[go: up one dir, main page]

CN109495445A - Identity identifying method, device, terminal, server and medium based on Internet of Things - Google Patents

Identity identifying method, device, terminal, server and medium based on Internet of Things Download PDF

Info

Publication number
CN109495445A
CN109495445A CN201811155592.9A CN201811155592A CN109495445A CN 109495445 A CN109495445 A CN 109495445A CN 201811155592 A CN201811155592 A CN 201811155592A CN 109495445 A CN109495445 A CN 109495445A
Authority
CN
China
Prior art keywords
client
server
key
public key
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811155592.9A
Other languages
Chinese (zh)
Inventor
梁海山
赵峰
徐志方
刘超
尹德帅
王淼
王先庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN201811155592.9A priority Critical patent/CN109495445A/en
Publication of CN109495445A publication Critical patent/CN109495445A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种基于物联网的身份认证方法、装置、终端、服务器及介质。其中所述方法包括:服务端接收客户端发送的数字证书,并获取数字证书中的公钥;服务端发送验证信息给客户端,并接收客户端反馈的利用私钥对所述验证信息进行加密后的加密结果;服务端利用所述公钥对所述加密结果进行验证,并根据验证结果认证客户端的合法性。本发明通过服务端接收客户端的数字证书中以获取数字证书中的公钥,然后利用公钥对客户端中的私钥进行验证、以认证客户端的身份,防止了黑客通过截获客户端数据中的密码和用户名来冒充客户端的身份,提高了身份认证的安全性。

The invention discloses an identity authentication method, device, terminal, server and medium based on the Internet of Things. The method includes: the server receives a digital certificate sent by the client, and obtains the public key in the digital certificate; the server sends verification information to the client, and receives feedback from the client to encrypt the verification information with a private key The encrypted result after; the server verifies the encrypted result by using the public key, and verifies the legitimacy of the client according to the verification result. The invention obtains the public key in the digital certificate by receiving the digital certificate of the client through the server, and then uses the public key to verify the private key in the client to authenticate the identity of the client, thereby preventing hackers from intercepting the data in the client's data. The password and user name are used to impersonate the identity of the client, which improves the security of authentication.

Description

Identity identifying method, device, terminal, server and medium based on Internet of Things
Technical field
The present invention relates to field of communication technology more particularly to a kind of identity identifying methods based on Internet of Things, device, end End, server and medium.
Background technique
OneM2M internet of things field International Organization for standardization is found in 2011, is the Internet of Things communication protocol of current mainstream One of, it has been widely used in the vertical applications such as smart city, intelligent medical, smart home, communications and transportation.Herein will below Refer to application entity or user equipment with AE generation, refers to generic service entity with CSE generation, in oneM2M system, by application entity (AE) request issued can be received by generic service entity (CSE), and CSE can agree to asking for AE after the identity that AE is completed in certification It asks, is linked into system, and provide corresponding service for AE.Specifically, have in OneM2M system one it is simple ID authentication mechanism, cardinal principle are that each receives connection request and the CSE for providing service for terminal is owned by one solely Vertical username and password and URL, any AE for wanting to receive CSE service need to send specified lattice to the URL of target CSE The data packet of formula, and in the data packet must the username and password with target CSE in order to user name whereby and close Code completes the authentication of AE.The entitled admin password of the initial user of system is admin, and CSE can modify the user name of default And password.
Since AE has been written into username and password in data packet in the form of plaintext, hacker is easy to intercepted data Packet, then hacker is just easy to parse the user name of the inside target CSE, password and URL, subsequent hacker can disguise oneself as AE to Request is sent in target CSE, and can complete authentication using the username and password intercepted and captured, and is successfully linked to CSE In, all services in CSE are obtained, hacker's not only information all in available CSE, can also send false service at this time Request, because the service ability of CSE is limited, if the false AE of hacker is allowed to obtain the service that a large amount of services are bound to cause real AE Delay and obstruction.When hacker obtains the user name of CSE, pseudo- AE can be not only created after password and URL and occupies the public of CSE Resource can also send a large amount of normal formats but include the data packet of error message, interfere normal communication process.
Therefore, existing ID authentication mechanism is simple and with plaintext transmission information, causes more serious safety problem.
Summary of the invention
The embodiment of the present invention provides a kind of identity identifying method based on Internet of Things, device, terminal, server and medium, To solve the problems, such as in prior art authentication procedures as low with safety caused by plaintext transmission information.
In a first aspect, the embodiment of the present invention provides a kind of identity identifying method based on Internet of Things, which comprises
Server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Server-side send verification information to client, and receive client feedback using private key to the verification information into The encrypted encrypted result of row;
Server-side verifies the encrypted result using the public key, and according to the conjunction of verification result Authentication Client Method.
Optionally, after the server-side receives the digital certificate that client is sent, the method also includes: according to the number Word certification authentication client identity obtains the public key in digital certificate if client identity is verified.
Optionally, the server-side verifies the encrypted result using the public key, and is recognized according to verification result The legitimacy for demonstrate,proving client, specifically includes:
Server-side is decrypted the encrypted result using the public key, and by the verification information of decrypted result and transmission It is compared, the legitimacy according to comparison result Authentication Client.
Optionally, the server-side verifies the encrypted result using the public key, and is recognized according to verification result The legitimacy for demonstrate,proving client, specifically includes:
Server-side carries out Hash calculation to the verification information of transmission using public key and obtains cryptographic Hash, and by the cryptographic Hash of acquisition The corresponding cryptographic Hash of the encrypted encrypted result of verification information is compared using private key with client, is recognized according to comparison result Demonstrate,prove the legitimacy of client.
Optionally, after the legitimacy according to verification result Authentication Client, the method also includes: server-side generates For carrying out the Encryption Algorithm used needed for subsequent communications and key with client, and using the public key to the Encryption Algorithm It is encrypted with key, and encrypted Encryption Algorithm and key is sent to client.
Second aspect, the embodiment of the present invention provide a kind of identity identifying method based on Internet of Things, which comprises
Client sends digital certificate to server-side, carries public key in the digital certificate;
Client receives the verification information that server-side is sent, and is encrypted using private key to the verification information, and will Encrypted result feeds back to server-side, so that server-side carries out verifying to the encrypted result using the public key and is tied according to verifying The legitimacy of fruit Authentication Client.
Optionally, the encrypted result includes: the Hash for carrying out Hash calculation acquisition to the verification information using private key Value.
Optionally, after encrypted result is sent to server-side by client, the method also includes:
Client receives the Encryption Algorithm encrypted using the public key and key that server-side is sent;
Client is decrypted the Encryption Algorithm and key using the private key, to obtain Encryption Algorithm and close Key;
Client carries out subsequent communications using the Encryption Algorithm and key and the server-side.
The third aspect, the embodiment of the present invention provide a kind of identification authentication system based on Internet of Things, comprising: acquisition module, First sending module and authentication module;
The acquisition module for receiving the digital certificate of client transmission, and obtains the public key in digital certificate;
First sending module for sending verification information to client, and receives the utilization private key of client feedback Encrypted encrypted result is carried out to the verification information;
The authentication module for being verified using the public key to the encrypted result, and is recognized according to verification result Demonstrate,prove the legitimacy of client.
Optionally, the module that obtains is also used to after receiving the digital certificate that client is sent according to the number card Book verifies client identity and obtains the public key in digital certificate if client identity is verified.
Optionally, the authentication module is verifying the encrypted result using the public key, and is tied according to verifying When the legitimacy of fruit Authentication Client, it is specifically used for, the encrypted result is decrypted using the public key, and decryption is tied Fruit is compared with the verification information of transmission, the legitimacy according to comparison result Authentication Client.
Optionally, the authentication module is verifying the encrypted result using the public key, and is tied according to verifying When the legitimacy of fruit Authentication Client, it is specifically used for, server-side carries out Hash calculation using verification information of the public key to transmission and obtains Cryptographic Hash is obtained, and utilizes private key to the encrypted encrypted result of verification information corresponding Hash with client the cryptographic Hash of acquisition Value is compared, according to the legitimacy of comparison result Authentication Client.
It optionally, further include generation module and the first encrypting module;
The generation module, for after authentication module Authentication Client private key legitimacy, generation be used for and client into The Encryption Algorithm and key used needed for row subsequent communications;
First encrypting module for being encrypted using the public key to the Encryption Algorithm and key, and will add Encryption Algorithm and key after close are sent to client.
Fourth aspect, the embodiment of the present invention provide a kind of identification authentication system based on Internet of Things, including second sends mould Block, the first receiving module and the second encrypting module;
Second sending module carries public key in the digital certificate for sending digital certificate to server-side;
First receiving module, the verification information sent for receiving server-side;
Second encrypting module for being encrypted using private key to the verification information, and encrypted result is fed back To server-side, so that server-side verify and according to verification result Authentication Client to the encrypted result using the public key Legitimacy.
Optionally, second encrypting module is being used to encrypt the verification information using private key, and will encryption When being as a result sent to server-side, it is specifically used for carrying out Hash calculation to the verification information using private key, obtains cryptographic Hash, and will The cryptographic Hash is sent to server-side.
It optionally, further include the second receiving module, the first deciphering module and the second deciphering module;
Second receiving module, for receiving after encrypted result is sent to server-side by second encrypting module The Encryption Algorithm encrypted using the public key and key that server-side is sent;
First deciphering module, for the Encryption Algorithm and key to be decrypted using the private key, to be added Close algorithm and key;
Second deciphering module, for carrying out subsequent communications using the Encryption Algorithm and key and the server-side.
5th aspect, the embodiment of the present invention provide a kind of terminal, and the terminal includes: memory, processor and is stored in On the memory and the computer program that can run on the processor, the computer program are executed by the processor The step of identity identifying method described in Shi Shixian any one as described above based on Internet of Things.
6th aspect, the embodiment of the present invention provide a kind of server, and the server includes memory, processor and storage On the memory and the computer program that can run on the processor, the computer program are held by the processor The step of identity identifying method described in any one as described above based on Internet of Things is realized when row.
7th aspect, the embodiment of the present invention provides a kind of medium, computer program is stored on the storage medium, described The step of the identity identifying method described in above-mentioned any one based on Internet of Things is realized when computer program is executed by processor Suddenly.
The embodiment of the present invention is received in the digital certificate of client to obtain the public key in digital certificate, so by server-side The private key in client is verified using public key afterwards, with the identity of Authentication Client, it is therefore prevented that hacker is by intercepting and capturing client Password and user name in end data pretend to be the identity of client, improve the safety of authentication.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is identity identifying method flow chart of the one embodiment based on Internet of Things;
Fig. 2 is identity identifying method flow chart of the third embodiment based on Internet of Things;
Fig. 3 is the 4th identity identifying method flow chart of the embodiment based on Internet of Things;
Fig. 4 is the 5th identity identifying method flow chart of the embodiment based on Internet of Things;
Fig. 5 is the 6th identification authentication system structural block diagram of the embodiment based on Internet of Things;
Fig. 6 is the 7th identification authentication system structural block diagram of the embodiment based on Internet of Things;
Fig. 7 is the 8th identification authentication system structural block diagram of the embodiment based on Internet of Things;
Fig. 8 is the 9th identification authentication system structural block diagram of the embodiment based on Internet of Things;
Fig. 9 is the 14th identity authorization system block diagram of the embodiment based on Internet of Things.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
First embodiment of the invention provides a kind of identity identifying method based on Internet of Things, as shown in Figure 1, including following tool Body step:
Step S101, server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Step S102, server-side send verification information to client, and receive the utilization private key of client feedback to described Verification information carries out encrypted encrypted result;Verification information can be one group of random character string in this step.
Step S103, server-side verifies the encrypted result using the public key, and is authenticated according to verification result The legitimacy of client.
In the present embodiment, digital certificate is believing comprising public-key cryptography owner through certificate authority digital signature The file of breath and public-key cryptography is the volume of data that communication parties identity information is identified in network communication, is acted on similar Identity card in the driving license of driver or daily life, the present embodiment using server-side obtain digital certificate in public key come The private key of verifying client, the legitimacy to verify client identity.
In the present embodiment, in step s101, after server-side receives the digital certificate that client is sent, server-side is according to number Word certification authentication client identity obtains the public key in digital certificate if client identity is verified.In the present embodiment, By foundation digital certificate authentication client identity, to ensure legitimate holder of the client as digital certificate.
Second embodiment of the invention provides a kind of identity identifying method based on Internet of Things, includes the following steps:
Step S101, server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Step S102, server-side send verification information to client, and receive the utilization private key of client feedback to described Verification information carries out encrypted encrypted result;Verification information can be one group of random character string in this step;
Step S103, server-side verifies the encrypted result using the public key, and is authenticated according to verification result The legitimacy of client.
In the present embodiment, in step S103, server-side verifies the encrypted result using the public key, and according to The legitimacy of verification result Authentication Client, specifically includes, and server-side is decrypted the encrypted result using the public key, And decrypted result is compared with the character string of transmission, the legitimacy according to comparison result Authentication Client;Alternatively, server-side Hash calculation is carried out using character string of the public key to transmission and obtains cryptographic Hash, and the cryptographic Hash of acquisition and client are utilized into private key The cryptographic Hash of character string encryption is compared, according to the legitimacy of comparison result Authentication Client.By adding in the present embodiment The cryptographic Hash of close verification information reduces the probability being cracked, and ensure that the safety of communication.
Third embodiment of the invention provides a kind of identity identifying method based on Internet of Things, walks in conjunction with Fig. 2, including as follows It is rapid:
Step S201, server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Step S202, server-side send a verification information to client and receive the utilization private key of client feedback to institute It states verification information and carries out encrypted encrypted result;
Step S203, server-side verifies the encrypted result using the public key, and is authenticated according to verification result The legitimacy of client thens follow the steps S204 if being proved to be successful;
Step S204, server-side are generated for carrying out the Encryption Algorithm used needed for subsequent communications and key with client, And the Encryption Algorithm and key are encrypted using the public key, and encrypted Encryption Algorithm and key are sent to visitor Family end.
In the embodiment of the present invention, after being proved to be successful using the public key in digital certificate to client identity, server-side is raw New Encryption Algorithm and key are produced, and by being sent to client after public key encryption, client is encrypted using private key decryption Algorithm and key improve the safety of communication, simultaneously to be communicated using the Encryption Algorithm and key of acquisition with server-side Hacker is prevented to pretend to be client.
Fourth embodiment of the invention provides a kind of identity identifying method based on Internet of Things, as shown in figure 3, including following step Rapid S301- step S303: the described method includes:
Step S301, client send digital certificate to server-side, carry public key in the digital certificate;
Step S302, client receive the verification information that server-side is sent;
Step S303, client encrypts the verification information using private key, and encrypted result is fed back to service End, so that server-side verify and according to the legal of verification result Authentication Client to the encrypted result using the public key Property.
Step S303 is specifically included during realization in the present embodiment: client is using private key to the verification information Hash calculation is carried out, obtains cryptographic Hash, and the cryptographic Hash is sent to server-side.Client is held and number in the present embodiment Matched private key in certificate carries out encryption to verification information using private key and encrypted result is sent to server-side, so that service End public key decryptions, whether the identity for verifying client according to decrypted result is legal, the safety of the authentication of raising.
Fifth embodiment of the invention provides a kind of identity identifying method based on Internet of Things and includes the following steps in conjunction with Fig. 4 S401- step S406;
Step S401, client send digital certificate to server-side, carry public key in the digital certificate;
Step S402, client receive the verification information that server-side is sent;
Step S403, client encrypts the verification information using private key, and encrypted result is fed back to service End, so that server-side verify and according to the legal of verification result Authentication Client to the encrypted result using the public key Property;If client thens follow the steps S204 by verifying of the server-side to verification information;
Step S404, client receive the Encryption Algorithm encrypted using the public key and key that server-side is sent;
Step S405, client are decrypted the Encryption Algorithm and key using the private key, to be encrypted Algorithm and key;
Step S406, client carry out subsequent communications using the Encryption Algorithm and key and the server-side.
In the present embodiment, client is recycled by receiving server-side using public key encryption Encryption Algorithm and key Private key, which is decrypted, obtains Encryption Algorithm and key, is then communicated, is improved with server-side using Encryption Algorithm and key The safety of authentication prevents hacker from intercepting and capturing Content of communciation and pretends to be client, ensure that the safety of communication.
Sixth embodiment of the invention provides a kind of identification authentication system based on Internet of Things, and as shown in the figure 5, comprising: obtain Module 11, the first sending module 12 and authentication module 13;
The acquisition module 11 for receiving the digital certificate of client transmission, and obtains the public key in digital certificate;
First sending module 12, for sending verification information to client, and it is private to receive utilizing for client feedback Key carries out encrypted encrypted result to the verification information;
The authentication module 13, for being verified using the public key to the encrypted result, and according to verification result The legitimacy of Authentication Client.
Module is obtained in the present embodiment after receiving the digital certificate that client is sent, and is also used to according to the digital certificate Verify client identity.
In the present embodiment, authentication module 13 is verifying the encrypted result using the public key, and according to verifying As a result when the legitimacy of Authentication Client, it is specifically used for, the encrypted result is decrypted using the public key, and will decryption As a result it is compared with the verification information of transmission, the legitimacy according to comparison result Authentication Client;Alternatively, authentication module is in benefit The encrypted result is verified with the public key, and when according to the legitimacy of verification result Authentication Client, is specifically used for, Server-side carries out Hash calculation to the verification information of transmission using public key and obtains cryptographic Hash, and by the cryptographic Hash and client of acquisition The corresponding cryptographic Hash of the encrypted encrypted result of verification information is compared using private key, according to comparison result Authentication Client Legitimacy.
Using the public key obtained in module acquisition digital certificate in the present embodiment, so that server-side is using public key to client In private key verified, carry out Authentication Client identity.
Seventh embodiment of the invention provides a kind of identification authentication system based on Internet of Things, in conjunction with Fig. 6, including obtains module 21, the first sending module 22, authentication module 23, generation module 24 and the first encrypting module 25;
The acquisition module 21 for receiving the digital certificate of client transmission, and obtains the public key in digital certificate;
First sending module 22, for sending verification information to client, and it is private to receive utilizing for client feedback Key carries out encrypted encrypted result to the verification information;
The authentication module 23, for being verified using the public key to the encrypted result, and according to verification result The legitimacy of Authentication Client.
The generation module 24, for after authentication module Authentication Client private key legitimacy, generation is used for and client Carry out the Encryption Algorithm used needed for subsequent communications and key;
First encrypting module 25, for being encrypted using the public key to the Encryption Algorithm and key, and will Encrypted Encryption Algorithm and key are sent to client.
Generation module is utilized in the present embodiment, after Authentication Client private key legitimacy, generates Encryption Algorithm and key, Encrypted algorithm and key are sent to client using the first encrypting module, so that client utilizes Encryption Algorithm and key It is communicated with server-side, improves the safety of communication, prevent hacker from intercepting and capturing logical content.
Eighth embodiment of the invention provides a kind of identification authentication system based on Internet of Things, in conjunction with Fig. 7, including the second hair Send module 31, the first receiving module 32 and the second encrypting module 33;
Second sending module 31 carries public key in the digital certificate for sending digital certificate to server-side;
First receiving module 32, the verification information sent for receiving server-side;
Second encrypting module 33, for being encrypted using private key to the verification information, and encrypted result is anti- It feeds server-side, so that server-side carries out verifying to the encrypted result using the public key and authenticates client according to verification result The legitimacy at end.
The second encrypting module 33 is being used to encrypt the verification information using private key in the present embodiment, and will encryption When being as a result sent to server-side, it is specifically used for carrying out Hash calculation to the verification information using private key, obtains cryptographic Hash, and will The cryptographic Hash is sent to server-side.The cryptographic Hash for passing through encrypted authentication information in the present embodiment, reduces the probability being cracked, It ensure that the safety of communication.
Ninth embodiment of the invention provides a kind of identification authentication system based on Internet of Things, in conjunction with Fig. 8, including the second transmission Module 31, the first receiving module 32, the second encrypting module 33 and the second receiving module 34;
Second sending module 31 carries public key in the digital certificate for sending digital certificate to server-side;
First receiving module 32, the verification information sent for receiving server-side;
Second encrypting module 33, for being encrypted using private key to the verification information, and encrypted result is anti- It feeds server-side, so that server-side carries out verifying to the encrypted result using the public key and authenticates client according to verification result The legitimacy at end;
Second receiving module 34, for connecing after encrypted result is sent to server-side by second encrypting module Receive the Encryption Algorithm encrypted using the public key and key that server-side is sent;
First deciphering module 35, for the Encryption Algorithm and key to be decrypted using the private key, to obtain Encryption Algorithm and key;
Second deciphering module 36, for utilizing the Encryption Algorithm and key and the service end communication.
In the present embodiment, the encryption of the server-side feedback received using the second receiving module crossed using public key encryption is calculated Method and key recycle the first deciphering module to be decrypted and obtain Encryption Algorithm and key, then utilize the second deciphering module root It is decrypted, completes with the communication of server-side, identity identifying method in the present embodiment according to close algorithm and key pair Content of communciation It is highly-safe, and can prevent hacker from intercepting and capturing Content of communciation and pretend to be client, it ensure that the safety of communication.
Tenth embodiment of the invention provides a kind of server, and the server includes memory, processor and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing identity identifying method based on Internet of Things as follows:
Server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Server-side send verification information to client, and receive client feedback using private key to the verification information into The encrypted encrypted result of row;
Server-side verifies the encrypted result using the public key, and according to the conjunction of verification result Authentication Client Method.
The specific embodiment process of above method step can be found in one embodiment to third embodiment, the present embodiment It is no longer repeated herein.
Eleventh embodiment of the invention provides a kind of terminal, and the terminal includes memory, processor and is stored in described It is real when the computer program is executed by the processor on memory and the computer program that can run on the processor Now as follows identity identifying method based on Internet of Things the step of:
Client sends digital certificate to server-side, carries public key in the digital certificate;
Client receives the verification information that server-side is sent, and is encrypted using private key to the verification information, and will Encrypted result feeds back to server-side, so that server-side carries out verifying to the encrypted result using the public key and is tied according to verifying The legitimacy of fruit Authentication Client.
The specific implementation process of above method step can be found in the 4th embodiment and the 5th embodiment the present embodiment exists It is no longer repeated for this.
12 embodiments of the invention provide a kind of storage medium, and computer program is stored on the storage medium, described The step of identity identifying method based on Internet of Things as follows is realized when computer program is executed by processor:
Server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Server-side send verification information to client, and receive client feedback using private key to the verification information into The encrypted encrypted result of row;
Server-side verifies the encrypted result using the public key, and according to the conjunction of verification result Authentication Client Method.
13 embodiments of the invention provide a kind of storage medium, and computer program is stored on the storage medium, described The step of authentication based on Internet of Things as follows is realized when computer program is executed by processor:
Client sends digital certificate to server-side, carries public key in the digital certificate;
Client receives the verification information that server-side is sent, and is encrypted using private key to the verification information, and will Encrypted result feeds back to server-side, so that server-side carries out verifying to the encrypted result using the public key and is tied according to verifying The legitimacy of fruit Authentication Client.
Fourteenth embodiment of the invention provides a kind of identity authorization system based on Internet of Things, in conjunction with Fig. 9, including AE and CSE,
AE is used to send a communication request to CSE;And oneself digital certificate is sent to CSE.It include one in certificate Public key is used to encryption information, and private key is held by client;
After CSE receives the digital certificate of AE transmission, CSE verifies whether this digital certificate is AE, if digital certificate Belong to AE, CSE then sends a random character string to AE;
AE encrypts character string using private key, and the result of encryption is returned to CSE;
CSE utilize obtained from digital certificate public key decryptions AE feedback encrypted result, if decrypted result with before The random string of generation is consistent, then the identity of Authentication Client is correct;
After the identity of verifying AE is correct, CSE generates a symmetric encipherment algorithm and key, and using public key to Encryption Algorithm It is encrypted with key, and encrypted result is sent to AE;
AE is received encrypted Encryption Algorithm and key and is decrypted using private key, to obtain Encryption Algorithm and key, And it is communicated using Encryption Algorithm and key is obtained with CSE.
In the present embodiment CSE using public key it is close to Encryption Algorithm and key after be sent to AE, intercepted and captured even if by hacker It not will cause safety problem, because only that holding the private key that can be decrypted in AE, the safety of authentication improved, finally, CSE It can use symmetric encipherment algorithm with AE to encrypt and decrypt Content of Communication.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (19)

1. a kind of identity identifying method based on Internet of Things, which is characterized in that the described method includes:
Server-side receives the digital certificate that client is sent, and obtains the public key in digital certificate;
Server-side sends verification information to client, and receives adding using private key to the verification information for client feedback Encrypted result after close;
Server-side verifies the encrypted result using the public key, and according to the legal of verification result Authentication Client Property.
2. as described in claim 1 based on the identity identifying method of Internet of Things, which is characterized in that the server-side receives client After holding the digital certificate sent, the method also includes: according to the digital certificate authentication client identity, if client identity It is verified, then obtains the public key in digital certificate.
3. as described in claim 1 based on the identity identifying method of Internet of Things, which is characterized in that described in the server-side utilizes Public key verifies the encrypted result, and according to the legitimacy of verification result Authentication Client, specifically includes:
Server-side is decrypted the encrypted result using the public key, and decrypted result and the verification information of transmission are carried out Compare, the legitimacy according to comparison result Authentication Client.
4. as described in claim 1 based on the identity identifying method of Internet of Things, which is characterized in that described in the server-side utilizes Public key verifies the encrypted result, and according to the legitimacy of verification result Authentication Client, specifically includes:
Server-side carries out Hash calculation to the verification information of transmission using public key and obtains cryptographic Hash, and by the cryptographic Hash of acquisition and visitor Family end is compared the corresponding cryptographic Hash of the encrypted encrypted result of verification information using private key, authenticates visitor according to comparison result The legitimacy at family end.
5. as described in claim 1 based on the identity identifying method of Internet of Things, which is characterized in that described to be recognized according to verification result After the legitimacy for demonstrate,proving client, the method also includes: server-side is generated for use needed for subsequent communications with client Encryption Algorithm and key, and the Encryption Algorithm and key are encrypted using the public key, and by encrypted encryption Algorithm and key are sent to client.
6. a kind of identity identifying method based on Internet of Things, which is characterized in that the described method includes:
Client sends digital certificate to server-side, carries public key in the digital certificate;
Client receives the verification information that server-side is sent, and is encrypted using private key to the verification information, and will encryption As a result server-side is fed back to, so that server-side verify and recognize according to verification result to the encrypted result using the public key Demonstrate,prove the legitimacy of client.
7. as claimed in claim 6 based on the identity identifying method of Internet of Things, which is characterized in that
The encrypted result includes: to carry out the cryptographic Hash of Hash calculation acquisition to the verification information using private key.
8. as claimed in claim 6 based on the identity identifying method of Internet of Things, which is characterized in that client sends out encrypted result After giving server-side, the method also includes:
Client receives the Encryption Algorithm encrypted using the public key and key that server-side is sent;
Client is decrypted the Encryption Algorithm and key using the private key, to obtain Encryption Algorithm and key;
Client carries out subsequent communications using the Encryption Algorithm and key and the server-side.
9. a kind of identification authentication system based on Internet of Things characterized by comprising obtain module, the first sending module and recognize Demonstrate,prove module;
The acquisition module for receiving the digital certificate of client transmission, and obtains the public key in digital certificate;
First sending module for sending verification information to client, and receives the utilization private key of client feedback to institute It states verification information and carries out encrypted encrypted result;
The authentication module authenticates visitor for verifying using the public key to the encrypted result, and according to verification result The legitimacy at family end.
10. as claimed in claim 9 based on the identification authentication system of Internet of Things, which is characterized in that the acquisition module is connecing After receiving the digital certificate that client is sent, it is also used to according to the digital certificate authentication client identity, if client identity is tested Card passes through, then obtains the public key in digital certificate.
11. as claimed in claim 9 based on the identification authentication system of Internet of Things, which is characterized in that the authentication module is in benefit The encrypted result is verified with the public key, and when according to the legitimacy of verification result Authentication Client, is specifically used for, The encrypted result is decrypted using the public key, and decrypted result is compared with the verification information of transmission, foundation The legitimacy of comparison result Authentication Client.
12. as claimed in claim 9 based on the identification authentication system of Internet of Things, which is characterized in that the authentication module is in benefit The encrypted result is verified with the public key, and when according to the legitimacy of verification result Authentication Client, is specifically used for, Server-side carries out Hash calculation to the verification information of transmission using public key and obtains cryptographic Hash, and by the cryptographic Hash and client of acquisition The corresponding cryptographic Hash of the encrypted encrypted result of verification information is compared using private key, according to comparison result Authentication Client Legitimacy.
13. as claimed in claim 9 based on the identification authentication system of Internet of Things, which is characterized in that further include generation module and First encrypting module;
The generation module is used for after authentication module Authentication Client private key legitimacy, after generating for carrying out with client The Encryption Algorithm and key used needed for continuous communication;
First encrypting module, for being encrypted using the public key to the Encryption Algorithm and key, and will be after encryption Encryption Algorithm and key be sent to client.
14. a kind of identification authentication system based on Internet of Things, which is characterized in that including the second sending module, the first receiving module With the second encrypting module;
Second sending module carries public key in the digital certificate for sending digital certificate to server-side;
First receiving module, the verification information sent for receiving server-side;
Encrypted result for encrypting using private key to the verification information, and is fed back to clothes by second encrypting module Business end, so that server-side verify and according to the conjunction of verification result Authentication Client to the encrypted result using the public key Method.
15. as claimed in claim 14 based on the identification authentication system of Internet of Things, which is characterized in that second encrypting module When being used to encrypt the verification information using private key, and encrypted result being sent to server-side, it is specifically used for utilizing Private key carries out Hash calculation to the verification information, obtains cryptographic Hash, and the cryptographic Hash is sent to server-side.
16. as claimed in claim 14 based on the identification authentication system of Internet of Things, which is characterized in that further include the second reception mould Block, the first deciphering module and the second deciphering module;
Second receiving module, for receiving service after encrypted result is sent to server-side by second encrypting module Hold the Encryption Algorithm encrypted using the public key sent and key;
First deciphering module is calculated for the Encryption Algorithm and key to be decrypted using the private key, to obtain encryption Method and key;
Second deciphering module, for carrying out subsequent communications using the Encryption Algorithm and key and the server-side.
17. a kind of server, which is characterized in that the server includes: memory, processor and is stored on the memory And the computer program that can be run on the processor, such as right is realized when the computer program is executed by the processor It is required that the step of means of communication described in any one of 1-5.
18. a kind of terminal, which is characterized in that the terminal includes memory, processor and is stored on the memory and can The computer program run on the processor realizes such as claim when the computer program is executed by the processor The step of means of communication described in any one of 6-8.
19. a kind of medium, which is characterized in that be stored with computer program on the storage medium, the computer program is located It manages the step of realizing the means of communication as described in any one of claims 1 to 5 when device executes, and/or, realize such as claim The step of means of communication described in any one of 6 to 8.
CN201811155592.9A 2018-09-30 2018-09-30 Identity identifying method, device, terminal, server and medium based on Internet of Things Pending CN109495445A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811155592.9A CN109495445A (en) 2018-09-30 2018-09-30 Identity identifying method, device, terminal, server and medium based on Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811155592.9A CN109495445A (en) 2018-09-30 2018-09-30 Identity identifying method, device, terminal, server and medium based on Internet of Things

Publications (1)

Publication Number Publication Date
CN109495445A true CN109495445A (en) 2019-03-19

Family

ID=65689341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811155592.9A Pending CN109495445A (en) 2018-09-30 2018-09-30 Identity identifying method, device, terminal, server and medium based on Internet of Things

Country Status (1)

Country Link
CN (1) CN109495445A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110099065A (en) * 2019-05-10 2019-08-06 北京百度网讯科技有限公司 Internet of things equipment and authentication method, Cloud Server, processing equipment, readable medium
CN110113364A (en) * 2019-05-29 2019-08-09 深圳市网心科技有限公司 Domain Hijacking defence method and device, computer installation and storage medium
CN110930147A (en) * 2019-11-01 2020-03-27 北京三快在线科技有限公司 Offline payment method and device, electronic equipment and computer-readable storage medium
CN111130769A (en) * 2019-12-14 2020-05-08 武汉玖保慧信息科技有限公司 Internet of things terminal encryption method and device
CN111901117A (en) * 2019-05-06 2020-11-06 深圳大普微电子科技有限公司 Safety authentication method and system based on JTAG interface
CN112383912A (en) * 2020-11-02 2021-02-19 中国联合网络通信集团有限公司 Account opening method, server, system and storage medium
CN113098833A (en) * 2020-01-08 2021-07-09 北京新能源汽车股份有限公司 Information safety control method of vehicle, client device and server device
CN113221136A (en) * 2021-04-25 2021-08-06 亿海蓝(北京)数据技术股份公司 AIS data transmission method, device, electronic equipment and storage medium
CN113886793A (en) * 2021-02-10 2022-01-04 京东科技控股股份有限公司 Device registration method, device, electronic device, system and storage medium
CN113886781A (en) * 2021-10-15 2022-01-04 中国联合网络通信集团有限公司 Multi-authentication encryption method, system, electronic device and medium based on block chain
CN114079666A (en) * 2020-08-06 2022-02-22 阿里巴巴集团控股有限公司 Equipment control system, method and device
CN114978783A (en) * 2022-08-02 2022-08-30 暗链科技(深圳)有限公司 Zero-knowledge identity authentication method, authentication client, user client and system
CN117040825A (en) * 2023-08-03 2023-11-10 广东润联信息技术有限公司 Authentication method of Internet of things equipment and storage medium
CN117319067A (en) * 2023-10-24 2023-12-29 上海宁盾信息科技有限公司 Identity authentication method and system based on digital certificate and readable storage medium
WO2024001323A1 (en) * 2022-06-28 2024-01-04 中兴通讯股份有限公司 Device authentication method, and authentication apparatus, authentication device, storage medium and product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020019932A1 (en) * 1999-06-10 2002-02-14 Eng-Whatt Toh Cryptographically secure network
CN101192926A (en) * 2006-11-28 2008-06-04 北京握奇数据系统有限公司 Account protection method and system
CN103685272A (en) * 2011-03-03 2014-03-26 上海华为技术有限公司 Authentication method and system
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
CN105160242A (en) * 2015-08-07 2015-12-16 北京亿速码数据处理有限责任公司 Certificate loading method and certificate updating method of card reader and card reader
CN105337977A (en) * 2015-11-16 2016-02-17 苏州通付盾信息技术有限公司 Secure mobile communication architecture with dynamic two-way authentication and implementation method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020019932A1 (en) * 1999-06-10 2002-02-14 Eng-Whatt Toh Cryptographically secure network
CN101192926A (en) * 2006-11-28 2008-06-04 北京握奇数据系统有限公司 Account protection method and system
CN103685272A (en) * 2011-03-03 2014-03-26 上海华为技术有限公司 Authentication method and system
CN104394123A (en) * 2014-11-06 2015-03-04 成都卫士通信息产业股份有限公司 A data encryption transmission system and method based on an HTTP
CN105160242A (en) * 2015-08-07 2015-12-16 北京亿速码数据处理有限责任公司 Certificate loading method and certificate updating method of card reader and card reader
CN105337977A (en) * 2015-11-16 2016-02-17 苏州通付盾信息技术有限公司 Secure mobile communication architecture with dynamic two-way authentication and implementation method thereof

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111901117A (en) * 2019-05-06 2020-11-06 深圳大普微电子科技有限公司 Safety authentication method and system based on JTAG interface
US11522854B2 (en) 2019-05-10 2022-12-06 Beijing Baidu Netcom Science And Technology Co., Ltd. IoT device and authentication method thereof, cloud server, processing device and readable medium
CN110099065A (en) * 2019-05-10 2019-08-06 北京百度网讯科技有限公司 Internet of things equipment and authentication method, Cloud Server, processing equipment, readable medium
CN110113364B (en) * 2019-05-29 2022-02-25 深圳市网心科技有限公司 Domain name hijacking defense method and device, computer device and storage medium
CN110113364A (en) * 2019-05-29 2019-08-09 深圳市网心科技有限公司 Domain Hijacking defence method and device, computer installation and storage medium
CN110930147B (en) * 2019-11-01 2021-12-03 北京三快在线科技有限公司 Offline payment method and device, electronic equipment and computer-readable storage medium
CN110930147A (en) * 2019-11-01 2020-03-27 北京三快在线科技有限公司 Offline payment method and device, electronic equipment and computer-readable storage medium
CN111130769A (en) * 2019-12-14 2020-05-08 武汉玖保慧信息科技有限公司 Internet of things terminal encryption method and device
CN113098833A (en) * 2020-01-08 2021-07-09 北京新能源汽车股份有限公司 Information safety control method of vehicle, client device and server device
CN113098833B (en) * 2020-01-08 2022-04-15 北京新能源汽车股份有限公司 Information safety control method of vehicle, client device and server device
CN114079666A (en) * 2020-08-06 2022-02-22 阿里巴巴集团控股有限公司 Equipment control system, method and device
CN112383912A (en) * 2020-11-02 2021-02-19 中国联合网络通信集团有限公司 Account opening method, server, system and storage medium
CN112383912B (en) * 2020-11-02 2022-08-02 中国联合网络通信集团有限公司 Account opening method, server, system and storage medium
CN113886793A (en) * 2021-02-10 2022-01-04 京东科技控股股份有限公司 Device registration method, device, electronic device, system and storage medium
CN113221136A (en) * 2021-04-25 2021-08-06 亿海蓝(北京)数据技术股份公司 AIS data transmission method, device, electronic equipment and storage medium
CN113221136B (en) * 2021-04-25 2024-04-12 亿海蓝(北京)数据技术股份公司 AIS data transmission method, AIS data transmission device, electronic equipment and storage medium
CN113886781A (en) * 2021-10-15 2022-01-04 中国联合网络通信集团有限公司 Multi-authentication encryption method, system, electronic device and medium based on block chain
CN113886781B (en) * 2021-10-15 2023-01-24 中国联合网络通信集团有限公司 Multi-authentication encryption method, system, electronic equipment and medium based on block chain
WO2024001323A1 (en) * 2022-06-28 2024-01-04 中兴通讯股份有限公司 Device authentication method, and authentication apparatus, authentication device, storage medium and product
CN114978783B (en) * 2022-08-02 2022-11-11 暗链科技(深圳)有限公司 Zero-knowledge identity authentication method, authentication client, user client and system
CN114978783A (en) * 2022-08-02 2022-08-30 暗链科技(深圳)有限公司 Zero-knowledge identity authentication method, authentication client, user client and system
CN117040825A (en) * 2023-08-03 2023-11-10 广东润联信息技术有限公司 Authentication method of Internet of things equipment and storage medium
CN117319067A (en) * 2023-10-24 2023-12-29 上海宁盾信息科技有限公司 Identity authentication method and system based on digital certificate and readable storage medium

Similar Documents

Publication Publication Date Title
CN109495445A (en) Identity identifying method, device, terminal, server and medium based on Internet of Things
EP2304636B1 (en) Mobile device assisted secure computer network communications
US8724819B2 (en) Credential provisioning
US8868909B2 (en) Method for authenticating a communication channel between a client and a server
CN109728909A (en) Identity identifying method and system based on USBKey
CN110868291B (en) Data encryption transmission method, device, system and storage medium
JP6471112B2 (en) COMMUNICATION SYSTEM, TERMINAL DEVICE, COMMUNICATION METHOD, AND PROGRAM
CN110958209B (en) Bidirectional authentication method, system and terminal based on shared secret key
CN104618120A (en) Digital signature method for escrowing private key of mobile terminal
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN111030814A (en) Key negotiation method and device
JP2010522488A (en) Secure electronic messaging system requiring key retrieval to distribute decryption key
EP2414983B1 (en) Secure Data System
CN108809633B (en) Identity authentication method, device and system
JP2012530311A5 (en)
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN107483429B (en) A kind of data ciphering method and device
CN101296083A (en) An encrypted data transmission method and system
CN102404337A (en) Data encryption method and device
CN111327591A (en) Data transmission method, system and storage medium based on block chain
WO2024139603A1 (en) Bidirectional authentication method and system based on internet of things
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
CN110572257B (en) Identity-based data source identification method and system
CN117240486A (en) Authentication method and communication device
CN103107881A (en) Access method, device and system of smart card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319

RJ01 Rejection of invention patent application after publication