WO2022166775A1 - Elevator accessory authentication method and system, and server and storage medium - Google Patents
Elevator accessory authentication method and system, and server and storage medium Download PDFInfo
- Publication number
- WO2022166775A1 WO2022166775A1 PCT/CN2022/074440 CN2022074440W WO2022166775A1 WO 2022166775 A1 WO2022166775 A1 WO 2022166775A1 CN 2022074440 W CN2022074440 W CN 2022074440W WO 2022166775 A1 WO2022166775 A1 WO 2022166775A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- elevator
- accessories
- authentication
- identity authentication
- main control
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 238000004891 communication Methods 0.000 claims abstract description 52
- 238000004590 computer program Methods 0.000 claims description 6
- 238000012423 maintenance Methods 0.000 description 21
- 238000005516 engineering process Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 229910000831 Steel Inorganic materials 0.000 description 1
- 239000004568 cement Substances 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B1/00—Control systems of elevators in general
- B66B1/34—Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
- B66B1/3415—Control system configuration and the data transmission or communication within the control system
- B66B1/3446—Data transmission or communication within the control system
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B1/00—Control systems of elevators in general
- B66B1/34—Details, e.g. call counting devices, data transmission from car to control system, devices giving information to the control system
- B66B1/3415—Control system configuration and the data transmission or communication within the control system
- B66B1/3446—Data transmission or communication within the control system
- B66B1/3453—Procedure or protocol for the data transmission or communication
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B5/00—Applications of checking, fault-correcting, or safety devices in elevators
- B66B5/0087—Devices facilitating maintenance, repair or inspection tasks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B66—HOISTING; LIFTING; HAULING
- B66B—ELEVATORS; ESCALATORS OR MOVING WALKWAYS
- B66B5/00—Applications of checking, fault-correcting, or safety devices in elevators
- B66B5/0006—Monitoring devices or performance analysers
Definitions
- the embodiments of the present application relate to the technical field of the Internet of Things, and in particular, to an elevator accessory authentication method, system, server, and storage medium.
- the initial elevator Internet of Things system was proposed to solve the elevator safety problem.
- the Internet of Things terminal of the elevator system can connect the elevator data sensor, Video surveillance and elevator real-time remote alarm system and other information are uploaded to the cloud platform, so as to realize the functions of elevator remote monitoring and elevator automatic alarm.
- the purpose of the embodiments of the present application is to provide an elevator accessory authentication method, an electronic device and a computer-readable storage medium, which can realize the identity authentication of the Internet of Things terminal of the elevator system, so as to realize the remote, batch, and automatic authentication of elevator accessories.
- the process is very simple, and the efficiency of identity authentication is also improved.
- Embodiments of the present application provide an elevator accessory authentication method, which is applied to a cloud platform server.
- the cloud platform server is connected to an Internet of Things terminal of an elevator, and the Internet of Things terminal is connected to m elevator accessories of the elevator.
- the method includes the following steps: determining the elevator accessories to be authenticated among the m elevator accessories; wherein, the m is an integer greater than 0; if the IoT terminal has passed the identity authentication of the cloud platform server, based on the The Internet of Things terminal performs identity authentication on the elevator accessories to be authenticated, and determines the elevator accessories that have passed the identity authentication; and establishes data communication between the Internet of Things terminal and the elevator accessories that have passed the identity authentication.
- Embodiments of the present application further provide an elevator accessory authentication system, including: a cloud platform server, an Internet of Things terminal of an elevator, and m elevator accessories of the elevator, wherein m is an integer greater than 0; the cloud platform The platform server is connected to the Internet of Things terminal, and the Internet of Things terminal is connected to the m elevator accessories; the cloud platform server is used to determine the elevator accessories to be certified among the m elevator accessories; the cloud platform server It is also used to perform identity authentication on the elevator accessories to be authenticated based on the Internet of Things terminal under the condition that the Internet of Things terminal has passed the identity authentication of the cloud platform server, and determine the elevator accessories that have passed the identity authentication; The cloud platform server is also used to instruct the Internet of Things terminal to establish data communication with the elevator accessories that have passed identity authentication; the Internet of Things terminal is used to establish data communication with the elevator accessories that have passed identity authentication.
- Embodiments of the present application further provide a server, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores a program executable by the at least one processor. Instructions executable by the at least one processor to enable the at least one processor to perform the elevator accessory authentication method described above.
- Embodiments of the present application further provide a computer-readable storage medium storing a computer program, and when the computer program is executed by a processor, the above-mentioned elevator accessory authentication method is implemented.
- the cloud platform server is connected to the IoT terminal of the elevator, the IoT terminal is connected to m elevator accessories of the elevator, and all elevator accessories can be managed by the cloud platform server in a unified manner.
- the identity authentication of the elevator accessories to be authenticated is performed based on the IoT terminal, and the elevator accessories that have passed the identity authentication are determined, taking into account the relevant elevator accessories certification
- the method can only perform identity authentication on elevator accessories, but cannot perform identity authentication on the Internet of Things terminal of the elevator system, which causes a great security risk.
- the cloud platform server can determine whether the Internet of Things terminal has passed the identity authentication.
- the certification of elevator accessories can ensure that the IoT terminal is a legal device and prevent elevator data leakage.
- the IoT terminal is connected to the main control boards of n elevators
- the elevator accessories include subordinate accessories of the main control board
- each of the main control boards is connected with a number of the subordinate accessories
- the pair of Carrying out identity authentication on the elevator accessories to be authenticated includes: determining, among the main control boards of n elevators, a target main control board to which the subordinate accessories to be authenticated are connected; wherein the n is an integer greater than 0; if the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the IoT terminal and the target main control board, the to-be-authenticated The subordinate accessories are authenticated, and the subordinate accessories that have passed the authentication are determined.
- the embodiment of the present application can determine whether the main control board has passed the identity authentication.
- Identity authentication that is, to authenticate the main control board of the elevator first to ensure that the main control board of the elevator is a legal device, thereby further improving the safety performance of the elevator system.
- the establishing data communication between the IoT terminal and the identity-authenticated elevator accessories includes: establishing data communication between the target main control board and the identity-authenticated subordinate accessories; based on The data communication established between the target main control board and the subordinate accessories that have passed the identity authentication, as well as the data communication established between the Internet of Things terminal and the target main control board, establishes the connection between the Internet of Things terminal and the Describes data communication between authenticated slave accessories.
- the cloud platform server can establish data communication between the target main control board and the subordinate accessories, so as to ensure that the IoT terminal can communicate with the subordinate accessories that have passed the authentication, and ensure that the legal subordinate accessories can Normal operation can further improve the safety of the elevator system and meet the needs of users in a friendly manner.
- the method further includes: after determining that a connection with the Internet of Things terminal is established, sending a first identity authentication instruction to the Internet of Things terminal , so that the IoT terminal sends the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction; receives the first encrypted authentication data sent by the IoT terminal; Decrypt the encrypted authentication data to obtain a decryption result of the first encrypted authentication data; and obtain an identity authentication result for the IoT terminal according to the decryption result of the first encrypted authentication data.
- the use of encrypted authentication data can improve the accuracy and security of the identity authentication process of the IoT terminal.
- the method further includes: after determining that the Internet of Things terminal is connected to the target main control board, using the Internet of Things The terminal sends a second identity authentication instruction to the target main control board, so that the target main control board can send the second encrypted authentication data to the IoT terminal according to the second identity authentication instruction; a networked terminal, receiving the second encrypted authentication data sent by the target main control board; decrypting the second encrypted authentication data to obtain a decryption result of the second encrypted authentication data; according to the second encrypted authentication The decryption result of the data is used to obtain the identity authentication result of the target main control board.
- using encrypted authentication data can improve the accuracy and security of the identity authentication process of the main control board.
- the performing identity authentication on the elevator accessories to be authenticated based on the Internet of Things terminal, and determining the elevator accessories that have passed the identity authentication includes: after determining that the Internet of Things terminal is connected to the elevator accessories to be authenticated , through the Internet of Things terminal, receive the authentication request information sent by the elevator accessories to be authenticated; wherein, the authentication request information includes the type information of the elevator accessories to be authenticated; The elevator accessory to be authenticated sends a third identity authentication instruction corresponding to the type information, so that the elevator accessory to be authenticated sends third encrypted authentication data to the cloud platform server according to the third identity authentication instruction; The third encrypted authentication data sent by the elevator accessory to be authenticated is received through the IoT terminal; the third encrypted authentication data is decrypted and verified to determine the elevator accessory that has passed the identity authentication.
- the authentication request information of the elevator accessories can be obtained first.
- the authentication request information includes the type information of the elevator accessories.
- Elevator accessories issue certification instructions by category, which can improve the accuracy and efficiency of identity certification for elevator accessories.
- the use of encrypted authentication data can improve the security of the identity authentication process of elevator accessories.
- the elevator accessories include audio and video accessories
- the method further includes: sending the audio to be displayed to the Internet of Things terminal. video data, and instruct the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication; and/or, receive the live audio and video data sent by the Internet of Things terminal;
- the on-site audio and video data is collected by the audio and video accessories that have passed the identity authentication and sent to the Internet of Things terminal.
- the audio and video accessories can play the audio and video data to be played by the elevator maintenance personnel, and can also collect the audio and video data of the elevator environment, and authenticate the audio and video accessories, which can ensure the security of subsequent audio and video data transmission, and can also protect the elevator users. privacy.
- FIG. 1 is a schematic diagram of the connection between a cloud platform server, an elevator IoT terminal and m elevator accessories according to the first embodiment of the present application;
- Fig. 2 is a flowchart of an elevator accessory authentication method according to the first embodiment of the present application
- FIG. 3 is a flowchart of performing identity authentication on an IoT terminal according to the first embodiment of the present application
- FIG. 4 is a flow chart of identifying elevator accessories that have passed the identity authentication based on the identity authentication of the elevator accessories to be authenticated based on the Internet of Things terminal according to the first embodiment of the present application;
- FIG. 5 is a schematic diagram of the connection of the cloud platform server, the Internet of Things terminal of the elevator, the main control boards of n elevators, and the subordinate accessories of the main control boards of n elevators according to the second embodiment of the present application;
- FIG. 6 is a flowchart of an elevator accessory authentication method according to a second embodiment of the present application.
- FIG. 7 is a flowchart of performing identity authentication on a target main control board according to the second embodiment of the present application.
- FIG. 8 is a flowchart of establishing data communication between an IoT terminal and a subordinate accessory that has passed identity authentication according to the second embodiment of the present application;
- FIG. 9 is a flowchart of an elevator accessory authentication method according to a third embodiment of the present application.
- FIG. 10 is a schematic diagram of an elevator accessory authentication system according to a fourth embodiment of the present application.
- FIG. 11 is a schematic diagram of a specific application of an elevator accessory authentication system provided according to the fourth embodiment of the present application.
- FIG. 12 is a schematic structural diagram of a server according to a fifth embodiment of the present application.
- the first embodiment of the present application relates to an elevator accessory authentication method, which is applied to a cloud platform server.
- the implementation details of the elevator accessory authentication method of the present embodiment will be specifically described below. The following contents are only provided for the convenience of understanding, and are not necessary for implementing this solution.
- the application scenarios of the embodiments of the present application may include but are not limited to: passenger elevator systems applied to office buildings, residential buildings, schools, subways, etc.; freight elevator systems applied to large factories such as power plants, steel plants, and cement plants ; Elevator systems used in special scenes such as hospitals, science and technology institutes, and research institutes; hollow elevator systems used in mines, construction sites and other scenes.
- connection of the cloud platform server, the Internet of Things terminal of the elevator and m elevator accessories can be as shown in FIG. 1
- the cloud platform server is connected to the Internet of Things terminal of the elevator
- the Internet of Things terminal is connected to the m elevator accessories of the elevator connection
- the specific process of the elevator accessory authentication method of this embodiment can be shown in Figure 2, including:
- Step 101 determining the elevator accessories to be certified among the m elevator accessories
- the cloud platform server can determine the elevator accessories to be authenticated among the m elevator accessories, where m is an integer greater than 0.
- m is an integer greater than 1, that is, the IoT terminal of the elevator is connected to a plurality of elevator accessories, so as to facilitate batch authentication of elevator accessories.
- the cloud platform server and the Internet of Things terminal of the elevator can be connected through a network cable or through a wireless network, and m elevator accessories can be connected through the controller area network bus (Controller Area Network, referred to as: CAN bus) Connected to the Internet of Things terminal of the elevator, the m elevator accessories can also be connected to the Internet of Things terminal of the elevator through wireless networks such as Bluetooth and WIFI.
- controller area network bus Controller Area Network, referred to as: CAN bus
- the m elevator accessories can also be connected to the Internet of Things terminal of the elevator through wireless networks such as Bluetooth and WIFI.
- the elevator maintenance personnel newly installed an elevator including m elevator accessories, and the newly installed m elevator accessories all send authentication request information to the cloud platform server, and the cloud platform server determines according to the received authentication request information. All newly installed elevator accessories have not been authenticated, that is, m elevator accessories are all elevator accessories to be certified.
- the elevator accessories include the elevator internal call board and the elevator external call board, the elevator maintenance personnel only replaced the elevator internal call board and the elevator external call board, and the newly replaced elevator internal call board and elevator external call board are directed to
- the cloud platform server sends the authentication request information. According to the received authentication request information, the cloud platform server determines that the newly replaced elevator internal call board and elevator external call board have not been authenticated, that is, the elevator internal call board and the elevator external call board have not been authenticated. It is an elevator accessory to be certified.
- Step 102 if the IoT terminal has passed the identity authentication of the cloud platform server, perform identity authentication on the elevator accessories to be authenticated based on the IoT terminal, and determine the elevator accessories that have passed the identity authentication;
- the cloud platform server can perform identity authentication on the elevator accessories to be authenticated based on the IoT terminal, and determine the elevator accessories that have passed the identity authentication.
- the cloud platform server before the cloud platform server performs identity authentication on the elevator accessories, it can first determine whether the Internet of Things terminal of the elevator has passed the identity authentication of the cloud platform server. If the Internet of Things terminal of the elevator has passed the identity authentication of the cloud platform server, The cloud platform server can continue to authenticate the elevator accessories; if the IoT terminal of the elevator does not pass the identity authentication of the cloud platform server, the IoT terminal may be a fake IoT terminal, and the cloud platform server will not verify the identity of the IoT terminal. The elevator accessories connected to the network terminal are authenticated.
- the cloud platform server can perform identity authentication on the IoT terminal through the steps shown in Figure 3, including:
- Step 201 after it is determined to establish a connection with the IoT terminal, send a first identity authentication instruction to the IoT terminal, so that the IoT terminal sends the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction;
- the cloud platform server can send the first identity authentication instruction to the IoT terminal, so that the IoT terminal can send the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction.
- the IoT terminal can be installed in the elevator machine room or in the elevator car.
- the cloud platform server can communicate with the IoT terminal through information such as the device number of the IoT terminal.
- the networked terminal establishes a connection.
- the cloud platform server determines to establish a connection with the IoT terminal, it sends the first identity authentication instruction to the IoT terminal.
- the IoT terminal is equipped with an identity authentication module.
- the identity authentication module of the IoT terminal can authenticate the first identity according to the received first identity authentication.
- the instruction generates first authentication data, encrypts the first authentication data, and sends the first encrypted authentication data to the cloud platform server.
- the encryption means for the first encrypted authentication data may be hash encryption technology, symmetric encryption technology, asymmetric encryption technology, etc., which are not specifically limited in the embodiments of the present application.
- the serial number of the IoT terminal A is XSD00089.
- the cloud platform server After the IoT terminal is powered on and connected to the Internet, the cloud platform server establishes a connection with the IoT terminal A through the network and the serial number XSD00089 of the IoT terminal A, and sends the The networked terminal A sends the first identity authentication instruction, so that the identity authentication module of the Internet of Things terminal A sends the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction.
- Step 202 receiving the first encrypted authentication data sent by the IoT terminal
- the cloud platform server can receive the first encrypted authentication data sent by the IoT terminal in real time.
- the cloud platform server determines that the IoT terminal A In order to counterfeit and shoddy equipment, disconnect the connection with the IoT terminal A and remove it.
- the preset time may be set by those skilled in the art according to actual needs, which is not specifically limited in the embodiments of the present application.
- Step 203 decrypt the first encrypted authentication data, and obtain a decryption result of the first encrypted authentication data
- the cloud platform server may decrypt the first encrypted authentication data, and obtain a decryption result of the first encrypted authentication data.
- the use of encrypted authentication data can improve the accuracy and security of the identity authentication process of the IoT terminal.
- the cloud platform server can call the corresponding decryption program according to the encryption method of the first encrypted authentication data to authenticate the first encrypted authentication data.
- the data is decrypted to obtain a decryption result of the first encrypted authentication data, that is, the first authentication data.
- the IoT terminal B sends the first encrypted authentication data encrypted by the hash to the cloud platform server, and the cloud platform server can call the hash decryption program after receiving the first encrypted authentication data sent by the IoT terminal B , decrypt the first encrypted authentication data sent by the IoT terminal B, and obtain the first authentication data of the IoT terminal B.
- Step 204 Obtain the identity authentication result of the IoT terminal according to the decryption result of the first encrypted authentication data.
- the cloud platform server may obtain the identity authentication result of the IoT terminal according to the decryption result of the first encrypted authentication data.
- the cloud platform server internally stores a first authentication standard for verifying the authenticity of the IoT terminal. After obtaining the decryption result of the first encrypted authentication data, that is, the first authentication data of the IoT terminal, the cloud platform server can Compare the first authentication data of the IoT terminal with the first authentication standard: if the first authentication data of the IoT terminal is consistent with the first authentication standard, the cloud platform server determines that the IoT terminal is a legal device, and establishes a connection with the IoT terminal. Data communication of the terminal; if the first authentication data of the IoT terminal is inconsistent with the first certification standard, the cloud platform server determines that the IoT terminal is a fake and inferior product, disconnects the connection with the IoT terminal, and removes it.
- elevator maintenance personnel can view the identity authentication result of the IoT terminal in real time through the cloud platform server APP installed on the mobile device.
- the cloud platform server can perform identity authentication based on the elevator accessories to be authenticated by the IoT terminal through the steps as shown in FIG. Elevator accessories, including:
- Step 301 after determining that the Internet of Things terminal is connected to the elevator accessory to be authenticated, receive the authentication request information sent by the elevator accessory to be authenticated through the Internet of Things terminal;
- the cloud platform server can receive the authentication request information sent by the elevator accessory to be authenticated through the IoT terminal.
- the elevator accessory to be authenticated after the elevator accessory to be authenticated is powered on and connected to the IoT terminal, it can automatically send authentication request information to the IoT terminal, requesting the cloud platform server to authenticate the elevator accessory to be authenticated, and the IoT terminal receives After authenticating the request information, the authentication request information can be forwarded to the cloud platform server.
- the authentication request information includes type information of the elevator accessories to be authenticated, and the type information of the elevator accessories to be authenticated can inform the cloud platform server what type of elevator accessories the elevator accessories to be authenticated are.
- the elevator accessory to be authenticated is the internal call board C.
- the authentication request information of the internal call board C can be sent to the IoT terminal, wherein , and the type information of the authentication request information is "internal call board".
- the cloud platform server can receive the authentication request information of the internal call board C through the Internet of Things terminal.
- Step 302 through the Internet of Things terminal, send a third identity authentication instruction corresponding to the type information to the elevator accessory to be authenticated, so that the elevator accessory to be authenticated sends the third encrypted authentication data to the cloud platform server according to the third identity authentication instruction;
- the cloud platform server can send a third identity authentication instruction corresponding to the type information to the elevator accessory to be authenticated through the Internet of Things terminal according to the authentication request information, for the elevator accessory to be authenticated. Send the third encrypted authentication data to the cloud platform server according to the third identity authentication instruction.
- To issue certification instructions for different types of elevator accessories by category can improve the accuracy and efficiency of the identity certification of elevator accessories.
- the cloud platform server can determine what kind of elevator accessory the elevator accessory to be authenticated is based on the type information, and send the first elevator accessory corresponding to the type information to the elevator accessory to be authenticated through the IoT terminal.
- Three identity authentication instructions The elevator accessory is equipped with an identity authentication module.
- the identity authentication module of the elevator accessory can generate the third authentication data according to the received third identity authentication instruction, encrypt the third authentication data, and send the third encrypted authentication data to the cloud platform server.
- the encryption means for the third encrypted authentication data may be hash encryption technology, symmetric encryption technology, asymmetric encryption technology, etc., which are not specifically limited in the embodiments of the present application.
- the elevator accessory to be authenticated is the internal call board C.
- the cloud platform server determines the elevator accessory to be authenticated as the internal call board through the type information in the authentication request information. call board, and send the third identity authentication instruction corresponding to the internal call board to the internal call board C, so that the internal call board C can send the third encrypted authentication data to the cloud platform server according to the third identity authentication instruction.
- Step 303 through the Internet of Things terminal, receive the third encrypted authentication data sent by the elevator accessory to be authenticated;
- the cloud platform server can receive the third encryption sent by the elevator accessory to be authenticated through the Internet of Things terminal in real time. Authentication data.
- the cloud platform server if the cloud platform server sends the third identity authentication instruction corresponding to the type information to the elevator accessory D to be authenticated through the IoT terminal, it does not receive the message sent by the elevator accessory D to be authenticated within the preset time.
- the third encryption authentication data the cloud platform server determines that the elevator accessory D to be authenticated is a fake and inferior accessory, disconnects the connection between the IoT terminal and the elevator accessory D to be authenticated, and removes it.
- the preset time may be set by those skilled in the art according to actual needs, which is not specifically limited in the embodiments of the present application.
- Step 304 decrypt and verify the third encrypted authentication data, and determine the elevator accessories that have passed the identity authentication.
- the cloud platform server can decrypt the third encrypted authentication data to determine the elevator accessory that has passed the identity authentication.
- the use of encrypted authentication data can improve the security of the identity authentication process of elevator accessories.
- the cloud platform server can call the corresponding decryption program according to the encryption method of the third encrypted authentication data to authenticate the third encrypted authentication data.
- the data is decrypted and verified to determine the elevator accessories that have passed the identity authentication. After the elevator accessories pass the identity authentication, there is no need to repeat the authentication until the accessories are replaced, and the cloud platform server will authenticate the replaced elevator accessories.
- elevator maintenance personnel can view the identity authentication results of the elevator accessories to be authenticated in real time through the cloud platform server APP installed on the mobile device, and elevator maintenance personnel can also view the elevator accessories through the cloud platform server APP installed on the mobile device. type information.
- the cloud platform server internally stores a third authentication standard for verifying the authenticity of the elevator accessories to be authenticated.
- the cloud platform server decrypts and verifies the third encrypted authentication data, and obtains the decryption result of the third encrypted authentication data. That is, after the third authentication data of the elevator accessories to be authenticated, the third authentication data can be compared with the third authentication standard: if the third authentication data is consistent with the third authentication standard, a connection between the IoT terminal and the elevator accessory can be established. If the third certification data is inconsistent with the third certification standard, disconnect the connection between the IoT terminal and the elevator accessories to be certified, and remove them.
- elevator maintenance personnel can manually authenticate elevator accessories through a mobile device connected to the cloud platform server, and elevator maintenance personnel can issue authentication instructions to an elevator accessory through the mobile device, and the cloud platform server can use the mobile device to issue authentication instructions to the elevator accessories.
- Elevator accessories carry out identity authentication, and elevator maintenance personnel can track the authentication results through mobile devices.
- elevator maintenance personnel perform manual authentication or view the authentication results, they can be anywhere near the elevator or at any remote location, and do not need to perform authentication in the machine room, car, car roof, etc.
- Step 103 Establish data communication between the IoT terminal and the elevator accessories that have passed the identity authentication.
- the cloud platform server can establish data communication between the IoT terminal and the elevator accessories that have passed the identity authentication.
- the elevator accessories can send their own running data to the IoT terminal in real time, and the IoT terminal can also forward the running data of the elevator accessories to the IoT terminal.
- Cloud platform server
- an elevator accessory can be an elevator thermometer, and the elevator thermometer can obtain real-time temperature information in the elevator. After the elevator thermometer obtains the real-time temperature information in the elevator, it can send the real-time temperature information to the IoT terminal, and the IoT terminal can then send the real-time temperature information. Forwarded to the cloud platform server.
- the cloud platform server is connected to the IoT terminal of the elevator, the IoT terminal is connected to m elevator accessories of the elevator, and all elevator accessories can be managed by the cloud platform server in a unified manner.
- the identity authentication of the elevator accessories to be authenticated is performed based on the IoT terminal, and the elevator accessories that have passed the identity authentication are determined, taking into account the relevant elevator accessories certification
- the method can only perform identity authentication on elevator accessories, but cannot perform identity authentication on the IoT terminal of the elevator system, which causes a great security risk.
- the cloud platform server can determine whether the IoT terminal has passed the identity authentication, and then Certification of elevator accessories can ensure that the IoT terminal is a legal device and prevent elevator data leakage.
- the second embodiment of the present application relates to an elevator accessory authentication method.
- the implementation details of the elevator accessory authentication method of this embodiment are described in detail below. The following contents are only provided for the convenience of understanding, and are not necessary to implement this solution.
- the cloud platform server is connected to the Internet of Things terminal of the elevator, the Internet of Things terminal is connected to the main control boards of n elevators, and each main control board is connected to several subordinate accessories.
- the specific process of the elevator accessory authentication method of this embodiment can be shown in FIG. 6 , including:
- Step 401 determining the subordinate accessories to be certified among the m elevator accessories
- the cloud platform server can determine the subordinate accessories to be authenticated among the m elevator accessories.
- some elevator accessories need to be connected to the main control board of the elevator for use, that is, the subordinate accessories of the main control board.
- the cloud platform server and the elevator's Internet of Things terminal can be connected through a network cable or wireless network.
- the Internet of Things terminal and the main control boards of n elevators can be connected through CAN bus, and each main control board is connected.
- Step 402 if the IoT terminal has passed the identity authentication of the cloud platform server, determine the target main control board connected to the subordinate accessories to be authenticated in the main control boards of the n elevators;
- the cloud platform server can determine the target main control board connected to the subordinate accessories to be authenticated among the n elevator main control boards connected to the IoT terminal. .
- n is an integer greater than 0.
- n is an integer greater than 1, that is, the IoT terminal of the elevator is connected to the main control boards of multiple elevators, so as to facilitate batch authentication of the elevator main control boards.
- the IoT terminal A is connected to the main control board 1, the main control board 2, and the main control board 3, each main control board is connected with a number of subordinate accessories, and the elevator operation and maintenance personnel replaced the main control board 2 connection
- the elevator outbound call board A, the cloud platform server confirms that the elevator outbound call board armor is a subordinate accessory to be authenticated, and the IoT terminal A has passed the identity authentication of the cloud platform server, and the cloud platform server determines the main body connected to the elevator outbound call board armor.
- Control board 2 is the target main control board.
- Step 403 if the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the IoT terminal and the target main control board, perform identity authentication on the subordinate accessories to be authenticated, and determine the subordinate accessories that have passed the identity authentication;
- the cloud platform server determines that the target main control board has passed identity authentication, it can authenticate the subordinate accessories to be authenticated based on the data communication established between the IoT terminal and the target main control board, and determine the subordinate accessories that have passed the identity authentication.
- the embodiment of the present application can determine whether the main control board has passed the identity authentication, that is, firstly perform identity authentication on the main control board of the elevator to ensure that the main control board of the elevator is a legal device, thereby further improving the safety performance of the elevator system.
- the cloud platform server can first determine whether the target main control board has passed the identity authentication of the cloud platform server before the identity authentication of the subordinate accessories to be authenticated. If the target main control board has passed the identity authentication of the cloud platform server, The cloud platform server can continue to authenticate the subordinate accessories to be authenticated; if the target main control board has not passed the identity authentication of the cloud platform server, the main control board is a fake and inferior product, and the cloud platform server will not connect with the main control board. The subordinate accessories are authenticated.
- the cloud platform server can perform identity authentication on the target main control board through the steps shown in Figure 7, including:
- Step 501 after it is determined that the connection between the IoT terminal and the target main control board is established, a second identity authentication instruction is sent to the target main control board through the Internet of Things terminal, so that the target main control board can send the information to the Internet of Things according to the second identity authentication instruction.
- the terminal sends the second encrypted authentication data;
- the cloud platform server can send the second identity authentication instruction to the target main control board through the Internet of Things terminal, so that the target main control board can authenticate according to the second identity instruction to send the second encrypted authentication data to the IoT terminal.
- the target main control board after the target main control board is powered on and establishes a connection with the IoT terminal, it is connected to the Internet of Things.
- the target main control board sends a second identity authentication instruction.
- the target main control board is equipped with an identity authentication module, and the identity authentication module of the target main control board can generate the second authentication data according to the received second identity authentication instruction, encrypt the second authentication data, and send the first authentication data to the IoT terminal. 2. Encrypt the authentication data.
- the encryption means for the second encrypted authentication data may be hash encryption technology, symmetric encryption technology, asymmetric encryption technology, etc., which are not specifically limited in the embodiments of the present application.
- Step 502 through the Internet of Things terminal, receive the second encrypted authentication data sent by the target main control board;
- the cloud platform server can receive the second encrypted authentication data sent by the target main control board through the Internet of Things terminal in real time.
- the cloud platform server after the cloud platform server sends the second identity authentication instruction to the target main control board through the IoT terminal, it does not receive the second encrypted authentication data sent by the target main control board within a preset time. It is determined that the target main control board is a fake and shoddy product, disconnect the connection between the IoT terminal and the target main control board, and remove it to remove the fake and shoddy products, thereby improving the safety of the elevator during operation.
- the preset time may be set by those skilled in the art according to actual needs, which is not specifically limited in the embodiments of the present application.
- Step 503 decrypt the second encrypted authentication data, and obtain a decryption result of the second encrypted authentication data
- the cloud platform server can decrypt the second encrypted authentication data to obtain a decryption result of the second encrypted authentication data.
- using encrypted authentication data can improve the accuracy and security of the identity authentication process of the main control board.
- the cloud platform server can call the corresponding decryption program according to the encryption method of the second encrypted authentication data to authenticate the second encrypted authentication data.
- the data is decrypted to obtain a decryption result of the second encrypted authentication data, that is, the second authentication data.
- Step 504 Obtain the identity authentication result of the target main control board according to the decryption result of the second encrypted authentication data.
- the cloud platform server may obtain the identity authentication result of the target main control board according to the decryption result of the second encrypted authentication data.
- the cloud platform server internally stores a second authentication standard for verifying the authenticity of the target main control board, and the cloud platform server obtains the decryption result of the second encrypted authentication data, that is, the second authentication data of the target main control board.
- the second authentication data of the target main control board can be compared with the second authentication standard: if the second authentication data is consistent with the second authentication standard, the cloud platform server determines that the target main control board is true, and sends the authentication to the IoT terminal Success information; if the second authentication data is inconsistent with the second authentication standard, the cloud platform server determines that the target main control board is a counterfeit product, disconnects the connection with the target main control board, and removes it.
- elevator maintenance personnel can view the identity authentication result of the target main control board in real time through the cloud platform server APP installed on the mobile device.
- Step 404 establishing data communication between the IoT terminal and the subordinate accessories that have passed the identity authentication.
- the cloud platform server can establish data communication between the IoT terminal and the subordinate accessories that have passed the identity authentication.
- the establishment of data communication between the IoT terminal and the subordinate accessories that have passed the identity authentication can be achieved through the sub-steps shown in FIG. 8 , including:
- Sub-step 4041 establishing data communication between the target main control board and the subordinate accessories that have passed the identity authentication
- the cloud platform server can establish data communication between the target main control board and the subordinate accessories that have passed the identity authentication.
- the target main control board can control the subordinate accessories, and the subordinate accessories can also send their own operation information to the target main control board.
- the subordinate accessory is a pressure sensor
- the pressure sensor can obtain the real-time load information in the elevator.
- the pressure sensor can send the real-time load information to the target main control board, and the target main control board judges Whether the real-time load of the elevator exceeds the preset load threshold, if the real-time load of the elevator exceeds the preset load threshold, the target main control board controls the elevator to stop running, further improving the safety of the elevator.
- the target main control board can also send real-time load information to the cloud platform server through the IoT terminal, so that elevator maintenance personnel can track and view it through the mobile device connected to the cloud platform server.
- Sub-step 4042 based on the data communication established between the target main control board and the subordinate accessories that have passed the identity authentication, and the data communication established between the Internet of Things terminal and the target main control board, establish the Internet of Things terminal and the subordinate accessories that have passed the identity authentication. data communication between.
- the cloud platform server sends the authentication success information to the IoT terminal.
- the IoT terminal receives the authentication success information, it can forward it to the target main control board, the IoT terminal and the target main control board. Data communication is established between the control boards.
- the cloud platform server can then establish an IoT terminal based on the data communication established between the target main control board and the subordinate accessories that have passed the authentication. Data communication between certified slave accessories.
- the cloud platform server can establish data communication between the target main control board and the subordinate accessories, so as to ensure that the IoT terminal can communicate with the subordinate accessories that have passed the authentication, and ensure that the legal subordinate accessories can Normal operation can further improve the safety of the elevator system and meet the needs of users in a friendly manner.
- the IoT terminal is connected to the main control boards of n elevators
- the elevator accessories include subordinate accessories of the main control boards
- each of the main control boards is connected with a number of the Subordinate accessories, performing identity authentication on the elevator accessories to be authenticated, and determining the elevator accessories that have passed the identity authentication, include: determining, among the main control boards of n elevators, a target main control board to which the subordinate accessories to be authenticated are connected ; wherein, the n is an integer greater than 0; if the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the Internet of Things terminal and the target main control board, Perform identity authentication on the subordinate accessories to be authenticated, and determine the subordinate accessories that have passed the identity authentication.
- the embodiment of the present application can determine whether the main control board has passed the identity authentication.
- Identity authentication that is, to authenticate the main control board of the elevator first to ensure that the main control board of the elevator is a legal device, thereby further improving the safety performance of the elevator system.
- the third embodiment of the present application relates to an elevator accessory authentication method.
- the implementation details of the elevator accessory authentication method of this embodiment are described in detail below. The following contents are only provided for the convenience of understanding and are not necessary to implement this solution.
- the elevator accessories of this embodiment include audio and video accessories
- FIG. 9 is a schematic diagram of the elevator accessories authentication method described in the third embodiment of the present application, including:
- Step 601 determining the audio and video accessories to be authenticated among the m elevator accessories
- the elevator accessories include audio and video accessories
- the audio and video accessories may include, but are not limited to, cameras, microphones, LED displays, and broadcast speakers.
- the cloud platform server can determine the audio and video accessories to be certified among the m elevator accessories.
- Step 602 if the Internet of Things terminal has passed the identity authentication of the cloud platform server, based on the identity authentication of the audio and video accessories to be authenticated by the Internet of Things terminal, determine the audio and video accessories that have passed the identity authentication;
- Step 603 establishing data communication between the IoT terminal and the audio and video accessories that have passed the identity authentication
- steps 602 to 603 have been similarly described in the first embodiment, and will not be repeated here.
- Step 604 Send the audio and video data to be displayed to the Internet of Things terminal, and instruct the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication; and/or, receive the live audio and video data sent by the Internet of Things terminal. .
- the cloud platform server can send the audio and video data to be displayed to the Internet of Things terminal, and instruct the Internet of Things terminal to send the audio and video accessories that have passed the identity authentication.
- Video accessories send audio and video data to be displayed, and can also receive live audio and video data sent by IoT terminals.
- the on-site audio and video data is collected by the audio and video accessories that have passed the identity authentication and sent to the Internet of Things terminal.
- the audio and video accessories include broadcast speakers
- the cloud platform server can send broadcast audio to the IoT terminal, and instruct the IoT terminal to send broadcast audio to the broadcast speaker for playback.
- the audio and video accessories include a camera.
- the camera can record the live video in the elevator car in real time, send it to the IoT terminal, and forward it to the cloud platform server, and the cloud platform server can receive the live video sent by the IoT terminal.
- the elevator accessories include audio and video accessories
- the method further includes: sending data to the Internet of Things The terminal sends the audio and video data to be displayed, and instructs the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication; and/or, receives the live audio and video data sent by the Internet of Things terminal Video data; wherein, the on-site audio and video data is collected by the audio and video accessories that have passed the identity authentication and sent to the Internet of Things terminal.
- the audio and video accessories can play the audio and video data to be played by the elevator maintenance personnel, and can also collect the audio and video data of the elevator environment, and authenticate the audio and video accessories, which can ensure the security of subsequent audio and video data transmission, and can also protect the elevator users. privacy.
- FIG. 10 is a schematic diagram of the cloud game control system according to the fourth embodiment, including: a cloud platform server 601 , an IoT terminal 602 and m elevator accessories 603 .
- the cloud platform server 601 is connected to the IoT terminal 602 , and the IoT terminal 602 is connected to m elevator accessories 603 .
- the cloud platform server 601 is used to determine the elevator accessories to be authenticated among the m elevator accessories 603 .
- the cloud platform server 601 is further configured to perform identity authentication on the elevator accessories to be authenticated based on the IoT terminal 602 when the IoT terminal 602 has passed the identity authentication of the cloud platform server 601, and determine the elevator accessories that have passed the identity authentication.
- the cloud platform server 601 is also used to instruct the IoT terminal 602 to establish data communication with the elevator accessories that have passed identity authentication.
- the IoT terminal 602 is used to establish data communication with elevator accessories that have passed identity authentication.
- the specific application of the elevator accessory authentication system of this embodiment may be as shown in FIG. 11 .
- the cloud platform server and the IoT terminal are connected through a wireless network, the IoT terminal and the main control board 1-n are connected through the CAN bus, and the main control board 1 is connected with the subordinate accessories 1-m of the main control board 1 through the CAN bus.
- the control board 2 is connected to the subordinate accessories 1-m of the main control board 2 through the CAN bus
- the main control board n is connected to the subordinate accessories 1-m of the main control board 1 through the CAN bus
- the IoT terminal is also connected to the audio and video accessories 1 through the network cable. -n connect.
- the cloud platform server is also connected with the mobile device through a wireless network.
- the cloud platform server can first perform identity authentication on the IoT terminal. After the identity authentication of the IoT terminal is passed, the cloud platform server can perform identity authentication on the main control board 1-n and audio and video accessories 1-n. -n After passing the identity authentication, the cloud platform server can authenticate the subordinate accessories connected to each main control board.
- the IoT terminal is connected to the main control board of n elevators, and through the cloud platform server, the batch automatic authentication of multiple elevators in parallel or group control can be realized.
- this embodiment is a system example corresponding to the first to third embodiments, and this embodiment can be implemented in cooperation with the first to third embodiments.
- the relevant technical details and technical effects mentioned in the first to third embodiments are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here.
- the related technical details mentioned in this embodiment can also be applied to the first to third embodiments.
- each module involved in this embodiment is a logical module.
- a logical unit may be a physical unit, a part of a physical unit, or multiple physical units.
- a composite implementation of the unit in order to highlight the innovative part of the present application, this embodiment does not introduce units that are not closely related to solving the technical problem raised by the present application, but this does not mean that there are no other units in this embodiment.
- the fifth embodiment of the present application relates to a server, as shown in FIG. 12 , comprising: at least one processor 701 ; and a memory 702 communicatively connected to the at least one processor 701 ; wherein the memory 702 stores a Instructions executed by the at least one processor 701, where the instructions are executed by the at least one processor 701, so that the at least one processor 701 can execute the elevator accessory authentication method in each of the foregoing embodiments.
- the memory and the processor are connected by a bus, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors and various circuits of the memory.
- the bus may also connect together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and therefore will not be described further herein.
- the bus interface provides the interface between the bus and the transceiver.
- a transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing a means for communicating with various other devices over a transmission medium.
- the data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor.
- the processor manages the bus and general processing, and can also provide various functions, including timing, peripheral interface, voltage regulation, power management, and other control functions. Instead, memory may be used to store data used by the processor in performing operations.
- the sixth embodiment of the present application relates to a computer-readable storage medium storing a computer program.
- the above method embodiments are implemented when the computer program is executed by the processor.
- Computer-readable storage media may include computer storage media (or non-transitory media) and communication media (or transitory media).
- computer storage media includes both volatile and nonvolatile implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data flexible, removable and non-removable media.
- the aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Automation & Control Theory (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Indicating And Signalling Devices For Elevators (AREA)
Abstract
Disclosed in the embodiments of the present application are an elevator accessory authentication method and system, and a server and a storage medium. The method is applied to a cloud platform server. The cloud platform server is connected to an Internet-of-Things terminal of an elevator, and the Internet-of-Things terminal is connected to M elevator accessories of the elevator. The method comprises: determining an elevator accessory to be authenticated from among M elevator accessories, wherein M is an integer greater than 0; if an Internet-of-Things terminal has passed identity authentication by means of a cloud platform server, performing, on the basis of the Internet-of-Things terminal, identity authentication on the elevator accessory to be authenticated, and determining an elevator accessory that has passed identity authentication; and establishing data communication between the Internet-of-Things terminal and the elevator accessory that has passed identity authentication.
Description
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请基于申请号为202110183418.0、申请日为2021年02月08日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此以引入方式并入本申请。This application is based on the Chinese patent application with the application number of 202110183418.0 and the filing date of February 8, 2021, and claims the priority of the Chinese patent application. The entire content of the Chinese patent application is hereby incorporated by reference into this application.
本申请实施例涉及物联网技术领域,特别涉及一种电梯配件认证方法、系统、服务器和存储介质。The embodiments of the present application relate to the technical field of the Internet of Things, and in particular, to an elevator accessory authentication method, system, server, and storage medium.
随着物联网技术的飞速发展,电梯物联网技术应运而生,最初的电梯物联网系统是为了解决电梯安全问题而提出的,电梯系统的物联网终端可以通过有线或者无线的方式将电梯数据传感器、视频监控以及电梯实时远程报警系统等信息上传到云平台上,从而实现电梯的远程监控、电梯的自动报警等功能。With the rapid development of the Internet of Things technology, the elevator Internet of Things technology came into being. The initial elevator Internet of Things system was proposed to solve the elevator safety problem. The Internet of Things terminal of the elevator system can connect the elevator data sensor, Video surveillance and elevator real-time remote alarm system and other information are uploaded to the cloud platform, so as to realize the functions of elevator remote monitoring and elevator automatic alarm.
发明内容SUMMARY OF THE INVENTION
本申请实施方式的目的在于提供一种电梯配件认证方法、电子设备和计算机可读存储介质,可以实现电梯系统的物联网终端的身份认证,从而实现对电梯配件的远程、批量、自动认证,认证过程非常简单,也提高了身份认证的效率。The purpose of the embodiments of the present application is to provide an elevator accessory authentication method, an electronic device and a computer-readable storage medium, which can realize the identity authentication of the Internet of Things terminal of the elevator system, so as to realize the remote, batch, and automatic authentication of elevator accessories. The process is very simple, and the efficiency of identity authentication is also improved.
本申请的实施方式提供了一种电梯配件认证方法,应用于云平台服务器,所述云平台服务器与电梯的物联网终端连接,所述物联网终端与所述电梯的m个电梯配件连接,所述方法包括以下步骤:确定所述m个电梯配件中待认证的电梯配件;其中,所述m为大于0的整数;若所述物联网终端已通过所述云平台服务器的身份认证,基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件;建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯。Embodiments of the present application provide an elevator accessory authentication method, which is applied to a cloud platform server. The cloud platform server is connected to an Internet of Things terminal of an elevator, and the Internet of Things terminal is connected to m elevator accessories of the elevator. The method includes the following steps: determining the elevator accessories to be authenticated among the m elevator accessories; wherein, the m is an integer greater than 0; if the IoT terminal has passed the identity authentication of the cloud platform server, based on the The Internet of Things terminal performs identity authentication on the elevator accessories to be authenticated, and determines the elevator accessories that have passed the identity authentication; and establishes data communication between the Internet of Things terminal and the elevator accessories that have passed the identity authentication.
本申请的实施方式还提供了一种电梯配件认证系统,包括:云平台服务器、电梯的物联网终端和所述电梯的m个电梯配件,其中,所述m为大于0的整数;所述云平台服务器与所述物联网终端连接,所述物联网终端与所述m个电梯配件连接;所述云平台服务器用于确定所述m个电梯配件中待认证的电梯配件;所述云平台服务器还用于在所述物联网终端已通过 所述云平台服务器的身份认证的情况下,基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件;所述云平台服务器还用于指示所述物联网终端和所述通过身份认证的电梯配件建立数据通讯;所述物联网终端用于和所述通过身份认证的电梯配件建立数据通讯。Embodiments of the present application further provide an elevator accessory authentication system, including: a cloud platform server, an Internet of Things terminal of an elevator, and m elevator accessories of the elevator, wherein m is an integer greater than 0; the cloud platform The platform server is connected to the Internet of Things terminal, and the Internet of Things terminal is connected to the m elevator accessories; the cloud platform server is used to determine the elevator accessories to be certified among the m elevator accessories; the cloud platform server It is also used to perform identity authentication on the elevator accessories to be authenticated based on the Internet of Things terminal under the condition that the Internet of Things terminal has passed the identity authentication of the cloud platform server, and determine the elevator accessories that have passed the identity authentication; The cloud platform server is also used to instruct the Internet of Things terminal to establish data communication with the elevator accessories that have passed identity authentication; the Internet of Things terminal is used to establish data communication with the elevator accessories that have passed identity authentication.
本申请的实施方式还提供了一种服务器,包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行上述电梯配件认证方法。Embodiments of the present application further provide a server, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores a program executable by the at least one processor. Instructions executable by the at least one processor to enable the at least one processor to perform the elevator accessory authentication method described above.
本申请的实施方式还提供了一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现上述电梯配件认证方法。Embodiments of the present application further provide a computer-readable storage medium storing a computer program, and when the computer program is executed by a processor, the above-mentioned elevator accessory authentication method is implemented.
本申请的实施方式,所述云平台服务器与电梯的物联网终端连接,所述物联网终端与所述电梯的m个电梯配件连接,所有电梯配件可以受云平台服务器的统一管理。确定所述m个电梯配件中待认证的电梯配件;其中,所述m为大于0的整数,确定需要进行认证的电梯配件,可以保证精准地对待认证的电梯配件进行身份认证。若所述物联网终端已通过所述云平台服务器的身份认证,基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,考虑到相关的电梯配件认证方法只能对电梯配件进行身份认证,不能对电梯系统的物联网终端进行身份认证,造成了很大的安全隐患,本申请的实施方式,云平台服务器可以确定物联网终端是否已通过身份认证,再进行电梯配件的认证,可以保证物联网终端为合法设备,防止电梯数据泄露。建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯,考虑到相关的电梯配件认证方法需要电梯维护人员携带认证设备进入到电梯机房或轿厢中,根据认证设备和电梯配件建立局域网,才能对电梯配件进行逐一认证,而本申请的实施方式电梯配件与物联网终端连接,只要物联网终端已通过身份认证,电梯维护人员无需进入电梯就可以远程、批量、自动地对电梯配件进行身份验证,认证过程非常简单,也提高了身份认证的效率。In the embodiment of the present application, the cloud platform server is connected to the IoT terminal of the elevator, the IoT terminal is connected to m elevator accessories of the elevator, and all elevator accessories can be managed by the cloud platform server in a unified manner. Determine the elevator accessories to be authenticated among the m elevator accessories; wherein, the m is an integer greater than 0, and determining the elevator accessories that need to be authenticated can ensure that the elevator accessories to be authenticated are accurately authenticated. If the IoT terminal has passed the identity authentication of the cloud platform server, the identity authentication of the elevator accessories to be authenticated is performed based on the IoT terminal, and the elevator accessories that have passed the identity authentication are determined, taking into account the relevant elevator accessories certification The method can only perform identity authentication on elevator accessories, but cannot perform identity authentication on the Internet of Things terminal of the elevator system, which causes a great security risk. In the implementation of this application, the cloud platform server can determine whether the Internet of Things terminal has passed the identity authentication. The certification of elevator accessories can ensure that the IoT terminal is a legal device and prevent elevator data leakage. Establish data communication between the Internet of Things terminal and the elevator accessories that have passed identity authentication, considering that the relevant elevator accessories authentication method requires elevator maintenance personnel to bring authentication equipment into the elevator machine room or car, according to the authentication equipment and elevator. Only by establishing a local area network for accessories, can the elevator accessories be authenticated one by one. In the embodiment of the present application, the elevator accessories are connected to the IoT terminal. As long as the IoT terminal has passed the identity authentication, the elevator maintenance personnel can remotely, batch, and automatically without entering the elevator. Elevator accessories carry out identity verification, the authentication process is very simple, and the efficiency of identity authentication is also improved.
另外,所述物联网终端与n个电梯的主控板连接,所述电梯配件包括所述主控板的从属配件,每个所述主控板均连接有若干所述从属配件,所述对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,包括:在n个电梯的主控板中确定所述待认证的从属配件连接的目标主控板;其中,所述n为大于0的整数;若所述目标主控板已通过所述云平台服务器的身份认证,基于所述物联网终端和所述目标主控板之间建立的数据通讯,对所述待认证的从属配件进行身份认证,确定通过身份认证的从属配件。考虑到现有的电梯配件是 与主控板连接的从属配件,而相关技术只能对从属配件进行身份认证,不能对主控板进行身份认证,本申请的实施方式可以确定主控板是否通过身份认证,即先对电梯的主控板进行身份认证,保证电梯的主控板为合法设备,从而进一步提高电梯系统的安全性能。In addition, the IoT terminal is connected to the main control boards of n elevators, the elevator accessories include subordinate accessories of the main control board, each of the main control boards is connected with a number of the subordinate accessories, the pair of Carrying out identity authentication on the elevator accessories to be authenticated, and determining the elevator accessories that have passed the identity authentication, includes: determining, among the main control boards of n elevators, a target main control board to which the subordinate accessories to be authenticated are connected; wherein the n is an integer greater than 0; if the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the IoT terminal and the target main control board, the to-be-authenticated The subordinate accessories are authenticated, and the subordinate accessories that have passed the authentication are determined. Considering that the existing elevator accessories are subordinate accessories connected to the main control board, and the related technology can only authenticate the subordinate accessories and cannot authenticate the main control board, the embodiment of the present application can determine whether the main control board has passed the identity authentication. Identity authentication, that is, to authenticate the main control board of the elevator first to ensure that the main control board of the elevator is a legal device, thereby further improving the safety performance of the elevator system.
另外,所述建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯,包括:建立所述目标主控板和所述通过身份认证的从属配件之间的数据通讯;基于所述目标主控板和所述通过身份认证的从属配件之间建立的数据通讯,以及所述物联网终端和所述目标主控板之间建立的数据通讯,建立所述物联网终端和所述通过身份认证的从属配件之间的数据通讯。当从属配件的身份认证通过后,云平台服务器可以建立目标主控板与从属配件之间的数据通讯,以保证物联网终端可以和通过身份认证的从属配件进行数据通讯,保证合法的从属配件可以正常运行,可以进一步提升电梯系统的安全性,友好地满足用户的需求。In addition, the establishing data communication between the IoT terminal and the identity-authenticated elevator accessories includes: establishing data communication between the target main control board and the identity-authenticated subordinate accessories; based on The data communication established between the target main control board and the subordinate accessories that have passed the identity authentication, as well as the data communication established between the Internet of Things terminal and the target main control board, establishes the connection between the Internet of Things terminal and the Describes data communication between authenticated slave accessories. When the identity authentication of the subordinate accessories is passed, the cloud platform server can establish data communication between the target main control board and the subordinate accessories, so as to ensure that the IoT terminal can communicate with the subordinate accessories that have passed the authentication, and ensure that the legal subordinate accessories can Normal operation can further improve the safety of the elevator system and meet the needs of users in a friendly manner.
另外,若所述物联网终端未进行过所述云平台服务器的身份认证,所述方法还包括:在确定与所述物联网终端建立连接后,向所述物联网终端发送第一身份认证指令,以供所述物联网终端根据所述第一身份认证指令向所述云平台服务器发送第一加密认证数据;接收所述物联网终端发送的所述第一加密认证数据;对所述第一加密认证数据进行解密,获取所述第一加密认证数据的解密结果;根据所述第一加密认证数据的解密结果,获取对所述物联网终端的身份认证结果。在物联网终端的身份认证过程中,使用加密认证数据,可以提高物联网终端的身份认证过程的准确性和安全性。In addition, if the Internet of Things terminal has not performed identity authentication of the cloud platform server, the method further includes: after determining that a connection with the Internet of Things terminal is established, sending a first identity authentication instruction to the Internet of Things terminal , so that the IoT terminal sends the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction; receives the first encrypted authentication data sent by the IoT terminal; Decrypt the encrypted authentication data to obtain a decryption result of the first encrypted authentication data; and obtain an identity authentication result for the IoT terminal according to the decryption result of the first encrypted authentication data. In the identity authentication process of the IoT terminal, the use of encrypted authentication data can improve the accuracy and security of the identity authentication process of the IoT terminal.
另外,若所述目标主控板未进行过所述云平台服务器的身份认证,所述方法还包括:在确定所述物联网终端与所述目标主控板建立连接后,通过所述物联网终端,向所述目标主控板发送第二身份认证指令,以供所述目标主控板根据所述第二身份认证指令,向所述物联网终端发送第二加密认证数据;通过所述物联网终端,接收所述目标主控板发送的所述第二加密认证数据;对所述第二加密认证数据进行解密,获取所述第二加密认证数据的解密结果;根据所述第二加密认证数据的解密结果,获取对所述目标主控板的身份认证结果。在主控板的身份认证过程中,使用加密认证数据,可以提高主控板的身份认证过程的准确性和安全性。In addition, if the target main control board has not been authenticated by the cloud platform server, the method further includes: after determining that the Internet of Things terminal is connected to the target main control board, using the Internet of Things The terminal sends a second identity authentication instruction to the target main control board, so that the target main control board can send the second encrypted authentication data to the IoT terminal according to the second identity authentication instruction; a networked terminal, receiving the second encrypted authentication data sent by the target main control board; decrypting the second encrypted authentication data to obtain a decryption result of the second encrypted authentication data; according to the second encrypted authentication The decryption result of the data is used to obtain the identity authentication result of the target main control board. During the identity authentication process of the main control board, using encrypted authentication data can improve the accuracy and security of the identity authentication process of the main control board.
另外,所述基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,包括:在确定所述物联网终端与所述待认证的电梯配件建立连接后,通过所述物联网终端,接收所述待认证的电梯配件发送的认证请求信息;其中,所述认证请求信息包括所述待认证的电梯配件的类型信息;通过所述物联网终端,向所述待认证的电梯配件发送与所述类型信息对应的第三身份认证指令,以供所述待认证的电梯配件根据所述第三身份认证指令向所述云平台服务器发送第三加密认证数据;通过所述物联网终端,接收所述待 认证的电梯配件发送的所述第三加密认证数据;对所述第三加密认证数据进行解密验证,确定通过身份认证的电梯配件。在实际应用中,电梯配件有很多类型,本申请的实施方式在对电梯配件进行身份认证时,可以先获取电梯配件的认证请求信息,认证请求信息中包括电梯配件的类型信息,对不同类型的电梯配件分门别类地下发认证指令,可以提高电梯配件的身份认证的准确性和效率。同时在电梯配件的身份认证过程中,使用加密认证数据,可以提高电梯配件的身份认证过程的安全性。In addition, the performing identity authentication on the elevator accessories to be authenticated based on the Internet of Things terminal, and determining the elevator accessories that have passed the identity authentication, includes: after determining that the Internet of Things terminal is connected to the elevator accessories to be authenticated , through the Internet of Things terminal, receive the authentication request information sent by the elevator accessories to be authenticated; wherein, the authentication request information includes the type information of the elevator accessories to be authenticated; The elevator accessory to be authenticated sends a third identity authentication instruction corresponding to the type information, so that the elevator accessory to be authenticated sends third encrypted authentication data to the cloud platform server according to the third identity authentication instruction; The third encrypted authentication data sent by the elevator accessory to be authenticated is received through the IoT terminal; the third encrypted authentication data is decrypted and verified to determine the elevator accessory that has passed the identity authentication. In practical applications, there are many types of elevator accessories. In the embodiment of the present application, when performing identity authentication on the elevator accessories, the authentication request information of the elevator accessories can be obtained first. The authentication request information includes the type information of the elevator accessories. Elevator accessories issue certification instructions by category, which can improve the accuracy and efficiency of identity certification for elevator accessories. At the same time, in the identity authentication process of elevator accessories, the use of encrypted authentication data can improve the security of the identity authentication process of elevator accessories.
另外,所述电梯配件包括音视频配件,所述在建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯之后,还包括:向所述物联网终端发送待展示的音视频数据,并指示所述物联网终端向所述通过身份认证的音视频配件发送所述待展示的音视频数据;和/或,接收所述物联网终端发送的现场音视频数据;其中,所述现场音视频数据由所述通过身份认证的音视频配件采集并发送给所述物联网终端。音视频配件可以播放电梯维护人员要播放的音视频数据,也可以采集电梯环境的音视频数据,对音视频配件进行身份认证,可以保证后续音视频数据传输的安全性,也可以保护电梯使用者的隐私。In addition, the elevator accessories include audio and video accessories, and after establishing data communication between the Internet of Things terminal and the elevator accessories that have passed the identity authentication, the method further includes: sending the audio to be displayed to the Internet of Things terminal. video data, and instruct the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication; and/or, receive the live audio and video data sent by the Internet of Things terminal; The on-site audio and video data is collected by the audio and video accessories that have passed the identity authentication and sent to the Internet of Things terminal. The audio and video accessories can play the audio and video data to be played by the elevator maintenance personnel, and can also collect the audio and video data of the elevator environment, and authenticate the audio and video accessories, which can ensure the security of subsequent audio and video data transmission, and can also protect the elevator users. privacy.
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定。One or more embodiments are exemplified by the pictures in the corresponding drawings, and these exemplified descriptions do not constitute limitations on the embodiments.
图1是根据本申请第一实施方式中,云平台服务器、电梯的物联网终端和m个电梯配件的连接示意图;1 is a schematic diagram of the connection between a cloud platform server, an elevator IoT terminal and m elevator accessories according to the first embodiment of the present application;
图2是根据本申请第一实施方式的电梯配件认证方法的流程图;Fig. 2 is a flowchart of an elevator accessory authentication method according to the first embodiment of the present application;
图3是根据本申请第一实施方式中,对物联网终端进行身份认证的流程图;FIG. 3 is a flowchart of performing identity authentication on an IoT terminal according to the first embodiment of the present application;
图4是根据本申请第一实施方式中,基于物联网终端对待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件的流程图;4 is a flow chart of identifying elevator accessories that have passed the identity authentication based on the identity authentication of the elevator accessories to be authenticated based on the Internet of Things terminal according to the first embodiment of the present application;
图5是根据本申请第二实施方式中,云平台服务器、电梯的物联网终端、n个电梯的主控板和n个电梯的主控板的从属配件的连接示意图;5 is a schematic diagram of the connection of the cloud platform server, the Internet of Things terminal of the elevator, the main control boards of n elevators, and the subordinate accessories of the main control boards of n elevators according to the second embodiment of the present application;
图6是根据本申请第二实施方式的电梯配件认证方法的流程图;FIG. 6 is a flowchart of an elevator accessory authentication method according to a second embodiment of the present application;
图7是根据本申请第二实施方式中,对目标主控板进行身份认证的流程图;7 is a flowchart of performing identity authentication on a target main control board according to the second embodiment of the present application;
图8是根据本申请第二实施方式中,建立物联网终端和通过身份认证的从属配件之间的数据通讯的流程图;8 is a flowchart of establishing data communication between an IoT terminal and a subordinate accessory that has passed identity authentication according to the second embodiment of the present application;
图9是根据本申请第三实施方式的电梯配件认证方法的流程图;FIG. 9 is a flowchart of an elevator accessory authentication method according to a third embodiment of the present application;
图10是根据本申请第四实施方式的电梯配件认证系统的示意图;10 is a schematic diagram of an elevator accessory authentication system according to a fourth embodiment of the present application;
图11是根据本申请第四实施方式提供的一种电梯配件认证系统具体应用的示意图;11 is a schematic diagram of a specific application of an elevator accessory authentication system provided according to the fourth embodiment of the present application;
图12是根据本申请第五实施方式的服务器的结构示意图。FIG. 12 is a schematic structural diagram of a server according to a fifth embodiment of the present application.
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的各实施方式进行详细的阐述。然而,本领域的普通技术人员可以理解,在本申请各实施方式中,为了使读者更好地理解本申请而提出了许多技术细节。但是,即使没有这些技术细节和基于以下各实施方式的种种变化和修改,也可以实现本申请所要求保护的技术方案。以下各个实施例的划分是为了描述方便,不应对本申请的具体实现方式构成任何限定,各个实施例在不矛盾的前提下可以相互结合相互引用。In order to make the objectives, technical solutions and advantages of the embodiments of the present application more clear, the various embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, those of ordinary skill in the art can understand that, in the various embodiments of the present application, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in the present application can be realized. The following divisions of the various embodiments are for the convenience of description, and should not constitute any limitation on the specific implementation of the present application, and the various embodiments may be combined with each other and referred to each other on the premise of not contradicting each other.
本申请的第一实施方式涉及一种电梯配件认证方法,应用于云平台服务器。下面对本实施方式的电梯配件认证方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。The first embodiment of the present application relates to an elevator accessory authentication method, which is applied to a cloud platform server. The implementation details of the elevator accessory authentication method of the present embodiment will be specifically described below. The following contents are only provided for the convenience of understanding, and are not necessary for implementing this solution.
本申请的实施方式的应用场景可以包括但不限于:应用于办公楼、居民楼、学校、地铁等场景的客运电梯系统;应用于发电厂、炼钢厂、水泥厂等大型工厂的货运电梯系统;应用于医院、科技所、研究院等特殊场景的电梯系统;应用于矿井、建筑工地等场景的镂空电梯系统等。The application scenarios of the embodiments of the present application may include but are not limited to: passenger elevator systems applied to office buildings, residential buildings, schools, subways, etc.; freight elevator systems applied to large factories such as power plants, steel plants, and cement plants ; Elevator systems used in special scenes such as hospitals, science and technology institutes, and research institutes; hollow elevator systems used in mines, construction sites and other scenes.
申请人发现相关技术中至少存在如下问题:随着人们对美好生活的需要,各种各样的电梯配件被安装在电梯系统里,纳入到电梯物联网系统进行工作,但不法分子不断生产假冒伪劣的电梯配件,这给电梯的运行带来了很大的安全隐患。为了保证电梯配件是正版货,电梯维护人员在安装或更换电梯配件时,需要对待安装或待更换的电梯配件进行身份认证,但在进行电梯配件的身份认证时,电梯维护人员必须携带认证设备进入机房或轿厢,通过无线网,将认证设备与机房或轿厢的本地无线模块建立连接后,方能进行身份认证,这样的认证过程非常繁琐,给电梯维护人员带来了不好的使用体验。The applicant found that there are at least the following problems in the related art: with people's needs for a better life, various elevator accessories are installed in the elevator system and incorporated into the elevator Internet of Things system for work, but criminals continue to produce fake and inferior products. The elevator accessories, which bring a great safety hazard to the operation of the elevator. In order to ensure that the elevator accessories are genuine, elevator maintenance personnel need to authenticate the elevator accessories to be installed or replaced when installing or replacing elevator accessories, but when performing identity authentication of elevator accessories, elevator maintenance personnel must bring authentication equipment to enter In the machine room or car, through the wireless network, the authentication equipment can be connected with the local wireless module of the machine room or car before identity authentication can be performed. This kind of authentication process is very cumbersome and brings bad experience to elevator maintenance personnel. .
本实施方式中,云平台服务器、电梯的物联网终端和m个电梯配件的连接情况可以如图1所示,云平台服务器与电梯的物联网终端连接,物联网终端与电梯的m个电梯配件连接,本实施方式的电梯配件认证方法的具体流程可以如图2所示,包括:In this embodiment, the connection of the cloud platform server, the Internet of Things terminal of the elevator and m elevator accessories can be as shown in FIG. 1 , the cloud platform server is connected to the Internet of Things terminal of the elevator, and the Internet of Things terminal is connected to the m elevator accessories of the elevator connection, the specific process of the elevator accessory authentication method of this embodiment can be shown in Figure 2, including:
步骤101,确定m个电梯配件中待认证的电梯配件; Step 101, determining the elevator accessories to be certified among the m elevator accessories;
具体而言,云平台服务器可以确定m个电梯配件中待认证的电梯配件,其中,m为大于0的整数。可选的,m为大于1的整数,即电梯的物联网终端和多个电梯配件连接,从而便于完成电梯配件的批量认证。Specifically, the cloud platform server can determine the elevator accessories to be authenticated among the m elevator accessories, where m is an integer greater than 0. Optionally, m is an integer greater than 1, that is, the IoT terminal of the elevator is connected to a plurality of elevator accessories, so as to facilitate batch authentication of elevator accessories.
在具体实现中,云平台服务器与电梯的物联网终端之间可以通过网线连接,也可以通过无线网进行连接,m个电梯配件可以通过控制器局域网络总线(Controller Area Network,简称:CAN总线)与电梯的物联网终端连接,m个电梯配件也可以通过蓝牙、WIFI等无线网络与电梯的物联网终端连接。In the specific implementation, the cloud platform server and the Internet of Things terminal of the elevator can be connected through a network cable or through a wireless network, and m elevator accessories can be connected through the controller area network bus (Controller Area Network, referred to as: CAN bus) Connected to the Internet of Things terminal of the elevator, the m elevator accessories can also be connected to the Internet of Things terminal of the elevator through wireless networks such as Bluetooth and WIFI.
在一个例子中,电梯维护人员新安装了一台电梯,包括m个电梯配件,新安装的m个电梯配件均向云平台服务器发送认证请求信息,云平台服务器根据接收到的认证请求信息,确定所有新安装的电梯配件均未进行过身份认证,即m个电梯配件都是待认证的电梯配件。In one example, the elevator maintenance personnel newly installed an elevator, including m elevator accessories, and the newly installed m elevator accessories all send authentication request information to the cloud platform server, and the cloud platform server determines according to the received authentication request information. All newly installed elevator accessories have not been authenticated, that is, m elevator accessories are all elevator accessories to be certified.
在另一个例子中,电梯配件包括电梯内呼板和电梯外呼板,电梯维护人员只更换了电梯的电梯内呼板和电梯外呼板,新更换的电梯内呼板和电梯外呼板向云平台服务器发送认证请求信息,云平台服务器根据接收到的认证请求信息,确定新更换的电梯内呼板和电梯外呼板未进行过身份认证,即该电梯内呼板和该电梯外呼板是待认证的电梯配件。In another example, the elevator accessories include the elevator internal call board and the elevator external call board, the elevator maintenance personnel only replaced the elevator internal call board and the elevator external call board, and the newly replaced elevator internal call board and elevator external call board are directed to The cloud platform server sends the authentication request information. According to the received authentication request information, the cloud platform server determines that the newly replaced elevator internal call board and elevator external call board have not been authenticated, that is, the elevator internal call board and the elevator external call board have not been authenticated. It is an elevator accessory to be certified.
步骤102,若物联网终端已通过云平台服务器的身份认证,基于物联网终端对待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件; Step 102, if the IoT terminal has passed the identity authentication of the cloud platform server, perform identity authentication on the elevator accessories to be authenticated based on the IoT terminal, and determine the elevator accessories that have passed the identity authentication;
具体而言,若电梯的物联网终端已通过云平台服务器的身份认证,云平台服务器可以基于物联网终端对待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件。Specifically, if the IoT terminal of the elevator has passed the identity authentication of the cloud platform server, the cloud platform server can perform identity authentication on the elevator accessories to be authenticated based on the IoT terminal, and determine the elevator accessories that have passed the identity authentication.
在具体实现中,云平台服务器在对电梯配件进行身份认证之前,可以先判断电梯的物联网终端是否已通过云平台服务器的身份认证,若电梯的物联网终端已通过云平台服务器的身份认证,云平台服务器可以继续进行对电梯配件的身份认证;若电梯的物联网终端未通过云平台服务器的身份认证,该物联网终端可能为假冒伪劣的物联网终端,云平台服务器不会对与该物联网终端连接的电梯配件进行身份认证。In the specific implementation, before the cloud platform server performs identity authentication on the elevator accessories, it can first determine whether the Internet of Things terminal of the elevator has passed the identity authentication of the cloud platform server. If the Internet of Things terminal of the elevator has passed the identity authentication of the cloud platform server, The cloud platform server can continue to authenticate the elevator accessories; if the IoT terminal of the elevator does not pass the identity authentication of the cloud platform server, the IoT terminal may be a fake IoT terminal, and the cloud platform server will not verify the identity of the IoT terminal. The elevator accessories connected to the network terminal are authenticated.
在一个例子中,若物联网终端未进行过云平台服务器的身份认证,云平台服务器可以通过如图3所示的各步骤,对物联网终端进行身份认证,具体包括:In an example, if the IoT terminal has not been authenticated by the cloud platform server, the cloud platform server can perform identity authentication on the IoT terminal through the steps shown in Figure 3, including:
步骤201,在确定与物联网终端建立连接后,向物联网终端发送第一身份认证指令,以供物联网终端根据第一身份认证指令向云平台服务器发送第一加密认证数据; Step 201, after it is determined to establish a connection with the IoT terminal, send a first identity authentication instruction to the IoT terminal, so that the IoT terminal sends the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction;
具体而言,云平台服务器在确定与物联网终端建立连接后,可以向物联网终端发送第一身份认证指令,以供物联网终端根据第一身份认证指令向云平台服务器发送第一加密认证数据。Specifically, after determining to establish a connection with the IoT terminal, the cloud platform server can send the first identity authentication instruction to the IoT terminal, so that the IoT terminal can send the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction.
在具体实现中,物联网终端可以安装在电梯机房里,也可以安装在电梯的轿厢中,当物联网终端上电联网后,云平台服务器可以通过物联网终端的设备编号等信息,与物联网终端建立连接。云平台服务器在确定与物联网终端建立连接后,向物联网终端发送第一身份认证 指令,物联网终端内部配备有身份认证模块,物联网终端的身份认证模块可以根据接收到的第一身份认证指令生成第一认证数据,并对第一认证数据进行加密,向云平台服务器发送第一加密认证数据。其中,第一加密认证数据的加密手段可以为哈希加密技术、对称加密技术和非对称加密技术等,本申请的实施方式对此不做具体限定。In the specific implementation, the IoT terminal can be installed in the elevator machine room or in the elevator car. When the IoT terminal is connected to the Internet, the cloud platform server can communicate with the IoT terminal through information such as the device number of the IoT terminal. The networked terminal establishes a connection. After the cloud platform server determines to establish a connection with the IoT terminal, it sends the first identity authentication instruction to the IoT terminal. The IoT terminal is equipped with an identity authentication module. The identity authentication module of the IoT terminal can authenticate the first identity according to the received first identity authentication. The instruction generates first authentication data, encrypts the first authentication data, and sends the first encrypted authentication data to the cloud platform server. The encryption means for the first encrypted authentication data may be hash encryption technology, symmetric encryption technology, asymmetric encryption technology, etc., which are not specifically limited in the embodiments of the present application.
在一个例子中,物联网终端A的出场序列号为XSD00089,该物联网终端上电联网后,云平台服务器通过网络和物联网终端A的序列号XSD00089,与物联网终端A建立连接,向物联网终端A发送第一身份认证指令,以供物联网终端A的身份认证模块,根据第一身份认证指令向云平台服务器发送第一加密认证数据。In an example, the serial number of the IoT terminal A is XSD00089. After the IoT terminal is powered on and connected to the Internet, the cloud platform server establishes a connection with the IoT terminal A through the network and the serial number XSD00089 of the IoT terminal A, and sends the The networked terminal A sends the first identity authentication instruction, so that the identity authentication module of the Internet of Things terminal A sends the first encrypted authentication data to the cloud platform server according to the first identity authentication instruction.
步骤202,接收物联网终端发送的第一加密认证数据; Step 202, receiving the first encrypted authentication data sent by the IoT terminal;
具体而言,云平台服务器在向物联网终端发送第一身份认证指令后,可以实时接收物联网终端发送的第一加密认证数据。Specifically, after sending the first identity authentication instruction to the IoT terminal, the cloud platform server can receive the first encrypted authentication data sent by the IoT terminal in real time.
在一个例子中,若云平台服务器向物联网终端A发送第一身份认证指令后,在预设时间内没有接收到物联网终端A发送的第一加密认证数据,云平台服务器确定物联网终端A为假冒伪劣设备,断开与物联网终端A的连接,将其剔除。其中,预设时间可以由本领域技术人员根据实际需要进行设定,本申请的实施方式对此不做具体限定。In an example, if the cloud platform server does not receive the first encrypted authentication data sent by the IoT terminal A within a preset time after sending the first identity authentication instruction to the IoT terminal A, the cloud platform server determines that the IoT terminal A In order to counterfeit and shoddy equipment, disconnect the connection with the IoT terminal A and remove it. The preset time may be set by those skilled in the art according to actual needs, which is not specifically limited in the embodiments of the present application.
步骤203,对第一加密认证数据进行解密,获取第一加密认证数据的解密结果; Step 203, decrypt the first encrypted authentication data, and obtain a decryption result of the first encrypted authentication data;
具体而言,云平台服务器在接收到物联网终端发送的第一加密认证数据后,可以对第一加密认证数据进行解密,获取第一加密认证数据的解密结果。在物联网终端的身份认证过程中,使用加密认证数据,可以提高物联网终端的身份认证过程的准确性和安全性。Specifically, after receiving the first encrypted authentication data sent by the IoT terminal, the cloud platform server may decrypt the first encrypted authentication data, and obtain a decryption result of the first encrypted authentication data. In the identity authentication process of the IoT terminal, the use of encrypted authentication data can improve the accuracy and security of the identity authentication process of the IoT terminal.
在具体实现中,云平台服务器内部存储有若干种解密程序,云平台服务器在获取第一加密认证数据后,可以根据第一加密认证数据的加密方法,调用相应的解密程序,对第一加密认证数据进行解密,获取第一加密认证数据的解密结果,即第一认证数据。In a specific implementation, several decryption programs are stored inside the cloud platform server. After acquiring the first encrypted authentication data, the cloud platform server can call the corresponding decryption program according to the encryption method of the first encrypted authentication data to authenticate the first encrypted authentication data. The data is decrypted to obtain a decryption result of the first encrypted authentication data, that is, the first authentication data.
在一个例子中,物联网终端B向云平台服务器发送经过哈希加密的第一加密认证数据,云平台服务器在接收到物联网终端B发送的第一加密认证数据后,可以调用哈希解密程序,对物联网终端B发送的第一加密认证数据进行解密,获取物联网终端B的第一认证数据。In an example, the IoT terminal B sends the first encrypted authentication data encrypted by the hash to the cloud platform server, and the cloud platform server can call the hash decryption program after receiving the first encrypted authentication data sent by the IoT terminal B , decrypt the first encrypted authentication data sent by the IoT terminal B, and obtain the first authentication data of the IoT terminal B.
步骤204,根据第一加密认证数据的解密结果,获取对物联网终端的身份认证结果。Step 204: Obtain the identity authentication result of the IoT terminal according to the decryption result of the first encrypted authentication data.
具体而言,云平台服务器在获取第一加密认证数据的解密结果后,可以根据第一加密认证数据的解密结果,获取对物联网终端的身份认证结果。Specifically, after obtaining the decryption result of the first encrypted authentication data, the cloud platform server may obtain the identity authentication result of the IoT terminal according to the decryption result of the first encrypted authentication data.
在具体实现中,云平台服务器内部存储有用于验证物联网终端真假的第一认证标准,云平台服务器在获取第一加密认证数据的解密结果,即物联网终端的第一认证数据后,可以将 物联网终端的第一认证数据与第一认证标准进行比对:若物联网终端的第一认证数据与第一认证标准一致,云平台服务器确定物联网终端为合法设备,建立与该物联网终端的数据通讯;若物联网终端的第一认证数据与第一认证标准不一致,云平台服务器确定物联网终端为假冒伪劣产品,断开与物联网终端的连接,将其剔除。In a specific implementation, the cloud platform server internally stores a first authentication standard for verifying the authenticity of the IoT terminal. After obtaining the decryption result of the first encrypted authentication data, that is, the first authentication data of the IoT terminal, the cloud platform server can Compare the first authentication data of the IoT terminal with the first authentication standard: if the first authentication data of the IoT terminal is consistent with the first authentication standard, the cloud platform server determines that the IoT terminal is a legal device, and establishes a connection with the IoT terminal. Data communication of the terminal; if the first authentication data of the IoT terminal is inconsistent with the first certification standard, the cloud platform server determines that the IoT terminal is a fake and inferior product, disconnects the connection with the IoT terminal, and removes it.
在一个例子中,电梯维护人员可以通过移动设备上安装的云平台服务器APP实时查看物联网终端的身份认证结果。In one example, elevator maintenance personnel can view the identity authentication result of the IoT terminal in real time through the cloud platform server APP installed on the mobile device.
在一个例子中,若物联网终端已通过云平台服务器的身份认证,云平台服务器可以通过如图4所示的各步骤,基于物联网终端对待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,具体包括:In one example, if the IoT terminal has passed the identity authentication of the cloud platform server, the cloud platform server can perform identity authentication based on the elevator accessories to be authenticated by the IoT terminal through the steps as shown in FIG. Elevator accessories, including:
步骤301,在确定物联网终端与待认证的电梯配件建立连接后,通过物联网终端,接收待认证的电梯配件发送的认证请求信息; Step 301, after determining that the Internet of Things terminal is connected to the elevator accessory to be authenticated, receive the authentication request information sent by the elevator accessory to be authenticated through the Internet of Things terminal;
具体而言,云平台服务器在确定物联网终端与待认证的电梯配件建立连接后,可以通过物联网终端,接收待认证的电梯配件发送的认证请求信息。Specifically, after determining that the connection between the IoT terminal and the elevator accessory to be authenticated is established, the cloud platform server can receive the authentication request information sent by the elevator accessory to be authenticated through the IoT terminal.
在具体实现中,待认证的电梯配件上电并与物联网终端建立连接后,可以自动向物联网终端发送认证请求信息,请求云平台服务器对待认证的电梯配件进行身份认证,物联网终端接收到认证请求信息后,可以将认证请求信息转发给云平台服务器。其中,认证请求信息包括待认证的电梯配件的类型信息,待认证的电梯配件的类型信息可以告知云平台服务器,该待认证的电梯配件是何种类型的电梯配件。In the specific implementation, after the elevator accessory to be authenticated is powered on and connected to the IoT terminal, it can automatically send authentication request information to the IoT terminal, requesting the cloud platform server to authenticate the elevator accessory to be authenticated, and the IoT terminal receives After authenticating the request information, the authentication request information can be forwarded to the cloud platform server. The authentication request information includes type information of the elevator accessories to be authenticated, and the type information of the elevator accessories to be authenticated can inform the cloud platform server what type of elevator accessories the elevator accessories to be authenticated are.
在一个例子中,待认证的电梯配件为内呼板C,内呼板C安装完成、上电并与物联网终端建立连接后,可以向物联网终端发送内呼板C的认证请求信息,其中,认证请求信息的类型信息为“内呼板”。云平台服务器可以通过物联网终端,接收内呼板C的认证请求信息。In an example, the elevator accessory to be authenticated is the internal call board C. After the internal call board C is installed, powered on, and connected to the IoT terminal, the authentication request information of the internal call board C can be sent to the IoT terminal, wherein , and the type information of the authentication request information is "internal call board". The cloud platform server can receive the authentication request information of the internal call board C through the Internet of Things terminal.
步骤302,通过物联网终端,向待认证的电梯配件发送与类型信息对应的第三身份认证指令,以供待认证的电梯配件根据第三身份认证指令向云平台服务器发送第三加密认证数据; Step 302, through the Internet of Things terminal, send a third identity authentication instruction corresponding to the type information to the elevator accessory to be authenticated, so that the elevator accessory to be authenticated sends the third encrypted authentication data to the cloud platform server according to the third identity authentication instruction;
具体而言,云平台服务器接收到认证请求信息后,可以根据认证请求信息,通过物联网终端,向待认证的电梯配件发送与类型信息对应的第三身份认证指令,以供待认证的电梯配件根据第三身份认证指令向云平台服务器发送第三加密认证数据。对不同类型的电梯配件分门别类地下发认证指令,可以提高电梯配件的身份认证的准确性和效率。Specifically, after receiving the authentication request information, the cloud platform server can send a third identity authentication instruction corresponding to the type information to the elevator accessory to be authenticated through the Internet of Things terminal according to the authentication request information, for the elevator accessory to be authenticated. Send the third encrypted authentication data to the cloud platform server according to the third identity authentication instruction. To issue certification instructions for different types of elevator accessories by category can improve the accuracy and efficiency of the identity certification of elevator accessories.
在具体实现中,云平台服务器在接收到认证请求信息后,可以根据类型信息判断待认证的电梯配件为何种电梯配件,并通过物联网终端,向待认证的电梯配件发送与类型信息对应的第三身份认证指令。电梯配件内部配备有身份认证模块,电梯配件的身份认证模块可以根 据接收到的第三身份认证指令生成第三认证数据,并对第三认证数据进行加密,向云平台服务器发送第三加密认证数据。其中,第三加密认证数据的加密手段可以为哈希加密技术、对称加密技术和非对称加密技术等,本申请的实施方式对此不做具体限定。In a specific implementation, after receiving the authentication request information, the cloud platform server can determine what kind of elevator accessory the elevator accessory to be authenticated is based on the type information, and send the first elevator accessory corresponding to the type information to the elevator accessory to be authenticated through the IoT terminal. Three identity authentication instructions. The elevator accessory is equipped with an identity authentication module. The identity authentication module of the elevator accessory can generate the third authentication data according to the received third identity authentication instruction, encrypt the third authentication data, and send the third encrypted authentication data to the cloud platform server. . The encryption means for the third encrypted authentication data may be hash encryption technology, symmetric encryption technology, asymmetric encryption technology, etc., which are not specifically limited in the embodiments of the present application.
在一个例子中,待认证的电梯配件为内呼板C,云平台服务器接收到内呼板C的认证请求信息后,云平台服务器通过认证请求信息中的类型信息确定待认证的电梯配件为内呼板,并向内呼板C发送与内呼板对应的第三身份认证指令,以供内呼板C根据第三身份认证指令向云平台服务器发送第三加密认证数据。In an example, the elevator accessory to be authenticated is the internal call board C. After the cloud platform server receives the authentication request information of the internal call board C, the cloud platform server determines the elevator accessory to be authenticated as the internal call board through the type information in the authentication request information. call board, and send the third identity authentication instruction corresponding to the internal call board to the internal call board C, so that the internal call board C can send the third encrypted authentication data to the cloud platform server according to the third identity authentication instruction.
步骤303,通过物联网终端,接收待认证的电梯配件发送的第三加密认证数据; Step 303, through the Internet of Things terminal, receive the third encrypted authentication data sent by the elevator accessory to be authenticated;
具体而言,云平台服务器在通过物联网终端,向待认证的电梯配件发送与类型信息对应的第三身份认证指令后,可以实时通过物联网终端,接收待认证的电梯配件发送的第三加密认证数据。Specifically, after sending the third identity authentication instruction corresponding to the type information to the elevator accessory to be authenticated through the Internet of Things terminal, the cloud platform server can receive the third encryption sent by the elevator accessory to be authenticated through the Internet of Things terminal in real time. Authentication data.
在一个例子中,若云平台服务器通过物联网终端,向待认证的电梯配件D发送与类型信息对应的第三身份认证指令后,在预设时间内没有接收到待认证的电梯配件D发送的第三加密认证数据,云平台服务器确定待认证的电梯配件D为假冒伪劣配件,断开物联网终端与待认证的电梯配件D的连接,将其剔除。其中,预设时间可以由本领域技术人员根据实际需要进行设定,本申请的实施方式对此不做具体限定。In one example, if the cloud platform server sends the third identity authentication instruction corresponding to the type information to the elevator accessory D to be authenticated through the IoT terminal, it does not receive the message sent by the elevator accessory D to be authenticated within the preset time. The third encryption authentication data, the cloud platform server determines that the elevator accessory D to be authenticated is a fake and inferior accessory, disconnects the connection between the IoT terminal and the elevator accessory D to be authenticated, and removes it. The preset time may be set by those skilled in the art according to actual needs, which is not specifically limited in the embodiments of the present application.
步骤304,对第三加密认证数据进行解密验证,确定通过身份认证的电梯配件。 Step 304 , decrypt and verify the third encrypted authentication data, and determine the elevator accessories that have passed the identity authentication.
具体而言,云平台服务器在接收到待认证的电梯配件发送的第三加密认证数据后,可以对第三加密认证数据进行解密,确定通过身份认证的电梯配件。在电梯配件的身份认证过程中,使用加密认证数据,可以提高电梯配件的身份认证过程的安全性。Specifically, after receiving the third encrypted authentication data sent by the elevator accessory to be authenticated, the cloud platform server can decrypt the third encrypted authentication data to determine the elevator accessory that has passed the identity authentication. In the identity authentication process of elevator accessories, the use of encrypted authentication data can improve the security of the identity authentication process of elevator accessories.
在具体实现中,云平台服务器内部存储有若干种解密程序,云平台服务器在获取第三加密认证数据后,可以根据第三加密认证数据的加密方法,调用相应的解密程序,对第三加密认证数据进行解密验证,确定通过身份认证的电梯配件。电梯配件通过身份认证后,无需再进行重复认证,直到该配件发生更换,云平台服务器对更换后的电梯配件进行身份认证。In the specific implementation, several decryption programs are stored inside the cloud platform server. After obtaining the third encrypted authentication data, the cloud platform server can call the corresponding decryption program according to the encryption method of the third encrypted authentication data to authenticate the third encrypted authentication data. The data is decrypted and verified to determine the elevator accessories that have passed the identity authentication. After the elevator accessories pass the identity authentication, there is no need to repeat the authentication until the accessories are replaced, and the cloud platform server will authenticate the replaced elevator accessories.
在一个例子中,电梯维护人员可以通过移动设备上安装的云平台服务器APP实时查看待认证的电梯配件的身份认证结果,电梯维护人员还可以通过移动设备上安装的云平台服务器APP查看电梯配件的类型信息。In one example, elevator maintenance personnel can view the identity authentication results of the elevator accessories to be authenticated in real time through the cloud platform server APP installed on the mobile device, and elevator maintenance personnel can also view the elevator accessories through the cloud platform server APP installed on the mobile device. type information.
在一个例子中,云平台服务器内部存储有用于验证待认证的电梯配件真假的第三认证标准,云平台服务器在对第三加密认证数据进行解密验证,获取第三加密认证数据的解密结果,即待认证的电梯配件的第三认证数据后,可以将第三认证数据与第三认证标准进行比对:若 第三认证数据与第三认证标准一致,建立物联网终端和该电梯配件之间的数据通讯;若第三认证数据与第三认证标准不一致,断开物联网终端与待认证的电梯配件的连接,将其剔除。In one example, the cloud platform server internally stores a third authentication standard for verifying the authenticity of the elevator accessories to be authenticated. The cloud platform server decrypts and verifies the third encrypted authentication data, and obtains the decryption result of the third encrypted authentication data. That is, after the third authentication data of the elevator accessories to be authenticated, the third authentication data can be compared with the third authentication standard: if the third authentication data is consistent with the third authentication standard, a connection between the IoT terminal and the elevator accessory can be established. If the third certification data is inconsistent with the third certification standard, disconnect the connection between the IoT terminal and the elevator accessories to be certified, and remove them.
在一个例子中,电梯维护人员可以通过与云平台服务器连接的移动设备,对电梯配件进行手动认证,电梯维护人员可以通过移动设备,对某电梯配件下达认证指令,云平台服务器根据认证指令对该电梯配件进行身份认证,电梯维护人员可以通过移动设备跟踪认证结果。电梯维护人员进行手动认证或查看认证结果时,可在电梯附近任意位置或远程任意位置,无需在机房、轿厢、轿顶等位置进行认证。In one example, elevator maintenance personnel can manually authenticate elevator accessories through a mobile device connected to the cloud platform server, and elevator maintenance personnel can issue authentication instructions to an elevator accessory through the mobile device, and the cloud platform server can use the mobile device to issue authentication instructions to the elevator accessories. Elevator accessories carry out identity authentication, and elevator maintenance personnel can track the authentication results through mobile devices. When elevator maintenance personnel perform manual authentication or view the authentication results, they can be anywhere near the elevator or at any remote location, and do not need to perform authentication in the machine room, car, car roof, etc.
步骤103,建立物联网终端和通过身份认证的电梯配件之间的数据通讯。Step 103: Establish data communication between the IoT terminal and the elevator accessories that have passed the identity authentication.
具体而言,云平台服务器在确定通过身份认证的电梯配件后,可以建立物联网终端和通过身份认证的电梯配件之间的数据通讯。Specifically, after determining the elevator accessories that have passed the identity authentication, the cloud platform server can establish data communication between the IoT terminal and the elevator accessories that have passed the identity authentication.
在一个例子中,物联网终端和通过身份认证的电梯配件之间建立数据通讯后,电梯配件可以将自身的运行数据实时发送给物联网终端,物联网终端还可以将电梯配件的运行数据转发给云平台服务器。In one example, after data communication is established between the IoT terminal and the elevator accessories that have passed identity authentication, the elevator accessories can send their own running data to the IoT terminal in real time, and the IoT terminal can also forward the running data of the elevator accessories to the IoT terminal. Cloud platform server.
比如:电梯配件可以为电梯温度计,电梯温度计可以获取电梯内的实时温度信息,电梯温度计获取电梯内的实时温度信息后,可以将实时温度信息发送给物联网终端,物联网终端再将实时温度信息转发给云平台服务器。For example, an elevator accessory can be an elevator thermometer, and the elevator thermometer can obtain real-time temperature information in the elevator. After the elevator thermometer obtains the real-time temperature information in the elevator, it can send the real-time temperature information to the IoT terminal, and the IoT terminal can then send the real-time temperature information. Forwarded to the cloud platform server.
本申请的第一实施方式,所述云平台服务器与电梯的物联网终端连接,所述物联网终端与所述电梯的m个电梯配件连接,所有电梯配件可以受云平台服务器的统一管理。确定所述m个电梯配件中待认证的电梯配件;其中,所述m为大于0的整数,确定需要进行认证的电梯配件,可以保证精准地对待认证的电梯配件进行身份认证。若所述物联网终端已通过所述云平台服务器的身份认证,基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,考虑到相关的电梯配件认证方法只能对电梯配件进行身份认证,不能对电梯系统的物联网终端进行身份认证,造成了很大的安全隐患,本申请的实施方式,云平台服务器可以确定物联网终端是否通过身份认证,再进行电梯配件的认证,可以保证物联网终端为合法设备,防止电梯数据泄露。建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯,考虑到相关的电梯配件认证方法需要电梯维护人员携带认证设备进入到电梯机房或轿厢中,根据认证设备和电梯配件建立局域网,才能对电梯配件进行逐一认证,而本申请的实施方式电梯配件与物联网终端连接,只要物联网终端已通过身份认证,电梯维护人员无需进入电梯就可以远程、批量、自动地对电梯配件进行身份验证,认证过程非常简单,也提高了身份认证的效率。In the first embodiment of the present application, the cloud platform server is connected to the IoT terminal of the elevator, the IoT terminal is connected to m elevator accessories of the elevator, and all elevator accessories can be managed by the cloud platform server in a unified manner. Determine the elevator accessories to be authenticated among the m elevator accessories; wherein, the m is an integer greater than 0, and determining the elevator accessories that need to be authenticated can ensure that the elevator accessories to be authenticated are accurately authenticated. If the IoT terminal has passed the identity authentication of the cloud platform server, the identity authentication of the elevator accessories to be authenticated is performed based on the IoT terminal, and the elevator accessories that have passed the identity authentication are determined, taking into account the relevant elevator accessories certification The method can only perform identity authentication on elevator accessories, but cannot perform identity authentication on the IoT terminal of the elevator system, which causes a great security risk. In the implementation of this application, the cloud platform server can determine whether the IoT terminal has passed the identity authentication, and then Certification of elevator accessories can ensure that the IoT terminal is a legal device and prevent elevator data leakage. Establish data communication between the Internet of Things terminal and the elevator accessories that have passed identity authentication, considering that the relevant elevator accessories authentication method requires elevator maintenance personnel to bring authentication equipment into the elevator machine room or car, according to the authentication equipment and elevator. Only by establishing a local area network for accessories, can the elevator accessories be authenticated one by one. In the embodiment of the present application, the elevator accessories are connected to the IoT terminal. As long as the IoT terminal has passed the identity authentication, the elevator maintenance personnel can remotely, batch, and automatically without entering the elevator. Elevator accessories carry out identity verification, the authentication process is very simple, and the efficiency of identity authentication is also improved.
本申请的第二实施方式涉及一种电梯配件认证方法,下面对本实施方式的电梯配件认证方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须。The second embodiment of the present application relates to an elevator accessory authentication method. The implementation details of the elevator accessory authentication method of this embodiment are described in detail below. The following contents are only provided for the convenience of understanding, and are not necessary to implement this solution.
本实施方式中,电梯配件包括主控板的从属配件,云平台服务器、电梯的物联网终端、n个电梯的主控板和n个电梯的主控板的从属配件的连接情况可以如图5所示,云平台服务器与电梯的物联网终端连接,物联网终端与n个电梯的主控板连接,每个主控板与若干从属配件连接。本实施方式的电梯配件认证方法的具体流程可以如图6所示,包括:5 As shown, the cloud platform server is connected to the Internet of Things terminal of the elevator, the Internet of Things terminal is connected to the main control boards of n elevators, and each main control board is connected to several subordinate accessories. The specific process of the elevator accessory authentication method of this embodiment can be shown in FIG. 6 , including:
步骤401,确定m个电梯配件中待认证的从属配件; Step 401, determining the subordinate accessories to be certified among the m elevator accessories;
具体而言,云平台服务器可以确定m个电梯配件中待认证的从属配件。Specifically, the cloud platform server can determine the subordinate accessories to be authenticated among the m elevator accessories.
在具体实现中,部分电梯配件需要连接到电梯的主控板上使用,即主控板的从属配件。云平台服务器与电梯的物联网终端之间可以通过网线连接,也可以通过无线网进行连接,物联网终端与n个电梯的主控板之间可以通过CAN总线连接,每个主控板均连接有若干从属配件,云平台服务器可以在全部从属配件中确定待认证的从属配件。In the specific implementation, some elevator accessories need to be connected to the main control board of the elevator for use, that is, the subordinate accessories of the main control board. The cloud platform server and the elevator's Internet of Things terminal can be connected through a network cable or wireless network. The Internet of Things terminal and the main control boards of n elevators can be connected through CAN bus, and each main control board is connected. There are several subordinate accessories, and the cloud platform server can determine the subordinate accessories to be certified among all the subordinate accessories.
步骤402,若物联网终端已通过云平台服务器的身份认证,在n个电梯的主控板中确定待认证的从属配件连接的目标主控板; Step 402, if the IoT terminal has passed the identity authentication of the cloud platform server, determine the target main control board connected to the subordinate accessories to be authenticated in the main control boards of the n elevators;
具体而言,若电梯的物联网终端已通过云平台服务器的身份认证,云平台服务器可以在与物联网终端连接的n个电梯主控板中,确定待认证的从属配件连接的目标主控板。其中,n为大于0的整数。可选的,n为大于1的整数,即电梯的物联网终端和多个电梯的主控板连接,从而便于完成电梯主控板的批量认证。Specifically, if the IoT terminal of the elevator has passed the identity authentication of the cloud platform server, the cloud platform server can determine the target main control board connected to the subordinate accessories to be authenticated among the n elevator main control boards connected to the IoT terminal. . where n is an integer greater than 0. Optionally, n is an integer greater than 1, that is, the IoT terminal of the elevator is connected to the main control boards of multiple elevators, so as to facilitate batch authentication of the elevator main control boards.
在一个例子中,物联网终端A与主控板1、主控板2、和主控板3连接,每个主控板均连接有若干从属配件,电梯运维人员更换了主控板2连接的电梯外呼板甲,云平台服务器确认电梯外呼板甲为待认证的从属配件,且物联网终端A已通过云平台服务器的身份认证,云平台服务器确定与电梯外呼板甲连接的主控板2为目标主控板。In one example, the IoT terminal A is connected to the main control board 1, the main control board 2, and the main control board 3, each main control board is connected with a number of subordinate accessories, and the elevator operation and maintenance personnel replaced the main control board 2 connection The elevator outbound call board A, the cloud platform server confirms that the elevator outbound call board armor is a subordinate accessory to be authenticated, and the IoT terminal A has passed the identity authentication of the cloud platform server, and the cloud platform server determines the main body connected to the elevator outbound call board armor. Control board 2 is the target main control board.
步骤403,若目标主控板已通过云平台服务器的身份认证,基于物联网终端和目标主控板之间建立的数据通讯,对待认证的从属配件进行身份认证,确定通过身份认证的从属配件; Step 403, if the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the IoT terminal and the target main control board, perform identity authentication on the subordinate accessories to be authenticated, and determine the subordinate accessories that have passed the identity authentication;
具体而言,若云平台服务器确定目标主控板已通过身份认证,可以基于物联网终端和目标主控板之间建立的数据通讯,对待认证的从属配件进行身份认证,确定通过身份认证的从属配件。本申请的实施方式可以确定主控板是否通过身份认证,即先对电梯的主控板进行身份认证,保证电梯的主控板为合法设备,从而进一步提高电梯系统的安全性能。Specifically, if the cloud platform server determines that the target main control board has passed identity authentication, it can authenticate the subordinate accessories to be authenticated based on the data communication established between the IoT terminal and the target main control board, and determine the subordinate accessories that have passed the identity authentication. Accessories. The embodiment of the present application can determine whether the main control board has passed the identity authentication, that is, firstly perform identity authentication on the main control board of the elevator to ensure that the main control board of the elevator is a legal device, thereby further improving the safety performance of the elevator system.
在具体实现中,云平台服务器在对待认证的从属配件进行身份认证之前,可以先判断目 标主控板是否已通过云平台服务器的身份认证,若目标主控板已通过云平台服务器的身份认证,云平台服务器可以继续进行对待认证的从属配件的身份认证;若目标主控板未通过云平台服务器的身份认证,该主控板为假冒伪劣产品,云平台服务器不会对与该主控板连接的从属配件进行身份认证。In the specific implementation, the cloud platform server can first determine whether the target main control board has passed the identity authentication of the cloud platform server before the identity authentication of the subordinate accessories to be authenticated. If the target main control board has passed the identity authentication of the cloud platform server, The cloud platform server can continue to authenticate the subordinate accessories to be authenticated; if the target main control board has not passed the identity authentication of the cloud platform server, the main control board is a fake and inferior product, and the cloud platform server will not connect with the main control board. The subordinate accessories are authenticated.
在一个例子中,若目标主控板未进行过云平台服务器的身份认证,云平台服务器可以通过如图7所示的各步骤,对目标主控板进行身份认证,具体包括:In one example, if the target main control board has not been authenticated by the cloud platform server, the cloud platform server can perform identity authentication on the target main control board through the steps shown in Figure 7, including:
步骤501,在确定物联网终端与目标主控板建立连接后,通过物联网终端,向目标主控板发送第二身份认证指令,以供目标主控板根据第二身份认证指令,向物联网终端发送第二加密认证数据; Step 501, after it is determined that the connection between the IoT terminal and the target main control board is established, a second identity authentication instruction is sent to the target main control board through the Internet of Things terminal, so that the target main control board can send the information to the Internet of Things according to the second identity authentication instruction. The terminal sends the second encrypted authentication data;
具体而言,云平台服务器在确定物联网终端与目标主控板建立连接后,可以通过物联网终端,向目标主控板发送第二身份认证指令,以供目标主控板根据第二身份认证指令,向物联网终端发送第二加密认证数据。Specifically, after determining that the IoT terminal is connected to the target main control board, the cloud platform server can send the second identity authentication instruction to the target main control board through the Internet of Things terminal, so that the target main control board can authenticate according to the second identity instruction to send the second encrypted authentication data to the IoT terminal.
在具体实现中,目标主控板上电并与物联网终端建立连接后,即已连入物联网,云平台服务器检测到物联网终端与目标主控板建立连接后,可以通过物联网终端向目标主控板发送第二身份认证指令。目标主控板内部配备有身份认证模块,目标主控板的身份认证模块可以根据接收到的第二身份认证指令生成第二认证数据,并对第二认证数据进行加密,向物联网终端发送第二加密认证数据。其中,第二加密认证数据的加密手段可以为哈希加密技术、对称加密技术和非对称加密技术等,本申请的实施方式对此不做具体限定。In the specific implementation, after the target main control board is powered on and establishes a connection with the IoT terminal, it is connected to the Internet of Things. The target main control board sends a second identity authentication instruction. The target main control board is equipped with an identity authentication module, and the identity authentication module of the target main control board can generate the second authentication data according to the received second identity authentication instruction, encrypt the second authentication data, and send the first authentication data to the IoT terminal. 2. Encrypt the authentication data. The encryption means for the second encrypted authentication data may be hash encryption technology, symmetric encryption technology, asymmetric encryption technology, etc., which are not specifically limited in the embodiments of the present application.
步骤502,通过物联网终端,接收目标主控板发送的第二加密认证数据; Step 502, through the Internet of Things terminal, receive the second encrypted authentication data sent by the target main control board;
具体而言,云平台服务器在通过物联网终端,向目标主控板发送第二身份认证指令后,可以实时通过物联网终端,接收目标主控板发送的第二加密认证数据。Specifically, after sending the second identity authentication instruction to the target main control board through the Internet of Things terminal, the cloud platform server can receive the second encrypted authentication data sent by the target main control board through the Internet of Things terminal in real time.
在一个例子中,云平台服务器在通过物联网终端,向目标主控板发送第二身份认证指令后,在预设时间内没有接收到目标主控板发送的第二加密认证数据,云平台服务器确定目标主控板为假冒伪劣产品,断开物联网终端与目标主控板的连接,将其剔除,以去除假冒伪劣产品,从而提高电梯运行过程中的安全性。其中,预设时间可以由本领域技术人员根据实际需要进行设定,本申请的实施方式对此不做具体限定。In one example, after the cloud platform server sends the second identity authentication instruction to the target main control board through the IoT terminal, it does not receive the second encrypted authentication data sent by the target main control board within a preset time. It is determined that the target main control board is a fake and shoddy product, disconnect the connection between the IoT terminal and the target main control board, and remove it to remove the fake and shoddy products, thereby improving the safety of the elevator during operation. The preset time may be set by those skilled in the art according to actual needs, which is not specifically limited in the embodiments of the present application.
步骤503,对第二加密认证数据进行解密,获取第二加密认证数据的解密结果; Step 503, decrypt the second encrypted authentication data, and obtain a decryption result of the second encrypted authentication data;
具体而言,云平台服务器在接收到目标主控板发送的第二加密认证数据后,可以对第二加密认证数据进行解密,获取第二加密认证数据的解密结果。在主控板的身份认证过程中,使用加密认证数据,可以提高主控板的身份认证过程的准确性和安全性。Specifically, after receiving the second encrypted authentication data sent by the target main control board, the cloud platform server can decrypt the second encrypted authentication data to obtain a decryption result of the second encrypted authentication data. During the identity authentication process of the main control board, using encrypted authentication data can improve the accuracy and security of the identity authentication process of the main control board.
在具体实现中,云平台服务器内部存储有若干种解密程序,云平台服务器在获取第二加密认证数据后,可以根据第二加密认证数据的加密方法,调用相应的解密程序,对第二加密认证数据进行解密,获取第二加密认证数据的解密结果,即第二认证数据。In a specific implementation, several decryption programs are stored inside the cloud platform server. After acquiring the second encrypted authentication data, the cloud platform server can call the corresponding decryption program according to the encryption method of the second encrypted authentication data to authenticate the second encrypted authentication data. The data is decrypted to obtain a decryption result of the second encrypted authentication data, that is, the second authentication data.
步骤504,根据第二加密认证数据的解密结果,获取对目标主控板的身份认证结果。Step 504: Obtain the identity authentication result of the target main control board according to the decryption result of the second encrypted authentication data.
具体而言,云平台服务器在获取第二加密认证数据的解密结果后,可以根据第二加密认证数据的解密结果,获取对目标主控板的身份认证结果。Specifically, after obtaining the decryption result of the second encrypted authentication data, the cloud platform server may obtain the identity authentication result of the target main control board according to the decryption result of the second encrypted authentication data.
在具体实现中,云平台服务器内部存储有用于验证目标主控板真假的第二认证标准,云平台服务器在获取第二加密认证数据的解密结果,即目标主控板的第二认证数据后,可以将目标主控板的第二认证数据与第二认证标准进行比对:若第二认证数据与第二认证标准一致,云平台服务器确定目标主控板为真,向物联网终端发送认证成功信息;若第二认证数据与第二认证标准不一致,云平台服务器确定目标主控板为假冒伪劣产品,断开与目标主控板的连接,将其剔除。In a specific implementation, the cloud platform server internally stores a second authentication standard for verifying the authenticity of the target main control board, and the cloud platform server obtains the decryption result of the second encrypted authentication data, that is, the second authentication data of the target main control board. , the second authentication data of the target main control board can be compared with the second authentication standard: if the second authentication data is consistent with the second authentication standard, the cloud platform server determines that the target main control board is true, and sends the authentication to the IoT terminal Success information; if the second authentication data is inconsistent with the second authentication standard, the cloud platform server determines that the target main control board is a counterfeit product, disconnects the connection with the target main control board, and removes it.
在一个例子中,电梯维护人员可以通过移动设备上安装的云平台服务器APP实时查看目标主控板的身份认证结果。In one example, elevator maintenance personnel can view the identity authentication result of the target main control board in real time through the cloud platform server APP installed on the mobile device.
步骤404,建立物联网终端和通过身份认证的从属配件之间的数据通讯。 Step 404 , establishing data communication between the IoT terminal and the subordinate accessories that have passed the identity authentication.
具体而言,云平台服务器在确定通过身份认证的从属配件后,可以建立物联网终端和通过身份认证的从属配件之间的数据通讯。Specifically, after determining the subordinate accessories that have passed the identity authentication, the cloud platform server can establish data communication between the IoT terminal and the subordinate accessories that have passed the identity authentication.
在一个例子中,建立物联网终端和通过身份认证的从属配件之间的数据通讯,可以通过如图8所示的各子步骤实现,具体包括:In one example, the establishment of data communication between the IoT terminal and the subordinate accessories that have passed the identity authentication can be achieved through the sub-steps shown in FIG. 8 , including:
子步骤4041,建立目标主控板和通过身份认证的从属配件之间的数据通讯;Sub-step 4041, establishing data communication between the target main control board and the subordinate accessories that have passed the identity authentication;
具体而言,云平台服务器在确定通过身份认证的从属配件后,可以建立目标主控板和通过身份认证的从属配件之间的数据通讯。Specifically, after determining the subordinate accessories that have passed the identity authentication, the cloud platform server can establish data communication between the target main control board and the subordinate accessories that have passed the identity authentication.
在具体实现中,目标主控板和通过身份认证的从属配件之间建立数据通讯后,目标主控板可以实现对从属配件的控制,从属配件也可以将自身的运行信息发送给目标主控板。In the specific implementation, after data communication is established between the target main control board and the subordinate accessories that have passed the identity authentication, the target main control board can control the subordinate accessories, and the subordinate accessories can also send their own operation information to the target main control board. .
在一个例子中,从属配件为压力传感器,压力传感器可以获取电梯内的实时载重信息,压力传感器获取电梯内的实时载重信息后,可以将实时载重信息发送给目标主控板,目标主控板判断电梯的实时载重是否超过预设的载重阈值,若电梯的实时载重超过预设的载重阈值,目标主控板控制电梯停止运行,进一步提升电梯的安全性。目标主控板还可以将实时载重信息通过物联网终端发送给云平台服务器,供电梯维护人员通过与云平台服务器连接的移动设备进行追踪查看。In one example, the subordinate accessory is a pressure sensor, and the pressure sensor can obtain the real-time load information in the elevator. After the pressure sensor obtains the real-time load information in the elevator, it can send the real-time load information to the target main control board, and the target main control board judges Whether the real-time load of the elevator exceeds the preset load threshold, if the real-time load of the elevator exceeds the preset load threshold, the target main control board controls the elevator to stop running, further improving the safety of the elevator. The target main control board can also send real-time load information to the cloud platform server through the IoT terminal, so that elevator maintenance personnel can track and view it through the mobile device connected to the cloud platform server.
子步骤4042,基于目标主控板和通过身份认证的从属配件之间建立的数据通讯,以及物联网终端和目标主控板之间建立的数据通讯,建立物联网终端和通过身份认证的从属配件之间的数据通讯。Sub-step 4042, based on the data communication established between the target main control board and the subordinate accessories that have passed the identity authentication, and the data communication established between the Internet of Things terminal and the target main control board, establish the Internet of Things terminal and the subordinate accessories that have passed the identity authentication. data communication between.
在具体实现中,目标主控板通过身份认证后,云平台服务器向物联网终端发送认证成功信息,物联网终端收到认证成功信息后,可以转发给目标主控板,物联网终端和目标主控板之间建立数据通讯,在待认证的从属配件通过身份认证后,云平台服务器可以再基于目标主控板和通过身份认证的从属配件之间建立的数据通讯,建立物联网终端和通过身份认证的从属配件之间的数据通讯。当从属配件的身份认证通过后,云平台服务器可以建立目标主控板与从属配件之间的数据通讯,以保证物联网终端可以和通过身份认证的从属配件进行数据通讯,保证合法的从属配件可以正常运行,可以进一步提升电梯系统的安全性,友好地满足用户的需求。In the specific implementation, after the target main control board passes the identity authentication, the cloud platform server sends the authentication success information to the IoT terminal. After the IoT terminal receives the authentication success information, it can forward it to the target main control board, the IoT terminal and the target main control board. Data communication is established between the control boards. After the subordinate accessories to be authenticated pass the identity authentication, the cloud platform server can then establish an IoT terminal based on the data communication established between the target main control board and the subordinate accessories that have passed the authentication. Data communication between certified slave accessories. When the identity authentication of the subordinate accessories is passed, the cloud platform server can establish data communication between the target main control board and the subordinate accessories, so as to ensure that the IoT terminal can communicate with the subordinate accessories that have passed the authentication, and ensure that the legal subordinate accessories can Normal operation can further improve the safety of the elevator system and meet the needs of users in a friendly manner.
本申请的第二实施方式,所述物联网终端与n个电梯的主控板连接,所述电梯配件包括所述主控板的从属配件,每个所述主控板均连接有若干所述从属配件,所述对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,包括:在n个电梯的主控板中确定所述待认证的从属配件连接的目标主控板;其中,所述n为大于0的整数;若所述目标主控板已通过所述云平台服务器的身份认证,基于所述物联网终端和所述目标主控板之间建立的数据通讯,对所述待认证的从属配件进行身份认证,确定通过身份认证的从属配件。考虑到现有的电梯配件是与主控板连接的从属配件,而相关技术只能对从属配件进行身份认证,不能对主控板进行身份认证,本申请的实施方式可以确定主控板是否通过身份认证,即先对电梯的主控板进行身份认证,保证电梯的主控板为合法设备,从而进一步提高电梯系统的安全性能。In the second embodiment of the present application, the IoT terminal is connected to the main control boards of n elevators, the elevator accessories include subordinate accessories of the main control boards, and each of the main control boards is connected with a number of the Subordinate accessories, performing identity authentication on the elevator accessories to be authenticated, and determining the elevator accessories that have passed the identity authentication, include: determining, among the main control boards of n elevators, a target main control board to which the subordinate accessories to be authenticated are connected ; wherein, the n is an integer greater than 0; if the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the Internet of Things terminal and the target main control board, Perform identity authentication on the subordinate accessories to be authenticated, and determine the subordinate accessories that have passed the identity authentication. Considering that the existing elevator accessories are subordinate accessories connected to the main control board, and the related technology can only authenticate the subordinate accessories and cannot authenticate the main control board, the embodiment of the present application can determine whether the main control board has passed the identity authentication. Identity authentication, that is, to authenticate the main control board of the elevator first to ensure that the main control board of the elevator is a legal device, thereby further improving the safety performance of the elevator system.
本申请的第三实施方式涉及一种电梯配件认证方法,下面对本实施方式的电梯配件认证方法的实现细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须,本实施方式的电梯配件包括音视频配件,图9是本申请第三实施方式所述的电梯配件认证方法的示意图,包括:The third embodiment of the present application relates to an elevator accessory authentication method. The implementation details of the elevator accessory authentication method of this embodiment are described in detail below. The following contents are only provided for the convenience of understanding and are not necessary to implement this solution. The elevator accessories of this embodiment include audio and video accessories, and FIG. 9 is a schematic diagram of the elevator accessories authentication method described in the third embodiment of the present application, including:
步骤601,确定m个电梯配件中待认证的音视频配件; Step 601, determining the audio and video accessories to be authenticated among the m elevator accessories;
在具体实现中,电梯配件包括音视频配件,音视频配件可以包括但不限于:摄像头、麦克风、LED显示器和广播喇叭等。云平台服务器可以确定m个电梯配件中待认证的音视频配件。In a specific implementation, the elevator accessories include audio and video accessories, and the audio and video accessories may include, but are not limited to, cameras, microphones, LED displays, and broadcast speakers. The cloud platform server can determine the audio and video accessories to be certified among the m elevator accessories.
步骤602,若物联网终端已通过云平台服务器的身份认证,基于物联网终端对待认证的 音视频配件进行身份认证,确定通过身份认证的音视频配件; Step 602, if the Internet of Things terminal has passed the identity authentication of the cloud platform server, based on the identity authentication of the audio and video accessories to be authenticated by the Internet of Things terminal, determine the audio and video accessories that have passed the identity authentication;
步骤603,建立物联网终端和通过身份认证的音视频配件之间的数据通讯; Step 603, establishing data communication between the IoT terminal and the audio and video accessories that have passed the identity authentication;
其中,步骤602至步骤603在第一实施例中已有类似说明,此处不再赘述。Wherein, steps 602 to 603 have been similarly described in the first embodiment, and will not be repeated here.
步骤604,向物联网终端发送待展示的音视频数据,并指示物联网终端向通过身份认证的音视频配件发送待展示的音视频数据;和/或,接收物联网终端发送的现场音视频数据。Step 604: Send the audio and video data to be displayed to the Internet of Things terminal, and instruct the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication; and/or, receive the live audio and video data sent by the Internet of Things terminal. .
具体而言,云平台服务器建立物联网终端和通过身份认证的音视频配件之间的数据通讯后,可以向物联网终端发送待展示的音视频数据,并指示物联网终端向通过身份认证的音视频配件发送待展示的音视频数据,还可以接收物联网终端发送的现场音视频数据。其中,现场音视频数据由通过身份认证的音视频配件采集并发送给物联网终端。Specifically, after the cloud platform server establishes data communication between the IoT terminal and the audio and video accessories that have passed the identity authentication, it can send the audio and video data to be displayed to the Internet of Things terminal, and instruct the Internet of Things terminal to send the audio and video accessories that have passed the identity authentication. Video accessories send audio and video data to be displayed, and can also receive live audio and video data sent by IoT terminals. Among them, the on-site audio and video data is collected by the audio and video accessories that have passed the identity authentication and sent to the Internet of Things terminal.
在一个例子中,音视频配件包括广播喇叭,云平台服务器可以向物联网终端发送广播音频,并指示物联网终端向广播喇叭发送广播音频,进行播放。In one example, the audio and video accessories include broadcast speakers, and the cloud platform server can send broadcast audio to the IoT terminal, and instruct the IoT terminal to send broadcast audio to the broadcast speaker for playback.
在一个例子中,音视频配件包括摄像头,摄像头可以实时录制电梯轿厢内的现场视频,并发送给物联网终端,并转发给云平台服务器,云平台服务器可以接收物联网终端发送的现场视频。In one example, the audio and video accessories include a camera. The camera can record the live video in the elevator car in real time, send it to the IoT terminal, and forward it to the cloud platform server, and the cloud platform server can receive the live video sent by the IoT terminal.
本申请的第三实施例,所述电梯配件包括音视频配件,所述在建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯之后,还包括:向所述物联网终端发送待展示的音视频数据,并指示所述物联网终端向所述通过身份认证的音视频配件发送所述待展示的音视频数据;和/或,接收所述物联网终端发送的现场音视频数据;其中,所述现场音视频数据由所述通过身份认证的音视频配件采集并发送给所述物联网终端。音视频配件可以播放电梯维护人员要播放的音视频数据,也可以采集电梯环境的音视频数据,对音视频配件进行身份认证,可以保证后续音视频数据传输的安全性,也可以保护电梯使用者的隐私。In the third embodiment of the present application, the elevator accessories include audio and video accessories, and after establishing data communication between the Internet of Things terminal and the elevator accessories that have passed the identity authentication, the method further includes: sending data to the Internet of Things The terminal sends the audio and video data to be displayed, and instructs the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication; and/or, receives the live audio and video data sent by the Internet of Things terminal Video data; wherein, the on-site audio and video data is collected by the audio and video accessories that have passed the identity authentication and sent to the Internet of Things terminal. The audio and video accessories can play the audio and video data to be played by the elevator maintenance personnel, and can also collect the audio and video data of the elevator environment, and authenticate the audio and video accessories, which can ensure the security of subsequent audio and video data transmission, and can also protect the elevator users. privacy.
上面各种方法的步骤划分,只是为了描述清楚,实现时可以合并为一个步骤或者对某些步骤进行拆分,分解为多个步骤,只要包括相同的逻辑关系,都在本专利的保护范围内;对算法中或者流程中添加无关紧要的修改或者引入无关紧要的设计,但不改变其算法和流程的核心设计都在该专利的保护范围内。The steps of the above various methods are divided only for the purpose of describing clearly. During implementation, they can be combined into one step or some steps can be split and decomposed into multiple steps. As long as the same logical relationship is included, they are all within the protection scope of this patent. ;Adding insignificant modifications to the algorithm or process or introducing insignificant designs, but not changing the core design of the algorithm and process are all within the scope of protection of this patent.
本申请的第四实施方式,涉及一种电梯配件认证系统,下面对本实施方式的电梯配件认证系统的细节进行具体的说明,以下内容仅为方便理解提供的实现细节,并非实施本方案的必须,图10是第四实施方式所述的云游戏控制系统的示意图,包括:云平台服务器601、物联网终端602和m个电梯配件603。The fourth embodiment of the present application relates to an elevator accessory authentication system. The details of the elevator accessory authentication system of this embodiment are described in detail below. The following contents are only implementation details provided for the convenience of understanding, and are not necessary to implement this solution. FIG. 10 is a schematic diagram of the cloud game control system according to the fourth embodiment, including: a cloud platform server 601 , an IoT terminal 602 and m elevator accessories 603 .
云平台服务器601与物联网终端602连接,物联网终端602与m个电梯配件603连接。The cloud platform server 601 is connected to the IoT terminal 602 , and the IoT terminal 602 is connected to m elevator accessories 603 .
云平台服务器601用于确定m个电梯配件603中待认证的电梯配件。The cloud platform server 601 is used to determine the elevator accessories to be authenticated among the m elevator accessories 603 .
云平台服务器601还用于在物联网终端602已通过云平台服务器601的身份认证的情况下,基于物联网终端602对待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件。The cloud platform server 601 is further configured to perform identity authentication on the elevator accessories to be authenticated based on the IoT terminal 602 when the IoT terminal 602 has passed the identity authentication of the cloud platform server 601, and determine the elevator accessories that have passed the identity authentication.
云平台服务器601还用于指示物联网终端602和通过身份认证的电梯配件建立数据通讯。The cloud platform server 601 is also used to instruct the IoT terminal 602 to establish data communication with the elevator accessories that have passed identity authentication.
物联网终端602用于和通过身份认证的电梯配件建立数据通讯。The IoT terminal 602 is used to establish data communication with elevator accessories that have passed identity authentication.
在一个例子中,本实施方式的电梯配件认证系统的具体应用可以如图11所示。云平台服务器与物联网终端之间通过无线网连接,物联网终端与主控板1-n通过CAN总线连接,主控板1通过CAN总线与主控板1的从属配件1-m连接,主控板2通过CAN总线与主控板2的从属配件1-m连接,主控板n通过CAN总线与主控板1的从属配件1-m连接,物联网终端还通过网线与音视频配件1-n连接。云平台服务器还通过无线网与移动设备连接。云平台服务器可以先对物联网终端进行身份认证,在物联网终端的身份认证通过后,云平台服务器可以对主控板1-n、音视频配件1-n进行身份认证,在主控板1-n通过身份认证后,云平台服务器可以对与各主控板连接的各从属配件进行身份认证。物联网终端与n台电梯的主控板连接,经由云平台服务器实现并联或群控多台电梯的批量自动认证,同时还可以实现多台电梯运行数据的采集以及音视频数据的传输等功能。In an example, the specific application of the elevator accessory authentication system of this embodiment may be as shown in FIG. 11 . The cloud platform server and the IoT terminal are connected through a wireless network, the IoT terminal and the main control board 1-n are connected through the CAN bus, and the main control board 1 is connected with the subordinate accessories 1-m of the main control board 1 through the CAN bus. The control board 2 is connected to the subordinate accessories 1-m of the main control board 2 through the CAN bus, the main control board n is connected to the subordinate accessories 1-m of the main control board 1 through the CAN bus, and the IoT terminal is also connected to the audio and video accessories 1 through the network cable. -n connect. The cloud platform server is also connected with the mobile device through a wireless network. The cloud platform server can first perform identity authentication on the IoT terminal. After the identity authentication of the IoT terminal is passed, the cloud platform server can perform identity authentication on the main control board 1-n and audio and video accessories 1-n. -n After passing the identity authentication, the cloud platform server can authenticate the subordinate accessories connected to each main control board. The IoT terminal is connected to the main control board of n elevators, and through the cloud platform server, the batch automatic authentication of multiple elevators in parallel or group control can be realized.
不难发现,本实施方式为与第一至第三实施方式相对应的系统实施例,本实施方式可与第一至第三实施方式互相配合实施。第一至第三实施方式中提到的相关技术细节和技术效果在本实施方式中依然有效,为了减少重复,这里不再赘述。相应地,本实施方式中提到的相关技术细节也可应用在第一至第三实施方式中。It is not difficult to find that this embodiment is a system example corresponding to the first to third embodiments, and this embodiment can be implemented in cooperation with the first to third embodiments. The relevant technical details and technical effects mentioned in the first to third embodiments are still valid in this embodiment, and in order to reduce repetition, they will not be repeated here. Correspondingly, the related technical details mentioned in this embodiment can also be applied to the first to third embodiments.
值得一提的是,本实施方式中所涉及到的各模块均为逻辑模块,在实际应用中,一个逻辑单元可以是一个物理单元,也可以是一个物理单元的一部分,还可以以多个物理单元的组合实现。此外,为了突出本申请的创新部分,本实施方式中并没有将与解决本申请所提出的技术问题关系不太密切的单元引入,但这并不表明本实施方式中不存在其它的单元。It is worth mentioning that each module involved in this embodiment is a logical module. In practical applications, a logical unit may be a physical unit, a part of a physical unit, or multiple physical units. A composite implementation of the unit. In addition, in order to highlight the innovative part of the present application, this embodiment does not introduce units that are not closely related to solving the technical problem raised by the present application, but this does not mean that there are no other units in this embodiment.
本申请第五实施方式涉及一种服务器,如图12所示,包括:至少一个处理器701;以及,与所述至少一个处理器701通信连接的存储器702;其中,所述存储器702存储有可被所述至少一个处理器701执行的指令,所述指令被所述至少一个处理器701执行,以使所述至少一个处理器701能够执行上述各实施方式中的电梯配件认证方法。The fifth embodiment of the present application relates to a server, as shown in FIG. 12 , comprising: at least one processor 701 ; and a memory 702 communicatively connected to the at least one processor 701 ; wherein the memory 702 stores a Instructions executed by the at least one processor 701, where the instructions are executed by the at least one processor 701, so that the at least one processor 701 can execute the elevator accessory authentication method in each of the foregoing embodiments.
其中,存储器和处理器采用总线方式连接,总线可以包括任意数量的互联的总线和桥,总线将一个或多个处理器和存储器的各种电路连接在一起。总线还可以将诸如外围设备、稳压器和功率管理电路等之类的各种其他电路连接在一起,这些都是本领域所公知的,因此, 本文不再对其进行进一步描述。总线接口在总线和收发机之间提供接口。收发机可以是一个元件,也可以是多个元件,比如多个接收器和发送器,提供用于在传输介质上与各种其他装置通信的单元。经处理器处理的数据通过天线在无线介质上进行传输,进一步,天线还接收数据并将数据传送给处理器。The memory and the processor are connected by a bus, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more processors and various circuits of the memory. The bus may also connect together various other circuits, such as peripherals, voltage regulators, and power management circuits, which are well known in the art and therefore will not be described further herein. The bus interface provides the interface between the bus and the transceiver. A transceiver may be a single element or multiple elements, such as multiple receivers and transmitters, providing a means for communicating with various other devices over a transmission medium. The data processed by the processor is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor.
处理器负责管理总线和通常的处理,还可以提供各种功能,包括定时,外围接口,电压调节、电源管理以及其他控制功能。而存储器可以被用于存储处理器在执行操作时所使用的数据。The processor manages the bus and general processing, and can also provide various functions, including timing, peripheral interface, voltage regulation, power management, and other control functions. Instead, memory may be used to store data used by the processor in performing operations.
本申请第六实施方式涉及一种计算机可读存储介质,存储有计算机程序。计算机程序被处理器执行时实现上述方法实施例。The sixth embodiment of the present application relates to a computer-readable storage medium storing a computer program. The above method embodiments are implemented when the computer program is executed by the processor.
即,本领域技术人员可以理解,实现上述实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。计算机可读存储介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。That is, those skilled in the art can understand that all or part of the steps in the method for implementing the above embodiments can be completed by instructing the relevant hardware through a program, and the program is stored in a storage medium and includes several instructions to make a device ( It may be a single chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application. Computer-readable storage media may include computer storage media (or non-transitory media) and communication media (or transitory media). As known to those of ordinary skill in the art, the term computer storage media includes both volatile and nonvolatile implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules or other data flexible, removable and non-removable media. The aforementioned storage medium includes: U disk, mobile hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes .
本领域的普通技术人员可以理解,上述各实施方式是实现本申请的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本申请的精神和范围。Those of ordinary skill in the art can understand that the above-mentioned embodiments are specific examples for realizing the present application, and in practical applications, various changes can be made in form and details without departing from the spirit and the spirit of the present application. scope.
Claims (12)
- 一种电梯配件认证方法,其中,应用于云平台服务器,所述云平台服务器与电梯的物联网终端连接,所述物联网终端与所述电梯的m个电梯配件连接,所述方法包括:An elevator accessory authentication method, wherein the method is applied to a cloud platform server, the cloud platform server is connected to an Internet of Things terminal of an elevator, and the Internet of Things terminal is connected to m elevator accessories of the elevator, and the method includes:确定所述m个电梯配件中待认证的电梯配件;其中,所述m为大于0的整数;Determine the elevator accessories to be certified among the m elevator accessories; wherein, the m is an integer greater than 0;若所述物联网终端已通过所述云平台服务器的身份认证,基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件;If the IoT terminal has passed the identity authentication of the cloud platform server, the identity authentication is performed on the elevator accessory to be authenticated based on the IoT terminal, and the elevator accessory that has passed the identity authentication is determined;建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯。Establish data communication between the Internet of Things terminal and the identity-authenticated elevator accessories.
- 根据权利要求1所述的电梯配件认证方法,其中,所述物联网终端与n个电梯的主控板连接,所述电梯配件包括所述主控板的从属配件,每个所述主控板均连接有若干所述从属配件,所述对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,包括:The elevator accessory authentication method according to claim 1, wherein the IoT terminal is connected to the main control boards of n elevators, the elevator accessories include subordinate accessories of the main control boards, and each of the main control boards A number of the subordinate accessories are connected, and the identity authentication is performed on the elevator accessories to be authenticated, and the elevator accessories that have passed the identity authentication are determined, including:在n个电梯的主控板中确定所述待认证的从属配件连接的目标主控板;其中,所述n为大于0的整数;Determine the target main control board connected to the subordinate accessory to be authenticated in the main control boards of n elevators; wherein, the n is an integer greater than 0;若所述目标主控板已通过所述云平台服务器的身份认证,基于所述物联网终端和所述目标主控板之间建立的数据通讯,对所述待认证的从属配件进行身份认证,确定通过身份认证的从属配件。If the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the IoT terminal and the target main control board, perform identity authentication on the subordinate accessories to be authenticated, Determine which accessory is authenticated.
- 根据权利要求2所述的电梯配件认证方法,其中,所述建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯,包括:The elevator accessory authentication method according to claim 2, wherein the establishing data communication between the Internet of Things terminal and the elevator accessory that has passed the identity authentication comprises:建立所述目标主控板和所述通过身份认证的从属配件之间的数据通讯;establishing data communication between the target main control board and the subordinate accessories that have passed the identity authentication;基于所述目标主控板和所述通过身份认证的从属配件之间建立的数据通讯,以及所述物联网终端和所述目标主控板之间建立的数据通讯,建立所述物联网终端和所述通过身份认证的从属配件之间的数据通讯。Based on the data communication established between the target main control board and the subordinate accessories that have passed the identity authentication, and the data communication established between the Internet of Things terminal and the target main control board, the Internet of Things terminal and the target main control board are established. The data communication between the subordinate accessories that have passed the identity authentication.
- 根据权利要求1-3任一项所述的电梯配件认证方法,其中,若所述物联网终端未进行过所述云平台服务器的身份认证,所述方法还包括:The elevator accessory authentication method according to any one of claims 1-3, wherein, if the IoT terminal has not performed identity authentication of the cloud platform server, the method further comprises:在确定与所述物联网终端建立连接后,向所述物联网终端发送第一身份认证指令,以供所述物联网终端根据所述第一身份认证指令向所述云平台服务器发送第一加密认证数据;After determining to establish a connection with the Internet of Things terminal, send a first identity authentication instruction to the Internet of Things terminal, so that the Internet of Things terminal can send the first encryption to the cloud platform server according to the first identity authentication instruction authentication data;接收所述物联网终端发送的所述第一加密认证数据;receiving the first encrypted authentication data sent by the IoT terminal;对所述第一加密认证数据进行解密,获取所述第一加密认证数据的解密结果;Decrypting the first encrypted authentication data to obtain a decryption result of the first encrypted authentication data;根据所述第一加密认证数据的解密结果,获取对所述物联网终端的身份认证结果。According to the decryption result of the first encrypted authentication data, the identity authentication result of the IoT terminal is acquired.
- 根据权利要求2或3所述的电梯配件认证方法,其中,若所述目标主控板未进行过所 述云平台服务器的身份认证,所述方法还包括:The elevator accessory authentication method according to claim 2 or 3, wherein, if the target main control board has not carried out the identity authentication of the cloud platform server, the method further comprises:在确定所述物联网终端与所述目标主控板建立连接后,通过所述物联网终端,向所述目标主控板发送第二身份认证指令,以供所述目标主控板根据所述第二身份认证指令,向所述物联网终端发送第二加密认证数据;After it is determined that the connection between the IoT terminal and the target main control board is established, a second identity authentication instruction is sent to the target main control board through the Internet of Things terminal, so that the target main control board can use the a second identity authentication instruction, sending second encrypted authentication data to the IoT terminal;通过所述物联网终端,接收所述目标主控板发送的所述第二加密认证数据;receiving, through the IoT terminal, the second encrypted authentication data sent by the target main control board;对所述第二加密认证数据进行解密,获取所述第二加密认证数据的解密结果;Decrypting the second encrypted authentication data to obtain a decryption result of the second encrypted authentication data;根据所述第二加密认证数据的解密结果,获取对所述目标主控板的身份认证结果。Obtain the identity authentication result of the target main control board according to the decryption result of the second encrypted authentication data.
- 根据权利要求1-5任一项所述的电梯配件认证方法,其中,所述基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,包括:The elevator accessory authentication method according to any one of claims 1-5, wherein the performing identity authentication on the elevator accessory to be authenticated based on the Internet of Things terminal, and determining the elevator accessory that has passed the identity authentication, comprises:在确定所述物联网终端与所述待认证的电梯配件建立连接后,通过所述物联网终端,接收所述待认证的电梯配件发送的认证请求信息;其中,所述认证请求信息包括所述待认证的电梯配件的类型信息;After it is determined that the connection between the Internet of Things terminal and the elevator accessory to be authenticated is established, the authentication request information sent by the elevator accessory to be authenticated is received through the Internet of Things terminal; wherein the authentication request information includes the Type information of elevator accessories to be certified;通过所述物联网终端,向所述待认证的电梯配件发送与所述类型信息对应的第三身份认证指令,以供所述待认证的电梯配件根据所述第三身份认证指令向所述云平台服务器发送第三加密认证数据;Through the Internet of Things terminal, a third identity authentication instruction corresponding to the type information is sent to the elevator accessory to be authenticated, so that the elevator accessory to be authenticated reports to the cloud according to the third identity authentication instruction The platform server sends the third encrypted authentication data;通过所述物联网终端,接收所述待认证的电梯配件发送的所述第三加密认证数据;receiving, through the IoT terminal, the third encrypted authentication data sent by the elevator accessory to be authenticated;对所述第三加密认证数据进行解密验证,确定通过身份认证的电梯配件。The third encrypted authentication data is decrypted and verified to determine the elevator accessories that have passed the identity authentication.
- 根据权利要求1-6任一项所述的电梯配件认证方法,其中,所述电梯配件包括音视频配件,所述在建立所述物联网终端和所述通过身份认证的电梯配件之间的数据通讯之后,还包括:The elevator accessory authentication method according to any one of claims 1-6, wherein the elevator accessory includes audio and video accessories, and the data between the Internet of Things terminal and the elevator accessory that has passed identity authentication is established. After the communication, it also includes:向所述物联网终端发送待展示的音视频数据,并指示所述物联网终端向所述通过身份认证的音视频配件发送所述待展示的音视频数据;Send the audio and video data to be displayed to the Internet of Things terminal, and instruct the Internet of Things terminal to send the audio and video data to be displayed to the audio and video accessories that have passed the identity authentication;和/或,and / or,接收所述物联网终端发送的现场音视频数据;其中,所述现场音视频数据由所述通过身份认证的音视频配件采集并发送给所述物联网终端。Receive on-site audio and video data sent by the Internet of Things terminal; wherein, the on-site audio and video data is collected by the identity-authenticated audio and video accessories and sent to the Internet of Things terminal.
- 根据权利要求7所述的电梯配件认证方法,其中,所述音视频配件包括摄像头、麦克风、LED显示器和广播喇叭中的至少一种。The elevator accessory authentication method according to claim 7, wherein the audio and video accessories include at least one of a camera, a microphone, an LED display and a broadcast speaker.
- 一种电梯配件认证系统,其中,包括云平台服务器、电梯的物联网终端和所述电梯的m个电梯配件,其中,所述m为大于0的整数;所述云平台服务器与所述物联网终端连接,所述物联网终端与所述m个电梯配件连接;An elevator accessory authentication system, including a cloud platform server, an Internet of Things terminal of the elevator, and m elevator accessories of the elevator, wherein the m is an integer greater than 0; the cloud platform server and the Internet of Things terminal connection, the IoT terminal is connected with the m elevator accessories;所述云平台服务器用于确定所述m个电梯配件中待认证的电梯配件;The cloud platform server is used to determine the elevator accessories to be certified among the m elevator accessories;所述云平台服务器还用于在所述物联网终端已通过所述云平台服务器的身份认证的情况下,基于所述物联网终端对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件;The cloud platform server is further configured to perform identity authentication on the elevator accessories to be authenticated based on the Internet of Things terminal when the Internet of Things terminal has passed the identity authentication of the cloud platform server, and determine that the identity authentication is passed. elevator accessories;所述云平台服务器还用于指示所述物联网终端和所述通过身份认证的电梯配件建立数据通讯;The cloud platform server is also used to instruct the Internet of Things terminal to establish data communication with the elevator accessory that has passed the identity authentication;所述物联网终端用于和所述通过身份认证的电梯配件建立数据通讯。The IoT terminal is used to establish data communication with the elevator accessory that has passed the identity authentication.
- 根据权利要求9所述的电梯配件认证系统,其中,所述物联网终端与n个电梯的主控板连接,所述电梯配件包括所述主控板的从属配件,每个所述主控板均连接有若干所述从属配件,所述对所述待认证的电梯配件进行身份认证,确定通过身份认证的电梯配件,包括:The elevator accessory authentication system according to claim 9, wherein the IoT terminal is connected to the main control boards of n elevators, the elevator accessories include subordinate accessories of the main control boards, and each of the main control boards A number of the subordinate accessories are connected, and the identity authentication is performed on the elevator accessories to be authenticated, and the elevator accessories that have passed the identity authentication are determined, including:在n个电梯的主控板中确定所述待认证的从属配件连接的目标主控板;其中,所述n为大于0的整数;Determine the target main control board connected to the subordinate accessory to be authenticated in the main control boards of n elevators; wherein, the n is an integer greater than 0;若所述目标主控板已通过所述云平台服务器的身份认证,基于所述物联网终端和所述目标主控板之间建立的数据通讯,对所述待认证的从属配件进行身份认证,确定通过身份认证的从属配件。If the target main control board has passed the identity authentication of the cloud platform server, based on the data communication established between the IoT terminal and the target main control board, perform identity authentication on the subordinate accessories to be authenticated, Determine which accessory is authenticated.
- 一种云平台服务器,其中,包括:A cloud platform server, including:至少一个处理器;以及,at least one processor; and,与所述至少一个处理器通信连接的存储器;其中,a memory communicatively coupled to the at least one processor; wherein,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行如权利要求1至8中任一所述的电梯配件认证方法。the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to enable the at least one processor to perform the execution of any one of claims 1 to 8 The certification method of elevator accessories.
- 一种计算机可读存储介质,存储有计算机程序,其中,所述计算机程序被处理器执行时实现权利要求1至8中任一项所述的电梯配件认证方法。A computer-readable storage medium storing a computer program, wherein when the computer program is executed by a processor, the elevator accessory authentication method according to any one of claims 1 to 8 is implemented.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE112022000137.2T DE112022000137T5 (en) | 2021-02-08 | 2022-01-27 | Elevator Accessory Authentication Method, System, Server and Storage Medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110183418.0A CN113010880B (en) | 2021-02-08 | 2021-02-08 | Elevator accessory authentication method, system, server and storage medium |
CN202110183418.0 | 2021-02-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022166775A1 true WO2022166775A1 (en) | 2022-08-11 |
Family
ID=76402213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/074440 WO2022166775A1 (en) | 2021-02-08 | 2022-01-27 | Elevator accessory authentication method and system, and server and storage medium |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN113010880B (en) |
DE (1) | DE112022000137T5 (en) |
WO (1) | WO2022166775A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113010880B (en) * | 2021-02-08 | 2022-10-14 | 上海新时达电气股份有限公司 | Elevator accessory authentication method, system, server and storage medium |
CN113651201A (en) * | 2021-08-19 | 2021-11-16 | 广州广日电梯工业有限公司 | Safety protection method and safety protection device for elevator hardware |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580233A (en) * | 2015-01-16 | 2015-04-29 | 重庆邮电大学 | Internet of Things smart home security gateway system |
CN107426722A (en) * | 2016-05-23 | 2017-12-01 | 北京京东尚科信息技术有限公司 | Cut-in method, smart machine, configuration server and certificate server |
CN107959686A (en) * | 2017-12-13 | 2018-04-24 | 恒宝股份有限公司 | A kind of Internet of Things security certification system and authentication method |
CN108616504A (en) * | 2018-03-21 | 2018-10-02 | 西安电子科技大学 | A kind of sensor node identity authorization system and method based on Internet of Things |
CN113010880A (en) * | 2021-02-08 | 2021-06-22 | 上海新时达电气股份有限公司 | Elevator accessory authentication method, system, server and storage medium |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005079912A (en) * | 2003-08-29 | 2005-03-24 | Matsushita Electric Ind Co Ltd | Secure data management device |
FR2899749B1 (en) * | 2006-04-07 | 2008-07-04 | Groupe Ecoles Telecomm | IDENTITY PROTECTION METHOD, DEVICES, AND CORRESPONDING COMPUTER PROGRAM PRODUCT |
FR2975551B1 (en) * | 2011-05-16 | 2013-09-27 | Ethertrust | METHOD FOR SECURING AN AUTHENTICATION ARCHITECTURE, MATERIAL DEVICES AND CORRESPONDING SOFTWARE |
US20140359746A1 (en) * | 2011-09-20 | 2014-12-04 | Yukiko Tezuka | Authentication system, authentication server, authentication method, and authentication program |
CN106162574B (en) * | 2015-04-02 | 2020-08-04 | 成都鼎桥通信技术有限公司 | Unified authentication method for applications in cluster system, server and terminal |
CN107572328A (en) * | 2017-08-03 | 2018-01-12 | 江苏速度信息科技股份有限公司 | The device and method of the monitoring and management of elevator |
US10761831B2 (en) * | 2018-08-17 | 2020-09-01 | Vehicle Service Group, Llc | Lift system authentication module |
CN110040596A (en) * | 2019-04-26 | 2019-07-23 | 江苏正一物联科技有限公司 | Elevator accessory remote monitoring system for status and method |
CN110113339A (en) * | 2019-05-08 | 2019-08-09 | 北京百度网讯科技有限公司 | Elevator information display terminal letter of identity acquisition methods and device |
CN112209194B (en) * | 2020-09-03 | 2022-03-08 | 日立楼宇技术(广州)有限公司 | Elevator maintenance monitoring method and device, maintenance monitoring platform and storage medium |
CN112163213B (en) * | 2020-09-28 | 2023-08-04 | 日立楼宇技术(广州)有限公司 | Authentication method and device for elevator, computer equipment and storage medium |
-
2021
- 2021-02-08 CN CN202110183418.0A patent/CN113010880B/en active Active
-
2022
- 2022-01-27 WO PCT/CN2022/074440 patent/WO2022166775A1/en active Application Filing
- 2022-01-27 DE DE112022000137.2T patent/DE112022000137T5/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580233A (en) * | 2015-01-16 | 2015-04-29 | 重庆邮电大学 | Internet of Things smart home security gateway system |
CN107426722A (en) * | 2016-05-23 | 2017-12-01 | 北京京东尚科信息技术有限公司 | Cut-in method, smart machine, configuration server and certificate server |
CN107959686A (en) * | 2017-12-13 | 2018-04-24 | 恒宝股份有限公司 | A kind of Internet of Things security certification system and authentication method |
CN108616504A (en) * | 2018-03-21 | 2018-10-02 | 西安电子科技大学 | A kind of sensor node identity authorization system and method based on Internet of Things |
CN113010880A (en) * | 2021-02-08 | 2021-06-22 | 上海新时达电气股份有限公司 | Elevator accessory authentication method, system, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
DE112022000137T5 (en) | 2023-07-13 |
CN113010880B (en) | 2022-10-14 |
CN113010880A (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101786177B1 (en) | Method and apparatus for performing secure bluetooth communication | |
US20180248694A1 (en) | Assisted device provisioning in a network | |
WO2022166775A1 (en) | Elevator accessory authentication method and system, and server and storage medium | |
CN110290525A (en) | A kind of sharing method and system, mobile terminal of vehicle number key | |
EP2939388B1 (en) | Methods for receiving a data stream during an incident | |
KR101502249B1 (en) | Device communication | |
KR101560416B1 (en) | Secure channel establishment method and apparatus in short range communication | |
WO2016080724A1 (en) | Method and apparatus for providing service on basis of identifier of user equipment | |
CN104080086B (en) | Wireless connecting establishment method and wireless connection establish device | |
CN107708099B (en) | Bluetooth device sharing request and control method and device, and readable storage medium | |
CN105471974A (en) | Intelligent equipment capable of realizing remote control, terminal equipment and method | |
CN101523801A (en) | UPnP authentication and authorization | |
CN103685323A (en) | Method for realizing intelligent home security networking based on intelligent cloud television gateway | |
WO2015180261A1 (en) | Smart home access method, control centre device and wearable terminal | |
CN107770137A (en) | A kind of information processing method and device | |
CN112202770B (en) | Device networking method and device, device and storage medium | |
KR20210128418A (en) | Resource request method, device and storage medium | |
CN110493222A (en) | A kind of power automation terminal remote management method and system | |
WO2015154555A1 (en) | Method, device and system for processing status of digital certificate | |
CN108184091B (en) | Video monitoring equipment deployment method and device | |
CN110445782A (en) | A kind of multi-media safety broadcast control system and method | |
CN112512064A (en) | Wireless network distribution method, wireless gateway and equipment to be accessed | |
CN113949848B (en) | Data transmission method, device, equipment and medium | |
CN115604862A (en) | Video streaming transmission method and system | |
CN112422479B (en) | Equipment binding method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22749054 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22749054 Country of ref document: EP Kind code of ref document: A1 |