CN110944055A - Wireless networking protocol security protection method, device and storage medium - Google Patents

Wireless networking protocol security protection method, device and storage medium Download PDF

Info

Publication number
CN110944055A
CN110944055A CN201911215454.XA CN201911215454A CN110944055A CN 110944055 A CN110944055 A CN 110944055A CN 201911215454 A CN201911215454 A CN 201911215454A CN 110944055 A CN110944055 A CN 110944055A
Authority
CN
China
Prior art keywords
networking
adapter
authentication
server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911215454.XA
Other languages
Chinese (zh)
Inventor
陈浩
谢江勇
吴沛泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Institute Of Intelligent Software Industry
Guangzhou Zhongke Yongxin Technology Co Ltd
Original Assignee
Guangzhou Institute Of Intelligent Software Industry
Guangzhou Zhongke Yongxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Institute Of Intelligent Software Industry, Guangzhou Zhongke Yongxin Technology Co Ltd filed Critical Guangzhou Institute Of Intelligent Software Industry
Priority to CN201911215454.XA priority Critical patent/CN110944055A/en
Publication of CN110944055A publication Critical patent/CN110944055A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2212/00Encapsulation of packets

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a wireless networking protocol safety protection method, a device and a storage medium, wherein the method comprises the following steps: acquiring factory information of a networking adapter; transmitting the factory information to a networking server; authenticating the networking adapter through the networking server; the networking adapter after passing the authentication is accessed into the terminal equipment; the embodiment of the invention can realize that when the connection communication between the terminal devices is carried out, the non-authentication terminal device is prevented from accessing the network to acquire data through safety verification; and the authorization instruction and operation are verified, so that illegal abnormal operation is prevented; the terminal device data information transmitted on the network is encrypted through the unique corresponding key, and information leakage is prevented.

Description

Wireless networking protocol security protection method, device and storage medium
Technical Field
The present invention relates to the field of wireless networking protection technologies, and in particular, to a wireless networking protocol security protection method, apparatus, and storage medium.
Background
Wireless networking, also called wireless ad hoc network, a module for wireless data transmission by using wireless technology; a plurality of modules of the same type can form a small network, data can be mutually transmitted in the network, and the network is widely applied to various fields of the Internet of things.
Currently, in the wireless networking technology, each terminal device adopts different frequency points to transmit radio frequency signals; the receiving end scans and analyzes the received signals and marks the receiving state of the signals; each terminal device selects a received frequency point according to the receiving state and the routing information obtained by analysis; selecting the received signal and the local information to send according to the routing information obtained by analysis; when each terminal device sends a signal, the routing information of each terminal device is updated and received.
The prior art mainly solves the problem how to realize a stable and efficient networking scheme for a plurality of different terminal devices, ensures the security by only using a black and white list to filter the terminal devices, filters the terminal devices through the black and white list, can realize the security management of the networking devices by using a configuration method, but depends on manual operation, cannot prevent data theft, cannot automatically identify registered devices in the networking process, and carries out encryption communication through a point-to-point key authenticated by a third party.
Disclosure of Invention
In view of the above problems, embodiments of the present invention are proposed to provide a wireless networking protocol security protection method and a corresponding wireless networking protocol security protection device that overcome or at least partially solve the above problems.
In order to solve the above problems, an embodiment of the present invention discloses a wireless networking protocol security protection method, including:
acquiring factory information of a networking adapter;
transmitting the factory information to a networking server;
authenticating the networking adapter through the networking server;
the networking adapter after passing the authentication is accessed into the terminal equipment;
further, the factory information comprises a product number, a name, an ID and starting time;
further, the step of transmitting the factory information to a networking server includes:
accessing the networking adapter to a relay network device;
transmitting the factory information to the networking server through the relay network equipment;
further, the step of authenticating the networking adapter through the networking server includes:
the networking adapter applies for authentication to an Internet of things coding center through the networking server;
if the authentication is successful, returning authentication information, sending networking authorization through a networking server, and generating a unique key;
if the authentication fails, recording an authentication failure log in the networking server;
further, the step of accessing the authenticated networking adapter to the terminal device includes:
the networking server defines a white list in a gateway and establishes cloud connection for the networking adapter after authentication;
acquiring application permission according to the cloud connection;
connecting the terminal equipment through the application authority;
further, the step after the authenticated networking adapter accesses the terminal device includes:
reading terminal equipment data in the terminal equipment and decoding the terminal equipment data;
uploading the data of the decoding terminal equipment to a cloud platform;
further, the terminal device data comprises a device ID, a type, a parameter, a runtime, and a running log;
further, the step of uploading the data of the decoding terminal device to a cloud platform includes:
converting the decoding terminal equipment data into industrial standard data;
transmitting the industrial standard data to a relay network device, and sending the industrial standard data to the networking server through the relay network device;
and the networking server uploads the networking server to the cloud platform through a gateway.
The embodiment of the invention also discloses a wireless networking protocol safety protection device, which comprises:
the acquisition module is used for acquiring factory information of the networking adapter;
the transmission module is used for transmitting the factory information to a networking server;
the authentication module is used for authenticating the networking adapter through the networking server;
and the access module is used for accessing the terminal equipment through the authenticated networking adapter.
The embodiment of the invention also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the program is executed by a processor, the steps of the method are realized.
The embodiment of the invention has the following advantages: the networking adapter is authenticated by the networking server to an Internet of things coding center, and the networking adapter after authentication generates a unique corresponding key and corresponding application permission for carrying out communication connection and data encryption transmission with the terminal equipment; carrying out communication security verification on the terminal equipment by generating a unique corresponding key; the access terminal equipment can be registered, and the terminal equipment which is not verified has no application authority in the network; the multi-level authority management is realized through network authorization, the hierarchical control and audit trail management of different terminal devices and different operations are met, and illegal abnormal operation is avoided; data transmission between terminal equipment is encrypted and decrypted, so that non-authenticated terminal equipment cannot read data, and data information leakage is prevented.
Drawings
FIG. 1 is a flowchart illustrating first steps of a security protection method for a wireless networking protocol according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a second embodiment of a security protection method for a wireless networking protocol according to the present invention;
