Authentication method, authentication system and communication method between Internet- of-Things terminal devices

A technology of IoT terminals and terminal equipment, which is applied in the direction of transmission systems, instruments, electrical components, etc., can solve the problems of undefended and high security risks, and achieve the effect of reducing participation, high security, reducing security risks and bottleneck performance

Active Publication Date: 2021-03-26
STATE GRID LIAONING ELECTRIC POWER CO LTD SHENYANG POWER +2
View PDF11 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides an authentication method, an authentication system, and a communication method between IoT terminal devices, which has solved the problem that most IoT terminal devices are not protected and have high security risks in the past

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication system and communication method between Internet- of-Things terminal devices
  • Authentication method, authentication system and communication method between Internet- of-Things terminal devices
  • Authentication method, authentication system and communication method between Internet- of-Things terminal devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0052] At present, most IoT terminal devices are in an undefended state, with low security, and are prone to problems of illegal use, counterfeiting and malicious attacks. Even if an authentication mechanism is occasionally set up, all authentication operations require the participation of an authentication server. The identity authentication of each terminal device through the authentication se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, an authentication system and a communication method between Internet- of-Things terminal devices, in the authentication method, unique identity recognition information of the terminal devices is combined with an encryption system, and identity authentication between the terminal devices is needed to allow an authentication server to participate inauxiliary authentication only under the condition of first authentication or public key aging, otherwise, each terminal device can perform identity authentication operation on another Internet of Things terminal device, so that the participation degree of the authentication server in the authentication process is greatly reduced, and the security risk and bottleneck performance of the authentication server center are further reduced; and the authentication system and the communication method are obtained based on the authentication method, and have the advantage of high safety.

Description

technical field [0001] The present invention discloses the technical fields of security protection of Internet of Things terminals and network security, and in particular relates to an authentication method, an authentication system and a communication method between Internet of Things terminal devices. Background technique [0002] The Internet of Things terminal is a device that connects the sensor network layer and the transmission network layer in the Internet of Things to collect data and send data to the network layer. It is responsible for data collection, preliminary processing, encryption, transmission and other functions. The Internet of Things terminal belongs to the intermediate device of the sensor network layer and the transmission network layer, and is also the key device of the Internet of Things. Through the conversion and collection of the Internet of Things terminal, various external perception data can be collected and processed, and the data can be passe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G16Y30/10
CPCH04L63/08H04L63/0876H04L63/0442H04L67/12G16Y30/10
Inventor 孙守道周小明许超李小兰刘东延赵昊东多俊龙李桐任帅陈剑
Owner STATE GRID LIAONING ELECTRIC POWER CO LTD SHENYANG POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products