CN111541534A - Control method and device for terminal of Internet of things and storage medium - Google Patents
Control method and device for terminal of Internet of things and storage medium Download PDFInfo
- Publication number
- CN111541534A CN111541534A CN202010293509.5A CN202010293509A CN111541534A CN 111541534 A CN111541534 A CN 111541534A CN 202010293509 A CN202010293509 A CN 202010293509A CN 111541534 A CN111541534 A CN 111541534A
- Authority
- CN
- China
- Prior art keywords
- terminal
- internet
- things
- control
- control command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000004891 communication Methods 0.000 claims description 32
- 238000004590 computer program Methods 0.000 claims description 17
- 230000015654 memory Effects 0.000 claims description 14
- 238000012795 verification Methods 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000005406 washing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The embodiment of the invention provides a control method, equipment and a storage medium of an Internet of things terminal. According to the embodiment of the invention, the key shared between the control terminal and the Internet of things terminal is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the block chain network, so that the Internet of things terminal can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
Description
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a control method, equipment and a storage medium for an internet of things terminal.
Background
With the development of the technology of the internet of things, more and more terminals or devices of the internet of things are provided. The internet of things terminal or the internet of things equipment comprises a self-service washing machine, a self-service charging pile, a self-service blower, a massage chair, a rocking car, a doll grabbing machine and the like.
However, with the rapid development of the internet of things industry, internet of things terminals or internet of things devices face more and more network attacks. Because the terminal of the internet of things or the equipment of the internet of things is always in an online state once being accessed into the network of the internet of things, the terminal of the internet of things or the equipment of the internet of things is very easy to be controlled by hackers. For example, a hacker may obtain the control authority of the terminal of the internet of things or the device of the internet of things by using a password guessing method or by using a vulnerability of the terminal of the internet of things or the device of the internet of things, and randomly attack the terminal of the internet of things or the device of the internet of things, thereby causing the security of the terminal of the internet of things or the device of the internet of things to be low.
Disclosure of Invention
The embodiment of the invention provides a control method, equipment and a storage medium of an Internet of things terminal, so as to prevent the Internet of things terminal from being attacked and improve the safety of the Internet of things terminal.
In a first aspect, an embodiment of the present invention provides a method for controlling an internet of things terminal, including:
the control terminal generates a key for controlling the terminal of the Internet of things;
the control terminal signs the secret key by adopting a private key of the control terminal to obtain first signature information;
the control terminal encrypts the first signature information by adopting a public key of the Internet of things terminal to obtain encrypted information;
the control terminal broadcasts the encryption information in a block chain network, and the control terminal and the Internet of things terminal are nodes in the block chain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information and successfully verifies the first signature information by adopting a public key of the control terminal, the control terminal encrypts a control command by adopting the secret key to obtain an encrypted control command;
and the control terminal broadcasts the encrypted control command in the block chain network, and the control command is used for controlling the Internet of things terminal.
In a second aspect, an embodiment of the present invention provides a method for controlling an internet of things terminal, including:
the method comprises the steps that an Internet of things terminal receives encrypted information broadcasted by a control terminal in a block chain network, the encrypted information is obtained by the control terminal through encryption of first signature information by adopting a public key of the Internet of things terminal, the first signature information is obtained by the control terminal through signature of a secret key used for controlling the Internet of things terminal by adopting a private key of the control terminal, and the control terminal and the Internet of things terminal are nodes in the block chain network;
the Internet of things terminal decrypts the encrypted information by adopting a private key of the Internet of things terminal to obtain the first signature information;
the Internet of things terminal verifies the first signature information by adopting the public key of the control terminal;
when the first signature information passes verification, the internet of things terminal receives an encrypted control command broadcasted by the control terminal in the block chain network, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the internet of things terminal.
In a third aspect, an embodiment of the present invention provides a control terminal, including:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
generating a secret key for controlling the terminal of the Internet of things;
signing the secret key by adopting a private key of the control terminal to obtain first signature information;
encrypting the first signature information by adopting a public key of the terminal of the Internet of things to obtain encrypted information;
broadcasting the encryption information in a blockchain network through the communication interface, wherein the control terminal and the internet of things terminal are nodes in the blockchain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is adopted to successfully verify the first signature information, the secret key is adopted to encrypt a control command to obtain an encrypted control command;
and broadcasting the encrypted control command in the block chain network through the communication interface, wherein the control command is used for controlling the Internet of things terminal.
In a fourth aspect, an embodiment of the present invention provides an internet of things terminal, including:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
receiving encrypted information broadcasted by a control terminal in a blockchain network through the communication interface, wherein the encrypted information is obtained by encrypting first signature information by the control terminal through a public key of the internet of things terminal, the first signature information is obtained by signing a secret key for controlling the internet of things terminal through a private key of the control terminal by the control terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network;
decrypting the encrypted information by using a private key of the Internet of things terminal to obtain the first signature information;
verifying the first signature information by adopting a public key of the control terminal;
and when the first signature information passes the verification, receiving an encrypted control command broadcasted by the control terminal in the block chain network through the communication interface, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the terminal of the internet of things.
In a fifth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the method of the first aspect or the second aspect.
According to the control method, the control device and the storage medium of the terminal of the internet of things provided by the embodiment of the invention, the key shared between the control terminal and the terminal of the internet of things is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the blockchain network, so that the terminal of the internet of things can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of a control method of an internet of things terminal according to an embodiment of the present invention;
fig. 3 is a flowchart of a control method for an internet of things terminal according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a control terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an internet of things terminal provided in an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The control method of the internet of things terminal provided by the embodiment of the invention can be applied to the communication system shown in fig. 1. As shown in fig. 1, the communication system includes: the system comprises a control terminal, an Internet of things terminal, a block chain node and a billing node, wherein the control terminal, the Internet of things terminal, the block chain node and the billing node are participating nodes in a block chain network respectively. It is understood that the description is only illustrative and does not limit the number and types of nodes in the blockchain network. The accounting node can be one or a plurality of cloud servers, the cloud servers are a server cluster, a plurality of servers are arranged, the server cluster is similar to a universal computer framework, and the cloud servers comprise processors, hard disks, memories, system buses and the like. The control terminal or the internet of things terminal may be a user terminal, for example, a smart phone, a tablet computer, a personal computer, or the like. In addition, in the embodiment of the present application, the blockchain network is a decentralized peer-to-peer (P2P) communication network.
The embodiment of the invention provides a control method of an Internet of things terminal, and aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
In this embodiment of the application, the terminal of the internet of things is initialized after leaving the factory, and specifically, the initializing includes configuring at least one of a block chain seed node address, a public key of the control terminal, and identification information of the terminal of the internet of things in the terminal of the internet of things. In order to prevent the terminal of the internet of things from being attacked in the initialization configuration process, the terminal of the internet of things and the configuration terminal can be connected in a serial port or wired mode in the initialization configuration process, and further, the configuration terminal performs initialization configuration on the terminal of the internet of things in the serial port or wired mode. Or, the terminal of the internet of things and the configuration terminal are respectively connected with the same Access Point (AP), and the configuration terminal performs initialization configuration on the terminal of the internet of things through the AP. In addition, the terminal of the internet of things can be further provided with an indicator light, and the indicator light is used for prompting whether the initialization configuration is successful or not. It can be understood that the configuration terminal performs initialization configuration on the terminal of the internet of things through a serial port, a wired manner or the same AP, which are only some possible manners for preventing the terminal of the internet of things from being attacked in the initialization configuration process, and are not limited thereto. In addition, if the terminal of the internet of things is in the process of initial configuration, the configuration terminal can not effectively prevent the terminal of the internet of things from being attacked in the mode of performing initial configuration on the terminal of the internet of things, and the indicator lamp can also be used for prompting that the initial configuration has the risk of being attacked.
