Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Security Approach for the Wireless Internet of Things

A wireless object and security technology, applied in wireless communication, safety devices, electrical components, etc., can solve the problem of a large number of wireless terminals

Inactive Publication Date: 2017-08-29
CHENGDU YINGLITUO INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the security problems faced by the wireless Internet of Things include: first, how to prevent illegal user wireless terminals from accessing the wireless transmission in many occasions of the Internet of Things; second, how to effectively manage a large number of user wireless terminals in the Internet of Things user wireless terminal access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Security Approach for the Wireless Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Various other advantages and benefits will become apparent to those of ordinary skill in the art from the following detailed description of the preferred embodiment. The description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and easy Understand.

[0068] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety method applicable to wireless internet of things. According to the method, user identity verification with a plurality of safety grades is carried out on a lot of user wireless terminals through a plurality of wireless management nodes in the internet of things so that the safe management of the user wireless terminals is realized. Meanwhile, when the user wireless terminals are required to be accessed into a wireless network, the safety accessing of the user wireless terminals also can be realized and illegal wireless terminals can be effectively prevented from accessing.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a security method suitable for wireless Internet of Things. Background technique [0002] The Internet of Things is to connect any item with the Internet through radio frequency identification (RFID), infrared sensors, global positioning systems, laser scanners and other information sensing devices according to the agreed agreement, for information exchange and communication, so as to realize intelligentization. A network that identifies, locates, tracks, monitors, and manages. [0003] In the application environment of the wireless Internet of Things, several wireless management nodes can be configured in the wireless network monitoring area, and each wireless management node is used to manage multiple user wireless terminals to realize the monitoring and management of a large number of user wireless terminals. User wireless terminals have perception, comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04W12/06H04W12/08
Inventor 田野夏梅宸刘志才祝昌宇卢力君
Owner CHENGDU YINGLITUO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products