FIG. 3 is a flowchart illustrating the third step of a security protection method for a wireless networking protocol according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating the fourth step of a security protection method for a wireless networking protocol according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating the fifth step of a security protection method for a wireless networking protocol according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating the sixth step of a security protection method for wireless networking protocols according to an embodiment of the present invention;
FIG. 7 is a block diagram of a first embodiment of a wireless networking protocol security protection apparatus of the present invention;
fig. 8 is a block diagram of a second embodiment of a wireless networking protocol security protection apparatus according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Referring to fig. 1, a flowchart illustrating a first step of a security protection method for a wireless networking protocol according to an embodiment of the present invention is shown, which may specifically include the following steps:
step S10, obtaining factory information of the networking adapter;
step S20, transmitting the factory information to a networking server;
step S30, the networking adapter is authenticated by the networking server;
step S40, the authenticated networking adapter is accessed into the terminal equipment;
wherein the networking adapter comprises at least one; the factory information comprises a product number, a name, an ID and starting time;
acquiring and acquiring factory information corresponding to the networking adapter by starting, wherein the factory information comprises a product number, a name, an ID and starting time; uploading the obtained factory information to a networking server, and applying for authentication of the factory information of the networking adapter through the networking server; the networking adapter after passing the authentication is accessed into the terminal equipment; the unauthenticated networking adapter cannot access the terminal equipment.
In the embodiment of the invention, factory information corresponding to a networking adapter needs to be acquired first, the factory information is uploaded to a networking server, application authentication is carried out according to the factory information, access terminal equipment is granted after the application authentication is passed, and the access of the equipment terminal is allowed by the authenticated networking adapter when connection communication is established between equipment every time; and preventing the non-authenticated networking adapter from accessing the equipment terminal.
Referring to fig. 2, a flowchart illustrating steps of a second embodiment of a wireless networking protocol security protection method according to the present invention is shown, where the factory information is transmitted to a networking server, and the method may specifically include the following steps:
step S201, the networking adapter is accessed to a relay network device;
step S202, the delivery information is transmitted to the networking server through the relay network equipment;
in the embodiment of the invention, a networking adapter is accessed into a relay network device, and corresponding factory information in the networking adapter is sent to a networking server through the relay network device; the relay network equipment can enlarge the communication distance, increase nodes, and use different communication rates in each network segment, thereby improving the reliability of factory information transmission of the networking adapter, avoiding factory information errors or incompleteness, and improving the performance.
Referring to fig. 3, a flowchart illustrating a third step of an embodiment of a method for securing a wireless networking protocol according to the present invention is shown, where the networking server authenticates the networking adapter, and the method specifically includes the following steps:
step S301, the networking adapter applies for authentication to an Internet of things coding center through the networking server;
step S302, if the authentication is successful, the authentication information is returned, networking authorization is sent out through a networking server, and a unique key is generated;
step S303, if the authentication fails, recording an authentication failure log in the networking server;
the internet of things coding center is a Chinese article coding center, the Chinese article coding center is a special mechanism for uniformly organizing, coordinating and managing commodity bar codes, article codes and automatic identification technologies in China, belongs to the State market supervision and management headquarter, and is established in 1988, and the national article coding organization (GS1) is added in 4 months in 1991 to represent China, so that the internet of things coding center is responsible for popularizing an international universal, open and cross-industry global unified identification system and a supply chain management standard, and provides a public service platform and a standardized solution for society.
In the embodiment of the invention, the networking adapter is applied for authentication to a coding center of the Internet of things, namely a Chinese article coding center through a networking server; the authentication is successful in the internet of things coding center, authentication information is returned, networking authorization is sent out through a networking server according to the authentication information and is used for accessing an application network, and corresponding operation permission is obtained; meanwhile, generating a unique key corresponding to the networking adapter for communication connection and data encryption transmission; if the authentication of the networking adapter in the coding center of the Internet of things fails, recording an authentication failure log of the networking adapter in a networking server; after the networking adapter needs to apply for authentication, an application network is obtained according to returned authentication information, corresponding operation authority is obtained, multi-level authority management is achieved through network authorization, hierarchical control and audit trail management of different terminal devices and different operations are met, and illegal abnormal operations are avoided; the unique corresponding key is used for communication connection and encrypted transmission, and is used for encrypting data information transmitted on the network to prevent information leakage; the communication reliability and the data transmission safety can be effectively improved.
Referring to fig. 4, a flowchart illustrating a fourth step of an embodiment of a method for securing a wireless networking protocol according to the present invention is shown, where the networking adapter after passing authentication accesses to a terminal device, and the method specifically includes the following steps:
step S401, the networking server defines a white list in a gateway and establishes cloud connection for the networking adapter after authentication;
step S402, obtaining application authority according to the cloud connection;
step S403, connecting the terminal equipment through the application authority;
in the embodiment of the invention, after a networking adapter passes authentication, a white list is defined in a gateway by a networking server, cloud connection, namely a cloud network channel, is established in the authenticated networking adapter, and corresponding application permission is obtained according to the cloud connection, wherein the application permission comprises reading data, calling a decryption program and a decoding program and sending an operation command request to the networking server; connecting the terminal equipment through corresponding application authority; and the authorization instruction and the operation are verified, and illegal abnormal operation is prevented.
Referring to fig. 5, a flowchart illustrating a fifth step of a method for securing a wireless networking protocol according to an embodiment of the present invention is shown, where after the networking adapter after passing authentication accesses a terminal device, the method may specifically include the following steps:
step S50, reading terminal device data in the terminal device, and decoding the terminal device data;
step S60, uploading the decoding terminal device data to a cloud platform;
the terminal device data comprises a device ID, a type, parameters, running time and a running log;
in the embodiment of the invention, the corresponding data is read in the terminal equipment, and the read data is decoded; uploading the decoded data to a cloud platform; the data of the terminal equipment can be effectively stored on the cloud platform, the data of the terminal equipment are protected through the cloud platform, and in a preferred embodiment, the cloud platform is an enterprise private cloud network.
Referring to fig. 6, a flowchart illustrating a sixth step of a security protection method for a wireless networking protocol according to an embodiment of the present invention is shown, where the data of the decoding terminal device is uploaded to a cloud platform, and the method specifically includes the following steps:
step S601, converting the decoding terminal equipment data into industrial standard data;
step S602, transmitting the industrial standard data to a relay network device, and sending the industrial standard data to the networking server through the relay network device;
step S603, the networking server uploads the networking server to the cloud platform through a gateway;
in the embodiment of the invention, the terminal device data obtained by decoding is packaged by industrial standard data and uploaded to a cloud platform through a relay network device and a gateway of a networking server; accessible network deployment server polling cloud platform when needs carry out parameter update to this terminal equipment, downloads the program script in the high in the clouds of cloud platform, and the high in the clouds feedback to cloud platform is gone back to the operation script to carry out the parameter filling to this terminal equipment according to the configuration needs, network deployment adapter downloads corresponding instruction and parameter, carries out the filling to terminal equipment, and feeds back corresponding state.
Example one
An intelligent plant implementation: the networking adapter is started up and self-checked, and self factory information including product number, name, ID and starting time is collected; accessing a relay network device; submitting factory information of the networking adapter to a networking server; applying authentication to an Internet of things coding center by a networking server; after the internet of things coding center authenticates the networking adapter, authentication information is returned, and a corresponding unique key is generated to serve as a communication connection key; and acquiring application authority, connecting machine tool equipment and acquiring machine tool data.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 7, a block diagram of a first embodiment of a wireless networking protocol security protection apparatus according to the present invention is shown, which may specifically include the following modules:
an obtaining module 1001, configured to obtain factory information of a networking adapter;
a transmission module 1002, configured to transmit the factory information to a networking server;
an authentication module 1003, configured to authenticate the networking adapter through the networking server;
an access module 1004, configured to access the terminal device through the authenticated networking adapter.
In a preferred embodiment, the transmitting module 1002 is configured to transmit the factory information to a networking server, and includes:
the access subunit is used for accessing the networking adapter to the relay network equipment;
and the transmission subunit is used for transmitting the factory information to the networking server through the relay network equipment.
In a preferred embodiment, the authenticating module 1003 is configured to authenticate the networking adapter through the networking server, and includes:
the authentication subunit is used for the networking adapter to apply for authentication to the Internet of things coding center through the networking server;
the key generation subunit is used for returning authentication information if the authentication is successful, sending networking authorization through the networking server and generating a unique key;
and the recording subunit is used for recording an authentication failure log in the networking server if the authentication fails.
In a preferred embodiment, the access module 1004 is configured to access the terminal device through the authenticated networking adapter, and includes:
the establishing subunit is used for the networking server to define a white list in a gateway and establish cloud connection for the networking adapter after authentication;