After the terminal of the internet of things completes the initial configuration, the terminal of the internet of things can be deployed in an industrial field. The terminal of the Internet of things can automatically start the embedded block chain client after being powered on, and is connected to the block chain network through the block chain client to serve as a node in the block chain network. Optionally, after the terminal of the internet of things is successfully connected to the block chain network, the terminal of the internet of things can also perform corresponding indication through the indicator lamp.
In addition, in order to ensure that the public key and the private key of the terminal of the internet of things are not forged, the terminal of the internet of things can automatically generate the public key and the private key of the terminal of the internet of things. Further, the terminal of the internet of things can store the private key of the terminal of the internet of things locally. Other nodes in the block chain network cannot read and write the private key of the terminal of the internet of things through serial ports or other network modes. When the internet of things terminal is registered in the blockchain network, the internet of things terminal can sign own public key and identification information by adopting a private key to obtain signature information, further, the signature information is broadcasted in the blockchain network, other nodes in the blockchain network can record the signature information in a blockchain account book, and when the signature information is recorded in the blockchain account book, the internet of things terminal is successfully registered in the blockchain network.
In addition, the public key and the private key of the terminal of the internet of things can be generated in the process of initialization configuration. The private key of the internet of things terminal can be stored locally in the internet of things terminal. The public key of the terminal of the internet of things can be sent to the control terminal, and the public key of the terminal of the internet of things is stored by the control terminal.
Fig. 2 is a flowchart of a control method for an internet of things terminal according to an embodiment of the present invention. The embodiment of the invention provides a control method of an internet of things terminal aiming at the above technical problems in the prior art, and the method comprises the following specific steps:
Optionally, the generating, by the control terminal, a key for controlling the terminal of the internet of things includes: and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
For example, when the control terminal detects that the block chain account book includes the public key and the identification information of the internet of things terminal, the control terminal determines that the internet of things terminal is on line and generates a secret key for controlling the internet of things terminal.
For example, the control terminal signs the key by using its own private key to obtain the first signature information.
And 203, the control terminal encrypts the first signature information by using the public key of the internet of things terminal to obtain encrypted information.
Further, the control terminal encrypts the first signature information by using a public key of the internet of things terminal to obtain encrypted information.
And 204, the control terminal broadcasts the encryption information in a block chain network, and the control terminal and the internet of things terminal are nodes in the block chain network.
Further, the control terminal broadcasts the encryption information in the blockchain network, so that the internet of things terminal in the blockchain network can receive the encryption information.
After the internet of things terminal receives the encrypted information, the internet of things terminal firstly decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information. Further, the terminal of the internet of things verifies the first signature information by adopting a public key of the control terminal in an initialization configuration process. And if the first signature information passes the verification, the internet of things terminal and the control terminal adopt the secret key to carry out safe communication. For example, when the control terminal controls the terminal of the internet of things, the control terminal generates a control command for controlling the terminal of the internet of things, and encrypts the control command by using the secret key to obtain the encrypted control command. It will be appreciated that in some embodiments, the control terminal may update the key periodically or aperiodically.
And step 206, the control terminal broadcasts the encrypted control command in the block chain network, and the control command is used for controlling the terminal of the internet of things.
For example, the control terminal may broadcast the encrypted control command to the blockchain network, so that the internet of things terminal in the blockchain network may receive the encrypted control command, decrypt the encrypted control command by using a key shared between the internet of things terminal and the control terminal, obtain the control command, and execute the control command.
It is to be understood that in other embodiments, the control terminal may broadcast the control command directly into the blockchain network so that the internet of things terminal in the blockchain network executes the control command. That is, when the control command needs to be kept secret, the control terminal may encrypt the control command using a secret key shared between the internet of things terminal and the control terminal.
In addition, the control command received by the terminal of the internet of things can also be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network. If the malicious attacker is not a node in the blockchain network, the terminal of the internet of things can refuse to receive the control command from the malicious attacker. If the malicious attacker is a node in the blockchain network, the malicious attacker cannot control the internet of things terminal because the malicious attacker cannot acquire the key shared between the internet of things terminal and the control terminal. If the malicious attacker is a node in the blockchain network and the malicious attacker generates a shared key between the malicious attacker and the internet of things terminal, a control command generated by the malicious attacker is recorded in the blockchain network, and the malicious attacker can be queried through the control command in the blockchain network.
According to the embodiment of the invention, the key shared between the control terminal and the Internet of things terminal is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the block chain network, so that the Internet of things terminal can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
Fig. 3 is a flowchart of a control method for an internet of things terminal according to another embodiment of the present invention. The method for controlling the terminal of the internet of things provided by the embodiment specifically comprises the following steps:
For example, when the control terminal detects that the block chain account book includes the public key and the identification information of the internet of things terminal, the control terminal determines that the internet of things terminal is on line and generates a secret key for controlling the internet of things terminal. The control terminal signs the key by adopting a private key of the control terminal to obtain first signature information. Further, the control terminal encrypts the first signature information by using a public key of the internet of things terminal to obtain encrypted information. The control terminal broadcasts the encryption information in the blockchain network, so that the internet of things terminal in the blockchain network can receive the encryption information.
After the internet of things terminal receives the encrypted information, the internet of things terminal firstly decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information.
And step 303, the internet of things terminal verifies the first signature information by using the public key of the control terminal.
Further, the terminal of the internet of things verifies the first signature information by adopting a public key of the control terminal in an initialization configuration process.
And 304, when the first signature information passes verification, the internet of things terminal receives an encrypted control command broadcasted by the control terminal in the blockchain network, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the internet of things terminal.
And if the first signature information passes the verification, the internet of things terminal and the control terminal adopt the secret key to carry out safe communication. For example, when the control terminal controls the terminal of the internet of things, the control terminal generates a control command for controlling the terminal of the internet of things, and encrypts the control command by using the secret key to obtain the encrypted control command. It will be appreciated that in some embodiments, the control terminal may update the key periodically or aperiodically.
For example, the control terminal may broadcast the encrypted control command to the blockchain network, so that the internet of things terminal in the blockchain network may receive the encrypted control command, decrypt the encrypted control command by using a key shared between the internet of things terminal and the control terminal, obtain the control command, and execute the control command.
It is to be understood that in other embodiments, the control terminal may broadcast the control command directly into the blockchain network so that the internet of things terminal in the blockchain network executes the control command. That is, when the control command needs to be kept secret, the control terminal may encrypt the control command using a secret key shared between the internet of things terminal and the control terminal.
In addition, the control command received by the terminal of the internet of things can also be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network. If the malicious attacker is not a node in the blockchain network, the terminal of the internet of things can refuse to receive the control command from the malicious attacker. If the malicious attacker is a node in the blockchain network, the malicious attacker cannot control the internet of things terminal because the malicious attacker cannot acquire the key shared between the internet of things terminal and the control terminal. If the malicious attacker is a node in the blockchain network and the malicious attacker generates a shared key between the malicious attacker and the internet of things terminal, a control command generated by the malicious attacker is recorded in the blockchain network, and the malicious attacker can be queried through the control command in the blockchain network.
According to the embodiment of the invention, the key shared between the control terminal and the Internet of things terminal is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the block chain network, so that the Internet of things terminal can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
On the basis of the foregoing embodiment, before the terminal of the internet of things receives the encryption information broadcast by the control terminal in the blockchain network, the method further includes: the internet of things terminal generates a private key of the internet of things terminal and a public key of the internet of things terminal, and the private key of the internet of things terminal is stored in the internet of things terminal.
For example, in order to ensure that the public key and the private key of the terminal of the internet of things are not forged, the terminal of the internet of things may automatically generate its own public key and private key. Further, the terminal of the internet of things can store the private key of the terminal of the internet of things locally. Other nodes in the block chain network cannot read and write the private key of the terminal of the internet of things through serial ports or other network modes.
