CN110944055A - Wireless networking protocol security protection method, device and storage medium - Google Patents
Wireless networking protocol security protection method, device and storage medium Download PDFInfo
- Publication number
- CN110944055A CN110944055A CN201911215454.XA CN201911215454A CN110944055A CN 110944055 A CN110944055 A CN 110944055A CN 201911215454 A CN201911215454 A CN 201911215454A CN 110944055 A CN110944055 A CN 110944055A
- Authority
- CN
- China
- Prior art keywords
- networking
- adapter
- authentication
- server
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006855 networking Effects 0.000 title claims abstract description 177
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000013475 authorization Methods 0.000 claims abstract description 10
- 230000005540 biological transmission Effects 0.000 claims description 13
- 238000004590 computer program Methods 0.000 claims description 11
- 238000004891 communication Methods 0.000 abstract description 13
- 230000002159 abnormal effect Effects 0.000 abstract description 5
- 238000012795 verification Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 12
- 238000007726 management method Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000013474 audit trail Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000013068 supply chain management Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2212/00—Encapsulation of packets
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a wireless networking protocol safety protection method, a device and a storage medium, wherein the method comprises the following steps: acquiring factory information of a networking adapter; transmitting the factory information to a networking server; authenticating the networking adapter through the networking server; the networking adapter after passing the authentication is accessed into the terminal equipment; the embodiment of the invention can realize that when the connection communication between the terminal devices is carried out, the non-authentication terminal device is prevented from accessing the network to acquire data through safety verification; and the authorization instruction and operation are verified, so that illegal abnormal operation is prevented; the terminal device data information transmitted on the network is encrypted through the unique corresponding key, and information leakage is prevented.
Description
Technical Field
The present invention relates to the field of wireless networking protection technologies, and in particular, to a wireless networking protocol security protection method, apparatus, and storage medium.
Background
Wireless networking, also called wireless ad hoc network, a module for wireless data transmission by using wireless technology; a plurality of modules of the same type can form a small network, data can be mutually transmitted in the network, and the network is widely applied to various fields of the Internet of things.
Currently, in the wireless networking technology, each terminal device adopts different frequency points to transmit radio frequency signals; the receiving end scans and analyzes the received signals and marks the receiving state of the signals; each terminal device selects a received frequency point according to the receiving state and the routing information obtained by analysis; selecting the received signal and the local information to send according to the routing information obtained by analysis; when each terminal device sends a signal, the routing information of each terminal device is updated and received.
The prior art mainly solves the problem how to realize a stable and efficient networking scheme for a plurality of different terminal devices, ensures the security by only using a black and white list to filter the terminal devices, filters the terminal devices through the black and white list, can realize the security management of the networking devices by using a configuration method, but depends on manual operation, cannot prevent data theft, cannot automatically identify registered devices in the networking process, and carries out encryption communication through a point-to-point key authenticated by a third party.
Disclosure of Invention
In view of the above problems, embodiments of the present invention are proposed to provide a wireless networking protocol security protection method and a corresponding wireless networking protocol security protection device that overcome or at least partially solve the above problems.
In order to solve the above problems, an embodiment of the present invention discloses a wireless networking protocol security protection method, including:
acquiring factory information of a networking adapter;
transmitting the factory information to a networking server;
authenticating the networking adapter through the networking server;
the networking adapter after passing the authentication is accessed into the terminal equipment;
further, the factory information comprises a product number, a name, an ID and starting time;
further, the step of transmitting the factory information to a networking server includes:
accessing the networking adapter to a relay network device;
transmitting the factory information to the networking server through the relay network equipment;
further, the step of authenticating the networking adapter through the networking server includes:
the networking adapter applies for authentication to an Internet of things coding center through the networking server;
if the authentication is successful, returning authentication information, sending networking authorization through a networking server, and generating a unique key;
if the authentication fails, recording an authentication failure log in the networking server;
further, the step of accessing the authenticated networking adapter to the terminal device includes:
the networking server defines a white list in a gateway and establishes cloud connection for the networking adapter after authentication;
acquiring application permission according to the cloud connection;
connecting the terminal equipment through the application authority;
further, the step after the authenticated networking adapter accesses the terminal device includes:
reading terminal equipment data in the terminal equipment and decoding the terminal equipment data;
uploading the data of the decoding terminal equipment to a cloud platform;
further, the terminal device data comprises a device ID, a type, a parameter, a runtime, and a running log;
further, the step of uploading the data of the decoding terminal device to a cloud platform includes:
converting the decoding terminal equipment data into industrial standard data;
transmitting the industrial standard data to a relay network device, and sending the industrial standard data to the networking server through the relay network device;
and the networking server uploads the networking server to the cloud platform through a gateway.
The embodiment of the invention also discloses a wireless networking protocol safety protection device, which comprises:
the acquisition module is used for acquiring factory information of the networking adapter;
the transmission module is used for transmitting the factory information to a networking server;
the authentication module is used for authenticating the networking adapter through the networking server;
and the access module is used for accessing the terminal equipment through the authenticated networking adapter.
The embodiment of the invention also discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the program is executed by a processor, the steps of the method are realized.
The embodiment of the invention has the following advantages: the networking adapter is authenticated by the networking server to an Internet of things coding center, and the networking adapter after authentication generates a unique corresponding key and corresponding application permission for carrying out communication connection and data encryption transmission with the terminal equipment; carrying out communication security verification on the terminal equipment by generating a unique corresponding key; the access terminal equipment can be registered, and the terminal equipment which is not verified has no application authority in the network; the multi-level authority management is realized through network authorization, the hierarchical control and audit trail management of different terminal devices and different operations are met, and illegal abnormal operation is avoided; data transmission between terminal equipment is encrypted and decrypted, so that non-authenticated terminal equipment cannot read data, and data information leakage is prevented.
Drawings
FIG. 1 is a flowchart illustrating first steps of a security protection method for a wireless networking protocol according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating steps of a second embodiment of a security protection method for a wireless networking protocol according to the present invention;
FIG. 3 is a flowchart illustrating the third step of a security protection method for a wireless networking protocol according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating the fourth step of a security protection method for a wireless networking protocol according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating the fifth step of a security protection method for a wireless networking protocol according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating the sixth step of a security protection method for wireless networking protocols according to an embodiment of the present invention;
FIG. 7 is a block diagram of a first embodiment of a wireless networking protocol security protection apparatus of the present invention;
fig. 8 is a block diagram of a second embodiment of a wireless networking protocol security protection apparatus according to the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Referring to fig. 1, a flowchart illustrating a first step of a security protection method for a wireless networking protocol according to an embodiment of the present invention is shown, which may specifically include the following steps:
step S10, obtaining factory information of the networking adapter;
step S20, transmitting the factory information to a networking server;
step S30, the networking adapter is authenticated by the networking server;
step S40, the authenticated networking adapter is accessed into the terminal equipment;
wherein the networking adapter comprises at least one; the factory information comprises a product number, a name, an ID and starting time;
acquiring and acquiring factory information corresponding to the networking adapter by starting, wherein the factory information comprises a product number, a name, an ID and starting time; uploading the obtained factory information to a networking server, and applying for authentication of the factory information of the networking adapter through the networking server; the networking adapter after passing the authentication is accessed into the terminal equipment; the unauthenticated networking adapter cannot access the terminal equipment.
In the embodiment of the invention, factory information corresponding to a networking adapter needs to be acquired first, the factory information is uploaded to a networking server, application authentication is carried out according to the factory information, access terminal equipment is granted after the application authentication is passed, and the access of the equipment terminal is allowed by the authenticated networking adapter when connection communication is established between equipment every time; and preventing the non-authenticated networking adapter from accessing the equipment terminal.
