Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method and system for safe access of Internet of Things equipment

An Internet of Things device and secure access technology, applied in the field of Internet of Things, can solve problems such as unguaranteed use of Internet of Things devices, uncontrolled device data and access rights, and inability to ensure device identity. Achieve uniqueness, ensure uniqueness, and ensure security

Pending Publication Date: 2020-11-24
SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The Internet of Things is connected to a large number of device nodes, and any node with a security problem may become a gap that affects the security of the entire Internet of Things
Insufficient identity authentication, weak access control and other issues may lead to uncontrolled device data and access rights
Current IoT devices usually use only one identity, such as fingerprints, card identification, etc. The identity of the device cannot be guaranteed, and the security of the IoT device cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and system for safe access of Internet of Things equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] A verification method for secure access of Internet of Things devices, such as figure 1 ,Specifically:

[0029] Set the main server, main database, proxy server and local database. The number of proxy servers and local databases is multiple. Each proxy server corresponds to a local database. The local database stores the device status information of the requesting device. The information records are The binding verification information of the requesting device and the verification result of the requesting device by the main server;

[0030] The requesting device sends an access request to the proxy server, and the proxy server obtains the binding verification information of the requesting device, and matches the device status information recorded with the binding verification information in the local database. If the matching is successful, the proxy server executes the matched device The verification result in the status information, otherwise the proxy server sends t...

Embodiment 2

[0034] In this embodiment, the network address is a public network IP address, and the others are the same as those in Embodiment 1.

Embodiment 3

[0036] In this embodiment, the network address is the IP address of the network WAN port, and the others are the same as in Embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verification method and system for safe access of Internet of Things equipment. The method specifically comprises the following steps that: a main server, a proxy server anda local database are arranged; a request device sends an access request to the proxy server, the proxy server acquires binding verification information of the request device, device state informationis matched in a local database; if the matching succeeds, the proxy server executes a verification result in the matched device state information; otherwise, the proxy server sends the access requestto the main server; the main server generates a verification result according to the binding verification information; the verification result and the binding verification information of the requestdevice are recorded as a piece of device state information, the device state information is issued to the proxy server, the verification result in the device state information is performed by the proxy server, and the device state information is stored in a local database. Compared with the prior art, the method has the advantages of good safety, high efficiency, small load and the like.

Description

technical field [0001] The present invention relates to the technical field of the Internet of Things, in particular to a verification method and system for secure access of Internet of Things devices. Background technique [0002] With the development of the Internet era, we have now quickly entered the era of the Internet of Things. The core and foundation of the Internet of Things is still the Internet, which is an extended and expanded network through the Internet. Since the Internet of Things has people, things, data and processes at its core components, any device capable of connecting to the Internet has potential security vulnerabilities, so authentication is one of the most critical functions to ensure secure communication between these entities. IoT devices can authenticate themselves to the server and realize remote device authentication, so that the server can understand the characteristics of the device and judge its reliability. Server remote authentication is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/00H04L29/08G06F16/23G16Y30/10G16Y40/50
CPCH04W12/06H04L67/1095G06F16/2308G16Y30/10G16Y40/50H04L67/56
Inventor 伏伟任蒋秋明
Owner SHANGHAI SIIC LONGCHUANG SMARTER ENERGY TECH CO LTD