Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and system, computer equipment and storage medium

An access control and device technology, applied in the field of network security, can solve the problems of reducing the security of Internet of Things devices, distributed denial of service attacks, etc., to achieve effective control, ensure security, and avoid interactions.

Active Publication Date: 2020-05-29
SHENZHEN POWER SUPPLY BUREAU
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still security issues such as distributed denial-of-service attacks, man-in-the-middle attacks, and physical threats in this way, which reduces the security of IoT devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system, computer equipment and storage medium
  • Access control method and system, computer equipment and storage medium
  • Access control method and system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0041] The access control method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the requester device 120 and the server device 160 respectively communicate with the authentication service device 140 through the network. The communication between the requester device 120 and the server device 160 can be realized through the network or offline, such as two-dimensional code, sound wave and infrared. The requester device 120, the server device 160 and the authentication service device 140 may specifically be IoT...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access control method and system, computer equipment and a storage medium. The method comprises the steps that requester equipment acquires application content and sends atoken application request carrying the application content to authentication service equipment, wherein the application content comprises a service party identifier, the authentication service equipment generates and feeds back a corresponding access token according to a public reference string corresponding to the service party identifier and the application content, the requester equipment transmits the access request carrying the access token to service party equipment corresponding to the service party identifier, and the service equipment analyzes the access token to obtain at least one encrypted string, determines a verification algorithm corresponding to each encrypted string, performs zero knowledge verification on the corresponding encrypted string according to a secret parametercorresponding to the verification algorithm, and responds to the access request when each encrypted string passes the verification. By the adoption of the method, effective control over access of theInternet of Things equipment can be achieved, and therefore the safety of the Internet of Things equipment can be guaranteed.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an access control method, system, computer equipment and storage medium. Background technique [0002] IoT systems frequently encounter distributed denial-of-service attacks, loopholes, and virus intrusions, resulting in severe collapse of infrastructure including the Internet. Malware targeting IoT devices, when connected to a victim user, will spread to the IoT device held by the victim user to analyze or control the IoT device. Therefore, how to ensure the security of IoT devices is a problem worthy of attention. At present, the security of the Internet of Things is usually guaranteed through centralized identity authentication and lightweight security protocols. However, there are still security issues such as distributed denial-of-service attacks, man-in-the-middle attacks, and physical threats in this way, which reduces the security of IoT devices. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06G16Y30/10
CPCH04L9/3218H04L9/3213H04L63/08H04L63/0807
Inventor 刘涛伍少成曹小洪王波姜和芳赵杰陈晓伟马越梁洪浩陈杰谢智伟韩道岐李瑾陆月明
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products