Check patentability & draft patents in minutes with Patsnap Eureka AI!

Safety binding method and system based on narrow-band Internet of Things

A narrow-band Internet of Things, security technology, applied in the field of and network, can solve the problems of loss, insecurity, damage, etc., to avoid mismatching errors

Active Publication Date: 2020-01-10
NINGBO AUX ELECTRIC +1
View PDF18 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The problem to be solved by the present invention is the unsafe problems such as damage and loss that exist when binding between the client and the NB device through the scanning method of the two-dimensional code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety binding method and system based on narrow-band Internet of Things
  • Safety binding method and system based on narrow-band Internet of Things
  • Safety binding method and system based on narrow-band Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0032] In the first exemplary embodiment of the present invention, a secure binding method based on NB-IoT is provided. figure 1 For the first embodiment of the present invention, the flow chart of the secure binding method based on narrowband Internet of Things, refer to figure 1 , the security binding method of the present invention comprises the following steps:

[0033] Step S101: the NB device sends device information to the cloud platform;

[0034]In this embodiment, NB devices include but are not limited to air conditioners, refrigerators, and washing machines, etc., which have a built-in Internet of Things module (that is, NB-IoT module, hereinafter referred to as "NB module"), and the NB module uses a wireless cellular network communication protocol. Connect to the narrowband Internet of Things built on the cellular network, for example, the core network of the operator is connected to the cloud platform, and device information can be uploaded to the cloud platform. ...

no. 2 example

[0052] In the second exemplary embodiment of the present invention, a secure binding method based on NB-IoT is provided. Figure 4 For the second embodiment of the present invention, the flow chart of the secure binding method based on narrowband Internet of Things, refer to Figure 4 , the security binding method of the present invention comprises the following steps:

[0053] Step S201: Input the binary authorization code consistent with the segment code displayed on the digital tube of the NB device at the client;

[0054] In this embodiment, the client takes the mobile phone as an example, which has a graphical digital tube interface, such as Figure 5 As shown, the binary authorization code can be input by clicking to select different segments of the graphical digital tube in the interface, which has the advantages of simple operation and fun. Refer again figure 2 , the graphical digital tube of the interface intuitively shows the same display effect as the digital tu...

no. 3 example

[0062] In the third exemplary embodiment of the present invention, a secure binding method based on NB-IoT is provided. Figure 8 It is a flow chart of the secure binding method based on narrowband Internet of Things in the third embodiment of the present invention, refer to Figure 8 , the security binding method of the present invention comprises the following steps:

[0063] Step S301: The cloud platform receives the device information sent by the NB device, generates a token (token) and a binary authorization code corresponding to the NB device, the binary authorization code is randomly generated and unique according to the device information, and combines the token (token) and the binary authorization code The authorization code is sent to the NB device;

[0064] The token is generated by an algorithm according to the device information, and is used as a private identity of the NB device. The generated binary code has been described in the first embodiment, and will not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safety binding method and system based on the narrow-band Internet of Things. The method comprises the steps that NB equipment sends equipment information to a cloud platform;the NB equipment receives a token and a binary authorization code which are generated by the cloud platform and correspond to the NB equipment, wherein the binary authorization code is randomly generated according to the equipment information and is unique; and the NB equipment uses the binary authorization code as a segment code of a nixie tube to display, so that the segment code is input by aclient to perform binding operation with the NB equipment. According to the invention, the problem of insecurity when the client and the NB equipment are bound in a two-dimensional code scanning modeis solved.

Description

technical field [0001] The present invention and the field of network technology, in particular, relate to a secure binding method and system based on narrowband internet of things. Background technique [0002] With the continuous development of NB-IoT (Narrowband Internet of Things) technology, Internet of Things devices (hereinafter referred to as "NB devices") such as air conditioners, washing machines, refrigerators, etc. continue to appear. Users can establish communication connections between NB devices and the Internet according to the agreement. And then control the NB equipment. [0003] At present, users need to authorize and bind the NB device before controlling the NB device through the client, and most clients currently on the market perform the binding operation with the NB device by scanning the QR code. As a result, because the two-dimensional code binding method may be stolen by others, or the two-dimensional code is damaged or lost, the client cannot norm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/08
CPCH04L9/0866H04L9/0869H04L9/3213H04L67/12
Inventor 罗梅梅
Owner NINGBO AUX ELECTRIC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More