Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Equipment node authentication method, device and system

A technology of device nodes and authentication methods, applied in the field of the Internet of Things, can solve the problems of high performance and security requirements of SIM cards, difficult acceptance by terminal manufacturers, and large investment

Active Publication Date: 2020-05-01
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventor found that the Internet of Things will be widely used in the future, and the terminals will be diverse and difficult to unify standards. However, the machine card authentication method on the terminal side will inevitably have certain technical requirements for the terminal itself. Some terminals (such as street lamps, water meters, etc.) have already completed construction. It is difficult for terminal manufacturers to accept the large investment in the transformation of machine card authentication technology
In network-side authentication, machine-card authentication is required for various services and a large number of terminals accessing the network. If network-side machine-card authentication is adopted, massive nodes may cause network authentication blocking risks.
Completing the binding and authentication calculations in the SIM has high requirements on the performance and security of the SIM card, requiring a lot of investment in the SIM card, and the SIM card is a single point of decision-making, which has a high security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment node authentication method, device and system
  • Equipment node authentication method, device and system
  • Equipment node authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The device node authentication method, device and system provided by the embodiments of the present invention are used to realize the authentication of device nodes using the Internet of Things card, effectively avoiding the blocking risk caused by the authentication of a large number of device nodes on the network side, and further improving the Internet of Things. Card security.

[0076] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention, and in the absence of conflict, the present invention The embodiments and the features in the embodiments can be combined with each other.

[0077] To facilitate understanding of the present invention, in the technical terms involved in the present invention:

[0078] 1. The device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment node authentication method, device and system, and the method comprises the steps: receiving a networking application request transmitted by a to-be-authenticatedequipment node, wherein the networking application request carries an association relation between the equipment identification information of the to-be-authenticated equipment node and the identification information of an IOT card; selecting a plurality of equipment nodes, forwarding the networking application request to the selected equipment node, and authenticating the equipment node to be authenticated by the selected equipment node according to the received association relationship; and receiving an authentication result sent by the selected equipment node, and determining a final authentication result of the to-be-authenticated equipment node according to the authentication result sent by each equipment node. The base station authenticates the device node to be authenticated by using the selected device node, and does not need to perform authentication completely on the network side like the prior art, so that the occurrence of network congestion caused by massive authenticationon the network side in the prior art is effectively avoided.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a device node authentication method, device and system. Background technique [0002] The IoT business scenarios are numerous and complex, and the terminal forms are diverse. In order to facilitate adaptation and promotion, a plug-in card is designed, but the card is easy to be used maliciously. For example, a terminal using a plug-in card is difficult to prevent the card from being separated, and there is a risk of being used for business abuse such as sending spam messages. [0003] There are generally three existing IoT card authentication methods, namely: terminal-side machine-card authentication, network-layer machine-card authentication, and subscriber identity module (Subscriber Identity Module, SIM) authentication. The inventor found that the Internet of Things will be widely used in the future, and the terminals will be diverse and difficult to unify stan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/801H04L29/06H04L29/08
CPCH04L47/12H04L63/0876H04L67/12
Inventor 刘婧雯
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products