CN116388997A - Authentication management method and system for broadcast control terminal - Google Patents

Authentication management method and system for broadcast control terminal Download PDF

Info

Publication number
CN116388997A
CN116388997A CN202310248425.3A CN202310248425A CN116388997A CN 116388997 A CN116388997 A CN 116388997A CN 202310248425 A CN202310248425 A CN 202310248425A CN 116388997 A CN116388997 A CN 116388997A
Authority
CN
China
Prior art keywords
broadcast control
control terminal
target
authentication
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310248425.3A
Other languages
Chinese (zh)
Inventor
魏文流
徐林杰
刘海峰
周勋
刘翼
王正
范月霞
裴焘
张琼宇
赵亦昕
姜凌
费久江
詹鹏
刘青霞
匡文娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp
Original Assignee
Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp filed Critical Wuhan Ship Communication Research Institute 722 Research Institute Of China Shipbuilding Corp
Priority to CN202310248425.3A priority Critical patent/CN116388997A/en
Publication of CN116388997A publication Critical patent/CN116388997A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses a broadcast control terminal authentication management method and system. Acquiring a target device information abstract reported by a target broadcast control terminal through an authentication node server, and encrypting a unique identifier of the target broadcast control terminal and the target device information abstract to generate a target authentication information abstract under the condition that the device information abstract stored in the authentication node server contains the target device information abstract; forwarding the unique identifier of the target broadcast control terminal and the target authentication information abstract to a broadcast control management platform through the broadcast control server; and encrypting the unique identifier of the target broadcast control terminal and the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal stored in the database server through the broadcast control management platform to generate a theoretical authentication information abstract, and determining that the target broadcast control terminal is successfully authenticated under the condition that the target authentication information abstract is consistent with the theoretical authentication information abstract. By adopting the method, the reliability of validity authentication of the broadcast control terminal can be improved.

Description

Authentication management method and system for broadcast control terminal
Technical Field
The present application relates to the field of security authentication technologies, and in particular, to a method and system for authentication management of a broadcast control terminal.
Background
With the continuous development of the Internet and multimedia technology, the digital broadcasting control platform is widely applied to the fields of financial securities, network education, community advertising and the like. The digital broadcasting control terminal has the characteristics of convenient installation, diversified propaganda materials and rich video effect, and is widely deployed in places such as financial securities business points, teaching points, community elevators and the like to provide information propaganda service for people.
Because of the wide deployment of digital broadcast control terminals, the communication security and the equipment security of each terminal face serious challenges. The conventional authentication method of the digital broadcast control terminal is identity information matching, and sensitive information such as unique identification, MAC address (all are called Media Access Control Address) and the like of the terminal needs to be reported to the digital broadcast control platform.
However, this method lacks protection of sensitive information of the digital broadcast control terminal, and still has a great potential safety hazard. Therefore, how to perform reliable identity authentication on the digital broadcast control terminal to identify whether the digital broadcast control terminal is a legal device, so as to ensure the safety of the digital broadcast control terminal is a problem to be solved.
Disclosure of Invention
Aiming at least one defect or improvement requirement of the prior art, the invention provides a broadcast control terminal authentication management method and system, which can improve the reliability of authenticating the validity of the broadcast control terminal, thereby ensuring the safety of the broadcast control terminal.
To achieve the above object, according to a first aspect of the present invention, there is provided a broadcast control terminal authentication management method, including:
acquiring a target equipment information abstract reported by a target broadcast control terminal through an authentication node server;
encrypting, by the authentication node server, the unique identifier of the target broadcast control terminal and the target device information digest to generate a target authentication information digest when the device information digest stored in the authentication node server contains the target device information digest;
forwarding the unique identification of the target broadcast control terminal and the target authentication information abstract to a broadcast control management platform through a broadcast control server, wherein the broadcast control server is respectively connected with the authentication node server and the broadcast control management platform through a network;
encrypting the unique identifier of the target broadcast control terminal and the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal stored in the database server through the broadcast control management platform to generate a theoretical authentication information abstract; the database server is connected with the broadcast control management platform in a network manner and is used for storing data to be processed by the broadcast control management platform;
and determining that the target broadcast control terminal is successfully authenticated under the condition that the target authentication information abstract is consistent with the theoretical authentication information abstract through the broadcast control management platform.
Further, the number of the authentication node servers is one, and before the target device information abstract reported by the target broadcast control terminal is obtained through the authentication node servers, the broadcast control terminal authentication management method further comprises the steps of creating at least one broadcast control terminal through a broadcast control management platform, and generating a unique identifier and a device information abstract of each broadcast control terminal; storing the device information abstract of each broadcasting control terminal through a database server; synchronizing the device information abstract of each broadcast control terminal to an authentication node server through the broadcast control server; and storing the device information abstract of each broadcasting control terminal through the authentication node server.
Further, the number of the authentication node servers is at least two, before the target device information abstract reported by the target broadcast control terminal is obtained through the authentication node servers, the broadcast control terminal authentication management method further comprises the steps of creating at least one broadcast control terminal through a broadcast control management platform, generating a unique identifier and a device information abstract of each broadcast control terminal, and binding one authentication node server for each broadcast control terminal; storing the device information abstract of each broadcasting control terminal through a database server; synchronizing the device information abstract of each broadcast control terminal to an authentication node server bound with the broadcast control terminal through the broadcast control server; and storing, by each authentication node server, a device information digest of at least one broadcast control terminal bound thereto.
Further, at least one broadcast control terminal is created through the broadcast control management platform, and a unique identifier and an equipment information abstract of each broadcast control terminal are generated.
Further, the binding relation between the broadcast control terminal and the authentication node server is modified through the broadcast control management platform.
According to a second aspect of the present invention, there is also provided a broadcast control terminal authentication management system, which adopts a distributed architecture, and includes a broadcast control management platform, a database server, a broadcast control server, at least one authentication node server and at least one broadcast control terminal, where the broadcast control management platform is connected with the database server through a network, and the broadcast control server is respectively connected with the broadcast control management platform and the at least one authentication node server through a network, and each authentication node server is connected with the at least one broadcast control terminal through a network;
the authentication node server is used for acquiring the information abstract of the target equipment reported by the target broadcast control terminal;
the authentication node server is further used for encrypting the unique identifier of the target broadcast control terminal and the target equipment information abstract to generate a target authentication information abstract under the condition that the equipment information abstract stored in the authentication node server contains the target equipment information abstract;
the broadcast control server is used for forwarding the unique identifier of the target broadcast control terminal and the target authentication information abstract to the broadcast control management platform;
the broadcast control management platform is used for encrypting the unique identifier of the target broadcast control terminal and the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal stored in the database server to generate a theoretical authentication information abstract; the database server is used for storing data which needs to be processed by the broadcast control management platform;
and the broadcast control management platform is also used for determining that the target broadcast control terminal is successfully authenticated under the condition that the target authentication information abstract is consistent with the theoretical authentication information abstract.
Further, the number of the authentication node servers is one, and the broadcast control management platform is also used for creating at least one broadcast control terminal and generating a unique identifier and an equipment information abstract of each broadcast control terminal; the database server is also used for storing the equipment information abstract of each broadcasting control terminal; the broadcast control server is also used for synchronizing the device information abstract of each broadcast control terminal to the authentication node server; the authentication node server is further used for storing the device information abstract of each broadcast control terminal.
Further, the number of the authentication node servers is at least two, and the broadcast control management platform is also used for creating at least one broadcast control terminal, generating a unique identifier and an equipment information abstract of each broadcast control terminal, and binding one authentication node server for each broadcast control terminal; the database server is also used for storing the equipment information abstract of each broadcasting control terminal; the broadcast control server is also used for synchronizing the equipment information abstract of each broadcast control terminal to an authentication node server bound with the broadcast control terminal; the authentication node server is further used for storing the device information abstract of at least one broadcast control terminal bound with the authentication node server.
Further, the broadcast control management platform is further configured to create at least one broadcast control terminal, generate a unique identifier and a device information abstract of each broadcast control terminal, and set a state of each broadcast control terminal as an illegal device or a legal device.
Further, the broadcast control management platform is further used for modifying the binding relationship between the broadcast control terminal and the authentication node server.