the application authority subunit is used for acquiring application authority according to the cloud connection;
and the connection subunit is used for connecting the terminal equipment through the application authority.
Referring to fig. 8, a block diagram of a second embodiment of the security protection device for a wireless networking protocol according to the present invention is shown, where after the authenticated networking adapter is accessed to a terminal device, the second embodiment of the security protection device for a wireless networking protocol specifically includes the following modules:
a decoding module 1005, configured to read terminal device data in the terminal device, and decode the terminal device data;
an uploading module 1006, configured to upload the decoding terminal device data to a cloud platform.
In a preferred embodiment, the uploading module 1006 is configured to upload the decoding terminal device data to a cloud platform, and includes:
the conversion subunit is used for converting the decoding terminal equipment data into industrial standard data;
the sending subunit is configured to transmit the industrial standard data to a relay network device, and send the industrial standard data to the networking server through the relay network device;
and the uploading subunit is used for uploading the networking server to the cloud platform through the gateway.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs a wireless networking protocol security protection method as in the embodiment of the present application.
The embodiment of the invention has the following advantages: the networking adapter is authenticated by the networking server to an Internet of things coding center, and the networking adapter after authentication generates a unique corresponding key and corresponding application permission for carrying out communication connection and data encryption transmission with the terminal equipment; carrying out communication security verification on the terminal equipment by generating a unique corresponding key; the access terminal equipment can be registered, and the terminal equipment which is not verified has no application authority in the network; the multi-level authority management is realized through network authorization, the hierarchical control and audit trail management of different terminal devices and different operations are met, and illegal abnormal operation is avoided; data transmission between terminal equipment is encrypted and decrypted, so that non-authenticated terminal equipment cannot read data, and data information leakage is prevented.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method, the device and the storage medium for wireless networking protocol security protection provided by the invention are introduced in detail, a specific example is applied in the text to explain the principle and the implementation mode of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A wireless networking protocol security protection method is characterized by comprising the following steps:
acquiring factory information of a networking adapter;
transmitting the factory information to a networking server;
authenticating the networking adapter through the networking server;
and accessing the networking adapter after passing the authentication to the terminal equipment.
2. The method of claim 1, wherein the factory information comprises a product number, a name, an ID, and a start time.
3. The method of claim 1, wherein the step of transmitting the factory information to a networking server comprises:
accessing the networking adapter to a relay network device;
and transmitting the factory information to the networking server through the relay network equipment.
4. The method of claim 1, wherein the step of authenticating the networking adapter with the networking server comprises:
the networking adapter applies for authentication to an Internet of things coding center through the networking server;
if the authentication is successful, returning authentication information, sending networking authorization through a networking server, and generating a unique key;
and if the authentication fails, recording an authentication failure log in the networking server.
5. The method of claim 1, wherein the step of accessing the terminal device by the authenticated networking adapter comprises:
the networking server defines a white list in a gateway and establishes cloud connection for the networking adapter after authentication;
acquiring application permission according to the cloud connection;
and connecting the terminal equipment through the application authority.
6. The method of claim 1, wherein the step after the authenticated networking adapter accesses the terminal device comprises:
reading terminal equipment data in the terminal equipment and decoding the terminal equipment data;
and uploading the data of the decoding terminal equipment to a cloud platform.
7. The method of claim 6, wherein the end device data includes a device ID, a type, a parameter, a runtime, and a log of operations.
8. The method according to claim 6, wherein the step of uploading the decoded terminal device data to a cloud platform comprises:
converting the decoding terminal equipment data into industrial standard data;
transmitting the industrial standard data to a relay network device, and sending the industrial standard data to the networking server through the relay network device;
and the networking server uploads the networking server to the cloud platform through a gateway.
9. A wireless networking protocol safety device, comprising:
the acquisition module is used for acquiring factory information of the networking adapter;
the transmission module is used for transmitting the factory information to a networking server;
the authentication module is used for authenticating the networking adapter through the networking server;
and the access module is used for accessing the terminal equipment through the authenticated networking adapter.
10. A computer-readable storage medium having stored thereon a computer program, characterized in that,
the program when executed by a processor implements the steps of the method of any one of claims 1 to 8.
CN201911215454.XA 2019-12-02 2019-12-02 Wireless networking protocol security protection method, device and storage medium Pending CN110944055A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911215454.XA CN110944055A (en) 2019-12-02 2019-12-02 Wireless networking protocol security protection method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911215454.XA CN110944055A (en) 2019-12-02 2019-12-02 Wireless networking protocol security protection method, device and storage medium

