Verification method and system for safe access of Internet of Things equipment
An Internet of Things device and secure access technology, applied in the field of Internet of Things, can solve problems such as unguaranteed use of Internet of Things devices, uncontrolled device data and access rights, and inability to ensure device identity. Achieve uniqueness, ensure uniqueness, and ensure security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] A verification method for secure access of Internet of Things devices, such as figure 1 ,Specifically:
[0029] Set the main server, main database, proxy server and local database. The number of proxy servers and local databases is multiple. Each proxy server corresponds to a local database. The local database stores the device status information of the requesting device. The information records are The binding verification information of the requesting device and the verification result of the requesting device by the main server;
[0030] The requesting device sends an access request to the proxy server, and the proxy server obtains the binding verification information of the requesting device, and matches the device status information recorded with the binding verification information in the local database. If the matching is successful, the proxy server executes the matched device The verification result in the status information, otherwise the proxy server sends t...
Embodiment 2
[0034] In this embodiment, the network address is a public network IP address, and the others are the same as those in Embodiment 1.
Embodiment 3
[0036] In this embodiment, the network address is the IP address of the network WAN port, and the others are the same as in Embodiment 1.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
