Access authentication method and system for communication equipment of electric power internet of things
A technology of electric power Internet of Things and communication equipment, applied in the electric power field, can solve problems such as increasing system security risks and lack of authentication operations on the platform, and achieve the effect of ensuring and improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0048] Such as figure 1 As shown, a method for access authentication of power Internet of Things communication equipment includes:
[0049] After the communication device is connected to the authentication server, it sends an authentication request message recording device information to the authentication server;
[0050] After the aut...
Embodiment 2
[0066] This embodiment also provides an access authentication system for communication equipment of the Internet of Things, such as image 3 As shown, the specific scheme is as follows:
[0067] An access authentication system for electric power Internet of Things communication equipment, including communication equipment and an authentication server;
[0068] After the communication device is connected to the authentication server, it sends an authentication request message recording device information to the authentication server;
[0069] After the authentication server receives the authentication request message, it judges whether the authentication request message complies with the preset message permission rules, if not, it discards the authentication request message, and if so, executes the next step;
[0070] The authentication server judges whether the device information in the authentication request message matches the communication device information stored in the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com