Publications (1)

Publication Number Publication Date
CN110944055A true CN110944055A (en) 2020-03-31

Family

ID=69908611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911215454.XA Pending CN110944055A (en) 2019-12-02 2019-12-02 Wireless networking protocol security protection method, device and storage medium

Country Status (1)

Country Link
CN (1) CN110944055A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200176A (en) * 2013-02-27 2013-07-10 中国工商银行股份有限公司 Identification method, identification device and identification system based on bank independent communication channel
CN104052641A (en) * 2013-03-15 2014-09-17 佘培嘉 Electric appliance network adapter networking method
CN104378382A (en) * 2014-11-28 2015-02-25 上海斐讯数据通信技术有限公司 Multiple client wireless authentication system and authentication method thereof
CN105471858A (en) * 2015-11-20 2016-04-06 西安电子科技大学 Internet-of-things-sensing-equipment-based cloud platform authentication system and method
CN106656999A (en) * 2016-11-10 2017-05-10 济南浪潮高新科技投资发展有限公司 Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment
CN106790034A (en) * 2016-12-15 2017-05-31 中国电子技术标准化研究院((工业和信息化部电子工业标准化研究院)(工业和信息化部电子第四研究院)) A kind of internet of things equipment certification and the method for secure accessing
US20180255203A1 (en) * 2014-07-11 2018-09-06 Brother Kogyo Kabushiki Kaisha Non-Transitory Computer-Readable Recording Medium Storing Computer-Readable Instructions for Terminal Device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200176A (en) * 2013-02-27 2013-07-10 中国工商银行股份有限公司 Identification method, identification device and identification system based on bank independent communication channel
CN104052641A (en) * 2013-03-15 2014-09-17 佘培嘉 Electric appliance network adapter networking method
US20180255203A1 (en) * 2014-07-11 2018-09-06 Brother Kogyo Kabushiki Kaisha Non-Transitory Computer-Readable Recording Medium Storing Computer-Readable Instructions for Terminal Device
CN104378382A (en) * 2014-11-28 2015-02-25 上海斐讯数据通信技术有限公司 Multiple client wireless authentication system and authentication method thereof
CN105471858A (en) * 2015-11-20 2016-04-06 西安电子科技大学 Internet-of-things-sensing-equipment-based cloud platform authentication system and method
CN106656999A (en) * 2016-11-10 2017-05-10 济南浪潮高新科技投资发展有限公司 Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment
CN106790034A (en) * 2016-12-15 2017-05-31 中国电子技术标准化研究院((工业和信息化部电子工业标准化研究院)(工业和信息化部电子第四研究院)) A kind of internet of things equipment certification and the method for secure accessing

Similar Documents

Publication Publication Date Title
CN108965230B (en) Secure communication method, system and terminal equipment
US9762392B2 (en) System and method for trusted provisioning and authentication for networked devices in cloud-based IoT/M2M platforms
CN101964791B (en) Communication authenticating system and method of client and WEB application
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
CN110611569B (en) Authentication method and related equipment
CN103517273A (en) Authentication method, managing platform and Internet-of-Things equipment
US10133861B2 (en) Method for controlling access to a production system of a computer system not connected to an information system of said computer system
CN112632521B (en) Request response method and device, electronic equipment and storage medium
US9961078B2 (en) Network system comprising a security management server and a home network, and method for including a device in the network system
CN104836784A (en) Information processing method, client, and server
CN113676332B (en) Two-dimensional code authentication method, communication device and storage medium
CN102984045A (en) Access method of Virtual Private Network and Virtual Private Network client
CN103188677A (en) Client software authentication method and client software authentication device and client software authentication system
CN109583154A (en) A kind of system and method based on Web middleware access intelligent code key
CN115412269A (en) Service processing method, device, server and storage medium
CN105451038A (en) Code generation method, code authentication method, related device and system
CN103152326A (en) Distributed authentication method and authentication system
CN115150109A (en) Authentication method, device and related equipment
CN101321209B (en) Safe communication distributed data extraction method and implementing system based on PSTN
CN110636473A (en) Vehicle Bluetooth communication method and device, electronic equipment and readable storage medium
CN110944055A (en) Wireless networking protocol security protection method, device and storage medium
KR102053993B1 (en) Method for Authenticating by using Certificate
CN102045709B (en) Mobile terminal application data downloading method, system and mobile terminal
CN112733166A (en) license authentication and authorization function realization method and system
CN111935173A (en) Router login verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200331