Equipment authentication method, service access control method, equipment and storage medium

A device authentication and device technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as not being suitable for large-scale applications, limiting authentication efficiency, and increasing the deployment cost of authentication systems

Active Publication Date: 2020-10-27
RICOH KK
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The processing power of the third-party management server limits the authentication efficiency
With the increasing popularity of smart mobile terminals and the rapid development of Internet of Things (IOT, Internet of Things) technology, in a system containing a large number of mobile terminals or IOT devices, if each device needs to be verified by interacting with a third-party server, then The third-party server will become a performance bottleneck, so in many existing applications, only one-way authentication is performed, that is, the service providing device is authenticated, and the service requesting device is not authenticated
In addition, the CA in PKI requires real-name authentication of the terminal, and real-name authentication is usually not necessary in the IOT system, which brings additional overhead
[0004] The secure channel usually requires specific hardware support, for example, the device needs to install the Subscriber Identification Module (SIM, Subscriber Identification Module) of the mobile cellular network, or an encryption system that needs to be deployed in advance, thus increasing the deployment cost of the authentication system, so it is not suitable for large-scale scale application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method, service access control method, equipment and storage medium
  • Equipment authentication method, service access control method, equipment and storage medium
  • Equipment authentication method, service access control method, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments. In the following description, specific details, such as specific configurations and components, are provided only to assist in a comprehensive understanding of the embodiments of the present invention. Accordingly, those of ordinary skill in the art should recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted for clarity and conciseness.

[0096] It should be understood that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic related to the embodiment is included in at least one embodiment of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an equipment authentication method, a service access control method, equipment and a storage medium. According to the equipment authentication method, authentication request equipment issues an authentication request transaction in a distributed account book, authentication response equipment reads the authentication request transaction in the distributed account book and performs authentication, so that a third-party authentication center does not need to manage or coordinate equipment participation in an authentication handshake process, the deployment overhead of theauthentication system is reduced, and the authentication and access service control efficiency is improved.

Description

technical field [0001] The present invention relates to the technical field of device authentication, in particular to a method for device authentication, a method for service access control, a device, and a storage medium. Background technique [0002] Authenticating devices is critical to securing information access and transactions. For example, the security service in the industrial monitoring system and the security service in the environmental monitoring system usually need to identify a legitimate user or device, so as to allow the legitimate user or device to access to obtain a large amount of monitoring terminal data or measurement terminal data (e.g. cameras, air / water quality measurement sensors). For another example, in a home or office smart system, it is necessary to identify a legal user / device, so that the terminal can be controlled or terminal data can be accessed. The authentication methods in the prior art generally need to rely on a trusted third-party ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L9/3273H04L9/3247H04L9/3236H04L9/3213H04L63/0869H04L63/0807H04L63/08H04L9/0891H04L9/3239H04L9/3271H04L63/0876H04L63/10H04L9/50H04L9/0637H04L9/0643H04L9/0869H04L63/0442H04L63/101
Inventor 范小菁王炜于海华廖可刘丽艳
Owner RICOH KK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products