Internet of Things data control method and device based on security authentication

A technology of security authentication and data control, which is applied in the field of secure Internet of Things, can solve problems such as delayed timing of command issuance, and achieve the effect of realizing security management and avoiding delayed timing of command issuance

Active Publication Date: 2021-06-29
北京德风新征程科技股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a security certification-based Internet of Things data control method and device; to solve the problem of security management of control commands and command acquisition terminals, and to avoid delays in the timing of command issuance due to network delays

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things data control method and device based on security authentication
  • Internet of Things data control method and device based on security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments. It should be noted here that although the descriptions of these embodiments are used to help the understanding of the present invention, they are not intended to limit the present invention. Specific structural and functional details disclosed herein are for purposes of describing example embodiments of the invention only. However, the invention may be embodied in many alternative forms and should not be construed as limited to the embodiments set forth herein.

[0035] It should be understood that for the term "and / or" that may appear in this article, it is only an association relationship describing associated objects, indicating that there may be three relationships, for example, A and / or B may indicate: A exists alone, B alone exists, and A and B exist at the same time; for the term " / and" that may appear in this article, it describes anoth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things data control method and device based on security authentication. The method comprises the steps that: the identity authentication of a local security authentication database is carried out when an instruction obtaining terminal needs to obtain an instruction, and an identity authentication request is transmitted to a security authentication layer of a cloud; the instruction obtaining terminal firstly receives identity authentication passing information of the local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit; a security authentication layer judges whether the instruction obtaining terminal passes authentication or not; if yes, authentication is passed; a secure transmission channel with the cloud is established after authentication; and the instruction obtaining terminal transmits the data temporarily stored in the local storage unit to the cloud and acquires the control instruction from the cloud. After the local identity authentication is passed, the sensing data is acquired, and the identity of the acquired sensing data is also authenticated, so that the problem of security management of the sensing data, the control instruction and the instruction obtaining terminal is solved.

Description

technical field [0001] The invention belongs to the field of secure Internet of Things, and in particular relates to a security authentication-based Internet of Things data control method and device. Background technique [0002] The Internet of Things is an important part of the new generation of information technology. As the name suggests, the Internet of Things is "the Internet of Things Connected". This has two meanings: First, the core and foundation of the Internet of Things is still the Internet, which is based on the Internet. The extension and expansion of the network; second, its client end is extended and extended to any object and object for information exchange and communication. Therefore, the definition of the Internet of Things is: through radio frequency identification, infrared sensors, global positioning systems, Information sensing equipment such as laser scanners, according to the agreed protocol, connects any object to the Internet for information exch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06G16Y40/30G16Y40/50
CPCH04L67/125H04L63/08G16Y40/30G16Y40/50Y02P90/02
Inventor 王清杰
Owner 北京德风新征程科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products