Equipment authentication method and device
A device authentication and device technology, applied in the network field, can solve the problems of heavy burden on edge nodes and large amount of calculation, and achieve the effect of reducing system load, reducing calculation load and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] This embodiment provides a device authentication method, which is applied to edge nodes, such as figure 1 As shown, the method includes:
[0065] Step S102: Obtain the device identification of the device to be authenticated and the corresponding queued device list, the queued device list includes one or more queued devices that can be paired with the device to be authenticated respectively.
[0066] In this embodiment, the edge node is used to manage the edge devices within the jurisdiction, and the edge devices may be various types of IoT terminal devices. After each edge device is connected to the edge node, for the security of the entire edge network, the edge node needs to periodically authenticate each edge device to check whether the device is normal. The device identifier and the corresponding queued device list, the device identifier is used to uniquely identify an edge device, preferably a device ID. Wherein, the queued device list includes one or more queued...
Embodiment 2
[0097] Such as figure 2 As shown, this embodiment provides a device authentication method, which is applied to a teaming device, and the method includes:
[0098] Step S202: Receive the device identifier of the device to be authenticated sent by the edge node. The device identifier is that after the edge node obtains the device identifier of the device to be authenticated and the corresponding queued device list, it determines that the device and the device to be authenticated can be identified according to the queued device list. Sent in pairs;
[0099] Step S204: Send an authentication request to the device to be authenticated according to the received device ID, and the authentication request carries the device ID of the teaming device itself, so that after receiving the authentication request, the device to be authenticated, according to the received device ID and its own device ID performing calculations to obtain a first calculation result;
[0100] Step S206: Receive...
Embodiment 3
[0108] Such as image 3 As shown, this embodiment provides a device authentication device, which is set on an edge node, and the device includes:
[0109] The first obtaining module 12 is used to obtain the device identification of the device to be authenticated and the corresponding queued device list, and the queued device list includes one or more queued devices that can be paired with the device to be authenticated respectively;
[0110] The first sending module 14 is connected with the first obtaining module 12, and is used to send the device identification of the device to be authenticated to each of the teaming devices in the teaming device list, so that after the teaming device receives the device identification, it sends the device identification to the waiting device. The authentication device sends an authentication request, and the authentication request carries the device ID of the teaming device itself, and after the device to be authenticated receives the authen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


