Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing safe access of terminal of internet of thing

An IoT terminal and secure access technology, applied in the IoT field, can solve the problem of a large number of IoT terminals, achieve fast automatic access, and prevent illegal terminal access.

Active Publication Date: 2011-05-18
无锡鼎驰信息科技有限公司
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are two major difficulties in the security of the Internet of Things that plague people: first, how to prevent the access of illegal terminals because wireless transmission is used in many occasions of the Internet of Things; second, how to effectively manage a large number of terminal access enter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing safe access of terminal of internet of thing
  • Method for realizing safe access of terminal of internet of thing
  • Method for realizing safe access of terminal of internet of thing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] see figure 1 , the present invention discloses a method for realizing secure access of Internet of Things terminals, by formulating an interconnection scheme of Internet of Things nodes and cooperating with electronic keys to achieve security management of Internet of Things nodes, so as to realize secure access of Internet of Things terminals. The content of the interconnection scheme includes defining node attributes, electronic key attributes, electronic key authorization lists, terminal authorization lists, formulating authentication methods, authorization methods and access methods.

[0050] After each terminal is connected to the network, it is a node in the network. Such as figure 1 As shown, each node has a unique identifier, and the node providing network access service can be used as a management node, and the management node must be equipped with an electronic key interface. Nodes that are directly connected to the management node to access the network are ...

Embodiment 2

[0077] According to the requirements of the rules, the standard electronic key interface is specified. This example uses the USB2.0 interface, and the electronic key uses a USB dongle. The management program is installed in the management node to provide a web management interface. The management program provides authentication, authorization and maintenance authorization information. features (including figure 2 , image 3 shown). Install the USB dongle interactive program on the terminal node.

[0078] Terminal access method without USB interface:

[0079] 1. Set to allow the automatic access in the terminal permission list of the management node

[0080] 2. Manually access in the management node terminal permission list

[0081] Terminal access method with USB interface:

[0082] 1. Set to allow the automatic access in the terminal permission list of the management node

[0083] 2. Manually access in the management node terminal permission list

[0084] 3. Authorize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing safe access of a terminal of internet of thing, which comprises the steps of: storing an authorization message in an electronic key, and using the authorization message as an identity identification, wherein the authorization message is used as a private key signature by an authorized management node and stored in the authorized management node; writing the authorization message into the electronic key in an electronic key authorization list of the management node; when no terminal node connected with the electronic key applies to accessing the internet, searching a terminal authorization list by the management node to judge whether the access of the terminal node is allowed; and when the terminal node connected with the electronic key applies to accessing the internet, firstly executing the operation without the electronic key by the management node, and if the terminal is failed to access, searching the electronic key authorization listto judge whether the access of the terminal node is allowed. According to the method realizing the safe access of the terminal of the internet of thing, disclosed in the invention, the problem of safe access of the terminal can be effectively solved, a great amount of terminals of the internet of thing can be effectively managed, and the rapid automatic access of the terminals of the internet of thing can be realized.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, relates to a secure access method, in particular to a method for realizing secure access of an Internet of Things terminal. Background technique [0002] With the development of my country's Internet, the concept of Internet of Things has gradually entered people's sight. The Internet of Things is to connect all items to the Internet through radio frequency identification and other information sensing devices to realize intelligent identification and management. It is another wave of the information industry after computers, the Internet and mobile communication networks. At the same time, the security issues of the Internet of Things are also highlighted, and the security access of the Internet of Things terminals is one of them. [0003] At present, there are two major difficulties in the security of the Internet of Things that plague people: first, how to prevent the access of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W84/18H04W12/10
Inventor 耿振民刘彬
Owner 无锡鼎驰信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products