Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity identification authentication method of Internet of Things equipment, related device and system

An Internet of Things device and identity identification technology, which is applied in the direction of security devices, transportation and packaging, and services based on specific environments, can solve the problem of low convenience of drones

Active Publication Date: 2021-03-30
HUAWEI TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When managing the identity of UAVs, different units complete the corresponding certification and authentication. For example, the production and filing management unit of UAVs is the Ministry of Industry and Information Technology, and relevant departments of the Ministry of Industry and Information Technology complete the authentication and authentication of production equipment information; The pre-flight operation management unit is the Civil Aviation Administration, which completes the authentication and certification of the drone owner and operator; the operational service unit in the use of the drone is the drone cloud system, so it needs to be managed by the unmanned The machine-cloud system completes the authentication and certification of drones. In some scenarios, the drone cloud system also needs to cooperate with the Civil Aviation Administration to complete the re-authentication of flight plans, users, and flight tasks; at the same time, the drone access The mobile operator network needs to perform access authentication and authentication once, therefore, the convenience of authenticating the UAV is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity identification authentication method of Internet of Things equipment, related device and system
  • Identity identification authentication method of Internet of Things equipment, related device and system
  • Identity identification authentication method of Internet of Things equipment, related device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Embodiments of the present application will be described below with reference to the drawings.

[0067] The present application examples are intended to solve existing programs, when certifying drones, requires authentication of drones through multiple different departments, such as authentication of drone cloud systems to drones And certification, etc., resulting in a low convenience of drone authentication, in this program, the unified network unit can be identified to the drone, thereby improving the efficiency of authentication of the drone.

[0068] The terms used in the present application will be explained below.

[0069] The following abbreviations will be used in the present application example: GSM, CDMA, UDM, AMF, SMF, NEF, IMSI, LTE, UAV, UAS. Among them, GSM: Global System for Mobile Communications, Global Mobile Communications Systems; CDMA: Code Division Multiple Access, Code Division Multiple Access, Unified Data Management; AMF: Access and Mobility Manageme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method of Internet of Things equipment, a related device and a communication system, and the method comprises the steps that a first network unit receives a registration request sent by the Internet of Things equipment; the first network unit judges whether the device type acquired according to the first identity identifier is a preset device typeor not, and if yes, the first network unit sends a first identity information acquisition request and sends a second identity information acquisition request; the first network unit receives a firstidentity information acquisition response sent by the second network unit, the first identity information acquisition response carries a second identity identifier, the first network unit receives a second identity information acquisition response sent by the Internet of Things device, and the second identity information acquisition response carries a third identity identifier; and the first network unit authenticates the third identity identifier according to the second identity identifier to obtain an authentication result. And the unmanned aerial vehicle is authenticated through the unifiednetwork unit, so that the convenience in authentication is improved.

Description

Technical field [0001] The present application relates to the field of communication technologies, in particular, to an identity authentication method, related device and system of an Internet of-connected device. Background technique [0002] The issuance and management of the identity identity of Unmanned Aerial Vehicle, UAV is mainly defined by the manufacturing and civil aviation sectors of countries, such as the domestic Ministry of Industry and Information Technology and the Civil Aviation Administration. 3GPP 22.125 mentioned that "3GPP (Third Generation Partner Program, 3RD Generation Partnership) system should make UAS to unmanned Aircraftsystem Traffic Management, UTM, UTM, UtM ) Send different unmanned aircraftsystem, uas data ", and pointed out" according to regional regulations, different authentication and authorization levels can be: initial network access physical device authentication and authentication, UAS owner identity authentication And authentication; drone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/40H04W12/69H04W12/08
CPCH04W4/40H04W12/08H04W12/69
Inventor 李刚朱浩仁
Owner HUAWEI TECH CO LTD