Supercharge Your Innovation With Domain-Expert AI Agents!

An authentication method and terminal for an Internet of Things device

A technology of IoT devices and authentication methods, applied in the authentication methods and terminal fields of IoT devices, can solve the problems of insufficient address space, large storage and synchronization costs, and growth, so as to reduce storage and synchronization costs and solve identification problems Insufficient effect

Active Publication Date: 2019-06-11
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to identify the identity of the MTC device and prevent illegal devices from accessing the mobile communication network, the background home subscriber server (Home Subscriber Server, HSS) / home location register (Home Location Register, HLR) needs to store the user information of each MTC device And contract data, with the development and maturity of IoT technology and the diversification of application fields, the number of MTC devices will explode to the order of tens of billions, even several orders of magnitude more than the current number of smart terminals, hundreds of The number of billions of devices is a huge cost for background storage and synchronization
In addition, the user identification of MTC equipment, that is, Mobile Subscriber International ISDN number (MSISDN), has a 16-bit length limit in international standards, so the address space of MSISDN may not be enough to support a large number of MTC equipment in the future.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and terminal for an Internet of Things device
  • An authentication method and terminal for an Internet of Things device
  • An authentication method and terminal for an Internet of Things device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0025] The present invention is applicable to the authentication scenario when the Internet of Things device is connected to the mobile network. By binding the Internet of Things device to the smart terminal for network access authentication, the present invention can reduce the storage and synchronization costs of the network side background, and also solve the problem of The problem of insufficient identification of networked devices can realize the lightweight se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication method and terminal for an Internet of Things device. The method includes: when the terminal receives the authentication request of the IoT device, the terminal checks whether the binding relationship between the terminal and the IoT device is stored, and confirms whether the first secure channel between the IoT device and the terminal has been established; Once a secure channel has been established, the terminal sends a request for establishing a second secure channel between the IoT device and the network device to the network device; if it is confirmed that the second secure channel has been established, the terminal receives the second secure channel establishment request sent by the network device. Response; the terminal sends an authentication response to the IoT device. A corresponding terminal is also disclosed. The present invention binds the Internet of Things device to the smart terminal for network access authentication, which can reduce the storage and synchronization costs of the background on the network side, and also solves the problem of insufficient identification of the Internet of Things device, so that the access of the Internet of Things device can be realized Lightweight security authentication process for mobile networks.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an authentication method and a terminal of an Internet of Things device. Background technique [0002] With the rapid development of the Internet of Things, Internet of Things devices, namely Machine Type Communication (MTC) devices, have become a new type of network security threat. Attack techniques that have appeared on the Internet, such as Distributed Denial of Service , DDoS), certificate theft, etc., may appear on the Internet of Things. For example, thousands of ovens launched a large-scale DDoS attack on the InfoWord website, causing the background service of the website to be paralyzed. An effective solution is universal authentication of IoT devices. [0003] In the 3rd Generation Partnership Project (3GPP) MTC network architecture, IoT devices authenticate devices through the SMS registration process, and the security architecture of MTC devices based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/06
Inventor 张云飞郑倩雷艺学张晨璐
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More