Referring to fig. 2, a flowchart illustrating steps of a second embodiment of a wireless networking protocol security protection method according to the present invention is shown, where the factory information is transmitted to a networking server, and the method may specifically include the following steps:
step S201, the networking adapter is accessed to a relay network device;
step S202, the delivery information is transmitted to the networking server through the relay network equipment;
in the embodiment of the invention, a networking adapter is accessed into a relay network device, and corresponding factory information in the networking adapter is sent to a networking server through the relay network device; the relay network equipment can enlarge the communication distance, increase nodes, and use different communication rates in each network segment, thereby improving the reliability of factory information transmission of the networking adapter, avoiding factory information errors or incompleteness, and improving the performance.
Referring to fig. 3, a flowchart illustrating a third step of an embodiment of a method for securing a wireless networking protocol according to the present invention is shown, where the networking server authenticates the networking adapter, and the method specifically includes the following steps:
step S301, the networking adapter applies for authentication to an Internet of things coding center through the networking server;
step S302, if the authentication is successful, the authentication information is returned, networking authorization is sent out through a networking server, and a unique key is generated;
step S303, if the authentication fails, recording an authentication failure log in the networking server;
the internet of things coding center is a Chinese article coding center, the Chinese article coding center is a special mechanism for uniformly organizing, coordinating and managing commodity bar codes, article codes and automatic identification technologies in China, belongs to the State market supervision and management headquarter, and is established in 1988, and the national article coding organization (GS1) is added in 4 months in 1991 to represent China, so that the internet of things coding center is responsible for popularizing an international universal, open and cross-industry global unified identification system and a supply chain management standard, and provides a public service platform and a standardized solution for society.
In the embodiment of the invention, the networking adapter is applied for authentication to a coding center of the Internet of things, namely a Chinese article coding center through a networking server; the authentication is successful in the internet of things coding center, authentication information is returned, networking authorization is sent out through a networking server according to the authentication information and is used for accessing an application network, and corresponding operation permission is obtained; meanwhile, generating a unique key corresponding to the networking adapter for communication connection and data encryption transmission; if the authentication of the networking adapter in the coding center of the Internet of things fails, recording an authentication failure log of the networking adapter in a networking server; after the networking adapter needs to apply for authentication, an application network is obtained according to returned authentication information, corresponding operation authority is obtained, multi-level authority management is achieved through network authorization, hierarchical control and audit trail management of different terminal devices and different operations are met, and illegal abnormal operations are avoided; the unique corresponding key is used for communication connection and encrypted transmission, and is used for encrypting data information transmitted on the network to prevent information leakage; the communication reliability and the data transmission safety can be effectively improved.
Referring to fig. 4, a flowchart illustrating a fourth step of an embodiment of a method for securing a wireless networking protocol according to the present invention is shown, where the networking adapter after passing authentication accesses to a terminal device, and the method specifically includes the following steps:
step S401, the networking server defines a white list in a gateway and establishes cloud connection for the networking adapter after authentication;
step S402, obtaining application authority according to the cloud connection;
step S403, connecting the terminal equipment through the application authority;
in the embodiment of the invention, after a networking adapter passes authentication, a white list is defined in a gateway by a networking server, cloud connection, namely a cloud network channel, is established in the authenticated networking adapter, and corresponding application permission is obtained according to the cloud connection, wherein the application permission comprises reading data, calling a decryption program and a decoding program and sending an operation command request to the networking server; connecting the terminal equipment through corresponding application authority; and the authorization instruction and the operation are verified, and illegal abnormal operation is prevented.
Referring to fig. 5, a flowchart illustrating a fifth step of a method for securing a wireless networking protocol according to an embodiment of the present invention is shown, where after the networking adapter after passing authentication accesses a terminal device, the method may specifically include the following steps:
step S50, reading terminal device data in the terminal device, and decoding the terminal device data;
step S60, uploading the decoding terminal device data to a cloud platform;
the terminal device data comprises a device ID, a type, parameters, running time and a running log;
in the embodiment of the invention, the corresponding data is read in the terminal equipment, and the read data is decoded; uploading the decoded data to a cloud platform; the data of the terminal equipment can be effectively stored on the cloud platform, the data of the terminal equipment are protected through the cloud platform, and in a preferred embodiment, the cloud platform is an enterprise private cloud network.
Referring to fig. 6, a flowchart illustrating a sixth step of a security protection method for a wireless networking protocol according to an embodiment of the present invention is shown, where the data of the decoding terminal device is uploaded to a cloud platform, and the method specifically includes the following steps:
step S601, converting the decoding terminal equipment data into industrial standard data;
step S602, transmitting the industrial standard data to a relay network device, and sending the industrial standard data to the networking server through the relay network device;
step S603, the networking server uploads the networking server to the cloud platform through a gateway;
in the embodiment of the invention, the terminal device data obtained by decoding is packaged by industrial standard data and uploaded to a cloud platform through a relay network device and a gateway of a networking server; accessible network deployment server polling cloud platform when needs carry out parameter update to this terminal equipment, downloads the program script in the high in the clouds of cloud platform, and the high in the clouds feedback to cloud platform is gone back to the operation script to carry out the parameter filling to this terminal equipment according to the configuration needs, network deployment adapter downloads corresponding instruction and parameter, carries out the filling to terminal equipment, and feeds back corresponding state.
Example one
An intelligent plant implementation: the networking adapter is started up and self-checked, and self factory information including product number, name, ID and starting time is collected; accessing a relay network device; submitting factory information of the networking adapter to a networking server; applying authentication to an Internet of things coding center by a networking server; after the internet of things coding center authenticates the networking adapter, authentication information is returned, and a corresponding unique key is generated to serve as a communication connection key; and acquiring application authority, connecting machine tool equipment and acquiring machine tool data.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 7, a block diagram of a first embodiment of a wireless networking protocol security protection apparatus according to the present invention is shown, which may specifically include the following modules:
an obtaining module 1001, configured to obtain factory information of a networking adapter;
a transmission module 1002, configured to transmit the factory information to a networking server;
an authentication module 1003, configured to authenticate the networking adapter through the networking server;
an access module 1004, configured to access the terminal device through the authenticated networking adapter.
In a preferred embodiment, the transmitting module 1002 is configured to transmit the factory information to a networking server, and includes:
the access subunit is used for accessing the networking adapter to the relay network equipment;
and the transmission subunit is used for transmitting the factory information to the networking server through the relay network equipment.
In a preferred embodiment, the authenticating module 1003 is configured to authenticate the networking adapter through the networking server, and includes:
the authentication subunit is used for the networking adapter to apply for authentication to the Internet of things coding center through the networking server;
the key generation subunit is used for returning authentication information if the authentication is successful, sending networking authorization through the networking server and generating a unique key;
and the recording subunit is used for recording an authentication failure log in the networking server if the authentication fails.
In a preferred embodiment, the access module 1004 is configured to access the terminal device through the authenticated networking adapter, and includes:
the establishing subunit is used for the networking server to define a white list in a gateway and establish cloud connection for the networking adapter after authentication;
the application authority subunit is used for acquiring application authority according to the cloud connection;
and the connection subunit is used for connecting the terminal equipment through the application authority.
Referring to fig. 8, a block diagram of a second embodiment of the security protection device for a wireless networking protocol according to the present invention is shown, where after the authenticated networking adapter is accessed to a terminal device, the second embodiment of the security protection device for a wireless networking protocol specifically includes the following modules:
a decoding module 1005, configured to read terminal device data in the terminal device, and decode the terminal device data;
an uploading module 1006, configured to upload the decoding terminal device data to a cloud platform.
In a preferred embodiment, the uploading module 1006 is configured to upload the decoding terminal device data to a cloud platform, and includes:
the conversion subunit is used for converting the decoding terminal equipment data into industrial standard data;
the sending subunit is configured to transmit the industrial standard data to a relay network device, and send the industrial standard data to the networking server through the relay network device;
and the uploading subunit is used for uploading the networking server to the cloud platform through the gateway.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs a wireless networking protocol security protection method as in the embodiment of the present application.
The embodiment of the invention has the following advantages: the networking adapter is authenticated by the networking server to an Internet of things coding center, and the networking adapter after authentication generates a unique corresponding key and corresponding application permission for carrying out communication connection and data encryption transmission with the terminal equipment; carrying out communication security verification on the terminal equipment by generating a unique corresponding key; the access terminal equipment can be registered, and the terminal equipment which is not verified has no application authority in the network; the multi-level authority management is realized through network authorization, the hierarchical control and audit trail management of different terminal devices and different operations are met, and illegal abnormal operation is avoided; data transmission between terminal equipment is encrypted and decrypted, so that non-authenticated terminal equipment cannot read data, and data information leakage is prevented.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method, the device and the storage medium for wireless networking protocol security protection provided by the invention are introduced in detail, a specific example is applied in the text to explain the principle and the implementation mode of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (10)
1. A wireless networking protocol security protection method is characterized by comprising the following steps:
acquiring factory information of a networking adapter;
transmitting the factory information to a networking server;
authenticating the networking adapter through the networking server;
and accessing the networking adapter after passing the authentication to the terminal equipment.
2. The method of claim 1, wherein the factory information comprises a product number, a name, an ID, and a start time.
3. The method of claim 1, wherein the step of transmitting the factory information to a networking server comprises:
accessing the networking adapter to a relay network device;
and transmitting the factory information to the networking server through the relay network equipment.
4. The method of claim 1, wherein the step of authenticating the networking adapter with the networking server comprises:
the networking adapter applies for authentication to an Internet of things coding center through the networking server;
if the authentication is successful, returning authentication information, sending networking authorization through a networking server, and generating a unique key;
and if the authentication fails, recording an authentication failure log in the networking server.
5. The method of claim 1, wherein the step of accessing the terminal device by the authenticated networking adapter comprises:
the networking server defines a white list in a gateway and establishes cloud connection for the networking adapter after authentication;
acquiring application permission according to the cloud connection;
and connecting the terminal equipment through the application authority.
6. The method of claim 1, wherein the step after the authenticated networking adapter accesses the terminal device comprises:
reading terminal equipment data in the terminal equipment and decoding the terminal equipment data;
and uploading the data of the decoding terminal equipment to a cloud platform.
7. The method of claim 6, wherein the end device data includes a device ID, a type, a parameter, a runtime, and a log of operations.
8. The method according to claim 6, wherein the step of uploading the decoded terminal device data to a cloud platform comprises:
converting the decoding terminal equipment data into industrial standard data;
transmitting the industrial standard data to a relay network device, and sending the industrial standard data to the networking server through the relay network device;
and the networking server uploads the networking server to the cloud platform through a gateway.
9. A wireless networking protocol safety device, comprising:
the acquisition module is used for acquiring factory information of the networking adapter;
the transmission module is used for transmitting the factory information to a networking server;
the authentication module is used for authenticating the networking adapter through the networking server;
and the access module is used for accessing the terminal equipment through the authenticated networking adapter.
10. A computer-readable storage medium having stored thereon a computer program, characterized in that,
the program when executed by a processor implements the steps of the method of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911215454.XA CN110944055A (en) | 2019-12-02 | 2019-12-02 | Wireless networking protocol security protection method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911215454.XA CN110944055A (en) | 2019-12-02 | 2019-12-02 | Wireless networking protocol security protection method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110944055A true CN110944055A (en) | 2020-03-31 |
Family
ID=69908611
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911215454.XA Pending CN110944055A (en) | 2019-12-02 | 2019-12-02 | Wireless networking protocol security protection method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110944055A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200176A (en) * | 2013-02-27 | 2013-07-10 | 中国工商银行股份有限公司 | Identification method, identification device and identification system based on bank independent communication channel |
CN104052641A (en) * | 2013-03-15 | 2014-09-17 | 佘培嘉 | Electric appliance network adapter networking method |
CN104378382A (en) * | 2014-11-28 | 2015-02-25 | 上海斐讯数据通信技术有限公司 | Multiple client wireless authentication system and authentication method thereof |
CN105471858A (en) * | 2015-11-20 | 2016-04-06 | 西安电子科技大学 | Internet-of-things-sensing-equipment-based cloud platform authentication system and method |
CN106656999A (en) * | 2016-11-10 | 2017-05-10 | 济南浪潮高新科技投资发展有限公司 | Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment |
CN106790034A (en) * | 2016-12-15 | 2017-05-31 | 中国电子技术标准化研究院((工业和信息化部电子工业标准化研究院)(工业和信息化部电子第四研究院)) | A kind of internet of things equipment certification and the method for secure accessing |
US20180255203A1 (en) * | 2014-07-11 | 2018-09-06 | Brother Kogyo Kabushiki Kaisha | Non-Transitory Computer-Readable Recording Medium Storing Computer-Readable Instructions for Terminal Device |
-
2019
- 2019-12-02 CN CN201911215454.XA patent/CN110944055A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103200176A (en) * | 2013-02-27 | 2013-07-10 | 中国工商银行股份有限公司 | Identification method, identification device and identification system based on bank independent communication channel |
CN104052641A (en) * | 2013-03-15 | 2014-09-17 | 佘培嘉 | Electric appliance network adapter networking method |
US20180255203A1 (en) * | 2014-07-11 | 2018-09-06 | Brother Kogyo Kabushiki Kaisha | Non-Transitory Computer-Readable Recording Medium Storing Computer-Readable Instructions for Terminal Device |
CN104378382A (en) * | 2014-11-28 | 2015-02-25 | 上海斐讯数据通信技术有限公司 | Multiple client wireless authentication system and authentication method thereof |
CN105471858A (en) * | 2015-11-20 | 2016-04-06 | 西安电子科技大学 | Internet-of-things-sensing-equipment-based cloud platform authentication system and method |
CN106656999A (en) * | 2016-11-10 | 2017-05-10 | 济南浪潮高新科技投资发展有限公司 | Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment |
CN106790034A (en) * | 2016-12-15 | 2017-05-31 | 中国电子技术标准化研究院((工业和信息化部电子工业标准化研究院)(工业和信息化部电子第四研究院)) | A kind of internet of things equipment certification and the method for secure accessing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108965230B (en) | Secure communication method, system and terminal equipment | |
US9762392B2 (en) | System and method for trusted provisioning and authentication for networked devices in cloud-based IoT/M2M platforms | |
CN101964791B (en) | Communication authenticating system and method of client and WEB application | |
CN105516103B (en) | Method, device and system for binding intelligent household electrical appliance | |
CN110611569B (en) | Authentication method and related equipment | |
CN103517273A (en) | Authentication method, managing platform and Internet-of-Things equipment | |
US10133861B2 (en) | Method for controlling access to a production system of a computer system not connected to an information system of said computer system | |
CN112632521B (en) | Request response method and device, electronic equipment and storage medium | |
US9961078B2 (en) | Network system comprising a security management server and a home network, and method for including a device in the network system | |
CN104836784A (en) | Information processing method, client, and server | |
CN113676332B (en) | Two-dimensional code authentication method, communication device and storage medium | |
CN102984045A (en) | Access method of Virtual Private Network and Virtual Private Network client | |
CN103188677A (en) | Client software authentication method and client software authentication device and client software authentication system | |
CN109583154A (en) | A kind of system and method based on Web middleware access intelligent code key | |
CN115412269A (en) | Service processing method, device, server and storage medium | |
CN105451038A (en) | Code generation method, code authentication method, related device and system | |
CN103152326A (en) | Distributed authentication method and authentication system | |
CN115150109A (en) | Authentication method, device and related equipment | |
CN101321209B (en) | Safe communication distributed data extraction method and implementing system based on PSTN | |
CN110636473A (en) | Vehicle Bluetooth communication method and device, electronic equipment and readable storage medium | |
CN110944055A (en) | Wireless networking protocol security protection method, device and storage medium | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
CN102045709B (en) | Mobile terminal application data downloading method, system and mobile terminal | |
CN112733166A (en) | license authentication and authorization function realization method and system | |
CN111935173A (en) | Router login verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200331 |