CN111541534A - Control method and device for terminal of Internet of things and storage medium - Google Patents

Control method and device for terminal of Internet of things and storage medium Download PDF

Info

Publication number
CN111541534A
CN111541534A CN202010293509.5A CN202010293509A CN111541534A CN 111541534 A CN111541534 A CN 111541534A CN 202010293509 A CN202010293509 A CN 202010293509A CN 111541534 A CN111541534 A CN 111541534A
Authority
CN
China
Prior art keywords
terminal
internet
things
control
control command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010293509.5A
Other languages
Chinese (zh)
Other versions
CN111541534B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN202010293509.5A priority Critical patent/CN111541534B/en
Publication of CN111541534A publication Critical patent/CN111541534A/en
Application granted granted Critical
Publication of CN111541534B publication Critical patent/CN111541534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The embodiment of the invention provides a control method, equipment and a storage medium of an Internet of things terminal. According to the embodiment of the invention, the key shared between the control terminal and the Internet of things terminal is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the block chain network, so that the Internet of things terminal can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.

Description

Control method and device for terminal of Internet of things and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a control method, equipment and a storage medium for an internet of things terminal.
Background
With the development of the technology of the internet of things, more and more terminals or devices of the internet of things are provided. The internet of things terminal or the internet of things equipment comprises a self-service washing machine, a self-service charging pile, a self-service blower, a massage chair, a rocking car, a doll grabbing machine and the like.
However, with the rapid development of the internet of things industry, internet of things terminals or internet of things devices face more and more network attacks. Because the terminal of the internet of things or the equipment of the internet of things is always in an online state once being accessed into the network of the internet of things, the terminal of the internet of things or the equipment of the internet of things is very easy to be controlled by hackers. For example, a hacker may obtain the control authority of the terminal of the internet of things or the device of the internet of things by using a password guessing method or by using a vulnerability of the terminal of the internet of things or the device of the internet of things, and randomly attack the terminal of the internet of things or the device of the internet of things, thereby causing the security of the terminal of the internet of things or the device of the internet of things to be low.
Disclosure of Invention
The embodiment of the invention provides a control method, equipment and a storage medium of an Internet of things terminal, so as to prevent the Internet of things terminal from being attacked and improve the safety of the Internet of things terminal.
In a first aspect, an embodiment of the present invention provides a method for controlling an internet of things terminal, including:
the control terminal generates a key for controlling the terminal of the Internet of things;
the control terminal signs the secret key by adopting a private key of the control terminal to obtain first signature information;
the control terminal encrypts the first signature information by adopting a public key of the Internet of things terminal to obtain encrypted information;
the control terminal broadcasts the encryption information in a block chain network, and the control terminal and the Internet of things terminal are nodes in the block chain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information and successfully verifies the first signature information by adopting a public key of the control terminal, the control terminal encrypts a control command by adopting the secret key to obtain an encrypted control command;
and the control terminal broadcasts the encrypted control command in the block chain network, and the control command is used for controlling the Internet of things terminal.
In a second aspect, an embodiment of the present invention provides a method for controlling an internet of things terminal, including:
the method comprises the steps that an Internet of things terminal receives encrypted information broadcasted by a control terminal in a block chain network, the encrypted information is obtained by the control terminal through encryption of first signature information by adopting a public key of the Internet of things terminal, the first signature information is obtained by the control terminal through signature of a secret key used for controlling the Internet of things terminal by adopting a private key of the control terminal, and the control terminal and the Internet of things terminal are nodes in the block chain network;
the Internet of things terminal decrypts the encrypted information by adopting a private key of the Internet of things terminal to obtain the first signature information;
the Internet of things terminal verifies the first signature information by adopting the public key of the control terminal;
when the first signature information passes verification, the internet of things terminal receives an encrypted control command broadcasted by the control terminal in the block chain network, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the internet of things terminal.
In a third aspect, an embodiment of the present invention provides a control terminal, including:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
generating a secret key for controlling the terminal of the Internet of things;
signing the secret key by adopting a private key of the control terminal to obtain first signature information;
encrypting the first signature information by adopting a public key of the terminal of the Internet of things to obtain encrypted information;
broadcasting the encryption information in a blockchain network through the communication interface, wherein the control terminal and the internet of things terminal are nodes in the blockchain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is adopted to successfully verify the first signature information, the secret key is adopted to encrypt a control command to obtain an encrypted control command;
and broadcasting the encrypted control command in the block chain network through the communication interface, wherein the control command is used for controlling the Internet of things terminal.
In a fourth aspect, an embodiment of the present invention provides an internet of things terminal, including:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
receiving encrypted information broadcasted by a control terminal in a blockchain network through the communication interface, wherein the encrypted information is obtained by encrypting first signature information by the control terminal through a public key of the internet of things terminal, the first signature information is obtained by signing a secret key for controlling the internet of things terminal through a private key of the control terminal by the control terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network;
decrypting the encrypted information by using a private key of the Internet of things terminal to obtain the first signature information;
verifying the first signature information by adopting a public key of the control terminal;
and when the first signature information passes the verification, receiving an encrypted control command broadcasted by the control terminal in the block chain network through the communication interface, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the terminal of the internet of things.
In a fifth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the method of the first aspect or the second aspect.
According to the control method, the control device and the storage medium of the terminal of the internet of things provided by the embodiment of the invention, the key shared between the control terminal and the terminal of the internet of things is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the blockchain network, so that the terminal of the internet of things can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a flowchart of a control method of an internet of things terminal according to an embodiment of the present invention;
fig. 3 is a flowchart of a control method for an internet of things terminal according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a control terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an internet of things terminal provided in an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The control method of the internet of things terminal provided by the embodiment of the invention can be applied to the communication system shown in fig. 1. As shown in fig. 1, the communication system includes: the system comprises a control terminal, an Internet of things terminal, a block chain node and a billing node, wherein the control terminal, the Internet of things terminal, the block chain node and the billing node are participating nodes in a block chain network respectively. It is understood that the description is only illustrative and does not limit the number and types of nodes in the blockchain network. The accounting node can be one or a plurality of cloud servers, the cloud servers are a server cluster, a plurality of servers are arranged, the server cluster is similar to a universal computer framework, and the cloud servers comprise processors, hard disks, memories, system buses and the like. The control terminal or the internet of things terminal may be a user terminal, for example, a smart phone, a tablet computer, a personal computer, or the like. In addition, in the embodiment of the present application, the blockchain network is a decentralized peer-to-peer (P2P) communication network.
The embodiment of the invention provides a control method of an Internet of things terminal, and aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
In this embodiment of the application, the terminal of the internet of things is initialized after leaving the factory, and specifically, the initializing includes configuring at least one of a block chain seed node address, a public key of the control terminal, and identification information of the terminal of the internet of things in the terminal of the internet of things. In order to prevent the terminal of the internet of things from being attacked in the initialization configuration process, the terminal of the internet of things and the configuration terminal can be connected in a serial port or wired mode in the initialization configuration process, and further, the configuration terminal performs initialization configuration on the terminal of the internet of things in the serial port or wired mode. Or, the terminal of the internet of things and the configuration terminal are respectively connected with the same Access Point (AP), and the configuration terminal performs initialization configuration on the terminal of the internet of things through the AP. In addition, the terminal of the internet of things can be further provided with an indicator light, and the indicator light is used for prompting whether the initialization configuration is successful or not. It can be understood that the configuration terminal performs initialization configuration on the terminal of the internet of things through a serial port, a wired manner or the same AP, which are only some possible manners for preventing the terminal of the internet of things from being attacked in the initialization configuration process, and are not limited thereto. In addition, if the terminal of the internet of things is in the process of initial configuration, the configuration terminal can not effectively prevent the terminal of the internet of things from being attacked in the mode of performing initial configuration on the terminal of the internet of things, and the indicator lamp can also be used for prompting that the initial configuration has the risk of being attacked.
After the terminal of the internet of things completes the initial configuration, the terminal of the internet of things can be deployed in an industrial field. The terminal of the Internet of things can automatically start the embedded block chain client after being powered on, and is connected to the block chain network through the block chain client to serve as a node in the block chain network. Optionally, after the terminal of the internet of things is successfully connected to the block chain network, the terminal of the internet of things can also perform corresponding indication through the indicator lamp.
In addition, in order to ensure that the public key and the private key of the terminal of the internet of things are not forged, the terminal of the internet of things can automatically generate the public key and the private key of the terminal of the internet of things. Further, the terminal of the internet of things can store the private key of the terminal of the internet of things locally. Other nodes in the block chain network cannot read and write the private key of the terminal of the internet of things through serial ports or other network modes. When the internet of things terminal is registered in the blockchain network, the internet of things terminal can sign own public key and identification information by adopting a private key to obtain signature information, further, the signature information is broadcasted in the blockchain network, other nodes in the blockchain network can record the signature information in a blockchain account book, and when the signature information is recorded in the blockchain account book, the internet of things terminal is successfully registered in the blockchain network.
In addition, the public key and the private key of the terminal of the internet of things can be generated in the process of initialization configuration. The private key of the internet of things terminal can be stored locally in the internet of things terminal. The public key of the terminal of the internet of things can be sent to the control terminal, and the public key of the terminal of the internet of things is stored by the control terminal.
Fig. 2 is a flowchart of a control method for an internet of things terminal according to an embodiment of the present invention. The embodiment of the invention provides a control method of an internet of things terminal aiming at the above technical problems in the prior art, and the method comprises the following specific steps:
step 201, the control terminal generates a key for controlling the terminal of the internet of things.
Optionally, the generating, by the control terminal, a key for controlling the terminal of the internet of things includes: and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
For example, when the control terminal detects that the block chain account book includes the public key and the identification information of the internet of things terminal, the control terminal determines that the internet of things terminal is on line and generates a secret key for controlling the internet of things terminal.
Step 202, the control terminal signs the secret key by using the private key of the control terminal to obtain first signature information.
For example, the control terminal signs the key by using its own private key to obtain the first signature information.
And 203, the control terminal encrypts the first signature information by using the public key of the internet of things terminal to obtain encrypted information.
Further, the control terminal encrypts the first signature information by using a public key of the internet of things terminal to obtain encrypted information.
And 204, the control terminal broadcasts the encryption information in a block chain network, and the control terminal and the internet of things terminal are nodes in the block chain network.
Further, the control terminal broadcasts the encryption information in the blockchain network, so that the internet of things terminal in the blockchain network can receive the encryption information.
Step 205, when the internet of things terminal decrypts the encrypted information by using the private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is used to successfully verify the first signature information, the control terminal encrypts a control command by using the private key to obtain the encrypted control command.
After the internet of things terminal receives the encrypted information, the internet of things terminal firstly decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information. Further, the terminal of the internet of things verifies the first signature information by adopting a public key of the control terminal in an initialization configuration process. And if the first signature information passes the verification, the internet of things terminal and the control terminal adopt the secret key to carry out safe communication. For example, when the control terminal controls the terminal of the internet of things, the control terminal generates a control command for controlling the terminal of the internet of things, and encrypts the control command by using the secret key to obtain the encrypted control command. It will be appreciated that in some embodiments, the control terminal may update the key periodically or aperiodically.
And step 206, the control terminal broadcasts the encrypted control command in the block chain network, and the control command is used for controlling the terminal of the internet of things.
For example, the control terminal may broadcast the encrypted control command to the blockchain network, so that the internet of things terminal in the blockchain network may receive the encrypted control command, decrypt the encrypted control command by using a key shared between the internet of things terminal and the control terminal, obtain the control command, and execute the control command.
It is to be understood that in other embodiments, the control terminal may broadcast the control command directly into the blockchain network so that the internet of things terminal in the blockchain network executes the control command. That is, when the control command needs to be kept secret, the control terminal may encrypt the control command using a secret key shared between the internet of things terminal and the control terminal.
In addition, the control command received by the terminal of the internet of things can also be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network. If the malicious attacker is not a node in the blockchain network, the terminal of the internet of things can refuse to receive the control command from the malicious attacker. If the malicious attacker is a node in the blockchain network, the malicious attacker cannot control the internet of things terminal because the malicious attacker cannot acquire the key shared between the internet of things terminal and the control terminal. If the malicious attacker is a node in the blockchain network and the malicious attacker generates a shared key between the malicious attacker and the internet of things terminal, a control command generated by the malicious attacker is recorded in the blockchain network, and the malicious attacker can be queried through the control command in the blockchain network.
According to the embodiment of the invention, the key shared between the control terminal and the Internet of things terminal is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the block chain network, so that the Internet of things terminal can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
Fig. 3 is a flowchart of a control method for an internet of things terminal according to another embodiment of the present invention. The method for controlling the terminal of the internet of things provided by the embodiment specifically comprises the following steps:
step 301, an internet of things terminal receives encrypted information broadcasted by a control terminal in a blockchain network, wherein the encrypted information is obtained by the control terminal by encrypting first signature information by using a public key of the internet of things terminal, the first signature information is obtained by the control terminal by using a private key of the control terminal to sign a secret key for controlling the internet of things terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network.
For example, when the control terminal detects that the block chain account book includes the public key and the identification information of the internet of things terminal, the control terminal determines that the internet of things terminal is on line and generates a secret key for controlling the internet of things terminal. The control terminal signs the key by adopting a private key of the control terminal to obtain first signature information. Further, the control terminal encrypts the first signature information by using a public key of the internet of things terminal to obtain encrypted information. The control terminal broadcasts the encryption information in the blockchain network, so that the internet of things terminal in the blockchain network can receive the encryption information.
Step 302, the internet of things terminal decrypts the encrypted information by using a private key of the internet of things terminal to obtain the first signature information.
After the internet of things terminal receives the encrypted information, the internet of things terminal firstly decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information.
And step 303, the internet of things terminal verifies the first signature information by using the public key of the control terminal.
Further, the terminal of the internet of things verifies the first signature information by adopting a public key of the control terminal in an initialization configuration process.
And 304, when the first signature information passes verification, the internet of things terminal receives an encrypted control command broadcasted by the control terminal in the blockchain network, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the internet of things terminal.
And if the first signature information passes the verification, the internet of things terminal and the control terminal adopt the secret key to carry out safe communication. For example, when the control terminal controls the terminal of the internet of things, the control terminal generates a control command for controlling the terminal of the internet of things, and encrypts the control command by using the secret key to obtain the encrypted control command. It will be appreciated that in some embodiments, the control terminal may update the key periodically or aperiodically.
For example, the control terminal may broadcast the encrypted control command to the blockchain network, so that the internet of things terminal in the blockchain network may receive the encrypted control command, decrypt the encrypted control command by using a key shared between the internet of things terminal and the control terminal, obtain the control command, and execute the control command.
It is to be understood that in other embodiments, the control terminal may broadcast the control command directly into the blockchain network so that the internet of things terminal in the blockchain network executes the control command. That is, when the control command needs to be kept secret, the control terminal may encrypt the control command using a secret key shared between the internet of things terminal and the control terminal.
In addition, the control command received by the terminal of the internet of things can also be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network. If the malicious attacker is not a node in the blockchain network, the terminal of the internet of things can refuse to receive the control command from the malicious attacker. If the malicious attacker is a node in the blockchain network, the malicious attacker cannot control the internet of things terminal because the malicious attacker cannot acquire the key shared between the internet of things terminal and the control terminal. If the malicious attacker is a node in the blockchain network and the malicious attacker generates a shared key between the malicious attacker and the internet of things terminal, a control command generated by the malicious attacker is recorded in the blockchain network, and the malicious attacker can be queried through the control command in the blockchain network.
According to the embodiment of the invention, the key shared between the control terminal and the Internet of things terminal is established, the control terminal encrypts the control command by adopting the key to obtain the encrypted control command, and broadcasts the encrypted control command in the block chain network, so that the Internet of things terminal can decrypt the encrypted control command by adopting the key to obtain the control command and execute the control command. Therefore, the control command received by the terminal of the internet of things can be recorded in the blockchain network, that is, once the control command is recorded in the blockchain network, the control command cannot be tampered. When the terminal of the internet of things is attacked, a malicious attacker can be inquired through the control command recorded in the blockchain network, so that the terminal of the internet of things can be prevented from being attacked, and the safety of the terminal of the internet of things is improved.
On the basis of the foregoing embodiment, before the terminal of the internet of things receives the encryption information broadcast by the control terminal in the blockchain network, the method further includes: the internet of things terminal generates a private key of the internet of things terminal and a public key of the internet of things terminal, and the private key of the internet of things terminal is stored in the internet of things terminal.
For example, in order to ensure that the public key and the private key of the terminal of the internet of things are not forged, the terminal of the internet of things may automatically generate its own public key and private key. Further, the terminal of the internet of things can store the private key of the terminal of the internet of things locally. Other nodes in the block chain network cannot read and write the private key of the terminal of the internet of things through serial ports or other network modes.
In one possible implementation, the method further includes: the Internet of things terminal signs the public key of the Internet of things terminal and the identification information of the Internet of things terminal by adopting the private key of the Internet of things terminal to obtain second signature information; and the terminal of the Internet of things broadcasts the second signature information in the block chain network.
When the internet of things terminal is registered in the block chain network, the internet of things terminal can sign own public key and identification information by adopting a private key to obtain signature information, the signature information is recorded as second signature information, further, the signature information is broadcasted in the block chain network, other nodes in the block chain network can record the signature information in the block chain account book, and when the signature information is recorded in the block chain account book, the internet of things terminal is indicated to be successfully registered in the block chain network.
In another possible implementation manner, the method further includes: and the Internet of things terminal sends the public key of the Internet of things terminal to the control terminal.
In addition, the public key and the private key of the terminal of the internet of things can be generated in the process of initialization configuration. The private key of the internet of things terminal can be stored locally in the internet of things terminal. The public key of the terminal of the internet of things can be sent to the control terminal, and the public key of the terminal of the internet of things is stored by the control terminal.
Fig. 4 is a schematic structural diagram of a control terminal according to an embodiment of the present invention. As shown in fig. 4, the control terminal 40 may execute the processing procedure provided in the control method of the terminal of the internet of things, where: memory 41, processor 42, computer programs and communication interface 43; wherein the computer program is stored in the memory 41 and is configured to be executed by the processor 42 for: generating a secret key for controlling the terminal of the Internet of things; signing the secret key by adopting a private key of the control terminal to obtain first signature information; encrypting the first signature information by adopting a public key of the terminal of the Internet of things to obtain encrypted information; broadcasting the encryption information in a blockchain network through the communication interface, wherein the control terminal and the internet of things terminal are nodes in the blockchain network; when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is adopted to successfully verify the first signature information, the secret key is adopted to encrypt a control command to obtain an encrypted control command; and broadcasting the encrypted control command in the block chain network through the communication interface, wherein the control command is used for controlling the Internet of things terminal.
Optionally, when the processor 42 generates a key for controlling the terminal of the internet of things, the processor is specifically configured to: and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
The control terminal in the embodiment shown in fig. 4 may be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, which are not described herein again.
Fig. 5 is a schematic structural diagram of an internet of things terminal provided in an embodiment of the present invention. As shown in fig. 5, the internet of things terminal 50 includes: memory 51, processor 52, computer programs and communication interface 53; wherein the computer program is stored in the memory 51 and is configured to be executed by the processor 52 for: receiving encrypted information broadcasted by a control terminal in a blockchain network through the communication interface, wherein the encrypted information is obtained by encrypting first signature information by the control terminal through a public key of the internet of things terminal, the first signature information is obtained by signing a secret key for controlling the internet of things terminal through a private key of the control terminal by the control terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network; decrypting the encrypted information by using a private key of the Internet of things terminal to obtain the first signature information; verifying the first signature information by adopting a public key of the control terminal; and when the first signature information passes the verification, receiving an encrypted control command broadcasted by the control terminal in the block chain network through the communication interface, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the terminal of the internet of things.
Optionally, before the processor 52 receives the encryption information broadcasted by the control terminal in the blockchain network through the communication interface, the processor is further configured to: and generating a private key of the terminal of the Internet of things and a public key of the terminal of the Internet of things, wherein the private key of the terminal of the Internet of things is stored in the terminal of the Internet of things.
Optionally, the processor 52 is further configured to: signing the public key of the Internet of things terminal and the identification information of the Internet of things terminal by using the private key of the Internet of things terminal to obtain second signature information; broadcasting the second signature information in the blockchain network through the communication interface.
Optionally, the processor 52 is further configured to: and sending the public key of the Internet of things terminal to the control terminal through the communication interface.
The internet of things terminal in the embodiment shown in fig. 5 may be used to implement the technical solution of the method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
In addition, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method for controlling the terminal of the internet of things according to the foregoing embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (13)

1. A control method for an Internet of things terminal is characterized by comprising the following steps:
the control terminal generates a key for controlling the terminal of the Internet of things;
the control terminal signs the secret key by adopting a private key of the control terminal to obtain first signature information;
the control terminal encrypts the first signature information by adopting a public key of the Internet of things terminal to obtain encrypted information;
the control terminal broadcasts the encryption information in a block chain network, and the control terminal and the Internet of things terminal are nodes in the block chain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information and successfully verifies the first signature information by adopting a public key of the control terminal, the control terminal encrypts a control command by adopting the secret key to obtain an encrypted control command;
and the control terminal broadcasts the encrypted control command in the block chain network, and the control command is used for controlling the Internet of things terminal.
2. The method of claim 1, wherein the control terminal generating a key for controlling the terminal of the internet of things comprises:
and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
3. A control method for an Internet of things terminal is characterized by comprising the following steps:
the method comprises the steps that an Internet of things terminal receives encrypted information broadcasted by a control terminal in a block chain network, the encrypted information is obtained by the control terminal through encryption of first signature information by adopting a public key of the Internet of things terminal, the first signature information is obtained by the control terminal through signature of a secret key used for controlling the Internet of things terminal by adopting a private key of the control terminal, and the control terminal and the Internet of things terminal are nodes in the block chain network;
the Internet of things terminal decrypts the encrypted information by adopting a private key of the Internet of things terminal to obtain the first signature information;
the Internet of things terminal verifies the first signature information by adopting the public key of the control terminal;
when the first signature information passes verification, the internet of things terminal receives an encrypted control command broadcasted by the control terminal in the block chain network, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the internet of things terminal.
4. The method of claim 3, wherein before the IOT terminal receives the encryption information broadcasted by the control terminal in the blockchain network, the method further comprises:
the internet of things terminal generates a private key of the internet of things terminal and a public key of the internet of things terminal, and the private key of the internet of things terminal is stored in the internet of things terminal.
5. The method of claim 4, further comprising:
the Internet of things terminal signs the public key of the Internet of things terminal and the identification information of the Internet of things terminal by adopting the private key of the Internet of things terminal to obtain second signature information;
and the terminal of the Internet of things broadcasts the second signature information in the block chain network.
6. The method of claim 4, further comprising:
and the Internet of things terminal sends the public key of the Internet of things terminal to the control terminal.
7. A control terminal, comprising:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
generating a secret key for controlling the terminal of the Internet of things;
signing the secret key by adopting a private key of the control terminal to obtain first signature information;
encrypting the first signature information by adopting a public key of the terminal of the Internet of things to obtain encrypted information;
broadcasting the encryption information in a blockchain network through the communication interface, wherein the control terminal and the internet of things terminal are nodes in the blockchain network;
when the internet of things terminal decrypts the encrypted information by adopting a private key of the internet of things terminal to obtain the first signature information, and the public key of the control terminal is adopted to successfully verify the first signature information, the secret key is adopted to encrypt a control command to obtain an encrypted control command;
and broadcasting the encrypted control command in the block chain network through the communication interface, wherein the control command is used for controlling the Internet of things terminal.
8. The control terminal according to claim 7, wherein the processor, when generating the key for controlling the terminal of the internet of things, is specifically configured to:
and when the control terminal determines that the Internet of things terminal is successfully registered in the blockchain network, the control terminal generates a secret key for controlling the Internet of things terminal.
9. An internet of things terminal, comprising:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
receiving encrypted information broadcasted by a control terminal in a blockchain network through the communication interface, wherein the encrypted information is obtained by encrypting first signature information by the control terminal through a public key of the internet of things terminal, the first signature information is obtained by signing a secret key for controlling the internet of things terminal through a private key of the control terminal by the control terminal, and the control terminal and the internet of things terminal are nodes in the blockchain network;
decrypting the encrypted information by using a private key of the Internet of things terminal to obtain the first signature information;
verifying the first signature information by adopting a public key of the control terminal;
and when the first signature information passes the verification, receiving an encrypted control command broadcasted by the control terminal in the block chain network through the communication interface, wherein the encrypted control command is obtained by encrypting the control command by the control terminal through the secret key, and the control command is used for controlling the terminal of the internet of things.
10. The terminal of the internet of things of claim 9, wherein before receiving the encryption information broadcasted by the control terminal in the blockchain network through the communication interface, the processor is further configured to:
and generating a private key of the terminal of the Internet of things and a public key of the terminal of the Internet of things, wherein the private key of the terminal of the Internet of things is stored in the terminal of the Internet of things.
11. The internet of things terminal of claim 10, wherein the processor is further configured to:
signing the public key of the Internet of things terminal and the identification information of the Internet of things terminal by using the private key of the Internet of things terminal to obtain second signature information;
broadcasting the second signature information in the blockchain network through the communication interface.
12. The internet of things terminal of claim 10, wherein the processor is further configured to:
and sending the public key of the Internet of things terminal to the control terminal through the communication interface.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN202010293509.5A 2020-04-14 2020-04-14 Control method, equipment and storage medium of terminal of Internet of things Active CN111541534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010293509.5A CN111541534B (en) 2020-04-14 2020-04-14 Control method, equipment and storage medium of terminal of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010293509.5A CN111541534B (en) 2020-04-14 2020-04-14 Control method, equipment and storage medium of terminal of Internet of things

Publications (2)

Publication Number Publication Date
CN111541534A true CN111541534A (en) 2020-08-14
CN111541534B CN111541534B (en) 2023-10-24

Family

ID=71980190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010293509.5A Active CN111541534B (en) 2020-04-14 2020-04-14 Control method, equipment and storage medium of terminal of Internet of things

Country Status (1)

Country Link
CN (1) CN111541534B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112217797A (en) * 2020-09-09 2021-01-12 苏州工业园区凌志软件股份有限公司 Intelligent gateway Internet of things control system and method applying block chain technology
CN112277881A (en) * 2020-12-25 2021-01-29 上海银基信息安全技术股份有限公司 Identity authentication method and device, vehicle and user equipment
CN112689016A (en) * 2020-12-25 2021-04-20 杭州复杂美科技有限公司 Intelligent device control method, device and storage medium
CN113254972A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Information security management method based on block chain
CN114039952A (en) * 2021-10-18 2022-02-11 广州鲁邦通物联网科技股份有限公司 Intelligent gateway Internet of things control method and system applying block chain technology
WO2022213760A1 (en) * 2021-04-09 2022-10-13 北京石头世纪科技股份有限公司 Information transmission method, storage medium and electronic device
CN115604011A (en) * 2022-10-19 2023-01-13 上海蜂高科技有限公司(Cn) Robot and block chain OSI protocol based multi-point communication method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850540A (en) * 2016-12-09 2017-06-13 深圳市金立通信设备有限公司 A kind of terminal control method, terminal and system
CN107919962A (en) * 2017-12-22 2018-04-17 国民认证科技(北京)有限公司 A kind of internet of things equipment registration and authentication method
CN108632293A (en) * 2018-05-16 2018-10-09 山东建筑大学 Architectural Equipment Internet of things system based on block chain technology and method
CN109067724A (en) * 2018-07-24 2018-12-21 中国联合网络通信集团有限公司 Block chain data trade method, apparatus, equipment and storage medium
CN110784491A (en) * 2019-11-13 2020-02-11 深圳前海智安信息科技有限公司 Internet of things safety management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106850540A (en) * 2016-12-09 2017-06-13 深圳市金立通信设备有限公司 A kind of terminal control method, terminal and system
CN107919962A (en) * 2017-12-22 2018-04-17 国民认证科技(北京)有限公司 A kind of internet of things equipment registration and authentication method
CN108632293A (en) * 2018-05-16 2018-10-09 山东建筑大学 Architectural Equipment Internet of things system based on block chain technology and method
CN109067724A (en) * 2018-07-24 2018-12-21 中国联合网络通信集团有限公司 Block chain data trade method, apparatus, equipment and storage medium
CN110784491A (en) * 2019-11-13 2020-02-11 深圳前海智安信息科技有限公司 Internet of things safety management system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112217797A (en) * 2020-09-09 2021-01-12 苏州工业园区凌志软件股份有限公司 Intelligent gateway Internet of things control system and method applying block chain technology
CN112277881A (en) * 2020-12-25 2021-01-29 上海银基信息安全技术股份有限公司 Identity authentication method and device, vehicle and user equipment
CN112689016A (en) * 2020-12-25 2021-04-20 杭州复杂美科技有限公司 Intelligent device control method, device and storage medium
CN112689016B (en) * 2020-12-25 2022-06-28 杭州复杂美科技有限公司 Intelligent device control method, device and storage medium
WO2022213760A1 (en) * 2021-04-09 2022-10-13 北京石头世纪科技股份有限公司 Information transmission method, storage medium and electronic device
CN113254972A (en) * 2021-06-10 2021-08-13 永旗(北京)科技有限公司 Information security management method based on block chain
CN114039952A (en) * 2021-10-18 2022-02-11 广州鲁邦通物联网科技股份有限公司 Intelligent gateway Internet of things control method and system applying block chain technology
CN114039952B (en) * 2021-10-18 2022-08-05 广州鲁邦通物联网科技股份有限公司 Intelligent gateway Internet of things control method and system applying block chain technology
CN115604011A (en) * 2022-10-19 2023-01-13 上海蜂高科技有限公司(Cn) Robot and block chain OSI protocol based multi-point communication method
CN115604011B (en) * 2022-10-19 2023-08-04 上海蜂高科技有限公司 OSI protocol multi-point communication method based on robot and block chain

Also Published As

Publication number Publication date
CN111541534B (en) 2023-10-24

Similar Documents

Publication Publication Date Title
CN111541534B (en) Control method, equipment and storage medium of terminal of Internet of things
US9722977B2 (en) Secure host authentication using symmetric key crytography
US9467430B2 (en) Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
WO2017097041A1 (en) Data transmission method and device
CN101588245B (en) Method of identity authentication, system and memory device thereof
JP5564453B2 (en) Information processing system and information processing method
CN111107066A (en) Sensitive data transmission method and system, electronic equipment and storage medium
JP2005236850A (en) Data communication apparatus and method, and program
CN107920052B (en) Encryption method and intelligent device
CN110138548B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol
CN112351037B (en) Information processing method and device for secure communication
CN110414248B (en) Method for debugging microprocessor and microprocessor
US20190044922A1 (en) Symmetric key identity systems and methods
CN112507296B (en) User login verification method and system based on blockchain
KR102591826B1 (en) Apparatus and method for authenticating device based on certificate using physical unclonable function
CN111737723A (en) Service processing method, device and equipment
CN110830253A (en) Key management method, device, server, system and storage medium
CN110138558B (en) Transmission method and device of session key and computer-readable storage medium
US20190044721A1 (en) Device authorization using symmetric key systems and methods
WO2016177843A1 (en) A security approach for storing credentials for offline use and copy-protected vault content in devices
CN111740995B (en) Authorization authentication method and related device
CN110048842B (en) Session key processing method, device and computer readable storage medium
CN114175574A (en) Wireless security protocol
KR102415628B1 (en) Method and apparatus for authenticating drone using dim
CN108512824B (en) Management method of home cloud files and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant