Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device authentication method, device access method and device

A device authentication and device technology, applied in the field of communications, can solve the problem of inability to add user identity authentication information

Active Publication Date: 2022-02-25
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (3) User identity authentication information cannot be added to the IoT device when the IoT device is offline

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device authentication method, device access method and device
  • Device authentication method, device access method and device
  • Device authentication method, device access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0142] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0143] refer to figure 1 , shows a flow chart of the steps of Embodiment 1 of a device authentication method of the present application. The device authentication method of the embodiment of the present application can be applied to the device end, and may specifically include the following steps:

[0144] Step 101, sending a device authentication information synchronization request to a server.

[0145] In this embodiment of the application, the device may be an Internet of Things device, and the Internet of Things device may include a sensor device, such as a radio frequency identification device, an infrared sensor, an environmental sensor, a global positioning system, a PDA handheld terminal, an RFID...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide a device authentication method, a device access method, and an apparatus. The device authentication method includes: sending a device authentication information synchronization request to a server; receiving device authentication information returned by the server; receiving an identity authentication message sent by a user request, the identity authentication request includes user authentication information, and the user authentication information is the information generated after the user sends a user information request to the server and receives the user information returned by the server; using the device authentication information and the user authentication information to authenticate the user. In the embodiment of the present application, after the device synchronizes the device authentication information, the device authentication information and the user authentication information are used to authenticate the user, and the device accepts the access of the local LAN user after the authentication succeeds, which can avoid security loopholes caused by not performing identity authentication on the local LAN user. It realizes device-to-user identity authentication and secure sharing of IoT devices.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a device authentication method, a device access method, and a corresponding device authentication device and a device access device. Background technique [0002] With the development of the Internet of Things technology, the Internet of Things has been widely used. The Internet of Things can include servers, gateways, and IoT devices, and IoT devices are connected to servers through gateways. [0003] The IoT device can be a device with communication functions including various sensors, and the IoT device assists multiple functions such as data collection, preliminary processing, encryption, and transmission of the IoT. For the IoT device, in addition to the IoT device manager, other users can also be authorized to use the IoT device to realize the sharing of the IoT device. At present, IoT device sharing can be realized in the following two ways, one is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L9/06
CPCH04L63/0876H04L63/08H04L63/101H04L9/3247H04L9/3213H04L9/0869H04L9/0866H04L9/0643
Inventor 吴总路
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products