Unlock instant, AI-driven research and patent intelligence for your innovation.

An equipment authentication method, an air card writing method, and an equipment authentication device

An equipment authentication and equipment technology, which is applied in the directions of digital data authentication, secure communication device, computer security device, etc., can solve the problems of low security, increased authentication cost, and inability to effectively detect machine-card separation, etc.

Active Publication Date: 2021-04-16
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the password entered by the user matches the password stored in the authentication platform, it is considered to be a legitimate device. It can be seen that the security of this authentication method is low, and it cannot effectively detect the separation of the machine card, and it is different from the integrated circuit card, fingerprint, etc. The authentication method combining authentication methods needs to add corresponding identification modules or hardware to IoT devices, which increases the authentication cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An equipment authentication method, an air card writing method, and an equipment authentication device
  • An equipment authentication method, an air card writing method, and an equipment authentication device
  • An equipment authentication method, an air card writing method, and an equipment authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0064] The embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0065] The device authentication method provided by the embodiment of the present invention is applied to device authentication in the Internet of Things. figure 1 A system architecture diagram applicable to the device authentication method in the embodiment of the present invention, such as figure 1 As sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a device authentication method, an over-the-air card writing method, and a device authentication device, including: the authentication platform receives the device authentication request sent by the service platform, and the device authentication request includes the IMSI and authentication information of the device to be authenticated; The IMSI of the device and the device public key corresponding to each IMSI stored in the authentication platform determine the device public key of the device, and if the authentication information is verified to be valid according to the device public key of the device, an authentication success message is sent. It can be seen that, on the one hand, the use of asymmetric key mechanism for device authentication can effectively improve the security of authentication. On the other hand, since the authentication information is generated based on the device private key of the device, and the authentication platform stores the device corresponding to each IMSI Therefore, if the authentication platform cannot successfully verify the authentication information with the device public key that matches the device's IMSI, it means that the device's IMSI does not match the device's private key, thereby effectively detecting the device-card separation.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to an equipment authentication method, an air card writing method and an equipment authentication device. Background technique [0002] With the development of the Internet of Things and mobile Internet, more Internet of Things services (remote meter reading, smart home, etc.) Wearable devices) are constantly appearing and connected to the operator's network as a terminal. [0003] Different from users' smart phones and other terminals in the mobile communication network, in the Internet of Things, IoT devices are generally in an unattended environment and are vulnerable to attacks and damages. The IoT card containing user identity information in the device is also easily hacked Deliberate destruction or stealing is used for illegal device access, which leads to device security issues. Therefore, in order to prevent the special card from being used elsewhere, it is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/60H04L29/06
CPCG06F21/44G06F21/602H04L63/0876H04L63/08G06F21/60H04L9/40
Inventor 袁勇许蓓蓓王姗姗袁瑗
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD