CN112231684A - Equipment safety verification method and device, computer equipment and storage medium - Google Patents

Equipment safety verification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112231684A
CN112231684A CN202011110884.8A CN202011110884A CN112231684A CN 112231684 A CN112231684 A CN 112231684A CN 202011110884 A CN202011110884 A CN 202011110884A CN 112231684 A CN112231684 A CN 112231684A
Authority
CN
China
Prior art keywords
security
verification
equipment
information
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011110884.8A
Other languages
Chinese (zh)
Other versions
CN112231684B (en
Inventor
郑文伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Lingshiji Information Technology Co ltd
Original Assignee
Guangzhou Lingshiji Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Lingshiji Information Technology Co ltd filed Critical Guangzhou Lingshiji Information Technology Co ltd
Priority to CN202011110884.8A priority Critical patent/CN112231684B/en
Publication of CN112231684A publication Critical patent/CN112231684A/en
Application granted granted Critical
Publication of CN112231684B publication Critical patent/CN112231684B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K2019/06215Aspects not covered by other subgroups
    • G06K2019/06225Aspects not covered by other subgroups using wavelength selection, e.g. colour code

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to a device security verification method, a device, computer equipment and a storage medium, wherein the method comprises the following steps: sequentially reading, by a color sensor, a plurality of color information from a screen of a security device that has passed administrator information authentication; generating a verification code according to the color information read each time; sending the verification code to a security verification server so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code; and receiving safety confirmation information fed back by the safety verification server, and displaying the safety confirmation information. The method can realize the safety verification of the equipment under the condition that the equipment cannot use a camera or a microphone.

Description

Equipment safety verification method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of device authentication technologies, and in particular, to a device security verification method, apparatus, computer device, and storage medium.
Background
When a mobile phone becomes an indispensable information device for an individual, the mobile phone is used as a device for accessing a related information system in many industries, and an authentication process is required to be completed on the mobile phone before accessing the information system. Meanwhile, in many industries, information systems are usually designed as a multi-level authority system, and the authentication process of accessing the information systems by other people is usually controlled by an administrator. This requires that an authentication process for an account related to the information system is performed for another mobile phone through one mobile phone that has been authenticated as an administrator account, so as to allow the information system to log in on the mobile phone and complete related operations.
In the existing technology for equipment safety verification, a mobile phone needing to apply for authentication uses a camera to scan a two-dimensional code displayed on another mobile phone which is authenticated by administrator information, then the two-dimensional code is decoded, and related information is used as a request parameter to apply for authentication to a server.
However, in scenarios where security levels are more demanding, such as high-level meetings, users are typically not allowed to use their personal devices, but rather devices are provided by the host. Such devices often do not provide a camera or microphone to avoid the risk of compromise. Thus, the authentication of the security device cannot be performed using the current code scanning scheme.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a device security verification method, a device, computer equipment and a storage medium, which can realize device security verification under the condition that the device cannot use a camera or a microphone.
In order to solve at least one technical problem, an embodiment of the present invention provides a device security verification method, where the method includes:
sequentially reading, by a color sensor, a plurality of color information from a screen of a security device that has passed administrator information authentication;
generating a verification code according to the color information read each time;
sending the verification code to a security verification server so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code;
and receiving safety confirmation information fed back by the safety verification server, and displaying the safety confirmation information.
In one embodiment, the plurality of color information includes white, red, blue, and green; the generating of the verification code according to the color information read each time comprises:
if the read color information is white, generating a character A;
if the read color information is red, generating an R character;
if the read color information is blue, generating a B character;
if the read color information is green, generating a G character;
and generating the verification code according to the A character, the R character, the B character and the G character.
In one embodiment, the method comprises the following steps of sequentially reading a plurality of color information from a screen of the security device which is authenticated by the administrator information through a color sensor, wherein the steps comprise:
setting a sampling frequency according to which a plurality of color information are sequentially read from a screen of a security device that has passed administrator information authentication by a color sensor.
In one embodiment, the sampling frequency is 4Hz, and the multiple color information sequentially read comprises white, red, blue, green, white, red and blue;
the generating of the verification code according to the color information read each time comprises:
generating ARRBGARB characters according to the white, red, blue, green, white, red and blue which are read in sequence;
and generating a verification code according to the ARRBGARB character.
In one embodiment, the generating a verification code from the arrbgabr character comprises:
determining the length of the character string to be 8 according to the ARRBGARB character;
generating a numerical range of 48Verification code within range.
A device security verification system comprises a security device which passes administrator information authentication, a device to be verified and a security verification server;
the security equipment which passes the administrator information authentication communicates with the security verification server, acquires an authorization code from the security verification server, generates multi-color information according to the authorization code, and sequentially displays the multi-color information on a screen;
the equipment to be verified sequentially reads the multi-color information from the screen of the safety equipment which passes the administrator information authentication through the color sensor, generates verification codes according to the read color information each time, and sends the verification codes to the safety verification server;
the security verification server performs security verification on the verification code according to the authorization code, sets the device to be verified as a security device when the verification code passes security verification, and sends security confirmation information to the device to be verified;
and the equipment to be verified receives the safety confirmation information and displays the safety confirmation information.
In one embodiment, the authorization code includes a number or a string of characters.
An apparatus for device security verification, the apparatus comprising:
the reading module is used for sequentially reading a plurality of color information from a screen of the safety equipment which passes the administrator information authentication through the color sensor;
the generating module is used for generating a verification code according to the color information read each time;
the sending module is used for sending the verification code to a security verification server so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code;
and the receiving module is used for receiving the safety confirmation information fed back by the safety verification server and displaying the safety confirmation information.
In addition, an embodiment of the present invention further provides a computer device, including: the system comprises a memory, a processor and an application program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of the method of any embodiment when executing the application program.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, on which an application program is stored, and when the application program is executed by a processor, the steps of any one of the above-mentioned embodiments of the method are implemented.
In the embodiment of the invention, by implementing the method, the device to be verified sequentially reads multiple color information from the screen of the security device which passes the administrator information authentication through the color sensor, generates the verification code according to the color information read each time, and sends the verification code to the security verification server, so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment sending the verification code as security equipment and sends security confirmation information to the equipment sending the verification code. Therefore, the equipment safety verification of the equipment to be verified is realized under the condition that a camera or a microphone is not suitable for use, and the safety verification of the equipment in a scene with higher safety level requirement is met. And finally, the equipment to be verified receives the safety confirmation information fed back by the safety verification server and displays the safety confirmation information. Therefore, a user using the device to be verified can determine that the device to be verified has been set as the security device by the security verification server through the security confirmation information displayed on the device, and thus, the device to be verified can be used for interacting network information, and the security verification of each device in a scene with a high security level requirement is realized.
Drawings
Fig. 1 is a block diagram of a device security verification system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a method for verifying device security in an implementation scenario of the present invention;
fig. 3 is a schematic flow chart of a device security verification method in an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an apparatus security authentication device in an embodiment of the present invention;
fig. 5 is a schematic structural component diagram of a computer device in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides an apparatus security verification system, as shown in fig. 1, which includes a security apparatus 11 that has been authenticated by administrator information, an apparatus to be verified 15, and a security verification server 13.
The security device 11 that has passed the administrator information authentication communicates with the security verification server 13, acquires an authorization code from the security verification server 13, generates pieces of color information according to the authorization code, and sequentially displays the pieces of color information on a screen. Wherein the authorization code comprises a number or a string of characters.
The device to be verified 15 sequentially reads the plurality of color information from the screen of the security device 11 that has passed the administrator information authentication through the color sensor, generates a verification code according to the color information read each time, and transmits the verification code to the security verification server 13.
The security verification server 13 performs security verification on the verification code according to the authorization code, sets the device 15 to be verified as a security device when the verification code passes security verification, and sends security confirmation information to the device 15 to be verified.
And the device to be verified 15 receives the safety confirmation information and displays the safety confirmation information.
In the present embodiment, the secure device 11 that has passed the administrator information authentication is a device a that has performed the administrator information authentication, and the device to be verified 15 is a device B that is ready to apply for the system user authority authentication. Both device a and device B are equipped with a screen and a color sensor, and are connected to the security authentication server 13 through a network. The authentication stage is as follows: the device a communicates with the security verification server 13 to determine the authorization code for this authentication, which is typically set as a number or string. The device a will display the multiple colors generated by the authorization code in sequence. And (3) an authorization stage: after receiving the information of the multiple colors through the color sensor, the device B decodes the information into a corresponding authorization code and submits the authorization code to the security verification server 13, and if the security verification server 13 judges that the authorization code is valid, the device B is considered to pass the authorization. Therefore, the equipment safety verification of the equipment to be verified is realized under the condition that a camera or a microphone is not suitable for use, and the safety verification of the equipment in a scene with higher safety level requirement is met.
Specifically, a flow of implementing the device security authentication method by the device security authentication system can be seen in fig. 2. The device a is a mobile phone a, the device B is a mobile phone B, and the security verification server 13 is an authentication server.
The embodiment of the invention provides a device security verification method, which is applied to a device 15 to be verified shown in fig. 1. As shown in fig. 3, the device security authentication method includes the following steps:
and S102, sequentially reading a plurality of color information from a screen of the safety device which passes the administrator information authentication through the color sensor.
In this embodiment, the security device that has passed the administrator information authentication communicates with the security verification server, acquires the authorization code, and generates the multi-color information according to the authorization code. The security device which passes the administrator information authentication displays the generated multi-color information on a screen for the device to be verified to read through the color sensor. Specifically, the device to be verified sequentially reads, by the color sensor, a plurality of color information from the screen of the security device that has been authenticated by the administrator information. The plurality of colors may include white, red, blue, green, and the like. The screen of the security device that has passed the administrator information authentication displays one color information at a time, and the color information displayed at each time is determined according to the authorization code. And the equipment to be verified reads the colors according to the time sequence, and records the color information read each time according to the time sequence.
And S104, generating a verification code according to the color information read each time.
In this embodiment, when the device to be verified sequentially reads the color information, the color information read each time is recorded, and a corresponding verification code is generated according to the recorded color information. The color information read each time may be converted into an internally recognizable code, the code obtained each time is recorded, and finally, the verification code is generated according to the code obtained each time.
S106, sending the verification code to a security verification server so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code.
In this embodiment, the device to be authenticated sends the authentication code to the security authentication server, so that the security authentication server performs security authentication on the authentication code. Specifically, the security verification server analyzes the verification code to obtain the code to be verified. Further, the code to be verified is matched with the authorization code sent to the security device which passes the administrator information authentication, and if the matching is successful, the verification code is determined to pass the security verification. At this time, when the authentication code passes the security authentication, the security authentication server sets the device that transmitted the authentication code as the security device. That is, the device to be authenticated is set as the security device, and the security confirmation information is issued to the device that sends the authentication code. That is, the security confirmation information is issued to the device to be authenticated. Therefore, the safety verification of the equipment to be verified can be realized under the condition that the camera or the microphone is not suitable for use, and the safety verification of the equipment in a scene with higher safety level requirement is met.
And S108, receiving the safety confirmation information fed back by the safety verification server, and displaying the safety confirmation information.
In this embodiment, the device to be verified receives the security confirmation information fed back by the security verification server, determines that the device to be verified passes the security verification of the security verification server according to the security confirmation information, and determines that the device to be verified has become the security device authenticated by the security verification server. At this time, security confirmation information can be displayed on the screen to inform the user using the device to be authenticated, and the device to be authenticated can pass security authentication and can be used in a scene with higher security level requirements.
By implementing the method, the device to be verified sequentially reads multiple color information from the screen of the safety device which passes the administrator information authentication through the color sensor, generates the verification code according to the color information read each time, and sends the verification code to the safety verification server, so that the safety verification server performs safety verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment sending the verification code as security equipment and sends security confirmation information to the equipment sending the verification code. Therefore, the equipment safety verification of the equipment to be verified is realized under the condition that a camera or a microphone is not suitable for use, and the safety verification of the equipment in a scene with higher safety level requirement is met. And finally, the equipment to be verified receives the safety confirmation information fed back by the safety verification server and displays the safety confirmation information. Therefore, a user using the device to be verified can determine that the device to be verified has been set as the security device by the security verification server through the security confirmation information displayed on the device, and thus, the device to be verified can be used for interacting network information, and the security verification of each device in a scene with a high security level requirement is realized.
In one embodiment, the plurality of color information includes white, red, blue, and green. S104 comprises the following steps: if the read color information is white, generating a character A; if the read color information is red, generating an R character; if the read color information is blue, generating a B character; if the read color information is green, generating a G character; and generating the verification code according to the A character, the R character, the B character and the G character.
In this embodiment, the device to be authenticated sets a corresponding matching identifier for the read color information. White corresponds to the A character; red corresponds to the R character; blue corresponds to the B character; green corresponds to a G character. Finally, a verification code is generated from the sequentially generated identifiers.
Specifically, a color sensor of the device to be authenticated recognizes the color of the screen. The color sensor emits light (which may include red, green, and blue) to a security device requiring inspection and authenticated by the administrator information, and the color component is calculated from the reflected light and then compared to a stored reference color value. If the color value matches the set color band range, a switching output is enabled. The output is a value that detects the RGB components of the color of the secure device that has been authenticated by the administrator information, such as deep red: RGB (240, 0, 0). The following is an example of a code that reads the color sensor value and determines the color:
Figure BDA0002728549490000081
Figure BDA0002728549490000091
Figure BDA0002728549490000101
Figure BDA0002728549490000111
finally, a verification code is generated based on the identifier of the identified color.
In one embodiment, S102 includes: setting a sampling frequency according to which a plurality of color information are sequentially read from a screen of a security device that has passed administrator information authentication by a color sensor.
Preferably, the sampling frequency is 4Hz, and the multiple color information sequentially read comprises white, red, blue, green, white, red and blue; s104 comprises the following steps: generating ARRBGARB characters according to the white, red, blue, green, white, red and blue which are read in sequence; and generating a verification code according to the ARRBGARB character.
Preferably, the generating a verification code according to the arrbgabr character includes: determining the length of the character string to be 8 according to the ARRBGARB character; generating a numerical range of 48Verification code within range.
Specifically, the secure device that has passed the administrator information authentication is device a, and the device to be verified is device B. The device a determines the authorization code for this authentication, which is usually set as a number or character string. An 8-bit string is obtained according to the authorization code. Such as ARRBGARB. Device a will display white (representing no color), red, blue, green, white, red, blue in sequence. Setting the sampling frequency of device a to 4Hz, sampling 4 times per second, requires 8/4, i.e., a 2 second detection time. Since the sampling frequency of the device a is 4Hz, the frequency at which the device B receives color information through the color sensor is also 4 Hz. The device B receives the sequential color information of white (representing no color), red, blue, green, white, red, and blue through the color sensor, and the authorization code obtained through analysis is ARRBGARB. And the device B submits the authorization code to the security verification server, and if the security verification server judges that the authorization code is valid, the device B is considered to pass the authorization.
The generated verification code is a quaternary code, and may be: a represents none, R represents red, G represents green, and B represents blue. The range of the verification code is 4NWhere N represents the string length. That is, when 8 pieces of color information are collected, N is 8.
For example, at a sampling frequency of 4Hz (4 samples per second), the output of the device to be verified is as follows:
Figure BDA0002728549490000121
the corresponding color is judged as "none" indicating not belonging to red, green or blue)
The judgment result
Is free of
Is free of
Is free of
Green colour
Red colour
Is free of
Blue color
Red colour
Red colour
Is free of
As can be seen from the above, the above code is a quaternary code, and can be used as follows: a represents none, R represents red, G represents green, and B represents blue. The range of coding is 4NWhere N represents the string length.
In an embodiment, the invention further provides a device security verification apparatus. As shown in fig. 4, the apparatus includes:
a reading module 12 for sequentially reading a plurality of color information from a screen of the security device that has been authenticated by the administrator information through the color sensor;
a generating module 14, configured to generate a verification code according to the color information read each time;
a sending module 16, configured to send the verification code to a security verification server, so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code;
and the receiving module 18 is configured to receive the security confirmation information fed back by the security verification server, and display the security confirmation information.
Preferably, the plurality of color information includes white, red, blue, and green; the generating module 14 is further specifically configured to generate a character a if the read color information is white; if the read color information is red, generating an R character; if the read color information is blue, generating a B character; if the read color information is green, generating a G character; and generating the verification code according to the A character, the R character, the B character and the G character.
Preferably, the reading module 12 is further configured to: setting a sampling frequency according to which a plurality of color information are sequentially read from a screen of a security device that has passed administrator information authentication by a color sensor.
Preferably, the sampling frequency is 4Hz, and the multiple color information sequentially read comprises white, red, blue, green, white, red and blue; the generating module 14 is further specifically configured to generate an arrbgabr character according to the white, red, blue, green, white, red, and blue read in sequence; and generating a verification code according to the ARRBGARB character.
Preferably, the generating a verification code according to the arrbgabr character includes: determining the length of the character string to be 8 according to the ARRBGARB character; generating a numerical range of 48Verification code within range.
For specific limitations of a device security verification apparatus, reference may be made to the above limitations of a device security verification method, which are not described herein again. The modules in the device security verification apparatus can be implemented in whole or in part by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In an embodiment of the present invention, an application program is stored on a computer-readable storage medium, and when the application program is executed by a processor, the application program implements a device security verification method according to any one of the above embodiments. The computer-readable storage medium includes, but is not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs (Read-Only memories), RAMs (Random AcceSS memories), EPROMs (EraSable Programmable Read-Only memories), EEPROMs (Electrically EraSable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards. That is, a storage device includes any medium that stores or transmits information in a form readable by a device (e.g., a computer, a cellular phone), and may be a read-only memory, a magnetic or optical disk, or the like.
The embodiment of the present invention further provides a computer application program, which runs on a computer, and the computer application program is configured to execute a device security verification method according to any one of the above embodiments.
Fig. 5 is a schematic structural diagram of a computer device in the embodiment of the present invention.
An embodiment of the present invention further provides a computer device, as shown in fig. 5. The computer apparatus includes a processor 502, a memory 503, an input unit 504, a display unit 505, and the like. Those skilled in the art will appreciate that the device configuration means shown in fig. 5 do not constitute a limitation of all devices and may include more or less components than those shown, or some components in combination. The memory 503 may be used to store the application 501 and various functional modules, and the processor 502 executes the application 501 stored in the memory 503, thereby performing various functional applications of the device and data processing. The memory may be internal or external memory, or include both internal and external memory. The memory may comprise read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), flash memory, or random access memory. The external memory may include a hard disk, a floppy disk, a ZIP disk, a usb-disk, a magnetic tape, etc. The disclosed memory includes, but is not limited to, these types of memory. The disclosed memory is by way of example only and not by way of limitation.
The input unit 504 is used for receiving input of signals and receiving keywords input by a user. The input unit 504 may include a touch panel and other input devices. The touch panel can collect touch operations of a user on or near the touch panel (for example, operations of the user on or near the touch panel by using any suitable object or accessory such as a finger, a stylus and the like) and drive the corresponding connecting device according to a preset program; other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., play control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like. The display unit 505 may be used to display information input by a user or information provided to the user and various menus of the terminal device. The display unit 505 may take the form of a liquid crystal display, an organic light emitting diode, or the like. The processor 502 is a control center of the terminal device, connects various parts of the entire device using various interfaces and lines, and performs various functions and processes data by running or executing software programs and/or modules stored in the memory 503 and calling data stored in the memory.
As one embodiment, the computer device includes: one or more processors 502, a memory 503, one or more applications 501, wherein the one or more applications 501 are stored in the memory 503 and configured to be executed by the one or more processors 502, and wherein the one or more applications 501 are configured to perform a device security authentication method of any of the above embodiments.
In addition, the above detailed description is provided for the device security verification method, apparatus, computer device and storage medium according to the embodiments of the present invention, and a specific example should be used herein to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for device security authentication, the method comprising:
sequentially reading, by a color sensor, a plurality of color information from a screen of a security device that has passed administrator information authentication;
generating a verification code according to the color information read each time;
sending the verification code to a security verification server so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code;
and receiving safety confirmation information fed back by the safety verification server, and displaying the safety confirmation information.
2. The method of claim 1, wherein the plurality of color information includes white, red, blue, and green; the generating of the verification code according to the color information read each time comprises:
if the read color information is white, generating a character A;
if the read color information is red, generating an R character;
if the read color information is blue, generating a B character;
if the read color information is green, generating a G character;
and generating the verification code according to the A character, the R character, the B character and the G character.
3. The method of claim 2, wherein the sequentially reading, by the color sensor, a plurality of color information from a screen of the security device that has been authenticated by the administrator information comprises:
setting a sampling frequency according to which a plurality of color information are sequentially read from a screen of a security device that has passed administrator information authentication by a color sensor.
4. The method according to claim 3, wherein the sampling frequency is 4Hz, and the plurality of color information read sequentially comprises white, red, blue, green, white, red and blue;
the generating of the verification code according to the color information read each time comprises:
generating ARRBGARB characters according to the white, red, blue, green, white, red and blue which are read in sequence;
and generating a verification code according to the ARRBGARB character.
5. The method of claim 4, wherein generating a validation code from the ARRBGARB character comprises:
determining the length of the character string to be 8 according to the ARRBGARB character;
generating a numerical range of 48Verification code within range.
6. The equipment safety verification system is characterized by comprising a safety equipment which passes the authentication of administrator information, a to-be-verified equipment and a safety verification server;
the security equipment which passes the administrator information authentication communicates with the security verification server, acquires an authorization code from the security verification server, generates multi-color information according to the authorization code, and sequentially displays the multi-color information on a screen;
the equipment to be verified sequentially reads the multi-color information from the screen of the safety equipment which passes the administrator information authentication through the color sensor, generates verification codes according to the read color information each time, and sends the verification codes to the safety verification server;
the security verification server performs security verification on the verification code according to the authorization code, sets the device to be verified as a security device when the verification code passes security verification, and sends security confirmation information to the device to be verified;
and the equipment to be verified receives the safety confirmation information and displays the safety confirmation information.
7. The method of claim 6, wherein the authorization code includes a number or a string of characters.
8. An apparatus for device security verification, the apparatus comprising:
the reading module is used for sequentially reading a plurality of color information from a screen of the safety equipment which passes the administrator information authentication through the color sensor;
the generating module is used for generating a verification code according to the color information read each time;
the sending module is used for sending the verification code to a security verification server so that the security verification server performs security verification on the verification code; when the verification code passes the security verification, the security verification server sets the equipment which sends the verification code as security equipment and issues security confirmation information to the equipment which sends the verification code;
and the receiving module is used for receiving the safety confirmation information fed back by the safety verification server and displaying the safety confirmation information.
9. A computer device comprising a memory, a processor and an application program stored on the memory and executable on the processor, wherein the steps of the method of any one of claims 1 to 5 are implemented when the application program is executed by the processor.
10. A computer-readable storage medium, on which an application program is stored, which when executed by a processor implements the steps of the method of any one of claims 1 to 5.
CN202011110884.8A 2020-10-16 2020-10-16 Equipment safety verification method and device, computer equipment and storage medium Active CN112231684B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011110884.8A CN112231684B (en) 2020-10-16 2020-10-16 Equipment safety verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011110884.8A CN112231684B (en) 2020-10-16 2020-10-16 Equipment safety verification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112231684A true CN112231684A (en) 2021-01-15
CN112231684B CN112231684B (en) 2021-09-28

Family

ID=74118498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011110884.8A Active CN112231684B (en) 2020-10-16 2020-10-16 Equipment safety verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112231684B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060028699A1 (en) * 2000-11-10 2006-02-09 Xerox Corporation Patch codes for color calibration job identification encoding
US20080191035A1 (en) * 2005-01-18 2008-08-14 Ji-Deak Cheon Bar Code Generation Method Using Color Code, Data Compression Method, And Internet Service Method Thereof
CN101930512A (en) * 2009-06-25 2010-12-29 鸿富锦精密工业(深圳)有限公司 Password protection method
CN101930511A (en) * 2009-06-25 2010-12-29 鸿富锦精密工业(深圳)有限公司 Password protection method
US20120229312A1 (en) * 2007-07-18 2012-09-13 Ji Deak Cheon Bar code generation method using color code, data compression method, and internet service method thereof
CN103632608A (en) * 2012-08-20 2014-03-12 邹烨祥 Method for manufacturing color codons
CN108055390A (en) * 2017-11-22 2018-05-18 吴东辉 Determine that its client corresponds to the AR method and systems of id based on mobile phone screen color

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060028699A1 (en) * 2000-11-10 2006-02-09 Xerox Corporation Patch codes for color calibration job identification encoding
US20080191035A1 (en) * 2005-01-18 2008-08-14 Ji-Deak Cheon Bar Code Generation Method Using Color Code, Data Compression Method, And Internet Service Method Thereof
US20120229312A1 (en) * 2007-07-18 2012-09-13 Ji Deak Cheon Bar code generation method using color code, data compression method, and internet service method thereof
CN101930512A (en) * 2009-06-25 2010-12-29 鸿富锦精密工业(深圳)有限公司 Password protection method
CN101930511A (en) * 2009-06-25 2010-12-29 鸿富锦精密工业(深圳)有限公司 Password protection method
CN103632608A (en) * 2012-08-20 2014-03-12 邹烨祥 Method for manufacturing color codons
CN108055390A (en) * 2017-11-22 2018-05-18 吴东辉 Determine that its client corresponds to the AR method and systems of id based on mobile phone screen color

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
何伊圣: "提高密码安全性的策略", 《信息安全与技术》 *

Also Published As

Publication number Publication date
CN112231684B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
CN105825382B (en) Mobile payment method and electronic equipment
CN109388532B (en) Test method, test device, electronic equipment and computer readable storage medium
KR100992573B1 (en) Authentication method and system using mobile terminal
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
CN107742069A (en) terminal control method, device and storage medium
CN105245346B (en) A kind of identity identifying method and user terminal
CN110874541A (en) Electronic ticket entrance verification anti-counterfeiting system and method
CN106204864A (en) Gate control system based on dynamic two-dimension code and door opening method
CN111783055A (en) Account information management method and device and electronic equipment
CN109561059B (en) Account login method and system, terminal and storage medium thereof
TW201426593A (en) Method and apparatus for information verification
CN104866752A (en) Application protection method and user terminal
CN106355709A (en) Access control system and door opening method based on dynamic quick response code
CN110691085A (en) Login method, login device, password management system and computer readable medium
CN105718779A (en) Application program login method and user terminal
CN108399540B (en) Code scanning payment method and device based on mobile terminal, terminal and storage medium
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN112231684B (en) Equipment safety verification method and device, computer equipment and storage medium
US20180349586A1 (en) Biometric authentication
KR100705038B1 (en) Mobile communication terminal and method for authenticating electronic payment
CN104980279A (en) Identity authentication method, and related equipment and system
CN106161742B (en) Authentication method and authentication system of mobile terminal
CN111756721A (en) Association authentication method and device, IAM server and readable storage medium
CN109165490A (en) A kind of data inputting method and device
CN106302344A (en) Security sweep method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant