CN113938316A - Distributed node control response method based on dynamic password - Google Patents
Distributed node control response method based on dynamic password Download PDFInfo
- Publication number
- CN113938316A CN113938316A CN202111421310.7A CN202111421310A CN113938316A CN 113938316 A CN113938316 A CN 113938316A CN 202111421310 A CN202111421310 A CN 202111421310A CN 113938316 A CN113938316 A CN 113938316A
- Authority
- CN
- China
- Prior art keywords
- control
- node
- dynamic password
- item
- control item
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
Abstract
The invention relates to a distributed node control response method based on a dynamic password, which constructs a control corresponding flow between a control node and a controlled node, and simultaneously combines the information with the dynamic password in the process that the control node in the response flow sends a control data packet to the controlled node and the controlled node sends a control response data packet to the control node, thereby solving the problem of information consistency between the control node and the controlled node and improving the reliability of system control response. Meanwhile, the invention provides a method for constructing the dynamic password, which realizes the construction of the dynamic password by combining the secret key and the time, so that the dynamic password is more complex and has no repeatability, and the difficulty is higher when the outside wants to crack the dynamic password.
Description
Technical Field
The invention belongs to the technical field of computer application, and particularly relates to a distributed node control response method based on a dynamic password.
Background
Along with the increase of system functions and the improvement of performance, the complexity of equipment composition in the system is obviously improved, and the functions and responsibilities of the equipment are clearly divided according to the design idea of high cohesion and low coupling. For a large-scale system, the control response flow among the devices has large stock in the system, and from the control response perspective, the devices in the system can be classified into two types according to roles: "control node", "controlled node". The control node is generally in the form of: centralized control console, regional control console, control terminal, etc.; the controlled node is generally in the form of: sensor, caliber, controller. In order to improve efficiency and make automatic decisions, control nodes and controlled nodes in a large-scale system are usually in a separated and distributed state, and in order to improve the overall reliability and usability of the system, a control response method needs to be designed to solve the problem of distributed node control response in the large-scale system.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a distributed node control response method based on a dynamic password.
The technical problem to be solved by the invention is realized by adopting the following technical scheme:
a distributed node control response method based on dynamic passwords comprises the following steps:
step 1: the control node generates a dynamic password;
step 2: the control node generates a control item;
and step 3: the control node packages the control item generated in the step 2 and the generated dynamic password generated in the step 1 into a control data packet;
and 4, step 4: the control node sends a control data packet to the controlled node;
and 5: the controlled node receives the control data packet sent by the control node in the step 4 and then processes the control data packet to separate out a control item and a dynamic password;
step 6: the controlled node executes the control item and responds according to the control item;
and 7: the controlled node generates a control item response state according to the execution result;
and 8: the controlled node packages the response state of the control item in the step 7 and the dynamic password separated in the step 5 into a control response data packet;
and step 9: the controlled node sends a control response data packet to the control node;
step 10: the control node receives the data packet sent by the controlled node in the step 9, and separates the response state of the control item and the dynamic password;
step 11: and the control node checks the control response state of the controlled node by combining the dynamic password, the control item and the control item response state.
Moreover, the specific implementation method for generating the dynamic password in step 1 is as follows:
step 1.1: generating a secret key K and acquiring the current time T;
step 1.2: performing XOR processing on the key K generated in the step 1.1 and the key 36363636H to generate S1;
step 1.3: calculating the current time T-T0, wherein T0 is the time of step 1 for generating the dynamic password;
step 1.4: splicing S1 generated in the step 1.2 with the current time T-T0 obtained in the step 1.3, and generating H through an MD5 algorithm;
step 1.5: performing XOR processing on the key K generated in the step 1.1 and 5C5C5C5CH to generate S2;
step 1.6: s2 generated in step 1.5 is spliced with H generated in step 1.4, and a dynamic password is generated through an MD5 algorithm.
Furthermore, the information format of the control data packet in step 4 is: the method comprises the following steps of dynamic passwords, a control item 1 parameter 1, a control item 1 parameter 2, a control item 1 parameter m, a control item 2 parameter 1, a control item 2 parameter 2, a control item 2 parameter m, a control item n parameter 1, a control item n parameter 2 and a control item n parameter m, wherein n is the number of control items, and m is the number of parameters of each control item.
Furthermore, the information format of the control response packet in step 9 is: the dynamic password, the control item 1 control response state, the control item 2 control response state and the control item n control response state, wherein n is the number of the control items.
Further, the control response state includes: has been executed according to control requirements and cannot be executed according to requirements.
The invention has the advantages and positive effects that:
the invention constructs the corresponding control flow between the control node and the controlled node, and simultaneously, the control node in the response flow sends a control data packet to the controlled node and the controlled node sends a control response data packet to the control node, and the information consistency between the control node and the controlled node is realized by combining the information with the dynamic password, thereby improving the reliability of the control response of the system.
The invention also provides a method for constructing the dynamic password, which realizes the construction of the dynamic password by combining the secret key and the time, so that the dynamic password is more complex and has no repeatability, and the difficulty is higher when the outside wants to crack the dynamic password.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a flow chart of dynamic password generation of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
A distributed node control response method based on dynamic password, as shown in fig. 1, includes the following steps:
step 1: the control node generates a dynamic password for the single control item.
As shown in fig. 2, this step includes the following substeps:
step 1.1: a key K is generated and the current time T is obtained.
Step 1.2: and XOR processing is carried out on the key K generated in the step 1.1 and the key 36363636H to generate S1.
Step 1.3: the current time T-T0 is calculated, where T0 is the time at which the dynamic password was generated in step 1.
Step 1.4: s1 resulting from step 1.2 is concatenated with the current time of arrival T-T0 of step 1.3 and H is generated by the MD5 algorithm.
Step 1.5: and XOR processing is carried out on the key K generated in the step 1.1 and the 5C5C5C5CH, and S2 is generated.
Step 1.6: s2 generated in step 1.5 is spliced with H generated in step 1.4, and a dynamic password is generated through an MD5 algorithm.
Step 2: the control node generates a control item.
And step 3: and the control node encapsulates the control item generated in the step 2 and the generated dynamic password generated in the step 1 into a control data packet.
And 4, step 4: and the control node sends a control data packet to the controlled node.
The information exchange format of the control packet is shown in table 1:
TABLE 1 control Command information exchange Format
Wherein n is the number of control items, and m is the number of parameters of each control item.
And 5: and (4) the controlled node receives the control data packet sent by the control node in the step (4) and then processes the control data packet to separate out a control item and a dynamic password.
Step 6: the controlled node executes the control item and responds according to the control item.
And 7: and the controlled node generates a control item response state according to the execution result.
And 8: the controlled node encapsulates the control item response state of step 7 and the dynamic password separated from step 5 into a control response data packet.
The information exchange format of the control packet is shown in table 2:
table 2 control command response message exchange format
Wherein the control response state is shown in table 3:
table 3 control response state enumeration
Serial number | Controlling a |
1 | Has been executed according to the control requirement |
2 | Can not be executed according to the requirement |
And step 9: and the controlled node sends a control response data packet to the control node.
Step 10: and the control node receives the data packet sent by the controlled node in the step 9, and separates the response state of the control item from the dynamic password.
Step 11: and the control node checks the control response state of the controlled node by combining the dynamic password, the control item and the control item response state.
The information exchange format of the control data packet in the step 4 and the information exchange format of the control data packet in the step 9 are suitable for various information transmission modes, and the dynamic password and the control item quantity can be segmented according to the length limit of the application layer protocol data segment in the specific adaptation process.
It should be emphasized that the embodiments described herein are illustrative rather than restrictive, and thus the present invention is not limited to the embodiments described in the detailed description, but also includes other embodiments that can be derived from the technical solutions of the present invention by those skilled in the art.
Claims (5)
1. A distributed node control response method based on dynamic passwords is characterized in that: the method comprises the following steps:
step 1: the control node generates a dynamic password;
step 2: the control node generates a control item;
and step 3: the control node packages the control item generated in the step 2 and the generated dynamic password generated in the step 1 into a control data packet;
and 4, step 4: the control node sends a control data packet to the controlled node;
and 5: the controlled node receives the control data packet sent by the control node in the step 4 and then processes the control data packet to separate out a control item and a dynamic password;
step 6: the controlled node executes the control item and responds according to the control item;
and 7: the controlled node generates a control item response state according to the execution result;
and 8: the controlled node packages the response state of the control item in the step 7 and the dynamic password separated in the step 5 into a control response data packet;
and step 9: the controlled node sends a control response data packet to the control node;
step 10: the control node receives the data packet sent by the controlled node in the step 9, and separates the response state of the control item and the dynamic password;
step 11: and the control node checks the control response state of the controlled node by combining the dynamic password, the control item and the control item response state.
2. The distributed node control response method based on dynamic passwords according to claim 1, characterized in that: the specific implementation method for generating the dynamic password in the step 1 is as follows:
step 1.1: generating a secret key K and acquiring the current time T;
step 1.2: performing XOR processing on the key K generated in the step 1.1 and the key 36363636H to generate S1;
step 1.3: calculating the current time T-T0, wherein T0 is the time of step 1 for generating the dynamic password;
step 1.4: splicing S1 generated in the step 1.2 with the current time T-T0 obtained in the step 1.3, and generating H through an MD5 algorithm;
step 1.5: performing XOR processing on the key K generated in the step 1.1 and 5C5C5C5CH to generate S2;
step 1.6: s2 generated in step 1.5 is spliced with H generated in step 1.4, and a dynamic password is generated through an MD5 algorithm.
3. The distributed node control response method based on dynamic passwords according to claim 1, characterized in that: the information format of the control data packet in the step 4 is as follows: the method comprises the following steps of dynamic passwords, a control item 1 parameter 1, a control item 1 parameter 2, a control item 1 parameter m, a control item 2 parameter 1, a control item 2 parameter 2, a control item 2 parameter m, a control item n parameter 1, a control item n parameter 2 and a control item n parameter m, wherein n is the number of control items, and m is the number of parameters of each control item.
4. The distributed node control response method based on dynamic passwords according to claim 1, characterized in that: the information format of the control response packet in step 9 is: the dynamic password, the control item 1 control response state, the control item 2 control response state and the control item n control response state, wherein n is the number of the control items.
5. The distributed node control response method based on dynamic passwords according to claim 4, characterized in that: the control response state includes: has been executed according to control requirements and cannot be executed according to requirements.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111421310.7A CN113938316A (en) | 2021-11-26 | 2021-11-26 | Distributed node control response method based on dynamic password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111421310.7A CN113938316A (en) | 2021-11-26 | 2021-11-26 | Distributed node control response method based on dynamic password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113938316A true CN113938316A (en) | 2022-01-14 |
Family
ID=79288432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111421310.7A Pending CN113938316A (en) | 2021-11-26 | 2021-11-26 | Distributed node control response method based on dynamic password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113938316A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902482A (en) * | 2010-08-23 | 2010-12-01 | 中国电信股份有限公司 | Method and system for realizing terminal security admission control based on IPv6 (Internet Protocol Version 6) automatic configuration |
CN103501228A (en) * | 2013-08-01 | 2014-01-08 | 沈阳华矿新能源装备科技有限公司 | Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction |
JP2014225813A (en) * | 2013-05-17 | 2014-12-04 | 株式会社日立産機システム | Communication system, communication device and communication method |
CN104410498A (en) * | 2014-12-03 | 2015-03-11 | 上海众人科技有限公司 | Dynamic password authentication method and system |
CN106878114A (en) * | 2015-12-11 | 2017-06-20 | 北京数码视讯科技股份有限公司 | A kind of method of data transfer, server and terminal |
CN109389386A (en) * | 2018-09-13 | 2019-02-26 | 阿里巴巴集团控股有限公司 | A kind of barcode scanning control method, apparatus and system |
CN111740949A (en) * | 2020-05-13 | 2020-10-02 | 北京理工大学 | Robot system encryption control method, equipment and storage medium |
CN112261648A (en) * | 2020-10-15 | 2021-01-22 | 中山智联未来科技有限公司 | Intelligent household system, intelligent household wireless communication encryption method and system |
-
2021
- 2021-11-26 CN CN202111421310.7A patent/CN113938316A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902482A (en) * | 2010-08-23 | 2010-12-01 | 中国电信股份有限公司 | Method and system for realizing terminal security admission control based on IPv6 (Internet Protocol Version 6) automatic configuration |
JP2014225813A (en) * | 2013-05-17 | 2014-12-04 | 株式会社日立産機システム | Communication system, communication device and communication method |
CN103501228A (en) * | 2013-08-01 | 2014-01-08 | 沈阳华矿新能源装备科技有限公司 | Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction |
CN104410498A (en) * | 2014-12-03 | 2015-03-11 | 上海众人科技有限公司 | Dynamic password authentication method and system |
CN106878114A (en) * | 2015-12-11 | 2017-06-20 | 北京数码视讯科技股份有限公司 | A kind of method of data transfer, server and terminal |
CN109389386A (en) * | 2018-09-13 | 2019-02-26 | 阿里巴巴集团控股有限公司 | A kind of barcode scanning control method, apparatus and system |
CN111740949A (en) * | 2020-05-13 | 2020-10-02 | 北京理工大学 | Robot system encryption control method, equipment and storage medium |
CN112261648A (en) * | 2020-10-15 | 2021-01-22 | 中山智联未来科技有限公司 | Intelligent household system, intelligent household wireless communication encryption method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103001843B (en) | Based on the OPC protocol converter of embedded VxWorks | |
CN105245593A (en) | Software defined network (SDN) controlling system, method and device | |
CN107817703B (en) | A method of realizing that Industry Control host computer controls slave computer | |
CN103631873B (en) | A kind of data compression method and storage system | |
CN101478418A (en) | Internet dating system and method | |
CN101465839B (en) | Transmission control method and apparatus for serial data | |
WO2019079971A1 (en) | Method for group communication, and apparatus, computer storage medium, and computer device | |
EP2480013A1 (en) | Method and system for realizing application of machine-to-machine/man terminal based on groups | |
CN113938316A (en) | Distributed node control response method based on dynamic password | |
CN104125150A (en) | Protocol message processing method, device and system | |
CN106990913B (en) | A kind of distributed approach of extensive streaming collective data | |
CN103368944A (en) | Memory shared network architecture and protocol specifications for same | |
CN102710528B (en) | Terminal and method for adjusting sockets in terminal | |
WO2022042545A1 (en) | Tsn industrial application server, client, system, service method, and storage medium | |
CN106506590B (en) | Cloud terminal number control method and system based on cloud desktop | |
CN105843706B (en) | A kind of Dynamic Packet system based on MPI high-performance calculation layering rollback and recovery agreement | |
CN107229525A (en) | A kind of power system device model keyword generation method based on Zookeeper | |
WO2022166200A1 (en) | Smart home control system | |
CN114363988A (en) | Clustering method and device and electronic equipment | |
CN102624617B (en) | Data exchange system and data exchange method | |
CN112180883A (en) | Industrial equipment management method and Internet of things management platform | |
CN117376352B (en) | Block chain-based Internet of things system | |
CN111585944A (en) | Communication fusion data transmission system | |
CN204087203U (en) | Telecommunication circuit between multiple ARM | |
CN215222499U (en) | Device for computer group operation management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |