Unlock instant, AI-driven research and patent intelligence for your innovation.

IoT module authentication method and system

An Internet of Things and module technology, applied in the field of communications, can solve problems such as hidden security risks and waste of user traffic fees, and achieve the effect of avoiding waste of tariffs, eliminating security risks, and avoiding theft or theft.

Active Publication Date: 2021-11-16
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the most important part of the Internet of Things terminal, the IoT communication module has the risk of being stolen. When it is stolen and installed on other terminal applications, especially the eSIM (Embedded-SIM, which is an important part of the module) If the embedded SIM card is stolen, it will cause security risks and lead to a waste of user traffic charges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT module authentication method and system
  • IoT module authentication method and system
  • IoT module authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order for those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions in the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present disclosure, and Not all examples. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0048] Those skilled in the art know that the embodiments of the present disclosure may be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0049] The principle and s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a method for authenticating an IoT module, including: obtaining the physical address and eSIM card number of the IoT module to be authenticated through an acquisition module; sending the object to be authenticated in the form of a cipher text message The physical address and eSIM card number of the networking module are sent to the SMS center; and, through the calculation module, the hash values ​​corresponding to the physical address and eSIM card number of the IoT module to be authenticated are respectively calculated, and the original data combination is generated; through the transmission module Transmit the original data combination to the data center in the form of encrypted transmission; judge whether the physical address and eSIM card number of the IoT module to be authenticated included in the cipher text message and the original data combination are the same through the SMS center and the data center , if yes, the IoT module has passed the authentication. Correspondingly, the present disclosure also provides an IoT module authentication system.

Description

technical field [0001] The present disclosure relates to the field of communication technologies, and in particular to an authentication method and system for an Internet of Things module. Background technique [0002] IoT communication modules are widely used in vehicle monitoring, remote control, telemetry, small wireless networks, wireless meter reading, access control systems, community paging, industrial data acquisition systems, wireless tags, identification, non-contact RF smart cards, small wireless data Terminals, safety and fire protection systems, wireless remote control systems, biological signal acquisition, hydrometeorological monitoring, robot control, wireless data communication, digital audio and digital image transmission and other fields. As the most important part of the Internet of Things terminal, the IoT communication module has the risk of being stolen. When it is stolen and installed on other terminal applications, especially the eSIM (Embedded-SIM, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/71H04W12/72H04L29/06G16Y30/10G16Y40/50H04W4/14H04W12/03
CPCH04L63/0853H04L63/0876H04L63/18H04W12/06H04L63/0435H04L63/0428H04W4/14H04W12/02
Inventor 王文治王尧
Owner CHINA UNITED NETWORK COMM GRP CO LTD