CN115348107A - Internet of things equipment secure login method and device, computer equipment and storage medium - Google Patents

Internet of things equipment secure login method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN115348107A
CN115348107A CN202211060389.XA CN202211060389A CN115348107A CN 115348107 A CN115348107 A CN 115348107A CN 202211060389 A CN202211060389 A CN 202211060389A CN 115348107 A CN115348107 A CN 115348107A
Authority
CN
China
Prior art keywords
internet
equipment
things
authentication information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211060389.XA
Other languages
Chinese (zh)
Inventor
李树彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Oribo Technology Co Ltd
Original Assignee
Shenzhen Oribo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Oribo Technology Co Ltd filed Critical Shenzhen Oribo Technology Co Ltd
Priority to CN202211060389.XA priority Critical patent/CN115348107A/en
Publication of CN115348107A publication Critical patent/CN115348107A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The application relates to a method and a device for safe login of Internet of things equipment, computer equipment and a storage medium. The method comprises the following steps: the method comprises the steps that target encrypted data are returned to the Internet of things equipment in response to an equipment login request sent by the Internet of things equipment; receiving a decryption result obtained by decrypting the target encrypted data, which is returned by the Internet of things equipment, and informing the Internet of things equipment of successful decryption under the condition that the decryption is determined to be successful based on the decryption result; receiving authentication information and random numbers sent by the Internet of things equipment under the condition of successful decryption; the random number is generated by the Internet of things equipment; and verifying the authentication information based on the random number, and allowing the Internet of things equipment to log in the server under the condition that the authentication is passed. By adopting the method, the login safety of the Internet of things equipment can be improved.

Description

Internet of things equipment secure login method and device, computer equipment and storage medium
Technical Field
The application relates to the technical field of communication, in particular to a method and a device for safe login of Internet of things equipment, computer equipment and a storage medium.
Background
With the progress of the internet of things technology, scenes of applying internet of things equipment to smart homes are increasing day by day, and in many application scenes, the internet of things equipment generally needs to log in a server. In order to improve the security of login, the server generally needs to verify the identity of the internet of things device.
In the conventional technology, in order to improve the security of login, a password and an Identity (Identity) number of the internet of things device are usually verified, and the internet of things device is allowed to log in the server after the password and the Identity number are verified.
However, the method of simply verifying the password and the device ID of the internet of things device cannot ensure the login security of the internet of things device, so that the login security of the internet of things device needs to be improved.
Disclosure of Invention
Therefore, it is necessary to provide a method, an apparatus, a computer device, and a storage medium for secure login of an internet of things device, which can improve the security of login of the internet of things device.
In a first aspect, the application provides a method for safely logging in equipment of the internet of things. The method comprises the following steps: in response to a device login request sent by the internet of things device, returning target encrypted data to the Internet of things equipment; receiving a decryption result obtained by decrypting the target encrypted data and returned by the Internet of things equipment, and notifying the Internet of things equipment that decryption is successful under the condition that the decryption is determined to be successful based on the decryption result; <xnotran> , ; </xnotran> The random number is generated by the Internet of things device; and verifying the authentication information based on the random number, and allowing the Internet of things equipment to log in a server under the condition that the authentication is passed.
In a second aspect, the application further provides a device for safely logging in the internet of things device. The device the method comprises the following steps: the encrypted data returning module is used for responding to an equipment login request sent by the Internet of things equipment and returning target encrypted data to the Internet of things equipment; the decryption result confirmation module is used for receiving a decryption result obtained by decrypting the target encrypted data and returned by the Internet of things equipment, and notifying the Internet of things equipment that decryption is successful under the condition that the decryption is determined to be successful based on the decryption result; the authentication information receiving module is used for receiving the authentication information and the random number sent by the Internet of things equipment under the condition of successful decryption; the random number is formed by the equipment of the Internet of things is generated; and the equipment login verification module is used for verifying the authentication information based on the random number and allowing the Internet of things equipment to log in the server under the condition that the authentication is passed.
In some embodiments, the target encrypted data is data obtained by encrypting preset data by using a preset encryption key; and under the condition that a preset decryption key corresponding to the preset encryption key is stored in the internet of things equipment, the internet of things equipment decrypts the received target encrypted data by using the preset decryption key to obtain a decryption result, and sends the decryption result to the server.
In some embodiments, the authentication information sent by the internet of things device is first authentication information, the first authentication information is obtained by encrypting a device password pre-stored in the internet of things device by the internet of things device through the random number; the device login authentication module is further configured to: searching the equipment password of the Internet of things equipment from prestored equipment passwords; using the random number pair to find the device password of (a) is encrypted, generating second authentication information; and allowing the Internet of things equipment to log in the server under the condition that the first authentication information is consistent with the second authentication information.
In some embodiments, the first authentication information is information obtained by encrypting, by the internet of things device, a device password and device identity information that are pre-stored in the internet of things device by using the random number; the device logs in the verification module is further to: receiving equipment identity information sent by the Internet of things equipment, and searching the equipment password of the Internet of things equipment from the pre-stored equipment password by using the equipment identity information; the encrypting the found device password by using the random number and generating second authentication information include: and encrypting the searched equipment password and the equipment identity information by using the random number to generate the second authentication information.
In some embodiments, the device login authentication module is further to: splicing the random number with the searched equipment password, generating splicing information; and encrypting the splicing information to generate the second authentication information.
