Supercharge Your Innovation With Domain-Expert AI Agents!

Security authentication method based on MQTT, device and storage medium

A security authentication and electronic device technology, applied in the field of computer security, can solve the problems of attacking user equipment security authentication, communication network threats, etc., to ensure security and privacy, and improve security performance.

Active Publication Date: 2019-04-16
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the communication process based on the MQTT protocol, many security issues may be faced, such as distributed denial of service (Distributed Denial Of Service, DDOS) attack issues, security authentication and authorization issues for user equipment access, etc.
These problems pose a great threat to the communication network. Therefore, it is urgent to design an MQTT-based security service system that can perform security authentication on the client, effectively guarantee the security of the server, and reduce DDOS attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method based on MQTT, device and storage medium
  • Security authentication method based on MQTT, device and storage medium
  • Security authentication method based on MQTT, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0058] Such as figure 1 Shown is a schematic diagram of a preferred embodiment of the electronic device 1 of the present invention.

[0059] In this embodiment, the electronic device 1 may be a computing device such as a rack server, a blade server, a tower server, or a cabinet server, and the electronic device 1 may be an independent server, or may be composed of multiple servers server cluster.

[0060] The electronic device 1 includes but not limited to: a memory 11 , a processor 12 , a display 13 and a network interface 14 . The electronic device 1 is connected to the network through the network interface 14 to obtain raw data. Wherein, the network may be an intranet (Intranet), Internet (Internet), Global System of Mobile Communication (Global System of Mobilecommunication, GSM), Wideband Code Division Multiple...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security technology, and discloses a security authentication method based on MQTT, an electronic device and a storage medium. The method comprises the steps of creating a virtual account and a group identity according to a registration request sent by a client, and returning the virtual account and the group identity to the client; receiving a login request sent by the client, carrying out authentication by using a preset authentication rule, and if the authentication is passed, establishing a subscription connection with the client; and finally, receiving a theme subscription request sent by the client, carrying out comparison authentication on a subscription theme and a theme list according to the received theme subscription request, and if the subscription theme exists in the theme list, indicating that the authentication is passed, and pushing subscription information to the client according to the subscription theme. By means of the method, the securityauthentication on the client can be improved, the security of a server can be effectively guaranteed, and distributed denial of service attacks can be reduced.

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to an MQTT-based security authentication method, device and computer-readable storage medium. Background technique [0002] Message Queuing Telemetry Transport (MQTT) is an instant messaging protocol developed by International Business Machines Corporation (IBM). The protocol adopts a lightweight subscription / publishing mode for message transmission, and is specially optimized for low bandwidth, low computing power, and unstable network environments, and is suitable for embedded smart terminals and mobile The information push of the terminal can effectively save the power consumption and flow of the terminal. [0003] However, in the communication process based on the MQTT protocol, many security issues may be faced, such as distributed denial of service (Distributed Denial Of Service, DDOS) attack issues, security authentication and authorization issues for user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/58H04L9/32H04L9/08
CPCH04L9/0863H04L9/3297H04L51/04H04L63/08H04L63/083H04L67/51H04L67/55
Inventor 詹泽
Owner PING AN TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More