Internet of Things access method and device

An access method and access device technology, applied in the data field, can solve problems such as inability to guarantee data security

Inactive Publication Date: 2020-04-10
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] This application provides an access method and device for the Internet of Things, which is used to solve the problem in the pri

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things access method and device
  • Internet of Things access method and device
  • Internet of Things access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] In a possible embodiment, based on figure 2 In the communication system shown, in the case where the network device is a gateway device connected to the first IoT device, such as Figure 4 As shown, step 101 can be implemented through the following steps 201-202.

[0060] Step 201, the first IoT device sends an access request to the gateway device. Correspondingly, the network device receives the access request from the first IoT device.

[0061] Wherein, the access request includes the first identifier.

[0062] The gateway device stores multiple communication protocols, such as wired protocols and wireless protocols. Wherein, the wired protocol may include 485, 232 and other protocols. Wireless protocols can include WIFI, Lora, NB-IOT, Zigbee, DL / T 645, CJ / T188, Modbus RT U and other protocols. After the gateway device 20 is connected to the device 10, it can perform data interaction with the device 10 through the above-mentioned communication protocol, so as to...

Embodiment 2

[0090] In a possible embodiment, based on figure 2 In the communication system shown, in the case where the network device is an authentication server, such as Figure 5 As shown, step 101 can be implemented through the following steps 301 and 302.

[0091] Step 301, the verification server receives the first information sent by the gateway device.

[0092] Wherein, the first information is obtained by the gateway device encrypting the first identifier by using a second preset encryption algorithm after receiving the access request sent by the first IoT device. The access request includes a first identification. The access request is used to identify that the first IoT device needs to access the IoT.

[0093] It should be noted that, in step 301, the interaction process between the gateway device and the verification server can refer to step 1 and step 2 for details:

[0094] Step 1. The gateway device receives an access request from the first IoT device.

[0095] Step 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things access method and device, which relate to the technical field of communication, and aim at solving the problem that data security cannot be ensured when Internet of Things equipment accesses the Internet of Things in the prior art. The access method comprises the following steps: network equipment acquires a first identifier of first Internet of Thingsequipment, wherein the first Internet of Things equipment requests to access the Internet of Things; the network equipment receives a certificate from an authentication server, wherein the certificate comprises a second identifier, and the second identifier is used for identifying one piece of Internet of Things equipment; the network equipment determines the legality of the first Internet of Things equipment according to the first identifier and the second identifier; and under the condition that the first wireless network equipment is legal, the network equipment connects the first Internetof Things equipment to the Internet of Things.

Description

technical field [0001] The present application relates to the field of data technology, and in particular to an access method and device for the Internet of Things. Background technique [0002] With the development of science and technology, IoT devices related to water, electricity, gas, heat and other energy sources have entered the era of the Internet of Everything. If the Internet of Things devices are directly connected to the Internet of Things without legal authentication, it will lead to security problems in the subsequent Internet of Things and data transmission between Internet of Things devices. Contents of the invention [0003] The present application provides a method and device for accessing the Internet of Things, which are used to solve the problem in the prior art that the data security of an Internet of Things device after accessing the Internet of Things cannot be guaranteed. [0004] In order to achieve the above object, the embodiments of the presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0823H04L63/0876H04L67/12
Inventor 杨雷杨鸿宾武亮亮
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products