CN117896110A - Verification method and device of equipment, electronic equipment and storage medium - Google Patents

Verification method and device of equipment, electronic equipment and storage medium Download PDF

Info

Publication number
CN117896110A
CN117896110A CN202311800082.3A CN202311800082A CN117896110A CN 117896110 A CN117896110 A CN 117896110A CN 202311800082 A CN202311800082 A CN 202311800082A CN 117896110 A CN117896110 A CN 117896110A
Authority
CN
China
Prior art keywords
equipment
target
key
type
target network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311800082.3A
Other languages
Chinese (zh)
Inventor
史泽坤
李绍斌
唐杰
王沅召
潘晓飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202311800082.3A priority Critical patent/CN117896110A/en
Publication of CN117896110A publication Critical patent/CN117896110A/en
Pending legal-status Critical Current

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The embodiment of the invention provides a device verification method, a device, an electronic device and a storage medium, and relates to the technical field of intelligent home control. And responding to a network access request which is sent by the first equipment and used for accessing the target network, acquiring a first equipment parameter of the first equipment, wherein the first equipment parameter at least comprises one of a first equipment type and a first equipment key, the first equipment key is used for encrypting the interacted target data when the first equipment interacts data with other equipment in the target network, and if the first equipment is successfully authenticated according to the first equipment type and the first equipment key or according to the first equipment type, the first equipment is allowed to access the target network, so that the risk of accessing the network by unauthorized equipment is reduced, and the network security is improved.

Description

Verification method and device of equipment, electronic equipment and storage medium
Technical Field
The present invention relates to the field of smart home control technology, and in particular, to a device verification method, a device verification apparatus, an electronic device, and a computer readable storage medium.
Background
The internet of things (InternetofThings, ioT) refers to a technology for realizing ubiquitous connection of objects and people through various needed information and various possible network access, and realizing intelligent perception, identification and management of objects and processes. With the wider and wider application of the internet of things technology, the security problem of the internet of things is increasingly highlighted due to the access of large-scale equipment and complex and diverse deployment environments. With the rapid development of the internet of things technology and the rise of intelligent home, the problem of network security is increasingly prominent, and the potential risks can be caused by different devices accessing corresponding networks. In the process of detecting the access of the device, the problem that the access of illegal devices cannot be effectively prevented, so that data leakage is easy to occur exists.
Disclosure of Invention
The embodiment of the invention provides a device verification method, a device, an electronic device and a computer readable storage medium, which are used for solving or partially solving the problem that illegal device access cannot be effectively prevented.
The embodiment of the invention discloses a verification method of equipment, which is applied to an equipment verification system, wherein the equipment verification system is accessed into a target network, and the method comprises the following steps:
In response to receiving a network access request sent by a first device and accessing to the target network, acquiring a first device parameter of the first device, wherein the first device parameter at least comprises one of a first device type and a first device key, and the first device key is used for encrypting interacted target data when the first device performs data interaction with other devices in the target network;
and if the identity of the first equipment is verified successfully according to the first equipment type and the first equipment key or according to the first equipment type, allowing the first equipment to access the target network.
In some possible embodiments, the device authentication system stores a target device parameter of a target device that successfully accesses the target network, where the target device parameter includes a target device identifier, a target device type, and a target device key, and if authentication of the first device according to the first device type and the first device key, or according to the first device type, the first device is allowed to access the target network, including:
if the first equipment type exists in the target equipment type, extracting a first equipment identifier of the first equipment from the first equipment parameter;
If the first equipment identifier exists in the target equipment identifier, comparing a first equipment key belonging to the same equipment identifier with the target equipment key;
and if the first device key is the same as the target device key, allowing the first device to access the target network.
In some possible embodiments, the allowing the first device to access the target network if the authentication of the first device according to the first device type and the first device key or according to the first device type is successful further includes:
if the first equipment type does not exist in the target equipment type, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the allowing the first device to access the target network if the authentication of the first device according to the first device type and the first device key or according to the first device type is successful further includes:
If the first equipment identifier of the first equipment does not exist in the target equipment identifier, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the allowing the first device to access the target network if the authentication of the first device according to the first device type and the first device key or according to the first device type is successful further includes:
if the first equipment key is different from the target equipment key, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the method further comprises:
responding to a periodic verification instruction aiming at the first equipment, acquiring a current time point and a verification time point of the first equipment, wherein the verification time is a time point recorded by the equipment verification system when the first equipment successfully performs identity verification for the last time;
if the time difference between the current time point and the verification time point is greater than or equal to a preset duration, verifying the identity of the first device according to at least one of a first device type, a first device identifier and a first device key of the first device;
and if the time difference between the current time point and the verification time point is smaller than the preset duration, not executing the identity verification processing of the first equipment.
In some possible embodiments, the method further comprises:
in response to detecting that the first device sends target data to a second device, obtaining a second device parameter of the second device, wherein the second device parameter at least comprises one of a second device type and a second device key;
and if the identity of the second device is verified successfully according to the second device type and the second device key or according to the second device type, allowing the second device to access the target network so that the second device executes corresponding operation according to the target data.
The embodiment of the invention also provides a verification device of equipment, which is applied to an equipment verification system, wherein the equipment verification system is accessed into a target network, and the device comprises:
the system comprises a parameter acquisition module, a target network acquisition module and a data processing module, wherein the parameter acquisition module is used for acquiring first equipment parameters of first equipment in response to receiving a network access request which is sent by the first equipment and is used for accessing the target network, the first equipment parameters at least comprise one of a first equipment type and a first equipment key, and the first equipment key is used for encrypting interacted target data when the first equipment performs data interaction with other equipment in the target network;
and the device verification module is used for allowing the first device to access the target network if the identity of the first device is verified successfully according to the first device type and the first device key or according to the first device type.
In some possible embodiments, the device authentication system stores a target device parameter of a target device that successfully accesses the target network, where the target device parameter includes a target device identifier, a target device type, and a target device key, and the device authentication module is specifically configured to:
If the first equipment type exists in the target equipment type, extracting a first equipment identifier of the first equipment from the first equipment parameter;
if the first equipment identifier exists in the target equipment identifier, comparing a first equipment key belonging to the same equipment identifier with the target equipment key;
and if the first device key is the same as the target device key, allowing the first device to access the target network.
In some possible embodiments, the device authentication module is specifically further configured to:
if the first equipment type does not exist in the target equipment type, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the device authentication module is specifically further configured to:
if the first equipment identifier of the first equipment does not exist in the target equipment identifier, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
And responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the device authentication module is specifically further configured to:
if the first equipment key is different from the target equipment key, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, further comprising:
the time acquisition module is used for responding to a periodic verification instruction aiming at the first equipment to acquire a current time point and a verification time point of the first equipment, wherein the verification time is a time point recorded by the equipment verification system when the first equipment successfully performs identity verification for the last time;
The identity verification module is used for carrying out identity verification on the first equipment according to at least one of a first equipment type, a first equipment identifier and a first equipment key of the first equipment if the time difference between the current time point and the verification time point is larger than or equal to a preset duration;
and the processing module is used for not executing the identity authentication processing of the first equipment if the time difference between the current time point and the authentication time point is smaller than the preset duration.
In some possible embodiments, further comprising:
a data acquisition module, configured to acquire a second device parameter of a second device in response to detecting that the first device sends target data to the second device, where the second device parameter includes at least one of a second device type and a second device key;
and the device processing module is used for allowing the second device to access the target network if the identity verification of the second device is successful according to the second device type and the second device key or according to the second device type, so that the second device executes corresponding operation according to the target data.
The embodiment of the invention also discloses electronic equipment, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
the memory is used for storing a computer program;
the processor is configured to implement the method according to the embodiment of the present invention when executing the program stored in the memory.
Embodiments of the present invention also disclose a computer-readable storage medium having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the method according to the embodiments of the present invention.
The embodiment of the invention has the following advantages:
the embodiment of the invention can be applied to a device verification system, the device verification system can be accessed to a target network, and for the device accessed to the target network, the device verification system can respond to the network access request which is sent by the first device and is accessed to the target network, and acquire the first device parameter of the first device, wherein the first device parameter at least comprises one of a first device type and a first device key, the first device key is used for encrypting the interacted target data when the first device performs data interaction with other devices in the target network, and if the first device type and the first device key or the first device type are used for successfully performing identity verification on the first device, the device verification system in the target network can be allowed to access the target network, so that under the condition that the device is to access the corresponding target network, the device verification system in the target network can perform identity verification on the device based on the device type, the device key and other parameters of the device, the risk of accessing the network is reduced, and the security of the network is improved.
Drawings
FIG. 1 is a flow chart of steps of a method for authenticating a device provided in an embodiment of the present invention;
FIG. 2 is a schematic diagram of device communication provided in an embodiment of the invention;
FIG. 3 is a schematic flow chart of device authentication provided in an embodiment of the present invention;
FIG. 4 is a block diagram of a device for verifying an apparatus provided in an embodiment of the present invention;
fig. 5 is a block diagram of an electronic device provided in an embodiment of the invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
As an example, with the rapid development of internet of things technology and the rise of smart home, network security problems are increasingly highlighted. When different devices access a designated network, there may be a potential risk of the network due to unauthorized devices. In the process of detecting the access of the device, the problem that the access of illegal devices cannot be effectively prevented, so that data leakage is easy to occur exists.
In this regard, in the embodiment of the present invention, by deploying the device authentication system in the designated network, when there is a corresponding device access network, the device authentication system may obtain, in response to receiving a network access request sent by the first device to access the target network, a first device parameter of the first device, where the first device parameter includes at least one of a first device type and a first device key, and the first device key is used to encrypt target data interacted when the first device interacts with other devices in the target network, and if the first device type and the first device key or the first device type successfully perform identity authentication on the first device, the device authentication system in the target network may allow the first device to access the target network, so that under a condition that the device is to access the corresponding target network, the device authentication system in the target network may perform identity authentication on the device based on parameters such as the device type and the device key of the device, thereby reducing the risk of accessing the unauthorized device to the network, and improving the security of the network.
Referring to fig. 1, a step flowchart of an authentication method of a device provided in an embodiment of the present invention is applied to a device authentication system, where the device authentication system accesses a target network, and may specifically include the following steps:
step 101, in response to receiving a network access request sent by a first device and accessing to the target network, acquiring a first device parameter of the first device, where the first device parameter at least includes one of a first device type and a first device key, and the first device key is used to encrypt target data interacted when the first device performs data interaction with other devices in the target network;
in the embodiment of the invention, for the device verification system, the device verification system can be a system which is accessed into a specified target network and is used for accessing a technical system for verifying the identity and the integrity of the device of the target network. The device verification system can run a system of local devices or a system running on the cloud, and can be directly accessed to a target network through a local network; for the device verification system running in the cloud end, the device verification system may access the target network through a remote network, it should be noted that in the embodiment of the present invention, an example is described by taking the device verification system running in the local device as an example, and it is understood that the device verification system running in the cloud end may also perform the same operation as the device verification system running in the local device.
In addition, for the target network, the network with higher security level is adopted, and for the equipment accessing to the target network, the equipment needs to be authenticated through the equipment authentication system, and the equipment can access to the target network and interact data with other equipment accessing to the target network.
In an example, referring to fig. 2, a schematic diagram of device communication provided in an embodiment of the present invention is shown, where a device authentication system is deployed in a target network, and at the same time, there are several devices accessing the target network locally, and when the target device initiates a network access request for the target network, the device authentication system may perform identity authentication on the target device to determine whether it can access the target network.
In an application example, the target network may be applied to the internet of things, smart home, industrial automation, etc., for example, in the smart home, a user may access different home appliances to the same local area network, so that each home appliance may communicate through the local area network, so as to implement related functions of the smart home. Specifically, in the smart home scenario, if the devices that can access the local area network include a door lock, a router, an air conditioner, a refrigerator, a washing machine, a switch, a television, a lamp, a purifier, a humidifier, a central control device and the like, when each device accesses the local area network, the identity of the device can be verified through a device verification system, so that the device is allowed to access the local area network and pass other devices in the local area network under the condition that the verification passes.
In some possible implementations, the device verification system may be a database that may be used to manually record and store device parameters for all devices accessing the target network. The device parameters at least can include a device type, a device identifier, a device key and the like, wherein the device type can be used for identifying the types of different devices (such as acquisition devices, execution devices, control devices and the like); the device identifier may be used to identify a unique device, different devices corresponding to different device identifiers; the device key may be used to encrypt data transmitted during data interaction between devices, etc.
In a specific implementation, when any device initiates a network access request, the device may carry its device parameter in the network access request, and send the device parameter to a device verification system for identity verification, so that the device verification system may extract the device parameter of the device from the network access request, so as to perform identity verification on the device that needs to access the target network through the device parameter. For example, assuming that the first device needs to access the target network, the first device may carry its first device parameter (including one of the first device type and the first device key) with the network access request, and then send the network access request to the device authentication system, which performs authentication on the first device based on the received first device parameter.
It should be noted that, for the first device parameter sent by the first device, the first device parameter may include a first device type, a first device key, a first device identifier, and the like, where the first device key does not necessarily exist in the first device parameter, the device key is a unique key allocated by the device authentication system to a device successfully accessing the target network and corresponding to the device, and if the first device initiates a network access request to the target network for the first time, the first device parameter does not include the first device key; if the first device has previously accessed the target network, the first device parameter may include a first device key assigned to the first device by the device authentication system history.
In addition, for the device key, the device authentication system may generate a 16-bit random number and letter key for each device that successfully accesses the target network for data encryption and authentication between subsequent devices. For example, assuming that the target network is a local area network of the smart home, devices successfully accessing the local area network include a door lock, a router, an air conditioner, a refrigerator, a washing machine, a switch, a television, a lamp, a purifier, a humidifier, a central control device and the like, the device verification system may record the following corresponding information:
Temperature sensor: collecting device-identification a-key a
Humidity sensor: collecting device-identification B-key B
Smoke sensor: collecting device-identification C-key C
Door lock: executing a device-identification D-key D
And (3) a router: network device-identification E-key E
Air conditioner: executing a device-identification F-key F
Refrigerator: executing a device-identification G-key G
A washing machine: executing device-identification H-key H
And (3) a switch: executing device-identification I-key I
Television: executing device-identity J-key J
The lamp comprises: executing a device-identification K-key K
A purifier: executing a device-identifying L-key L
A humidifier: executing device-identification M-key M
And the central control equipment comprises: control device-identification N-key N
Through the recorded information, the method can be used for carrying out identity verification on the equipment accessed to the target network so as to ensure that the equipment accessed to the target network is authorized equipment, reduce the risk of accessing the network by unauthorized equipment and improve the security of the network.
Step 102, if the authentication of the first device is successful according to the first device type and the first device key or according to the first device type, allowing the first device to access the target network.
According to the embodiment of the invention, the device verification system can execute a corresponding identity verification process according to the first device parameters according to whether the first device accesses the target network or not, and allow the first device to access the target network under the condition that the identity verification of the first device is successful, so that the first device can communicate with other devices in the target network, and the device verification system in the target network can verify the identity of the device based on the device type, the device key and other parameters of the device under the condition that the device is about to access the corresponding target network, thereby reducing the risk of unauthorized device accessing the network and improving the security of the network.
In the foregoing embodiment, the target device parameter of the target device that successfully accesses the target network may be stored in the device verification system, where the target device parameter includes a target device identifier, a target device type, and a target device key, and if the target device parameter includes the target device identifier, the device verification system may compare the verification parameter of the first device with the target device parameter, and perform identity verification on the first device, specifically, the device verification system may verify that the first device type of the first device exists in the recorded target device type, if the first device type exists in the target device type, may further extract the first device identifier of the first device from the first device parameter, and then determine whether the first device identifier exists in the recorded target device identifier, and if the first device identifier exists in the target device identifier, and if the first device key exists in the first device parameter, the device verification system may further compare the first device key belonging to the same device identifier with the target device key, and if the first device key is the same as the target device key, allow the first device to access the target network, thereby reducing the risk that the first device needs to access the network effectively by the device type, the device identifier, and the device layer of the identity of the device need to be accessed to the network, and the security risk of the network is reduced.
In a specific implementation, if the first equipment type does not exist in the target equipment type, outputting risk prompt information for the first equipment, wherein the risk prompt information is used for prompting whether a user manually adds the first equipment into the target network, if the user manually adds the first equipment into the target network, the equipment verification system can respond to network access operation for the first equipment, record the first equipment type and the first equipment identification, allocate a corresponding first equipment key for the first equipment, and allow the first equipment to access the target network, so that identity verification is carried out on equipment which needs to access the target network layer by layer through the equipment type, the equipment identification, the equipment key and the like, the risk of accessing the network by unauthorized equipment is effectively reduced, the security of the network is improved, and meanwhile, the legality of the equipment which accesses the target network is further ensured by the mode of manual addition of the user, and the security of the target network is effectively ensured.
If the first equipment type of the first equipment exists in the target equipment type, but the first equipment identification does not exist in the target equipment identification, the equipment verification system can output risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network, if the first equipment is manually added into the target network by a user, the equipment verification system responds to network access operation aiming at the first equipment, records the first equipment type and the first equipment identification, distributes a corresponding first equipment key for the first equipment, and allows the first equipment to access the target network, so that the equipment which needs to be accessed into the target network is verified layer by layer through the equipment type, the equipment identification, the equipment key and the like, the risk of accessing the network by the unauthorized equipment is effectively reduced, the safety of the network is improved, and meanwhile, the legality of the equipment which is accessed into the target network is further ensured by the manual adding mode of the user, and the safety of the target network is effectively ensured.
Correspondingly, if the first equipment type of the first equipment is stored in the target equipment type, and the first equipment identifier exists in the target equipment identifier, but the first equipment key is different from the target equipment key, the risk prompt information aiming at the first equipment is output, the risk prompt information is used for prompting whether the first equipment is manually added into the target network, if the first equipment is manually added into the target network by a user, the equipment verification system responds to the network access operation aiming at the first equipment, records the first equipment type and the first equipment identifier, distributes the corresponding first equipment key for the first equipment, and allows the first equipment to access the target network, so that the equipment needing to be accessed into the target network is subjected to identity verification layer by layer through the equipment type, the equipment identifier, the equipment key and the like, the risk of unauthorized equipment accessing into the network is effectively reduced, the safety of the network is improved, and meanwhile, the legality of the equipment accessing into the target network is further ensured by the manual adding mode of the user, and the safety of the target network is effectively ensured.
In addition, if the user does not manually join the first device in the target network, the device authentication system may send an authentication failure message to the first device and prohibit the first device from accessing the target network, so as to prompt the first device that authentication fails through the authentication failure message.
Optionally, for a device that has access to the target network, the device verification system may also periodically perform time-efficient verification on the device to ensure that the device that has access to the target network is still in a valid state. In some possible implementations, for example, for a first device that successfully accesses the target network, the device authentication system may obtain, in response to a periodic authentication instruction for the first device, a current time point and an authentication time point of the first device, where the authentication time is a time point recorded by the device authentication system when the first device successfully performs identity authentication for the last time, and if a time difference between the current time point and the authentication time point is greater than or equal to a preset duration, perform identity authentication on the first device according to at least one of a first device type, a first device identifier, and a first device key of the first device; if the time difference between the current time point and the verification time point is smaller than the preset duration, the identity verification processing of the first device is not executed.
The device verification system can perform timeliness verification on the devices which have successfully accessed the target network at regular intervals, for example, each device is subjected to timeliness verification every preset time length, if the preset time length is 3 days, under the condition of triggering timeliness verification, the device verification system can acquire a current time point and a verification time point when the last verification of the corresponding device to be verified passes, then calculate a time difference between the current time point and the verification time point, and if the time difference is greater than or equal to 3 days, the corresponding device is in a verification failure state, and needs to be verified again; if the time difference is less than 3 days, the corresponding equipment is in a valid verification state, and re-verification is not needed, so that the equipment verification system can periodically perform time-efficient verification on the equipment successfully accessed to the target network, ensure that the equipment is still in the valid state, and further ensure the safety of the target network.
In addition, for the device accessing to the target network, when data interaction occurs between different devices, the device verification system may respond to detection that the first device sends target data to the second device, obtain a second device parameter of the second device, where the second device parameter includes at least one of a second device type and a second device key, and then perform identity verification on the second device according to the second device parameter, and when the second device passes the authentication, allow communication between the first device and the second device, specifically, if the second device is successfully authenticated according to the second device type and the second device key, or according to the second device type, allow the second device to access to the target network, so that the second device performs a corresponding operation according to the target data, and thus, in a case that the device is to access to the corresponding target network, the device verification system located in the target network may perform identity verification on the device based on the device type, the device key, and other parameters, thereby reducing the risk of unauthorized device accessing to the network, and improving the security of the network.
It should be noted that, for the authentication process of the second device, reference may be made to the authentication process of the first device in the foregoing embodiment, and for each device accessing the target network, the authentication process is similar, and will not be described herein.
It should be noted that the embodiments of the present invention include, but are not limited to, the foregoing examples, and it will be understood that those skilled in the art may also set the embodiments according to actual requirements under the guidance of the concepts of the embodiments of the present invention, which are not limited thereto.
The embodiment of the invention can be applied to a device verification system, the device verification system can be accessed to a target network, and for the device accessed to the target network, the device verification system can respond to the network access request which is sent by the first device and is accessed to the target network, and acquire the first device parameter of the first device, wherein the first device parameter at least comprises one of a first device type and a first device key, the first device key is used for encrypting the interacted target data when the first device performs data interaction with other devices in the target network, and if the first device type and the first device key or the first device type are used for successfully performing identity verification on the first device, the device verification system in the target network can be allowed to access the target network, so that under the condition that the device is to access the corresponding target network, the device verification system in the target network can perform identity verification on the device based on the device type, the device key and other parameters of the device, the risk of accessing the network is reduced, and the security of the network is improved.
In order to enable those skilled in the art to better understand the technical solutions according to the embodiments of the present invention, the following are exemplified by some examples:
referring to fig. 3, a flow chart of device authentication provided in the embodiment of the present invention is shown, firstly, a device authentication system is established in a target network, and an identifier and a key are allocated to a device successfully accessing the target network, and meanwhile, device parameters such as a device type, a device identifier, a key and the like corresponding to the device are recorded. Then, when the target device initiates a network access request, whether the device type of the target device is the existing device type can be judged first, if not, corresponding prompt information is output to prompt whether the target device is manually added into a device verification system, and if the user manually adds the target device, the device verification system can allocate corresponding device parameters such as a device identifier, a key and the like to the target device and allow the target device to access a target network; if the equipment type of the target equipment is the existing equipment type, the key of the target equipment can be further acquired, whether the key of the target equipment is successfully verified or not is verified, and if the verification is successful, the target equipment is allowed to access the target network; if verification fails, rejecting the target device, outputting corresponding prompt information to prompt whether to manually add the target device to a device verification system, if the target device is manually added by a user, the device verification system can allocate corresponding device parameters such as a device identifier and a key to the target device and allow the target device to access a target network, so that the device verification system in the target network can perform identity verification on the device based on the device type and the device key of the device under the condition that the device is to access the corresponding target network, the risk of accessing the network by unauthorized devices is reduced, and the security of the network is improved.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Referring to fig. 4, a block diagram of a device verification apparatus provided in an embodiment of the present invention is applied to a device verification system, where the device verification system accesses a target network, and may specifically include the following modules:
a parameter obtaining module 401, configured to obtain, in response to receiving a network access request sent by a first device to access the target network, a first device parameter of the first device, where the first device parameter includes at least one of a first device type and a first device key, and the first device key is used to encrypt target data interacted when the first device performs data interaction with other devices in the target network;
And the device verification module 402 is configured to allow the first device to access the target network if the identity of the first device is verified according to the first device type and the first device key, or according to the first device type.
In some possible embodiments, the device authentication system stores target device parameters of a target device that successfully accesses the target network, where the target device parameters include a target device identifier, a target device type, and a target device key, and the device authentication module 402 is specifically configured to:
if the first equipment type exists in the target equipment type, extracting a first equipment identifier of the first equipment from the first equipment parameter;
if the first equipment identifier exists in the target equipment identifier, comparing a first equipment key belonging to the same equipment identifier with the target equipment key;
and if the first device key is the same as the target device key, allowing the first device to access the target network.
In some possible embodiments, the device authentication module 402 is specifically further configured to:
if the first equipment type does not exist in the target equipment type, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
And responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the device authentication module 402 is specifically further configured to:
if the first equipment identifier of the first equipment does not exist in the target equipment identifier, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, the device authentication module 402 is specifically further configured to:
if the first equipment key is different from the target equipment key, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
And responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
In some possible embodiments, further comprising:
the time acquisition module is used for responding to a periodic verification instruction aiming at the first equipment to acquire a current time point and a verification time point of the first equipment, wherein the verification time is a time point recorded by the equipment verification system when the first equipment successfully performs identity verification for the last time;
the identity verification module is used for carrying out identity verification on the first equipment according to at least one of a first equipment type, a first equipment identifier and a first equipment key of the first equipment if the time difference between the current time point and the verification time point is larger than or equal to a preset duration;
and the processing module is used for not executing the identity authentication processing of the first equipment if the time difference between the current time point and the authentication time point is smaller than the preset duration.
In some possible embodiments, further comprising:
A data acquisition module, configured to acquire a second device parameter of a second device in response to detecting that the first device sends target data to the second device, where the second device parameter includes at least one of a second device type and a second device key;
and the device processing module is used for allowing the second device to access the target network if the identity verification of the second device is successful according to the second device type and the second device key or according to the second device type, so that the second device executes corresponding operation according to the target data.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
In addition, the embodiment of the invention also provides electronic equipment, which comprises: the processor, the memory, store the computer program on the memory and can run on the processor, this computer program realizes each process of the above-mentioned apparatus verification method embodiment when being carried out by the processor, and can reach the same technical result, in order to avoid repetition, will not be repeated here.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, realizes the processes of the verification method embodiment of the device, and can achieve the same technical effects, and in order to avoid repetition, the description is omitted. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
Fig. 5 is a schematic diagram of a hardware structure of an electronic device implementing various embodiments of the present invention.
The electronic device 500 includes, but is not limited to: radio frequency unit 501, network module 502, audio output unit 503, input unit 504, sensor 505, display unit 506, user input unit 507, interface unit 508, memory 509, processor 510, and power source 511. It will be appreciated by those skilled in the art that the structure of the electronic device according to the embodiments of the present invention is not limited to the electronic device, and the electronic device may include more or less components than those illustrated, or may combine some components, or may have different arrangements of components. In the embodiment of the invention, the electronic equipment comprises, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer and the like.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 501 may be used to receive and send information or signals during a call, specifically, receive downlink data from a base station, and then process the downlink data with the processor 510; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 501 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 501 may also communicate with networks and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user through the network module 502, such as helping the user to send and receive e-mail, browse web pages, access streaming media, and the like.
The audio output unit 503 may convert audio data received by the radio frequency unit 501 or the network module 502 or stored in the memory 509 into an audio signal and output as sound. Also, the audio output unit 503 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the electronic device 500. The audio output unit 503 includes a speaker, a buzzer, a receiver, and the like.
The input unit 504 is used for receiving an audio or video signal. The input unit 504 may include a graphics processor (Graphics Processing Unit, GPU) 5041 and a microphone 5042, the graphics processor 5041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 506. The image frames processed by the graphics processor 5041 may be stored in the memory 509 (or other storage medium) or transmitted via the radio frequency unit 501 or the network module 502. Microphone 5042 may receive sound and may be capable of processing such sound into audio data. The processed audio data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 501 in case of a phone call mode.
The electronic device 500 also includes at least one sensor 505, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 5061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 5061 and/or the backlight when the electronic device 500 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for recognizing the gesture of the electronic equipment (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; the sensor 505 may further include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not described herein.
The display unit 506 is used to display information input by a user or information provided to the user. The display unit 506 may include a display panel 5061, and the display panel 5061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 507 is operable to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the electronic device. Specifically, the user input unit 507 includes a touch panel 5071 and other input devices 5072. Touch panel 5071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on touch panel 5071 or thereabout using any suitable object or accessory such as a finger, stylus, etc.). Touch panel 5071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 510, and receives and executes commands sent by the processor 510. In addition, the touch panel 5071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 5071, the user input unit 507 may include other input devices 5072. In particular, other input devices 5072 may include, but are not limited to, physical keyboards, function keys (e.g., volume control keys, switch keys, etc.), trackballs, mice, joysticks, and so forth, which are not described in detail herein.
Further, the touch panel 5071 may be overlaid on the display panel 5061, and when the touch panel 5071 detects a touch operation thereon or thereabout, the touch operation is transmitted to the processor 510 to determine a type of touch event, and then the processor 510 provides a corresponding visual output on the display panel 5061 according to the type of touch event. It will be appreciated that in one embodiment, the touch panel 5071 and the display panel 5061 are implemented as two separate components for input and output functions of the electronic device, but in some embodiments, the touch panel 5071 and the display panel 5061 may be integrated for input and output functions of the electronic device, which is not limited herein.
The interface unit 508 is an interface for connecting an external device to the electronic apparatus 500. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 508 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 500 or may be used to transmit data between the electronic apparatus 500 and an external device.
The memory 509 may be used to store software programs as well as various data. The memory 509 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, the memory 509 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 510 is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 509, and calling data stored in the memory 509, thereby performing overall monitoring of the electronic device. Processor 510 may include one or more processing units; preferably, the processor 510 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 510.
The electronic device 500 may also include a power supply 511 (e.g., a battery) for powering the various components, and preferably the power supply 511 may be logically connected to the processor 510 via a power management system that performs functions such as managing charging, discharging, and power consumption.
In addition, the electronic device 500 includes some functional modules, which are not shown, and will not be described herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any person skilled in the art will readily recognize that variations or substitutions are within the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (10)

1. A method for authenticating a device, the method being applied to a device authentication system, the device authentication system being connected to a target network, the method comprising:
in response to receiving a network access request sent by a first device and accessing to the target network, acquiring a first device parameter of the first device, wherein the first device parameter at least comprises one of a first device type and a first device key, and the first device key is used for encrypting interacted target data when the first device performs data interaction with other devices in the target network;
and if the identity of the first equipment is verified successfully according to the first equipment type and the first equipment key or according to the first equipment type, allowing the first equipment to access the target network.
2. The method according to claim 1, wherein the device authentication system stores therein target device parameters of a target device that successfully accesses the target network, the target device parameters including a target device identifier, a target device type, and a target device key, and the allowing the first device to access the target network if the authentication of the first device based on the first device type and the first device key, or based on the first device type, is successful, comprises:
If the first equipment type exists in the target equipment type, extracting a first equipment identifier of the first equipment from the first equipment parameter;
if the first equipment identifier exists in the target equipment identifier, comparing a first equipment key belonging to the same equipment identifier with the target equipment key;
and if the first device key is the same as the target device key, allowing the first device to access the target network.
3. The method according to claim 1 or 2, wherein the allowing the first device to access the target network if the authentication of the first device based on the first device type and the first device key or based on the first device type is successful, further comprises:
if the first equipment type does not exist in the target equipment type, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
4. The method according to claim 1 or 2, wherein the allowing the first device to access the target network if the authentication of the first device based on the first device type and the first device key or based on the first device type is successful, further comprises:
if the first equipment identifier of the first equipment does not exist in the target equipment identifier, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
5. The method according to claim 1 or 2, wherein the allowing the first device to access the target network if the authentication of the first device based on the first device type and the first device key or based on the first device type is successful, further comprises:
If the first equipment key is different from the target equipment key, outputting risk prompt information aiming at the first equipment, wherein the risk prompt information is used for prompting whether the first equipment is manually added into the target network;
and responding to the network access operation aiming at the first equipment, recording the first equipment type and the first equipment identification, distributing a corresponding first equipment key for the first equipment, and allowing the first equipment to access the target network.
6. The method as recited in claim 1, further comprising:
responding to a periodic verification instruction aiming at the first equipment, acquiring a current time point and a verification time point of the first equipment, wherein the verification time is a time point recorded by the equipment verification system when the first equipment successfully performs identity verification for the last time;
if the time difference between the current time point and the verification time point is greater than or equal to a preset duration, verifying the identity of the first device according to at least one of a first device type, a first device identifier and a first device key of the first device;
And if the time difference between the current time point and the verification time point is smaller than the preset duration, not executing the identity verification processing of the first equipment.
7. The method as recited in claim 1, further comprising:
in response to detecting that the first device sends target data to a second device, obtaining a second device parameter of the second device, wherein the second device parameter at least comprises one of a second device type and a second device key;
and if the identity of the second device is verified successfully according to the second device type and the second device key or according to the second device type, allowing the second device to access the target network so that the second device executes corresponding operation according to the target data.
8. An apparatus for authenticating a device, the apparatus being applied to a device authentication system, the device authentication system being configured to access a target network, the apparatus comprising:
the system comprises a parameter acquisition module, a target network acquisition module and a data processing module, wherein the parameter acquisition module is used for acquiring first equipment parameters of first equipment in response to receiving a network access request which is sent by the first equipment and is used for accessing the target network, the first equipment parameters at least comprise one of a first equipment type and a first equipment key, and the first equipment key is used for encrypting interacted target data when the first equipment performs data interaction with other equipment in the target network;
And the device verification module is used for allowing the first device to access the target network if the identity of the first device is verified successfully according to the first device type and the first device key or according to the first device type.
9. An electronic device comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other via the communication bus;
the memory is used for storing a computer program;
the processor is configured to implement the method according to any one of claims 1-8 when executing a program stored on a memory.
10. A computer-readable storage medium having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the method of any of claims 1-8.
CN202311800082.3A 2023-12-25 2023-12-25 Verification method and device of equipment, electronic equipment and storage medium Pending CN117896110A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311800082.3A CN117896110A (en) 2023-12-25 2023-12-25 Verification method and device of equipment, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311800082.3A CN117896110A (en) 2023-12-25 2023-12-25 Verification method and device of equipment, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117896110A true CN117896110A (en) 2024-04-16

Family

ID=90649940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311800082.3A Pending CN117896110A (en) 2023-12-25 2023-12-25 Verification method and device of equipment, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117896110A (en)

Similar Documents

Publication Publication Date Title
CN108510022B (en) Two-dimensional code generation and verification method and server
WO2017084288A1 (en) Method and device for verifying identity
WO2018161743A1 (en) Fingerprint recognition method and related product
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN108901020B (en) Network access method, mobile terminal and server
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN111598573B (en) Equipment fingerprint verification method and device
CN110035183B (en) Information sharing method and terminal
CN109376519B (en) Fingerprint unlocking method and terminal equipment
CN108491713B (en) Safety reminding method and electronic equipment
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN110830262B (en) Authorization management method and electronic equipment
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN113238868B (en) Task processing method, device, server, equipment, system and storage medium
CN110990850A (en) Authority management method and electronic equipment
CN111125680A (en) Permission setting method and terminal equipment
CN114697007B (en) Key management method, corresponding device and system
CN113221150A (en) Data protection method and device
CN111159738B (en) Authority configuration method, application login method and device
CN110929238B (en) Information processing method and device
CN107491685B (en) Face recognition method and mobile terminal
CN108737341B (en) Service processing method, terminal and server
CN107818247B (en) Mobile terminal unlocking method and mobile terminal
CN117896110A (en) Verification method and device of equipment, electronic equipment and storage medium
CN109409068B (en) Operation execution method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination