CN116886438A - Equipment security identity authentication method and system based on Internet of things - Google Patents

Equipment security identity authentication method and system based on Internet of things Download PDF

Info

Publication number
CN116886438A
CN116886438A CN202311060191.6A CN202311060191A CN116886438A CN 116886438 A CN116886438 A CN 116886438A CN 202311060191 A CN202311060191 A CN 202311060191A CN 116886438 A CN116886438 A CN 116886438A
Authority
CN
China
Prior art keywords
data
internet
things
random
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202311060191.6A
Other languages
Chinese (zh)
Inventor
黄馨之
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yangmaiyong Network Technology Co ltd
Original Assignee
Shanghai Yangmaiyong Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yangmaiyong Network Technology Co ltd filed Critical Shanghai Yangmaiyong Network Technology Co ltd
Priority to CN202311060191.6A priority Critical patent/CN116886438A/en
Publication of CN116886438A publication Critical patent/CN116886438A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The application is applicable to the technical field of the Internet of things, and particularly relates to a device security identity authentication method and system based on the Internet of things, wherein the method comprises the following steps: constructing an Internet of things local area network, generating an Internet of things equipment list, and setting a unique character string for each Internet of things equipment list; randomly selecting one Internet of things device, and acquiring random authentication data through the Internet of things device; performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result; and verifying the data sent by the Internet of things equipment based on the data insertion sequence, wherein the verification is passed and is regarded as the pass of equipment security authentication. According to the method, the device and the system, the Internet of things local area network is built, all Internet of things devices corresponding to the same gateway are included, and the device is verified by acquiring the random authentication data, so that in the data transmission process, the data verification efficiency is greatly improved, and the data transmission safety is ensured.

Description

Equipment security identity authentication method and system based on Internet of things
Technical Field
The application belongs to the technical field of the Internet of things, and particularly relates to an equipment security identity authentication method and system based on the Internet of things.
Background
The Internet of things is the Internet with everything connected, is an extended and expanded network based on the Internet, combines various information sensing devices with the network to form a huge network, and realizes the interconnection and intercommunication of people, machines and objects at any time and any place.
The internet of things is an important component of a new generation of information technology, and the IT industry is also called: the general interconnection means that the objects are connected and the objects are connected in all aspects. Therefore, the Internet of things is the Internet with which the things are connected. This has two layers of meaning: firstly, the core and the foundation of the Internet of things are still the Internet, and are an extended and expanded network based on the Internet; second, the user side extends and expands to any article to article for information exchange and communication. Therefore, the definition of the Internet of things is a network which is used for realizing intelligent identification, positioning, tracking, monitoring and management of objects by connecting any object with the Internet according to a stipulated protocol through information sensing equipment such as radio frequency identification, an infrared sensor, a global positioning system, a laser scanner and the like and carrying out information exchange and communication.
In the current internet of things system, a plurality of internet of things devices exist, data in the internet of things system can flow mutually, but in the flow process, the devices need to be verified, each time the devices need to be verified to carry out comprehensive identity verification, and performance burden can be caused on the internet of things devices.
Disclosure of Invention
The embodiment of the application aims to provide a device security identity authentication method based on the Internet of things, which aims to solve the problem that in the data transfer process, the devices need to be verified, and each time the devices need to be verified, comprehensive identity verification is needed, and performance burden is caused on the devices of the Internet of things.
The embodiment of the application is realized in such a way that the equipment security identity authentication method based on the Internet of things comprises the following steps:
constructing an Internet of things local area network, generating an Internet of things equipment list, and setting a unique character string for each Internet of things equipment list;
randomly selecting one Internet of things device, and acquiring random authentication data through the Internet of things device;
performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result;
and verifying the data sent by the Internet of things equipment based on the data insertion sequence, wherein the verification is passed and is regarded as the pass of equipment security authentication.
Preferably, the step of randomly selecting one internet of things device and obtaining random authentication data through the internet of things device specifically includes:
a preset random algorithm is called, and a plurality of groups of random numbers are generated based on the preset random algorithm;
continuously numbering all the Internet of things equipment in the Internet of things local area network to obtain an Internet of things equipment numbering table;
combining and screening based on a plurality of groups of random numbers to obtain random selection data, selecting equipment based on the relation between the random selection data and the serial numbers of the equipment of the Internet of things, and obtaining random authentication data.
Preferably, the step of performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result specifically includes:
converting the random authentication data into binary data to obtain random binary data;
a preset data dividing scheme is called, and random binary data is divided into a plurality of independent data segments based on the preset data dividing scheme;
and converting the independent data segments into decimal data to obtain a decimal data set, and generating a data insertion sequence based on the decimal data set.
Preferably, the step of verifying the data sent by the internet of things device based on the data insertion sequence, and if the verification passes, the verification is regarded as passing of the device security authentication specifically includes:
receiving a data packet to be verified, which is sent by the Internet of things equipment, and identifying data source equipment based on the data packet to be verified;
extracting a corresponding character string to be verified from the data packet to be verified based on the data source equipment, and calling a corresponding unique character string in the equipment list of the Internet of things;
and matching the character string to be verified with the unique character string, and if the character string to be verified and the unique character string can be overlapped, judging that the equipment safety authentication passes.
Preferably, unique character strings corresponding to different internet of things devices have the same byte length.
Preferably, the internet of things local area network at least comprises one gateway and two internet of things devices.
Another object of an embodiment of the present application is to provide an equipment security identity authentication system based on the internet of things, where the system includes:
the device information acquisition module is used for constructing an Internet of things local area network, generating an Internet of things device list and setting a unique character string for each Internet of things device list;
the authentication data acquisition module is used for randomly selecting one piece of internet of things equipment and acquiring random authentication data through the internet of things equipment;
the data conversion processing module is used for carrying out data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result;
and the device verification module is used for verifying the data sent by the Internet of things device based on the data insertion sequence, and the verification is considered as the passing of the device security authentication.
Preferably, the authentication data acquisition module includes:
the random number generation unit is used for calling a preset random algorithm and generating a plurality of groups of random numbers based on the preset random algorithm;
the device numbering unit is used for continuously numbering all the Internet of things devices in the Internet of things local area network to obtain an Internet of things device numbering table;
the device selection unit is used for combining and screening based on a plurality of groups of random numbers to obtain random selection data, selecting the device based on the relation between the random selection data and the serial numbers of the Internet of things devices, and acquiring random authentication data.
Preferably, the data conversion processing module includes:
the first data conversion unit is used for converting the random authentication data into binary data to obtain random binary data;
the data dividing unit is used for calling a preset data dividing scheme and dividing random binary data into a plurality of independent data segments based on the preset data dividing scheme;
and the second data conversion unit is used for converting the independent data segments into decimal data to obtain a decimal data set, and generating a data insertion sequence based on the decimal data set.
Preferably, the device authentication module includes:
the device identification unit is used for receiving the data packet to be verified, which is sent by the Internet of things device, and identifying the data source device based on the data packet to be verified;
the character string extraction unit is used for extracting a corresponding character string to be verified from the data packet to be verified based on the data source equipment and calling a corresponding unique character string in the equipment list of the Internet of things;
and the security authentication unit is used for matching the character string to be verified with the unique character string, and if the character string to be verified and the unique character string can be overlapped, the security authentication unit judges that the equipment passes the security authentication.
According to the equipment security identity authentication method based on the Internet of things, the Internet of things local area network is built, all the Internet of things equipment corresponding to the same gateway is included, and the equipment is verified by acquiring random authentication data, so that in the data transmission process, the efficiency of data verification is greatly improved, and the security of data transmission is ensured.
Drawings
Fig. 1 is a flowchart of an equipment security identity authentication method based on the internet of things, provided by an embodiment of the application;
fig. 2 is a flowchart of a step of randomly selecting an internet of things device and obtaining random authentication data through the internet of things device according to an embodiment of the present application;
FIG. 3 is a flowchart of a step of performing data conversion based on random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result according to an embodiment of the present application;
fig. 4 is a flowchart of a step of verifying data sent by an internet of things device based on a data insertion sequence, where verification is passed and is regarded as passing of device security authentication;
fig. 5 is a schematic diagram of an equipment security identity authentication system based on the internet of things according to an embodiment of the present application;
fig. 6 is a schematic diagram of an authentication data acquisition module according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a data conversion processing module according to an embodiment of the present application;
fig. 8 is a schematic diagram of an apparatus verification module according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of this disclosure.
As shown in fig. 1, a flowchart of a device security identity authentication method based on the internet of things according to an embodiment of the present application is provided, where the method includes:
s100, constructing an Internet of things local area network, generating an Internet of things device list, and setting a unique character string for each Internet of things device list.
In this step, an internet of things local area network is built, in a local area network, at least one gateway and at least two internet of things devices are included, the internet of things devices all perform data transmission through the gateway, the internet of things devices do not have a function of mobile data communication, only perform WIFI data transmission, therefore, the data transmission of the internet of things devices all needs to be transferred through the gateway, the data can be transferred and transmitted through the gateway transfer, a unique character string is set for each internet of things device, the unique character string can be a symbol of a specific type, such as a symbol formed by letters, and the model number and the corresponding unique character string of all the internet of things devices in the current local area network are recorded in an internet of things device list.
S200, randomly selecting one Internet of things device, and acquiring random authentication data through the Internet of things device.
In this step, one internet of things device is randomly selected, a random algorithm is built in the gateway for random selection, a plurality of random numbers can be generated by using the random algorithm, a plurality of groups of random numbers are processed according to a preset data processing process, each internet of things device is numbered, the selected internet of things device is determined according to the processing result of the random numbers and the number of the internet of things device, information is acquired based on the internet of things device, the information is from the internet of things device to obtain random authentication data, and the random authentication data can be images, videos, audios or data streams.
S300, performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result.
In this step, data conversion is performed based on random authentication data, where the data in the random authentication data does not need to identify the content specifically included in the random authentication data, but only needs to ensure randomness of the data, and further performs data conversion, such as binary conversion, on the random authentication data according to a preset data conversion mode, so as to generate a data conversion result, and performs data conversion based on the data conversion result, thereby determining insertion positions of different data, and obtaining a data insertion sequence.
S400, checking the data sent by the Internet of things equipment based on the data insertion sequence, and if the data passes the checking, the checking is regarded as the passing of equipment security authentication.
In the step, verification is carried out on data sent by the internet of things equipment based on the data insertion sequence, the internet of things equipment sends each data insertion sequence to the corresponding internet of things equipment, each internet of things equipment disassembles the corresponding unique character string according to the data insertion sequence, disassembles the unique character string into individual characters, obtains data to be transmitted, inserts the individual characters obtained through disassembly into the corresponding positions in the data to be transmitted according to the data insertion sequence, so as to obtain the data to be verified, after the data to be verified is received by the gateway, information extraction is carried out on the data to be verified according to the data insertion sequence, so that reliability of data sources is guaranteed, after verification is passed, the data are sent out, verification is regarded as equipment security authentication passing, interception is carried out, and identity verification needs to be carried out on the internet of things equipment.
As shown in fig. 2, as a preferred embodiment of the present application, the step of randomly selecting an internet of things device and obtaining random authentication data through the internet of things device specifically includes:
s201, a preset random algorithm is called, and a plurality of groups of random numbers are generated based on the preset random algorithm.
In this step, the preset random algorithm may be selected, and when the random algorithm is selected, the random algorithm may be selected one by one, for example, one random algorithm is switched every day, the total random algorithms are included, the numbers are respectively 1-10, the random algorithm is rotated every day, and after the random algorithm is selected, a plurality of groups of random numbers are generated based on the preset random algorithm.
S202, all the Internet of things devices in the Internet of things local area network are numbered continuously, and an Internet of things device numbering table is obtained.
S203, combining and screening based on a plurality of groups of random numbers to obtain random selection data, selecting equipment based on the relation between the random selection data and the serial numbers of the equipment of the Internet of things, and obtaining random authentication data.
In this step, all the internet of things devices in the internet of things local area network are continuously numbered, specifically, the random numbers comprise three groups, the random numbers are defined as a first random number, a second random number and a third random number based on the generation sequence, the average value of the first random number, the second random number and the third random number is calculated, the average value is compared with the serial numbers of the internet of things devices, the nearest serial number is selected as the selected internet of things device, before the selected internet of things device is numbered, then the absolute value of the difference value between the average value and the serial numbers of the internet of things devices is used for judging, the internet of things device with the minimum absolute value is selected, the internet of things device corresponding to the serial number of the internet of things device is sent to the internet of things device, the data acquisition request is carried out according to the type of the internet of things device, if the internet of things device has a camera function, the video is acquired, and the type of data acquisition is judged based on the same principle.
As shown in fig. 3, as a preferred embodiment of the present application, the step of performing data conversion based on random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result specifically includes:
s301, converting the random authentication data into binary data to obtain random binary data.
S302, a preset data dividing scheme is called, and random binary data is divided into a plurality of independent data segments based on the preset data dividing scheme.
In this step, the random authentication data is converted into binary data, specifically, the data is converted according to the conversion rule of the binary data, and the random binary data is obtained by conversion, because the random authentication data is randomly collected, and the random binary data is divided into a corresponding number of independent data segments according to the byte number of the unique character string of the internet of things device.
S303, converting the independent data segments into decimal data to obtain a decimal data set, and generating a data insertion sequence based on the decimal data set.
In this step, the independent data segments are converted into decimal data to obtain a decimal data set, the numerical value of the decimal data obtained by converting each independent data segment is counted, summation is performed based on the numerical values, the duty ratio of each decimal data is calculated, the insertion position of each character string is determined based on the duty ratio, if the total numerical value is 100, the first decimal data duty ratio is 8%, then the first character in the unique character string is inserted at 8% of the data to be transmitted, and based on the above steps, the insertion positions of other characters are determined to generate a data insertion sequence.
As shown in fig. 4, as a preferred embodiment of the present application, the step of verifying, based on the data insertion sequence, data sent by the internet of things device, and if the verification passes, the verification is regarded as passing of the device security authentication specifically includes:
s401, receiving a data packet to be verified, which is sent by the Internet of things equipment, and identifying data source equipment based on the data packet to be verified.
In the step, a data packet to be verified, which is sent by the internet of things equipment, is received, wherein the data packet to be verified is obtained by inserting a unique character string into a data packet to be transmitted generated by each internet of things equipment, and after the insertion is completed, the data packet to be verified is the data packet to be verified, and the data source equipment is identified based on the data packet to be verified.
S402, extracting a corresponding character string to be verified from the data packet to be verified based on the data source equipment, and calling a corresponding unique character string in the equipment list of the Internet of things.
In this step, the data source device extracts the corresponding character string to be verified from the data packet to be verified, and the gateway stores the data insertion sequence corresponding to the internet of things device, so that the inserted character can be reversely deduced accordingly, the inserted character can be extracted, and the unique character string corresponding to the internet of things device list can be retrieved.
S403, matching the character string to be verified with the unique character string, and if the character string to be verified and the unique character string can be overlapped, judging that the equipment safety authentication passes.
In this step, the character string to be verified is matched with the unique character string, and a comparison is performed, if the character string to be verified and the unique character string can be overlapped, the internal data is indicated to be transmitted in a permitted manner, and if the character string to be verified and the unique character string are different, the data source is indicated to be unreliable and cannot be transmitted.
As shown in fig. 5, an apparatus security identity authentication system based on the internet of things according to an embodiment of the present application includes:
the device information collection module 100 is configured to construct an internet of things local area network, generate an internet of things device list, and set a unique character string for each internet of things device list.
In the system, the device information acquisition module 100 constructs an internet of things local area network, in one local area network, at least comprises a gateway and at least two internet of things devices, the internet of things devices all perform data transmission through the gateway, the internet of things devices do not have a function of mobile data communication and only perform WIFI data transmission, therefore, the internet of things devices perform data transmission and all need to transit through the gateway, the data can be transferred and transmitted through the gateway transit, a unique character string is set for each internet of things device, the unique character string can be a symbol of a specific type, such as a letter composition, and the model number of all the internet of things devices in the current local area network and the corresponding unique character string are recorded in an internet of things device list.
The authentication data acquisition module 200 is configured to randomly select an internet of things device, and acquire random authentication data through the internet of things device.
In the system, the authentication data acquisition module 200 randomly selects one internet of things device, a random algorithm is built in the gateway for random selection, a plurality of random numbers can be generated by using the random algorithm, a plurality of groups of random numbers are processed according to a preset data processing process, each internet of things device is numbered, the selected internet of things device is determined according to the processing result of the random numbers and the number of the internet of things device, information acquisition is performed based on the internet of things device, the information comes from the internet of things device to obtain random authentication data, and the random authentication data can be images, videos, audios or data streams.
The data conversion processing module 300 is configured to perform data conversion based on the random authentication data, obtain a data conversion result, and determine a data insertion sequence according to the data conversion result.
In the system, the data conversion processing module 300 performs data conversion based on random authentication data, wherein the data in the random authentication data does not need to identify the content specifically contained in the random authentication data, only needs to ensure the randomness of the data, and further performs data conversion on the random authentication data according to a preset data conversion mode, such as binary conversion on the random authentication data, so as to generate a data conversion result, and performs data conversion on the binary authentication data based on the data conversion result, so that the insertion positions of different data are determined, and a data insertion sequence is obtained.
The device verification module 400 is configured to verify, based on the data insertion sequence, data sent by the internet of things device, and if the verification passes, the verification is regarded as passing of the device security authentication.
In the system, the device verification module 400 performs verification on data sent by the internet of things device based on the data insertion sequence, the internet of things device sends each data insertion sequence to the corresponding internet of things device, each internet of things device disassembles the corresponding unique character string according to the data insertion sequence, disassembles the unique character string into individual characters, obtains data to be transmitted, inserts the individual characters obtained by disassembling into the corresponding positions in the data to be transmitted according to the data insertion sequence, so as to obtain the data to be verified, the gateway extracts information from the data to be verified according to the data insertion sequence after receiving the data to be verified, so as to ensure the reliability of data sources, sends the data after verification is passed, and the data passes verification to be regarded as device security authentication, intercepts the data and needs identity verification on the internet of things device.
As shown in fig. 6, as a preferred embodiment of the present application, the authentication data acquisition module 200 includes:
the random number generating unit 201 is configured to invoke a preset random algorithm, and generate a plurality of groups of random numbers based on the preset random algorithm.
In this module, the random number generating unit 201 may call a preset random algorithm, and the random algorithms may be multiple, and when selecting, the random algorithm may be selected one by one, for example, one random algorithm may be switched every day, and the total number of the random algorithms is 1-10, and the random algorithms are respectively numbered, and after call, a plurality of groups of random numbers are generated based on the preset random algorithm.
The device numbering unit 202 is configured to continuously number all the devices of the internet of things in the internet of things local area network, and obtain an internet of things device numbering table.
The device selecting unit 203 is configured to combine and filter based on multiple sets of random numbers to obtain random selection data, perform device selection based on a relationship between the random selection data and a number of the internet of things device, and obtain random authentication data.
In the module, all the Internet of things devices in the Internet of things local area network are numbered continuously, specifically, the random numbers comprise three groups, the random numbers are defined as a first random number, a second random number and a third random number based on the generation sequence, the average value of the first random number, the second random number and the third random number is calculated, the average value is compared with the serial numbers of the Internet of things devices, the nearest serial number is selected as the selected Internet of things device, before the selected Internet of things device is numbered, then the judgment is carried out according to the absolute value of the difference value between the average value and the serial numbers of the Internet of things devices, the Internet of things device with the minimum absolute value is selected, the data acquisition request is sent to the Internet of things device, the data acquisition is carried out according to the type of the Internet of things device, if the Internet of things device has a camera function, the video is acquired, and the type of data acquisition is judged based on the same principle.
As shown in fig. 7, as a preferred embodiment of the present application, the data conversion processing module 300 includes:
the first data conversion unit 301 is configured to convert the random authentication data into binary data, and obtain random binary data.
The data dividing unit 302 is configured to invoke a preset data dividing scheme, and divide the random binary data into a plurality of independent data segments based on the preset data dividing scheme.
In this module, the first data conversion unit 301 converts the random authentication data into binary data, specifically, performs data conversion according to a conversion rule of the binary data, and obtains the random binary data by performing conversion, because the random authentication data is randomly collected, and the random binary data is divided into a corresponding number of independent data segments according to the number of bytes of the unique character string of the internet of things device.
A second data conversion unit 303, configured to convert the independent data segments into decimal data, obtain a decimal data set, and generate a data insertion sequence based on the decimal data set.
In this module, the second data conversion unit 303 converts the independent data segments into decimal data to obtain a decimal data set, counts the numerical value of the decimal data converted by each independent data segment, sums the numerical values based on the numerical values, calculates the duty ratio of each decimal data, determines the insertion position of each character string based on the duty ratio, if the total numerical value is 100, and the first decimal data duty ratio is 8%, then the first character in the unique character string is inserted at 8% of the data to be transmitted, determines the insertion positions of other characters based on the steps, and generates a data insertion sequence.
As shown in fig. 8, as a preferred embodiment of the present application, the device authentication module 400 includes:
the device identification unit 401 is configured to receive a data packet to be verified sent from an internet of things device, and identify a data source device based on the data packet to be verified.
In this module, the device identification unit 401 receives a to-be-verified data packet sent from an internet of things device, where the to-be-verified data packet is obtained by inserting a unique character string into a to-be-transmitted data packet generated by each internet of things device, and after the insertion is completed, the to-be-verified data packet is the to-be-verified data packet, and identifies a data source device based on the to-be-verified data packet.
The character string extracting unit 402 is configured to extract a corresponding character string to be verified from the data packet to be verified based on the data source device, and call a unique character string corresponding to the internet of things device list.
In this module, the character string extracting unit 402 extracts the corresponding character string to be verified from the data packet to be verified based on the data source device, and since the data insertion sequence corresponding to the internet of things device is also stored in the gateway, the inserted character can be reversely deduced accordingly, the inserted character can be extracted, and the unique character string corresponding to the internet of things device list can be retrieved.
And the security authentication unit 403 is configured to match the character string to be verified with the unique character string, and if the two character strings can be overlapped, determine that the security authentication of the device passes.
In this module, the security authentication unit 403 matches the character string to be verified with the unique character string, performs a comparison, if the two can be overlapped, the description is internal data, transmission is permitted, and if the two are different, the description is unreliable in data source and cannot be transmitted.
In one embodiment, a computer device is presented, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
the method comprises the following steps:
constructing an Internet of things local area network, generating an Internet of things equipment list, and setting a unique character string for each Internet of things equipment list;
randomly selecting one Internet of things device, and acquiring random authentication data through the Internet of things device;
performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result;
and verifying the data sent by the Internet of things equipment based on the data insertion sequence, wherein the verification is passed and is regarded as the pass of equipment security authentication.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor causes the processor to perform the steps of:
the method comprises the following steps:
constructing an Internet of things local area network, generating an Internet of things equipment list, and setting a unique character string for each Internet of things equipment list;
randomly selecting one Internet of things device, and acquiring random authentication data through the Internet of things device;
performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result;
and verifying the data sent by the Internet of things equipment based on the data insertion sequence, wherein the verification is passed and is regarded as the pass of equipment security authentication.
It should be understood that, although the steps in the flowcharts of the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.

Claims (10)

1. An equipment security identity authentication method based on the internet of things is characterized by comprising the following steps:
constructing an Internet of things local area network, generating an Internet of things equipment list, and setting a unique character string for each Internet of things equipment list;
randomly selecting one Internet of things device, and acquiring random authentication data through the Internet of things device;
performing data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result;
and verifying the data sent by the Internet of things equipment based on the data insertion sequence, wherein the verification is passed and is regarded as the pass of equipment security authentication.
2. The method for authenticating the security identity of the device based on the internet of things according to claim 1, wherein the step of randomly selecting one device of the internet of things and obtaining the random authentication data through the device of the internet of things specifically comprises:
a preset random algorithm is called, and a plurality of groups of random numbers are generated based on the preset random algorithm;
continuously numbering all the Internet of things equipment in the Internet of things local area network to obtain an Internet of things equipment numbering table;
combining and screening based on a plurality of groups of random numbers to obtain random selection data, selecting equipment based on the relation between the random selection data and the serial numbers of the equipment of the Internet of things, and obtaining random authentication data.
3. The method for authenticating the security identity of the device based on the internet of things according to claim 1, wherein the step of performing data conversion based on the random authentication data to obtain a data conversion result and determining the data insertion sequence according to the data conversion result specifically comprises the steps of:
converting the random authentication data into binary data to obtain random binary data;
a preset data dividing scheme is called, and random binary data is divided into a plurality of independent data segments based on the preset data dividing scheme;
and converting the independent data segments into decimal data to obtain a decimal data set, and generating a data insertion sequence based on the decimal data set.
4. The method for authenticating the device security identity based on the internet of things according to claim 1, wherein the step of verifying the data sent by the device of the internet of things based on the data insertion sequence, and considering that the verification passes the verification as passing the device security authentication specifically comprises the steps of:
receiving a data packet to be verified, which is sent by the Internet of things equipment, and identifying data source equipment based on the data packet to be verified;
extracting a corresponding character string to be verified from the data packet to be verified based on the data source equipment, and calling a corresponding unique character string in the equipment list of the Internet of things;
and matching the character string to be verified with the unique character string, and if the character string to be verified and the unique character string can be overlapped, judging that the equipment safety authentication passes.
5. The internet of things-based device security identity authentication method of claim 1, wherein unique strings corresponding to different internet of things devices have the same byte length.
6. The internet of things-based equipment security identity authentication method according to claim 1, wherein the internet of things local area network at least comprises a gateway and two internet of things equipment.
7. An equipment security identity authentication system based on the internet of things, which is characterized by comprising:
the device information acquisition module is used for constructing an Internet of things local area network, generating an Internet of things device list and setting a unique character string for each Internet of things device list;
the authentication data acquisition module is used for randomly selecting one piece of internet of things equipment and acquiring random authentication data through the internet of things equipment;
the data conversion processing module is used for carrying out data conversion based on the random authentication data to obtain a data conversion result, and determining a data insertion sequence according to the data conversion result;
and the device verification module is used for verifying the data sent by the Internet of things device based on the data insertion sequence, and the verification is considered as the passing of the device security authentication.
8. The internet of things-based device security identity authentication system of claim 7, wherein the authentication data acquisition module comprises:
the random number generation unit is used for calling a preset random algorithm and generating a plurality of groups of random numbers based on the preset random algorithm;
the device numbering unit is used for continuously numbering all the Internet of things devices in the Internet of things local area network to obtain an Internet of things device numbering table;
the device selection unit is used for combining and screening based on a plurality of groups of random numbers to obtain random selection data, selecting the device based on the relation between the random selection data and the serial numbers of the Internet of things devices, and acquiring random authentication data.
9. The internet of things-based device security identity authentication system of claim 7, wherein the data conversion processing module comprises:
the first data conversion unit is used for converting the random authentication data into binary data to obtain random binary data;
the data dividing unit is used for calling a preset data dividing scheme and dividing random binary data into a plurality of independent data segments based on the preset data dividing scheme;
and the second data conversion unit is used for converting the independent data segments into decimal data to obtain a decimal data set, and generating a data insertion sequence based on the decimal data set.
10. The internet of things-based device security identity authentication system of claim 7, wherein the device verification module comprises:
the device identification unit is used for receiving the data packet to be verified, which is sent by the Internet of things device, and identifying the data source device based on the data packet to be verified;
the character string extraction unit is used for extracting a corresponding character string to be verified from the data packet to be verified based on the data source equipment and calling a corresponding unique character string in the equipment list of the Internet of things;
and the security authentication unit is used for matching the character string to be verified with the unique character string, and if the character string to be verified and the unique character string can be overlapped, the security authentication unit judges that the equipment passes the security authentication.
CN202311060191.6A 2023-08-22 2023-08-22 Equipment security identity authentication method and system based on Internet of things Withdrawn CN116886438A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311060191.6A CN116886438A (en) 2023-08-22 2023-08-22 Equipment security identity authentication method and system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311060191.6A CN116886438A (en) 2023-08-22 2023-08-22 Equipment security identity authentication method and system based on Internet of things

Publications (1)

Publication Number Publication Date
CN116886438A true CN116886438A (en) 2023-10-13

Family

ID=88270153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311060191.6A Withdrawn CN116886438A (en) 2023-08-22 2023-08-22 Equipment security identity authentication method and system based on Internet of things

Country Status (1)

Country Link
CN (1) CN116886438A (en)

Similar Documents

Publication Publication Date Title
CN108646983B (en) Processing method and device for storing service data on block chain
CN110175840B (en) Method, client, alliance chain and system for realizing light wallet mechanism in alliance chain
US11418677B2 (en) Method for preventing image modification, image capturing device and image verification method
CN109614789B (en) Terminal equipment verification method and equipment
CN111343179B (en) Real-time consensus method and device for authenticity of data on link
CN110928880B (en) Data processing method, device, terminal and medium based on block chain
CN111506632A (en) Data processing method and device
CN112003888B (en) Blockchain-based certificate management method, device, equipment and readable medium
CN111224782B (en) Data verification method based on digital signature, intelligent device and storage medium
CN111367923A (en) Data processing method, data processing device, node equipment and storage medium
CN111124421B (en) Abnormal contract data detection method and device for blockchain intelligent contract
CN111612476A (en) Secondary check anti-counterfeiting method, device, equipment and storage medium
TWI820064B (en) Securing digital data transmission in a communication network
CN110990410B (en) Information searching method and device in block chain, storage medium and computer equipment
CN110941854B (en) Method and device for saving and recovering private data based on secure multi-party computing
CN116886438A (en) Equipment security identity authentication method and system based on Internet of things
JP6992309B2 (en) Transmitter, receiver, and communication method
CN112417468B (en) Data processing method, device, electronic equipment and computer storage medium
CN113395281B (en) Verification method and device capable of verifying statement and electronic equipment
CN112469034B (en) Internet of things gateway device capable of safely authenticating physical sensing equipment and access method thereof
CN112465516B (en) Block chain network-based device management method, related device and storage medium
CN111901324B (en) Method, device and storage medium for flow identification based on sequence entropy
CN114238914A (en) Digital certificate application system, method, device, computer equipment and storage medium
CN115935299A (en) Authorization control method, device, computer equipment and storage medium
CN116112186B (en) Electronic signature anti-counterfeiting method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20231013

WW01 Invention patent application withdrawn after publication