WO2022116110A1 - Access authentication method and apparatus, device, and storage medium - Google Patents

Access authentication method and apparatus, device, and storage medium Download PDF

Info

Publication number
WO2022116110A1
WO2022116110A1 PCT/CN2020/133686 CN2020133686W WO2022116110A1 WO 2022116110 A1 WO2022116110 A1 WO 2022116110A1 CN 2020133686 W CN2020133686 W CN 2020133686W WO 2022116110 A1 WO2022116110 A1 WO 2022116110A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
authentication
authenticated
distribution network
random number
Prior art date
Application number
PCT/CN2020/133686
Other languages
French (fr)
Chinese (zh)
Inventor
包永明
罗朝明
张军
董建利
茹昭
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2020/133686 priority Critical patent/WO2022116110A1/en
Priority to CN202080107382.1A priority patent/CN116508292A/en
Publication of WO2022116110A1 publication Critical patent/WO2022116110A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Definitions

  • the present application relates to the field of wireless communication, and in particular, to an access authentication method, apparatus, device, and storage medium.
  • Smart devices can perform access authentication across different platforms.
  • the A platform gateway is used to construct the network
  • the platform cloud corresponding to the A platform gateway is the A platform cloud
  • the platform cloud corresponding to the manufacturer to which the smart device belongs is the B platform cloud.
  • the embodiments of the present application provide an access authentication method, apparatus, device, and storage medium, and provide an implementation solution for cross-platform access authentication of smart devices.
  • the technical solution is as follows:
  • an access authentication method which is applied to a device to be authenticated, and the method includes:
  • beacon frame carries the first random number generated by the device to be authenticated
  • a device-side trust center link key is generated, and the license key is a key stored in the device to be authenticated and the device platform cloud;
  • an access authentication method is provided, which is applied to a distribution network platform gateway, the distribution network platform gateway supports building a network, and the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud,
  • the method includes:
  • beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the authentication end trust center link key is a key generated based on the first random number and the license key.
  • the license key is a key stored in the device to be authenticated and the device platform cloud;
  • an access authentication method is provided, which is applied in a device platform cloud, where the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the method includes:
  • the distribution network platform gateway interacting with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is a key generated according to the first random number generated by the device to be authenticated,
  • the authenticator trust center link key is used to perform first access authentication of the device to be authenticated.
  • an access authentication apparatus which is applied to a device to be authenticated, and the apparatus includes: a beacon frame broadcasting module, a key generation module, and a first authentication module;
  • the beacon frame broadcasting module configured to broadcast a beacon frame, the beacon frame carrying the first random number generated by the device to be authenticated;
  • the key generation module is used to generate a device-side trust center link key based on the first random number and a license key, where the license key is a secret key stored in the device to be authenticated and the device platform cloud. key;
  • the first authentication module is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  • an access authentication device which is applied to a distribution network platform gateway, the distribution network platform gateway supports building a network, and the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud,
  • the device includes: a beacon frame receiving module, a key determining module and a first authentication module;
  • the beacon frame receiving module is configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the key determination module is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, and the authentication end trust center link key is based on the first random number and a key generated by a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
  • the first authentication module is configured to use the authentication terminal trust center link key to perform first access authentication with the device to be authenticated.
  • an access authentication apparatus which is applied in a device platform cloud, where the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the apparatus includes: a key determination module;
  • the key determination module is used for interacting with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is generated according to the device to be authenticated
  • the key generated by the first random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
  • a device to be authenticated includes: a processor and a transceiver connected to the processor; wherein,
  • the transceiver configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the processor is configured to generate a device-side trust center link key based on the first random number and a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
  • the processor is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  • a distribution network platform gateway supports the construction of a Zigbee network
  • the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud
  • the distribution network platform gateway includes : a processor and a transceiver connected to the processor;
  • the transceiver configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the processor is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, where the authentication end trust center link key is based on the first random number and the license key.
  • the key generated by the key, the license key is the key stored in the device to be authenticated and the device platform cloud;
  • the processor is configured to perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
  • a device platform cloud is provided, where the device platform cloud is a cloud server of a manufacturer to which a device to be authenticated belongs, and the device platform cloud includes: a processor and a transceiver connected to the processor ;in,
  • the processor is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is the first generated according to the device to be authenticated.
  • the key generated by the random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
  • a computer-readable storage medium is provided, and a computer program is stored in the readable storage medium, and the computer program is loaded and executed by a processor to implement the access authentication according to the above aspect method.
  • a chip is provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a network device, it is used to implement the access described in the above aspect Authentication method.
  • a computer program product which, when running on a processor of a network device, enables the network device to execute the access authentication method described in the above aspect.
  • the beacon frame broadcast by the device to be authenticated carries a first random number, and the first random number is used to generate the authentication terminal trust center link key and device required to perform the first access authentication between the distribution network platform gateway and the device to be authenticated
  • the terminal trust center links the key, and the first random number is dynamically generated each time the first access authentication is performed to ensure the security of the first access authentication.
  • the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud, obtains the authentication terminal trust center link key required for the first access authentication, and then configures the network platform by the distribution network platform gateway.
  • the gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center link key to perform the first access authentication, thereby realizing the cross-platform access authentication of the device to be authenticated and expanding the access of the device to be authenticated. Authentication implementation scenarios.
  • FIG. 1 is a block diagram of a cross-platform access authentication system for smart devices provided by an exemplary embodiment of the present application
  • FIG. 2 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application
  • FIG. 3 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • FIG. 4 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • FIG. 5 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • FIG. 6 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • FIG. 7 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • FIG. 8 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 9 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 10 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a computer device provided by an exemplary embodiment of the present application.
  • Zigbee is a low-power local area network protocol based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard. According to international standards, ZigBee technology is a short-range, low-power wireless communication technology.
  • IEEE Institute of Electrical and Electronics Engineers
  • beacon frame formats are specified, one is a regular beacon frame, and the other is an enhanced beacon (EnhanceBeacon) frame.
  • EnhanceBeacon enhanced beacon
  • the difference between the enhanced beacon frame and the conventional beacon frame is that there are more Information Elements (Information Elements, IEs) fields in the variable (variable) data, and there are fewer Guaranteed Time Slot (GTS) fields and hanging The starting address (PendingAddress) field.
  • Information Elements Information Elements, IEs
  • GTS Guaranteed Time Slot
  • the information element field is further divided into header information elements (HeaderIEs) and payload information elements (PayloadIEs).
  • the header information unit when the element ID (ElementID) is 0, it means that the content is filled with the manufacturer-defined information, wherein the data length ranges from 0 to 127 bytes, and the first 3 bytes can be the supplier (Vendor). ) Organizationally Unique Identifier (OUI), the remaining bytes can be customized according to the manufacturer's needs.
  • the header information unit is filled with the first random number, the device identifier and the manufacturer identifier.
  • the device that supports the Zigbee protocol is a Zigbee device, and the Zigbee device corresponds to a unique installation code (InstallCode).
  • the Zigbee gateway needs to obtain the installation code of the Zigbee device, so as to connect the Zigbee device to the Zigbee network created by the Zigbee gateway.
  • the installation code of the Zigbee device is obtained by scanning the QR code of the Zigbee device with the mobile phone or manually inputting the mobile phone, and then the mobile phone sends the installation code to the Zigbee gateway, which requires more human interaction.
  • the system may include: a device to be authenticated 12 , a distribution network platform gateway 141 , a distribution network platform cloud 142 and a device platform cloud 16.
  • the device 12 to be authenticated is a device capable of accessing the network.
  • the device 12 to be authenticated is a smart device (such as VR (Virtual Reality, virtual reality) glasses, a smart wearable device, etc.), a terminal device, or other device with network access capability, which is not made in this embodiment of the present application. limited.
  • the device 12 to be authenticated may be smart home devices such as smart TVs, smart speakers, smart air conditioners, smart lights, smart doors and windows, smart curtains, and smart sockets.
  • the number of devices to be authenticated 12 may be combined with application requirements or the distribution network platform gateway 141 The maximum number of devices that can be managed is determined.
  • the device 12 to be authenticated is configured to access the network by the distribution network platform gateway 141 , and the cloud server corresponding to the distribution network platform gateway 141 is the distribution network platform cloud 142 .
  • the distribution network platform gateway 141 and the distribution network platform cloud 142 are connected through a wired or wireless network.
  • the distribution network platform gateway 141 is a device capable of configuring a network.
  • the distribution network platform gateway 141 may be a server, a terminal device, a router, a terminal device, a mobile phone, a tablet computer, a wearable device, or any other device capable of configuring network access, which is not limited in this embodiment of the present application, and practical application , the implementation form of the distribution network platform gateway 141 can be determined in combination with the application scenario of the system.
  • the distribution network platform gateway 141 when the system is applied to smart home life, considering that the home environment has the characteristics of small area and frequent activities, the use of the distribution network platform gateway 141 that occupies a large space will affect the normal home life, and the distribution network platform
  • the gateway 141 can be implemented as a router, a terminal device, a mobile phone, a tablet computer, a wearable device, and the like.
  • the number of distribution network platform gateways 141 may be one or multiple, which is not limited in this embodiment of the present application. Generally, for the consideration of resource saving and other aspects, the number of distribution network platform gateways 141 is one. .
  • the device 12 to be authenticated is developed based on the device platform cloud 16 , and the license key Kc of the device 12 to be authenticated is stored in the device platform cloud 16 .
  • the distribution network platform cloud 142 sends the information required in the access authentication process of the device 12 to be authenticated to the device platform cloud 16; required information.
  • the above-mentioned distribution network platform cloud 142 and device platform cloud 16 are cloud computing resource pools in the field of cloud technology, and multiple types of virtual resources are deployed in the resource pools for external customers to choose and use.
  • the cloud computing resource pool mainly includes: computing devices (which are virtualized machines, including operating systems), storage devices, and network devices. It can be an independent physical server, a server cluster or a distributed system composed of multiple physical servers, or a cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, intermediate Cloud servers for basic cloud computing services such as software services, domain name services, security services, Content Delivery Network (CDN), and big data and artificial intelligence platforms.
  • CDN Content Delivery Network
  • the system may further include a control device 18, and the distribution network platform gateway 141 and the control device 18 are connected through a wired or wireless network.
  • the control device 18 is a device for the user to operate to control the distribution network platform gateway 141 .
  • the user can activate the distribution network platform gateway 141 by using the application program (Application) on the control device 18 .
  • the control device 18 can be implemented as a terminal device, a mobile phone, a tablet computer, a wearable device, and the like.
  • the device 12 to be authenticated is a Zigbee device, and the network configuration platform gateway supports configuring a Zigbee network.
  • FIG. 2 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • the method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
  • Step 201 The device to be authenticated broadcasts a beacon frame, and the beacon frame carries a first random number generated by the device to be authenticated.
  • the device to be authenticated is a device that supports the ability to access the network.
  • the equipment to be authenticated includes various types of household equipment (such as electric lamps), industrial assets (such as inspection equipment in a hospital), and the like.
  • the device to be authenticated is a Zigbee device.
  • a beacon frame is a command frame of the medium access control (Medium Access Control, MAC) layer.
  • the beacon frame is mainly used in the process of joining and rejoining the device to be authenticated.
  • the device to be authenticated inquires the network that can be joined by broadcasting the beacon frame.
  • the device to be authenticated starts broadcasting beacon frames when it enters the network distribution mode.
  • the device to be authenticated automatically enters the network distribution mode when it is turned on for the first time, or the device to be authenticated is operated by the user to passively trigger entry. Distribution network mode.
  • the beacon frame carries a first random number, the first random number is a random number (Nonce) generated by the device to be authenticated, and the first random number is used to ensure the security of the first access authentication.
  • the length of the first random number is 4 bytes.
  • the beacon frame also carries a device ID (DeviceID), where the device ID is used to identify the type of the device to be authenticated, and the device ID may be 2 bytes.
  • the beacon frame also carries a company identifier (Company Identifier, CID), which is used to identify the manufacturer to which the device to be authenticated belongs, and the manufacturer identifier may be 3 bytes.
  • the beacon frame also carries a device address identifier, the device address identifier is used to identify the MAC address of the device to be authenticated, the device address identifier is used to uniquely identify a device to be authenticated, and the device address identifier can be a 64-bit address.
  • the device address is identified as an Extended Unique Identifier (EUI).
  • EUI Extended Unique Identifier
  • Step 202 the distribution network platform gateway receives the beacon frame.
  • the distribution network platform gateway is a device with the ability to configure the network.
  • the network distribution platform gateway may be a server, a terminal device, a router, a terminal device, a mobile phone, a tablet computer, a wearable device, or other devices capable of configuring network access.
  • the distribution network platform gateway supports configuring a Zigbee network.
  • the distribution network platform gateway can receive the beacon frame broadcast by the device to be authenticated.
  • the distribution network platform gateway receives the beacon frame broadcast by the device to be authenticated in the form of channel scanning.
  • the distribution network platform gateway has formed a network.
  • the network formed by the distribution network platform gateway is identified by a personal area network identifier (PAN ID).
  • Step 203 the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud to obtain the authentication terminal trust center link key.
  • the device platform cloud is the cloud server corresponding to the development of the device to be certified. That is, the device platform cloud is a cloud server corresponding to the manufacturer to which the device to be authenticated belongs.
  • the distribution network platform cloud is the cloud server corresponding to the distribution network platform gateway.
  • the interaction between the distribution network platform gateway and the device platform cloud through the distribution network platform cloud refers to: the distribution network platform gateway sends the message A to the distribution network platform cloud, and the distribution network platform cloud forwards the message A to the device platform cloud; or, The device platform cloud sends message B to the distribution network platform cloud, and the distribution network platform cloud forwards the message B to the distribution network platform gateway.
  • the authentication side trust center link key (TrustCenterLinkKey, TCLK) is a key generated based on the first random number and the license key.
  • the authentication end trust center link key is generated by the distribution network platform gateway, or generated by the device platform cloud. That is, the authentication end trust center link key is a key generated by the gateway side of the distribution network platform or the cloud side of the device platform and used for the first access authentication.
  • Step 204 the device to be authenticated generates a device-side trust center link key based on the first random number and the license key.
  • the license key is the key stored in the device to be authenticated and in the device platform cloud.
  • the license key is pre-programmed in the secure storage area of the device to be authenticated when it leaves the factory.
  • the device platform cloud stores a relationship table between the device address identifier of the device to be authenticated and the license key.
  • the device to be authenticated generates the device-side trust center link key based on the first random number generated by itself and the stored license key.
  • the device-side trust center link key is a key generated by the device to be authenticated and used for the first access authentication.
  • step 203 and step 204 does not limit the implementation order of step 203 and step 204 .
  • Step 205 The distribution network platform gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center link key respectively to perform first access authentication.
  • the distribution platform gateway After the device to be authenticated generates the device-side trust center link key, and the distribution platform gateway obtains the authentication-side trust center link key, the distribution platform gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center respectively.
  • the link key is used for the first access authentication.
  • the first access authentication is successful.
  • the device to be authenticated can join the network formed by the distribution network platform gateway.
  • the beacon frame broadcast by the device to be authenticated carries the first random number
  • the first random number is used to generate the first access authentication between the distribution network platform gateway and the device to be authenticated
  • the required authentication side trust center link key and device side trust center link key, and the first random number is dynamically generated each time the first access authentication is performed to ensure the security of the first access authentication.
  • the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud, obtains the authentication terminal trust center link key required for the first access authentication, and then configures the network platform by the distribution network platform gateway.
  • the gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center link key to perform the first access authentication, thereby realizing the cross-platform access authentication of the device to be authenticated and expanding the access of the device to be authenticated. Authentication implementation scenarios.
  • the process of performing the first access authentication on the side of the device to be authenticated includes: the device to be authenticated obtains a network key (NetworkKey) based on the device-side trust center link key, and the network key is used for Data at the network layer is encrypted after the first access authentication. That is, the device to be authenticated obtains the correct network key by executing the first access procedure, so as to join the network.
  • NetworkKey Network Key
  • FIG. 3 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • the method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
  • Step 301 the device to be authenticated broadcasts a beacon frame, and the beacon frame carries a first random number, a device identifier, a manufacturer identifier, and a device address identifier.
  • the beacon frame is an enhanced beacon (EnhanceBeacon) frame.
  • the enhanced beacon frame is specified in IEEE802.15.4, which is different from the conventional beacon frame.
  • IEEE802.15.4 For the specific format of the enhanced beacon frame, see Table 1 above.
  • the enhanced beacon frame carries the first random number, the device identification, the manufacturer identification and the device address identification.
  • the first random number, device identification and manufacturer identification are filled in the header information element (HeaderIEs) of the enhanced beacon frame
  • the device address identification is filled in the beacon payload (Beacon Payload) of the enhanced beacon frame.
  • step 301 is alternatively implemented as: the device to be authenticated broadcasts the enhanced beacon frame.
  • step 301 is alternatively implemented as: the device to be authenticated alternately broadcasts the enhanced beacon frame and the regular beacon frame, so as to realize the compatibility of the regular beacon frame.
  • Step 302 the distribution network platform gateway receives the beacon frame.
  • the beacon frame is an enhanced beacon frame
  • the distribution network platform gateway receives the enhanced beacon frame broadcast by the device to be authenticated, and obtains the first random number, device identification, manufacturer identification and device address identification from the enhanced signal frame.
  • Step 303 the distribution network platform gateway sends a beacon response to the device to be authenticated.
  • the beacon response is used to respond to the beacon frame.
  • the beacon response carries the PAN ID of the network constructed by the distribution network platform gateway.
  • the network configuration platform gateway sends a beacon response to the device to be authenticated.
  • the beacon frame carries a device identifier, and the device identifier is used to identify the type of the device to be authenticated.
  • the distribution network platform gateway will also perform the following steps: send the device identification to the control device, and the control device is used to control the distribution network platform gateway; receive the access request sent by the control device, and the access request is used to trigger the configuration The network platform gateway feeds back the beacon response, and the beacon response is used to respond to the beacon frame.
  • the distribution network platform gateway is a router, and the control terminal is a mobile phone used by a user.
  • the network distribution platform gateway After receiving the beacon frame, the network distribution platform gateway sends the device identification in the beacon frame to the mobile phone, and the mobile phone broadcasts the type of the device to be authenticated corresponding to the device identification, such as: the device to be authenticated corresponding to the device identification
  • the type of the device is a temperature sensor.
  • the user learns the type of the device to be authenticated by broadcasting, and controls the mobile phone to send an access request.
  • the distribution network platform gateway sends a beacon to the device to be authenticated according to the instructions of the access request. response.
  • Step 304 the device to be authenticated receives a beacon response.
  • the device to be authenticated determines that there is a network that can be joined at the gateway of the distribution network platform by receiving a beacon response, and the network is identified by a PAN ID.
  • Step 305 the device to be authenticated sends an association request to the distribution network platform gateway.
  • association request is used to request access to the network constructed by the distribution network platform gateway.
  • the device to be authenticated after receiving the beacon response, if the device to be authenticated chooses to access the network constructed by the distribution network platform gateway, the device to be authenticated sends an association request to the distribution network platform gateway.
  • Step 306 the distribution network platform gateway receives the association request.
  • Step 307 the distribution network platform gateway sends an association response to the device to be authenticated.
  • association response is used to respond to the association request.
  • the distribution network platform gateway After receiving the association request sent by the device to be authenticated, the distribution network platform gateway unicasts an association response to the device to be authenticated.
  • the association response carries the network address (network address) assigned by the network configuration platform gateway to the device to be authenticated.
  • the network address is a 16-bit short address, and the network address is used to uniquely identify the device to be authenticated in the network constructed by the distribution network platform gateway.
  • Step 308 the device to be authenticated receives an association response.
  • Step 309 the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud to obtain the authentication terminal trust center link key.
  • Step 310 the device to be authenticated generates a device-side trust center link key based on the first random number and the license key.
  • the device to be authenticated uses the generated device-side installation code as the device-side trust center link key. That is, step 310 includes: the device to be authenticated adopts the first key generation algorithm, processes the first random number and the license key, generates a device-side installation code, and uses the device-side installation code as the device-side trust center link key.
  • the first key generation algorithm is a symmetric encryption algorithm
  • the first key generation algorithm includes: an Advanced Encryption Standard (Advanced Encryption Standard, AES)-MMO (Matyas-Meyer-Oseas) hash algorithm.
  • TCLK is the device-side trust center link key
  • InstallCode is the device-side installation code
  • Kc is the license key
  • R1 is the first random number.
  • step 310 includes: the device to be authenticated adopts the first key generation algorithm, processes the first random number and the license key, and generates a device-side installation code; adopts the second key generation algorithm to perform a device-side installation code Process to generate the device-side trust center link key.
  • the first key generation algorithm and the second key algorithm are symmetric encryption algorithms, the first key generation algorithm includes: AES-MMO hash algorithm; the second key generation algorithm includes: AES-MMO hash algorithm .
  • InstallCode AES-MMO(Kc
  • TCLK AES-MMO(Install Code).
  • TCLK is the device-side trust center link key
  • InstallCode is the device-side installation code
  • Kc is the license key
  • R1 is the first random number.
  • the device-side installation code is dynamically generated, so that the device-to-be-authenticated device is installed according to the device-side installation code.
  • the device-side trust center link key determined by the code is also dynamically generated.
  • Step 311 The distribution network platform gateway sends encryption key information to the device to be authenticated, where the encryption key information is information obtained by encrypting the network key according to the authentication terminal trust center link key.
  • the network key is a random string generated by the distribution platform gateway when building the network.
  • all network access devices in the network share the same network key.
  • the distribution network platform gateway uses the authentication terminal trust center link key to encrypt the network key, obtains encryption key information, and sends the encryption key information to the device to be authenticated for use.
  • the device to be authenticated obtains the network key from the encryption key information.
  • Step 312 the device to be authenticated receives the encryption key information.
  • Step 313 the device to be authenticated uses the device-side trust center link key to process the encryption key information to obtain a network key.
  • Network keys are used to encrypt data at the network layer.
  • the device to be authenticated obtains the network key, it communicates with the network distribution platform gateway based on the network key.
  • the device side trust center link key generated on the device side to be authenticated is the same as the authentication side trust center link key. If the keys are equal, the device to be authenticated can use the device-side trust center link key to process the encrypted key information to obtain the correct network key.
  • Step 314 the device to be authenticated broadcasts a device declaration message.
  • the device announcement broadcast message is used to indicate that the device to be authenticated has connected to the network constructed by the distribution network platform gateway.
  • Step 315 the distribution network platform gateway receives the device declaration message.
  • the distribution network platform gateway receives the device declaration message broadcast by the device to be authenticated.
  • the beacon frame broadcast by the device to be authenticated is the enhanced beacon frame. Since there are fields in the enhanced beacon frame that can be customized by the manufacturer to which the device to be authenticated belongs, it is convenient to use the enhanced beacon frame.
  • the standard frame carries the first random number, the device identification, the manufacturer identification and the device address identification, so as to ensure the subsequent execution of the first access authentication process.
  • the distribution network platform gateway obtains the authentication terminal installation code from the device cloud platform, without requiring the user to manually input or scan, and then the user sends the authentication terminal installation code to the device cloud platform, reducing human interaction. Improve the efficiency of access authentication.
  • FIG. 4 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • the method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
  • Step 3091 the distribution network platform gateway sends an installation code request to the device platform cloud through the distribution network platform cloud.
  • the installation code request carries a device address identifier and a first random number, the first random number is used for the device platform cloud to generate the authentication terminal installation code, and the device address identifier is used to identify the MAC address of the device to be authenticated.
  • the installation code request also carries the manufacturer identifier.
  • the distribution network platform gateway sends an installation code request to the distribution network platform cloud, and the distribution network platform cloud determines the device platform cloud according to the manufacturer's identification, and forwards the installation code request to the device platform cloud.
  • Step 3092 the device platform cloud receives the installation code request.
  • the source address of the installation code request is the distribution network platform gateway, and the installation code request carries the device address identifier and the first random number corresponding to the device to be authenticated.
  • the device platform cloud receives an installation code request whose source address is the distribution network platform gateway from the distribution network platform cloud.
  • Step 3093 the device platform cloud generates an authentication terminal installation code based on the first random number.
  • step 3093 includes: the device platform cloud determines the license key corresponding to the device to be authenticated according to the device address identifier; uses the first key generation algorithm to process the first random number and the license key to generate the authentication terminal installation. code.
  • a relationship table between the device address identifier and the license key is stored in the device platform cloud, and the device platform cloud searches the relationship table according to the device address identifier to determine the license key corresponding to the device to be authenticated.
  • the first key generation algorithm is a symmetric encryption algorithm, and the first key generation algorithm includes: AES-MMO hash algorithm.
  • InstallCode' AES-MMO(Kc
  • InstallCode' is the installation code of the authentication terminal
  • Kc is the license key
  • R1 is the first random number.
  • Step 3094 the device platform cloud sends an installation code response, and the destination address of the installation code response is the distribution network platform gateway.
  • the installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine the authentication terminal trust center link key.
  • the device platform cloud sends an installation code response to the distribution network platform cloud, and the distribution network platform cloud forwards the installation code response to the distribution network platform gateway.
  • Step 3095 the distribution network platform gateway receives the installation code response.
  • the distribution network platform gateway receives the installation code response whose source address is the device platform cloud through the distribution network platform cloud.
  • Step 3096 Based on the installation code response, the distribution network platform gateway determines the authentication terminal trust center link key.
  • the installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine the authentication terminal trust center link key.
  • the distribution network platform gateway uses the obtained authentication side installation code as the device side trust center link key.
  • Step 3096 includes: the distribution network platform gateway uses the second key generation algorithm to process the installation code of the authentication terminal to generate a trust center link key of the authentication terminal.
  • the second key generation algorithm is a symmetric encryption algorithm
  • the second key generation algorithm includes: AES-MMO hash algorithm.
  • TCLK' AES-MMO (Install Code').
  • TCLK' is the authentication terminal trust center link key
  • InstallCode' is the authentication terminal installation code.
  • the device-side installation code and the authentication-side installation code are generated by the device to be authenticated and the distribution network platform gateway based on the first random number, because the first random number is the device to be authenticated every time. If the random number is generated when trying to access the network, the device-side installation code is dynamically generated, so the device-side trust center link key determined by the device to be authenticated according to the device-side installation code is also dynamically generated, avoiding the need for the device-side installation code to be fixed. The risk of device-side installation code leakage caused by the change.
  • the device to be authenticated will perform the second access authentication based on the second random number generated by the device platform cloud.
  • Fig. 5 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • the method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
  • Step 501 The distribution network platform gateway sends a random number writing request to the custom cluster of the device to be authenticated, and the random number writing request carries a second random number.
  • the second random number is a random number generated by the device platform cloud.
  • the distribution network platform gateway obtains the second random number from the installation code response whose source address is the device platform cloud.
  • a custom cluster is a cluster (Cluster) defined by the manufacturer to which the device to be authenticated belongs.
  • the cluster of devices to be authenticated supports access by the distribution network platform gateway, and the access types include: write, return after write, read, etc.
  • step 501 includes: the configuration network platform gateway obtains the access type of the custom cluster; in response to the access type of the custom cluster being return after write, sending a random number write request to the custom cluster.
  • the access type of the custom cluster is return after write, it is convenient for the distribution network platform gateway to receive the returned device-side authentication key from the device to be authenticated after sending the random number write request.
  • Step 502 the device to be authenticated receives a random number writing request.
  • the random number writing request carries the second random number.
  • Step 503 the device to be authenticated generates a device-side authentication key based on the second random number.
  • the device-side authentication key is used to perform second access authentication of the device to be authenticated.
  • step 503 includes: the device to be authenticated uses a third key generation algorithm to process the second random number and the license key to generate a device-side authentication key.
  • the third key generation algorithm is a symmetric encryption algorithm, and the third key generation algorithm includes: AES-MMO hash algorithm.
  • Auth AES-MMO(Kc
  • Auth is the device-side authentication key
  • Kc is the license key
  • R2 is the second random number.
  • the device to be authenticated stores the device-side authentication key in the attribute of the custom cluster.
  • the custom cluster includes at least one attribute (Attribute), and the attribute is a data entity reflecting the state or property of the device to be authenticated.
  • the attribute is used to store the device-side authentication key corresponding to the device to be authenticated.
  • the access type of the custom cluster is return after write.
  • Step 504 the device to be authenticated sends the device-side authentication key to the distribution network platform gateway.
  • the device to be authenticated After generating and storing the device-side authentication key, the device to be authenticated sends the device-side authentication key to the distribution network platform gateway.
  • Step 505 The distribution network platform gateway receives the device-side authentication key.
  • Step 506 the distribution network platform gateway sends an authentication device request to the device platform cloud through the distribution network platform cloud, where the authentication device request carries the device address identifier and the device-side authentication key.
  • the authentication device request is used to request the device platform cloud to perform second access authentication.
  • the authentication device request also carries the manufacturer identifier.
  • the distribution network platform gateway sends an authentication device request to the distribution network platform cloud, and the distribution network platform cloud determines the device platform cloud according to the manufacturer's identification, and forwards the authentication device request to the device platform cloud.
  • Step 507 the device platform cloud receives the authentication device request.
  • the source address requested by the authentication device is the distribution network platform gateway
  • the authentication device request carries the device address identifier and the device-side authentication key
  • the device-side authentication key is a key generated by the device to be authenticated based on the second random number.
  • the device platform cloud receives an authentication device request whose source address is the distribution network platform gateway from the configuration network platform cloud.
  • Step 508 The device platform cloud performs second access authentication on the device-side authentication key according to the second random number.
  • the second random number is a random number generated by the device platform cloud.
  • the length of the second random number is 4 bytes.
  • step 508 includes: the device platform cloud determines the license key corresponding to the device to be authenticated according to the device address identifier; uses a third key generation algorithm to process the second random number and the license key to generate a cloud authentication key. key; verify the cloud authentication key and the device-side authentication key to determine the authentication result.
  • a relationship table between the device address identifier and the license key is stored in the device platform cloud, and the device platform cloud searches the relationship table according to the device address identifier to determine the license key corresponding to the device to be authenticated.
  • the third key generation algorithm is a symmetric encryption algorithm, and the third key generation algorithm includes: AES-MMO hash algorithm.
  • Auth' AES-MMO(Kc
  • Auth' is the cloud authentication key
  • Kc is the license key
  • R2 is the second random number.
  • the authentication result is authentication success; if the cloud authentication key and the device authentication key are not equal, the authentication result is authentication failure.
  • Step 509 the device platform cloud sends the authentication result, and the destination address of the authentication result is the gateway of the distribution network platform.
  • the device platform cloud sends the authentication result to the distribution network platform cloud, and the distribution network platform cloud forwards the authentication result to the distribution network platform gateway.
  • Step 510 the distribution network platform gateway receives the authentication result.
  • the distribution network platform gateway receives the authentication result whose source address is the device platform cloud through the distribution network platform cloud.
  • the distribution network platform gateway will also perform any one of the following steps: in response to the authentication result being that the authentication is successful, update the authentication end trust center link key; in response to the authentication result being the authentication failure, Add the device to be authenticated to the device blacklist.
  • the device blacklist is used to record the devices that fail to configure the network.
  • the devices to be authenticated in the device blacklist are removed from the network constructed by the distribution network platform gateway.
  • the verified authentication side trust center link key is equal to the device side trust center link key, and the device to be authenticated has joined the network constructed by the distribution network platform gateway, so, After successful authentication, the distribution network platform gateway updates the authentication end trust center link key, which means that the distribution network platform gateway and the device to be authenticated synchronously update the trust center link key on both sides.
  • the second random number generated by the device platform cloud is used to generate the cloud authentication key and the device end authentication key, and the cloud authentication key and the device end authentication key are generated using the cloud authentication key and the device end authentication key.
  • the authentication key performs the second access verification on the device to be authenticated.
  • the second access verification implements two-way verification, which further improves the reliability of the access verification.
  • the device to be authenticated is a Zigbee device
  • the network distribution platform gateway is configured with a Zigbee network.
  • CID represents the manufacturer's identity
  • R1 represents the first random number
  • Device ID represents the device identity
  • EUI represents the device address identity
  • R2 represents the second random number
  • Kc represents the license key
  • Install Code represents the installation on the device side.
  • Code, Install Code' represents the installation code of the authentication side
  • TCLK represents the trust center link key of the device side
  • TCLK' represents the trust center link key of the authentication side
  • Network Key represents the network key
  • Auth represents the authentication key of the device side
  • Auth' represents the The cloud authentication key is exemplified.
  • FIG. 6 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • the method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
  • Step 61 the network distribution platform gateway builds a Zigbee network.
  • the distribution network platform gateway is a device capable of configuring Zigbee network.
  • Step 62 the user activates the distribution network platform gateway through the APP or voice.
  • Step 63 the distribution network platform gateway executes the access permission.
  • the distribution network platform performs permission access by broadcasting a permission access (Permit Join) message.
  • Step 64 the distribution network platform gateway performs channel scanning.
  • Step 65 the Zigbee device uses the enhanced beacon frame format, fills the CID
  • the element ID (ElementID) of the enhanced beacon frame is 0x00.
  • CID is 3 bytes
  • R1 is 4 bytes
  • DeviceID is 2 bytes.
  • Step 66 the distribution network platform gateway broadcasts the enhanced beacon frame, which carries the data CID
  • any one of the following two broadcasting modes is adopted: only the enhanced beacon frame is broadcast; or, the enhanced beacon frame and the regular beacon frame are broadcast alternately, which is compatible with the regular beacon frame.
  • Step 67 the distribution network platform gateway returns the Device ID.
  • DeviceID is a 16-bit identifier used to identify the device type.
  • Step 68 the user side broadcasts the device type.
  • the user side determines the device type of the Zigbee device according to the Device ID, and broadcasts it.
  • Step 69 the user performs input: connect the device.
  • the user side After obtaining the device type of the Zigbee device, the user side sends an access request to the distribution network platform gateway.
  • Step 610 the distribution network platform gateway sends a beacon response to the Zigbee device.
  • the beacon response is used to respond to the enhanced beacon frame broadcast by the Zigbee device.
  • Step 611 the Zigbee device sends an association request to the distribution network platform gateway.
  • the association request is used to request access to the Zigbee network constructed by the distribution network platform gateway.
  • Step 612 the distribution network platform gateway sends an association response to the Zigbee device.
  • Association Responses are used to respond to association requests.
  • the association response carries the network address allocated to the Zigbee device by the network configuration platform gateway.
  • Step 613 the distribution network platform gateway sends an installation code request, which carries the data CID
  • Step 613.1 the distribution network platform cloud queries the device platform cloud according to the CID.
  • the distribution network platform cloud can know that the Zigbee device does not belong to the distribution network platform cloud through the CID, and obtain the cloud platform information of the corresponding manufacturer according to the CID.
  • Step 613.2 the distribution network platform cloud sends an installation code request to the device platform cloud, carrying the data R1
  • a correspondence table between EUI and Kc is stored in the device platform cloud.
  • Step 613.4 the device platform returns an installation code response to the distribution network platform cloud, carrying the data Install Code' and R2.
  • Step 614 the distribution network platform cloud returns an installation code response to the distribution network platform gateway, carrying the data Install Code' and R2.
  • the distribution network platform gateway After obtaining the Install Code', the distribution network platform gateway generates TCLK' according to the Install Code'.
  • the distribution network platform gateway establishes and stores a correspondence table between EUI and TCLK'.
  • R1), TCLK AES-MMO(Install Code).
  • Kc can only be stored in Zigbee device and device platform cloud.
  • Step 617 the network distribution platform gateway and the Zigbee device establish a network layer security channel through TCLK, and transmit the Network Key.
  • the distribution network platform gateway encrypts the NetworkKey through TCLK' and sends the encrypted data to the Zigbee device.
  • Step 618 the Zigbee device obtains the Network Key.
  • the InstallCode of the Zigbee device is inconsistent with the InstallCode' of the device platform cloud, it cannot access the Zigbee network established by the distribution platform gateway; only the InstallCode of the Zigbee device is consistent with the InstallCode' of the device platform cloud, the Zigbee device can get the correct NetworkKey .
  • Step 619 the distribution network platform gateway and the Zigbee device perform device announcement broadcast.
  • Device announcement (Deviceannounce) broadcast is used to indicate that Zigbee devices access the Zigbee network constructed by the distribution network platform gateway.
  • Step 620 the distribution network platform gateway sends a random number write request, carrying the data R2.
  • the network configuration platform gateway obtains the access type of the custom cluster of the Zigbee device; in response to the access type of the custom cluster being write-return (W*R), a random number write request is sent to the custom cluster.
  • W*R write-return
  • Step 622 the Zigbee device returns Auth to the distribution network platform gateway.
  • Step 623 the distribution network platform gateway sends an authentication device request to the distribution network platform cloud, carrying the data CID
  • Step 623.1 the distribution network platform cloud queries the device platform cloud according to the CID.
  • the distribution network platform cloud can know that the Zigbee device does not belong to the distribution network platform cloud through the CID, and obtain the cloud platform information of the corresponding manufacturer according to the CID.
  • Step 623.2 the distribution network platform cloud sends an authentication device request to the device platform cloud, carrying the data Auth
  • Step 623.4 the device platform cloud returns the authentication result to the distribution network platform cloud.
  • Step 624 the distribution network platform cloud returns the authentication result to the distribution network platform gateway.
  • Step 625 If the authentication fails, the distribution network platform gateway adds a device blacklist.
  • the device blacklist is used to record the devices that fail to configure the network.
  • the Zigbee devices in the device blacklist are removed from the Zigbee network constructed by the distribution network platform gateway.
  • Step 626 the distribution network platform gateway and the Zigbee device update the TCLK to establish a normal connection.
  • the updated TCLK is used to encrypt application support layer (Application Support Sublayer, APS) data transmission.
  • application support layer Application Support Sublayer, APS
  • the authentication end trust center link key is generated on the gateway side of the distribution network platform. In another possible implementation manner, the authentication end trust center link key is generated on the cloud side of the device platform.
  • FIG. 7 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application.
  • the method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 .
  • the following steps of the method are adjusted:
  • InstallCode' is implicitly represented by the combination of Kc
  • a correspondence table between EUI and Kc is stored in the device platform cloud.
  • Step 713.4 the device platform returns an installation code response to the distribution network platform cloud, carrying the data TCLK' and R2.
  • Step 714 the distribution network platform cloud returns an installation code response to the distribution network platform gateway, carrying the data TCLK' and R2.
  • Step 715 the distribution network platform gateway establishes a correspondence table between EUI and TCLK'.
  • Kc can only be stored in Zigbee device and device platform cloud.
  • the authentication-side trust center link key and the device-side trust center link key are directly generated based on the first random number and the license key, and there is no need to install the authentication-side installation code or the device-side installation code.
  • the code is further processed, which improves the efficiency of access authentication for Zigbee devices.
  • FIG. 8 shows a structural block diagram of an access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus can be implemented as a device to be authenticated, or can be implemented as a part of the device to be authenticated.
  • the device includes: a beacon frame broadcast module 801, key generation module 802 and first authentication module 803;
  • the beacon frame broadcasting module 801 is configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the key generation module 802 is configured to generate a device-side trust center link key based on the first random number and a license key, and the license key is stored in the device to be authenticated and the device platform cloud key;
  • the first authentication module 803 is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  • the first authentication module 803 is configured to obtain a network key based on the device-side trust center link key, where the network key is used in the first access authentication Then encrypt the data at the network layer.
  • the first authentication module 803 is configured to receive encryption key information sent by the distribution network platform gateway, where the encryption key information is trusted by the distribution network platform gateway according to the authentication terminal
  • the central link key is encrypted, and the authentication side trust center link key is generated by the distribution network platform gateway or the device platform cloud; the device side trust center link key is used to process the encryption key information to get the network key.
  • the apparatus further includes: a device announcement broadcasting module; the device announcement broadcasting module is configured to broadcast a device announcement message, and the device announcement message is used to indicate that the device to be authenticated has accessed The network constructed by the distribution network platform gateway.
  • the key generation module 802 is configured to use a first key generation algorithm to process the first random number and the license key, generate a device-side installation code, and The device-side installation code is used as the device-side trust center link key; or, the key generation module 802 is configured to use the first key generation algorithm to generate the first random number and the license The key is processed to generate the device-side installation code; the second key generation algorithm is used to process the device-side installation code to generate the device-side trust center link key.
  • the first key generation algorithm includes: an AES-MMO hash algorithm
  • the second key generation algorithm includes: the AES-MMO hash algorithm
  • the beacon frame is an enhanced beacon frame
  • the first random number is filled in a header information element field of the enhanced beacon frame.
  • the beacon frame broadcasting module 801 is configured to broadcast the enhanced beacon frame; or, the beacon frame broadcasting module 801 is configured to alternately broadcast the enhanced beacon frame and Regular beacon frame.
  • the beacon frame further carries a device identifier, where the device identifier is used to identify the type of the device to be authenticated.
  • the beacon frame further carries a manufacturer identifier, where the manufacturer identifier is used to identify the manufacturer to which the device to be authenticated belongs.
  • the beacon frame further carries a device address identifier, where the device address identifier is used to identify the MAC address of the device to be authenticated.
  • the apparatus further includes: a beacon response receiving module and an association module; the beacon response receiving module is configured to receive a beacon response sent by the distribution network platform gateway, the beacon response The beacon response is used to respond to the beacon frame; the association module is used to send an association request to the distribution network platform gateway, and the association request is used to request access to the network constructed by the distribution network platform gateway; The association response sent by the distribution network platform gateway is used to respond to the association request.
  • the apparatus further includes: a second authentication module; the second authentication module is configured to generate a device-side authentication key based on a second random number generated by the device platform cloud, the The device-side authentication key is used to perform the second access authentication of the device to be authenticated; the device-side authentication key is sent to the distribution network platform gateway.
  • a second authentication module is configured to generate a device-side authentication key based on a second random number generated by the device platform cloud, the The device-side authentication key is used to perform the second access authentication of the device to be authenticated; the device-side authentication key is sent to the distribution network platform gateway.
  • the second authentication module is configured to use a third key generation algorithm to process the second random number and the license key to generate the device-side authentication key .
  • the third key generation algorithm includes: AES-MMO hash algorithm.
  • the apparatus further includes: a request receiving module; the request receiving module is configured to receive a random number write sent by the distribution network platform gateway to the custom cluster of the device to be authenticated request, the random number writing request carries the second random number.
  • the apparatus further includes: a key storage module; the key storage module is configured to store the device-side authentication key in the attribute of the custom cluster.
  • the access type of the custom cluster is return after write.
  • FIG. 9 shows a structural block diagram of an access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus may be implemented as a distribution network platform gateway, or may be implemented as a part of a distribution network platform gateway.
  • the device includes: a beacon a frame receiving module 901, a key determining module 902 and a first authentication module 903;
  • the beacon frame receiving module 901 is configured to receive a beacon frame broadcast by a device to be authenticated, where the beacon frame carries a first random number generated by the device to be authenticated;
  • the key determination module 902 is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, and the authentication end trust center link key is based on the first random number And a key generated by a license key, the license key is a key stored in the device to be authenticated and the device platform cloud;
  • the first authentication module 903 is configured to use the authentication terminal trust center link key to perform first access authentication with the device to be authenticated.
  • the first authentication module 903 is configured to send encryption key information to the device to be authenticated, where the encryption key information is based on the authentication end trust center link key pair network Information obtained by encrypting the key, where the network key is used to encrypt data at the network layer after the first access authentication.
  • the apparatus further includes: a device declaration receiving module; the device declaration receiving module is configured to receive a device declaration message sent by the to-be-authenticated device, where the device declaration message is used to indicate the The device to be authenticated has accessed the network constructed by the distribution network platform gateway.
  • the beacon frame further carries a device address identifier of the device to be authenticated, and the device address identifier is used to identify the MAC address of the device to be authenticated;
  • the key determining module 902 which is used to send an installation code request to the device platform cloud through the distribution network platform cloud, where the installation code request carries the device address identifier and the first random number, and the first random number is used for
  • the device platform cloud generates an installation code of the authentication terminal; through the distribution network platform cloud, an installation code response whose source address is the device platform cloud is received; based on the installation code response, the authentication terminal trust center link key is determined .
  • the installation code response carries the authentication terminal installation code; the key determination module 902 is configured to use the authentication terminal installation code as the authentication terminal trust center link key; Or, the key determination module 902 is configured to use the second key generation algorithm to process the installation code of the authentication terminal to generate the authentication terminal trust center link key.
  • the second key generation algorithm includes: an AES-MMO hash algorithm.
  • the installation code response further carries a second random number generated by the device platform cloud.
  • the apparatus further includes: an authentication request module; the authentication module is configured to send a random number write request to the custom cluster of the device to be authenticated, the random number write request Carrying a second random number, the second random number is obtained by the distribution network platform gateway from the installation code response whose source address is the device platform cloud; receiving the device-side authentication key sent by the device to be authenticated, the The device-side authentication key is used for the second access authentication of the device to be authenticated; an authentication device request is sent to the device platform cloud through the distribution network platform cloud, and the authentication device request carries the device address identifier and The device-side authentication key, and the device address identifier is used to identify the MAC address of the device to be authenticated.
  • an authentication request module is configured to send a random number write request to the custom cluster of the device to be authenticated, the random number write request Carrying a second random number, the second random number is obtained by the distribution network platform gateway from the installation code response whose source address is the device platform cloud; receiving the device-side authentication key sent by the device
  • the authentication request module is configured to obtain the access type of the custom cluster; in response to the access type of the custom cluster being return after writing, send the custom cluster The random number write request described above.
  • the apparatus further includes: an authentication result processing module; the authentication result processing module is configured to receive, through the distribution network platform cloud, an authentication result whose source address is the device platform cloud; In response to the authentication result being that the authentication is successful, update the authentication end trust center link key; in response to the authentication result being the authentication failure, add the device to be authenticated to the device blacklist, which is used for Record the devices that fail to configure the network.
  • an authentication result processing module configured to receive, through the distribution network platform cloud, an authentication result whose source address is the device platform cloud; In response to the authentication result being that the authentication is successful, update the authentication end trust center link key; in response to the authentication result being the authentication failure, add the device to be authenticated to the device blacklist, which is used for Record the devices that fail to configure the network.
  • the apparatus further includes: a beacon response sending module and an association module; the beacon response sending module is configured to send a beacon response to the device to be authenticated, the beacon response is used to respond to the beacon frame; the association module is used to receive an association request sent by the device to be authenticated, and the association request is used to request access to the network constructed by the distribution network platform gateway; to the to-be-authenticated device The authentication device sends an association response, the association response being used to respond to the association request.
  • the beacon response sending module is configured to send a beacon response to the device to be authenticated, the beacon response is used to respond to the beacon frame
  • the association module is used to receive an association request sent by the device to be authenticated, and the association request is used to request access to the network constructed by the distribution network platform gateway; to the to-be-authenticated device
  • the authentication device sends an association response, the association response being used to respond to the association request.
  • the beacon frame further carries a device identifier, where the device identifier is used to identify the type of the device to be authenticated
  • the apparatus further includes: an access request receiving module; the access request a request receiving module, configured to send the device identification to a control device, and the control device is used to control the distribution network platform gateway; receive an access request sent by the control device, the access request is used to trigger the The distribution network platform gateway feeds back a beacon response, where the beacon response is used to respond to the beacon frame.
  • the beacon frame is an enhanced beacon frame
  • the first random number is filled in a header information element field of the enhanced beacon frame.
  • FIG. 10 shows a structural block diagram of an access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus may be implemented as a device platform cloud, or may be implemented as a part of the device platform cloud, and the apparatus includes: a key determination module 1001;
  • the key determination module 1001 is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is generated according to the device to be authenticated The key generated by the first random number of the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
  • the key determination module 1001 is configured to receive an installation code request, the source address of the installation code request is the distribution network platform gateway, and the installation code request carries the to-be-authenticated The device address identifier corresponding to the device and the first random number, where the device address identifier is used to identify the MAC address of the device to be authenticated; based on the first random number, the authentication terminal installation code is generated; the installation code response is sent, The destination address of the installation code response is the distribution network platform gateway, the installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine the authentication terminal trust.
  • Central link key is configured to receive an installation code request, the source address of the installation code request is the distribution network platform gateway, and the installation code request carries the to-be-authenticated The device address identifier corresponding to the device and the first random number, where the device address identifier is used to identify the MAC address of the device to be authenticated; based on the first random number, the authentication terminal installation code is generated;
  • the key determination module 1001 is configured to determine the license key corresponding to the device to be authenticated according to the device address identifier; A random number and the license key are processed to generate the authentication terminal installation code.
  • the first key generation algorithm includes: an AES-MMO hash algorithm.
  • the installation code response further carries a second random number generated by the device platform cloud.
  • the apparatus further includes: a second authentication module; the second authentication module is configured to receive an authentication device request, where the source address of the authentication device request is the distribution network platform gateway, The authentication device request carries a device address identifier and a device-side authentication key, the device-side authentication key is a key generated by the device to be authenticated based on a second random number, and the second random number is determined by the device platform Cloud generation; performing second access authentication on the device-side authentication key according to the second random number, and the device address identifier is used to identify the MAC address of the device to be authenticated.
  • a second authentication module is configured to receive an authentication device request, where the source address of the authentication device request is the distribution network platform gateway, The authentication device request carries a device address identifier and a device-side authentication key, the device-side authentication key is a key generated by the device to be authenticated based on a second random number, and the second random number is determined by the device platform Cloud generation; performing second access authentication on the device-side authentication key according to the second
  • the second authentication module is configured to determine the license key corresponding to the device to be authenticated according to the device address identifier; use a third key generation algorithm to The random number and the license key are processed to generate a cloud authentication key; the cloud authentication key and the device-side authentication key are verified to determine the authentication result.
  • the third key generation algorithm includes: AES-MMO hash algorithm.
  • the apparatus further includes: an authentication result sending module; the authentication result sending module is configured to send the authentication result, and the destination address of the authentication result is the distribution network platform gateway.
  • FIG. 11 shows a schematic structural diagram of a computer device (such as a device to be authenticated, a distribution network platform gateway, or a device platform cloud) provided by an exemplary embodiment of the present application.
  • the computer device includes: a processor 101 , a receiver 102 , and a transmitter 103 , memory 104 and bus 105 .
  • the processor 101 includes one or more processing cores, and the processor 101 executes various functional applications and information processing by running software programs and modules.
  • the receiver 102 and the transmitter 103 may be implemented as a communication component, which may be a communication chip.
  • the memory 104 is connected to the processor 101 through the bus 105 .
  • the memory 104 may be configured to store at least one instruction, and the processor 101 may be configured to execute the at least one instruction, so as to implement various steps in the foregoing method embodiments.
  • memory 104 may be implemented by any type or combination of volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
  • volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
  • the computer device includes a processor, a memory, and a transceiver (the transceiver may include a receiver for receiving information and a transmitter for transmitting information) and a transmitter.
  • the transceiver may include a receiver for receiving information and a transmitter for transmitting information
  • the transceiver configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the processor is configured to generate a device-side trust center link key based on the first random number and a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
  • the processor is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  • the processor and transceiver in the computer device involved in the embodiments of the present application may execute the method performed by the device to be authenticated in any of the methods shown in FIG. 2 to FIG. 5 above. The steps are not repeated here.
  • the computer device when the computer device is implemented as a distribution network platform gateway,
  • the transceiver configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
  • the processor is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, where the authentication end trust center link key is based on the first random number and the license key.
  • the key generated by the key, the license key is the key stored in the device to be authenticated and the device platform cloud;
  • the processor is configured to perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
  • the processor and transceiver in the computer device involved in the embodiments of the present application may perform any of the methods shown in FIG. 2 to FIG. 5 above. The steps to be performed are not repeated here.
  • the computer device when the computer device is implemented as a device platform cloud,
  • the processor is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is the first generated according to the device to be authenticated.
  • the key generated by the random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
  • the processors and transceivers in the computer device involved in the embodiments of the present application may execute any of the methods shown in FIG. 2 to FIG. The steps are not repeated here.
  • a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, and the computer program is loaded and executed by a processor to implement the methods provided by the foregoing method embodiments.
  • An access authentication method performed by a computer device.
  • a computer program product which, when running on the processor of the computer device, causes the network device to execute the access authentication method described in the above aspects.
  • a chip is also provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a computer device, is used to implement the access authentication described in the above aspects method.

Abstract

The present application discloses an access authentication method and apparatus, a device, and a storage medium, relating to the field of wireless communications. Said method is applied to a device to be authenticated. Said method comprises: broadcasting a beacon frame, the beacon frame carrying a first random number generated by a device to be authenticated; generating a device end trust center link key on the basis of the first random number and a license key, the license key being a key stored in said device and a device platform cloud; and performing first access authentication with a network distribution platform gateway by using the device end trust center link key. The present application provides a solution for implementing cross-platform access authentication of a smart device.

Description

接入认证方法、装置、设备及存储介质Access authentication method, device, device and storage medium 技术领域technical field
本申请涉及无线通信领域,特别涉及一种接入认证方法、装置、设备及存储介质。The present application relates to the field of wireless communication, and in particular, to an access authentication method, apparatus, device, and storage medium.
背景技术Background technique
智能设备可以跨域不同的平台进行接入认证。Smart devices can perform access authentication across different platforms.
示例性的,为智能设备进行组网,构建网络的是A平台网关,A平台网关对应的平台云为A平台云,而智能设备所属厂商对应的平台云为B平台云。Exemplarily, to build a network for the smart device, the A platform gateway is used to construct the network, the platform cloud corresponding to the A platform gateway is the A platform cloud, and the platform cloud corresponding to the manufacturer to which the smart device belongs is the B platform cloud.
如何实现智能设备的跨平台接入认证,相关技术尚未提供较好的解决方案。How to realize cross-platform access authentication of smart devices, related technologies have not yet provided a better solution.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供了一种接入认证方法、装置、设备及存储介质,提供了一种智能设备的跨平台接入认证的实现方案。所述技术方案如下:The embodiments of the present application provide an access authentication method, apparatus, device, and storage medium, and provide an implementation solution for cross-platform access authentication of smart devices. The technical solution is as follows:
根据本申请的一个方面,提供了一种接入认证方法,应用于待认证设备,所述方法包括:According to an aspect of the present application, an access authentication method is provided, which is applied to a device to be authenticated, and the method includes:
广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;broadcasting a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;Based on the first random number and a license key, a device-side trust center link key is generated, and the license key is a key stored in the device to be authenticated and the device platform cloud;
使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。Use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
根据本申请的一个方面,提供了一种接入认证方法,应用于配网平台网关中,所述配网平台网关支持构建网络,所述配网平台网关对应的云端服务器为配网平台云,所述方法包括:According to an aspect of the present application, an access authentication method is provided, which is applied to a distribution network platform gateway, the distribution network platform gateway supports building a network, and the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud, The method includes:
接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;receiving a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;Through the distribution network platform cloud, interact with the device platform cloud to obtain the authentication end trust center link key. The authentication end trust center link key is a key generated based on the first random number and the license key. The license key is a key stored in the device to be authenticated and the device platform cloud;
使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。Perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
根据本申请的一个方面,提供了一种接入认证方法,应用于设备平台云中,所述设备平台云是待认证设备所属的厂商的云端服务器,所述方法包括:According to an aspect of the present application, an access authentication method is provided, which is applied in a device platform cloud, where the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the method includes:
与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。interacting with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is a key generated according to the first random number generated by the device to be authenticated, The authenticator trust center link key is used to perform first access authentication of the device to be authenticated.
根据本申请的一个方面,提供了一种接入认证装置,应用于待认证设备,所述装置包括:信标帧广播模块、密钥生成模块和第一认证模块;According to an aspect of the present application, an access authentication apparatus is provided, which is applied to a device to be authenticated, and the apparatus includes: a beacon frame broadcasting module, a key generation module, and a first authentication module;
所述信标帧广播模块,用于广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the beacon frame broadcasting module, configured to broadcast a beacon frame, the beacon frame carrying the first random number generated by the device to be authenticated;
所述密钥生成模块,用于基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;The key generation module is used to generate a device-side trust center link key based on the first random number and a license key, where the license key is a secret key stored in the device to be authenticated and the device platform cloud. key;
所述第一认证模块,用于使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。The first authentication module is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
根据本申请的一个方面,提供了一种接入认证装置,应用于配网平台网关中,所述配网平台网关支持构建网络,所述配网平台网关对应的云端服务器为配网平台云,所述装置包括:信标帧接收模块、密钥确定模块和第一认证模块;According to an aspect of the present application, an access authentication device is provided, which is applied to a distribution network platform gateway, the distribution network platform gateway supports building a network, and the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud, The device includes: a beacon frame receiving module, a key determining module and a first authentication module;
所述信标帧接收模块,用于接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;The beacon frame receiving module is configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
所述密钥确定模块,用于通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;The key determination module is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, and the authentication end trust center link key is based on the first random number and a key generated by a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
所述第一认证模块,用于使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。The first authentication module is configured to use the authentication terminal trust center link key to perform first access authentication with the device to be authenticated.
根据本申请的一个方面,提供了一种接入认证装置,应用于设备平台云中,所述设备平台云是待认证设备所属的厂商的云端服务器,所述装置包括:密钥确定模块;According to an aspect of the present application, an access authentication apparatus is provided, which is applied in a device platform cloud, where the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the apparatus includes: a key determination module;
所述密钥确定模块,用于与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心 链接密钥用于进行所述待认证设备的第一接入认证。The key determination module is used for interacting with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is generated according to the device to be authenticated The key generated by the first random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
根据本申请的一个方面,提供了一种待认证设备,所述待认证设备包括:处理器和与所述处理器相连的收发器;其中,According to an aspect of the present application, a device to be authenticated is provided, the device to be authenticated includes: a processor and a transceiver connected to the processor; wherein,
所述收发器,用于广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the transceiver, configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
所述处理器,用于基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;The processor is configured to generate a device-side trust center link key based on the first random number and a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
所述处理器,用于使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。The processor is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
根据本申请的一个方面,提供了一种配网平台网关,所述配网平台网关支持构建Zigbee网络,所述配网平台网关对应的云端服务器为配网平台云,所述配网平台网关包括:处理器和与所述处理器相连的收发器;其中,According to an aspect of the present application, a distribution network platform gateway is provided, the distribution network platform gateway supports the construction of a Zigbee network, the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud, and the distribution network platform gateway includes : a processor and a transceiver connected to the processor; wherein,
所述收发器,用于接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the transceiver, configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
所述处理器,用于通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;The processor is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, where the authentication end trust center link key is based on the first random number and the license key. The key generated by the key, the license key is the key stored in the device to be authenticated and the device platform cloud;
所述处理器,用于使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。The processor is configured to perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
根据本申请的一个方面,提供了一种设备平台云,所述设备平台云是待认证设备所属的厂商的云端服务器,所述设备平台云包括:处理器和与所述处理器相连的收发器;其中,According to an aspect of the present application, a device platform cloud is provided, where the device platform cloud is a cloud server of a manufacturer to which a device to be authenticated belongs, and the device platform cloud includes: a processor and a transceiver connected to the processor ;in,
所述处理器,用于与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。The processor is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is the first generated according to the device to be authenticated. The key generated by the random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
根据本申请的一个方面,提供了一种计算机可读存储介质,所述可读存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现如上述方面所述的接入认证方法。According to an aspect of the present application, a computer-readable storage medium is provided, and a computer program is stored in the readable storage medium, and the computer program is loaded and executed by a processor to implement the access authentication according to the above aspect method.
根据本申请实施例的一个方面,提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在网络设备上运行时,用于实现上述方面所述的接入认证方法。According to an aspect of the embodiments of the present application, a chip is provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a network device, it is used to implement the access described in the above aspect Authentication method.
根据本申请的一个方面,提供了一种计算机程序产品,该计算机程序产品在网络设备的处理器上运行时,使得网络设备执行上述方面所述的接入认证方法。According to one aspect of the present application, a computer program product is provided, which, when running on a processor of a network device, enables the network device to execute the access authentication method described in the above aspect.
本申请实施例提供的技术方案至少包括如下有益效果:The technical solutions provided by the embodiments of the present application include at least the following beneficial effects:
待认证设备广播的信标帧中携带第一随机数,第一随机数用于生成配网平台网关和待认证设备之间执行第一接入认证所需的认证端信任中心链接密钥以及设备端信任中心链接密钥,第一随机数是每次进行第一接入认证所动态产生的,保障第一接入认证的安全性。并且,本申请实施例中,配网平台网关通过配网平台云与设备平台云进行交互,获取第一接入认证所需的认证端信任中心链接密钥,再由配网平台网关配网平台网关和待认证设备分别使用认证端信任中心链接密钥以及设备端信任中心链接密钥,进行第一接入认证,从而实现了待认证设备的跨平台接入认证,扩展了待认证设备接入认证的实施场景。The beacon frame broadcast by the device to be authenticated carries a first random number, and the first random number is used to generate the authentication terminal trust center link key and device required to perform the first access authentication between the distribution network platform gateway and the device to be authenticated The terminal trust center links the key, and the first random number is dynamically generated each time the first access authentication is performed to ensure the security of the first access authentication. In addition, in the embodiment of the present application, the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud, obtains the authentication terminal trust center link key required for the first access authentication, and then configures the network platform by the distribution network platform gateway. The gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center link key to perform the first access authentication, thereby realizing the cross-platform access authentication of the device to be authenticated and expanding the access of the device to be authenticated. Authentication implementation scenarios.
附图说明Description of drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions in the embodiments of the present application more clearly, the following briefly introduces the drawings that are used in the description of the embodiments. Obviously, the drawings in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort.
图1是本申请一个示例性实施例提供的智能设备跨平台接入认证系统的框图;1 is a block diagram of a cross-platform access authentication system for smart devices provided by an exemplary embodiment of the present application;
图2是本申请一个示例性实施例提供的接入认证方法的流程图;FIG. 2 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application;
图3是本申请一个示例性实施例提供的接入认证方法的流程图;3 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application;
图4是本申请一个示例性实施例提供的接入认证方法的流程图;4 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application;
图5是本申请一个示例性实施例提供的接入认证方法的流程图;FIG. 5 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application;
图6是本申请一个示例性实施例提供的接入认证方法的流程图;6 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application;
图7是本申请一个示例性实施例提供的接入认证方法的流程图;FIG. 7 is a flowchart of an access authentication method provided by an exemplary embodiment of the present application;
图8是本申请一个示例性实施例提供的接入认证方法装置的结构框图;FIG. 8 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application;
图9是本申请一个示例性实施例提供的接入认证方法装置的结构框图;FIG. 9 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application;
图10是本申请一个示例性实施例提供的接入认证方法装置的结构框图;10 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application;
图11是本申请一个示例性实施例提供的计算机设备的结构示意图。FIG. 11 is a schematic structural diagram of a computer device provided by an exemplary embodiment of the present application.
具体实施方式Detailed ways
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描 述。In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
首先,对本申请实施例中涉及的名词进行简单介绍:First, briefly introduce the terms involved in the embodiments of the present application:
Zigbee(紫蜂协议)技术:Zigbee (Zigbee Protocol) technology:
Zigbee是基于电气和电子工程师协会(Institute of Electrical and Electronics Engineers,IEEE)802.15.4标准的低功耗局域网协议。根据国际标准规定,ZigBee技术是一种短距离、低功耗的无线通信技术。Zigbee is a low-power local area network protocol based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard. According to international standards, ZigBee technology is a short-range, low-power wireless communication technology.
由于ZigBee技术通常的传输距离小于1公里(即短距离),因此主要用于个人局域网(Personal Area Network,PAN)。Since the usual transmission distance of ZigBee technology is less than 1 km (ie short distance), it is mainly used in Personal Area Network (PAN).
信标(Beacon)帧:Beacon frame:
根据IEEE802.15.4中关于信标的规范,规定了两种信标帧格式,一种是常规信标帧,另外一种为增强信标(EnhanceBeacon)帧。According to the beacon specification in IEEE802.15.4, two beacon frame formats are specified, one is a regular beacon frame, and the other is an enhanced beacon (EnhanceBeacon) frame.
其中,增强信标帧中与常规信标帧的区别在于在可变(variable)的数据中多了信息单元(InformationElements,IEs)字段,少了时隙保障(Guaranteed Time Slot,GTS)字段和挂起地址(PendingAddress)字段。Among them, the difference between the enhanced beacon frame and the conventional beacon frame is that there are more Information Elements (Information Elements, IEs) fields in the variable (variable) data, and there are fewer Guaranteed Time Slot (GTS) fields and hanging The starting address (PendingAddress) field.
结合参考如下表一。Refer to Table 1 below.
表一:增强信标帧Table 1: Enhanced Beacon Frames
Figure PCTCN2020133686-appb-000001
Figure PCTCN2020133686-appb-000001
如表一所示,在增强信标帧中,信息单元字段又分为头信息单元(HeaderIEs)和载荷信息单元(PayloadIEs)。As shown in Table 1, in the enhanced beacon frame, the information element field is further divided into header information elements (HeaderIEs) and payload information elements (PayloadIEs).
在头信息单元中,当单元标识(ElementID)为0时,表示由厂商自定义信息填充该内容,其中,数据长度范围在0-127个字节,前3个字节可以为供应商(Vendor)组织唯一标识符(Organizationally Unique Identifier,OUI),剩余的字节可以根据厂商需求自定义。在本申请实施例中,在头信息单元中填充第一随机数、设备标识和厂商标识。In the header information unit, when the element ID (ElementID) is 0, it means that the content is filled with the manufacturer-defined information, wherein the data length ranges from 0 to 127 bytes, and the first 3 bytes can be the supplier (Vendor). ) Organizationally Unique Identifier (OUI), the remaining bytes can be customized according to the manufacturer's needs. In this embodiment of the present application, the header information unit is filled with the first random number, the device identifier and the manufacturer identifier.
支持Zigbee协议的设备为Zigbee设备,Zigbee设备对应有一个唯一的安装码(InstallCode),Zigbee网关需要获取Zigbee设备的安装码,从而将Zigbee设备接入Zigbee网关所创建的Zigbee网络。The device that supports the Zigbee protocol is a Zigbee device, and the Zigbee device corresponds to a unique installation code (InstallCode). The Zigbee gateway needs to obtain the installation code of the Zigbee device, so as to connect the Zigbee device to the Zigbee network created by the Zigbee gateway.
相关技术中,通过使用手机扫描Zigbee设备的二维码或者在手机上手动输入的方式,获取Zigbee设备的安装码,再由手机将安装码发送给Zigbee网关,需要的人为交互较多。In the related art, the installation code of the Zigbee device is obtained by scanning the QR code of the Zigbee device with the mobile phone or manually inputting the mobile phone, and then the mobile phone sends the installation code to the Zigbee gateway, which requires more human interaction.
同时,上述相关技术也未实现Zigbee设备的跨平台接入认证,亟需Zigbee设备的跨平台接入认证的解决方案。Meanwhile, the above-mentioned related technologies do not realize the cross-platform access authentication of Zigbee devices, and a solution for cross-platform access authentication of Zigbee devices is urgently needed.
下面,对本申请提供的方案进行示例性的说明。Below, the solution provided by the present application is exemplarily described.
图1示出了本申请一个示例性实施例提供的智能设备跨平台接入认证系统的框图,该系统可以包括:待认证设备12、配网平台网关141、配网平台云142和设备平台云16。1 shows a block diagram of a cross-platform access authentication system for smart devices provided by an exemplary embodiment of the present application. The system may include: a device to be authenticated 12 , a distribution network platform gateway 141 , a distribution network platform cloud 142 and a device platform cloud 16.
待认证设备12是具备接入网络能力的设备。可选的,待认证设备12为智能设备(如VR(Virtual Reality,虚拟现实)眼镜、智能可穿戴设备等)、终端设备,或者其它具备网络接入能力的设备,本申请实施例对此不作限定。在一个示例中,在该系统应用于智能家居生活的情况下,待认证设备12可以是智能电视、智能音箱、智能空调、智能电灯、智能门窗、智能窗帘、智能插座等智能家居设备。可选的,待认证设备12为一个,或者,待认证设备12为多个,本申请实施例对此不作限定,实际应用中,待认证设备12的数量可以结合应用需求或者配网平台网关141所能管理的最大设备数量等确定。The device 12 to be authenticated is a device capable of accessing the network. Optionally, the device 12 to be authenticated is a smart device (such as VR (Virtual Reality, virtual reality) glasses, a smart wearable device, etc.), a terminal device, or other device with network access capability, which is not made in this embodiment of the present application. limited. In one example, when the system is applied to smart home life, the device 12 to be authenticated may be smart home devices such as smart TVs, smart speakers, smart air conditioners, smart lights, smart doors and windows, smart curtains, and smart sockets. Optionally, there is one device 12 to be authenticated, or there are multiple devices 12 to be authenticated, which is not limited in this embodiment of the present application. In practical applications, the number of devices to be authenticated 12 may be combined with application requirements or the distribution network platform gateway 141 The maximum number of devices that can be managed is determined.
待认证设备12由配网平台网关141配置入网,配网平台网关141对应的云端服务器是配网平台云142。配网平台网关141与配网平台云142之间通过有线或无线网络相连。The device 12 to be authenticated is configured to access the network by the distribution network platform gateway 141 , and the cloud server corresponding to the distribution network platform gateway 141 is the distribution network platform cloud 142 . The distribution network platform gateway 141 and the distribution network platform cloud 142 are connected through a wired or wireless network.
配网平台网关141是具备配置网络的能力的设备。可选的,配网平台网关141可以是服务器、终端设备、路由器、终端设备、手机、平板电脑、可穿戴设备,或者其它具备配置入网能力的设备,本申请实施例对此不作限定,实际应用中,配网平台网关141的实现形态可以结合系统的应用情景确定。在一个示例中,在系统应用于智能家居生活的情况下,考虑到家居环境具有面积小、活动频繁等特点,使用占用空间较大的配网平台网关141会影响正常的家居生活,配网平台网关141可以实现为路由器、终端设备、手机、 平板电脑、可穿戴设备等。可选的,配网平台网关141的数量可以为一个,也可以为多个,本申请实施例对此不作限定,通常,出于节约资源等方面的考虑,配网平台网关141的数量为一个。The distribution network platform gateway 141 is a device capable of configuring a network. Optionally, the distribution network platform gateway 141 may be a server, a terminal device, a router, a terminal device, a mobile phone, a tablet computer, a wearable device, or any other device capable of configuring network access, which is not limited in this embodiment of the present application, and practical application , the implementation form of the distribution network platform gateway 141 can be determined in combination with the application scenario of the system. In an example, when the system is applied to smart home life, considering that the home environment has the characteristics of small area and frequent activities, the use of the distribution network platform gateway 141 that occupies a large space will affect the normal home life, and the distribution network platform The gateway 141 can be implemented as a router, a terminal device, a mobile phone, a tablet computer, a wearable device, and the like. Optionally, the number of distribution network platform gateways 141 may be one or multiple, which is not limited in this embodiment of the present application. Generally, for the consideration of resource saving and other aspects, the number of distribution network platform gateways 141 is one. .
待认证设备12基于设备平台云16开发,待认证设备12的许可密钥Kc存储在设备平台云16。The device 12 to be authenticated is developed based on the device platform cloud 16 , and the license key Kc of the device 12 to be authenticated is stored in the device platform cloud 16 .
配网平台云142和设备平台云16之间存在通信链路。可选的,配网平台云142向设备平台云16发送待认证设备12的接入认证过程中所需的信息;或,向配网平台网关141转发待认证设备12的接入认证过程中所需的信息。A communication link exists between the distribution network platform cloud 142 and the device platform cloud 16 . Optionally, the distribution network platform cloud 142 sends the information required in the access authentication process of the device 12 to be authenticated to the device platform cloud 16; required information.
其中,上述配网平台云142和设备平台云16是云技术领域中的云计算资源池,在资源池中部署多种类型的虚拟资源,供外部客户选择使用。云计算资源池中主要包括:计算设备(为虚拟化机器,包含操作系统)、存储设备、网络设备。其可以是独立的物理服务器,也可以是多个物理服务器构成的服务器集群或者分布式系统,还可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、内容分发网络(Content Delivery Network,CDN)、以及大数据和人工智能平台等基础云计算服务的云服务器。The above-mentioned distribution network platform cloud 142 and device platform cloud 16 are cloud computing resource pools in the field of cloud technology, and multiple types of virtual resources are deployed in the resource pools for external customers to choose and use. The cloud computing resource pool mainly includes: computing devices (which are virtualized machines, including operating systems), storage devices, and network devices. It can be an independent physical server, a server cluster or a distributed system composed of multiple physical servers, or a cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, intermediate Cloud servers for basic cloud computing services such as software services, domain name services, security services, Content Delivery Network (CDN), and big data and artificial intelligence platforms.
可选的,该系统还可以包括控制设备18,配网平台网关141与控制设备18之间通过有线或无线网络相连。控制设备18是供用户进行操作,以对配网平台网关141进行控制的设备。如:用户可以使用控制设备18上的应用程序(Application)激活配网平台网关141。控制设备18可以实现为终端设备、手机、平板电脑、可穿戴设备等。Optionally, the system may further include a control device 18, and the distribution network platform gateway 141 and the control device 18 are connected through a wired or wireless network. The control device 18 is a device for the user to operate to control the distribution network platform gateway 141 . For example, the user can activate the distribution network platform gateway 141 by using the application program (Application) on the control device 18 . The control device 18 can be implemented as a terminal device, a mobile phone, a tablet computer, a wearable device, and the like.
在一个示例中,待认证设备12是Zigbee设备,配网平台网关支持配置Zigbee网络。In an example, the device 12 to be authenticated is a Zigbee device, and the network configuration platform gateway supports configuring a Zigbee network.
图2示出了本申请一个示例性实施例提供的接入认证方法的流程图。该方法可以应用于如图1示出的智能设备跨平台接入认证系统中,该方法包括:FIG. 2 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application. The method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
步骤201,待认证设备广播信标帧,信标帧携带待认证设备生成的第一随机数。Step 201: The device to be authenticated broadcasts a beacon frame, and the beacon frame carries a first random number generated by the device to be authenticated.
待认证设备是支持具备接入网络能力的设备。可选的,待认证设备包括各种类型的家居设备(如电灯)、工业资产(如医院中的检查设备)等。示例性的,待认证设备是Zigbee设备。The device to be authenticated is a device that supports the ability to access the network. Optionally, the equipment to be authenticated includes various types of household equipment (such as electric lamps), industrial assets (such as inspection equipment in a hospital), and the like. Exemplarily, the device to be authenticated is a Zigbee device.
信标帧是媒体接入控制(Medium Access Control,MAC)层的一种命令帧。信标帧主要用于待认证设备的加网(join)和重新入网(Rejoin)过程。在本申请实施例中,待认证设备通过广播信标帧,查询可以加入的网络。可选的,待认证设备在进入配网模式的情况下开始广播信标帧,可选的,待认证设备在首次开启时自动进入配网模式,或者,待认证设备由用户操作以被动触发进入配网模式。A beacon frame is a command frame of the medium access control (Medium Access Control, MAC) layer. The beacon frame is mainly used in the process of joining and rejoining the device to be authenticated. In the embodiment of the present application, the device to be authenticated inquires the network that can be joined by broadcasting the beacon frame. Optionally, the device to be authenticated starts broadcasting beacon frames when it enters the network distribution mode. Optionally, the device to be authenticated automatically enters the network distribution mode when it is turned on for the first time, or the device to be authenticated is operated by the user to passively trigger entry. Distribution network mode.
信标帧携带第一随机数,第一随机数是待认证设备生成的随机数(Nonce),第一随机数用于保障第一接入认证的安全性。可选的,第一随机数的长度为4个字节。The beacon frame carries a first random number, the first random number is a random number (Nonce) generated by the device to be authenticated, and the first random number is used to ensure the security of the first access authentication. Optionally, the length of the first random number is 4 bytes.
可选的,信标帧还携带设备标识(DeviceID),设备标识用于标识待认证设备的类型,设备标识可以为2个字节。可选的,信标帧还携带厂商标识(CompanyIdentifier,CID),厂商标识用于标识待认证设备所属的厂商,厂商标识可以为3个字节。可选的,信标帧还携带设备地址标识,设备地址标识用于标识待认证设备的MAC地址,设备地址标识用于唯一地标识一个待认证设备,设备地址标识可以为一个64位地址。示例性的,设备地址标识为扩展唯一标识(Extended Unique Identifier,EUI)。Optionally, the beacon frame also carries a device ID (DeviceID), where the device ID is used to identify the type of the device to be authenticated, and the device ID may be 2 bytes. Optionally, the beacon frame also carries a company identifier (Company Identifier, CID), which is used to identify the manufacturer to which the device to be authenticated belongs, and the manufacturer identifier may be 3 bytes. Optionally, the beacon frame also carries a device address identifier, the device address identifier is used to identify the MAC address of the device to be authenticated, the device address identifier is used to uniquely identify a device to be authenticated, and the device address identifier can be a 64-bit address. Exemplarily, the device address is identified as an Extended Unique Identifier (EUI).
步骤202,配网平台网关接收信标帧。Step 202, the distribution network platform gateway receives the beacon frame.
配网平台网关是具备配置网络的能力的设备。可选的,配网平台网关可以是服务器、终端设备、路由器、终端设备、手机、平板电脑、可穿戴设备,或者其它具备配置入网能力的设备。示例性的,配网平台网关支持配置Zigbee网络。The distribution network platform gateway is a device with the ability to configure the network. Optionally, the network distribution platform gateway may be a server, a terminal device, a router, a terminal device, a mobile phone, a tablet computer, a wearable device, or other devices capable of configuring network access. Exemplarily, the distribution network platform gateway supports configuring a Zigbee network.
由于待认证设备广播信标帧,配网平台网关可以接收待认证设备广播的信标帧。可选的,配网平台网关通过信道扫描的形式,接收待认证设备广播的信标帧。可选的,配网平台网关已组建网络。可选的,配网平台网关组建的网络用个人局域网标志符(PAN ID)来进行标识。Since the device to be authenticated broadcasts the beacon frame, the distribution network platform gateway can receive the beacon frame broadcast by the device to be authenticated. Optionally, the distribution network platform gateway receives the beacon frame broadcast by the device to be authenticated in the form of channel scanning. Optionally, the distribution network platform gateway has formed a network. Optionally, the network formed by the distribution network platform gateway is identified by a personal area network identifier (PAN ID).
步骤203,配网平台网关通过配网平台云,与设备平台云交互,获取认证端信任中心链接密钥。Step 203, the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud to obtain the authentication terminal trust center link key.
设备平台云是待认证设备开发所对应的云端服务器。也即,设备平台云是待认证设备所属的厂商对应的云端服务器。The device platform cloud is the cloud server corresponding to the development of the device to be certified. That is, the device platform cloud is a cloud server corresponding to the manufacturer to which the device to be authenticated belongs.
配网平台云是配网平台网关对应的云端服务器。The distribution network platform cloud is the cloud server corresponding to the distribution network platform gateway.
可选的,配网平台网关通过配网平台云,与设备平台云交互指的是:配网平台网关向配网平台云发送消息A,配网平台云向设备平台云转发消息A;或者,设备平台云向配网平台云发送消息B,配网平台云向配网平台网关转发消息B。Optionally, the interaction between the distribution network platform gateway and the device platform cloud through the distribution network platform cloud refers to: the distribution network platform gateway sends the message A to the distribution network platform cloud, and the distribution network platform cloud forwards the message A to the device platform cloud; or, The device platform cloud sends message B to the distribution network platform cloud, and the distribution network platform cloud forwards the message B to the distribution network platform gateway.
认证端信任中心链接密钥(TrustCenterLinkKey,TCLK)是基于第一随机数以及许可密钥生成的密钥。可选的,认证端信任中心链接密钥由配网平台网关生成,或由设备平台云生成。即:认证端信任中心链接密钥是配网平台网关侧或设备平台云侧生成的用于进行第一接入认证的密钥。The authentication side trust center link key (TrustCenterLinkKey, TCLK) is a key generated based on the first random number and the license key. Optionally, the authentication end trust center link key is generated by the distribution network platform gateway, or generated by the device platform cloud. That is, the authentication end trust center link key is a key generated by the gateway side of the distribution network platform or the cloud side of the device platform and used for the first access authentication.
步骤204,待认证设备基于第一随机数以及许可密钥,生成设备端信任中心链接密钥。Step 204, the device to be authenticated generates a device-side trust center link key based on the first random number and the license key.
许可密钥是存放于待认证设备以及设备平台云中的密钥。可选的,许可密钥在出厂的时候预烧录在待 认证设备的安全存储区域。可选的,设备平台云中存储有待认证设备的设备地址标识与许可密钥之间的关系表。The license key is the key stored in the device to be authenticated and in the device platform cloud. Optionally, the license key is pre-programmed in the secure storage area of the device to be authenticated when it leaves the factory. Optionally, the device platform cloud stores a relationship table between the device address identifier of the device to be authenticated and the license key.
待认证设备基于自身生成的第一随机数以及存储的许可密钥,生成设备端信任中心链接密钥。设备端信任中心链接密钥是待认证设备侧生成的用于进行第一接入认证的密钥。The device to be authenticated generates the device-side trust center link key based on the first random number generated by itself and the stored license key. The device-side trust center link key is a key generated by the device to be authenticated and used for the first access authentication.
可以理解的是,本申请实施例对步骤203和步骤204的实施顺序不进行限定。It can be understood that, this embodiment of the present application does not limit the implementation order of step 203 and step 204 .
步骤205,配网平台网关和待认证设备分别使用认证端信任中心链接密钥以及设备端信任中心链接密钥,进行第一接入认证。Step 205: The distribution network platform gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center link key respectively to perform first access authentication.
在待认证设备生成设备端信任中心链接密钥,以及配网平台网关获取认证端信任中心链接密钥后,配网平台网关和待认证设备分别使用认证端信任中心链接密钥以及设备端信任中心链接密钥,进行第一接入认证。After the device to be authenticated generates the device-side trust center link key, and the distribution platform gateway obtains the authentication-side trust center link key, the distribution platform gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center respectively. The link key is used for the first access authentication.
可选的,在待认证设备生成的设备端信任中心链接密钥与配网平台网关获取的认证端信任中心链接密钥相同的情况下,第一接入认证成功。可选的,第一接入认证成功后,待认证设备即可加入配网平台网关所组建的网络。Optionally, if the device-side trust center link key generated by the device to be authenticated is the same as the authentication-side trust center link key obtained by the distribution network platform gateway, the first access authentication is successful. Optionally, after the first access authentication is successful, the device to be authenticated can join the network formed by the distribution network platform gateway.
综上所述,本实施例提供的方法,待认证设备广播的信标帧中携带第一随机数,第一随机数用于生成配网平台网关和待认证设备之间执行第一接入认证所需的认证端信任中心链接密钥以及设备端信任中心链接密钥,第一随机数是每次进行第一接入认证所动态产生的,保障第一接入认证的安全性。并且,本申请实施例中,配网平台网关通过配网平台云与设备平台云进行交互,获取第一接入认证所需的认证端信任中心链接密钥,再由配网平台网关配网平台网关和待认证设备分别使用认证端信任中心链接密钥以及设备端信任中心链接密钥,进行第一接入认证,从而实现了待认证设备的跨平台接入认证,扩展了待认证设备接入认证的实施场景。To sum up, in the method provided in this embodiment, the beacon frame broadcast by the device to be authenticated carries the first random number, and the first random number is used to generate the first access authentication between the distribution network platform gateway and the device to be authenticated The required authentication side trust center link key and device side trust center link key, and the first random number is dynamically generated each time the first access authentication is performed to ensure the security of the first access authentication. In addition, in the embodiment of the present application, the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud, obtains the authentication terminal trust center link key required for the first access authentication, and then configures the network platform by the distribution network platform gateway. The gateway and the device to be authenticated use the authentication-side trust center link key and the device-side trust center link key to perform the first access authentication, thereby realizing the cross-platform access authentication of the device to be authenticated and expanding the access of the device to be authenticated. Authentication implementation scenarios.
在基于图2的可选实施例中,待认证设备侧执行第一接入认证的过程包括:待认证设备基于设备端信任中心链接密钥,获取网络密钥(NetworkKey),网络密钥用于在第一接入认证后对网络层的数据进行加密。也即:待认证设备通过执行第一接入流程,得到正确的网络密钥,从而加入网络。In the optional embodiment based on FIG. 2 , the process of performing the first access authentication on the side of the device to be authenticated includes: the device to be authenticated obtains a network key (NetworkKey) based on the device-side trust center link key, and the network key is used for Data at the network layer is encrypted after the first access authentication. That is, the device to be authenticated obtains the correct network key by executing the first access procedure, so as to join the network.
下面,对第一接入认证的过程进行示例性的说明。Hereinafter, the process of the first access authentication is exemplarily described.
图3示出了本申请一个示例性实施例提供的接入认证方法的流程图。该方法可以应用于如图1示出的智能设备跨平台接入认证系统中,该方法包括:FIG. 3 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application. The method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
步骤301,待认证设备广播信标帧,信标帧携带第一随机数、设备标识、厂商标识和设备地址标识。Step 301, the device to be authenticated broadcasts a beacon frame, and the beacon frame carries a first random number, a device identifier, a manufacturer identifier, and a device address identifier.
可选的,信标帧为增强信标(EnhanceBeacon)帧。增强信标帧是在IEEE802.15.4中所规定的,有别于常规信标帧的一种信标帧,增强信标帧的具体格式可以参见如上表一。Optionally, the beacon frame is an enhanced beacon (EnhanceBeacon) frame. The enhanced beacon frame is specified in IEEE802.15.4, which is different from the conventional beacon frame. For the specific format of the enhanced beacon frame, see Table 1 above.
可选的,增强信标帧携带第一随机数、设备标识、厂商标识和设备地址标识。其中,第一随机数、设备标识和厂商标识填充在增强信标帧的头信息单元(HeaderIEs)中,设备地址标识填充在增强信标帧的信标有效载荷(Beacon Payload)中。Optionally, the enhanced beacon frame carries the first random number, the device identification, the manufacturer identification and the device address identification. Wherein, the first random number, device identification and manufacturer identification are filled in the header information element (HeaderIEs) of the enhanced beacon frame, and the device address identification is filled in the beacon payload (Beacon Payload) of the enhanced beacon frame.
在一种可能的实现方式中,步骤301替换实现为:待认证设备广播增强信标帧。在另一种可能的实现方式中,步骤301替换实现为:待认证设备交替广播增强信标帧和常规信标帧,用以实现常规信标帧的兼容。In a possible implementation manner, step 301 is alternatively implemented as: the device to be authenticated broadcasts the enhanced beacon frame. In another possible implementation manner, step 301 is alternatively implemented as: the device to be authenticated alternately broadcasts the enhanced beacon frame and the regular beacon frame, so as to realize the compatibility of the regular beacon frame.
步骤302,配网平台网关接收信标帧。Step 302, the distribution network platform gateway receives the beacon frame.
可选的,信标帧为增强信标帧,配网平台网关接收待认证设备广播的增强信标帧,从增强信号帧中获取第一随机数、设备标识、厂商标识和设备地址标识。Optionally, the beacon frame is an enhanced beacon frame, and the distribution network platform gateway receives the enhanced beacon frame broadcast by the device to be authenticated, and obtains the first random number, device identification, manufacturer identification and device address identification from the enhanced signal frame.
步骤303,配网平台网关向待认证设备发送信标响应。Step 303, the distribution network platform gateway sends a beacon response to the device to be authenticated.
其中,信标响应用于响应信标帧。可选的,信标响应中携带配网平台网关所构建的网络的PAN ID。可选的,在配网平台网关同意待认证设备加入网络的情况下,配网平台网关向待认证设备发送信标响应。Among them, the beacon response is used to respond to the beacon frame. Optionally, the beacon response carries the PAN ID of the network constructed by the distribution network platform gateway. Optionally, when the network configuration platform gateway agrees that the device to be authenticated joins the network, the network configuration platform gateway sends a beacon response to the device to be authenticated.
可选的,信标帧携带设备标识,设备标识用于标识待认证设备的类型。在发送信标响应之前,配网平台网关还将执行如下步骤:向控制设备发送设备标识,控制设备用于控制配网平台网关;接收控制设备发送的接入请求,接入请求用于触发配网平台网关反馈信标响应,信标响应用于响应信标帧。Optionally, the beacon frame carries a device identifier, and the device identifier is used to identify the type of the device to be authenticated. Before sending the beacon response, the distribution network platform gateway will also perform the following steps: send the device identification to the control device, and the control device is used to control the distribution network platform gateway; receive the access request sent by the control device, and the access request is used to trigger the configuration The network platform gateway feeds back the beacon response, and the beacon response is used to respond to the beacon frame.
示例性的,配网平台网关为路由器,控制终端为用户使用的手机。在接收到信标帧后,配网平台网关将信标帧中的设备标识发送给手机,手机对设备标识所对应的待认证设备的类型进行播报,如:该设备标识所对应的待认证设备的类型为温度传感器,用户通过播报了解待认证设备的类型,并控制手机发送接入请求,配网平台网关在接收到接入请求后,根据接入请求的指示,向待认证设备发送信标响应。Exemplarily, the distribution network platform gateway is a router, and the control terminal is a mobile phone used by a user. After receiving the beacon frame, the network distribution platform gateway sends the device identification in the beacon frame to the mobile phone, and the mobile phone broadcasts the type of the device to be authenticated corresponding to the device identification, such as: the device to be authenticated corresponding to the device identification The type of the device is a temperature sensor. The user learns the type of the device to be authenticated by broadcasting, and controls the mobile phone to send an access request. After receiving the access request, the distribution network platform gateway sends a beacon to the device to be authenticated according to the instructions of the access request. response.
步骤304,待认证设备接收信标响应。Step 304, the device to be authenticated receives a beacon response.
可选的,待认证设备通过接收信标响应,确定配网平台网关处存在可以加入的网络,该网络用PAN ID进行标识。Optionally, the device to be authenticated determines that there is a network that can be joined at the gateway of the distribution network platform by receiving a beacon response, and the network is identified by a PAN ID.
步骤305,待认证设备向配网平台网关发送关联请求。Step 305, the device to be authenticated sends an association request to the distribution network platform gateway.
其中,关联请求(association request)用于请求接入配网平台网关构建的网络。Among them, the association request (association request) is used to request access to the network constructed by the distribution network platform gateway.
可选的,在接收信标响应后,若待认证设备选择接入配网平台网关所构建的网络,则待认证设备向配网平台网关发送关联请求。Optionally, after receiving the beacon response, if the device to be authenticated chooses to access the network constructed by the distribution network platform gateway, the device to be authenticated sends an association request to the distribution network platform gateway.
步骤306,配网平台网关接收关联请求。Step 306, the distribution network platform gateway receives the association request.
步骤307,配网平台网关向待认证设备发送关联响应。Step 307, the distribution network platform gateway sends an association response to the device to be authenticated.
其中,关联响应(association response)用于响应关联请求。在接收待认证设备发送的关联请求后,配网平台网关单播反馈关联响应给待认证设备。Among them, the association response (association response) is used to respond to the association request. After receiving the association request sent by the device to be authenticated, the distribution network platform gateway unicasts an association response to the device to be authenticated.
可选的,关联响应中携带配网平台网关分配给待认证设备的网络地址(network address)。其中,网络地址是16位的短地址,网络地址用于在配网平台网关所构建的网络中唯一地标识该待认证设备。Optionally, the association response carries the network address (network address) assigned by the network configuration platform gateway to the device to be authenticated. The network address is a 16-bit short address, and the network address is used to uniquely identify the device to be authenticated in the network constructed by the distribution network platform gateway.
步骤308,待认证设备接收关联响应。Step 308, the device to be authenticated receives an association response.
步骤309,配网平台网关通过配网平台云,与设备平台云交互,获取认证端信任中心链接密钥。Step 309, the distribution network platform gateway interacts with the device platform cloud through the distribution network platform cloud to obtain the authentication terminal trust center link key.
配网平台网关获取认证端信任中心链接密钥的方式具体参见图4对应实施例,在此不进行赘述。The specific manner in which the distribution network platform gateway obtains the authentication terminal trust center link key is shown in the corresponding embodiment in FIG. 4 , which will not be repeated here.
步骤310,待认证设备基于第一随机数以及许可密钥,生成设备端信任中心链接密钥。Step 310, the device to be authenticated generates a device-side trust center link key based on the first random number and the license key.
在一种可能的实现方式中,待认证设备将生成的设备端安装码作为设备端信任中心链接密钥。也即,步骤310包括:待认证设备采用第一密钥生成算法,对第一随机数以及许可密钥进行处理,生成设备端安装码,将设备端安装码作为设备端信任中心链接密钥。可选的,第一密钥生成算法是一种对称加密算法,第一密钥生成算法包括:高级加密标准(Advanced Encryption Standard,AES)-MMO(Matyas-Meyer-Oseas)哈希算法。In a possible implementation manner, the device to be authenticated uses the generated device-side installation code as the device-side trust center link key. That is, step 310 includes: the device to be authenticated adopts the first key generation algorithm, processes the first random number and the license key, generates a device-side installation code, and uses the device-side installation code as the device-side trust center link key. Optionally, the first key generation algorithm is a symmetric encryption algorithm, and the first key generation algorithm includes: an Advanced Encryption Standard (Advanced Encryption Standard, AES)-MMO (Matyas-Meyer-Oseas) hash algorithm.
示例性的,TCLK=InstallCode=AES-MMO(Kc|R1)。其中,TCLK为设备端信任中心链接密钥,InstallCode为设备端安装码,Kc为许可密钥,R1为第一随机数。Exemplarily, TCLK=InstallCode=AES-MMO(Kc|R1). Wherein, TCLK is the device-side trust center link key, InstallCode is the device-side installation code, Kc is the license key, and R1 is the first random number.
在另一种可能的实现方式中,待认证设备在生成设备端安装码后,对设备端安装码进行进一步处理,得到设备端信任中心链接密钥。也即,步骤310包括:待认证设备采用第一密钥生成算法,对第一随机数以及许可密钥进行处理,生成设备端安装码;采用第二密钥生成算法,对设备端安装码进行处理,生成设备端信任中心链接密钥。可选的,第一密钥生成算法和第二密钥算法是对称加密算法,第一密钥生成算法包括:AES-MMO哈希算法;第二密钥生成算法包括:AES-MMO哈希算法。In another possible implementation manner, after the device to be authenticated generates the device-side installation code, the device-side installation code is further processed to obtain the device-side trust center link key. That is, step 310 includes: the device to be authenticated adopts the first key generation algorithm, processes the first random number and the license key, and generates a device-side installation code; adopts the second key generation algorithm to perform a device-side installation code Process to generate the device-side trust center link key. Optionally, the first key generation algorithm and the second key algorithm are symmetric encryption algorithms, the first key generation algorithm includes: AES-MMO hash algorithm; the second key generation algorithm includes: AES-MMO hash algorithm .
示例性的,InstallCode=AES-MMO(Kc|R1),TCLK=AES-MMO(Install Code)。其中,TCLK为设备端信任中心链接密钥,InstallCode为设备端安装码,Kc为许可密钥,R1为第一随机数。Exemplarily, InstallCode=AES-MMO(Kc|R1), TCLK=AES-MMO(Install Code). Wherein, TCLK is the device-side trust center link key, InstallCode is the device-side installation code, Kc is the license key, and R1 is the first random number.
可以理解的是,在上述两种实现方式中,由于第一随机数是每次待认证设备试图入网时生成的随机数,则设备端安装码是动态生成的,从而待认证设备根据设备端安装码而确定的设备端信任中心链接密钥也是动态生成的。It can be understood that, in the above two implementation manners, since the first random number is a random number generated each time the device to be authenticated attempts to access the network, the device-side installation code is dynamically generated, so that the device-to-be-authenticated device is installed according to the device-side installation code. The device-side trust center link key determined by the code is also dynamically generated.
步骤311,配网平台网关向待认证设备发送加密密钥信息,加密密钥信息是根据认证端信任中心链接密钥对网络密钥进行加密得到的信息。Step 311: The distribution network platform gateway sends encryption key information to the device to be authenticated, where the encryption key information is information obtained by encrypting the network key according to the authentication terminal trust center link key.
网络密钥是配网平台网关在构建网络时生成的随机字符串。可选的,网络中的所有入网设备共享同一个网络密钥。The network key is a random string generated by the distribution platform gateway when building the network. Optionally, all network access devices in the network share the same network key.
配网平台网关在获取认证端信任中心链接密钥之后,使用认证端信任中心链接密钥对网络密钥进行加密,得到加密密钥信息,并将加密密钥信息发送给待认证设备,以供待认证设备从加密密钥信息中获取网络密钥。After obtaining the authentication terminal trust center link key, the distribution network platform gateway uses the authentication terminal trust center link key to encrypt the network key, obtains encryption key information, and sends the encryption key information to the device to be authenticated for use. The device to be authenticated obtains the network key from the encryption key information.
步骤312,待认证设备接收加密密钥信息。Step 312, the device to be authenticated receives the encryption key information.
步骤313,待认证设备使用设备端信任中心链接密钥对加密密钥信息进行处理,得到网络密钥。Step 313, the device to be authenticated uses the device-side trust center link key to process the encryption key information to obtain a network key.
网络密钥用于对网络层的数据进行加密。可选的,待认证设备获取网络密钥之后,基于网络密钥与配网平台网关进行通信。Network keys are used to encrypt data at the network layer. Optionally, after the device to be authenticated obtains the network key, it communicates with the network distribution platform gateway based on the network key.
由于加密密钥信息是配网平台网关根据认证端信任中心链接密钥对网络密钥进行加密得到的信息,则在待认证设备侧生成的设备端信任中心链接密钥与认证端信任中心链接密钥相等的情况下,待认证设备能够使用设备端信任中心链接密钥对加密密钥信息进行处理,得到正确的网络密钥。Since the encryption key information is the information obtained by the distribution network platform gateway encrypting the network key according to the authentication side trust center link key, the device side trust center link key generated on the device side to be authenticated is the same as the authentication side trust center link key. If the keys are equal, the device to be authenticated can use the device-side trust center link key to process the encrypted key information to obtain the correct network key.
步骤314,待认证设备广播设备声明消息。Step 314, the device to be authenticated broadcasts a device declaration message.
设备声明广播消息用于表示待认证设备已接入配网平台网关构建的网络。The device announcement broadcast message is used to indicate that the device to be authenticated has connected to the network constructed by the distribution network platform gateway.
步骤315,配网平台网关接收设备声明消息。Step 315, the distribution network platform gateway receives the device declaration message.
配网平台网关接收待认证设备广播的设备声明消息。The distribution network platform gateway receives the device declaration message broadcast by the device to be authenticated.
综上所述,本实施例提供的方法,待认证设备广播的信标帧为增强信标帧,由于增强信标帧中存在可以由待认证设备所属的厂商自定义的字段,便于在增强信标帧中携带第一随机数、设备标识、厂商标识和设备地址标识,从而保障后续执行第一接入认证过程。To sum up, in the method provided in this embodiment, the beacon frame broadcast by the device to be authenticated is the enhanced beacon frame. Since there are fields in the enhanced beacon frame that can be customized by the manufacturer to which the device to be authenticated belongs, it is convenient to use the enhanced beacon frame. The standard frame carries the first random number, the device identification, the manufacturer identification and the device address identification, so as to ensure the subsequent execution of the first access authentication process.
同时,本实施例提供的方法,配网平台网关从设备云平台处获取认证端安装码,不需要用户手动输入或扫描,再由用户将认证端安装码发送给设备云平台,减少人为交互,提高接入认证的效率。At the same time, in the method provided by this embodiment, the distribution network platform gateway obtains the authentication terminal installation code from the device cloud platform, without requiring the user to manually input or scan, and then the user sends the authentication terminal installation code to the device cloud platform, reducing human interaction. Improve the efficiency of access authentication.
下面,对步骤309中配网平台网关获取认证端信任中心链接密钥的方式进行示例性的说明。Hereinafter, an exemplary description will be given of the manner in which the distribution network platform gateway obtains the authentication terminal trust center link key in step 309 .
图4示出了本申请一个示例性实施例提供的接入认证方法的流程图。该方法可以应用于如图1示出的智能设备跨平台接入认证系统中,该方法包括:FIG. 4 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application. The method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
步骤3091,配网平台网关通过配网平台云,向设备平台云发送安装码请求。Step 3091, the distribution network platform gateway sends an installation code request to the device platform cloud through the distribution network platform cloud.
其中,安装码请求携带设备地址标识和第一随机数,第一随机数用于供设备平台云生成认证端安装码,设备地址标识用于标识待认证设备的MAC地址。The installation code request carries a device address identifier and a first random number, the first random number is used for the device platform cloud to generate the authentication terminal installation code, and the device address identifier is used to identify the MAC address of the device to be authenticated.
可选的,安装码请求还携带厂商标识。配网平台网关向配网平台云发送安装码请求,配网平台云根据厂商标识,确定设备平台云,并将安装码请求转发给设备平台云。Optionally, the installation code request also carries the manufacturer identifier. The distribution network platform gateway sends an installation code request to the distribution network platform cloud, and the distribution network platform cloud determines the device platform cloud according to the manufacturer's identification, and forwards the installation code request to the device platform cloud.
步骤3092,设备平台云接收安装码请求。Step 3092, the device platform cloud receives the installation code request.
安装码请求的源地址为配网平台网关,安装码请求携带待认证设备对应的设备地址标识和第一随机数。The source address of the installation code request is the distribution network platform gateway, and the installation code request carries the device address identifier and the first random number corresponding to the device to be authenticated.
可选的,设备平台云从配网平台云处接收源地址为配网平台网关的安装码请求。Optionally, the device platform cloud receives an installation code request whose source address is the distribution network platform gateway from the distribution network platform cloud.
步骤3093,设备平台云基于第一随机数,生成认证端安装码。Step 3093, the device platform cloud generates an authentication terminal installation code based on the first random number.
可选的,步骤3093包括:设备平台云根据设备地址标识,确定待认证设备对应的许可密钥;采用第一密钥生成算法,对第一随机数以及许可密钥进行处理,生成认证端安装码。Optionally, step 3093 includes: the device platform cloud determines the license key corresponding to the device to be authenticated according to the device address identifier; uses the first key generation algorithm to process the first random number and the license key to generate the authentication terminal installation. code.
可选的,在设备平台云中存储有设备地址标识与许可密钥之间的关系表,设备平台云根据设备地址标识在关系表中进行查找,确定待认证设备对应的许可密钥。可选的,第一密钥生成算法是一种对称加密算法,第一密钥生成算法包括:AES-MMO哈希算法。Optionally, a relationship table between the device address identifier and the license key is stored in the device platform cloud, and the device platform cloud searches the relationship table according to the device address identifier to determine the license key corresponding to the device to be authenticated. Optionally, the first key generation algorithm is a symmetric encryption algorithm, and the first key generation algorithm includes: AES-MMO hash algorithm.
示例性的,InstallCode’=AES-MMO(Kc|R1)。其中,InstallCode’为认证端安装码,Kc为许可密钥,R1为第一随机数。Exemplarily, InstallCode'=AES-MMO(Kc|R1). Among them, InstallCode' is the installation code of the authentication terminal, Kc is the license key, and R1 is the first random number.
步骤3094,设备平台云发送安装码响应,安装码响应的目的地址为配网平台网关。Step 3094, the device platform cloud sends an installation code response, and the destination address of the installation code response is the distribution network platform gateway.
其中,安装码响应携带认证端安装码,认证端安装码用于供配网平台网关确定认证端信任中心链接密钥。The installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine the authentication terminal trust center link key.
可选的,设备平台云向配网平台云发送安装码响应,配网平台云将安装码响应转发给配网平台网关。Optionally, the device platform cloud sends an installation code response to the distribution network platform cloud, and the distribution network platform cloud forwards the installation code response to the distribution network platform gateway.
步骤3095,配网平台网关接收安装码响应。Step 3095, the distribution network platform gateway receives the installation code response.
可选的,配网平台网关通过配网平台云,接收源地址为设备平台云的安装码响应。Optionally, the distribution network platform gateway receives the installation code response whose source address is the device platform cloud through the distribution network platform cloud.
步骤3096,配网平台网关基于安装码响应,确定认证端信任中心链接密钥。Step 3096: Based on the installation code response, the distribution network platform gateway determines the authentication terminal trust center link key.
其中,安装码响应携带认证端安装码,认证端安装码用于供配网平台网关确定认证端信任中心链接密钥。The installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine the authentication terminal trust center link key.
在一种可能的实现方式中,配网平台网关将获取的认证端安装码作为设备端信任中心链接密钥。In a possible implementation manner, the distribution network platform gateway uses the obtained authentication side installation code as the device side trust center link key.
在另一种可能的实现方式中,配网平台网关在获取认证端安装码后,对认证端安装码进行进一步处理,得到认证端信任中心链接密钥。步骤3096包括:配网平台网关采用第二密钥生成算法,对认证端安装码进行处理,生成认证端信任中心链接密钥。可选的,第二密钥生成算法是一种对称加密算法,第二密钥生成算法包括:AES-MMO哈希算法。In another possible implementation manner, after obtaining the installation code of the authentication terminal, the distribution network platform gateway further processes the installation code of the authentication terminal to obtain the link key of the trust center of the authentication terminal. Step 3096 includes: the distribution network platform gateway uses the second key generation algorithm to process the installation code of the authentication terminal to generate a trust center link key of the authentication terminal. Optionally, the second key generation algorithm is a symmetric encryption algorithm, and the second key generation algorithm includes: AES-MMO hash algorithm.
示例性的,TCLK’=AES-MMO(Install Code’)。其中,TCLK’为认证端信任中心链接密钥,InstallCode’为认证端安装码。Exemplarily, TCLK'=AES-MMO (Install Code'). Among them, TCLK' is the authentication terminal trust center link key, and InstallCode' is the authentication terminal installation code.
综上所述,本实施例提供的方法,设备端安装码以及认证端安装码是由待认证设备和配网平台网关基于第一随机数生成的,由于第一随机数是每次待认证设备试图入网时生成的随机数,则设备端安装码是动态生成的,从而待认证设备根据设备端安装码而确定的设备端信任中心链接密钥也是动态生成的,避免了由于设备端安装码固定不变而带来的设备端安装码泄露的风险。To sum up, in the method provided in this embodiment, the device-side installation code and the authentication-side installation code are generated by the device to be authenticated and the distribution network platform gateway based on the first random number, because the first random number is the device to be authenticated every time. If the random number is generated when trying to access the network, the device-side installation code is dynamically generated, so the device-side trust center link key determined by the device to be authenticated according to the device-side installation code is also dynamically generated, avoiding the need for the device-side installation code to be fixed. The risk of device-side installation code leakage caused by the change.
可选的,在基于图2的可选实施例中,在第一接入认证之后,待认证设备将基于设备平台云生成的第二随机数进行第二接入认证。Optionally, in the optional embodiment based on FIG. 2 , after the first access authentication, the device to be authenticated will perform the second access authentication based on the second random number generated by the device platform cloud.
下面,对第二接入认证过程进行示例性的说明。Below, the second access authentication process is exemplarily described.
图5示出了本申请一个示例性实施例提供的接入认证方法的流程图。该方法可以应用于如图1示出的智能设备跨平台接入认证系统中,该方法包括:Fig. 5 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application. The method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
步骤501,配网平台网关向待认证设备的自定义簇发送随机数写入请求,随机数写入请求携带第二随机数。Step 501: The distribution network platform gateway sends a random number writing request to the custom cluster of the device to be authenticated, and the random number writing request carries a second random number.
第二随机数是设备平台云生成的随机数。可选的,配网平台网关从源地址为设备平台云的安装码响应中获取第二随机数。The second random number is a random number generated by the device platform cloud. Optionally, the distribution network platform gateway obtains the second random number from the installation code response whose source address is the device platform cloud.
自定义簇是由待认证设备所属的厂商所定义的簇(Cluster)。待认证设备的簇支持配网平台网关进行访问,访问类型包括:写、写后返回、读取等等。可选的,步骤501包括:配网平台网关获取自定义簇的访问类型;响应于自定义簇的访问类型为写后返回,向自定义簇发送随机数写入请求。在自定义簇的访问类 型为写后返回的情况下,便于配网平台网关在发送随机数写入请求后,从待认证设备处接收到返回的设备端认证密钥。A custom cluster is a cluster (Cluster) defined by the manufacturer to which the device to be authenticated belongs. The cluster of devices to be authenticated supports access by the distribution network platform gateway, and the access types include: write, return after write, read, etc. Optionally, step 501 includes: the configuration network platform gateway obtains the access type of the custom cluster; in response to the access type of the custom cluster being return after write, sending a random number write request to the custom cluster. When the access type of the custom cluster is return after write, it is convenient for the distribution network platform gateway to receive the returned device-side authentication key from the device to be authenticated after sending the random number write request.
步骤502,待认证设备接收随机数写入请求。Step 502, the device to be authenticated receives a random number writing request.
其中,随机数写入请求携带第二随机数。The random number writing request carries the second random number.
步骤503,待认证设备基于第二随机数生成设备端认证密钥。Step 503, the device to be authenticated generates a device-side authentication key based on the second random number.
其中,设备端认证密钥用于进行待认证设备的第二接入认证。The device-side authentication key is used to perform second access authentication of the device to be authenticated.
可选的,步骤503包括:待认证设备采用第三密钥生成算法,对第二随机数以及许可密钥进行处理,生成设备端认证密钥。可选的,第三密钥生成算法是一种对称加密算法,第三密钥生成算法包括:AES-MMO哈希算法。Optionally, step 503 includes: the device to be authenticated uses a third key generation algorithm to process the second random number and the license key to generate a device-side authentication key. Optionally, the third key generation algorithm is a symmetric encryption algorithm, and the third key generation algorithm includes: AES-MMO hash algorithm.
示例性的,Auth=AES-MMO(Kc|R2)。其中,Auth为设备端认证密钥,Kc为许可密钥,R2为第二随机数。Exemplarily, Auth=AES-MMO(Kc|R2). Among them, Auth is the device-side authentication key, Kc is the license key, and R2 is the second random number.
可选的,在生成设备端认证密钥之后,待认证设备将设备端认证密钥存储于自定义簇的属性中。自定义簇包括至少一个属性(Attribute),属性是反映待认证设备的状态或性质的一种数据实体。在本申请实施例中,属性用于存储待认证设备对应的设备端认证密钥。可选的,自定义簇的访问类型为写后返回。Optionally, after generating the device-side authentication key, the device to be authenticated stores the device-side authentication key in the attribute of the custom cluster. The custom cluster includes at least one attribute (Attribute), and the attribute is a data entity reflecting the state or property of the device to be authenticated. In this embodiment of the present application, the attribute is used to store the device-side authentication key corresponding to the device to be authenticated. Optionally, the access type of the custom cluster is return after write.
步骤504,待认证设备向配网平台网关发送设备端认证密钥。Step 504, the device to be authenticated sends the device-side authentication key to the distribution network platform gateway.
在生成并存储设备端认证密钥之后,待认证设备向配网平台网关发送设备端认证密钥。After generating and storing the device-side authentication key, the device to be authenticated sends the device-side authentication key to the distribution network platform gateway.
步骤505,配网平台网关接收设备端认证密钥。Step 505: The distribution network platform gateway receives the device-side authentication key.
步骤506,配网平台网关通过配网平台云,向设备平台云发送认证设备请求,认证设备请求携带设备地址标识和设备端认证密钥。Step 506, the distribution network platform gateway sends an authentication device request to the device platform cloud through the distribution network platform cloud, where the authentication device request carries the device address identifier and the device-side authentication key.
认证设备请求用于请求设备平台云进行第二接入认证。The authentication device request is used to request the device platform cloud to perform second access authentication.
可选的,认证设备请求还携带厂商标识。配网平台网关向配网平台云发送认证设备请求,配网平台云根据厂商标识,确定设备平台云,并将认证设备请求转发给设备平台云。Optionally, the authentication device request also carries the manufacturer identifier. The distribution network platform gateway sends an authentication device request to the distribution network platform cloud, and the distribution network platform cloud determines the device platform cloud according to the manufacturer's identification, and forwards the authentication device request to the device platform cloud.
步骤507,设备平台云接收认证设备请求。Step 507, the device platform cloud receives the authentication device request.
认证设备请求的源地址为配网平台网关,认证设备请求携带设备地址标识和设备端认证密钥,设备端认证密钥是待认证设备基于第二随机数生成的密钥。可选的,设备平台云从配网平台云处接收源地址为配网平台网关的认证设备请求。The source address requested by the authentication device is the distribution network platform gateway, the authentication device request carries the device address identifier and the device-side authentication key, and the device-side authentication key is a key generated by the device to be authenticated based on the second random number. Optionally, the device platform cloud receives an authentication device request whose source address is the distribution network platform gateway from the configuration network platform cloud.
步骤508,设备平台云根据第二随机数,对设备端认证密钥进行第二接入认证。Step 508: The device platform cloud performs second access authentication on the device-side authentication key according to the second random number.
第二随机数是设备平台云生成的随机数。可选的,第二随机数的长度为4个字节。The second random number is a random number generated by the device platform cloud. Optionally, the length of the second random number is 4 bytes.
可选的,步骤508包括:设备平台云根据设备地址标识,确定待认证设备对应的许可密钥;采用第三密钥生成算法,对第二随机数以及许可密钥进行处理,生成云端认证密钥;对云端认证密钥与设备端认证密钥进行验证,确定认证结果。Optionally, step 508 includes: the device platform cloud determines the license key corresponding to the device to be authenticated according to the device address identifier; uses a third key generation algorithm to process the second random number and the license key to generate a cloud authentication key. key; verify the cloud authentication key and the device-side authentication key to determine the authentication result.
可选的,在设备平台云中存储有设备地址标识与许可密钥之间的关系表,设备平台云根据设备地址标识在关系表中进行查找,确定待认证设备对应的许可密钥。可选的,第三密钥生成算法是一种对称加密算法,第三密钥生成算法包括:AES-MMO哈希算法。Optionally, a relationship table between the device address identifier and the license key is stored in the device platform cloud, and the device platform cloud searches the relationship table according to the device address identifier to determine the license key corresponding to the device to be authenticated. Optionally, the third key generation algorithm is a symmetric encryption algorithm, and the third key generation algorithm includes: AES-MMO hash algorithm.
示例性的,Auth’=AES-MMO(Kc|R2)。其中,Auth’为云端认证密钥,Kc为许可密钥,R2为第二随机数。Exemplarily, Auth'=AES-MMO(Kc|R2). Among them, Auth' is the cloud authentication key, Kc is the license key, and R2 is the second random number.
示例性的,若云端认证密钥与设备端认证密钥相等,则认证结果为认证成功;若云端认证密钥与设备端认证密钥不相等,则认证结果为认证失败。Exemplarily, if the cloud authentication key is equal to the device authentication key, the authentication result is authentication success; if the cloud authentication key and the device authentication key are not equal, the authentication result is authentication failure.
步骤509,设备平台云发送认证结果,认证结果的目的地址为配网平台网关。Step 509, the device platform cloud sends the authentication result, and the destination address of the authentication result is the gateway of the distribution network platform.
可选的,设备平台云向配网平台云发送认证结果,配网平台云将认证结果转发给配网平台网关。Optionally, the device platform cloud sends the authentication result to the distribution network platform cloud, and the distribution network platform cloud forwards the authentication result to the distribution network platform gateway.
步骤510,配网平台网关接收认证结果。Step 510, the distribution network platform gateway receives the authentication result.
可选的,配网平台网关通过配网平台云,接收源地址为设备平台云的认证结果。Optionally, the distribution network platform gateway receives the authentication result whose source address is the device platform cloud through the distribution network platform cloud.
可选的,在接收认证结果之后,配网平台网关还将执行如下步骤中的任意一种:响应于认证结果为认证成功,更新认证端信任中心链接密钥;响应于认证结果为认证失败,将待认证设备添加至设备黑名单,设备黑名单用于记录配网失败的设备。可选的,设备黑名单中的待认证设备被移出配网平台网关所构建的网络。Optionally, after receiving the authentication result, the distribution network platform gateway will also perform any one of the following steps: in response to the authentication result being that the authentication is successful, update the authentication end trust center link key; in response to the authentication result being the authentication failure, Add the device to be authenticated to the device blacklist. The device blacklist is used to record the devices that fail to configure the network. Optionally, the devices to be authenticated in the device blacklist are removed from the network constructed by the distribution network platform gateway.
可以理解的是,由于在第一接入认证过程中,已验证认证端信任中心链接密钥等于设备端信任中心链接密钥,且待认证设备已加入配网平台网关所构建的网络,所以,认证成功之后的配网平台网关更新认证端信任中心链接密钥,指的是:配网平台网关与待认证设备一起同步更新两侧的信任中心链接密钥。It can be understood that, since in the first access authentication process, the verified authentication side trust center link key is equal to the device side trust center link key, and the device to be authenticated has joined the network constructed by the distribution network platform gateway, so, After successful authentication, the distribution network platform gateway updates the authentication end trust center link key, which means that the distribution network platform gateway and the device to be authenticated synchronously update the trust center link key on both sides.
综上所述,本实施例提供的方法,在第一接入验证之后,利用设备平台云生成的第二随机数生成云端认证密钥与设备端认证密钥,使用云端认证密钥与设备端认证密钥对待认证设备进行第二接入验证,相比于只进行单向的第一接入验证,通过进行第二接入验证实现双向验证,进一步提高接入验证的可靠性。To sum up, in the method provided by this embodiment, after the first access verification, the second random number generated by the device platform cloud is used to generate the cloud authentication key and the device end authentication key, and the cloud authentication key and the device end authentication key are generated using the cloud authentication key and the device end authentication key. The authentication key performs the second access verification on the device to be authenticated. Compared with only performing the one-way first access verification, the second access verification implements two-way verification, which further improves the reliability of the access verification.
下面,结合如下实施例,对本申请所示出的方案进行示例性的说明。在本实施例中,待认证设备为Zigbee设备,配网平台网关配置Zigbee网络。Hereinafter, the solutions shown in the present application will be exemplarily described with reference to the following examples. In this embodiment, the device to be authenticated is a Zigbee device, and the network distribution platform gateway is configured with a Zigbee network.
在如下实施例中,以CID表示厂商标识、R1表示第一随机数、Device ID表示设备标识、EUI表示设备地址标识、R2表示第二随机数、Kc表示许可密钥、Install Code表示设备端安装码、Install Code’表示认证端安装码、TCLK表示设备端信任中心链接密钥、TCLK’表示认证端信任中心链接密钥、Network Key表示网络密钥、Auth表示设备端认证密钥、Auth’表示云端认证密钥进行示例性的说明。In the following embodiment, CID represents the manufacturer's identity, R1 represents the first random number, Device ID represents the device identity, EUI represents the device address identity, R2 represents the second random number, Kc represents the license key, and Install Code represents the installation on the device side. Code, Install Code' represents the installation code of the authentication side, TCLK represents the trust center link key of the device side, TCLK' represents the trust center link key of the authentication side, Network Key represents the network key, Auth represents the authentication key of the device side, Auth' represents the The cloud authentication key is exemplified.
图6示出了本申请一个示例性实施例提供的接入认证方法的流程图。该方法可以应用于如图1示出的智能设备跨平台接入认证系统中,该方法包括:FIG. 6 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application. The method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 , and the method includes:
步骤61,配网平台网关构建Zigbee网络。Step 61, the network distribution platform gateway builds a Zigbee network.
配网平台网关是具备配置Zigbee网络能力的设备。The distribution network platform gateway is a device capable of configuring Zigbee network.
步骤62,用户通过APP或者语音激活配网平台网关。Step 62, the user activates the distribution network platform gateway through the APP or voice.
步骤63,配网平台网关执行允许接入。Step 63, the distribution network platform gateway executes the access permission.
可选的,配网平台通过广播允许接入(Permit Join)消息执行允许接入。Optionally, the distribution network platform performs permission access by broadcasting a permission access (Permit Join) message.
步骤64,配网平台网关执行信道扫描。 Step 64, the distribution network platform gateway performs channel scanning.
步骤65,Zigbee设备使用增强信标帧格式,在头信息单元中填充CID|R1|Device ID,在信标有效载荷中填充EUI。Step 65, the Zigbee device uses the enhanced beacon frame format, fills the CID|R1|Device ID in the header information element, and fills the EUI in the beacon payload.
可选的,增强信标帧的单元标识(ElementID)为0x00。可选的,CID为3个字节,R1为4个字节,DeviceID为2个字节。Optionally, the element ID (ElementID) of the enhanced beacon frame is 0x00. Optionally, CID is 3 bytes, R1 is 4 bytes, and DeviceID is 2 bytes.
步骤66,配网平台网关广播增强信标帧,携带数据CID|R1|Device ID|EUI。Step 66, the distribution network platform gateway broadcasts the enhanced beacon frame, which carries the data CID|R1|Device ID|EUI.
可选的,采用如下两种广播方式中的任意一种:只广播增强信标帧;或,交替广播增强信标帧和常规信标帧,兼容常规信标帧。Optionally, any one of the following two broadcasting modes is adopted: only the enhanced beacon frame is broadcast; or, the enhanced beacon frame and the regular beacon frame are broadcast alternately, which is compatible with the regular beacon frame.
步骤67,配网平台网关返回Device ID。Step 67, the distribution network platform gateway returns the Device ID.
可选的,DeviceID为16bit用于标识设备类型的标识。Optionally, DeviceID is a 16-bit identifier used to identify the device type.
步骤68,用户侧播报设备类型。Step 68, the user side broadcasts the device type.
可选的,用户侧根据Device ID确定Zigbee设备的设备类型,并进行播报。Optionally, the user side determines the device type of the Zigbee device according to the Device ID, and broadcasts it.
步骤69,用户执行输入:连接设备。Step 69, the user performs input: connect the device.
用户侧获取Zigbee设备的设备类型后向配网平台网关发送接入请求。After obtaining the device type of the Zigbee device, the user side sends an access request to the distribution network platform gateway.
步骤610,配网平台网关向Zigbee设备发送信标响应。Step 610, the distribution network platform gateway sends a beacon response to the Zigbee device.
信标响应用于响应Zigbee设备广播发送的增强信标帧。The beacon response is used to respond to the enhanced beacon frame broadcast by the Zigbee device.
步骤611,Zigbee设备向配网平台网关发送关联请求。Step 611, the Zigbee device sends an association request to the distribution network platform gateway.
关联请求用于请求接入配网平台网关构建的Zigbee网络。The association request is used to request access to the Zigbee network constructed by the distribution network platform gateway.
步骤612,配网平台网关向Zigbee设备发送关联响应。Step 612, the distribution network platform gateway sends an association response to the Zigbee device.
关联响应用于响应关联请求。可选的,关联响应中携带配网平台网关分配给Zigbee设备的网络地址。Association Responses are used to respond to association requests. Optionally, the association response carries the network address allocated to the Zigbee device by the network configuration platform gateway.
步骤613,配网平台网关发送安装码请求,携带数据CID|R1|EUI。Step 613, the distribution network platform gateway sends an installation code request, which carries the data CID|R1|EUI.
步骤613.1,配网平台云根据CID查询设备平台云。Step 613.1, the distribution network platform cloud queries the device platform cloud according to the CID.
配网平台云通过CID可知Zigbee设备不属于该配网平台云,根据CID获取对应厂商的云平台信息。The distribution network platform cloud can know that the Zigbee device does not belong to the distribution network platform cloud through the CID, and obtain the cloud platform information of the corresponding manufacturer according to the CID.
步骤613.2,配网平台云向设备平台云发送安装码请求,携带数据R1|EUI。Step 613.2, the distribution network platform cloud sends an installation code request to the device platform cloud, carrying the data R1|EUI.
步骤613.3,设备平台云根据EUI找到设备Kc,生成Install Code’=AES-MMO(Kc|R1),产生随机数R2。Step 613.3, the device platform cloud finds the device Kc according to the EUI, generates Install Code'=AES-MMO(Kc|R1), and generates a random number R2.
可选的,设备平台云中存储有EUI与Kc之间的对应关系表。Optionally, a correspondence table between EUI and Kc is stored in the device platform cloud.
步骤613.4,设备平台返回安装码响应至配网平台云,携带数据Install Code’和R2。Step 613.4, the device platform returns an installation code response to the distribution network platform cloud, carrying the data Install Code' and R2.
步骤614,配网平台云返回安装码响应至配网平台网关,携带数据Install Code’和R2。Step 614, the distribution network platform cloud returns an installation code response to the distribution network platform gateway, carrying the data Install Code' and R2.
步骤615,配网平台网关生成TCLK’=AES-MMO(Install Code’)。Step 615, the distribution network platform gateway generates TCLK'=AES-MMO (Install Code').
配网平台网关在获取到Install Code’之后,根据Install Code’生成TCLK’。After obtaining the Install Code', the distribution network platform gateway generates TCLK' according to the Install Code'.
可选的,配网平台网关建立并存储EUI与TCLK’之间的对应关系表。Optionally, the distribution network platform gateway establishes and stores a correspondence table between EUI and TCLK'.
步骤616,Zigbee设备生成Install Code=AES-MMO(Kc|R1),TCLK=AES-MMO(Install Code)。Step 616, the Zigbee device generates Install Code=AES-MMO(Kc|R1), TCLK=AES-MMO(Install Code).
其中,Kc只能存放于Zigbee设备和设备平台云中。Among them, Kc can only be stored in Zigbee device and device platform cloud.
步骤617,配网平台网关和Zigbee设备通过TCLK建立网络层安全通道,传输Network Key。Step 617, the network distribution platform gateway and the Zigbee device establish a network layer security channel through TCLK, and transmit the Network Key.
配网平台网关通过TCLK’加密NetworkKey并将加密后的数据发送给Zigbee设备。The distribution network platform gateway encrypts the NetworkKey through TCLK' and sends the encrypted data to the Zigbee device.
步骤618,Zigbee设备获取Network Key。Step 618, the Zigbee device obtains the Network Key.
如果Zigbee设备的InstallCode与设备平台云的InstallCode’不一致,则无法接入到配网平台网关建立的Zigbee网络;只有Zigbee设备的InstallCode与设备平台云的InstallCode’一致,Zigbee设备才能够得到正确的NetworkKey。If the InstallCode of the Zigbee device is inconsistent with the InstallCode' of the device platform cloud, it cannot access the Zigbee network established by the distribution platform gateway; only the InstallCode of the Zigbee device is consistent with the InstallCode' of the device platform cloud, the Zigbee device can get the correct NetworkKey .
步骤619,配网平台网关和Zigbee设备进行设备声明广播。Step 619, the distribution network platform gateway and the Zigbee device perform device announcement broadcast.
设备声明(Deviceannounce)广播用于表示Zigbee设备接入配网平台网关构建的Zigbee网络。Device announcement (Deviceannounce) broadcast is used to indicate that Zigbee devices access the Zigbee network constructed by the distribution network platform gateway.
步骤620,配网平台网关发送随机数写入请求,携带数据R2。Step 620, the distribution network platform gateway sends a random number write request, carrying the data R2.
可选的,配网平台网关获取Zigbee设备的自定义簇的访问类型;响应于自定义簇的访问类型为写后返回(W*R),向自定义簇发送随机数写入请求。Optionally, the network configuration platform gateway obtains the access type of the custom cluster of the Zigbee device; in response to the access type of the custom cluster being write-return (W*R), a random number write request is sent to the custom cluster.
步骤621,Zigbee设备生成Auth=AES-MMO(Kc|R2),将该Auth存储至自定义簇的属性中。Step 621, the Zigbee device generates Auth=AES-MMO(Kc|R2), and stores the Auth in the attribute of the custom cluster.
步骤622,Zigbee设备返回Auth至配网平台网关。Step 622, the Zigbee device returns Auth to the distribution network platform gateway.
步骤623,配网平台网关发送认证设备请求至配网平台云,携带数据CID|Auth|EUI。Step 623, the distribution network platform gateway sends an authentication device request to the distribution network platform cloud, carrying the data CID|Auth|EUI.
步骤623.1,配网平台云根据CID查询设备平台云。Step 623.1, the distribution network platform cloud queries the device platform cloud according to the CID.
配网平台云通过CID可知Zigbee设备不属于该配网平台云,根据CID获取对应厂商的云平台信息。The distribution network platform cloud can know that the Zigbee device does not belong to the distribution network platform cloud through the CID, and obtain the cloud platform information of the corresponding manufacturer according to the CID.
步骤623.2,配网平台云向设备平台云发送认证设备请求,携带数据Auth|EUI。Step 623.2, the distribution network platform cloud sends an authentication device request to the device platform cloud, carrying the data Auth|EUI.
步骤623.3,设备平台云根据EUI找到设备Kc,生成设备Auth’=AES-MMO(Kc|R2),对Auth’与Auth进行验证。Step 623.3, the device platform cloud finds the device Kc according to the EUI, generates the device Auth'=AES-MMO(Kc|R2), and verifies the Auth' and Auth.
可选的,设备平台云中存储有EUI与Kc之间的对应关系表。如果Auth’=Auth表示认证成功,否则失败。Optionally, a correspondence table between EUI and Kc is stored in the device platform cloud. If Auth'=Auth, the authentication is successful, otherwise it fails.
步骤623.4,设备平台云返回认证结果至配网平台云。Step 623.4, the device platform cloud returns the authentication result to the distribution network platform cloud.
步骤624,配网平台云返回认证结果至配网平台网关。Step 624, the distribution network platform cloud returns the authentication result to the distribution network platform gateway.
步骤625,配网平台网关若认证失败,添加设备黑名单。Step 625: If the authentication fails, the distribution network platform gateway adds a device blacklist.
设备黑名单用于记录配网失败的设备。可选的,设备黑名单中的Zigbee设备被移出配网平台网关所构建的Zigbee网络。The device blacklist is used to record the devices that fail to configure the network. Optionally, the Zigbee devices in the device blacklist are removed from the Zigbee network constructed by the distribution network platform gateway.
配网平台网关若认证成功,则执行后续步骤。If the authentication of the distribution network platform gateway is successful, go to the next step.
步骤626,配网平台网关与Zigbee设备更新TCLK,建立正常连接。Step 626, the distribution network platform gateway and the Zigbee device update the TCLK to establish a normal connection.
可选的,更新的TCLK用于加密应用程序支持层(Application Support Sublayer,APS)的数据传输。Optionally, the updated TCLK is used to encrypt application support layer (Application Support Sublayer, APS) data transmission.
图6对应的实施例中,认证端信任中心链接密钥在配网平台网关侧生成。在另一种可能的实现方式中,认证端信任中心链接密钥在设备平台云侧生成。In the embodiment corresponding to FIG. 6 , the authentication end trust center link key is generated on the gateway side of the distribution network platform. In another possible implementation manner, the authentication end trust center link key is generated on the cloud side of the device platform.
图7示出了本申请一个示例性实施例提供的接入认证方法的流程图。该方法可以应用于如图1示出的智能设备跨平台接入认证系统中。在图6的基础上,该方法的如下步骤进行了调整:FIG. 7 shows a flowchart of an access authentication method provided by an exemplary embodiment of the present application. The method can be applied to the cross-platform access authentication system for smart devices as shown in FIG. 1 . On the basis of Figure 6, the following steps of the method are adjusted:
步骤713.3,设备平台云根据EUI找到设备Kc,生成TCLK’=AES-MMO(Kc|R1),产生随机数R2。Step 713.3, the device platform cloud finds the device Kc according to the EUI, generates TCLK'=AES-MMO(Kc|R1), and generates a random number R2.
InstallCode’由Kc|R1的组合隐含表示,TCLK’=InstallCode’=AES-MMO(Kc|R1)。InstallCode' is implicitly represented by the combination of Kc|R1, TCLK'=InstallCode'=AES-MMO(Kc|R1).
可选的,设备平台云中存储有EUI与Kc之间的对应关系表。Optionally, a correspondence table between EUI and Kc is stored in the device platform cloud.
步骤713.4,设备平台返回安装码响应至配网平台云,携带数据TCLK’和R2。Step 713.4, the device platform returns an installation code response to the distribution network platform cloud, carrying the data TCLK' and R2.
步骤714,配网平台云返回安装码响应至配网平台网关,携带数据TCLK’和R2。Step 714, the distribution network platform cloud returns an installation code response to the distribution network platform gateway, carrying the data TCLK' and R2.
步骤715,配网平台网关建立EUI与TCLK’之间的对应关系表。Step 715, the distribution network platform gateway establishes a correspondence table between EUI and TCLK'.
步骤716,Zigbee设备生成TCLK=AES-MMO(Kc|R1)。Step 716, the Zigbee device generates TCLK=AES-MMO(Kc|R1).
其中,Kc只能存放于Zigbee设备和设备平台云中。Among them, Kc can only be stored in Zigbee device and device platform cloud.
可以理解的是,图7中的其他步骤参见上述实施例,在此不进行赘述。It can be understood that, other steps in FIG. 7 refer to the above-mentioned embodiments, and are not repeated here.
综上所述,本实施例提供的方法,认证端信任中心链接密钥以及设备端信任中心链接密钥直接基于第一随机数以及许可密钥生成,不需要对认证端安装码或设备端安装码进行进一步处理,提升了对Zigbee设备进行接入认证的效率。To sum up, in the method provided in this embodiment, the authentication-side trust center link key and the device-side trust center link key are directly generated based on the first random number and the license key, and there is no need to install the authentication-side installation code or the device-side installation code. The code is further processed, which improves the efficiency of access authentication for Zigbee devices.
需要说明的是,上述方法实施例可以分别单独实施,也可以组合实施,本申请对此不进行限制。It should be noted that, the foregoing method embodiments may be implemented separately, or may be implemented in combination, which is not limited in this application.
图8示出了本申请一个示例性实施例提供的接入认证装置的结构框图,该装置可以实现成为待认证设备,或者,实现成为待认证设备中的一部分,该装置包括:信标帧广播模块801、密钥生成模块802和第一认证模块803;FIG. 8 shows a structural block diagram of an access authentication apparatus provided by an exemplary embodiment of the present application. The apparatus can be implemented as a device to be authenticated, or can be implemented as a part of the device to be authenticated. The device includes: a beacon frame broadcast module 801, key generation module 802 and first authentication module 803;
所述信标帧广播模块801,用于广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;The beacon frame broadcasting module 801 is configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
所述密钥生成模块802,用于基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;The key generation module 802 is configured to generate a device-side trust center link key based on the first random number and a license key, and the license key is stored in the device to be authenticated and the device platform cloud key;
所述第一认证模块803,用于使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。The first authentication module 803 is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
在一个可选的实施例中,所述第一认证模块803,用于基于所述设备端信任中心链接密钥,获取网络密钥,所述网络密钥用于在所述第一接入认证后对网络层的数据进行加密。In an optional embodiment, the first authentication module 803 is configured to obtain a network key based on the device-side trust center link key, where the network key is used in the first access authentication Then encrypt the data at the network layer.
在一个可选的实施例中,所述第一认证模块803,用于接收所述配网平台网关发送的加密密钥信息, 所述加密密钥信息由所述配网平台网关根据认证端信任中心链接密钥进行加密,所述认证端信任中心链接密钥由所述配网平台网关或所述设备平台云生成;使用所述设备端信任中心链接密钥对所述加密密钥信息进行处理,得到所述网络密钥。In an optional embodiment, the first authentication module 803 is configured to receive encryption key information sent by the distribution network platform gateway, where the encryption key information is trusted by the distribution network platform gateway according to the authentication terminal The central link key is encrypted, and the authentication side trust center link key is generated by the distribution network platform gateway or the device platform cloud; the device side trust center link key is used to process the encryption key information to get the network key.
在一个可选的实施例中,所述装置还包括:设备声明广播模块;所述设备声明广播模块,用于广播设备声明消息,所述设备声明消息用于表示所述待认证设备已接入所述配网平台网关构建的网络。In an optional embodiment, the apparatus further includes: a device announcement broadcasting module; the device announcement broadcasting module is configured to broadcast a device announcement message, and the device announcement message is used to indicate that the device to be authenticated has accessed The network constructed by the distribution network platform gateway.
在一个可选的实施例中,所述密钥生成模块802,用于采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成设备端安装码,将所述设备端安装码作为所述设备端信任中心链接密钥;或,所述密钥生成模块802,用于采用所述第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成所述设备端安装码;采用第二密钥生成算法,对所述设备端安装码进行处理,生成所述设备端信任中心链接密钥。In an optional embodiment, the key generation module 802 is configured to use a first key generation algorithm to process the first random number and the license key, generate a device-side installation code, and The device-side installation code is used as the device-side trust center link key; or, the key generation module 802 is configured to use the first key generation algorithm to generate the first random number and the license The key is processed to generate the device-side installation code; the second key generation algorithm is used to process the device-side installation code to generate the device-side trust center link key.
在一个可选的实施例中,所述第一密钥生成算法包括:AES-MMO哈希算法;所述第二密钥生成算法包括:所述AES-MMO哈希算法。In an optional embodiment, the first key generation algorithm includes: an AES-MMO hash algorithm; the second key generation algorithm includes: the AES-MMO hash algorithm.
在一个可选的实施例中,所述信标帧为增强信标帧,所述第一随机数填充在所述增强信标帧的头信息单元字段。In an optional embodiment, the beacon frame is an enhanced beacon frame, and the first random number is filled in a header information element field of the enhanced beacon frame.
在一个可选的实施例中,所述信标帧广播模块801,用于广播所述增强信标帧;或,所述信标帧广播模块801,用于交替广播所述增强信标帧和常规信标帧。In an optional embodiment, the beacon frame broadcasting module 801 is configured to broadcast the enhanced beacon frame; or, the beacon frame broadcasting module 801 is configured to alternately broadcast the enhanced beacon frame and Regular beacon frame.
在一个可选的实施例中,所述信标帧还携带设备标识,所述设备标识用于标识所述待认证设备的类型。In an optional embodiment, the beacon frame further carries a device identifier, where the device identifier is used to identify the type of the device to be authenticated.
在一个可选的实施例中,所述信标帧还携带厂商标识,所述厂商标识用于标识所述待认证设备所属的厂商。In an optional embodiment, the beacon frame further carries a manufacturer identifier, where the manufacturer identifier is used to identify the manufacturer to which the device to be authenticated belongs.
在一个可选的实施例中,所述信标帧还携带设备地址标识,所述设备地址标识用于标识所述待认证设备的MAC地址。In an optional embodiment, the beacon frame further carries a device address identifier, where the device address identifier is used to identify the MAC address of the device to be authenticated.
在一个可选的实施例中,所述装置还包括:信标响应接收模块和关联模块;所述信标响应接收模块,用于接收所述配网平台网关发送的信标响应,所述信标响应用于响应所述信标帧;所述关联模块,用于向所述配网平台网关发送关联请求,所述关联请求用于请求接入所述配网平台网关构建的网络;接收所述配网平台网关发送的关联响应,所述关联响应用于响应所述关联请求。In an optional embodiment, the apparatus further includes: a beacon response receiving module and an association module; the beacon response receiving module is configured to receive a beacon response sent by the distribution network platform gateway, the beacon response The beacon response is used to respond to the beacon frame; the association module is used to send an association request to the distribution network platform gateway, and the association request is used to request access to the network constructed by the distribution network platform gateway; The association response sent by the distribution network platform gateway is used to respond to the association request.
在一个可选的实施例中,所述装置还包括:第二认证模块;所述第二认证模块,用于基于所述设备平台云生成的第二随机数生成设备端认证密钥,所述设备端认证密钥用于进行所述待认证设备的第二接入认证;向所述配网平台网关发送所述设备端认证密钥。In an optional embodiment, the apparatus further includes: a second authentication module; the second authentication module is configured to generate a device-side authentication key based on a second random number generated by the device platform cloud, the The device-side authentication key is used to perform the second access authentication of the device to be authenticated; the device-side authentication key is sent to the distribution network platform gateway.
在一个可选的实施例中,所述第二认证模块,用于采用第三密钥生成算法,对所述第二随机数以及所述许可密钥进行处理,生成所述设备端认证密钥。In an optional embodiment, the second authentication module is configured to use a third key generation algorithm to process the second random number and the license key to generate the device-side authentication key .
在一个可选的实施例中,所述第三密钥生成算法包括:AES-MMO哈希算法。In an optional embodiment, the third key generation algorithm includes: AES-MMO hash algorithm.
在一个可选的实施例中,所述装置还包括:请求接收模块;所述请求接收模块,用于接收所述配网平台网关向所述待认证设备的自定义簇发送的随机数写入请求,所述随机数写入请求携带所述第二随机数。In an optional embodiment, the apparatus further includes: a request receiving module; the request receiving module is configured to receive a random number write sent by the distribution network platform gateway to the custom cluster of the device to be authenticated request, the random number writing request carries the second random number.
在一个可选的实施例中,所述装置还包括:密钥存储模块;所述密钥存储模块,用于将所述设备端认证密钥存储于所述自定义簇的属性中。In an optional embodiment, the apparatus further includes: a key storage module; the key storage module is configured to store the device-side authentication key in the attribute of the custom cluster.
在一个可选的实施例中,所述自定义簇的访问类型为写后返回。In an optional embodiment, the access type of the custom cluster is return after write.
图9示出了本申请一个示例性实施例提供的接入认证装置的结构框图,该装置可以实现成为配网平台网关,或者,实现成为配网平台网关中的一部分,该装置包括:信标帧接收模块901、密钥确定模块902和第一认证模块903;FIG. 9 shows a structural block diagram of an access authentication apparatus provided by an exemplary embodiment of the present application. The apparatus may be implemented as a distribution network platform gateway, or may be implemented as a part of a distribution network platform gateway. The device includes: a beacon a frame receiving module 901, a key determining module 902 and a first authentication module 903;
所述信标帧接收模块901,用于接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;The beacon frame receiving module 901 is configured to receive a beacon frame broadcast by a device to be authenticated, where the beacon frame carries a first random number generated by the device to be authenticated;
所述密钥确定模块902,用于通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;The key determination module 902 is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, and the authentication end trust center link key is based on the first random number And a key generated by a license key, the license key is a key stored in the device to be authenticated and the device platform cloud;
所述第一认证模块903,用于使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。The first authentication module 903 is configured to use the authentication terminal trust center link key to perform first access authentication with the device to be authenticated.
在一个可选的实施例中,所述第一认证模块903,用于向所述待认证设备发送加密密钥信息,所述加密密钥信息是根据所述认证端信任中心链接密钥对网络密钥进行加密得到的信息,所述网络密钥用于在所述第一接入认证后对网络层的数据进行加密。In an optional embodiment, the first authentication module 903 is configured to send encryption key information to the device to be authenticated, where the encryption key information is based on the authentication end trust center link key pair network Information obtained by encrypting the key, where the network key is used to encrypt data at the network layer after the first access authentication.
在一个可选的实施例中,所述装置还包括:设备声明接收模块;所述设备声明接收模块,用于接收所述待认证设备发送的设备声明消息,所述设备声明消息用于表示所述待认证设备已接入所述配网平台网关构建的网络。In an optional embodiment, the apparatus further includes: a device declaration receiving module; the device declaration receiving module is configured to receive a device declaration message sent by the to-be-authenticated device, where the device declaration message is used to indicate the The device to be authenticated has accessed the network constructed by the distribution network platform gateway.
在一个可选的实施例中,所述信标帧还携带所述待认证设备的设备地址标识,所述设备地址标识用于标识所述待认证设备的MAC地址;所述密钥确定模块902,用于通过所述配网平台云,向所述设备平台云发送安装码请求,所述安装码请求携带所述设备地址标识和所述第一随机数,所述第一随机数用于供所述设备平台云生成认证端安装码;通过所述配网平台云,接收源地址为所述设备平台云的安装码响应;基于所述安装码响应,确定所述认证端信任中心链接密钥。In an optional embodiment, the beacon frame further carries a device address identifier of the device to be authenticated, and the device address identifier is used to identify the MAC address of the device to be authenticated; the key determining module 902 , which is used to send an installation code request to the device platform cloud through the distribution network platform cloud, where the installation code request carries the device address identifier and the first random number, and the first random number is used for The device platform cloud generates an installation code of the authentication terminal; through the distribution network platform cloud, an installation code response whose source address is the device platform cloud is received; based on the installation code response, the authentication terminal trust center link key is determined .
在一个可选的实施例中,所述安装码响应携带所述认证端安装码;所述密钥确定模块902,用于将所述认证端安装码作为所述认证端信任中心链接密钥;或,所述密钥确定模块902,用于采用第二密钥生成算法,对所述认证端安装码进行处理,生成所述认证端信任中心链接密钥。In an optional embodiment, the installation code response carries the authentication terminal installation code; the key determination module 902 is configured to use the authentication terminal installation code as the authentication terminal trust center link key; Or, the key determination module 902 is configured to use the second key generation algorithm to process the installation code of the authentication terminal to generate the authentication terminal trust center link key.
在一个可选的实施例中,所述第二密钥生成算法包括:AES-MMO哈希算法。In an optional embodiment, the second key generation algorithm includes: an AES-MMO hash algorithm.
在一个可选的实施例中,所述安装码响应还携带所述设备平台云生成的第二随机数。In an optional embodiment, the installation code response further carries a second random number generated by the device platform cloud.
在一个可选的实施例中,所述装置还包括:认证请求模块;所述认证模块,用于向所述待认证设备的自定义簇发送随机数写入请求,所述随机数写入请求携带第二随机数,所述第二随机数由所述配网平台网关从源地址为所述设备平台云的安装码响应中获取;接收所述待认证设备发送的设备端认证密钥,所述设备端认证密钥用于进行所述待认证设备的第二接入认证;通过所述配网平台云,向所述设备平台云发送认证设备请求,所述认证设备请求携带设备地址标识和所述设备端认证密钥,所述设备地址标识用于标识所述待认证设备的MAC地址。In an optional embodiment, the apparatus further includes: an authentication request module; the authentication module is configured to send a random number write request to the custom cluster of the device to be authenticated, the random number write request Carrying a second random number, the second random number is obtained by the distribution network platform gateway from the installation code response whose source address is the device platform cloud; receiving the device-side authentication key sent by the device to be authenticated, the The device-side authentication key is used for the second access authentication of the device to be authenticated; an authentication device request is sent to the device platform cloud through the distribution network platform cloud, and the authentication device request carries the device address identifier and The device-side authentication key, and the device address identifier is used to identify the MAC address of the device to be authenticated.
在一个可选的实施例中,所述认证请求模块,用于获取所述自定义簇的访问类型;响应于所述自定义簇的访问类型为写后返回,向所述自定义簇发送所述随机数写入请求。In an optional embodiment, the authentication request module is configured to obtain the access type of the custom cluster; in response to the access type of the custom cluster being return after writing, send the custom cluster The random number write request described above.
在一个可选的实施例中,所述装置还包括:认证结果处理模块;所述认证结果处理模块,用于通过所述配网平台云,接收源地址为所述设备平台云的认证结果;响应于所述认证结果为认证成功,更新所述认证端信任中心链接密钥;响应于所述认证结果为认证失败,将所述待认证设备添加至设备黑名单,所述设备黑名单用于记录配网失败的设备。In an optional embodiment, the apparatus further includes: an authentication result processing module; the authentication result processing module is configured to receive, through the distribution network platform cloud, an authentication result whose source address is the device platform cloud; In response to the authentication result being that the authentication is successful, update the authentication end trust center link key; in response to the authentication result being the authentication failure, add the device to be authenticated to the device blacklist, which is used for Record the devices that fail to configure the network.
在一个可选的实施例中,所述装置还包括:信标响应发送模块和关联模块;所述信标响应发送模块,用于向所述待认证设备发送信标响应,所述信标响应用于响应所述信标帧;所述关联模块,用于接收所述待认证设备发送的关联请求,所述关联请求用于请求接入所述配网平台网关构建的网络;向所述待认证设备发送关联响应,所述关联响应用于响应所述关联请求。In an optional embodiment, the apparatus further includes: a beacon response sending module and an association module; the beacon response sending module is configured to send a beacon response to the device to be authenticated, the beacon response is used to respond to the beacon frame; the association module is used to receive an association request sent by the device to be authenticated, and the association request is used to request access to the network constructed by the distribution network platform gateway; to the to-be-authenticated device The authentication device sends an association response, the association response being used to respond to the association request.
在一个可选的实施例中,所述信标帧还携带设备标识,所述设备标识用于标识所述待认证设备的类型,所述装置还包括:接入请求接收模块;所述接入请求接收模块,用于向控制设备发送所述设备标识,所述控制设备用于控制所述配网平台网关;接收所述控制设备发送的接入请求,所述接入请求用于触发所述配网平台网关反馈信标响应,所述信标响应用于响应所述信标帧。In an optional embodiment, the beacon frame further carries a device identifier, where the device identifier is used to identify the type of the device to be authenticated, and the apparatus further includes: an access request receiving module; the access request a request receiving module, configured to send the device identification to a control device, and the control device is used to control the distribution network platform gateway; receive an access request sent by the control device, the access request is used to trigger the The distribution network platform gateway feeds back a beacon response, where the beacon response is used to respond to the beacon frame.
在一个可选的实施例中,所述信标帧为增强信标帧,所述第一随机数填充在所述增强信标帧的头信息单元字段。In an optional embodiment, the beacon frame is an enhanced beacon frame, and the first random number is filled in a header information element field of the enhanced beacon frame.
图10示出了本申请一个示例性实施例提供的接入认证装置的结构框图,该装置可以实现成为设备平台云,或者,实现成为设备平台云中的一部分,该装置包括:密钥确定模块1001;FIG. 10 shows a structural block diagram of an access authentication apparatus provided by an exemplary embodiment of the present application. The apparatus may be implemented as a device platform cloud, or may be implemented as a part of the device platform cloud, and the apparatus includes: a key determination module 1001;
所述密钥确定模块1001,用于与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。The key determination module 1001 is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is generated according to the device to be authenticated The key generated by the first random number of the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
在一个可选的实施例中,所述密钥确定模块1001,用于接收安装码请求,所述安装码请求的源地址为所述配网平台网关,所述安装码请求携带所述待认证设备对应的设备地址标识和所述第一随机数,所述设备地址标识用于标识所述待认证设备的MAC地址;基于所述第一随机数,生成认证端安装码;发送安装码响应,所述安装码响应的目的地址为所述配网平台网关,所述安装码响应携带所述认证端安装码,所述认证端安装码用于供所述配网平台网关确定所述认证端信任中心链接密钥。In an optional embodiment, the key determination module 1001 is configured to receive an installation code request, the source address of the installation code request is the distribution network platform gateway, and the installation code request carries the to-be-authenticated The device address identifier corresponding to the device and the first random number, where the device address identifier is used to identify the MAC address of the device to be authenticated; based on the first random number, the authentication terminal installation code is generated; the installation code response is sent, The destination address of the installation code response is the distribution network platform gateway, the installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine the authentication terminal trust. Central link key.
在一个可选的实施例中,所述密钥确定模块1001,用于根据所述设备地址标识,确定所述待认证设备对应的许可密钥;采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成所述认证端安装码。In an optional embodiment, the key determination module 1001 is configured to determine the license key corresponding to the device to be authenticated according to the device address identifier; A random number and the license key are processed to generate the authentication terminal installation code.
在一个可选的实施例中,所述第一密钥生成算法包括:AES-MMO哈希算法。In an optional embodiment, the first key generation algorithm includes: an AES-MMO hash algorithm.
在一个可选的实施例中,所述安装码响应还携带所述设备平台云生成的第二随机数。In an optional embodiment, the installation code response further carries a second random number generated by the device platform cloud.
在一个可选的实施例中,所述装置还包括:第二认证模块;所述第二认证模块,用于接收认证设备请求,所述认证设备请求的源地址为所述配网平台网关,所述认证设备请求携带设备地址标识和设备端认证密钥,所述设备端认证密钥是所述待认证设备基于第二随机数生成的密钥,所述第二随机数由所述设备平台云生成;根据所述第二随机数,对所述设备端认证密钥进行第二接入认证,所述设备地址标识用于标识所述待认证设备的MAC地址。In an optional embodiment, the apparatus further includes: a second authentication module; the second authentication module is configured to receive an authentication device request, where the source address of the authentication device request is the distribution network platform gateway, The authentication device request carries a device address identifier and a device-side authentication key, the device-side authentication key is a key generated by the device to be authenticated based on a second random number, and the second random number is determined by the device platform Cloud generation; performing second access authentication on the device-side authentication key according to the second random number, and the device address identifier is used to identify the MAC address of the device to be authenticated.
在一个可选的实施例中,所述第二认证模块,用于根据所述设备地址标识,确定所述待认证设备对应的许可密钥;采用第三密钥生成算法,对所述第二随机数以及所述许可密钥进行处理,生成云端认证密钥;对所述云端认证密钥与所述设备端认证密钥进行验证,确定认证结果。In an optional embodiment, the second authentication module is configured to determine the license key corresponding to the device to be authenticated according to the device address identifier; use a third key generation algorithm to The random number and the license key are processed to generate a cloud authentication key; the cloud authentication key and the device-side authentication key are verified to determine the authentication result.
在一个可选的实施例中,所述第三密钥生成算法包括:AES-MMO哈希算法。In an optional embodiment, the third key generation algorithm includes: AES-MMO hash algorithm.
在一个可选的实施例中,所述装置还包括:认证结果发送模块;所述认证结果发送模块,用于发送所述认证结果,所述认证结果的目的地址为所述配网平台网关。In an optional embodiment, the apparatus further includes: an authentication result sending module; the authentication result sending module is configured to send the authentication result, and the destination address of the authentication result is the distribution network platform gateway.
需要说明的是,上述实施例提供的装置在实现其功能时,仅以上述各个功能模块的划分进行举例说明,实际应用中,可以根据实际需要而将上述功能分配由不同的功能模块完成,即将设备的内容结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。It should be noted that when the device provided in the above embodiment realizes its functions, only the division of the above functional modules is used as an example for illustration. In practical applications, the above functions can be allocated to different functional modules according to actual needs. The content structure of the device is divided into different functional modules to complete all or part of the functions described above.
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the apparatus in the above-mentioned embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be described in detail here.
图11示出了本申请一个示例性实施例提供的计算机设备(如待认证设备、配网平台网关或设备平台云)的结构示意图,该计算机设备包括:处理器101、接收器102、发射器103、存储器104和总线105。FIG. 11 shows a schematic structural diagram of a computer device (such as a device to be authenticated, a distribution network platform gateway, or a device platform cloud) provided by an exemplary embodiment of the present application. The computer device includes: a processor 101 , a receiver 102 , and a transmitter 103 , memory 104 and bus 105 .
处理器101包括一个或者一个以上处理核心,处理器101通过运行软件程序以及模块,从而执行各种功能应用以及信息处理。The processor 101 includes one or more processing cores, and the processor 101 executes various functional applications and information processing by running software programs and modules.
接收器102和发射器103可以实现为一个通信组件,该通信组件可以是一块通信芯片。The receiver 102 and the transmitter 103 may be implemented as a communication component, which may be a communication chip.
存储器104通过总线105与处理器101相连。The memory 104 is connected to the processor 101 through the bus 105 .
存储器104可用于存储至少一个指令,处理器101用于执行该至少一个指令,以实现上述方法实施例中的各个步骤。The memory 104 may be configured to store at least one instruction, and the processor 101 may be configured to execute the at least one instruction, so as to implement various steps in the foregoing method embodiments.
此外,存储器104可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,易失性或非易失性存储设备包括但不限于:磁盘或光盘,电可擦除可编程只读存储器(Electrically-Erasable Programmable Read Only Memory,EEPROM),可擦除可编程只读存储器(Erasable Programmable Read Only Memory,EPROM),静态随时存取存储器(Static Random Access Memory,SRAM),只读存储器(Read-Only Memory,ROM),磁存储器,快闪存储器,可编程只读存储器(Programmable Read-Only Memory,PROM)。Additionally, memory 104 may be implemented by any type or combination of volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
在示例性实施例中,所述计算机设备包括处理器、存储器和收发器(该收发器可以包括接收器和发射器,接收器用于接收信息,发射器用于发送信息)。In an exemplary embodiment, the computer device includes a processor, a memory, and a transceiver (the transceiver may include a receiver for receiving information and a transmitter for transmitting information) and a transmitter.
在一种可能的实现方式中,当计算机设备实现为待认证设备时,In a possible implementation manner, when the computer device is implemented as the device to be authenticated,
所述收发器,用于广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the transceiver, configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
所述处理器,用于基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;The processor is configured to generate a device-side trust center link key based on the first random number and a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
所述处理器,用于使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。The processor is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
其中,当计算机设备实现为待认证设备时,本申请实施例涉及的计算机设备中的处理器和收发器,可以执行上述图2至图5任一所示的方法中,由待认证设备执行的步骤,此处不再赘述。Wherein, when the computer device is implemented as the device to be authenticated, the processor and transceiver in the computer device involved in the embodiments of the present application may execute the method performed by the device to be authenticated in any of the methods shown in FIG. 2 to FIG. 5 above. The steps are not repeated here.
在一种可能的实现方式中,当计算机设备实现为配网平台网关时,In a possible implementation, when the computer device is implemented as a distribution network platform gateway,
所述收发器,用于接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the transceiver, configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
所述处理器,用于通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;The processor is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, where the authentication end trust center link key is based on the first random number and the license key. The key generated by the key, the license key is the key stored in the device to be authenticated and the device platform cloud;
所述处理器,用于使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。The processor is configured to perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
其中,当计算机设备实现为配网平台网关时,本申请实施例涉及的计算机设备中的处理器和收发器,可以执行上述图2至图5任一所示的方法中,由配网平台网关执行的步骤,此处不再赘述。Wherein, when the computer device is implemented as a distribution network platform gateway, the processor and transceiver in the computer device involved in the embodiments of the present application may perform any of the methods shown in FIG. 2 to FIG. 5 above. The steps to be performed are not repeated here.
在一种可能的实现方式中,当计算机设备实现为设备平台云时,In one possible implementation, when the computer device is implemented as a device platform cloud,
所述处理器,用于与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。The processor is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is the first generated according to the device to be authenticated. The key generated by the random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
其中,当计算机设备实现为设备平台云时,本申请实施例涉及的计算机设备中的处理器和收发器,可以执行上述图2至图5任一所示的方法中,由设备平台云执行的步骤,此处不再赘述。Wherein, when the computer device is implemented as a device platform cloud, the processors and transceivers in the computer device involved in the embodiments of the present application may execute any of the methods shown in FIG. 2 to FIG. The steps are not repeated here.
在示例性实施例中,还提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现上述各个方法实施例提供的由计算机设备执行的接入认证方法。In an exemplary embodiment, a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, and the computer program is loaded and executed by a processor to implement the methods provided by the foregoing method embodiments. An access authentication method performed by a computer device.
在示例性实施例中,还提供了一种计算机程序产品,该计算机程序产品在计算机设备的处理器上运行时,使得网络设备执行上述方面所述的接入认证方法。In an exemplary embodiment, a computer program product is also provided, which, when running on the processor of the computer device, causes the network device to execute the access authentication method described in the above aspects.
在示例性实施例中,还提供了一种芯片,所述芯片包括可编程逻辑电路和/或程序指令,当所述芯片在计算机设备上运行时,用于实现上述方面所述的接入认证方法。In an exemplary embodiment, a chip is also provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a computer device, is used to implement the access authentication described in the above aspects method.
以上所述仅为本申请的可选实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。The above descriptions are only optional embodiments of the present application, and are not intended to limit the present application. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present application shall be included in the protection of the present application. within the range.

Claims (84)

  1. 一种接入认证方法,其特征在于,应用于待认证设备,所述方法包括:An access authentication method, characterized in that it is applied to a device to be authenticated, the method comprising:
    广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;broadcasting a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
    基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;Based on the first random number and a license key, a device-side trust center link key is generated, and the license key is a key stored in the device to be authenticated and the device platform cloud;
    使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。Use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  2. 根据权利要求1所述的方法,其特征在于,所述使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证,包括:The method according to claim 1, wherein the using the device-side trust center link key to perform first access authentication with the distribution network platform gateway comprises:
    基于所述设备端信任中心链接密钥,获取网络密钥,所述网络密钥用于在所述第一接入认证后对网络层的数据进行加密。Obtain a network key based on the device-side trust center link key, where the network key is used to encrypt data at the network layer after the first access authentication.
  3. 根据权利要求2所述的方法,其特征在于,所述基于所述设备端信任中心链接密钥,获取网络密钥,包括:The method according to claim 2, wherein the obtaining a network key based on the device-side trust center link key comprises:
    接收所述配网平台网关发送的加密密钥信息,所述加密密钥信息由所述配网平台网关根据认证端信任中心链接密钥进行加密,所述认证端信任中心链接密钥由所述配网平台网关或所述设备平台云生成;Receive the encryption key information sent by the distribution network platform gateway, the encryption key information is encrypted by the distribution network platform gateway according to the authentication end trust center link key, and the authentication end trust center link key is obtained by the The distribution network platform gateway or the device platform cloud generation;
    使用所述设备端信任中心链接密钥对所述加密密钥信息进行处理,得到所述网络密钥。The encryption key information is processed using the device-side trust center link key to obtain the network key.
  4. 根据权利要求2所述的方法,其特征在于,所述方法还包括:The method according to claim 2, wherein the method further comprises:
    广播设备声明消息,所述设备声明消息用于表示所述待认证设备已接入所述配网平台网关构建的网络。A device declaration message is broadcast, and the device declaration message is used to indicate that the device to be authenticated has accessed the network constructed by the distribution network platform gateway.
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,包括:The method according to any one of claims 1 to 4, wherein the generating a device-side trust center link key based on the first random number and a license key, comprising:
    采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成设备端安装码,将所述设备端安装码作为所述设备端信任中心链接密钥;Using a first key generation algorithm, the first random number and the license key are processed to generate a device-side installation code, and the device-side installation code is used as the device-side trust center link key;
    或,or,
    采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成设备端安装码;采用第二密钥生成算法,对所述设备端安装码进行处理,生成所述设备端信任中心链接密钥。The first key generation algorithm is used to process the first random number and the license key to generate a device-side installation code; the second key generation algorithm is used to process the device-side installation code to generate the device-side installation code. The device-side trust center link key.
  6. 根据权利要求5所述的方法,其特征在于,The method of claim 5, wherein:
    所述第一密钥生成算法包括:高级加密标准AES-MMO哈希算法;The first key generation algorithm includes: Advanced Encryption Standard AES-MMO hash algorithm;
    所述第二密钥生成算法包括:所述AES-MMO哈希算法。The second key generation algorithm includes: the AES-MMO hash algorithm.
  7. 根据权利要求1至4任一所述的方法,其特征在于,The method according to any one of claims 1 to 4, wherein,
    所述信标帧为增强信标帧,所述第一随机数填充在所述增强信标帧的头信息单元字段。The beacon frame is an enhanced beacon frame, and the first random number is filled in a header information element field of the enhanced beacon frame.
  8. 根据权利要求7所述的方法,其特征在于,所述广播信标帧,包括:The method according to claim 7, wherein the broadcast beacon frame comprises:
    广播所述增强信标帧;broadcasting the enhanced beacon frame;
    或,or,
    交替广播所述增强信标帧和常规信标帧。The enhanced beacon frames and regular beacon frames are broadcast alternately.
  9. 根据权利要求1至4任一所述的方法,其特征在于,The method according to any one of claims 1 to 4, wherein,
    所述信标帧还携带设备标识,所述设备标识用于标识所述待认证设备的类型。The beacon frame also carries a device identifier, where the device identifier is used to identify the type of the device to be authenticated.
  10. 根据权利要求1至4任一所述的方法,其特征在于,The method according to any one of claims 1 to 4, wherein,
    所述信标帧还携带厂商标识,所述厂商标识用于标识所述待认证设备所属的厂商。The beacon frame also carries a manufacturer identifier, where the manufacturer identifier is used to identify the manufacturer to which the device to be authenticated belongs.
  11. 根据权利要求1至4任一所述的方法,其特征在于,The method according to any one of claims 1 to 4, wherein,
    所述信标帧还携带设备地址标识,所述设备地址标识用于标识所述待认证设备的媒体访问控制MAC地址。The beacon frame also carries a device address identifier, where the device address identifier is used to identify the media access control MAC address of the device to be authenticated.
  12. 根据权利要求1至4任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    接收所述配网平台网关发送的信标响应,所述信标响应用于响应所述信标帧;receiving a beacon response sent by the distribution network platform gateway, where the beacon response is used to respond to the beacon frame;
    向所述配网平台网关发送关联请求,所述关联请求用于请求接入所述配网平台网关构建的网络;sending an association request to the distribution network platform gateway, where the association request is used to request access to the network constructed by the distribution network platform gateway;
    接收所述配网平台网关发送的关联响应,所述关联响应用于响应所述关联请求。Receive an association response sent by the distribution network platform gateway, where the association response is used to respond to the association request.
  13. 根据权利要求1至4任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    基于所述设备平台云生成的第二随机数生成设备端认证密钥,所述设备端认证密钥用于进行所述待认证设备的第二接入认证;Generate a device-side authentication key based on the second random number generated by the device platform cloud, where the device-side authentication key is used to perform second access authentication of the device to be authenticated;
    向所述配网平台网关发送所述设备端认证密钥。Send the device-side authentication key to the distribution network platform gateway.
  14. 根据权利要求13所述的方法,其特征在于,所述基于所述设备平台云生成的第二随机数生成设备端认证密钥,包括:The method according to claim 13, wherein the generating a device-side authentication key based on the second random number generated by the device platform cloud comprises:
    采用第三密钥生成算法,对所述第二随机数以及所述许可密钥进行处理,生成所述设备端认证密钥。Using a third key generation algorithm, the second random number and the license key are processed to generate the device-side authentication key.
  15. 根据权利要求14所述的方法,其特征在于,The method of claim 14, wherein:
    所述第三密钥生成算法包括:AES-MMO哈希算法。The third key generation algorithm includes: AES-MMO hash algorithm.
  16. 根据权利要求13所述的方法,其特征在于,所述方法还包括:The method of claim 13, wherein the method further comprises:
    接收所述配网平台网关向所述待认证设备的自定义簇发送的随机数写入请求,所述随机数写入请求携带所述第二随机数。Receive a random number writing request sent by the distribution network platform gateway to the custom cluster of the device to be authenticated, where the random number writing request carries the second random number.
  17. 根据权利要求16所述的方法,其特征在于,所述方法还包括:The method of claim 16, wherein the method further comprises:
    将所述设备端认证密钥存储于所述自定义簇的属性中。The device-side authentication key is stored in the attribute of the custom cluster.
  18. 根据权利要求16所述的方法,其特征在于,The method of claim 16, wherein:
    所述自定义簇的访问类型为写后返回。The access type of the custom cluster is return after write.
  19. 一种接入认证方法,其特征在于,应用于配网平台网关中,所述配网平台网关支持构建网络,所述配网平台网关对应的云端服务器为配网平台云,所述方法包括:An access authentication method, characterized in that it is applied to a distribution network platform gateway, the distribution network platform gateway supports building a network, and a cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud, and the method includes:
    接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;receiving a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
    通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;Through the distribution network platform cloud, interact with the device platform cloud to obtain the authentication end trust center link key. The authentication end trust center link key is a key generated based on the first random number and the license key. The license key is a key stored in the device to be authenticated and the device platform cloud;
    使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。Perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
  20. 根据权利要求19所述的方法,其特征在于,所述使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证,包括:The method according to claim 19, wherein the performing first access authentication with the device to be authenticated by using the authenticator trust center link key, comprising:
    向所述待认证设备发送加密密钥信息,所述加密密钥信息是根据所述认证端信任中心链接密钥对网络密钥进行加密得到的信息,所述网络密钥用于在所述第一接入认证后对网络层的数据进行加密。Send encryption key information to the device to be authenticated, where the encryption key information is information obtained by encrypting a network key according to the authentication end trust center link key, and the network key is used in the first After the access authentication, the data at the network layer is encrypted.
  21. 根据权利要求20所述的方法,其特征在于,所述方法还包括:The method of claim 20, wherein the method further comprises:
    接收所述待认证设备发送的设备声明消息,所述设备声明消息用于表示所述待认证设备已接入所述配网平台网关构建的网络。A device declaration message sent by the device to be authenticated is received, where the device declaration message is used to indicate that the device to be authenticated has accessed the network constructed by the distribution network platform gateway.
  22. 根据权利要求19至21任一所述的方法,其特征在于,所述信标帧还携带所述待认证设备的设备地址标识,所述设备地址标识用于标识所述待认证设备的媒体访问控制MAC地址;The method according to any one of claims 19 to 21, wherein the beacon frame further carries a device address identifier of the device to be authenticated, and the device address identifier is used to identify media access of the device to be authenticated Control MAC address;
    所述通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,包括:The step of interacting with the device platform cloud through the distribution network platform cloud to obtain the authentication terminal trust center link key includes:
    通过所述配网平台云,向所述设备平台云发送安装码请求,所述安装码请求携带所述设备地址标识和所述第一随机数,所述第一随机数用于供所述设备平台云生成认证端安装码;Send an installation code request to the device platform cloud through the distribution network platform cloud, where the installation code request carries the device address identifier and the first random number, and the first random number is used for the device The platform cloud generates the installation code of the authentication terminal;
    通过所述配网平台云,接收源地址为所述设备平台云的安装码响应;Through the distribution network platform cloud, receiving an installation code response whose source address is the device platform cloud;
    基于所述安装码响应,确定所述认证端信任中心链接密钥。Based on the installation code response, the authenticator trust center link key is determined.
  23. 根据权利要求22所述的方法,其特征在于,所述安装码响应携带所述认证端安装码;The method according to claim 22, wherein the installation code response carries the authentication terminal installation code;
    所述基于所述安装码响应,确定所述认证端信任中心链接密钥,包括:The determining of the authenticator trust center link key based on the installation code response includes:
    将所述认证端安装码作为所述认证端信任中心链接密钥;Using the authentication terminal installation code as the authentication terminal trust center link key;
    或,or,
    采用第二密钥生成算法,对所述认证端安装码进行处理,生成所述认证端信任中心链接密钥。Using the second key generation algorithm, the authentication terminal installation code is processed to generate the authentication terminal trust center link key.
  24. 根据权利要求23所述的方法,其特征在于,The method of claim 23, wherein:
    所述第二密钥生成算法包括:高级加密标准AES-MMO哈希算法。The second key generation algorithm includes: Advanced Encryption Standard AES-MMO hash algorithm.
  25. 根据权利要求22所述的方法,其特征在于,The method of claim 22, wherein:
    所述安装码响应还携带所述设备平台云生成的第二随机数。The installation code response also carries a second random number generated by the device platform cloud.
  26. 根据权利要求19至21任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 19 to 21, wherein the method further comprises:
    向所述待认证设备的自定义簇发送随机数写入请求,所述随机数写入请求携带第二随机数,所述第二随机数由所述配网平台网关从源地址为所述设备平台云的安装码响应中获取;Send a random number write request to the custom cluster of the device to be authenticated, the random number write request carries a second random number, and the second random number is sent by the distribution platform gateway from the source address to the device Obtained from the installation code response of the platform cloud;
    接收所述待认证设备发送的设备端认证密钥,所述设备端认证密钥用于进行所述待认证设备的第二接入认证;receiving a device-side authentication key sent by the to-be-authenticated device, where the device-side authentication key is used to perform second access authentication of the to-be-authenticated device;
    通过所述配网平台云,向所述设备平台云发送认证设备请求,所述认证设备请求携带设备地址标识和所述设备端认证密钥,所述设备地址标识用于标识所述待认证设备的MAC地址。Send an authentication device request to the device platform cloud through the distribution network platform cloud, where the authentication device request carries a device address identifier and the device-side authentication key, and the device address identifier is used to identify the device to be authenticated the MAC address.
  27. 根据权利要求26所述的方法,其特征在于,所述向所述待认证设备的自定义簇发送随机数写入请求,包括:The method according to claim 26, wherein the sending a random number write request to the custom cluster of the device to be authenticated comprises:
    获取所述自定义簇的访问类型;Obtain the access type of the custom cluster;
    响应于所述自定义簇的访问类型为写后返回,向所述自定义簇发送所述随机数写入请求。In response to the access type of the custom cluster being return after write, the random number write request is sent to the custom cluster.
  28. 根据权利要求26所述的方法,其特征在于,所述方法还包括:The method of claim 26, wherein the method further comprises:
    通过所述配网平台云,接收源地址为所述设备平台云的认证结果;receiving, through the distribution network platform cloud, the authentication result that the source address is the device platform cloud;
    响应于所述认证结果为认证成功,更新所述认证端信任中心链接密钥;In response to the authentication result being that the authentication is successful, update the authentication terminal trust center link key;
    响应于所述认证结果为认证失败,将所述待认证设备添加至设备黑名单,所述设备黑名单用于记录配网失败的设备。In response to the authentication result being an authentication failure, the device to be authenticated is added to a device blacklist, where the device blacklist is used to record devices that fail to configure the network.
  29. 根据权利要求19至21任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 19 to 21, wherein the method further comprises:
    向所述待认证设备发送信标响应,所述信标响应用于响应所述信标帧;sending a beacon response to the device to be authenticated, where the beacon response is used to respond to the beacon frame;
    接收所述待认证设备发送的关联请求,所述关联请求用于请求接入所述配网平台网关构建的网络;receiving an association request sent by the device to be authenticated, where the association request is used to request access to the network constructed by the distribution network platform gateway;
    向所述待认证设备发送关联响应,所述关联响应用于响应所述关联请求。Send an association response to the device to be authenticated, where the association response is used to respond to the association request.
  30. 根据权利要求19至21任一所述的方法,其特征在于,所述信标帧还携带设备标识,所述设备标识用于标识所述待认证设备的类型,所述方法还包括:The method according to any one of claims 19 to 21, wherein the beacon frame further carries a device identifier, and the device identifier is used to identify the type of the device to be authenticated, and the method further comprises:
    向控制设备发送所述设备标识,所述控制设备用于控制所述配网平台网关;sending the device identification to a control device, where the control device is used to control the distribution network platform gateway;
    接收所述控制设备发送的接入请求,所述接入请求用于触发所述配网平台网关反馈信标响应,所述信标响应用于响应所述信标帧。Receive an access request sent by the control device, where the access request is used to trigger the distribution network platform gateway to feed back a beacon response, where the beacon response is used to respond to the beacon frame.
  31. 根据权利要求19至21任一所述的方法,其特征在于,The method according to any one of claims 19 to 21, wherein,
    所述信标帧为增强信标帧,所述第一随机数填充在所述增强信标帧的头信息单元字段。The beacon frame is an enhanced beacon frame, and the first random number is filled in a header information element field of the enhanced beacon frame.
  32. 一种接入认证方法,其特征在于,应用于设备平台云中,所述设备平台云是待认证设备所属的厂商的云端服务器,所述方法包括:An access authentication method, characterized in that it is applied in a device platform cloud, wherein the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the method includes:
    与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。interacting with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is a key generated according to the first random number generated by the device to be authenticated, The authenticator trust center link key is used to perform first access authentication of the device to be authenticated.
  33. 根据权利要求32所述的方法,其特征在于,所述与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,包括:The method according to claim 32, wherein the interaction with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication terminal trust center link key, comprises:
    接收安装码请求,所述安装码请求的源地址为所述配网平台网关,所述安装码请求携带所述待认证设备对应的设备地址标识和所述第一随机数,所述设备地址标识用于标识所述待认证设备的媒体访问控制MAC地址;Receive an installation code request, where the source address of the installation code request is the distribution network platform gateway, and the installation code request carries the device address identifier corresponding to the device to be authenticated and the first random number, the device address identifier a media access control MAC address used to identify the device to be authenticated;
    基于所述第一随机数,生成认证端安装码;based on the first random number, generating an authentication terminal installation code;
    发送安装码响应,所述安装码响应的目的地址为所述配网平台网关,所述安装码响应携带所述认证端安装码,所述认证端安装码用于供所述配网平台网关确定所述认证端信任中心链接密钥。Send an installation code response, the destination address of the installation code response is the distribution network platform gateway, the installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine The authenticator trusts the center link key.
  34. 根据权利要求33所述的方法,其特征在于,所述基于所述第一随机数,生成认证端安装码,包括:The method according to claim 33, wherein the generating an authentication terminal installation code based on the first random number comprises:
    根据所述设备地址标识,确定所述待认证设备对应的许可密钥;Determine the license key corresponding to the device to be authenticated according to the device address identifier;
    采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成所述认证端安装码。Using a first key generation algorithm, the first random number and the license key are processed to generate the authentication terminal installation code.
  35. 根据权利要求34所述的方法,其特征在于,The method of claim 34, wherein:
    所述第一密钥生成算法包括:高级加密标准AES-MMO哈希算法。The first key generation algorithm includes: Advanced Encryption Standard AES-MMO hash algorithm.
  36. 根据权利要求33所述的方法,其特征在于,The method of claim 33, wherein:
    所述安装码响应还携带所述设备平台云生成的第二随机数。The installation code response also carries a second random number generated by the device platform cloud.
  37. 根据权利要求32至36任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 32 to 36, wherein the method further comprises:
    接收认证设备请求,所述认证设备请求的源地址为所述配网平台网关,所述认证设备请求携带设备地址标识和设备端认证密钥,所述设备端认证密钥是所述待认证设备基于第二随机数生成的密钥,所述第二随机数由所述设备平台云生成,所述设备地址标识用于标识所述待认证设备的MAC地址;Receive an authentication device request, the source address of the authentication device request is the distribution network platform gateway, the authentication device request carries a device address identifier and a device-side authentication key, and the device-side authentication key is the device to be authenticated The key generated based on the second random number, the second random number is generated by the device platform cloud, and the device address identifier is used to identify the MAC address of the device to be authenticated;
    根据所述第二随机数,对所述设备端认证密钥进行第二接入认证。Perform second access authentication on the device-side authentication key according to the second random number.
  38. 根据权利要求37所述的方法,其特征在于,所述根据所述第二随机数,对所述设备端认证密钥进行第二接入认证,包括:The method according to claim 37, wherein the performing second access authentication on the device-side authentication key according to the second random number comprises:
    根据所述设备地址标识,确定所述待认证设备对应的许可密钥;Determine the license key corresponding to the device to be authenticated according to the device address identifier;
    采用第三密钥生成算法,对所述第二随机数以及所述许可密钥进行处理,生成云端认证密钥;Using a third key generation algorithm to process the second random number and the license key to generate a cloud authentication key;
    对所述云端认证密钥与所述设备端认证密钥进行验证,确定认证结果。Verifying the cloud authentication key and the device-side authentication key to determine an authentication result.
  39. 根据权利要求38所述的方法,其特征在于,The method of claim 38, wherein:
    所述第三密钥生成算法包括:AES-MMO哈希算法。The third key generation algorithm includes: AES-MMO hash algorithm.
  40. 根据权利要求38所述的方法,其特征在于,所述方法还包括:The method of claim 38, wherein the method further comprises:
    发送所述认证结果,所述认证结果的目的地址为所述配网平台网关。Send the authentication result, where the destination address of the authentication result is the distribution network platform gateway.
  41. 一种接入认证装置,其特征在于,应用于待认证设备,所述装置包括:信标帧广播模块、密钥生成模块和第一认证模块;An access authentication apparatus, characterized in that, applied to a device to be authenticated, the apparatus comprising: a beacon frame broadcasting module, a key generation module and a first authentication module;
    所述信标帧广播模块,用于广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the beacon frame broadcasting module, configured to broadcast a beacon frame, the beacon frame carrying the first random number generated by the device to be authenticated;
    所述密钥生成模块,用于基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;The key generation module is used to generate a device-side trust center link key based on the first random number and a license key, where the license key is a secret key stored in the device to be authenticated and the device platform cloud. key;
    所述第一认证模块,用于使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。The first authentication module is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  42. 根据权利要求41所述的装置,其特征在于,The apparatus of claim 41, wherein
    所述第一认证模块,用于基于所述设备端信任中心链接密钥,获取网络密钥,所述网络密钥用于在所述第一接入认证后对网络层的数据进行加密。The first authentication module is configured to obtain a network key based on the device-side trust center link key, where the network key is used to encrypt data at the network layer after the first access authentication.
  43. 根据权利要求42所述的装置,其特征在于,所述第一认证模块,用于,The apparatus according to claim 42, wherein the first authentication module is configured to:
    接收所述配网平台网关发送的加密密钥信息,所述加密密钥信息由所述配网平台网关根据认证端信任中心链接密钥进行加密,所述认证端信任中心链接密钥由所述配网平台网关或所述设备平台云生成;Receive the encryption key information sent by the distribution network platform gateway, the encryption key information is encrypted by the distribution network platform gateway according to the authentication end trust center link key, and the authentication end trust center link key is obtained by the The distribution network platform gateway or the device platform cloud generation;
    使用所述设备端信任中心链接密钥对所述加密密钥信息进行处理,得到所述网络密钥。The encryption key information is processed by using the device-side trust center link key to obtain the network key.
  44. 根据权利要求42所述的装置,其特征在于,所述装置还包括:设备声明广播模块;The apparatus according to claim 42, wherein the apparatus further comprises: a device declaration broadcasting module;
    所述设备声明广播模块,用于广播设备声明消息,所述设备声明消息用于表示所述待认证设备已接入所述配网平台网关构建的网络。The device declaration broadcasting module is configured to broadcast a device declaration message, where the device declaration message is used to indicate that the device to be authenticated has accessed the network constructed by the distribution network platform gateway.
  45. 根据权利要求41至44任一所述的装置,其特征在于,The device according to any one of claims 41 to 44, characterized in that:
    所述密钥生成模块,用于采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成设备端安装码,将所述设备端安装码作为所述设备端信任中心链接密钥;The key generation module is configured to use a first key generation algorithm to process the first random number and the license key, generate a device-side installation code, and use the device-side installation code as the device end trust center link key;
    或,or,
    所述密钥生成模块,用于采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成设备端安装码;采用第二密钥生成算法,对所述设备端安装码进行处理,生成所述设备端信任中心链接密钥。The key generation module is configured to use a first key generation algorithm to process the first random number and the license key to generate a device-side installation code; The device-side installation code is processed to generate the device-side trust center link key.
  46. 根据权利要求45所述的装置,其特征在于,The apparatus of claim 45, wherein:
    所述第一密钥生成算法包括:高级加密标准AES-MMO哈希算法;The first key generation algorithm includes: Advanced Encryption Standard AES-MMO hash algorithm;
    所述第二密钥生成算法包括:所述AES-MMO哈希算法。The second key generation algorithm includes: the AES-MMO hash algorithm.
  47. 根据权利要求41至44任一所述的装置,其特征在于,The device according to any one of claims 41 to 44, characterized in that:
    所述信标帧为增强信标帧,所述第一随机数填充在所述增强信标帧的头信息单元字段。The beacon frame is an enhanced beacon frame, and the first random number is filled in a header information element field of the enhanced beacon frame.
  48. 根据权利要求47所述的装置,其特征在于,The apparatus of claim 47, wherein:
    所述信标帧广播模块,用于广播所述增强信标帧;the beacon frame broadcasting module, configured to broadcast the enhanced beacon frame;
    或,or,
    所述信标帧广播模块,用于交替广播所述增强信标帧和常规信标帧。The beacon frame broadcasting module is configured to alternately broadcast the enhanced beacon frame and the regular beacon frame.
  49. 根据权利要求41至44任一所述的装置,其特征在于,The device according to any one of claims 41 to 44, characterized in that:
    所述信标帧还携带设备标识,所述设备标识用于标识所述待认证设备的类型。The beacon frame also carries a device identifier, where the device identifier is used to identify the type of the device to be authenticated.
  50. 根据权利要求41至44任一所述的装置,其特征在于,The device according to any one of claims 41 to 44, characterized in that:
    所述信标帧还携带厂商标识,所述厂商标识用于标识所述待认证设备所属的厂商。The beacon frame also carries a manufacturer identifier, where the manufacturer identifier is used to identify the manufacturer to which the device to be authenticated belongs.
  51. 根据权利要求41至44任一所述的装置,其特征在于,The device according to any one of claims 41 to 44, characterized in that:
    所述信标帧还携带设备地址标识,所述设备地址标识用于标识所述待认证设备的媒体访问控制MAC地址。The beacon frame also carries a device address identifier, where the device address identifier is used to identify the media access control MAC address of the device to be authenticated.
  52. 根据权利要求41至44任一所述的装置,其特征在于,所述装置还包括:信标响应接收模块和关联模块;The device according to any one of claims 41 to 44, wherein the device further comprises: a beacon response receiving module and an association module;
    所述信标响应接收模块,用于接收所述配网平台网关发送的信标响应,所述信标响应用于响应所述信标帧;The beacon response receiving module is configured to receive a beacon response sent by the distribution network platform gateway, where the beacon response is used to respond to the beacon frame;
    所述关联模块,用于向所述配网平台网关发送关联请求,所述关联请求用于请求接入所述配网平台网关构建的网络;接收所述配网平台网关发送的关联响应,所述关联响应用于响应所述关联请求。The association module is configured to send an association request to the distribution network platform gateway, where the association request is used to request access to the network constructed by the distribution network platform gateway; receive an association response sent by the distribution network platform gateway, and The association response is used to respond to the association request.
  53. 根据权利要求41至44任一所述的装置,其特征在于,所述装置还包括:第二认证模块;所述第二认证模块,用于,The device according to any one of claims 41 to 44, wherein the device further comprises: a second authentication module; the second authentication module is configured to:
    基于所述设备平台云生成的第二随机数生成设备端认证密钥,所述设备端认证密钥用于进行所述待认证设备的第二接入认证;Generate a device-side authentication key based on the second random number generated by the device platform cloud, where the device-side authentication key is used to perform second access authentication of the device to be authenticated;
    向所述配网平台网关发送所述设备端认证密钥。Send the device-side authentication key to the distribution network platform gateway.
  54. 根据权利要求53所述的装置,其特征在于,The apparatus of claim 53, wherein
    所述第二认证模块,用于采用第三密钥生成算法,对所述第二随机数以及所述许可密钥进行处理,生成所述设备端认证密钥。The second authentication module is configured to use a third key generation algorithm to process the second random number and the license key to generate the device-side authentication key.
  55. 根据权利要求54所述的装置,其特征在于,The apparatus of claim 54, wherein:
    所述第三密钥生成算法包括:AES-MMO哈希算法。The third key generation algorithm includes: AES-MMO hash algorithm.
  56. 根据权利要求53所述的装置,其特征在于,所述装置还包括:请求接收模块;The apparatus according to claim 53, wherein the apparatus further comprises: a request receiving module;
    所述请求接收模块,用于接收所述配网平台网关向所述待认证设备的自定义簇发送的随机数写入请求,所述随机数写入请求携带所述第二随机数。The request receiving module is configured to receive a random number writing request sent by the distribution network platform gateway to the custom cluster of the device to be authenticated, where the random number writing request carries the second random number.
  57. 根据权利要求56所述的装置,其特征在于,所述装置还包括:密钥存储模块;The apparatus according to claim 56, wherein the apparatus further comprises: a key storage module;
    所述密钥存储模块,用于将所述设备端认证密钥存储于所述自定义簇的属性中。The key storage module is configured to store the device-side authentication key in the attribute of the custom cluster.
  58. 根据权利要求56所述的装置,其特征在于,The apparatus of claim 56, wherein:
    所述自定义簇的访问类型为写后返回。The access type of the custom cluster is return after write.
  59. 一种接入认证装置,其特征在于,应用于配网平台网关中,所述配网平台网关支持构建网络,所述配网平台网关对应的云端服务器为配网平台云,所述装置包括:信标帧接收模块、密钥确定模块和第一认证模块;An access authentication device, characterized in that it is applied to a distribution network platform gateway, the distribution network platform gateway supports building a network, the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud, and the device includes: a beacon frame receiving module, a key determining module and a first authentication module;
    所述信标帧接收模块,用于接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;The beacon frame receiving module is configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
    所述密钥确定模块,用于通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;The key determination module is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, and the authentication end trust center link key is based on the first random number and a key generated by a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
    所述第一认证模块,用于使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。The first authentication module is configured to use the authentication terminal trust center link key to perform first access authentication with the device to be authenticated.
  60. 根据权利要求59所述的装置,其特征在于,The apparatus of claim 59, wherein
    所述第一认证模块,用于向所述待认证设备发送加密密钥信息,所述加密密钥信息是根据所述认证端信任中心链接密钥对网络密钥进行加密得到的信息,所述网络密钥用于在所述第一接入认证后对网络层的数据进行加密。The first authentication module is configured to send encryption key information to the device to be authenticated, where the encryption key information is information obtained by encrypting a network key according to the authentication end trust center link key, the The network key is used to encrypt data at the network layer after the first access authentication.
  61. 根据权利要求60所述的装置,其特征在于,所述装置还包括:设备声明接收模块;The apparatus according to claim 60, wherein the apparatus further comprises: a device declaration receiving module;
    所述设备声明接收模块,用于接收所述待认证设备发送的设备声明消息,所述设备声明消息用于表示所述待认证设备已接入所述配网平台网关构建的网络。The device declaration receiving module is configured to receive a device declaration message sent by the device to be authenticated, where the device declaration message is used to indicate that the device to be authenticated has accessed the network constructed by the distribution network platform gateway.
  62. 根据权利要求59至61任一所述的装置,其特征在于,所述信标帧还携带所述待认证设备的设备地址标识,所述设备地址标识用于标识所述待认证设备的媒体访问控制MAC地址;所述密钥确定模块,用于,The apparatus according to any one of claims 59 to 61, wherein the beacon frame further carries a device address identifier of the device to be authenticated, and the device address identifier is used to identify media access of the device to be authenticated Control MAC address; the key determination module is used for,
    通过所述配网平台云,向所述设备平台云发送安装码请求,所述安装码请求携带所述设备地址标识和所述第一随机数,所述第一随机数用于供所述设备平台云生成认证端安装码;Send an installation code request to the device platform cloud through the distribution network platform cloud, where the installation code request carries the device address identifier and the first random number, and the first random number is used for the device The platform cloud generates the installation code of the authentication terminal;
    通过所述配网平台云,接收源地址为所述设备平台云的安装码响应;Through the distribution network platform cloud, receiving an installation code response whose source address is the device platform cloud;
    基于所述安装码响应,确定所述认证端信任中心链接密钥。Based on the installation code response, the authenticator trust center link key is determined.
  63. 根据权利要求62所述的装置,其特征在于,所述安装码响应携带所述认证端安装码;The device according to claim 62, wherein the installation code response carries the authentication terminal installation code;
    所述密钥确定模块,用于将所述认证端安装码作为所述认证端信任中心链接密钥;The key determination module is configured to use the authentication terminal installation code as the authentication terminal trust center link key;
    或,or,
    所述密钥确定模块,用于采用第二密钥生成算法,对所述认证端安装码进行处理,生成所述认证端信任中心链接密钥。The key determination module is configured to use the second key generation algorithm to process the authentication end installation code to generate the authentication end trust center link key.
  64. 根据权利要求63所述的装置,其特征在于,The apparatus of claim 63, wherein:
    所述第二密钥生成算法包括:高级加密标准AES-MMO哈希算法。The second key generation algorithm includes: Advanced Encryption Standard AES-MMO hash algorithm.
  65. 根据权利要求62所述的装置,其特征在于,The apparatus of claim 62, wherein
    所述安装码响应还携带所述设备平台云生成的第二随机数。The installation code response also carries a second random number generated by the device platform cloud.
  66. 根据权利要求59至61任一所述的装置,其特征在于,所述装置还包括:认证请求模块;所述认证请求模块,用于,The device according to any one of claims 59 to 61, wherein the device further comprises: an authentication request module; the authentication request module is configured to:
    向所述待认证设备的自定义簇发送随机数写入请求,所述随机数写入请求携带第二随机数,所述第二随机数由所述配网平台网关从源地址为所述设备平台云的安装码响应中获取;Send a random number write request to the custom cluster of the device to be authenticated, the random number write request carries a second random number, and the second random number is sent by the distribution platform gateway from the source address to the device Obtained from the installation code response of the platform cloud;
    接收所述待认证设备发送的设备端认证密钥,所述设备端认证密钥用于进行所述待认证设备的第二接入认证;receiving a device-side authentication key sent by the to-be-authenticated device, where the device-side authentication key is used to perform second access authentication of the to-be-authenticated device;
    通过所述配网平台云,向所述设备平台云发送认证设备请求,所述认证设备请求携带设备地址标识和所述设备端认证密钥,所述设备地址标识用于标识所述待认证设备的MAC地址。Through the distribution network platform cloud, an authentication device request is sent to the device platform cloud, and the authentication device request carries a device address identifier and the device-side authentication key, where the device address identifier is used to identify the device to be authenticated the MAC address.
  67. 根据权利要求66所述的装置,其特征在于,The apparatus of claim 66, wherein:
    所述认证请求模块,用于获取所述自定义簇的访问类型;响应于所述自定义簇的访问类型为写后返回,向所述自定义簇发送所述随机数写入请求。The authentication request module is configured to obtain the access type of the custom cluster; in response to the access type of the custom cluster being return after write, send the random number write request to the custom cluster.
  68. 根据权利要求66所述的装置,其特征在于,所述装置还包括:认证结果处理模块;所述认证结 果处理模块,用于,The device according to claim 66, wherein the device further comprises: an authentication result processing module; the authentication result processing module is used for,
    通过所述配网平台云,接收源地址为所述设备平台云的认证结果;receiving, through the distribution network platform cloud, the authentication result that the source address is the device platform cloud;
    响应于所述认证结果为认证成功,更新所述认证端信任中心链接密钥;In response to the authentication result being that the authentication is successful, update the authentication terminal trust center link key;
    响应于所述认证结果为认证失败,将所述待认证设备添加至设备黑名单,所述设备黑名单用于记录配网失败的设备。In response to the authentication result being an authentication failure, the device to be authenticated is added to a device blacklist, where the device blacklist is used to record devices that fail to configure the network.
  69. 根据权利要求59至61任一所述的装置,其特征在于,所述装置还包括:信标响应发送模块和关联模块;The device according to any one of claims 59 to 61, wherein the device further comprises: a beacon response sending module and an association module;
    所述信标响应发送模块,用于向所述待认证设备发送信标响应,所述信标响应用于响应所述信标帧;the beacon response sending module, configured to send a beacon response to the device to be authenticated, where the beacon response is used to respond to the beacon frame;
    所述关联模块,用于接收所述待认证设备发送的关联请求,所述关联请求用于请求接入所述配网平台网关构建的网络;向所述待认证设备发送关联响应,所述关联响应用于响应所述关联请求。The association module is configured to receive an association request sent by the device to be authenticated, where the association request is used to request access to the network constructed by the distribution network platform gateway; send an association response to the device to be authenticated, and the association A response is used to respond to the association request.
  70. 根据权利要求59至61任一所述的装置,其特征在于,所述信标帧还携带设备标识,所述设备标识用于标识所述待认证设备的类型,所述装置还包括:接入请求接收模块;所述接入请求接收模块,用于,The apparatus according to any one of claims 59 to 61, wherein the beacon frame further carries a device identifier, and the device identifier is used to identify the type of the device to be authenticated, and the apparatus further comprises: accessing a request receiving module; the access request receiving module is used for,
    向控制设备发送所述设备标识,所述控制设备用于控制所述配网平台网关;sending the device identification to a control device, where the control device is used to control the distribution network platform gateway;
    接收所述控制设备发送的接入请求,所述接入请求用于触发所述配网平台网关反馈信标响应,所述信标响应用于响应所述信标帧。Receive an access request sent by the control device, where the access request is used to trigger the distribution network platform gateway to feed back a beacon response, where the beacon response is used to respond to the beacon frame.
  71. 根据权利要求59至61任一所述的装置,其特征在于,The device according to any one of claims 59 to 61, characterized in that:
    所述信标帧为增强信标帧,所述第一随机数填充在所述增强信标帧的头信息单元字段。The beacon frame is an enhanced beacon frame, and the first random number is filled in a header information element field of the enhanced beacon frame.
  72. 一种接入认证装置,其特征在于,应用于设备平台云中,所述设备平台云是待认证设备所属的厂商的云端服务器,所述装置包括:密钥确定模块;An access authentication device, characterized in that it is applied in a device platform cloud, the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the device comprises: a key determination module;
    所述密钥确定模块,用于与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。The key determination module is used to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is generated according to the device to be authenticated The key generated by the first random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
  73. 根据权利要求72所述的装置,其特征在于,所述密钥确定模块,用于,The apparatus of claim 72, wherein the key determination module is configured to:
    接收安装码请求,所述安装码请求的源地址为所述配网平台网关,所述安装码请求携带所述待认证设备对应的设备地址标识和所述第一随机数,所述设备地址标识用于标识所述待认证设备的媒体访问控制MAC地址;Receive an installation code request, the source address of the installation code request is the distribution network platform gateway, the installation code request carries the device address identifier corresponding to the device to be authenticated and the first random number, the device address identifier a media access control MAC address used to identify the device to be authenticated;
    基于所述第一随机数,生成认证端安装码;based on the first random number, generating an authentication terminal installation code;
    发送安装码响应,所述安装码响应的目的地址为所述配网平台网关,所述安装码响应携带所述认证端安装码,所述认证端安装码用于供所述配网平台网关确定所述认证端信任中心链接密钥。Send an installation code response, the destination address of the installation code response is the distribution network platform gateway, the installation code response carries the authentication terminal installation code, and the authentication terminal installation code is used for the distribution network platform gateway to determine The authenticator trusts the center link key.
  74. 根据权利要求73所述的装置,其特征在于,所述密钥确定模块,用于,The apparatus of claim 73, wherein the key determination module is configured to:
    根据所述设备地址标识,确定所述待认证设备对应的许可密钥;Determine the license key corresponding to the device to be authenticated according to the device address identifier;
    采用第一密钥生成算法,对所述第一随机数以及所述许可密钥进行处理,生成所述认证端安装码。Using a first key generation algorithm, the first random number and the license key are processed to generate the authentication terminal installation code.
  75. 根据权利要求74所述的装置,其特征在于,The apparatus of claim 74, wherein:
    所述第一密钥生成算法包括:高级加密标准AES-MMO哈希算法。The first key generation algorithm includes: Advanced Encryption Standard AES-MMO hash algorithm.
  76. 根据权利要求73所述的装置,其特征在于,The apparatus of claim 73, wherein
    所述安装码响应还携带所述设备平台云生成的第二随机数。The installation code response also carries a second random number generated by the device platform cloud.
  77. 根据权利要求72至76任一所述的装置,其特征在于,所述装置还包括:第二认证模块;所述第二认证模块,用于,The device according to any one of claims 72 to 76, wherein the device further comprises: a second authentication module; the second authentication module is configured to:
    接收认证设备请求,所述认证设备请求的源地址为所述配网平台网关,所述认证设备请求携带设备地址标识和设备端认证密钥,所述设备端认证密钥是所述待认证设备基于第二随机数生成的密钥,所述第二随机数由所述设备平台云生成,所述设备地址标识用于标识所述待认证设备的MAC地址;Receive an authentication device request, the source address of the authentication device request is the distribution network platform gateway, the authentication device request carries a device address identifier and a device-side authentication key, and the device-side authentication key is the device to be authenticated The key generated based on the second random number, the second random number is generated by the device platform cloud, and the device address identifier is used to identify the MAC address of the device to be authenticated;
    根据所述第二随机数,对所述设备端认证密钥进行第二接入认证。Perform second access authentication on the device-side authentication key according to the second random number.
  78. 根据权利要求77所述的装置,其特征在于,所述第二认证模块,用于,The apparatus of claim 77, wherein the second authentication module is configured to:
    根据所述设备地址标识,确定所述待认证设备对应的许可密钥;Determine the license key corresponding to the device to be authenticated according to the device address identifier;
    采用第三密钥生成算法,对所述第二随机数以及所述许可密钥进行处理,生成云端认证密钥;Using a third key generation algorithm, the second random number and the license key are processed to generate a cloud authentication key;
    对所述云端认证密钥与所述设备端认证密钥进行验证,确定认证结果。Verifying the cloud authentication key and the device-side authentication key to determine an authentication result.
  79. 根据权利要求78所述的装置,其特征在于,The apparatus of claim 78, wherein:
    所述第三密钥生成算法包括:AES-MMO哈希算法。The third key generation algorithm includes: AES-MMO hash algorithm.
  80. 根据权利要求78所述的装置,其特征在于,所述装置还包括:认证结果发送模块;The apparatus according to claim 78, wherein the apparatus further comprises: an authentication result sending module;
    所述认证结果发送模块,用于发送所述认证结果,所述认证结果的目的地址为所述配网平台网关。The authentication result sending module is configured to send the authentication result, and the destination address of the authentication result is the distribution network platform gateway.
  81. 一种待认证设备,其特征在于,所述待认证设备包括:处理器和与所述处理器相连的收发器;其中,A device to be authenticated, characterized in that the device to be authenticated comprises: a processor and a transceiver connected to the processor; wherein,
    所述收发器,用于广播信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the transceiver, configured to broadcast a beacon frame, where the beacon frame carries the first random number generated by the device to be authenticated;
    所述处理器,用于基于所述第一随机数以及许可密钥,生成设备端信任中心链接密钥,所述许可密钥是存放于所述待认证设备以及设备平台云中的密钥;The processor is configured to generate a device-side trust center link key based on the first random number and a license key, where the license key is a key stored in the device to be authenticated and the device platform cloud;
    所述处理器,用于使用所述设备端信任中心链接密钥,与配网平台网关进行第一接入认证。The processor is configured to use the device-side trust center link key to perform first access authentication with the distribution network platform gateway.
  82. 一种配网平台网关,其特征在于,所述配网平台网关支持构建网络,所述配网平台网关对应的云端服务器为配网平台云,所述配网平台网关包括:处理器和与所述处理器相连的收发器;其中,A distribution network platform gateway, characterized in that the distribution network platform gateway supports network construction, the cloud server corresponding to the distribution network platform gateway is a distribution network platform cloud, and the distribution network platform gateway includes: a processor and a a transceiver connected to the processor; wherein,
    所述收发器,用于接收待认证设备广播的信标帧,所述信标帧携带所述待认证设备生成的第一随机数;the transceiver, configured to receive a beacon frame broadcast by the device to be authenticated, where the beacon frame carries the first random number generated by the device to be authenticated;
    所述处理器,用于通过所述配网平台云,与设备平台云交互,获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是基于所述第一随机数以及许可密钥生成的密钥,所述许可密钥是存放于所述待认证设备以及所述设备平台云中的密钥;The processor is configured to interact with the device platform cloud through the distribution network platform cloud to obtain the authentication end trust center link key, where the authentication end trust center link key is based on the first random number and the license key. The key generated by the key, the license key is the key stored in the device to be authenticated and the device platform cloud;
    所述处理器,用于使用所述认证端信任中心链接密钥,与所述待认证设备进行第一接入认证。The processor is configured to perform first access authentication with the device to be authenticated by using the authenticator trust center link key.
  83. 一种设备平台云,其特征在于,所述设备平台云是待认证设备所属的厂商的云端服务器,所述设备平台云包括:处理器和与所述处理器相连的收发器;其中,A device platform cloud, characterized in that the device platform cloud is a cloud server of a manufacturer to which the device to be authenticated belongs, and the device platform cloud includes: a processor and a transceiver connected to the processor; wherein,
    所述处理器,用于与配网平台网关交互,使得所述配网平台网关获取认证端信任中心链接密钥,所述认证端信任中心链接密钥是根据所述待认证设备生成的第一随机数生成的密钥,所述认证端信任中心链接密钥用于进行所述待认证设备的第一接入认证。The processor is configured to interact with the distribution network platform gateway, so that the distribution network platform gateway obtains the authentication end trust center link key, and the authentication end trust center link key is the first generated according to the device to be authenticated. The key generated by the random number, the authentication end trust center link key is used to perform the first access authentication of the device to be authenticated.
  84. 一种计算机可读存储介质,其特征在于,所述可读存储介质中存储有计算机程序,所述计算机程序由处理器加载并执行以实现如权利要求1至40任一所述的接入认证方法。A computer-readable storage medium, wherein a computer program is stored in the readable storage medium, and the computer program is loaded and executed by a processor to implement the access authentication according to any one of claims 1 to 40 method.
PCT/CN2020/133686 2020-12-03 2020-12-03 Access authentication method and apparatus, device, and storage medium WO2022116110A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/133686 WO2022116110A1 (en) 2020-12-03 2020-12-03 Access authentication method and apparatus, device, and storage medium
CN202080107382.1A CN116508292A (en) 2020-12-03 2020-12-03 Access authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/133686 WO2022116110A1 (en) 2020-12-03 2020-12-03 Access authentication method and apparatus, device, and storage medium

Publications (1)

Publication Number Publication Date
WO2022116110A1 true WO2022116110A1 (en) 2022-06-09

Family

ID=81852816

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/133686 WO2022116110A1 (en) 2020-12-03 2020-12-03 Access authentication method and apparatus, device, and storage medium

Country Status (2)

Country Link
CN (1) CN116508292A (en)
WO (1) WO2022116110A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711103A (en) * 2012-05-14 2012-10-03 中国电力科学研究院 Secure routing method for reconnecting disconnected nodes in wireless sensor network (WSN)
CN107690138A (en) * 2016-08-05 2018-02-13 华为技术有限公司 A kind of method for fast roaming, device, system, access point and movement station
US20190132303A1 (en) * 2017-10-26 2019-05-02 Bank Of America Corporation Cloud-based multi-factor authentication for network resource access control
CN111163107A (en) * 2020-01-03 2020-05-15 杭州涂鸦信息技术有限公司 Zigbee safety communication method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711103A (en) * 2012-05-14 2012-10-03 中国电力科学研究院 Secure routing method for reconnecting disconnected nodes in wireless sensor network (WSN)
CN107690138A (en) * 2016-08-05 2018-02-13 华为技术有限公司 A kind of method for fast roaming, device, system, access point and movement station
US20190132303A1 (en) * 2017-10-26 2019-05-02 Bank Of America Corporation Cloud-based multi-factor authentication for network resource access control
CN111163107A (en) * 2020-01-03 2020-05-15 杭州涂鸦信息技术有限公司 Zigbee safety communication method and system

Also Published As

Publication number Publication date
CN116508292A (en) 2023-07-28

Similar Documents

Publication Publication Date Title
US10965473B2 (en) Smart object identification in the digital home
US10630647B2 (en) Secure wireless communication between controllers and accessories
KR101830887B1 (en) Method of joint registration and de-registration for proximity services and internet of things services
KR101881844B1 (en) Access network assisted bootstrapping
US7616594B2 (en) Wireless device discovery and configuration
KR20210032133A (en) Method for iot terminal to autonomically accessing wireless lan network and system there of
US10951592B2 (en) Secure wireless communication between controllers and accessories
WO2019011203A1 (en) Device access method, device and system
CN107948339B (en) Network addressing method, equipment and device
US11246174B2 (en) Methods and systems for connecting a wireless device to a wireless network
US20190372973A1 (en) Device onboarding with automatic ipsk provisioning in wireless networks
WO2022002244A1 (en) Online subscription method, apparatus and system
WO2022028259A1 (en) User subscription data obtaining method and apparatus
WO2021031055A1 (en) Communication method and device
CN116420338A (en) Internet of things equipment access authentication method, device, equipment and storage medium
WO2022116110A1 (en) Access authentication method and apparatus, device, and storage medium
US20200322799A1 (en) Device authentication
US11751050B2 (en) Provisioning a network device for secure communications
EP4187953A1 (en) Communication method, apparatus and system
US11606199B2 (en) Management of groups of connected objects using wireless communication protocols
WO2022147843A1 (en) Access authentication method and apparatus
WO2020258099A1 (en) Method for configuring internet of things device, and internet of things device
WO2022217602A1 (en) Method for establishing device binding relationship, and device
WO2023226956A1 (en) Network device and communication system
WO2023130405A1 (en) Device configuration method and apparatus, computer device, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20963956

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 202080107382.1

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20963956

Country of ref document: EP

Kind code of ref document: A1