In one possible implementation, the method further includes: the Internet of things terminal signs the public key of the Internet of things terminal and the identification information of the Internet of things terminal by adopting the private key of the Internet of things terminal to obtain second signature information; and the terminal of the Internet of things broadcasts the second signature information in the block chain network.
When the internet of things terminal is registered in the block chain network, the internet of things terminal can sign own public key and identification information by adopting a private key to obtain signature information, the signature information is recorded as second signature information, further, the signature information is broadcasted in the block chain network, other nodes in the block chain network can record the signature information in the block chain account book, and when the signature information is recorded in the block chain account book, the internet of things terminal is indicated to be successfully registered in the block chain network.
In another possible implementation manner, the method further includes: and the Internet of things terminal sends the public key of the Internet of things terminal to the control terminal.
In addition, the public key and the private key of the terminal of the internet of things can be generated in the process of initialization configuration. The private key of the internet of things terminal can be stored locally in the internet of things terminal. The public key of the terminal of the internet of things can be sent to the control terminal, and the public key of the terminal of the internet of things is stored by the control terminal.
Fig. 4 is a schematic structural diagram of a control terminal according to an embodiment of the present invention. As shown in fig. 4, the control terminal 40 may execute the processing procedure provided in the control method of the terminal of the internet of things, where: memory 41, processor 42, computer programs and communication interface 43; wherein the computer program is stored in the memory 41 and is configured to be executed by the processor 42 for: generating a secret key for controlling the terminal of the Internet of things; signing the secret key by adopting a private key of the control terminal to obtain first signature information; encrypting the first signature information by adopting a public key of the terminal of the Internet of things to obtain encrypted information; broadcasting the encryption information in a blockchain network through the communication interface, wherein the control terminal and the internet of things terminal are nodes in the blockchain network; when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is adopted to successfully verify the first signature information, the secret key is adopted to encrypt a control command to obtain an encrypted control command; and broadcasting the encrypted control command in the block chain network through the communication interface, wherein the control command is used for controlling the Internet of things terminal.
Optionally, when the processor 42 generates a key for controlling the terminal of the internet of things, the processor is specifically configured to: and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
The control terminal in the embodiment shown in fig. 4 may be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 5 is a schematic structural diagram of an internet of things terminal provided in an embodiment of the present invention. As shown in fig. 5, the internet of things terminal 50 includes: memory 51, processor 52, computer programs and communication interface 53; wherein the computer program is stored in the memory 51 and is configured to be executed by the processor 52 for: receiving encrypted information broadcasted by a control terminal in a blockchain network through the communication interface, wherein the encrypted information is obtained by encrypting first signature information by the control terminal through a public key of the internet of things terminal, the first signature information is obtained by signing a secret key for controlling the internet of things terminal through a private key of the control terminal by the control terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network; decrypting the encrypted information by using a private key of the Internet of things terminal to obtain the first signature information; verifying the first signature information by adopting a public key of the control terminal; and when the first signature information passes the verification, receiving an encrypted control command broadcasted by the control terminal in the block chain network through the communication interface, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the terminal of the internet of things.
Optionally, before the processor 52 receives the encryption information broadcasted by the control terminal in the blockchain network through the communication interface, the processor is further configured to: and generating a private key of the terminal of the Internet of things and a public key of the terminal of the Internet of things, wherein the private key of the terminal of the Internet of things is stored in the terminal of the Internet of things.
Optionally, the processor 52 is further configured to: signing the public key of the Internet of things terminal and the identification information of the Internet of things terminal by using the private key of the Internet of things terminal to obtain second signature information; broadcasting the second signature information in the blockchain network through the communication interface.
Optionally, the processor 52 is further configured to: and sending the public key of the Internet of things terminal to the control terminal through the communication interface.
The internet of things terminal in the embodiment shown in fig. 5 may be used to implement the technical solution of the method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
In addition, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method for controlling the terminal of the internet of things according to the foregoing embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (13)
1. A control method for an Internet of things terminal is characterized by comprising the following steps:
the control terminal generates a key for controlling the terminal of the Internet of things;
the control terminal signs the secret key by adopting a private key of the control terminal to obtain first signature information;
the control terminal encrypts the first signature information by adopting a public key of the Internet of things terminal to obtain encrypted information;
the control terminal broadcasts the encryption information in a block chain network, and the control terminal and the Internet of things terminal are nodes in the block chain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information and successfully verifies the first signature information by adopting a public key of the control terminal, the control terminal encrypts a control command by adopting the secret key to obtain an encrypted control command;
and the control terminal broadcasts the encrypted control command in the block chain network, and the control command is used for controlling the Internet of things terminal.
2. The method of claim 1, wherein the control terminal generating a key for controlling the terminal of the internet of things comprises:
and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
3. A control method for an Internet of things terminal is characterized by comprising the following steps:
the method comprises the steps that an Internet of things terminal receives encrypted information broadcasted by a control terminal in a block chain network, the encrypted information is obtained by the control terminal through encryption of first signature information by adopting a public key of the Internet of things terminal, the first signature information is obtained by the control terminal through signature of a secret key used for controlling the Internet of things terminal by adopting a private key of the control terminal, and the control terminal and the Internet of things terminal are nodes in the block chain network;
the Internet of things terminal decrypts the encrypted information by adopting a private key of the Internet of things terminal to obtain the first signature information;
the Internet of things terminal verifies the first signature information by adopting the public key of the control terminal;
when the first signature information passes verification, the internet of things terminal receives an encrypted control command broadcasted by the control terminal in the block chain network, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the internet of things terminal.
4. The method of claim 3, wherein before the IOT terminal receives the encryption information broadcasted by the control terminal in the blockchain network, the method further comprises:
the internet of things terminal generates a private key of the internet of things terminal and a public key of the internet of things terminal, and the private key of the internet of things terminal is stored in the internet of things terminal.
5. The method of claim 4, further comprising:
the Internet of things terminal signs the public key of the Internet of things terminal and the identification information of the Internet of things terminal by adopting the private key of the Internet of things terminal to obtain second signature information;
and the terminal of the Internet of things broadcasts the second signature information in the block chain network.
6. The method of claim 4, further comprising:
and the Internet of things terminal sends the public key of the Internet of things terminal to the control terminal.
7. A control terminal, comprising:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
generating a secret key for controlling the terminal of the Internet of things;
signing the secret key by adopting a private key of the control terminal to obtain first signature information;
encrypting the first signature information by adopting a public key of the terminal of the Internet of things to obtain encrypted information;
broadcasting the encryption information in a blockchain network through the communication interface, wherein the control terminal and the internet of things terminal are nodes in the blockchain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is adopted to successfully verify the first signature information, the secret key is adopted to encrypt a control command to obtain an encrypted control command;
and broadcasting the encrypted control command in the block chain network through the communication interface, wherein the control command is used for controlling the Internet of things terminal.
8. The control terminal according to claim 7, wherein the processor, when generating the key for controlling the terminal of the internet of things, is specifically configured to:
and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
9. An internet of things terminal, comprising:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
receiving encrypted information broadcasted by a control terminal in a blockchain network through the communication interface, wherein the encrypted information is obtained by encrypting first signature information by the control terminal through a public key of the internet of things terminal, the first signature information is obtained by signing a secret key for controlling the internet of things terminal through a private key of the control terminal by the control terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network;
decrypting the encrypted information by using a private key of the Internet of things terminal to obtain the first signature information;
verifying the first signature information by adopting a public key of the control terminal;
and when the first signature information passes the verification, receiving an encrypted control command broadcasted by the control terminal in the block chain network through the communication interface, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the terminal of the internet of things.
10. The terminal of the internet of things of claim 9, wherein before receiving the encryption information broadcasted by the control terminal in the blockchain network through the communication interface, the processor is further configured to:
and generating a private key of the terminal of the Internet of things and a public key of the terminal of the Internet of things, wherein the private key of the terminal of the Internet of things is stored in the terminal of the Internet of things.
11. The internet of things terminal of claim 10, wherein the processor is further configured to:
signing the public key of the Internet of things terminal and the identification information of the Internet of things terminal by using the private key of the Internet of things terminal to obtain second signature information;
broadcasting the second signature information in the blockchain network through the communication interface.
12. The internet of things terminal of claim 10, wherein the processor is further configured to:
and sending the public key of the Internet of things terminal to the control terminal through the communication interface.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010293509.5A CN111541534B (en) | 2020-04-14 | 2020-04-14 | Control method, equipment and storage medium of terminal of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010293509.5A CN111541534B (en) | 2020-04-14 | 2020-04-14 | Control method, equipment and storage medium of terminal of Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111541534A true CN111541534A (en) | 2020-08-14 |
CN111541534B CN111541534B (en) | 2023-10-24 |
Family
ID=71980190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010293509.5A Active CN111541534B (en) | 2020-04-14 | 2020-04-14 | Control method, equipment and storage medium of terminal of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111541534B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112217797A (en) * | 2020-09-09 | 2021-01-12 | 苏州工业园区凌志软件股份有限公司 | Intelligent gateway Internet of things control system and method applying block chain technology |
CN112277881A (en) * | 2020-12-25 | 2021-01-29 | 上海银基信息安全技术股份有限公司 | Identity authentication method and device, vehicle and user equipment |
CN112689016A (en) * | 2020-12-25 | 2021-04-20 | 杭州复杂美科技有限公司 | Intelligent device control method, device and storage medium |
CN113254972A (en) * | 2021-06-10 | 2021-08-13 | 永旗(北京)科技有限公司 | Information security management method based on block chain |
CN114039952A (en) * | 2021-10-18 | 2022-02-11 | 广州鲁邦通物联网科技股份有限公司 | Intelligent gateway Internet of things control method and system applying block chain technology |
WO2022213760A1 (en) * | 2021-04-09 | 2022-10-13 | 北京石头世纪科技股份有限公司 | Information transmission method, storage medium and electronic device |
CN115604011A (en) * | 2022-10-19 | 2023-01-13 | 上海蜂高科技有限公司(Cn) | Robot and block chain OSI protocol based multi-point communication method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850540A (en) * | 2016-12-09 | 2017-06-13 | 深圳市金立通信设备有限公司 | A kind of terminal control method, terminal and system |
CN107919962A (en) * | 2017-12-22 | 2018-04-17 | 国民认证科技(北京)有限公司 | A kind of internet of things equipment registration and authentication method |
CN108632293A (en) * | 2018-05-16 | 2018-10-09 | 山东建筑大学 | Architectural Equipment Internet of things system based on block chain technology and method |
CN109067724A (en) * | 2018-07-24 | 2018-12-21 | 中国联合网络通信集团有限公司 | Block chain data trade method, apparatus, equipment and storage medium |
CN110784491A (en) * | 2019-11-13 | 2020-02-11 | 深圳前海智安信息科技有限公司 | Internet of things safety management system |
-
2020
- 2020-04-14 CN CN202010293509.5A patent/CN111541534B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850540A (en) * | 2016-12-09 | 2017-06-13 | 深圳市金立通信设备有限公司 | A kind of terminal control method, terminal and system |
CN107919962A (en) * | 2017-12-22 | 2018-04-17 | 国民认证科技(北京)有限公司 | A kind of internet of things equipment registration and authentication method |
CN108632293A (en) * | 2018-05-16 | 2018-10-09 | 山东建筑大学 | Architectural Equipment Internet of things system based on block chain technology and method |
CN109067724A (en) * | 2018-07-24 | 2018-12-21 | 中国联合网络通信集团有限公司 | Block chain data trade method, apparatus, equipment and storage medium |
CN110784491A (en) * | 2019-11-13 | 2020-02-11 | 深圳前海智安信息科技有限公司 | Internet of things safety management system |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112217797A (en) * | 2020-09-09 | 2021-01-12 | 苏州工业园区凌志软件股份有限公司 | Intelligent gateway Internet of things control system and method applying block chain technology |
CN112277881A (en) * | 2020-12-25 | 2021-01-29 | 上海银基信息安全技术股份有限公司 | Identity authentication method and device, vehicle and user equipment |
CN112689016A (en) * | 2020-12-25 | 2021-04-20 | 杭州复杂美科技有限公司 | Intelligent device control method, device and storage medium |
CN112689016B (en) * | 2020-12-25 | 2022-06-28 | 杭州复杂美科技有限公司 | Intelligent device control method, device and storage medium |
WO2022213760A1 (en) * | 2021-04-09 | 2022-10-13 | 北京石头世纪科技股份有限公司 | Information transmission method, storage medium and electronic device |
CN113254972A (en) * | 2021-06-10 | 2021-08-13 | 永旗(北京)科技有限公司 | Information security management method based on block chain |
CN114039952A (en) * | 2021-10-18 | 2022-02-11 | 广州鲁邦通物联网科技股份有限公司 | Intelligent gateway Internet of things control method and system applying block chain technology |
CN114039952B (en) * | 2021-10-18 | 2022-08-05 | 广州鲁邦通物联网科技股份有限公司 | Intelligent gateway Internet of things control method and system applying block chain technology |
CN115604011A (en) * | 2022-10-19 | 2023-01-13 | 上海蜂高科技有限公司(Cn) | Robot and block chain OSI protocol based multi-point communication method |
CN115604011B (en) * | 2022-10-19 | 2023-08-04 | 上海蜂高科技有限公司 | OSI protocol multi-point communication method based on robot and block chain |
Also Published As
Publication number | Publication date |
---|---|
CN111541534B (en) | 2023-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111541534B (en) | Control method, equipment and storage medium of terminal of Internet of things | |
US9722977B2 (en) | Secure host authentication using symmetric key crytography | |
US9467430B2 (en) | Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware | |
WO2017097041A1 (en) | Data transmission method and device | |
CN101588245B (en) | Method of identity authentication, system and memory device thereof | |
JP5564453B2 (en) | Information processing system and information processing method | |
CN111107066A (en) | Sensitive data transmission method and system, electronic equipment and storage medium | |
JP2005236850A (en) | Data communication apparatus and method, and program | |
CN107920052B (en) | Encryption method and intelligent device | |
CN110138548B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol | |
CN112351037B (en) | Information processing method and device for secure communication | |
CN110414248B (en) | Method for debugging microprocessor and microprocessor | |
US20190044922A1 (en) | Symmetric key identity systems and methods | |
CN112507296B (en) | User login verification method and system based on blockchain | |
KR102591826B1 (en) | Apparatus and method for authenticating device based on certificate using physical unclonable function | |
CN111737723A (en) | Service processing method, device and equipment | |
CN110830253A (en) | Key management method, device, server, system and storage medium | |
CN110138558B (en) | Transmission method and device of session key and computer-readable storage medium | |
US20190044721A1 (en) | Device authorization using symmetric key systems and methods | |
WO2016177843A1 (en) | A security approach for storing credentials for offline use and copy-protected vault content in devices | |
CN111740995B (en) | Authorization authentication method and related device | |
CN110048842B (en) | Session key processing method, device and computer readable storage medium | |
CN114175574A (en) | Wireless security protocol | |
KR102415628B1 (en) | Method and apparatus for authenticating drone using dim | |
CN108512824B (en) | Management method of home cloud files and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |