Authentication method, device and system and computer storage medium

A storage layer and mapping relationship technology, applied in the field of authentication and authentication, can solve the problems of cumbersome operation, complex management, data security, etc., and achieve the effect of reducing concurrent peak overhead, improving business efficiency, and reducing the risk of leakage

Active Publication Date: 2021-06-25
SICHUAN JIUZHOU ELECTRONICS TECH
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud authentication method provided by the manufacturer can support multiple authentication methods, but cloud authentication also has various problems, such as: 1. The cloud system will store a large number of user authentication information, and there are data security issues
2. The cloud authentication system must ensure that business terminals can connect to the network. Each manufacturer's IoT device needs to establish its own authentication platform. Terminal devices are all certified by the cloud platform. The concurrent peak value of the authentication platform increases linearly with the increase in the number of devices. increase, cloud platform construction and maintenance costs will also increase
3. Different devices of the owner need to configure authentication permissions in different manufacturers, which is cumbersome to operate and complicated to manage. It is not convenient to use a unified authentication platform for authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system and computer storage medium
  • Authentication method, device and system and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see figure 1 , this embodiment introduces the application scenario of this method by taking a homestay managed remotely as an example.

[0036] An authentication authentication method, which is applied to a local network device, the local network device includes a gateway or a home router, and the local network device includes a storage layer for storing data, a configuration management layer for management configuration, and a service processing layer Business logic layer.

[0037] Authentication authentication methods include:

[0038] S1: Receive IoT device data entry.

[0039] Specifically, the IoT device data specifically includes one or more of device identification code, name, device attribute, mac, and public key.

[0040] S2: Receive user data input.

[0041] User data includes one or more of identity information, passwords, and biometric data. When a user needs to stay in the store, create a user data entry transaction, generate the information entry page...

Embodiment 2

[0051] This embodiment introduces the application scenario of the method by taking network resources (such as movies and songs) requiring authentication as examples.

[0052] An authentication and authentication method, the authentication and authentication method is applied to a local network device, the local network device includes a PC or an embedded device (such as NAS), and the local network device includes a storage layer for storing data and a configuration management layer for managing and configuring And the business logic layer for business processing.

[0053] Authentication authentication methods include:

[0054] S1: Receive network resource data entry.

[0055] S2: Receive user data input.

[0056] S3: Configure the mapping relationship between user data and network resources, and pass authentication conditions.

[0057] S4: Determine whether the user authentication request sent by the network resource satisfies the conditions for accessing the network resour...

Embodiment 3

[0059] see figure 2 , an authentication and authentication device, the authentication and authentication device is a local network device, and the local network device includes a gateway, a home router, a PC or an embedded device, and the authentication and authentication device includes:

[0060] The data processing module 10 is used for receiving IoT device data / network resource data entry, user data entry, and addition, deletion, modification, and query of related data;

[0061] The storage module 20 is used to store IoT device data / network resources, user data and mapping relationship data;

[0062] The configuration management module 30 is used to configure the mapping relationship between the user's data and the Internet of Things device / network resource, and pass the authentication and authentication conditions;

[0063] The business logic module 40 is used to judge whether the user authentication request sent by the IoT device / network resource satisfies the condition...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, device and system and a computer storage medium. The authentication method is applied to local network equipment. The authentication method comprises the following steps: receiving Internet of Things equipment data / network resource data entry; receiving user data entry; configuring a mapping relationship between the data of the user and the Internet of Things equipment / network resources, and authenticating conditions through authentication; judging whether a user authentication request sent by the Internet of Things device / network resource meets the condition of accessing the Internet of Things device / network resource; and if the preset access authentication condition is met, returning an authentication success message to the authentication request source. According to the invention, third-party authentication service can be provided for Internet of Things equipment, internal application service and the like in a local area network. Herein, the ownership and the use authorization of the internet of things equipment main body and the local area network internal resources are separated, and the use authentication authority and the ownership of the equipment are logically separated.

Description

technical field [0001] The present invention relates to the technical field of authentication and authentication, in particular to an authentication and authentication method, device, system and computer storage medium. Background technique [0002] User authentication is the basic user rights management unit. In Internet applications, most resources require users to pass authentication before they can access and use them. For example, when a user downloads a document, he needs to log in to the document website. There are many ways to download the resources of this website, such as logging in with the account number and password registered on the website, password-free login through mobile phone number, and WeChat Alipay and other platforms. The provided authentication interface performs federated login authentication, etc. Only after passing the login authentication, the user can access the specified resource. On the local network, access to resources in the local network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G07C9/00H04L29/08
CPCH04L63/10H04L63/08G07C9/00571G07C9/00563G07C9/00658H04L67/10Y04S40/20
Inventor 李东旭谷强李祖章李刚
Owner SICHUAN JIUZHOU ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products