In general, the above technical solutions conceived by the present invention, compared with the prior art, enable the following beneficial effects to be obtained:
(1) According to the broadcast control terminal authentication management method, the target broadcast control terminal reports the target device information abstract instead of the target device information, and the target authentication information abstract is generated based on the target device information abstract, namely, the transmission of the target device information is not involved in the whole authentication process, so that the sensitive information of the broadcast control terminal can be protected, the reliability of the device validity authentication of the broadcast control terminal is improved, and the purpose of ensuring the device safety of the broadcast control terminal is achieved.
(2) By adopting the authentication management method of the broadcast control terminal, provided by the invention, the authentication node server and the broadcast control management platform work cooperatively, namely, the authentication node server performs preliminary authentication on the equipment information abstract of the broadcast control terminal and generates the authentication information abstract, and the broadcast control management platform only needs to process the correctness of the authentication information abstract, so that compared with the prior art, the authentication is performed only through the broadcast control management platform, and the communication burden and authentication processing burden of the broadcast control management platform can be reduced.
(3) By adopting the broadcast control terminal authentication management system provided by the invention, a distributed broadcast control terminal authentication management system is established through the deployment of the broadcast control management platform, the broadcast control server, the authentication node server and the broadcast control terminals, and the authentication node server can be properly increased along with the increase of the broadcast control terminals, so that the broadcast control management platform completes cooperative authentication of a plurality of broadcast control terminals through the authentication node server, thereby ensuring the authentication efficiency and stable operation of the system.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a broadcast control terminal authentication management method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a broadcast control terminal authentication management system according to an embodiment of the present application;
fig. 3 is a flowchart of a broadcast control terminal authentication management method according to another embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, the technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
The terms first, second and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
As shown in fig. 1, a method for managing authentication of a broadcast control terminal is provided, and the method is applied to the broadcast control terminal authentication management system shown in fig. 2. The system comprises a broadcast control terminal authentication management system, a broadcast control terminal authentication management system and a broadcast control terminal authentication management system, wherein the broadcast control terminal authentication management system adopts a distributed architecture and comprises a broadcast control management platform, a database server, a broadcast control server, at least one authentication node server and at least one broadcast control terminal, wherein the broadcast control management platform is connected with the database server through a network, the broadcast control server is respectively connected with the broadcast control management platform and the at least one authentication node server through a network, and each authentication node server is connected with the at least one broadcast control terminal through a network. The authentication management method of the broadcast control terminal comprises the following steps:
and step 101, acquiring a target device information abstract reported by a target broadcast control terminal through an authentication node server.
The target broadcast control terminal is the broadcast control terminal to be authenticated currently. Because the broadcast control terminal is widely deployed, not every broadcast control terminal is legal equipment, the broadcast control terminal needs to be subjected to identity authentication before being accessed into the broadcast control terminal authentication management system so as to ensure the safety of the equipment.
The target device information abstract is the device information abstract of the target broadcast control terminal. The device information includes attribute information such as a unique identification (also referred to as an ID), an IP address (also referred to as Internet Protocol Address), a MAC address, a factory number, and a hard disk serial number of the broadcast control terminal. The device information abstract is obtained by encrypting the device information through an information abstract algorithm, and the information abstract algorithm can be an MD5 information abstract algorithm.
Step 102, through the authentication node server, in the case that the device information abstract stored in the authentication node server contains the target device information abstract, the unique identifier of the target broadcast control terminal and the target device information abstract are encrypted, so as to generate the target authentication information abstract.
The target authentication information abstract is the authentication information abstract of the target broadcast control terminal. The authentication information abstract of the broadcast control terminal is obtained by encrypting the unique identification of the broadcast control terminal and the equipment information abstract of the broadcast control terminal through an MD5 information abstract algorithm.
It should be noted that, because the broadcast control terminal authentication management method is applied to the distributed broadcast control terminal authentication management system, the system includes at least one authentication node server, and each authentication node server can perform preliminary authentication on at least one broadcast control terminal bound in advance. Therefore, when the identity of the target broadcast control terminal is authenticated, preliminary authentication needs to be performed through the authentication node server bound with the target broadcast control terminal, but not through other authentication node servers.
Illustratively, in the case that the broadcast control terminal authentication management system includes one authentication node server, preliminary authentication is performed on the target broadcast control terminal through the authentication node server: judging whether the equipment information abstract stored in the authentication node server contains the target equipment information abstract, and if so, encrypting the unique identification of the target broadcast control terminal and the target equipment information abstract to generate a target authentication information abstract; if the target equipment information abstract is not contained, determining that the preliminary authentication of the target broadcast control terminal fails, wherein the target broadcast control terminal is illegal equipment.
Under the condition that the broadcast control terminal authentication management system comprises at least two authentication node servers, preliminary authentication is carried out on the target broadcast control terminal through the current authentication node server: judging whether the equipment information abstract stored in the current authentication node server contains the target equipment information abstract, and if so, encrypting the unique identification of the target broadcast control terminal and the target equipment information abstract to generate a target authentication information abstract; if the target equipment information abstract is not contained, carrying out preliminary authentication on the target broadcast control terminal again through any authentication node server except the current authentication node server: judging whether the stored device information abstract contains the target device information abstract or not: if one authentication node server contains the target equipment information abstract, encrypting the unique identification of the target broadcast control terminal and the target equipment information abstract to generate a target authentication information abstract; if all authentication node servers except the current authentication node server do not contain the target equipment information abstract, determining that the target broadcast control terminal fails to perform preliminary authentication, wherein the target broadcast control terminal is illegal equipment.
And step 103, forwarding the unique identification of the target broadcast control terminal and the target authentication information abstract to a broadcast control management platform through a broadcast control server, wherein the broadcast control server is respectively connected with the authentication node server and the broadcast control management platform through a network.
In an exemplary case that the broadcast control terminal authentication management system includes an authentication node server, the broadcast control server forwards the unique identifier of the target broadcast control terminal and the target authentication information abstract to the broadcast control management platform, and the broadcast control server is respectively connected with the authentication node server and the broadcast control management platform through the broadcast control server in a network.
In the case that the broadcast control terminal authentication management system comprises at least two authentication node servers, the broadcast control server forwards the unique identification of the target broadcast control terminal and the target authentication information abstract to the broadcast control management platform, and the broadcast control server is respectively connected with each authentication node server in the at least two authentication node servers through the broadcast control server, and the broadcast control server is also connected with the broadcast control management platform through the network.
Step 104, encrypting the unique identifier of the target broadcast control terminal and the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal stored in the database server through the broadcast control management platform to generate a theoretical authentication information abstract; the database server is connected with the broadcast control management platform in a network manner and is used for storing data which needs to be processed by the broadcast control management platform.
The database server is connected with the broadcast control management platform in a network manner and is used for storing data which needs to be processed by the broadcast control management platform. Because the broadcast control management platform comprises the equipment management module, the material management module, the online management module, the log management module and other functional modules, the data to be processed by the broadcast control management platform comprises all the data of the functional modules, wherein the data comprise the equipment information abstract corresponding to the unique identification of each broadcast control terminal. The theoretical authentication information abstract is obtained by encrypting an MD5 information abstract algorithm.
By way of example, the device information abstract corresponding to the unique identifier of the target broadcast control terminal is obtained from the database server according to the received unique identifier of the target broadcast control terminal through the broadcast control management platform; and encrypting the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal and the unique identifier of the target broadcast control terminal obtained from the database server to generate a theoretical authentication information abstract.
And 105, determining that the target broadcast control terminal is successfully authenticated under the condition that the target authentication information abstract is consistent with the theoretical authentication information abstract through the broadcast control management platform.
Illustratively, judging whether the target authentication information abstract is consistent with the theoretical authentication information abstract or not through a broadcast control management platform; if the authentication is consistent, the target broadcast control terminal is determined to be successfully authenticated, and the target broadcast control terminal is legal equipment and can be accessed into the broadcast control terminal authentication management system; if the authentication of the target broadcast control terminal is inconsistent, determining that the authentication of the target broadcast control terminal fails, wherein the target broadcast control terminal is illegal equipment.
In the broadcast control terminal authentication management method, the target broadcast control terminal reports the target device information abstract instead of the target device information, and the target authentication information abstract is generated based on the target device information abstract, namely, the transmission of the target device information is not involved in the whole authentication process, so that the sensitive information of the broadcast control terminal can be protected, the reliability of the device validity authentication of the broadcast control terminal is improved, and the purpose of ensuring the device safety of the broadcast control terminal is achieved.
Secondly, the system is applied to a broadcast control terminal authentication management system adopting a distributed architecture, the broadcast control management platform is mainly responsible for authentication processing, the broadcast control server is mainly responsible for message forwarding between the broadcast control management platform and the authentication node server, and the database server is mainly responsible for storing data required to be processed by the broadcast control management platform, so that the communication burden and the storage burden of the broadcast control management platform are reduced; and the authentication node server is mainly responsible for isolating the authentication link from the broadcast control management platform, namely, the authentication node server performs preliminary authentication on the equipment information abstract of the broadcast control terminal and generates the authentication information abstract, and the broadcast control management platform only needs to process the correctness of the authentication information abstract, so that compared with the authentication only through the broadcast control management platform in the traditional technology, the authentication processing burden of the broadcast control management platform is reduced through the cooperative work of the authentication node server and the broadcast control management platform.
In one embodiment, the number of authentication node servers is one, and before step 101, the broadcast control terminal authentication management method further includes creating at least one broadcast control terminal through a broadcast control management platform, generating a unique identifier and an equipment information abstract of each broadcast control terminal, and setting a state of each broadcast control terminal as illegal equipment; storing, by a database server, a device information digest of each broadcast control terminal generated by a broadcast control management platform; synchronizing the device information abstract of each broadcast control terminal to an authentication node server through the broadcast control server; and storing the device information abstract of each broadcasting control terminal through the authentication node server.
In one embodiment, the number of authentication node servers is at least two, before step 101, the broadcast control terminal authentication management method further includes creating at least one broadcast control terminal through a broadcast control management platform, generating a unique identifier and an equipment information abstract of each broadcast control terminal, setting a state of each broadcast control terminal as illegal equipment, and binding one authentication node server for each broadcast control terminal; storing, by a database server, a device information digest of each broadcast control terminal generated by a broadcast control management platform; synchronizing the device information abstract of each broadcast control terminal to an authentication node server bound with the broadcast control terminal through the broadcast control server; and storing, by each authentication node server, a device information digest of at least one broadcast control terminal bound thereto.
Wherein, through broadcasting the management platform of accuse, establish at least one and broadcast accuse terminal, produce unique identification and equipment information abstract of every broadcasting accuse terminal, include: and creating at least one broadcast control terminal through the broadcast control management and management platform, configuring equipment information for each broadcast control terminal, encrypting the equipment information through an MD5 information abstract algorithm, and generating an equipment information abstract of each broadcast control terminal. The device information comprises attribute information such as unique identification of the broadcast control terminal, IP address, MAC address, factory number, hard disk serial number and the like.
In this embodiment, under the condition that the number of authentication node servers is at least two, at least one broadcast control terminal is created through the broadcast control management platform, and one authentication node server is bound for each broadcast control terminal, so that a distributed broadcast control terminal authentication management system is created through deployment of the broadcast control management platform, the database server, the broadcast control server, the at least two authentication node servers and the at least one authentication node server, and the requirements that the broadcast control terminal needs to be increased and the authentication node server needs to be increased along with the increase of service types related to the broadcast control management platform can be met.
In one embodiment, the method for managing authentication of the broadcast control terminal further includes deleting the created broadcast control terminal, modifying a binding relationship between the broadcast control terminal and the authentication node server, or modifying a state of the broadcast control terminal from an illegal device to a legal device through the broadcast control management platform. The broadcast control management platform enables the broadcast control server and the corresponding bound authentication node server to perform corresponding operation by deleting the broadcast control terminal, distributing the terminal and enabling or disabling a certain broadcast control terminal, so that the cooperative work of the authentication node server and the broadcast control management platform is ensured.
In one embodiment, as shown in fig. 3, there is provided a broadcast control terminal authentication management method, including the steps of:
step 1: creating a broadcast control terminal by the broadcast control management platform, generating an identity ID of the broadcast control terminal, setting equipment information such as an IP address, an MAC address, a factory number, a hard disk serial number and the like for the broadcast control terminal, carrying out MD5 encryption on the identity ID and the equipment information of each broadcast control terminal by an MD5 information digest algorithm, and generating an equipment information digest of each broadcast control terminal; and synchronizing the identity ID and the equipment information abstract of each broadcast control terminal to the authentication node server through the broadcast control server.
Step 2: the target broadcast control terminal reports the information abstract and the identity ID of the target equipment to the authentication node server; preliminary authentication is carried out on the target broadcast control terminal through the authentication node server, if the target equipment information abstract exists in the authentication node server or a database connected with the authentication node server, namely, the target equipment information abstract is correct, MD5 encryption is carried out according to the identity ID of the target broadcast control terminal and the target equipment information abstract, and the target authentication information abstract is obtained through calculation; otherwise, determining that the preliminary authentication fails.
Step 3: under the condition that the preliminary authentication fails, the authentication node server reports the identity ID and the target authentication information abstract of the target broadcast control terminal to the broadcast control server, and the broadcast control server forwards the identity ID and the target authentication information abstract of the target broadcast control terminal to the broadcast control management platform; under the condition that the preliminary authentication fails, the authentication node server reports the message that the target broadcast control terminal is illegal equipment to the broadcast control server, and the broadcast control server forwards the message that the target broadcast control terminal is illegal equipment to the broadcast control management platform, so that the authentication is finished.
Step 4: the broadcast control management platform receives the identity ID of the target broadcast control terminal and the target authentication information abstract which are forwarded by the broadcast control server, searches the equipment information abstract corresponding to the identity ID of the target broadcast control terminal from the data stored in the database server, encrypts the equipment information abstract corresponding to the identity ID of the target broadcast control terminal and the identity ID of the target broadcast control terminal according to the searched equipment information abstract and the identity ID of the target broadcast control terminal, calculates to obtain the authentication information abstract, compares the authentication information abstract with the received target authentication information abstract, and determines that the authentication is successful if the authentication information abstract is consistent, namely the target authentication information abstract is correct; otherwise, determining that the authentication fails, the target broadcast control terminal is illegal equipment, and ending the authentication.
In the embodiment, the identity authentication is performed on the broadcast control terminal based on the equipment information abstract and the authentication information abstract, and the transmission of sensitive information of the broadcast control terminal is not involved, so that the equipment safety of the broadcast control terminal is ensured. And secondly, performing preliminary authentication on the equipment information abstract of the broadcast control terminal through the authentication node server and generating an authentication information abstract, wherein the broadcast control management platform only needs to process the correctness of the authentication information abstract, so that compared with the authentication performed only through the broadcast control management platform in the traditional technology, the broadcast control terminal authentication management method reduces the communication burden and authentication processing burden of the broadcast control management platform.
In addition, a distributed broadcast control terminal authentication management system is established through the deployment of a broadcast control management platform, a broadcast control server, an authentication node server and a broadcast control terminal, the authentication node server can be properly increased along with the increase of the broadcast control terminals, and the broadcast control management platform completes cooperative authentication of a plurality of broadcast control terminals through the authentication node server, so that the authentication efficiency and stable operation of the system are ensured.
The broadcast control management platform can configure terminal information of the broadcast control terminal in real time, the terminal information is forwarded to the authentication node server by the broadcast control server, and the authentication node server completes information interaction and reporting with the terminal information, so that an external network communication link does not directly transmit equipment sensitive information, an internal network completes link authentication data transmission by the broadcast control server and the authentication node server, communication burden of the broadcast control management platform is reduced, a safe broadcast control terminal authentication management system is formed, and state management of the broadcast control terminal of the whole network is realized. The multi-authentication node server is deployed, so that the authentication requirements of the distributed digital broadcast control terminals with different scales and different data forms are met, the deployment cost of the broadcast control terminals is reduced, the use efficiency of the system is greatly improved, and the deployment safety of the broadcast control terminals in the people-stream dense areas such as banking sites, financial security sites and communities is ensured.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
The foregoing is merely exemplary embodiments of the present disclosure and is not intended to limit the scope of the present disclosure. That is, equivalent changes and modifications are contemplated by the teachings of this disclosure, which fall within the scope of the present disclosure. Embodiments of the present disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a scope and spirit of the disclosure being indicated by the claims.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
It will be readily appreciated by those skilled in the art that the foregoing description is merely a preferred embodiment of the invention and is not intended to limit the invention, but any modifications, equivalents, improvements or alternatives falling within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (10)

1. The authentication management method for the broadcast control terminal is characterized by comprising the following steps of:
acquiring a target equipment information abstract reported by a target broadcast control terminal through an authentication node server;
encrypting, by the authentication node server, the unique identifier of the target broadcast control terminal and the target device information digest to generate a target authentication information digest when the device information digest stored in the authentication node server contains the target device information digest;
forwarding the unique identifier of the target broadcast control terminal and the target authentication information abstract to a broadcast control management platform through a broadcast control server, wherein the broadcast control server is respectively connected with the authentication node server and the broadcast control management platform through a network;
encrypting the unique identifier of the target broadcast control terminal and the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal stored in a database server through the broadcast control management platform to generate a theoretical authentication information abstract; the database server is connected with the broadcast control management platform in a network manner and is used for storing data to be processed by the broadcast control management platform;
and determining that the target broadcast control terminal is successfully authenticated under the condition that the target authentication information abstract is consistent with the theoretical authentication information abstract through the broadcast control management platform.
2. The method of claim 1, wherein the number of authentication node servers is one, and before the target device information digest reported by the target broadcast control terminal is obtained by the authentication node servers, the method further comprises:
creating at least one broadcast control terminal through the broadcast control management platform, and generating a unique identifier of each broadcast control terminal and the equipment information abstract;
storing the device information abstract of each broadcast control terminal through the database server;
synchronizing the device information abstract of each broadcast control terminal to the authentication node server through the broadcast control server;
and storing the device information abstract of each broadcast control terminal through the authentication node server.
3. The method of claim 1, wherein the number of authentication node servers is at least two, and before the target device information summary reported by the target broadcast control terminal is obtained by the authentication node servers, the method further comprises:
creating at least one broadcast control terminal through the broadcast control management platform, generating a unique identifier of each broadcast control terminal and the equipment information abstract, and binding one authentication node server for each broadcast control terminal;
storing the device information abstract of each broadcast control terminal through the database server;
synchronizing the device information abstract of each broadcast control terminal to an authentication node server bound with the broadcast control terminal through the broadcast control server;
and storing, by each authentication node server, a device information digest of at least one broadcast control terminal bound thereto.
4. A method according to claim 2 or 3, wherein creating, by the broadcast control management platform, at least one broadcast control terminal, generating a unique identification of each broadcast control terminal and the device information digest, comprises:
and creating at least one broadcast control terminal through the broadcast control management platform, generating a unique identifier of each broadcast control terminal and the equipment information abstract, and setting the state of each broadcast control terminal as illegal equipment or legal equipment.
5. A method as claimed in claim 3, wherein the method further comprises:
and modifying the binding relationship between the broadcast control terminal and the authentication node server through the broadcast control management platform.
6. The system is characterized by adopting a distributed architecture, comprising a broadcast control management platform, a database server, a broadcast control server, at least one authentication node server and at least one broadcast control terminal, wherein the broadcast control management platform is connected with the database server through a network, the broadcast control server is respectively connected with the broadcast control management platform and the at least one authentication node server through a network, and each authentication node server is connected with at least one broadcast control terminal through a network;
the authentication node server is used for acquiring a target equipment information abstract reported by a target broadcast control terminal;
the authentication node server is further configured to encrypt, when the device information digest stored in the authentication node server includes the target device information digest, the unique identifier of the target broadcast control terminal and the target device information digest, to generate a target authentication information digest;
the broadcast control server is used for forwarding the unique identifier of the target broadcast control terminal and the target authentication information abstract to a broadcast control management platform;
the broadcast control management platform is used for encrypting the unique identifier of the target broadcast control terminal and the equipment information abstract corresponding to the unique identifier of the target broadcast control terminal stored in the database server to generate a theoretical authentication information abstract; the database server is used for storing data which needs to be processed by the broadcast control management platform;
the broadcast control management platform is further configured to determine that the target broadcast control terminal is successfully authenticated when the target authentication information abstract is consistent with the theoretical authentication information abstract.
7. The system of claim 6, wherein the number of authentication node servers is one, the broadcast control management platform is further configured to create at least one broadcast control terminal, and generate a unique identifier for each broadcast control terminal and the device information digest;
the database server is further used for storing the device information abstract of each broadcast control terminal;
the broadcast control server is further configured to synchronize the device information abstract of each broadcast control terminal to the authentication node server;
the authentication node server is further configured to store a device information summary of each broadcast control terminal.
8. The system of claim 6, wherein the number of authentication node servers is at least two, the broadcast control management platform is further configured to create at least one broadcast control terminal, generate a unique identifier of each broadcast control terminal and the device information digest, and bind one authentication node server for each broadcast control terminal;
the database server is further used for storing the device information abstract of each broadcast control terminal;
the broadcast control server is further configured to synchronize the device information abstract of each broadcast control terminal to an authentication node server bound to the broadcast control terminal;
the authentication node server is further configured to store a device information digest of at least one broadcast control terminal bound to the authentication node server.
9. The system of claim 7 or 8, wherein the broadcast control management platform is further configured to create at least one broadcast control terminal, generate a unique identifier of each broadcast control terminal and the device information digest, and set a state of each broadcast control terminal as an illegal device or a legal device.
10. The system of claim 8, wherein the broadcast control management platform is further configured to modify a binding relationship between the broadcast control terminal and the authentication node server.
CN202310248425.3A 2023-03-13 2023-03-13 Authentication management method and system for broadcast control terminal Pending CN116388997A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310248425.3A CN116388997A (en) 2023-03-13 2023-03-13 Authentication management method and system for broadcast control terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310248425.3A CN116388997A (en) 2023-03-13 2023-03-13 Authentication management method and system for broadcast control terminal

Publications (1)

Publication Number Publication Date
CN116388997A true CN116388997A (en) 2023-07-04

Family

ID=86960697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310248425.3A Pending CN116388997A (en) 2023-03-13 2023-03-13 Authentication management method and system for broadcast control terminal

Country Status (1)

Country Link
CN (1) CN116388997A (en)

Similar Documents

Publication Publication Date Title
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
CN109409122B (en) File storage method, electronic device and storage medium
CN108876374B (en) Block chain network identity document authentication method and system
US20220394026A1 (en) Network identity protection method and device, and electronic equipment and storage medium
CN111079136B (en) Fog computing intrusion detection feature sharing system based on block chain technology
CN104954330B (en) A kind of methods, devices and systems to be conducted interviews to data resource
CN110909379B (en) Storage cluster permission determination method, device, equipment and storage medium
CN112152778B (en) Node management method and device and electronic equipment
CN113055176B (en) Terminal authentication method and system, terminal device, P2P verification platform and medium
CN111405223A (en) Video processing method, device and equipment
CN114338242B (en) Cross-domain single sign-on access method and system based on block chain technology
CN112235290B (en) Block chain-based Internet of things equipment management method and first Internet of things equipment
CN113255014B (en) Data processing method based on block chain and related equipment
CN112448946A (en) Log auditing method and device based on block chain
US20230325833A1 (en) Blockchain-based data processing method and apparatus, device, storage medium, and program product
CN111461720A (en) Identity verification method and device based on block chain, storage medium and electronic equipment
CN114629713B (en) Identity verification method, device and system
CN113765675A (en) Transaction data processing method, device, equipment and medium
US20240163118A1 (en) Blockchain-based data processing method, device, and readable storage medium
CN114116637A (en) Data sharing method, device, equipment and storage medium
CN117407437A (en) Block chain-based data processing method, equipment and readable storage medium
CN115225640B (en) CDN trusted digital content supervision method and system based on block chain
CN113872986B (en) Power distribution terminal authentication method and device and computer equipment
CN115866586A (en) Intelligent security authentication and identification system based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination