Secure and reliable network access method for hardware device

An access method and a technology of hardware equipment, which are applied in the direction of secure communication devices, electrical components, encryption devices with shift registers/memory, etc., can solve problems such as occupying a lot of resources, consuming resources, and complex protocols

Active Publication Date: 2018-12-04
北京君泊网络科技有限责任公司
View PDF8 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the complexity of the protocol, TLS takes up a lot of resources, and the amount of calculation is relatively large. It consumes more resources to run on embedded devices, so it cannot meet the demanding requirements of many emb

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure and reliable network access method for hardware device
  • Secure and reliable network access method for hardware device
  • Secure and reliable network access method for hardware device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Example 1, such as figure 2 As shown, the safe and reliable network access method for hardware devices described in the first embodiment of the present invention includes the following steps:

[0096] Step 1, the device accesses the network: the networking module 201 of the device 2 and the load balancing server 101 of the cloud 1 perform the first handshake two-way authentication. Assign the gateway server 102 as the access gateway server, and send the address and port of the access gateway server to the networking module 201, the networking module 201 connects to the access gateway server 102, and the device terminal 2 accesses the network to complete.

[0097] Such as Figure 4 As shown, step 1 specifically includes:

[0098] Step 101, the networking module 201 obtains the address and port of the access gateway server from the storage module 202 of the device terminal 2, and if the acquisition is successful, then turn to step 110, and if the acquisition fails, tur...

Embodiment 2

[0128] Example 2, such as figure 1 As shown, the safe and reliable network access method for hardware devices described in the second embodiment of the present invention differs from Embodiment 1 in that in steps 1 and 2, AES encryption authentication is used instead of RSA encryption authentication. The specific steps as follows:

[0129] Such as Figure 6 As shown, step 1 specifically includes:

[0130] Step 101, the networking module 201 obtains the address and port of the access gateway server from the storage module 202 of the device terminal 2, and if the acquisition is successful, then turn to step 110, and if the acquisition fails, turn to step 102;

[0131] Step 102, the MCU 203 sends the networking authentication information of the device terminal 2 and the AES key for device authentication to the networking module 201, wherein the networking authentication information includes a device product type unique identifier, a device unique identifier, and a random value;...

Embodiment 3

[0152] Embodiment 3, the safe and reliable network access method of the hardware device described in the third embodiment of the present invention, such as image 3 As shown, the difference from embodiment 1 and embodiment 2 is that step 4 is also included:

[0153] Step 4, device communication: including cloud communication and local area network communication, wherein, the cloud communication is encrypted communication between the device end 2 and the cloud 1, and the local area network communication is the encrypted communication between the device end 2 and the terminal 3 in the local area network.

[0154] Cloud communication, specifically including:

[0155] Step 411, such as Figure 9 As shown, the OTA upgrade of the networking module and MCU includes:

[0156] Step A1, after the device terminal 2 is connected to the cloud 1, the cloud 1 obtains the version number of the OTA file uploaded in the background, and compares it with the device version number and the firmwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure and reliable network access method for a hardware device. The method includes the following steps: a device end networking module and a cloud end are connected to a network after being subjected to encryption two-way authentication; a dynamic encryption secret key is obtained for data communication security device binding, and uplink and downlink communication canbe realized. The method disclosed in the invention helps solve a problem of security risks such as device camouflage, cloud end DNS hijacking and the like in network accessing processes, security of an Internet of Things communication protocol and validity authentication of the device and the cloud end can be ensured, and reliable data transmission capacity can be provided for cloud end communication and local area network communication. The method is suitable for a WIFI module, a wired module, a GPRS module, a Linux system-based device, an Android system-based device, networking devices basedon Windows systems, and the like.

Description

technical field [0001] The invention relates to the technical field of network access security, in particular to a safe and reliable network access method for hardware equipment. Background technique [0002] With the rapid development of communication technology, the TCP / IP protocol has dominated the world, and the current communication architecture of the Internet of Things is also built on the traditional Internet infrastructure. Among the current Internet communication protocols, the HTTP protocol occupies almost half of the country due to its low development cost and high degree of openness. Therefore, many manufacturers also develop based on the HTTP protocol when building IoT systems. [0003] The HTTP protocol is a typical CS communication mode. The client initiates a connection and requests XML or JSON data from the server. This protocol was originally designed and designed for the Internet browsing scene of web browsers. It is currently widely used on PCs, mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L29/08
CPCH04L9/0631H04L63/0435H04L63/0869H04L63/0876H04L63/1466H04L67/10
Inventor 张文孙志东陈鹏
Owner 北京君泊网络科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products