In some embodiments, the device login authentication module is further to: encrypting the splicing information by using a first encryption mode to obtain first encryption information; and encrypting the first encryption information by using a second encryption mode, and determining an encryption result as the second authentication information.
In some embodiments, the server stores, in advance, identification numbers corresponding to a plurality of internet of things devices; in the equipment login request carrying the identification number; the encrypted data return module is further configured to: responding to an equipment login request sent by equipment of the Internet of things, and extracting an identity identification number from the equipment login request; and under the condition that the extracted identification number belongs to the identification number pre-stored in the server, returning target encrypted data to the Internet of things equipment.
In a third aspect, the present application also provides a computer device. The computer equipment comprises a memory and a processor, wherein the memory stores computer programs, and the processor executes the computer programs to realize the steps of the safe login method of the equipment of the Internet of things.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer readable storage medium stores thereon a computer program, and the computer program, when executed by a processor, implements the steps in the method for secure login of the internet of things device.
In a fifth aspect, the present application further provides a computer program product. The computer program product comprises a computer program, and the computer program realizes the steps of the safe login method of the equipment of the Internet of things when being executed by a processor.
According to the safe login method and device for the Internet of things equipment, the computer equipment and the storage medium, the target encrypted data are returned to the Internet of things equipment in response to an equipment login request sent by the Internet of things equipment, the decryption result obtained by decrypting the target encrypted data returned by the Internet of things equipment is received, the Internet of things equipment is informed of successful decryption under the condition that the decryption result is determined to be successful, the authentication information and the random number sent by the Internet of things equipment are received under the condition that the decryption is successful, the random number is generated by the Internet of things equipment, the authentication information is verified based on the random number, and the Internet of things equipment is allowed to login the server under the condition that the authentication is passed. The technical scheme make the thing networking equipment decipher the target encrypted data by returning the target encrypted data to the thing networking equipment, thereby accomplish the equipment self-check of thing networking equipment, under the condition that the deciphering result is confirmed to be correct, the authentication information that the thing networking equipment sent is verified based on the random number, under the condition that the authentication passes, the thing networking equipment is allowed to log in the server, thereby verify equipment logging through equipment self-check and authentication information, the condition that the illegal equipment pretends to be the thing networking equipment and logs in the server is reduced, thereby the safety of the thing networking equipment logging is improved.
Drawings
Fig. 1 is an application environment diagram of a secure login method for an internet of things device in an embodiment;
FIG. 2 shows an embodiment of an Internet of things device a flow schematic diagram of a secure login method;
fig. 3 is a schematic flowchart of a secure login method for an internet of things device in an embodiment;
fig. 4 is a schematic flow chart of a secure login method for an internet of things device in another embodiment;
fig. 5 is a block diagram of a secure login device of an internet of things device in one embodiment;
FIG. 6 is a diagram illustrating an internal structure of a computer device according to an embodiment;
FIG. 7 shows the calculation in one embodiment the internal structure of the machine equipment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The safe login method for the Internet of things equipment provided by the embodiment of the application can be applied to the application environment shown in the figure 1. The server 104 communicates with the internet of things device 102 and the terminal 106 through a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be placed on the cloud or other network server. The server 104 may be a server to which a production test system platform belongs, and the production test system is configured to enter device information into the internet of things device 102.
Specifically, the server 104 returns target encrypted data to the internet of things device 102 in response to a device login request sent by the internet of things device 102, receives a decryption result obtained by decrypting the target encrypted data returned by the internet of things device 102, notifies the internet of things device 102 that decryption is successful when decryption is determined to be successful based on the decryption result, receives authentication information and a random number sent by the internet of things device 102 when decryption is successful, verifies the authentication information based on the random number, and allows the internet of things device 102 to log in the server when verification is passed.
The internet of things device 102 may decrypt the targeted encrypted data sent by the server 104, the decryption result is sent to the server 104. In case of successful decryption, the internet of things device 102 generates a random number, generates authentication information based on the random number, and sends the authentication information and the random number to the server 104.
After receiving the message that the internet of things device successfully logs in the server, the terminal 106 may send an internet of things device control instruction to the server 104 to control the internet of things device 102, for example, when the internet of things device 102 is an intelligent air conditioner, the terminal 106 sends an opening instruction of the intelligent air conditioner to the server 104, and the server 104 sends the opening instruction to the intelligent air conditioner in response to the opening instruction of the intelligent air conditioner to control to open the intelligent air conditioner.
The internet of things device 102 may be various smart homes, for example, a smart refrigerator, a smart printer, a smart air conditioner, a smart speaker, a smart television, a smart floor sweeping robot, a smart curtain, a smart door lock, a smart lamp, a smart gateway, a smart control panel, a smart switch, and the like. The server 104 may be implemented by an independent server or a server cluster composed of a plurality of servers, and may also be implemented by a cloud server that provides basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, network service, cloud communication, security service, and a big data and artificial intelligence platform. The terminal 106 may be, but is not limited to, a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, a smart watch, and the like. The server 104 and the internet of things device 102 and the terminal 106 may further communicate through a communication unit, which includes but is not limited to at least one of a WIFI communication unit, a bluetooth communication unit or a 4G/5G communication unit.
Those skilled in the art will understand that the application environment shown in fig. 1 is only a part of the scenario related to the present application, and does not constitute a limitation to the application environment of the present application.
In some embodiments, as shown in fig. 2, a method for secure login of an internet of things device is provided, which is described by taking the method as an example when the method is applied to the server 104 in fig. 1, and includes the following steps:
step 202, in response to an equipment login request sent by the internet of things equipment, returning target encrypted data to the internet of things equipment.
The device login request is request information of the internet of things device for logging in the server, the device login request comprises at least one of device information or a communication secret key of the internet of things device, the device information is related information of the internet of things device and comprises at least one of an identity number, a device password or a model Identification of the internet of things device, the identity number is used for uniquely identifying the internet of things device and can be a randomly generated number or letter number, and the identity number is also called as a device ID or UID (User Identification). The device password is the password used by the device to log in to the server, the device password may be a password generated based on an identification number, and is also referred to as secretekey. The identity identification numbers correspond to the equipment passwords one by one, each identity identification number corresponds to one equipment password, and each identity identification number is unique. The model identification is used for identifying the equipment type of the equipment of the Internet of things, the model identification is also called a model ID, the equipment type refers to the type of the equipment of the Internet of things, for example, the equipment type can be at least one of an intelligent gateway, an intelligent control panel, an intelligent switch, an intelligent refrigerator, an intelligent printer, an intelligent air conditioner, an intelligent sound box, an intelligent television, an intelligent floor sweeping robot, an intelligent curtain, an intelligent door lock or an intelligent lamp, and when the equipment type of the equipment of the Internet of things is the intelligent refrigerator, the model identification can be represented by BX 001. The communication key is used for encrypted communication between the Internet of things equipment and the server and can be stored in the Internet of things equipment in advance.
The target encrypted data refers to encrypted data generated by the server according to a preset encryption rule after receiving the equipment login request. The preset encryption rule is an encryption rule pre-stored in the server, the server can encrypt the data by using the preset encryption rule, and the preset encryption rule may be a symmetric encryption, for example, an ASE encryption rule, or an asymmetric encryption, for example, an RSA encryption rule. The preset encryption rule corresponds to a preset decryption rule, the preset decryption rule is a decryption rule pre-stored in the internet of things equipment, and the internet of things equipment can decrypt the target encrypted data by using the preset decryption rule.
Specifically, before the internet of things equipment logs in the server, the server receives an equipment login request sent by the internet of things equipment, acquires equipment information of the internet of things equipment in the equipment login request, confirms whether the internet of things equipment meets the equipment self-checking requirement or not based on the equipment information, and refuses equipment login under the condition that the internet of things equipment does not meet the equipment self-checking requirement; and under the condition that the equipment of the Internet of things meets the self-checking requirement of the equipment, the server generates target encryption data according to a preset encryption rule and sends the target encryption data to the equipment of the Internet of things. The equipment self-checking requirement is an inspection requirement for equipment information of the equipment of the Internet of things.
In some embodiments, when the internet of things device is connected to the server, the server requests the communication key, the server responds to the request and sends the communication key to the internet of things device, and after the internet of things device acquires the communication key, the internet of things device can normally communicate with the server. The communication key is used for encrypted communication between the Internet of things equipment and the server, the communication key can be dynamically generated by the server, the communication key needs to be acquired firstly when the Internet of things equipment is connected with the server every time, and the acquired communication key is different every time.
And 204, receiving a decryption result obtained by decrypting the target encrypted data, which is returned by the internet of things equipment, and informing the internet of things equipment of successful decryption under the condition that the decryption is determined to be successful based on the decryption result.
And the decryption result is data obtained by analyzing the target encrypted data by the Internet of things equipment according to a preset decryption rule. The preset encryption rule is an encryption rule pre-stored in the server, the server can encrypt the data by using the preset encryption rule, and the preset encryption rule may be a symmetric encryption, for example, an ASE encryption rule, or an asymmetric encryption, for example, an RSA encryption rule. The preset encryption rule corresponds to a preset decryption rule which is a decryption rule pre-stored in the Internet of things equipment, the internet of things equipment can decrypt the target encrypted data by using a preset decryption rule.
Specifically, the server receives a decryption result obtained by analyzing the target encrypted data returned by the internet of things device, and judges whether the internet of things device is successfully decrypted based on the decryption result, for example, the server compares the decryption result with unencrypted data corresponding to the target encrypted data, determines that the internet of things device is successfully decrypted when the comparison is consistent, and sends a message to the internet of things device to inform the internet of things device of successful decryption; and under the condition of inconsistent comparison, determining that the decryption of the Internet of things equipment fails, sending a message to the Internet of things equipment, and informing the Internet of things equipment of the decryption failure.
In some embodiments, the internet of things device stores a preset decryption rule corresponding to the preset encryption rule, and after receiving target encrypted data sent by the server, the internet of things device analyzes the target encrypted data according to the preset decryption rule to obtain a decryption result corresponding to the target encrypted data, and then sends the decryption result to the server.
In some embodiments, the server starts timing from the moment when the target encrypted data is sent, and if a decryption result returned by the internet of things device is not received within a preset time interval, it is determined that the decryption of the internet of things device fails, and a message is sent to the internet of things device to notify the internet of things device that the decryption fails. The preset time interval is the time interval at which the server receives the decryption result returned by the internet of things device, and the time interval can be preset or can be calculated by the server according to a certain rule after statistics is carried out based on the historical time interval.
Step 206, receiving authentication information and a random number sent by the internet of things equipment under the condition of successful decryption; the random number is generated by the internet of things device.
The authentication information is information for verifying whether the internet of things equipment has the right to log in the server, and is also called an authentication signature. The random number is a randomly generated number and is generated by the internet of things device.
Specifically, after the server informs the internet of things device that the decryption of the target encrypted data is successful, the internet of things device generates a random number, generates authentication information based on the random number and the device information, and then sends the authentication information and the random number to the server. And the server receives the authentication information and the random number sent by the equipment of the Internet of things and verifies the authentication information.
In some embodiments, the server refuses login of the internet of things device in case of decryption failure, sends a message to the internet of things device to notify the internet of things device of decryption failure, and the internet of things device cannot perform the operation steps of generating the random number and the authentication information after receiving the message of decryption failure.
In some embodiments, the random number generated by the internet of things device has a validity period, for example, the internet of things device generates the random number for the first time, and starts timing from the time of generating the random number until the time when the internet of things device logs in the server for the second time, if the time period is less than the validity period, the random number is valid, the internet of things device may generate authentication information using the random number and send the authentication information to the server, and if the time period is greater than the validity period, the random number is invalid, and the internet of things device generates a new random number.
In some embodiments, each time the internet of things device logs in the server, a random number is generated, that is, the random number generated each time is only valid when logging in the server this time, and a new random number needs to be generated when the internet of things device logs in the server again.
And 208, verifying the authentication information based on the random number, and allowing the Internet of things equipment to log in the server under the condition that the authentication is passed.
Specifically, after receiving the random number and the authentication information sent by the internet of things device, the server generates encryption information based on the received random number and the device information. The equipment information is sent to the server by the Internet of things equipment, the encrypted information is used for verifying the authentication information, the encrypted information is compared with the authentication information, if the encrypted information is consistent with the authentication information, the verification is passed, and the server allows the Internet of things equipment to log in; if the encrypted information is inconsistent with the authentication information, the verification is not passed, and the server does not allow the Internet of things equipment to log in.
In some embodiments, the server and the internet of things device each store device information, where the device information includes at least one of an identity number, a device password, a model identifier, and the like of the internet of things device, as shown in fig. 3, in a production test stage, the device information is generated by a data background of a production test system, and before the internet of things device leaves a factory, the production test system is used to burn the device information into the corresponding internet of things device. After the burning of the equipment information is finished, the production testing system informs a background to mark the equipment information, the uniqueness of the identification number and the equipment password in the equipment information is ensured, and then the equipment information is stored in the server.
In the safe login method for the Internet of things equipment, target encrypted data are returned to the Internet of things equipment in response to an equipment login request sent by the Internet of things equipment, a decryption result obtained by decrypting the target encrypted data and returned by the Internet of things equipment is received, the Internet of things equipment is informed of successful decryption under the condition that the decryption result is determined to be successful, authentication information and a random number sent by the Internet of things equipment are received under the condition that the decryption is successful, the random number is generated by the Internet of things equipment, the authentication information is verified on the basis of the random number, and the Internet of things equipment is allowed to log in a server under the condition that the authentication is passed. The target encrypted data are returned to the Internet of things equipment, so that the Internet of things equipment decrypts the target encrypted data, equipment self-check of the Internet of things equipment is completed, authentication information sent by the Internet of things equipment is verified based on the random number under the condition that a decryption result is determined to be correct, the Internet of things equipment is allowed to log in the server under the condition that the authentication is passed, equipment login is verified through the equipment self-check and the authentication information, the condition that illegal equipment falsely serves as the Internet of things equipment to log in the server is reduced, and login safety of the Internet of things equipment is improved.
In one embodiment, the target encrypted data is data obtained by encrypting preset data by using a preset encryption key; under the condition that a preset decryption key corresponding to the preset encryption key is stored in the Internet of things equipment, the Internet of things equipment decrypts the received target encryption data by using the preset decryption key to obtain a decryption result, and sends the decryption result to the server.
The preset encryption key is a key used for encrypting preset data in a preset encryption rule and is stored in the server. The preset encryption key corresponds to a preset decryption key, and the preset decryption key is a key used for decrypting the target encryption data in a preset decryption rule and is stored in the Internet of things equipment. The preset data is factory data of the Internet of things equipment and is stored in the server in advance. The factory data is related data of the internet of things device at the factory, for example, the factory data may be factory time or manufacturer information of the internet of things device.
Specifically, the internet of things equipment receives target encrypted data sent by the server, and decrypts the received target encrypted data by using the preset decryption key under the condition that the preset decryption key corresponding to the preset encryption key is stored in the internet of things equipment, so as to obtain a decryption result, and sends the decryption result to the server.
In some embodiments, when the preset decryption key corresponding to the preset encryption key is not stored in the internet of things device, the internet of things device cannot decrypt the received target encrypted data, cannot generate a decryption result, and sends the decryption result to the server. The server does not receive the decryption result sent by the Internet of things equipment and informs the Internet of things equipment that decryption fails.
In some embodiments, the preset encryption key is the same as the preset decryption key, the same key is stored in advance in the server and the internet of things device respectively, the server encrypts the preset data by using the key to obtain the target encrypted data, and sends the target encrypted data to the internet of things device, and the internet of things device decrypts the target encrypted data by using the same key, that is, the target encrypted data is restored to the preset data to obtain a decryption result, and the decryption result is sent to the server.
In some embodiments, the predetermined encryption key is different from the predetermined decryption key, and the predetermined encryption key and the predetermined decryption key are public key and private key. For example, the preset encryption key may be a public key, the preset decryption key is a private key corresponding to the public key, the server encrypts the preset data by using the public key to obtain target encrypted data, and sends the target encrypted data to the internet of things equipment, and the internet of things equipment can only decrypt the target encrypted data by using the private key corresponding to the public key to obtain the preset data corresponding to the target encrypted data.
In this embodiment, the internet of things device decrypts the target encrypted data by using the preset decryption key corresponding to the preset encryption key, and determines whether the internet of things device can log in the server in the next step, so that self-checking of the device is realized, and the login security of the internet of things device is improved.
In one embodiment, the authentication information sent by the internet of things device is first authentication information, and the first authentication information is information obtained by encrypting a device password pre-stored in the internet of things device by using a random number; step 208 further comprises: searching the equipment password of the Internet of things equipment from the prestored equipment passwords; encrypting the searched equipment password by using the random number to generate second authentication information; and allowing the Internet of things equipment to log in the server under the condition that the first authentication information is consistent with the second authentication information.
The first authentication information is encryption information obtained by the internet of things device by using a random number, for example, encryption information obtained by encrypting a device password by using the random number by the internet of things device, and the second authentication information is encryption information obtained by the server based on the received random number, for example, encryption information obtained by encrypting a pre-stored device password by using the received random number by the server.
Specifically, the server receives first authentication information, a random number, an identity identification number and a model identification which are sent by the Internet of things equipment, searches an equipment password corresponding to the Internet of things equipment in the equipment passwords which are pre-stored in the server, encrypts the searched equipment password by using the random number to obtain second authentication information, compares the first authentication information with the second authentication information, and allows the Internet of things equipment to log in the server under the condition that the first authentication information is consistent with the second authentication information; and under the condition that the first authentication information is inconsistent with the second authentication information, refusing the Internet of things equipment to log in the server.
In some embodiments, the internet of things device generates a random number, encrypts a device password stored in the internet of things device by using the random number to obtain first authentication information, and then sends the stored identification number, the stored model identification, the generated random number and the first authentication information to the server.
In the embodiment, the found equipment password is encrypted by using the random number to obtain the second authentication information, and the equipment is allowed to log in the server under the condition that the first authentication information is consistent with the second authentication information, so that the qualification verification of the equipment logging in the server is realized, the possibility of connecting external fake equipment into the platform is reduced, and the login safety of the equipment of the internet of things is improved.
In one embodiment, the first authentication information is information obtained by encrypting a device password and device identity information, which are pre-stored in the internet of things device, by using a random number by the internet of things device; in step 208, searching for the device password of the internet of things device from the pre-stored device passwords includes: receiving equipment identity information sent by the Internet of things equipment, and searching an equipment password of the Internet of things equipment from pre-stored equipment passwords by using the equipment identity information; encrypting the found equipment password by using the random number, and generating second authentication information comprises: and encrypting the searched equipment password and equipment identity information by using the random number to generate second authentication information.
The first authentication information is encrypted information obtained by the internet of things device by using a random number, for example, the first authentication information may be encrypted information obtained by encrypting a device password and device identity information pre-stored in the internet of things device by using the random number, and the device identity information is information used for identifying the identity of the internet of things device and includes at least one of an identity number and a model identification of the internet of things device.
Specifically, the server receives first authentication information, a random number and equipment identity information sent by the internet of things equipment, and searches for an equipment password corresponding to the internet of things equipment in the server by using the equipment identity information of the internet of things equipment, for example, the equipment password corresponding to the internet of things equipment can be searched by using an identity number, then the searched equipment password, the received identity number and the model identification are encrypted by using the random number to obtain second authentication information, then the first authentication information is compared with the second authentication information, and the internet of things equipment is allowed to log in the server under the condition that the first authentication information is consistent with the second authentication information; and under the condition that the first authentication information is inconsistent with the second authentication information, refusing the Internet of things equipment to log in the server.
In some embodiments, the identity number, the device password, and the model identifier of the internet of things device are referred to as triplet information, as shown in fig. 3, the internet of things device generates a random number, encrypts the identity number, the device password, and the model identifier stored in the internet of things device by using the random number to obtain first authentication information, and then sends the stored identity number, the stored model identifier, the generated random number, and the first authentication information to the server.
In the embodiment, the found equipment password and the equipment identity information are encrypted by using the random number to obtain the second authentication information, and the equipment is allowed to log in the server under the condition that the first authentication information is consistent with the second authentication information, so that the qualification verification of the equipment logging in the server is realized, the possibility of connecting an external fake equipment into the platform is reduced, and the login safety of the equipment of the internet of things is improved.
In one embodiment, in step 208, encrypting the found device password by using a random number, and generating the second authentication information includes: splicing the random number and the searched equipment password to generate splicing information; and encrypting the splicing information to generate second authentication information.
The splicing information is information obtained by splicing a plurality of data, and may be, for example, character string information obtained by splicing a random number and a found device password.
Specifically, the server splices the received random number and the searched device password to obtain splicing information, encrypts the splicing information, and uses the encrypted information as second authentication information.
In some embodiments, the server splices the received random number, the identification number, the model identifier and the searched device password to obtain splicing information, encrypts the splicing information, and uses the encrypted information as second authentication information.
In this embodiment, the random number and the found device password are spliced to generate splicing information, and then the splicing information is encrypted to generate second authentication information, so that the login of the internet of things device can be verified by using the second authentication information, and the login security of the internet of things device is improved.
In one embodiment, in step 208, encrypting the splicing information and generating the second authentication information includes: encrypting the splicing information by using a first encryption mode to obtain first encryption information; and encrypting the first encryption information by using a second encryption mode, and determining an encryption result as second authentication information.
The first encryption mode is an encryption mode for encrypting splicing information, the first encryption information is encryption information obtained by encrypting the splicing information by using the first encryption mode, the second encryption mode is an encryption mode for encrypting the first encryption information, and the second encryption information is encryption information obtained by encrypting the first encryption information by using the second encryption mode.
Specifically, the server encrypts the splicing information by using a first encryption mode to obtain first encryption information, for example, the server performs binary conversion on the splicing information to obtain a binary sequence, then groups the binary sequence in a mode that every 6 binary bits are a group, and supplements 0 at a low bit when the last group is less than 6 bits. And (3) obtaining a new byte by complementing 00 at the high order of each 6-bit group, forming a new binary sequence by all the new bytes, finally finding out a character corresponding to each byte in the new binary sequence according to a base64 index table to obtain a character string, and taking the character string as first encryption information. Then the server encrypts the first encrypted information by using a second encryption mode, and determines the encrypted result as second authentication information, for example, the server first fills a 1 after the first encrypted information, then adds 0 until the byte length of the filled first encrypted information is (n + 512) +448, and indicates the length of the unfilled first encrypted information by 64 bits, so as to obtain the filled information, wherein the byte length of the filled information is (n + 1) × 512; and then, performing circular operation on the filling information by using the link variable to obtain an encryption result, and taking the encryption result as second authentication information. Wherein the chaining variable is a constant for performing the loop operation.
In some embodiments, the server generates the second authentication information in the same manner as the internet of things device generates the first authentication information, and the second encryption manner is an irreversible encryption algorithm. The irreversible encryption algorithm directly encrypts the plaintext, and the encrypted data cannot be decrypted.
In the embodiment, the splicing information is encrypted by using the first encryption mode to obtain the first encryption information, and the first encryption information is encrypted by using the second encryption mode to obtain the second authentication information, so that the login safety of the internet of things equipment is improved.
In one embodiment, the server stores in advance identification numbers corresponding to a plurality of internet of things devices respectively; the equipment login request carries an identity identification number; step 202 further comprises: responding to an equipment login request sent by the Internet of things equipment, and extracting an identity identification number from the equipment login request; and under the condition that the extracted identification number belongs to the identification number pre-stored in the server, returning target encrypted data to the equipment of the Internet of things.
Where the identification number is used to uniquely identify the internet of things device, the identification number may be a randomly generated numeric or alphabetic number.
Specifically, the server receives an equipment login request of the internet of things equipment, analyzes the equipment login request, extracts an identity identification number from the equipment login request to obtain the extracted identity identification number, searches the identity identification numbers respectively corresponding to a plurality of pieces of internet of things equipment prestored in a database of the server, and when the server searches the extracted identity identification number from the identity identification number, determines that the extracted identity identification number belongs to the identity identification number prestored in the server, which indicates that the internet of things equipment corresponding to the identity identification number has the qualification of connecting with the server, the server generates target encryption data and returns the target encryption data to the internet of things equipment; and when the server cannot find the extracted identification number, determining that the extracted identification number does not belong to the identification number prestored in the server, indicating that the Internet of things equipment corresponding to the identification number does not have the qualification of connecting with the server, and informing the Internet of things equipment of failing to request to log in the server by the server.
In this embodiment, the received identification number is searched for from the pre-stored identification numbers corresponding to the internet of things devices, so that the legality of the internet of things device login server is judged, and the login safety of the internet of things device can be improved.
In some embodiments, as shown in fig. 4, a method for securely logging in an internet of things device is provided, which is described by taking an example that the method is applied to a server, and includes the following steps:
step 402, in response to an equipment login request sent by the internet of things equipment, extracting an identity identification number from the equipment login request.
Step 404, determining whether the extracted identification number belongs to an identification number pre-stored in the server, if not, executing step 406, and if so, executing step 408.
And 406, rejecting the login request of the Internet of things equipment, wherein the login of the Internet of things equipment fails.
And step 408, returning the target encrypted data to the Internet of things equipment.
The target encrypted data is data obtained by encrypting preset data based on a preset encryption key.
And step 410, receiving a decryption result obtained by decrypting the target encrypted data, which is returned by the internet of things device, and notifying the internet of things device that decryption is successful under the condition that decryption is determined to be successful based on the decryption result.
Step 412, receiving the first authentication information, the identity identification number, the model identification and the random number sent by the internet of things device.
The first authentication information is encrypted information obtained by encrypting a random number, an identity identification number, a model identification and an equipment password by the equipment of the internet of things, and the random number is generated by the equipment of the internet of things.
Step 414, searching the device password of the internet of things device from the pre-stored device password, and encrypting the random number, the identity number, the model identifier and the searched device password to obtain second authentication information.
The server stores the identity identification number, the model identification and the equipment password of the Internet of things equipment in advance, and searches the equipment password of the Internet of things equipment from the pre-stored equipment password by using the received identity identification number.
Step 416, comparing the first authentication information with the second authentication information, determining whether the first authentication information is consistent with the second authentication information, if not, performing step 406, and if so, performing step 418.
And 418, allowing the Internet of things equipment to log in the server, wherein the Internet of things equipment logs in successfully.
In the embodiment, the identity identification number is extracted from the equipment login request, whether the identity identification number belongs to the identity identification number pre-stored by the server is judged, the target encrypted data is sent to the internet of things equipment under the condition that the identity identification number belongs to the identity identification number pre-stored by the server, if the internet of things equipment can normally analyze the target encrypted data and return a decryption result, the internet of things equipment is subjected to login verification on the next step, the random number and the first authentication information generated by the internet of things equipment are received, second authentication information is generated, the first authentication information and the second authentication information are compared, the internet of things equipment is allowed to log in the server under the condition that the first authentication information and the second authentication information are consistent, equipment self-checking and equipment login verification are achieved, the possibility that external equipment is connected to the platform is reduced, and the equipment login safety is improved.
It should be understood that, although the steps in the flowcharts related to the embodiments as described above are sequentially displayed as indicated by arrows, the steps are not necessarily performed sequentially as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the application also provides a safe login device of the Internet of things equipment, which is used for realizing the safe login method of the Internet of things equipment. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme recorded in the method, so that specific limitations in one or more embodiments of the internet of things device secure login device provided below can refer to the limitations on the internet of things device secure login method provided above, and details are not repeated herein.
In one embodiment, as shown in fig. 5, there is provided an internet of things device secure login apparatus, including: an encrypted data returning module 502, a decryption result confirming module 504, an authentication information receiving module 506 and a device login verifying module 508, wherein:
the encrypted data returning module 502 is configured to return target encrypted data to the internet of things device in response to a device login request sent by the internet of things device;
a decryption result confirmation module 504, configured to receive a decryption result obtained by decrypting the target encrypted data and returned by the internet of things device, and notify the internet of things device that decryption is successful when it is determined that decryption is successful based on the decryption result;
an authentication information receiving module 506, configured to receive authentication information and a random number sent by the internet of things device when decryption is successful; the random number is generated by the Internet of things equipment;
a device log-in verification module 508 for verifying the authentication information based on the random number, and allowing the Internet of things equipment to log in the server under the condition that the authentication is passed.
In some embodiments, the target encrypted data is data obtained by encrypting preset data by using a preset encryption key; under the condition that a preset decryption key corresponding to the preset encryption key is stored in the Internet of things equipment, the Internet of things equipment decrypts the received target encryption data by using the preset decryption key to obtain a decryption result, and sends the decryption result to the server.
In some embodiments, the authentication information sent by the internet of things device is first authentication information, and the first authentication information is information obtained by encrypting a device password pre-stored in the internet of things device by using a random number; the device login authentication module is further configured to: searching the equipment password of the Internet of things equipment from the prestored equipment passwords; encrypting the searched equipment password by using the random number to generate second authentication information; and allowing the Internet of things equipment to log in the server under the condition that the first authentication information is consistent with the second authentication information.
In some embodiments, the first authentication information is information obtained by encrypting a device password and device identity information, which are pre-stored in the internet of things device, by using a random number by the internet of things device; the device login authentication module is further configured to: receiving equipment identity information sent by the Internet of things equipment, and searching an equipment password of the Internet of things equipment from pre-stored equipment passwords by using the equipment identity information; encrypting the found equipment password by using the random number, and generating second authentication information comprises: and encrypting the searched equipment password and equipment identity information by using the random number to generate second authentication information.
In some embodiments, the device login authentication module is further to: splicing the random number and the searched equipment password to generate splicing information; and encrypting the splicing information to generate second authentication information.
In some embodiments, the device login authentication module is further to: encrypting the splicing information by using a first encryption mode to obtain first encryption information; and encrypting the first encryption information by using a second encryption mode, and determining an encryption result as second authentication information.
In some embodiments, the server stores in advance identification numbers corresponding to a plurality of internet of things devices respectively; the equipment login request carries an identity identification number; the encrypted data return module is further configured to: responding to an equipment login request sent by the Internet of things equipment, and extracting an identity identification number from the equipment login request; and under the condition that the extracted identification number belongs to the identification number pre-stored in the server, returning the target encrypted data to the Internet of things equipment.
All modules in the safe login device of the equipment of the Internet of things can be completely or partially realized through software, hardware and a combination of the software and the hardware. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing relevant data involved in device login. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize a safe login method for the equipment of the Internet of things.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to realize a safe login method of the Internet of things equipment. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps in the method for secure login of internet of things device when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps in the method for secure login of internet of things devices.
In one embodiment, a computer program product is provided, which includes a computer program that, when being executed by a processor, realizes the steps of the method for secure login of internet of things device.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), magnetic Random Access Memory (MRAM), ferroelectric Random Access Memory (FRAM), phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), for example. The databases involved in the embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
All possible combinations of the technical features in the above embodiments may not be described for the sake of brevity, but should be considered as being within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application should be subject to the appended claims.

Claims (10)

1. A safe login method for equipment of the Internet of things is characterized by comprising the following steps:
the method comprises the steps that target encrypted data are returned to the Internet of things equipment in response to an equipment login request sent by the Internet of things equipment;
receiving a decryption result obtained by decrypting the target encrypted data, which is returned by the Internet of things equipment, and informing the Internet of things equipment of successful decryption under the condition that the decryption is determined to be successful based on the decryption result;
receiving authentication information and a random number sent by the Internet of things equipment under the condition of successful decryption; the random number is generated by the internet of things device;
and verifying the authentication information based on the random number, and allowing the Internet of things equipment to log in a server under the condition that the authentication is passed.
2. The method according to claim 1, wherein the target encrypted data is data obtained by encrypting preset data with a preset encryption key; and under the condition that a preset decryption key corresponding to the preset encryption key is stored in the internet of things equipment, the internet of things equipment decrypts the received target encrypted data by using the preset decryption key to obtain a decryption result, and sends the decryption result to the server.
3. The method according to claim 1, wherein the authentication information sent by the internet of things device is first authentication information, and the first authentication information is information obtained by encrypting a device password pre-stored in the internet of things device by using the random number by the internet of things device;
the verifying the authentication information based on the random number, and allowing the internet of things equipment to log in a server if the authentication is passed comprises:
searching the equipment password of the Internet of things equipment from prestored equipment passwords;
the found device password is encrypted using the random number, generating second authentication information;
and allowing the Internet of things equipment to log in the server under the condition that the first authentication information is consistent with the second authentication information.
4. The method according to claim 3, wherein the first authentication information is information obtained by encrypting a device password and device identity information, which are pre-stored in the internet of things device, by the internet of things device using the random number;
the searching for the device password of the internet of things device from the pre-stored device passwords comprises:
receiving equipment identity information sent by the Internet of things equipment, and searching the equipment password of the Internet of things equipment from the pre-stored equipment password by using the equipment identity information;
the encrypting the searched equipment password by using the random number to generate second authentication information comprises:
and encrypting the searched equipment password and the equipment identity information by using the random number to generate the second authentication information.
5. The method according to claim 3, wherein the encrypting the found device password by using the random number to generate the second authentication information comprises:
splicing the random number and the searched equipment password to generate splicing information;
and encrypting the splicing information to generate the second authentication information.
6. The method according to claim 5, wherein the encrypting the splicing information and generating the second authentication information comprises:
encrypting the splicing information by using a first encryption mode to obtain first encryption information;
and encrypting the first encryption information by using a second encryption mode, and determining an encryption result as the second authentication information.
7. The method according to claim 1, wherein the server stores in advance identification numbers corresponding to a plurality of internet of things devices; the equipment login request carries the identity identification number;
the step of returning the target encrypted data to the internet of things device in response to the device login request sent by the internet of things device comprises the following steps:
responding to an equipment login request sent by equipment of the Internet of things, and extracting an identity identification number from the equipment login request;
and under the condition that the extracted identification number belongs to the identification number pre-stored in the server, returning target encrypted data to the Internet of things equipment.
8. The utility model provides an thing networking device safety login device which characterized in that, the device includes:
the encrypted data returning module is used for responding to an equipment login request sent by the Internet of things equipment and returning target encrypted data to the Internet of things equipment;
the decryption result confirmation module is used for receiving a decryption result obtained by decrypting the target encrypted data and returned by the Internet of things equipment, and notifying the Internet of things equipment that decryption is successful under the condition that the decryption is determined to be successful based on the decryption result;
the authentication information receiving module is used for receiving the authentication information and the random number sent by the Internet of things equipment under the condition of successful decryption; the random number is generated by the internet of things device;
and the equipment login verification module is used for verifying the authentication information based on the random number and allowing the Internet of things equipment to log in the server under the condition that the authentication is passed.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202211060389.XA 2022-08-31 2022-08-31 Internet of things equipment secure login method and device, computer equipment and storage medium Pending CN115348107A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211060389.XA CN115348107A (en) 2022-08-31 2022-08-31 Internet of things equipment secure login method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211060389.XA CN115348107A (en) 2022-08-31 2022-08-31 Internet of things equipment secure login method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115348107A true CN115348107A (en) 2022-11-15

Family

ID=83955408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211060389.XA Pending CN115348107A (en) 2022-08-31 2022-08-31 Internet of things equipment secure login method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115348107A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117118754A (en) * 2023-10-23 2023-11-24 深圳市几米物联有限公司 Information interaction management method, device, equipment and medium of Internet of things equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117118754A (en) * 2023-10-23 2023-11-24 深圳市几米物联有限公司 Information interaction management method, device, equipment and medium of Internet of things equipment
CN117118754B (en) * 2023-10-23 2023-12-22 深圳市几米物联有限公司 Information interaction management method, device, equipment and medium of Internet of things equipment

Similar Documents

Publication Publication Date Title
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
CN109951489B (en) Digital identity authentication method, equipment, device, system and storage medium
CN110519260B (en) Information processing method and information processing device
CN108173662B (en) Equipment authentication method and device
CN107742212B (en) Asset verification method, device and system based on block chain
KR101744747B1 (en) Mobile terminal, terminal and method for authentication using security cookie
CN113691502B (en) Communication method, device, gateway server, client and storage medium
US11831753B2 (en) Secure distributed key management system
JP2008507203A (en) Method for transmitting a direct proof private key in a signed group to a device using a distribution CD
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN107508791A (en) A kind of terminal identity verification method and system based on distributed key encryption
KR20200028880A (en) Multiple security authentication system and method between blockchain-based mobile terminals and IoT devices
CN108683674A (en) Verification method, device, terminal and the computer readable storage medium of door lock communication
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
CN111294203A (en) Information transmission method
CN111008400A (en) Data processing method, device and system
CN115348107A (en) Internet of things equipment secure login method and device, computer equipment and storage medium
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
CN115001864B (en) Communication authentication method and device for intelligent furniture, computer equipment and storage medium
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN113872986B (en) Power distribution terminal authentication method and device and computer equipment
CN115987655A (en) Remote access method, system and equipment based on user identity deep recognition
CN115361198A (en) Decryption method, encryption method, device, computer equipment and storage medium
CN114499875A (en) Service data processing method and device, computer equipment and storage medium
CN114679299A (en) Communication protocol encryption method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination