CN112866987A - Networking verification method, equipment and computer readable storage medium - Google Patents

Networking verification method, equipment and computer readable storage medium Download PDF

Info

Publication number
CN112866987A
CN112866987A CN201911090421.7A CN201911090421A CN112866987A CN 112866987 A CN112866987 A CN 112866987A CN 201911090421 A CN201911090421 A CN 201911090421A CN 112866987 A CN112866987 A CN 112866987A
Authority
CN
China
Prior art keywords
identification information
equipment identification
hash value
equipment
networking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911090421.7A
Other languages
Chinese (zh)
Other versions
CN112866987B (en
Inventor
陈小平
熊德林
陈国丞
连根辉
余冬勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Viomi Electrical Technology Co Ltd
Original Assignee
Foshan Viomi Electrical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Viomi Electrical Technology Co Ltd filed Critical Foshan Viomi Electrical Technology Co Ltd
Priority to CN201911090421.7A priority Critical patent/CN112866987B/en
Publication of CN112866987A publication Critical patent/CN112866987A/en
Application granted granted Critical
Publication of CN112866987B publication Critical patent/CN112866987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a networking verification method, equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message; acquiring an equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext from the networking request message, and calculating a second hash value of the equipment identification information ciphertext; verifying the equipment identification information ciphertext according to the first hash value and the second hash value; and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, writing the equipment identification information into an equipment white list of the network, and accessing the intelligent household equipment to the network. The application relates to information security, and can improve the security of a home network.

Description

Networking verification method, equipment and computer readable storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a networking verification method, device, and computer-readable storage medium.
Background
At present, home devices are networked by using a wireless Mesh network, in the wireless Mesh network, any wireless device node can be simultaneously used as a wireless Access Point (AP) and a router, each node in the network can send and receive signals, and each node can directly communicate with one or more peer nodes. However, when networking is performed on the home device through the wireless mesh network, the home device can be accessed to the home network without verifying the home device, data in the home network is easily leaked, and the security of the home network cannot be guaranteed. Therefore, how to improve the security of the home network is a problem to be solved urgently.
Disclosure of Invention
The present application mainly aims to provide a networking verification method, a device and a computer readable storage medium, aiming to improve the security of a home network.
In a first aspect, the present application provides a networking verification method, including the following steps:
receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message;
acquiring an equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext from the networking request message, and calculating a second hash value of the equipment identification information ciphertext;
verifying the equipment identification information ciphertext according to the first hash value and the second hash value;
and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of the network so as to access the intelligent household equipment to the network.
In a second aspect, the present application also provides a computer device comprising a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program, when executed by the processor, implements the steps of the networking authentication method as described above.
In a third aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the networking verification method as described above.
The application provides a networking verification method, equipment and a computer readable storage medium, and the networking verification method, the equipment and the computer readable storage medium are characterized in that a networking request message sent by intelligent household equipment is received and decrypted to obtain the networking request message, then an equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext are obtained from the networking request message, a second hash value of the equipment identification information ciphertext is calculated, then the equipment identification information ciphertext is verified according to the first hash value and the second hash value, when the intelligent household equipment passes verification, the equipment identification information ciphertext is decrypted to obtain equipment identification information, the equipment identification information is written into an equipment white list of a network, and the intelligent household equipment is accessed into the network. The equipment identification information is doubly encrypted, so that the equipment identification information can be prevented from being tampered, the reliability of the equipment identification information is improved, meanwhile, the equipment identification information is verified, the intelligent household equipment which sends the equipment identification information is accessed into the network after the verification is passed, and the safety of home networking is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a networking verification method according to an embodiment of the present application;
fig. 2 is a schematic diagram of networking encryption processing of a networking authentication method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another networking verification method according to an embodiment of the present application;
fig. 4 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The embodiment of the application provides a networking verification method, computer equipment and a computer readable storage medium. The networking verification method can be applied to networking verification equipment which can be mobile phones, tablet computers, notebook computers, desktop computers, personal digital assistants, wearable equipment and the like, can be intelligent household equipment such as televisions, intelligent washing machines, intelligent refrigerators and the like, and can also be servers.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flowchart illustrating a networking verification method according to an embodiment of the present disclosure.
As shown in fig. 1, the networking authentication method includes steps S101 to S104.
Step S101, receiving a networking request sent by intelligent household equipment, and decrypting an encrypted equipment identification information ciphertext in the networking request to obtain the equipment identification information ciphertext.
The smart home equipment acquires equipment identification information from a local storage, and encrypts the equipment identification information according to preset secret key information to obtain an equipment identification information ciphertext; calculating the hash value of the equipment information ciphertext based on a preset hash algorithm; and generating a networking request message based on the equipment identification information ciphertext and the hash value, encrypting the networking request message to obtain an encrypted networking request message, and sending the encrypted networking request message to networking verification equipment.
The encryption mode of the device identification information specifically comprises the following steps: and performing logical XOR processing on the preset key information and the equipment identification information, and performing cyclic shift processing on the equipment identification information subjected to the logical XOR processing according to a preset cyclic shift strategy to obtain an equipment identification information ciphertext. It should be noted that the preset hashing algorithm may be set based on actual situations, and the present application is not limited to this specifically. Optionally, the hashing algorithm includes the SHA-1 algorithm, the SHA-224 algorithm, the SHA-256 algorithm, the SHA-384 algorithm, and the SHA-512 algorithm. The encryption algorithm of the message can be selected as an IPsec algorithm.
Referring to fig. 2, fig. 2 is a schematic diagram illustrating a process of encrypting device identification information in an embodiment of the present application, and as shown in fig. 2, the device identification information is encrypted by key information, then cyclic shift processing is performed on the encrypted device identification information to obtain a device identification information ciphertext, then a hash value of the device identification information ciphertext is calculated, a networking request message including the hash value and the device identification information ciphertext is generated, and finally the networking request message is encrypted.
The equipment identification information is used for unique intelligent home equipment, preset key information is stored in the intelligent home equipment, and the key information is used for encrypting the equipment identification information to obtain an equipment identification information ciphertext or decrypting the equipment identification information ciphertext to obtain the equipment identification information.
The server receives an encrypted networking request message sent by the intelligent home equipment, decrypts the encrypted networking request message to obtain the networking request message, namely decrypts the encrypted networking request message through an IPsec algorithm to obtain the networking request message.
Step S102, obtaining an equipment identification information cryptograph and a first hash value of the equipment identification information cryptograph from the networking request message, and calculating a second hash value of the equipment identification information cryptograph.
After the networking request message is obtained through decryption, the equipment identification information ciphertext in the networking request message and a first hash value of the equipment identification information ciphertext are obtained, and a second hash value of the equipment identification information ciphertext is calculated. Specifically, a hash algorithm tag is obtained from the networking request message, a hash algorithm corresponding to the hash algorithm tag is called, and a second hash value of the equipment identification information ciphertext is calculated.
It should be noted that the hash algorithm tag is used for uniquely identifying the hash algorithm, and the hash algorithm tag may be set based on actual situations, which is not specifically limited in this application. Optionally, the preset hash algorithm tags include, but are not limited to, tags corresponding to the SHA-1 algorithm, the SHA-224 algorithm, the SHA-256 algorithm, the SHA-384 algorithm, and the SHA-512 algorithm.
And S103, verifying the equipment identification information ciphertext according to the first hash value and the second hash value.
And determining whether the equipment identification information ciphertext is tampered or not according to the second hash value and the first hash value. Specifically, determining whether the first hash value and the second hash value are the same; if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes verification, and determining that the equipment identification information ciphertext is not tampered in the transmission process; and if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification, and determining that the equipment identification information ciphertext is tampered in the transmission process.
And S104, when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of a network so as to access the intelligent household equipment to the network.
And when the equipment identification information ciphertext passes the verification, continuously decrypting the equipment identification information ciphertext. Specifically, according to a preset cyclic shift strategy, performing cyclic logic shift processing on the equipment identification information ciphertext; and acquiring preset key information, and performing logic XOR processing on the key information and the equipment identification information ciphertext subjected to the cyclic shift processing to obtain equipment identification information. The shift directions of the preset cyclic shift strategy and the cyclic logic shift strategy in the encryption process are inverse shift directions, and the shift digit in the preset cyclic shift strategy can be set by a user.
After the equipment identification information is obtained, the equipment identification information is written into an equipment white list of the network so as to access the intelligent household equipment to the network. In an embodiment, before writing the device identification information into a device white list of a network, determining whether the device identification information is located in a preset device identification information base, and if the device identification information is located in the preset device identification information base, determining that the smart home device passes networking verification, so that the device identification information is written into the device white list of the network to access the smart home device to the network; if the equipment identification information is not located in the preset equipment identification information base, the fact that the intelligent household equipment does not pass networking verification is determined, and preset reminding information is output to remind a user of reconfiguring key information.
In an embodiment, when receiving a networking request of an intelligent home device, if device identification information generated through decryption twice is not located in a preset device identification information base, the intelligent home device does not pass networking verification, networking verification needs to be performed on the intelligent home device again, that is, whether the device identification information is located in the preset device identification information base is verified, if the intelligent home device is verified once in each pair, the verification frequency of the intelligent home device is increased by 1, and meanwhile, whether the verification frequency reaches a preset frequency threshold value is determined; and if the verification times reach a preset time threshold, adding the equipment identification information into an equipment blacklist.
The networking verification method provided in the above embodiment includes receiving an encrypted networking request message sent by the smart home device, decrypting the encrypted networking request message to obtain the networking request message, obtaining a device identification information ciphertext and a first hash value of the device identification information ciphertext from the networking request message, calculating a second hash value of the device identification information ciphertext, checking the device identification information according to the first hash value and the second hash value, decrypting the device identification information ciphertext when the device identification information ciphertext passes the check to obtain the device identification information, writing the device identification information into a device white list of the network, and accessing the smart home device to the network. The networking verification effectively improves the safety of the home networking.
Referring to fig. 3, fig. 3 is a schematic flowchart of another networking verification method according to an embodiment of the present application.
As shown in fig. 3, the networking authentication method includes steps S201 to S208.
Step S201, receiving an encrypted networking request message sent by the intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message.
The server receives an encrypted networking request message sent by the intelligent home equipment, decrypts the encrypted networking request message to obtain the networking request message, namely decrypts the encrypted networking request message through an IPsec algorithm to obtain the networking request message.
Step S202, obtaining the equipment identification information cryptograph and the first hash value of the equipment identification information cryptograph from the networking request message, and calculating the second hash value of the equipment identification information cryptograph.
After the networking request message is obtained through decryption, the equipment identification information ciphertext in the networking request message and a first hash value of the equipment identification information ciphertext are obtained, and a second hash value of the equipment identification information ciphertext is calculated. Specifically, a hash algorithm tag is obtained from the networking request message, a hash algorithm corresponding to the hash algorithm tag is called, and a second hash value of the equipment identification information ciphertext is calculated.
And S203, verifying the equipment identification information ciphertext according to the first hash value and the second hash value.
And determining whether the equipment identification information ciphertext is tampered or not according to the second hash value and the first hash value. Specifically, determining whether the first hash value and the second hash value are the same; if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes verification, and determining that the message information in the networking request is not tampered in the transmission process; and if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification, and determining that the message information in the networking request is tampered in the transmission process.
And S204, when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain the equipment identification information.
And when the equipment identification information ciphertext passes the verification, continuously decrypting the equipment identification information ciphertext. Specifically, according to a preset cyclic shift strategy, performing cyclic logic shift processing on the equipment identification information ciphertext; and acquiring preset key information, and performing logic XOR processing on the key information and the equipment identification information ciphertext subjected to the cyclic shift processing to obtain equipment identification information.
Step S205, determining whether the device identification information is located in a preset device identification information base, and if the device identification information is not located in the preset device identification information base, outputting preset reminding information to remind a user to reconfigure the key information.
Judging whether the equipment identification information is located in a preset equipment identification information base or not, and if the equipment identification information is located in the preset equipment identification information base, determining that the intelligent home equipment passes networking verification, so that the equipment identification information is written into an equipment white list of a network to access the intelligent home equipment to the network; if the equipment identification information is not located in the preset equipment identification information base, the fact that the intelligent household equipment does not pass networking verification is determined, and preset reminding information is output to remind a user of reconfiguring key information.
Step S206, receiving a reconfiguration instruction of the key information, displaying an identity authentication page according to the reconfiguration instruction, and acquiring password information input by a user on the identity authentication page.
When a reconfiguration instruction of the key information is received, an authentication page is displayed, and a user can input password information through the authentication page to authenticate the identity of the user, namely, the password information input by the user based on the authentication confirmation page is received and the input password information is authenticated. The password information includes, but is not limited to, a digital password, swipe gesture information, fingerprint feature information, and face feature information.
And step S207, when the password information passes the verification, displaying a key information configuration page, and acquiring the key configuration information input by the user on the key information configuration page.
In the process of identity verification, a user is required to input password information, and when the password information is correct, a key information configuration page is displayed, and the key configuration information input by the user on the key information configuration page is acquired. The key configuration information is composed of numbers, english letters and/or special characters, and the specific mode of the key configuration information can be set by the user, which is not specifically limited in the present application.
Step S208, a pre-stored network identifier is obtained, and the key information is reconfigured according to the network identifier and the key configuration information.
The network identifier is used for uniquely identifying the home network, and the network identifier is composed of numbers, english letters and/or special characters, and the specific composing mode can be set based on the actual situation, which is not specifically limited in the present application.
Specifically, according to a preset hash algorithm, a hash value of the network identifier and a hash value of the key configuration information are respectively calculated, the hash values of the network identifier and the key configuration information are spliced to obtain a target hash value, and the key information is updated to the target hash value. The splicing manner of the hash value of the network identifier and the hash value of the key configuration information may be that the hash value of the network identifier is before, and the hash value of the key configuration information is after, including the hash value of the network identifier is after, and the hash value of the key configuration information is before. The hash algorithm may be set based on actual conditions, and the present application is not limited to this. Optionally, the predetermined hashing algorithm includes, but is not limited to, SHA-1 algorithm, SHA-224 algorithm, SHA-256 algorithm, SHA-384 algorithm, SHA-512 algorithm.
Specifically, when a browsing instruction of key information triggered by a user is detected, a user identifier is obtained from the browsing instruction, whether the user identifier is located in a preset user white list or not is determined, and if the user identifier is located in the preset user white list, the key information is displayed. When the user reads the key information, the identity of the user is verified, and the safety can be improved.
In the networking verification method provided in the above embodiment, the reconfiguration instruction of the key information is received, the identity authentication page is displayed according to the reconfiguration instruction, the password information input by the user on the identity authentication page is acquired, then, when the password information passes the verification, the key information configuration page is displayed, the key configuration information input by the user on the key information configuration page is acquired, then, the pre-stored network identifier is acquired, and the key information is reconfigured according to the network identifier and the key configuration information. By updating the key information, the efficiency of networking verification is improved, and the security of networking verification is improved.
Referring to fig. 4, fig. 4 is a schematic block diagram of a computer device according to an embodiment of the present disclosure. The computer device may be a server or a terminal.
As shown in fig. 4, the computer device includes a processor, a memory, and a network interface connected by a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause a processor to perform any of the networking authentication methods.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for the execution of a computer program on a non-volatile storage medium, which when executed by a processor, causes the processor to perform any of the networking authentication methods.
The network interface is used for network communication, such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message;
acquiring an equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext from the networking request message, and calculating a second hash value of the equipment identification information ciphertext;
verifying the equipment identification information ciphertext according to the first hash value and the second hash value;
and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of the network so as to access the intelligent household equipment to the network.
In one embodiment, the processor, in performing the computing of the second hash value of the device identification information ciphertext, is configured to perform:
and acquiring a hash algorithm tag from the networking request message, calling a hash algorithm corresponding to the hash algorithm tag, and calculating a second hash value of the equipment identification information ciphertext.
In one embodiment, the processor, when implementing the checking of the device identification information ciphertext according to the first hash value and the second hash value, is configured to implement:
determining whether the first hash value and the second hash value are the same;
if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes verification;
and if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification.
In one embodiment, when the processor decrypts the device identification information ciphertext to obtain the device identification information, the processor is further configured to:
according to a preset cyclic shift strategy, carrying out cyclic shift processing on the equipment identification information ciphertext;
and acquiring preset key information, and performing logic XOR processing on the key information and the equipment identification information ciphertext subjected to the cyclic shift processing to obtain equipment identification information.
In one embodiment, before the writing of the device identification information into the device white list of the network is implemented to access the smart home device to the network, the processor is configured to implement:
judging whether the equipment identification information is located in a preset equipment identification information base or not;
if the equipment identification information is located in a preset equipment identification information base, writing the equipment identification information into an equipment white list of a network so as to access the intelligent household equipment to the network;
and if the equipment identification information is not located in a preset equipment identification information base, outputting preset reminding information to remind a user to reconfigure the key information.
In one embodiment, after the processor is configured to output a preset reminding message to remind the user to reconfigure the key message, the processor is further configured to:
receiving a reconfiguration instruction of the key information, displaying an identity authentication page according to the reconfiguration instruction, and acquiring password information input by a user on the identity authentication page;
when the password information passes the verification, displaying a key information configuration page, and acquiring key configuration information input by a user on the key information configuration page;
and acquiring a pre-stored network identifier, and reconfiguring the key information according to the network identifier and the key configuration information.
In one embodiment, the processor, in enabling reconfiguration of the key information according to the network identifier and key configuration information, is configured to enable:
respectively calculating the hash value of the network identifier and the hash value of the key configuration information according to a preset hash algorithm;
and splicing the hash value of the network identifier and the hash value of the key configuration information to obtain a target hash value, and updating the key information into the target hash value.
In one embodiment, when implementing the networking verification method, the processor is further configured to implement:
when a reading instruction of key information triggered by a user is detected, acquiring a user identifier from the reading instruction, and determining whether the user identifier is located in a preset user white list;
and if the user identifier is located in a preset user white list, displaying the key information.
Embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, where the computer program includes program instructions, and a method implemented when the program instructions are executed may refer to the various embodiments of the networking verification method of the present application.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments. While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A networking verification method, comprising:
receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message;
acquiring an equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext from the networking request message, and calculating a second hash value of the equipment identification information ciphertext;
verifying the equipment identification information ciphertext according to the first hash value and the second hash value;
and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of the network so as to access the intelligent household equipment to the network.
2. The networking verification method of claim 1, wherein said computing the second hash value of the device identification information ciphertext comprises:
and acquiring a hash algorithm tag from the networking request message, calling a hash algorithm corresponding to the hash algorithm tag, and calculating a second hash value of the equipment identification information ciphertext.
3. The networking verification method of claim 1, wherein the verifying the device identification information ciphertext according to the first hash value and the second hash value comprises:
determining whether the first hash value and the second hash value are the same;
if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes verification;
and if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification.
4. The networking verification method according to any one of claims 1 to 3, wherein the decrypting the device identification information ciphertext to obtain device identification information includes:
according to a preset cyclic shift strategy, carrying out cyclic shift processing on the equipment identification information ciphertext;
and acquiring preset key information, and performing logic XOR processing on the key information and the equipment identification information ciphertext subjected to the cyclic shift processing to obtain equipment identification information.
5. The networking verification method according to claim 4, wherein before writing the device identification information into a device white list of a network to access the smart home device to the network, the method further comprises:
judging whether the equipment identification information is located in a preset equipment identification information base or not;
if the equipment identification information is located in a preset equipment identification information base, writing the equipment identification information into an equipment white list of a network so as to access the intelligent household equipment to the network;
and if the equipment identification information is not located in a preset equipment identification information base, outputting preset reminding information to remind a user to reconfigure the key information.
6. The networking authentication method of claim 5, wherein said outputting a predetermined reminder message to remind a user to reconfigure said key message further comprises;
receiving a reconfiguration instruction of the key information, displaying an identity authentication page according to the reconfiguration instruction, and acquiring password information input by a user on the identity authentication page;
when the password information passes the verification, displaying a key information configuration page, and acquiring key configuration information input by a user on the key information configuration page;
and acquiring a pre-stored network identifier, and reconfiguring the key information according to the network identifier and the key configuration information.
7. The networking authentication method of claim 6, wherein said reconfiguring the key information based on the network identifier and key configuration information comprises:
respectively calculating the hash value of the network identifier and the hash value of the key configuration information according to a preset hash algorithm;
and splicing the hash value of the network identifier and the hash value of the key configuration information to obtain a target hash value, and updating the key information into the target hash value.
8. The networking verification method according to any one of claims 1 to 3, further comprising:
when a reading instruction of key information triggered by a user is detected, acquiring a user identifier from the reading instruction, and determining whether the user identifier is located in a preset user white list;
and if the user identifier is located in a preset user white list, displaying the key information.
9. A computer arrangement, characterized in that the computer arrangement comprises a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program, when executed by the processor, carries out the steps of the networking authentication method according to any one of claims 1 to 8.
10. A computer-readable storage medium, having a computer program stored thereon, wherein the computer program, when being executed by a processor, performs the steps of the networking authentication method according to any one of claims 1 to 8.
CN201911090421.7A 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium Active CN112866987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911090421.7A CN112866987B (en) 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911090421.7A CN112866987B (en) 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112866987A true CN112866987A (en) 2021-05-28
CN112866987B CN112866987B (en) 2023-08-04

Family

ID=75984115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911090421.7A Active CN112866987B (en) 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112866987B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116193429A (en) * 2023-02-06 2023-05-30 中国联合网络通信集团有限公司 Authentication method, authentication device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719250A (en) * 2009-12-10 2010-06-02 中国联合网络通信集团有限公司 Payment authentication method, platform and system
CN106301759A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of method of data encryption, the method and device of deciphering
CN108183899A (en) * 2017-12-28 2018-06-19 北京明朝万达科技股份有限公司 A kind of data safety management system and method
CN109660609A (en) * 2018-12-07 2019-04-19 北京海泰方圆科技股份有限公司 A kind of device identification method and device and storage medium
CN109688583A (en) * 2018-12-03 2019-04-26 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A kind of data ciphering method in star earth communication system
CN110061849A (en) * 2019-04-29 2019-07-26 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719250A (en) * 2009-12-10 2010-06-02 中国联合网络通信集团有限公司 Payment authentication method, platform and system
CN106301759A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of method of data encryption, the method and device of deciphering
CN108183899A (en) * 2017-12-28 2018-06-19 北京明朝万达科技股份有限公司 A kind of data safety management system and method
CN109688583A (en) * 2018-12-03 2019-04-26 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A kind of data ciphering method in star earth communication system
CN109660609A (en) * 2018-12-07 2019-04-19 北京海泰方圆科技股份有限公司 A kind of device identification method and device and storage medium
CN110061849A (en) * 2019-04-29 2019-07-26 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116193429A (en) * 2023-02-06 2023-05-30 中国联合网络通信集团有限公司 Authentication method, authentication device and storage medium

Also Published As

Publication number Publication date
CN112866987B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
US9525549B2 (en) Method and apparatus for securing a mobile application
JP6275653B2 (en) Data protection method and system
EP2989741B1 (en) Generation of working security key based on security parameters
JP2021516495A (en) Key management methods, devices, systems, computer equipment and computer programs
US11258591B2 (en) Cryptographic key management based on identity information
RU2445689C2 (en) Method to increase limitation of access to software
CN107194237B (en) Method and device for application program security authentication, computer equipment and storage medium
TWI724684B (en) Method, system and device for performing cryptographic operations subject to identity verification
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
TWI724681B (en) Managing cryptographic keys based on identity information
CN107548542B (en) User authentication method with enhanced integrity and security
CN111479265A (en) Information dissemination method and device, computer equipment and storage medium
CN114268447B (en) File transmission method and device, electronic equipment and computer readable medium
CN111818087B (en) Block chain node access method, device, equipment and readable storage medium
CN109891823B (en) Method, system, and non-transitory computer readable medium for credential encryption
CN112866987B (en) Networking verification method, networking verification device and computer readable storage medium
CN113127844A (en) Variable access method, device, system, equipment and medium
CN107135074B (en) Advanced security method and device
CN109302442B (en) Data storage proving method and related equipment
CN115208575A (en) Software security verification method, device and storage medium
CN113439292B (en) System and method for managing trusted applications in computer chip modules
CN102087683A (en) Password management and verification method suitable for trusted platform module (TPM)
CN113508380A (en) Method for terminal entity authentication
CN111357003A (en) Data protection in a pre-operating system environment
CN110263553B (en) Database access control method and device based on public key verification and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant