Terminal authentication method and system, terminal equipment, P2P verification platform and medium

A terminal equipment and terminal authentication technology, applied in the field of Internet of Things, can solve the problem of difficulty in ensuring network identity security, achieve the effect of solving management and maintenance, preventing counterfeit equipment from entering the network, and improving efficiency

Active Publication Date: 2021-06-29
CHINA TELECOM CORP LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the security requirements of address identification are getting higher and higher, relying only on the user name / password at the application layer or embedding a SIM (Subscriber Identification Module, User Identity Module) / UIM (User Identity Module, User Identity Module) card in the terminal It is difficult to ensure the security of identity on the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication method and system, terminal equipment, P2P verification platform and medium
  • Terminal authentication method and system, terminal equipment, P2P verification platform and medium
  • Terminal authentication method and system, terminal equipment, P2P verification platform and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056]The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way intended as any limitation of the disclosure, its application or uses. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0057] Relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0058] At the same time, it should be underst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a terminal authentication method and system, terminal equipment, a P2P verification platform and a medium. The terminal authentication method comprises: the terminal equipment sends a verification request to a peer-to-peer (P2P) verification platform through a network device, the verification request comprising terminal verification information, and the terminal verification information comprising terminal equipment physical information and a terminal user recognition code; and the P2P verification platform comprises a plurality of verification servers, and the verification servers verify the terminal verification information to confirm the authenticity of the identity of the terminal equipment. According to the invention, the IPv6 address of the terminal is generated based on the physical characteristics of the chip, counterfeit equipment is prevented from accessing the network from the chip level, and the safety capability of the network is enhanced. According to the method, the equipment access authentication efficiency is improved by adopting the decentralized infrastructure, and the difficulty of centralized management and maintenance is solved.

Description

technical field [0001] The present disclosure relates to the field of the Internet of Things, and in particular to a terminal authentication method and system, a terminal device, a P2P verification platform and a medium. Background technique [0002] IPv6 (Internet Protocol Version 6, Internet Protocol Version 6) address identification needs to be consistent under multiple systems, so that the positioning and retrieval of IoT nodes can be realized through the identification system. At the same time, the security requirements of address identification are getting higher and higher, relying only on the user name / password at the application layer or embedding a SIM (Subscriber Identification Module, User Identity Module) / UIM (User Identity Module, User Identity Module) card in the terminal It is difficult to guarantee the identity security of the network. In an environment with high security requirements, it is necessary to identify the authenticity of the device itself to pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3278H04L63/0853H04L63/0876H04L67/104H04L67/1097H04L9/50
Inventor 李聪解冲锋雷波王江龙
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products