input interface;
and judging whether the second administrator password is the same as the second local password, if so, displaying matching failure information, and if so, displaying an operation interface.
5. The IP address management method according to claim 1, wherein the step of identifying and acquiring the second key in the second IC card includes:
and identifying the IC card to be identified, if one secret key is identified to be stored in the IC card to be identified, judging that the IC card to be identified is a second IC card, and acquiring a second secret key of the second IC card.
6. The utility model provides a IP address management device, is applied to the treater among the entrance guard's equipment, its characterized in that, the original IP address has been prestored in the entrance guard's equipment, the device includes:
the first acquisition and verification module is used for receiving a first administrator password input by a user on a first password input interface, opening a card swiping authority, identifying and acquiring a first secret key in a first IC card, writing the acquired first secret key into a memory in the access control equipment, opening a second administrator login authority and displaying a second password input interface;
the first receiving module is used for receiving a second administrator password input by the user on the second password input interface and displaying an operation interface;
the second obtaining and verifying module is used for identifying and obtaining a second key in a second IC card, verifying the second key, starting the authority of modifying the IP address and displaying an IP modifying interface after the second key passes verification;
the second receiving module is used for receiving a new IP address input by a user on the IP modification interface and replacing the original IP address with the new IP address;
the second acquisition verification module is specifically configured to:
identifying and acquiring a second key in a second IC card, and comparing the second key with the first key to verify the second key, wherein the second key and the first key are symmetric keys;
and if the second key is matched with the first key, the verification of the second key is passed, the authority for modifying the IP address is started, and an IP modification interface is displayed.
7. The IP address management apparatus of claim 6, wherein the access control device has a first local password pre-stored therein, and the first obtaining and verifying module comprises:
the data receiving unit is used for receiving a first administrator password input by a user on a first password input interface;
the data verification unit is used for judging whether the first administrator password is the same as the first local password or not, displaying matching failure information if the first administrator password is different from the first local password, and opening card swiping permission if the first administrator password is the same as the first local password;
the identification acquisition unit is used for identifying an IC card to be identified, if at least two keys are stored in the IC card to be identified, the IC card to be identified is judged to be a first IC card, the first key of the first IC card is acquired, and the acquired first key is written into a memory in the access control equipment;
and the permission opening unit is used for opening the login permission of the second administrator and displaying a second password input interface.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the method steps of any of claims 1-5 are implemented when the processor executes the program.
9. A readable storage medium, characterized in that a computer program is stored therein, which when executed implements the IP address management method of any one of claims 1-5.
CN201811517956.3A 2018-12-12 2018-12-12 IP address management method and device and electronic equipment Active CN109547584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811517956.3A CN109547584B (en) 2018-12-12 2018-12-12 IP address management method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811517956.3A CN109547584B (en) 2018-12-12 2018-12-12 IP address management method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN109547584A CN109547584A (en) 2019-03-29
CN109547584B true CN109547584B (en) 2021-12-14

Family

ID=65854768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811517956.3A Active CN109547584B (en) 2018-12-12 2018-12-12 IP address management method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109547584B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104407604A (en) * 2014-11-22 2015-03-11 国家电网公司 D5000 debugging protocol testing device and method
CN108049720A (en) * 2017-12-08 2018-05-18 中国银行股份有限公司 A kind of access control system
CN108109249A (en) * 2018-01-26 2018-06-01 河南云拓智能科技有限公司 Intelligent cloud entrance guard management system and method
CN207517090U (en) * 2017-12-04 2018-06-19 厦门点圈科技有限公司 A kind of gate inhibition's flap turnstile with wisdom wireless network
CN207587024U (en) * 2017-10-23 2018-07-06 天津云拓网络科技有限公司 A kind of access control system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9660999B2 (en) * 2015-02-06 2017-05-23 Microsoft Technology Licensing, Llc Discovery and connection to a service controller
US9747435B2 (en) * 2015-04-27 2017-08-29 Apple Inc. Authentication and control of encryption keys
CN106600757A (en) * 2016-07-22 2017-04-26 深圳市凯迪仕智能科技有限公司 Wireless lock control system based on intelligent terminal and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104407604A (en) * 2014-11-22 2015-03-11 国家电网公司 D5000 debugging protocol testing device and method
CN207587024U (en) * 2017-10-23 2018-07-06 天津云拓网络科技有限公司 A kind of access control system
CN207517090U (en) * 2017-12-04 2018-06-19 厦门点圈科技有限公司 A kind of gate inhibition's flap turnstile with wisdom wireless network
CN108049720A (en) * 2017-12-08 2018-05-18 中国银行股份有限公司 A kind of access control system
CN108109249A (en) * 2018-01-26 2018-06-01 河南云拓智能科技有限公司 Intelligent cloud entrance guard management system and method

Also Published As

Publication number Publication date
CN109547584A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
US11086979B1 (en) Security system and method for controlling access to computing resources
US11797710B2 (en) System and method for dynamic generation of URL by smart card
US10275602B2 (en) Method and apparatus for an end user identity protection suite
US10432620B2 (en) Biometric authentication
US20080201768A1 (en) Method For Managing A Large Number Of Passwords, Portable Apparatus And Certification Information Storing Device Using The Same, And Certification Information Management Method Using The Same
EP3385895A1 (en) Biometric information personal identity authenticating system and method using financial card information stored in mobile communication terminal
CN109391611B (en) User personal information encryption authorization method, device, equipment and readable storage medium
CN108335191B (en) Financial account opening method, financial service system terminal and computer storage medium
CN110750765B (en) Service system, front-end page control method thereof, computer device, and storage medium
KR20210110535A (en) Method for Unlocking Input using the Combination of Password Number and Pattern Image Input of Smartphone
CN109547584B (en) IP address management method and device and electronic equipment
KR100705038B1 (en) Mobile communication terminal and method for authenticating electronic payment
KR101459283B1 (en) 2 Channel authentication device and method
US11479209B2 (en) Input information management system
KR20060102458A (en) System and method for authenticating user in internet banking, server for authenticating user and recording medium
CN109800548A (en) A kind of method and apparatus preventing leakage of personal information
KR20150114358A (en) User authentication system by contacting card and operating method thereof
TWI704796B (en) System for using network identification to sign in service server via telecommunication server and method thereof
JP5453756B2 (en) Uninstall system, client terminal, and uninstall program
CN210061899U (en) Injection molding machine authority level control device
Elavarasi et al. Smart Fingerprint Authentication and Alert System Using IoT
AU2021218011A1 (en) Activity based compliance
Ahiara et al. Near Field Communication Internet of Things (NFC-IoT) Based University Examination Monitoring System
JP4547715B2 (en) Authentication system
Nhevera Fingerprint and NFC authentication Brick

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant