Internet of things node access authentication method, internet of things node access authentication system and internet of things master node

An access authentication and Internet of Things technology, applied in the field of Internet of Things, can solve problems such as authentication storms, achieve the effect of alleviating performance pressure, avoiding the risk of network authentication storms, and ensuring security

Inactive Publication Date: 2015-07-29
CHINA TELECOM CORP LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a large number of nodes use the traditional Internet authenticati...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things node access authentication method, internet of things node access authentication system and internet of things master node
  • Internet of things node access authentication method, internet of things node access authentication system and internet of things master node
  • Internet of things node access authentication method, internet of things node access authentication system and internet of things master node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0031] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an internet of things node access authentication method, an internet of things node access authentication system and an internet of things master node, and relates to the field of internet of things. According to the invention, an authentication domain is divided, a mode of domain division authentication is adopted, authentication information at a network side is synchronized to a domain master node, the domain master node carries out access authentication on other nodes in the authentication domain, the nodes are allowed to join to the network if passing the authentication, and the nodes in the domain are enabled to complete authentication in the authentication domain. On the one hand, a network authentication storm risk possibly caused by a large number of nodes can be avoided, and on the other hand, performance pressure of an access authentication system at the network side in processing authentication of the large number of nodes can be relieved.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to an authentication domain-based access authentication method and system for an Internet of Things node and an Internet of Things master node. Background technique [0002] The Internet of Things technology is an important technology based on perceptual network interconnection that has emerged in recent years. The Internet of Things technology connects a large number of sensor nodes and control nodes in various forms to the traditional Internet to form a network of connected objects to realize the perception and control of the environment. [0003] The access of the Internet of Things is different from the access of the traditional Internet. It has a large number of nodes. If these nodes do not perform authentication when they access the network, there will be risks such as node counterfeiting. If a large number of nodes use the traditional Internet authentication method, it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L67/10
Inventor 陈仲华李一明沈成彬
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products