Safety binding method and system based on narrow-band Internet of Things
A narrow-band Internet of Things, security technology, applied in the field of and network, can solve the problems of loss, insecurity, damage, etc., to avoid mismatching errors
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0032] In the first exemplary embodiment of the present invention, a secure binding method based on NB-IoT is provided. figure 1 For the first embodiment of the present invention, the flow chart of the secure binding method based on narrowband Internet of Things, refer to figure 1 , the security binding method of the present invention comprises the following steps:
[0033] Step S101: the NB device sends device information to the cloud platform;
[0034]In this embodiment, NB devices include but are not limited to air conditioners, refrigerators, and washing machines, etc., which have a built-in Internet of Things module (that is, NB-IoT module, hereinafter referred to as "NB module"), and the NB module uses a wireless cellular network communication protocol. Connect to the narrowband Internet of Things built on the cellular network, for example, the core network of the operator is connected to the cloud platform, and device information can be uploaded to the cloud platform. ...
no. 2 example
[0052] In the second exemplary embodiment of the present invention, a secure binding method based on NB-IoT is provided. Figure 4 For the second embodiment of the present invention, the flow chart of the secure binding method based on narrowband Internet of Things, refer to Figure 4 , the security binding method of the present invention comprises the following steps:
[0053] Step S201: Input the binary authorization code consistent with the segment code displayed on the digital tube of the NB device at the client;
[0054] In this embodiment, the client takes the mobile phone as an example, which has a graphical digital tube interface, such as Figure 5 As shown, the binary authorization code can be input by clicking to select different segments of the graphical digital tube in the interface, which has the advantages of simple operation and fun. Refer again figure 2 , the graphical digital tube of the interface intuitively shows the same display effect as the digital tu...
no. 3 example
[0062] In the third exemplary embodiment of the present invention, a secure binding method based on NB-IoT is provided. Figure 8 It is a flow chart of the secure binding method based on narrowband Internet of Things in the third embodiment of the present invention, refer to Figure 8 , the security binding method of the present invention comprises the following steps:
[0063] Step S301: The cloud platform receives the device information sent by the NB device, generates a token (token) and a binary authorization code corresponding to the NB device, the binary authorization code is randomly generated and unique according to the device information, and combines the token (token) and the binary authorization code The authorization code is sent to the NB device;
[0064] The token is generated by an algorithm according to the device information, and is used as a private identity of the NB device. The generated binary code has been described in the first embodiment, and will not ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



