CN113347034B - Device processing method and device, authentication method and device, and storage medium - Google Patents

Device processing method and device, authentication method and device, and storage medium Download PDF

Info

Publication number
CN113347034B
CN113347034B CN202110605422.1A CN202110605422A CN113347034B CN 113347034 B CN113347034 B CN 113347034B CN 202110605422 A CN202110605422 A CN 202110605422A CN 113347034 B CN113347034 B CN 113347034B
Authority
CN
China
Prior art keywords
information
target
equipment
address
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110605422.1A
Other languages
Chinese (zh)
Other versions
CN113347034A (en
Inventor
刘明强
潘军威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110605422.1A priority Critical patent/CN113347034B/en
Priority to CN202211254936.8A priority patent/CN115567380A/en
Publication of CN113347034A publication Critical patent/CN113347034A/en
Application granted granted Critical
Publication of CN113347034B publication Critical patent/CN113347034B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Abstract

The embodiment of the invention provides a device processing method and device, an authentication method and device, a storage medium and an electronic device, wherein the method comprises the following steps: executing discovery operation according to a preset discovery mode to determine whether new equipment accesses a target network; under the condition that the first equipment is detected to be equipment newly accessed to a target network, reconfiguring a target network protocol (IP) address for the first equipment; initializing the first device and adding the first device to the central server based on the reconfigured destination IP address for the first device. According to the invention, the problem of low installation and debugging efficiency caused by the fact that equipment is mainly manually found and added in the related technology is solved, and the effect of improving the installation and debugging efficiency is further achieved.

Description

Device processing method and device, authentication method and device, and storage medium
Technical Field
The embodiment of the invention relates to the field of communication, in particular to a device processing method and device, an authentication method and device, a storage medium and an electronic device.
Background
In recent years, with the rapid development of information technology, great progress is made in security protection and intelligent management of buildings, and intelligent devices for buildings are also in a wide range, for example, a visual intercom device for buildings is described below as an example, and the visual intercom device for buildings is generally used in a community and can realize visual communication between each household in the community and between a visitor in the community and a household to be visited after deployment. The system generally comprises hundreds of indoor machines, a plurality of door machines and a central server, wherein the central server supports Session Initiation Protocol (SIP), and under some application scenes, the central server can be integrated on the door machines and is externally represented as a device.
In order to solve the problem of low installation and debugging efficiency caused by the fact that equipment is mainly found and added through manual operation in the related art, no effective solution is provided at present.
Disclosure of Invention
The embodiment of the invention provides a device processing method and device, an authentication method and device, a storage medium and an electronic device, which at least solve the problem of low installation and debugging efficiency caused by the fact that device discovery and addition mainly depend on manual operation in the related technology.
According to an embodiment of the present invention, there is provided an apparatus processing method including: executing discovery operation according to a preset discovery mode to determine whether a new device accesses a target network; under the condition that the first equipment is detected to be equipment newly accessed to the target network, reconfiguring a target network protocol (IP) address for the first equipment; initializing the first device and adding the first device to a central server based on the reconfigured target IP address for the first device.
In one exemplary embodiment, performing the discovery operation in a predetermined discovery manner to determine whether a new device accesses the target network comprises: according to a preset private protocol, sending a multicast message through the target network to indicate a terminal receiving the multicast message to return a response message; determining whether a new device accesses the target network based on the received response message.
In one exemplary embodiment, reconfiguring the target network protocol IP address for the first device comprises: selecting the target IP address which is not used from an address pool maintained by the central server, wherein a plurality of IP addresses are stored in the address pool; and modifying the IP address of the first equipment into the target IP address.
In one exemplary embodiment, initializing the first device and adding the first device to the central server comprises: generating a user name and a password for the first device to initialize the first device, wherein the user name and the password are used for accessing the first device; and adding the first equipment to the central server under the condition that the initialization of the first equipment is completed.
In one exemplary embodiment, after initializing the first device and adding the first device to the central server, the method further comprises: determining target configuration information corresponding to the target identification information of the first device based on a pre-configured corresponding relationship, wherein the corresponding relationship correspondingly records identification information of the device and configuration information of the device; and configuring the first equipment according to the target configuration information.
In one exemplary embodiment, the target configuration information includes at least one of: location information of the first device; a calling number of the first device; master-slave relationship information between the first device and other devices.
According to another embodiment of the present invention, there is also provided a device authentication method including: a first device sends an authentication request to a second device to request to execute bidirectional authentication between the first device and the second device; the first device receives first information returned by the second device based on the authentication request, wherein the first information carries a first random number generated by the second device; the first device sends second information to the second device based on the first random number to indicate the second device to authenticate the first device, wherein the second information carries a second random number generated by the first device and a first transformed random number obtained after the first device transforms the first random number according to a predetermined transformation rule; the first device receives third information returned by the second device based on the second information, wherein the third information is sent by the second device when the second device passes the authentication of the first device based on the second random number, and the third information carries a second conversion random number obtained after the second device converts the second random number according to the predetermined change rule; the first device authenticates the second device based on the second transformed nonce.
In an exemplary embodiment, the authentication request includes first identity information of the first device, where the first information is information encrypted by the second device using the first identity information and a master public key, and the master public key is stored in both the first device and the second device; the first device sending second information to the second device based on the first random number comprises: the first device decrypts the first information by using the first identity information and a first private key stored in the first device to obtain the first random number and second identity information of the second device; the first equipment transforms the first random number according to a preset variation rule to obtain a first transformed random number; the first device sends the generated second information containing the first transformed random number to the second device to instruct the second device to authenticate the first device based on the first transformed random number.
In an exemplary embodiment, the first information further carries second identity information of the second device, and the second information is information encrypted by the first device using the second identity information and the master public key; the third information is sent by the second device based on the first random number when the first device is authenticated based on the first random number after the second device decrypts the second information by using the second identity information and a second private key stored in the second device to obtain the second random number.
In an exemplary embodiment, the third information is information that the second device is encrypted with the first identity information and the master public key, and the authenticating, by the first device, the second device based on the second transformed random number includes: the first device decrypts the third information by using the first identity information and the first private key to obtain the second transformation random number; the first equipment transforms the second random number according to the preset variation rule to obtain a third transformed random number; and the first device compares the second transformed random number and the third transformed random number, and determines a result of the first device authenticating the second device based on the comparison result, wherein the result of the first device authenticating the second device is determined as authentication passing when the second transformed random number and the third transformed random number are determined to be the same, and the result of the first device authenticating the second device is determined as authentication failing when the second transformed random number and the third transformed random number are determined to be different.
In one exemplary embodiment, the method further comprises: the first device sends first identity information of the first device to a key generation center KGC, wherein a master public key and a master private key are generated in the KGC; the first device obtains target information returned by the KGC based on the first identity information, wherein the target information comprises the master public key and a first private key generated by the KGC based on the first identity information by using the master public key; the first device stores the first private key and the master public key.
In an exemplary embodiment, the target information further includes system parameters of the first device, wherein the method further includes: and the first equipment stores the system parameters after receiving the target information.
According to still another embodiment of the present invention, there is also provided a device processing apparatus including: the device comprises a discovery module, a service module and a service module, wherein the discovery module is used for executing discovery operation according to a preset discovery mode so as to determine whether a new device accesses a target network; the configuration module is used for reconfiguring a target network protocol IP address for the first equipment under the condition that the first equipment is detected to be equipment newly accessed to the target network; and the adding module is used for initializing the first equipment and adding the first equipment to the central server based on the target IP address reconfigured for the first equipment.
According to another embodiment of the present invention, there is also provided a device authentication apparatus, applied to a first device, including: a first sending module, configured to send an authentication request to a second device to request to perform mutual authentication between the first device and the second device; a first receiving module, configured to receive first information returned by the second device based on the authentication request, where the first information carries a first random number generated by the second device; a second sending module, configured to send second information to the second device based on the first random number to instruct the second device to authenticate the first device, where the second information carries a second random number generated by the first device and a first transformed random number obtained after the first device transforms the first random number according to a predetermined transformation rule; a second receiving module, configured to receive third information returned by the second device based on the second information, where the third information is sent by the second device when the second device passes authentication on the first device based on the second random number, and the third information carries a second transformed random number obtained after the second device transforms the second random number according to the predetermined transformation rule; an authentication module to authenticate the second device based on the second transformed nonce.
According to a further embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the steps of any of the method embodiments described above.
According to the invention, the discovery operation is executed in the target network according to the preset discovery mode to determine whether a new device is accessed to the target network, the target IP address is reconfigured for the first device under the condition that the first device is detected to be the device which is newly accessed to the target network, the first device is initialized based on the target IP address, and the first device is added to the central server, namely, whether the new device is accessed can be discovered according to the preset discovery mode, when the first device is determined to be the device which is newly accessed, the IP address can be configured for the first device, the first device is initialized based on the IP address, and the first device is added to the central server, so that the problem of low installation and debugging efficiency caused by the fact that the device discovery and the addition mainly depend on manual operation in the related technology is solved, and the effect of improving the installation and debugging efficiency is achieved.
Drawings
Fig. 1 is a block diagram of a hardware structure of a mobile terminal of a device processing method according to an embodiment of the present invention;
FIG. 2 is a flow diagram of a device processing method according to an embodiment of the present invention;
FIG. 3 is a network topology diagram according to a specific embodiment of the present invention;
FIG. 4 is a schematic diagram of device auto-discovery according to a specific embodiment of the present invention;
FIG. 5 is a flow diagram of a method for automatic addition of devices in accordance with a specific embodiment of the present invention;
FIG. 6 is a flow diagram of a method for automatic configuration of a device in accordance with a specific embodiment of the present invention;
FIG. 7 is a flow diagram of a method of device authentication according to an embodiment of the invention;
FIG. 8 is a flow diagram of device key distribution import according to an embodiment of the present invention;
FIG. 9 is a flow chart of a method for bidirectional authentication of a device according to an embodiment of the invention;
fig. 10 is a block diagram of the structure of a device processing apparatus according to an embodiment of the present invention;
fig. 11 is a block diagram of the structure of a device authentication apparatus according to an embodiment of the present invention.
Detailed Description
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings in conjunction with the embodiments.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the embodiments of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking the operation on the mobile terminal as an example, fig. 1 is a hardware structure block diagram of the mobile terminal of the device processing method according to the embodiment of the present invention. As shown in fig. 1, the mobile terminal may include one or more processors 102 (only one is shown in fig. 1) (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.) and a memory 104 for storing data, wherein the mobile terminal may further include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the device processing method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In the present embodiment, a device processing method is provided, and fig. 2 is a flowchart of the device processing method according to the embodiment of the present invention, and as shown in fig. 2, the flowchart includes the following steps:
step S202, executing discovery operation according to a preset discovery mode to determine whether a new device accesses a target network;
step S204, under the condition that the first device is detected to be a device newly accessed to the target network, a target network protocol IP address is reconfigured for the first device;
step S206, based on the target IP address reconfigured for the first device, initializing the first device and adding the first device to a central server.
Through the steps, a discovery operation is executed in a target network according to a preset discovery mode to determine whether a new device accesses the target network, a target IP address is reconfigured for the first device under the condition that the first device is detected to be a device which is newly accessed to the target network, the first device is initialized based on the target IP address, and the first device is added to the central server, namely, whether the new device accesses the target network can be discovered according to the preset discovery mode, when the first device is determined to be the device which is newly accessed, the IP address can be configured for the first device, the first device is initialized based on the IP address, and the first device is added to the central server, so that the problem of low installation and debugging efficiency caused by the fact that the device discovery and the addition mainly depend on manual operation in the related technology is solved, and the effect of improving the installation and debugging efficiency is achieved.
The main body of the above steps may be a server, for example, a central server in a building intercom system, or other servers, or a processor with human-computer interaction capability disposed on a storage device, or a processing device or processing unit with similar processing capability, etc., but is not limited thereto. The following description is given by taking the central server as an example (which is only an exemplary description, and in actual operation, other devices or modules may also perform the above operations):
in the above embodiment, the central server performs a discovery operation according to a predetermined discovery manner, for example, performs a discovery operation according to a multicast search manner or other manners, to determine whether a new device accesses the target network, and when it is detected that the first device (for example, device X) is a device that newly accesses the target network, reconfigures a target network protocol IP address for the first device, and then, based on the target IP address, the central server initializes the first device (i.e., device X) and adds the first device to the central server. Through the embodiment, the purposes of automatically discovering equipment and automatically adding equipment are achieved, and the problem of low installation and debugging efficiency caused by manual operation in equipment discovery and addition in the prior art is solved.
In an optional embodiment, performing the discovery operation according to the predetermined discovery mode to determine whether a new device accesses the target network includes: according to a preset private protocol, sending a multicast message through the target network to indicate a terminal receiving the multicast message to return a response message; determining whether a new device accesses the target network based on the received response message. In this embodiment, the performing, by the central server, a discovery operation according to a predetermined discovery manner to determine whether a new device accesses the target network includes: the central server sends a multicast message through the target network according to a preset private protocol so as to indicate the terminal receiving the multicast message to return a response message; the central server determines whether a new device accesses the target network based on the received response message, for example, after the terminal device (such as the device X) in the target network receives the multicast message, the central server may determine that a new device (such as the device X) accesses the target network.
In an alternative embodiment, reconfiguring the target network protocol IP address for the first device comprises: selecting the target IP address which is not used from an address pool maintained by the central server, wherein a plurality of IP addresses are stored in the address pool; and modifying the IP address of the first equipment into the target IP address. In this embodiment, when the central server detects that a first device (such as the device X) accesses the target network, reconfiguring a target network protocol IP address for the first device includes: and selecting the target IP address which is not used from an address pool maintained by the central server, wherein the address pool stores a plurality of IP addresses, and modifies the IP address of the first device into the target IP address, namely, a new IP address is allocated to the first device from the address pool maintained by the central server, and the IP address of the first device is changed into the new IP address.
In an optional embodiment, initializing the first device and adding the first device to the central server includes: generating a user name and a password for the first device to initialize the first device, wherein the user name and the password are used for accessing the first device; and adding the first equipment to the central server under the condition that the initialization of the first equipment is completed. In this embodiment, initializing the first device (e.g., the device X described above) and adding the first device to the central server includes: the central server generates a user name and a password for the first equipment to initialize the first equipment, wherein the user name and the password are used for accessing the first equipment; and under the condition that the initialization of the first equipment is completed, adding the first equipment to the central server. By means of the embodiment, the purpose of automatic adding of the equipment can be achieved.
In an optional embodiment, after initializing the first device and adding the first device to the central server, the method further comprises: determining target configuration information corresponding to the target identification information of the first device based on a pre-configured corresponding relationship, wherein the corresponding relationship correspondingly records identification information of the device and configuration information of the device; and configuring the first equipment according to the target configuration information. In this embodiment, after initializing the first device and adding the first device to the central server, the central server determines, based on a pre-configured corresponding relationship, target configuration information corresponding to target identification information of the first device, where the corresponding relationship correspondingly records identification information of the device and configuration information of the device, and optionally, in an actual application, the corresponding relationship may be a device serial number and a device position, a call number, a device master-slave relationship, or other configuration information; after determining the target configuration information, the central server may configure the first device according to the target configuration information. By the embodiment, the purpose of automatic configuration of the equipment can be realized.
In an optional embodiment, the target configuration information includes at least one of: location information of the first device; a calling number of the first device; master-slave relationship information between the first device and other devices. In this embodiment, the target configuration information may include at least one of the following: location information of the first device; a calling number of the first device; master-slave relationship information between the first device and other devices.
It is to be understood that the above-described embodiments are only a few, and not all, embodiments of the present invention.
The present invention will be described in detail with reference to the following examples:
fig. 3 is a network topology diagram according to an embodiment of the present invention, as shown in fig. 3, one door phone, multiple indoor phones, network devices, and a central server are all in the same network, and in a daily use process, if a device (e.g., a door phone or an indoor phone) fails, the device needs to be replaced, and automatic discovery, automatic addition, and automatic configuration of the device can be implemented through the central server. The following is a further description with reference to specific examples.
Fig. 4 is a schematic diagram illustrating an automatic discovery of devices according to an embodiment of the present invention, as shown in fig. 4, the central server in fig. 4 periodically performs multicast search (corresponding to the predetermined discovery manner) by using a preset private protocol, so as to discover intercom devices (such as the gate phone and the indoor unit in fig. 4) in the network where the central server is located; and the terminal equipment such as the door phone, the indoor unit and the like receives the search message and then responds to the search message, so that equipment discovery can be completed. By the embodiment, automatic discovery of the device can be realized.
Fig. 5 is a flowchart of a method for automatic device addition according to an embodiment of the present invention, as shown in fig. 5, the flowchart includes the following steps:
s502, the central server generates an IP address pool in advance;
s504, after the central server finds a new device (the indoor unit or the outdoor unit in fig. 5, which is equivalent to the first device), it will allocate an unused IP to the new device from the address pool maintained by the central server, and modify the IP of the new device;
s506, the equipment returns a setting result;
and S508, the central server initializes the newly found equipment according to the system unified password set by the user. Generating an account name and a password which can access the new device;
s510, the equipment returns an initialization result;
s512, the initialized new device is automatically added to the central server for subsequent configuration and management.
Through the embodiment, automatic addition of the equipment can be realized.
Fig. 6 is a flowchart of a method for automatically configuring a device according to an embodiment of the present invention, as shown in fig. 6, the flowchart includes the following steps:
s602, the central server needs to maintain a user configuration table (corresponding to the pre-configured corresponding relationship) to maintain user-defined information of the user, including a device serial number, a position, a calling number, a master-slave relationship or other configuration information, and the like;
s604, after the central server completes the automatic addition of the new equipment, the central server inquires corresponding user configuration information according to the serial number of the new equipment;
s606, after querying the user configuration information, setting the configuration information to a newly added device (such as an indoor unit or an entrance unit in fig. 6), and completing automatic configuration;
s608, the equipment stores the user configuration information;
s610, the device returns the setting result to the server.
Through the embodiment, automatic configuration of the equipment can be realized.
Fig. 7 is a flowchart of an apparatus authentication method according to an embodiment of the present invention, and as shown in fig. 7, the flowchart includes the following steps:
step S702, a first device sends an authentication request to a second device to request to execute bidirectional authentication between the first device and the second device;
step S704, the first device receives first information returned by the second device based on the authentication request, where the first information carries a first random number generated by the second device;
step S706, the first device sends second information to the second device based on the first random number to indicate the second device to authenticate the first device, where the second information carries a second random number generated by the first device and a first transformed random number obtained by the first device transforming the first random number according to a predetermined transformation rule;
step S708, the first device receives third information returned by the second device based on the second information, where the third information is sent by the second device when the second device passes authentication of the first device based on the second random number, and the third information carries a second transformed random number obtained by transforming the second random number by the second device according to the predetermined transformation rule;
step S710, the first device authenticates the second device based on the second transformed nonce.
Through the steps, the first device sends an authentication request to the second device to request to execute bidirectional authentication between the first device and the second device, the first device receives a first message returned by the second device based on the authentication request, wherein the first message carries a first random number generated by the second device, then the first device sends second information to the second device based on the first random number to indicate the second device to authenticate the first device, the second information carries a second random number generated by the first device and a first transformed random number obtained after the first random number is transformed by the first device according to a preset transformation rule, then the first device receives third information returned by the second device based on the second information, wherein the third information is a second transformed random number obtained after the second device passes authentication on the first device based on the second random number, and finally the first device realizes bidirectional authentication between the first device and the second device based on the second random transformed random number; therefore, the problem of low equipment safety in the related art is solved, and the effect of improving the equipment safety is achieved.
The main body of the above steps may be a terminal, such as a door phone, an indoor phone in a building intercom system, or other devices, but is not limited thereto. The following description is given by taking the door phone as an example (which is only an exemplary illustration, and in actual operation, other devices or modules may also be used to perform the above operations):
in the above embodiment, the first device (e.g., the door phone a) transmits the authentication request to the second device (e.g., the door phone B) to request to perform the mutual authentication between the first device and the second device; a first device (i.e., the door phone a) receives first information returned by a second device (i.e., the door phone B) based on an authentication request, where the first information carries a first random number (e.g., N1) generated by the second device; then, the first device sends second information to the second device based on the first random number N1 to instruct the second device to authenticate the first device, where the second information carries a second random number (e.g., N2) generated by the first device and a first transformed random number obtained by the first device transforming the first random number N1 according to a predetermined transformation rule, for example, the predetermined transformation rule may be a transformation relation f agreed in advance by both the first device and the second device, that is, the first device (i.e., the door phone a) transforms the first random number N1 according to the transformation relation f agreed in advance by both the first device and the second device to obtain the first transformed random number f (N1); then, the first device receives third information returned by the second device based on the second information, wherein the third information is sent by the second device when the second device passes the authentication of the first device based on the second random number N2, and the third information carries a second transformed random number f (N2) obtained by the second device transforming the second random number N2 according to the predetermined transformation rule (the previously agreed transformation relationship f between the two devices); finally, the first device authenticates the second device based on the second transformed random number f (N2). Through the embodiment, the mutual authentication between the first device and the second device is realized, the problem of low device safety in the related technology is solved, and the effect of improving the device safety is achieved.
In an optional embodiment, the authentication request includes first identity information of the first device, where the first information is information encrypted by the second device using the first identity information and a master public key, and the master public key is stored in both the first device and the second device; the first device sending second information to the second device based on the first random number comprises: the first equipment decrypts the first information by using the first identity information and a first private key stored in the first equipment to obtain the first random number and second identity information of the second equipment; the first equipment transforms the first random number according to a preset variation rule to obtain a first transformed random number; and the first equipment sends the generated second information containing the first transformation random number to the second equipment so as to instruct the second equipment to authenticate the first equipment based on the first transformation random number. In this embodiment, the authentication request includes first identity information (for example, IDA, i.e., identity information of the door phone a) of the first device (e.g., the door phone a), where the first information (i.e., information returned by the second device based on the authentication request) is information encrypted by the second device (e.g., the door phone B) using the first identity information (i.e., the IDA) and a master public key, and the master public key is stored in both the first device and the second device; the transmitting, by the first device (e.g., the above-mentioned door phone a) to the second device (e.g., the above-mentioned door phone B) based on the first random number (e.g., the above-mentioned random number N1), second information includes: the first device decrypts the first information by using the first identity information and a first private key (for example, private key 1) stored in the first device, so as to obtain the first random number N1 and second identity information (for example, IDB, that is, identity information of the door phone B) of the second device; the first equipment transforms the first random number according to a preset variation rule, namely transforms the first random number N1 according to a variation relation f agreed by the two parties in advance to obtain a first transformed random number f (N1); the first device sends the generated second information including the first transformed random number f (N1) to the second device to instruct the second device to authenticate the first device based on the first transformed random number N1.
In an optional embodiment, the first information further carries second identity information of the second device, and the second information is information encrypted by the first device using the second identity information and the master public key; the third information is sent by the second device based on the first random number when the first device passes authentication after the second device decrypts the second information by using the second identity information and a second private key stored in the second device to obtain the second random number. In this embodiment, the first information (i.e., the message returned by the second device to the first device based on the authentication request) further carries second identity information (i.e., the IDB) of the second device, where the second information is information encrypted by the first device using the second identity information and the master public key; the third information is sent by the second device when the second device obtains the second random number (e.g., N2) by decrypting the second information with the second identity information and a second private key (e.g., private key 2) stored in the second device, and authenticates the first device based on the first random number (e.g., N1).
In an optional embodiment, the third information is information that the second device encrypts using the first identity information and the master public key, and the authenticating, by the first device, the second device based on the second transformed random number includes: the first device decrypts the third information by using the first identity information and the first private key to obtain the second transformation random number; the first equipment transforms the second random number according to the preset variation rule to obtain a third transformed random number; and the first device compares the second transformed random number with the third transformed random number, and determines a result of the first device authenticating the second device based on the comparison result, wherein the result of the first device authenticating the second device is determined to be authenticated when the second transformed random number is determined to be the same as the third transformed random number, and the result of the first device authenticating the second device is determined to be authenticated when the second transformed random number is determined to be different from the third transformed random number. In this embodiment, the third information is information obtained by encrypting, by the second device (i.e., the door phone B), the first identity information (i.e., the IDA) and the master public key, and the authenticating, by the first device (i.e., the door phone a), the second device based on the second transformed random number (i.e., the random number N2) includes: the first device decrypts the third information by using the first identity information (i.e., the IDA) and the first private key (i.e., the private key 1) to obtain the second transformed random number (i.e., the f (N2)); the first device transforms the second random number N2 according to the predetermined transformation rule, for example, transforms the second random number N2 according to a transformation relationship f agreed by both parties in advance to obtain a third transformed random number f' (N2); the first device compares the second converted random number (i.e., f (N2) described above) and the third converted random number (i.e., f ' (N2) described above), and determines a result of the first device authenticating the second device based on a result of the comparison, wherein the result of the first device authenticating the second device is determined to be authentication-passed if it is determined that the second converted random number and the third converted random number are the same, i.e., if f ' (N2) = f (N2), and the result of the first device authenticating the second device is determined to be authentication-failed if it is determined that the second converted random number and the third converted random number are different, i.e., if f ' (N2) ≠ f (N2).
In an optional embodiment, the method further comprises: the first equipment sends first identity information of the first equipment to a key generation center KGC, wherein a main public key and a main private key are generated in the KGC; the first device obtains target information returned by the KGC based on the first identity information, wherein the target information comprises the master public key and a first private key generated by the KGC based on the first identity information by using the master public key; the first device stores the first private key and the master public key. In this embodiment, the method further includes: the first device (such as the above door phone a) sends first identity information (such as the above IDA) of the first device to a key generation center KGC, where the KGC generates a master public key and a master private key; the first device (i.e., the door phone a) acquires target information returned by the KGC based on the first identity information (i.e., the IDA), where the target information includes the master public key and a first private key (e.g., the private key 1) generated by the KGC based on the first identity information and using the master public key; the first device stores the first private key (i.e., private key 1) and the master public key. Similarly, the second device (e.g., the door phone B) may also send second identity information (e.g., the IDB) to the KGC, and then obtain a second private key (e.g., the private key 2) returned by the KGC and generated by using the main public key based on the second identity information, where the second device stores the second private key (i.e., the private key 2) and the main public key.
In an optional embodiment, the target information further includes system parameters of the first device, wherein the method further includes: and the first equipment stores the system parameters after receiving the target information. In this embodiment, the target information further includes system parameters of the first device (e.g., the door phone a), where the method further includes: and after receiving the target information, the first equipment stores the system parameters. Similarly, the second device (e.g., the door phone B) may also receive the system parameters returned by the KGC, and store the system parameters after receiving the system parameters.
The present invention will be described in detail with reference to the following examples:
fig. 8 is a flow chart of device key distribution import according to an embodiment of the present invention, and as shown in fig. 8, the flow chart includes the following steps:
s802, a key generation center KGC generates a master public key and a master private key;
s804, the device (e.g. device 1 or device 2 in fig. 8) reports the unique identity (e.g. device serial number SN);
s806, the KGC uses the main private key to generate the private key of the equipment according to the reported identity;
s808, the KGC issues the master public key, the private key of the device (including the device 1 and the device 2 in fig. 8), and the system parameter to the device (i.e., the device 1 and the device 2 in fig. 8);
and S810, after receiving the information, the equipment carries out safe storage.
It should be noted that, different devices have different reported identifiers (such as the device serial numbers SN), and the KGC generates different private keys.
After the key distribution and import are completed, the mutual authentication between the devices can be performed, fig. 9 is a flowchart of a mutual authentication method for the devices according to an embodiment of the present invention, and as shown in fig. 9, the flowchart includes the following steps:
s902, the device a sends an instruction to the device B to perform an authentication Request, for example, the device a sends an information Request | | | IDA | | | time to the device B, where the Request is to establish the authentication Request, IDA is identity information of the device a, and the time is a timestamp;
s904, B receives the authentication request from a, sends an authentication Reply to a, and authenticates its own identity, for example, B sends information E (Reply | | | IDB | | N1| time | | | HASH, IDA) to a. Wherein Reply is the Reply to the request, IDB is the ID of B, N1 is the random number generated by B, time is the time stamp, HASH is to carry out integrity check on the HASH value of the information, and the returned information is encrypted by using the identity information of A and the master public key;
s906, A receives the return information of B, decrypts the information by using the own identity (namely IDA) and the own private key (corresponding to the private key 1) to obtain the identity (namely IDB) of B, and transforms the random number N1 according to the transformation f agreed by the two parties in advance and returns the random number to B;
and S908, returning information to A by B, wherein the specific message content is E (f (N1) | N2| | time | | | HASH, IDB). Wherein f (N1) is used for verifying the conversion of a random number N1, N2 is a random number generated by A, time is a timestamp, and the identity information IDB and the main public key of B are encrypted after the whole message hash operation is in accordance with the time;
s910, B receives the information of A, and decrypts by using the identity IDB and the private key (corresponding to the private key 2);
s912, obtaining f (N1), calculating f (N1) by using the N1 generated just before, checking whether the f (N1) is consistent, if so, passing the identity authentication of A, acknowledging the legal identity of A, and simultaneously performing f conversion on the received N2 for the authentication of A to the self;
s914, B returns the message to A again, the concrete message content is E (confirm | | f (N2) | time | | | HASH, IDA), wherein, confirm for the authentication is passed and confirmed, time is the time stamp, HASH operation of the message links behind and encrypts with IDA and main public key;
s916, after the authentication confirmation information of the B is received, the A decrypts the information by using the identity (namely IDA) and the private key (corresponding to the private key 1);
s918, using the generated N2 to calculate whether f (N2) is consistent with the received f (N2), if so, completing the bidirectional identity authentication.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention or portions thereof contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
There is also provided in this embodiment a device processing apparatus, and fig. 10 is a block diagram of a structure of the device processing apparatus according to the embodiment of the present invention, and as shown in fig. 10, the apparatus includes:
a discovery module 1002, configured to perform discovery according to a predetermined discovery manner to determine whether a new device accesses a target network;
a configuring module 1004, configured to, in a case that it is detected that the first device is a device newly accessing the target network, reconfigure a target network protocol IP address for the first device;
an adding module 1006, configured to initialize the first device and add the first device to a central server based on the reconfigured target IP address for the first device.
In an alternative embodiment, the discovery module 1002 includes: a sending unit, configured to send a multicast message through the target network according to a preset private protocol, so as to indicate a terminal that receives the multicast message to return a response message; a determining unit, configured to determine whether a new device accesses the target network based on the received response message.
In an alternative embodiment, the configuration module 1004 includes: a selecting unit, configured to select the target IP address that is not used yet from an address pool maintained by the central server, where a plurality of IP addresses are stored in the address pool; and the modifying unit is used for modifying the IP address of the first equipment into the target IP address.
In an alternative embodiment, the adding module 1006 includes: a generating unit, configured to generate a user name and a password for the first device to initialize the first device, where the user name and the password are used to access the first device; and the adding unit is used for adding the first equipment to the central server under the condition that the initialization of the first equipment is completed.
In an optional embodiment, the device processing apparatus further includes: a determining module, configured to determine, after initializing the first device and adding the first device to a central server, target configuration information corresponding to target identification information of the first device based on a pre-configured correspondence relationship, where identification information of the device and configuration information of the device are correspondingly recorded in the correspondence relationship; and the second configuration module is used for configuring the first equipment according to the target configuration information.
In an optional embodiment, the target configuration information includes at least one of: location information of the first device; a calling number of the first device; master-slave relationship information between the first device and other devices.
There is also provided in this embodiment a device authentication apparatus, which is applied to a first device, and fig. 11 is a block diagram of a structure of the device authentication apparatus according to an embodiment of the present invention, and as shown in fig. 11, the apparatus includes:
a first sending module 1102, configured to send an authentication request to a second device to request to perform bidirectional authentication between the first device and the second device;
a first receiving module 1104, configured to receive first information returned by the second device based on the authentication request, where the first information carries a first random number generated by the second device;
a second sending module 1106, configured to send, to the second device, second information based on the first random number, so as to instruct the second device to authenticate the first device, where the second information carries a second random number generated by the first device and a first transformed random number obtained after the first device transforms the first random number according to a predetermined transformation rule;
a second receiving module 1108, configured to receive third information returned by the second device based on the second information, where the third information is sent by the second device when the second device passes authentication on the first device based on the second random number, and the third information carries a second transformed random number obtained after the second device transforms the second random number according to the predetermined transformation rule;
an authentication module 1110 configured to authenticate the second device based on the second transformed nonce.
In an optional embodiment, the authentication request includes first identity information of the first device, where the first information is information encrypted by the second device using the first identity information and a master public key, and the master public key is stored in both the first device and the second device; the second sending module 1106 includes: a first decryption unit, configured to decrypt the first information using the first identity information and a first private key stored in the first device, so as to obtain the first random number and second identity information of the second device; the first transformation unit is used for transforming the first random number according to a preset transformation rule to obtain a first transformed random number; a sending unit, configured to send, to the second device, second information that includes the first transformed nonce, so as to instruct the second device to authenticate the first device based on the first transformed nonce.
In an optional embodiment, the first information further carries second identity information of the second device, where the second information is information encrypted by the first device using the second identity information and the master public key; the third information is sent by the second device based on the first random number when the first device is authenticated based on the first random number after the second device decrypts the second information by using the second identity information and a second private key stored in the second device to obtain the second random number.
In an optional embodiment, the third information is information that the second device encrypts by using the first identity information and the master public key, and the authentication module 1110 includes: a second decryption unit, configured to decrypt the third information with the first identity information and the first private key to obtain the second transformed random number; the second transformation unit is used for transforming the second random number according to the preset transformation rule to obtain a third transformed random number; and a comparing unit configured to compare the second transformed random number and the third transformed random number, and determine a result of the authentication of the second device by the first device based on a comparison result, wherein when it is determined that the second transformed random number and the third transformed random number are the same, a result of the authentication of the second device by the first device is determined to be authentication pass, and when it is determined that the second transformed random number and the third transformed random number are different, a result of the authentication of the second device by the first device is determined to be authentication fail.
In an optional embodiment, the apparatus for authenticating a device further includes: a third sending module, configured to send first identity information of the first device to a key generation center KGC, where a master public key and a master private key are generated in the KGC; an obtaining module, configured to obtain target information returned by the KGC based on the first identity information, where the target information includes the master public key and a first private key generated by the KGC based on the first identity information and using the master public key; and the first storage module is used for storing the first private key and the master public key.
In an optional embodiment, the target information further includes system parameters of the first device, where the device authentication apparatus further includes: and the second storage module is used for storing the system parameters after the target information is received.
It should be noted that the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are located in different processors in any combination.
An embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to perform the steps in any of the above method embodiments when executed.
In an exemplary embodiment, the computer-readable storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention further provide an electronic device, comprising a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
In an exemplary embodiment, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
For specific examples in this embodiment, reference may be made to the examples described in the above embodiments and exemplary embodiments, and details of this embodiment are not repeated herein.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented in a general purpose computing device, they may be centralized in a single computing device or distributed across a network of multiple computing devices, and they may be implemented in program code that is executable by a computing device, such that they may be stored in a memory device and executed by a computing device, and in some cases, the steps shown or described may be executed in an order different from that shown or described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps therein may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A device processing method, comprising:
executing discovery operation according to a preset discovery mode to determine whether a new device accesses a target network;
under the condition that the first equipment is detected to be equipment newly accessed to the target network, reconfiguring a target network protocol (IP) address for the first equipment;
initializing the first device and adding the first device to a central server based on a target IP address reconfigured for the first device;
wherein after initializing the first device and adding the first device to a central server, the method further comprises:
determining target configuration information corresponding to the target identification information of the first device based on a pre-configured corresponding relationship, wherein the corresponding relationship correspondingly records identification information of the device and configuration information of the device;
configuring the first equipment according to the target configuration information;
the target configuration information includes at least one of: location information of the first device; a calling number of the first device; master-slave relationship information between the first device and other devices.
2. The method of claim 1, wherein performing discovery operations in a predetermined discovery manner to determine whether a new device accesses a target network comprises:
according to a preset private protocol, sending a multicast message through the target network to indicate a terminal receiving the multicast message to return a response message;
determining whether a new device accesses the target network based on the received response message.
3. The method of claim 1, wherein reconfiguring a target network protocol (IP) address for the first device comprises:
selecting the target IP address which is not used from an address pool maintained by the central server, wherein a plurality of IP addresses are stored in the address pool;
and modifying the IP address of the first equipment into the target IP address.
4. The method of claim 1, wherein initializing the first device and adding the first device to a central server comprises:
generating a user name and a password for the first device to initialize the first device, wherein the user name and the password are used for accessing the first device;
and under the condition that the initialization of the first equipment is completed, adding the first equipment to the central server.
5. An apparatus processing device, comprising:
the device comprises a discovery module, a service module and a service module, wherein the discovery module is used for executing discovery operation according to a preset discovery mode so as to determine whether a new device accesses a target network;
the configuration module is used for reconfiguring a target network protocol IP address for the first equipment under the condition that the first equipment is detected to be equipment newly accessed to the target network;
an adding module, configured to initialize the first device and add the first device to a central server based on a target IP address reconfigured for the first device;
wherein, above-mentioned device still includes: a determining module, configured to determine, after initializing the first device and adding the first device to a central server, target configuration information corresponding to target identification information of the first device based on a pre-configured correspondence relationship, where identification information of the device and configuration information of the device are correspondingly recorded in the correspondence relationship; the second configuration module is used for configuring the first equipment according to the target configuration information;
the target configuration information includes at least one of: location information of the first device; a calling number of the first device; master-slave relationship information between the first device and other devices.
6. The apparatus of claim 5, wherein the discovery module comprises:
a sending unit, configured to send a multicast message through the target network according to a preset private protocol, so as to indicate a terminal that receives the multicast message to return a response message;
a determining unit, configured to determine whether a new device accesses the target network based on the received response message.
7. The apparatus of claim 5, wherein the configuration module comprises:
a selecting unit, configured to select the target IP address that is not used yet from an address pool maintained by the central server, where a plurality of IP addresses are stored in the address pool;
and the modifying unit is used for modifying the IP address of the first equipment into the target IP address.
8. The apparatus of claim 5, wherein the adding module comprises:
a generating unit, configured to generate a user name and a password for the first device to initialize the first device, where the user name and the password are used to access the first device;
and the adding unit is used for adding the first equipment to the central server under the condition that the initialization of the first equipment is completed.
9. A computer-readable storage medium, in which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method of one of claims 1 to 4.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method as claimed in any of claims 1 to 4 are implemented when the computer program is executed by the processor.
CN202110605422.1A 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium Active CN113347034B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110605422.1A CN113347034B (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium
CN202211254936.8A CN115567380A (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110605422.1A CN113347034B (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202211254936.8A Division CN115567380A (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium

Publications (2)

Publication Number Publication Date
CN113347034A CN113347034A (en) 2021-09-03
CN113347034B true CN113347034B (en) 2023-04-07

Family

ID=77473606

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202211254936.8A Pending CN115567380A (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium
CN202110605422.1A Active CN113347034B (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202211254936.8A Pending CN115567380A (en) 2021-05-31 2021-05-31 Device processing method and device, authentication method and device, and storage medium

Country Status (1)

Country Link
CN (2) CN115567380A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587018A (en) * 2018-12-06 2019-04-05 深圳绿米联创科技有限公司 Method, apparatus, network system and the mobile terminal of device configuration

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102005771B1 (en) * 2012-02-24 2019-10-01 삼성전자주식회사 Method and apparatus for providing ip address in wireless communication network
CN105049495B (en) * 2015-06-29 2018-10-02 广州酷狗计算机科技有限公司 Method for discovering equipment, apparatus and system
CN108259215B (en) * 2017-09-26 2021-05-28 新华三技术有限公司 Equipment management method and device
TWI651978B (en) * 2017-09-27 2019-02-21 神準科技股份有限公司 Communication system and communication method
CN107682202B (en) * 2017-10-26 2021-03-02 新华三技术有限公司 Network equipment management method and device
CN108848200A (en) * 2018-06-13 2018-11-20 郑州云海信息技术有限公司 Equipment adding method, device, equipment and medium in a kind of local area network
CN112187751A (en) * 2020-09-17 2021-01-05 海尔优家智能科技(北京)有限公司 Network access method and device for equipment, storage medium and electronic device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587018A (en) * 2018-12-06 2019-04-05 深圳绿米联创科技有限公司 Method, apparatus, network system and the mobile terminal of device configuration

Also Published As

Publication number Publication date
CN115567380A (en) 2023-01-03
CN113347034A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
US11431670B2 (en) Method for processing cloud service in cloud system, apparatus, and device
US11350286B2 (en) Device identifier obtaining method and apparatus
CN110730153B (en) Account configuration method, device and system of cloud equipment and data processing method
CN106656547B (en) Method and device for updating network configuration of household electrical appliance
RU2115249C1 (en) Method of ether returning of many communication groups by key
CN112019503B (en) Method for obtaining equipment identifier, communication entity, communication system and storage medium
US11917399B2 (en) Zero-touch deployment (ZTD) of cellular IoT devices and associated trust model
CN112737902B (en) Network configuration method and device, storage medium and electronic equipment
KR20190051326A (en) Internet Of Things Device Control System and Method Based On Block Chain
CN104105096A (en) Wireless access method of internet protocol camera (IPC) devices
CN111194035B (en) Network connection method, device and storage medium
CN105007164A (en) Centralized safety control method and device
CN104662839A (en) Linked identifiers for multiple domains
CN112466053B (en) Control system of household appliance and execution method and device of target operation
CN113613227A (en) Data transmission method and device of Bluetooth equipment, storage medium and electronic device
CN113347034B (en) Device processing method and device, authentication method and device, and storage medium
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN109451497B (en) Wireless network connection method and device, electronic equipment and storage medium
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
CN114221822B (en) Distribution network method, gateway device and computer readable storage medium
CN113660645B (en) Device configuration method and device, electronic device and storage medium
CN104468194A (en) Network device compatible method and forwarding server
CN110930546B (en) Information processing method, device and system, storage medium and processor
CN109379444B (en) Method and system for providing private cloud service based on automatic adaptation
US20140362734A1 (en) Method for setting up a star-shaped communication network consisting of a central node and peripheral nodes via a web application provided by the central node on the basis of hardware identifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant