Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method of Internet-of-things equipment, authentication server and user equipment server

A technology of user equipment and server, which is applied in the field of Internet of Things communication, can solve problems such as insecurity, and achieve the effect of high security guarantee capability

Active Publication Date: 2021-11-16
GREE ELECTRIC APPLIANCES INC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the intelligent devices in the same local area network of the above-mentioned smart home system can call each other insecurely, the present invention provides an authentication method for Internet of Things devices, an authentication server, and a user equipment server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of Internet-of-things equipment, authentication server and user equipment server
  • Authentication method of Internet-of-things equipment, authentication server and user equipment server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example 1

[0049] Such as figure 1 As shown, an authentication method of an Internet of Things device, the authentication method is performed by the Internet of Things server in the following steps:

[0050] S101. Receive a network access request sent by a user equipment;

[0051] S102. According to the network access request, request the user equipment to obtain a summary label, the summary label includes three equipment labels carried by the user equipment, such as: Gree brand label, Intelligence smart device label, and Screen device label;

[0052] S103. Receive the three summary tags sent by the user equipment, and determine whether the summary tags meet the authentication parameters. When the user equipment has the above three summary tags, the authentication parameters are met, and receive the request from the user equipment to join the family group. If the authentication parameters are met, the process ends;

[0053] S104. When the user equipment satisfies the authentication par...

Embodiment example 2

[0063] Such as figure 2 As shown, an authentication method of an IoT device, the authentication method is performed by the user equipment in the following steps:

[0064] S201, the user equipment accesses the Internet of Things;

[0065] S202. Responding to the request of the Internet of Things to obtain a summary label, send the summary label to the Internet of Things according to the summary label carried by the user equipment, and let the Internet of Things judge whether the authentication parameters are satisfied. The summary label includes three devices carried by the user equipment. Labels, such as: Gree brand label, Intelligence smart device label, and Screen device label. The Internet of Things judges whether the user equipment meets the above three summary labels. If any summary label does not meet the authentication parameters, the process ends;

[0066] S203, receiving the authentication judgment result sent by the Internet of Things, and sending a request to join...

Embodiment example 3

[0080] An authentication method for an authentication server and a user equipment server, wherein each of the authentication server and the user equipment server includes a processor, a memory, and a transceiver unit, the memory is used to store computer instructions, and the processor is used to Executing the computer instructions stored in the memory to control the transceiver unit to send and receive signals, when the processor executes the computer instructions stored in the memory, the authentication server and the user equipment server are used to perform the following steps authentication method:

[0081] The user equipment server sends a request to join the Internet of Things to the authentication server;

[0082] The authentication server responds to the request to join the Internet of Things and according to the network access request, requests the user equipment server to obtain three summary labels, and the three summary labels include three equipment labels that c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication method of the Internet-of-things equipment comprises the following steps: receiving an abstract tag sent by user equipment, and judging whether the abstract tag meets an authentication parameter; acquiring whether a family group is established in the network according to the authentication judgment result; responding to the request that the user equipment joins in the family group, obtaining a matching identifier that the user equipment joins in the family group, and sending the matching identifier and a permission request to at least one device in the established family group; and receiving a feedback instruction of any equipment in the family group, and confirming a request of adding the user equipment into the family group and authentication and authority control among the equipment in the family group according to the feedback instruction. The devices except the smart home system are further screened through the abstract labels, mutual authorization, authentication confirmation and authority control between the devices are carried out by taking the matching identifiers as the identification identifiers, and the problem that mutual calling of the smart devices in the same local area network is lack of safety is solved.

Description

technical field [0001] The invention relates to the communication field of the Internet of Things, in particular to an authentication method of an Internet of Things device, an authentication server, and a user equipment server. Background technique [0002] With the rapid expansion of the Internet of Things industry, the number and types of Internet of Things devices are also growing rapidly. When a large number of Internet of Things devices are connected to the LAN to establish interconnection, there is no security authentication mechanism. As long as multiple devices join the same LAN at the same time, You can access, control and even call each other's screen. Therefore, in the local area network of the smart home system, if an external strange device obtains or cracks the home wireless network password, it can control the devices in the home network at will, and even call various devices on the device, such as cameras, microphones, etc., in the home LAN. The equipment p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3226H04L67/12H04L63/0807
Inventor 王玉莹
Owner GREE ELECTRIC APPLIANCES INC