Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment authentication method and device

A device authentication and device technology, applied in the network field, can solve the problems of heavy burden on edge nodes and large amount of calculation, and achieve the effect of reducing system load, reducing calculation load and improving security

Active Publication Date: 2021-08-20
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a device authentication method and device for the above-mentioned deficiencies in the prior art, to solve the problem that the existing device authentication method performs security authentication on each edge device managed by the edge node periodically, It is easy to cause the problem of excessive burden on edge nodes and large amount of calculation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method and device
  • Equipment authentication method and device
  • Equipment authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] This embodiment provides a device authentication method, which is applied to edge nodes, such as figure 1 As shown, the method includes:

[0065] Step S102: Obtain the device identification of the device to be authenticated and the corresponding queued device list, the queued device list includes one or more queued devices that can be paired with the device to be authenticated respectively.

[0066] In this embodiment, the edge node is used to manage the edge devices within the jurisdiction, and the edge devices may be various types of IoT terminal devices. After each edge device is connected to the edge node, for the security of the entire edge network, the edge node needs to periodically authenticate each edge device to check whether the device is normal. The device identifier and the corresponding queued device list, the device identifier is used to uniquely identify an edge device, preferably a device ID. Wherein, the queued device list includes one or more queued...

Embodiment 2

[0097] Such as figure 2 As shown, this embodiment provides a device authentication method, which is applied to a teaming device, and the method includes:

[0098] Step S202: Receive the device identifier of the device to be authenticated sent by the edge node. The device identifier is that after the edge node obtains the device identifier of the device to be authenticated and the corresponding queued device list, it determines that the device and the device to be authenticated can be identified according to the queued device list. Sent in pairs;

[0099] Step S204: Send an authentication request to the device to be authenticated according to the received device ID, and the authentication request carries the device ID of the teaming device itself, so that after receiving the authentication request, the device to be authenticated, according to the received device ID and its own device ID performing calculations to obtain a first calculation result;

[0100] Step S206: Receive...

Embodiment 3

[0108] Such as image 3 As shown, this embodiment provides a device authentication device, which is set on an edge node, and the device includes:

[0109] The first obtaining module 12 is used to obtain the device identification of the device to be authenticated and the corresponding queued device list, and the queued device list includes one or more queued devices that can be paired with the device to be authenticated respectively;

[0110] The first sending module 14 is connected with the first obtaining module 12, and is used to send the device identification of the device to be authenticated to each of the teaming devices in the teaming device list, so that after the teaming device receives the device identification, it sends the device identification to the waiting device. The authentication device sends an authentication request, and the authentication request carries the device ID of the teaming device itself, and after the device to be authenticated receives the authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a device authentication method and device, and the method comprises the steps: obtaining a device identifier of a to-be-authenticated device and a corresponding team-up device list, and the team-up device list comprises one or more team-up devices which can team up with the to-be-authenticated device in pairs; respectively sending the device identifier of the to-be-authenticated device to each team-closing device in the team-closing device list; receiving authentication results returned by the one or more team closing devices according to the first calculation result; and comprehensively judging the received authentication result to obtain a final authentication result of the to-be-authenticated equipment, and controlling the network connection of the to-be-authenticated equipment according to the final authentication result. According to the method and the device, the problems that the edge node is overloaded and the calculated amount is large because the existing device authentication method carries out security authentication on each edge device managed by the edge node at regular intervals through the edge node can be solved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a device authentication method and device. Background technique [0002] In the growing edge computing, the security protection of edge devices is a key issue in the development of edge computing. If the edge devices are attacked or changed, the data of the entire edge network may be stolen and used maliciously. [0003] However, the existing device authentication method is to regularly perform security authentication on each edge device managed by the edge node, which increases the system burden for the edge node with limited resources and has a large amount of calculation. Contents of the invention [0004] The technical problem to be solved by the present invention is to provide a device authentication method and device for the above-mentioned deficiencies in the prior art, to solve the problem that the existing device authentication method performs security authentication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/45
CPCH04L63/0876H04L63/10H04L67/1004G06F21/45
Inventor 程筱彪徐雷贾宝军杨双仕
Owner CHINA UNITED NETWORK COMM GRP CO LTD