Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method and system for communication equipment of electric power internet of things

A technology of electric power Internet of Things and communication equipment, applied in the electric power field, can solve problems such as increasing system security risks and lack of authentication operations on the platform, and achieve the effect of ensuring and improving safety

Pending Publication Date: 2022-01-04
CHINA SOUTHERN POWER GRID COMPANY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the existing Internet of Things is connected to communication devices, it is directly connected through interface communication, and the platform lacks corresponding authentication operations, which increases system security risks due to network security issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method and system for communication equipment of electric power internet of things
  • Access authentication method and system for communication equipment of electric power internet of things
  • Access authentication method and system for communication equipment of electric power internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] Such as figure 1 As shown, a method for access authentication of power Internet of Things communication equipment includes:

[0049] After the communication device is connected to the authentication server, it sends an authentication request message recording device information to the authentication server;

[0050] After the aut...

Embodiment 2

[0066] This embodiment also provides an access authentication system for communication equipment of the Internet of Things, such as image 3 As shown, the specific scheme is as follows:

[0067] An access authentication system for electric power Internet of Things communication equipment, including communication equipment and an authentication server;

[0068] After the communication device is connected to the authentication server, it sends an authentication request message recording device information to the authentication server;

[0069] After the authentication server receives the authentication request message, it judges whether the authentication request message complies with the preset message permission rules, if not, it discards the authentication request message, and if so, executes the next step;

[0070] The authentication server judges whether the device information in the authentication request message matches the communication device information stored in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a power internet of things communication equipment access authentication method, which comprises the following steps: after communication equipment is connected with an authentication server, an authentication request message is sent for recording equipment information to the authentication server; the authentication server judges whether the equipment information in the authentication request message is matched with communication equipment information stored in the authentication server; if yes, the next step is executed: the authentication server generates an asymmetric key pair and sends the asymmetric key pair to the communication equipment; the asymmetric key comprises a public key and a private key; the communication device generates an identification ciphertext and a key ciphertext by using the asymmetric key, and sends the generated identification ciphertext and key ciphertext to an authentication server; and the authentication server carries out decryption authentication on the identification ciphertext and the key ciphertext, the communication equipment passes the authentication under the condition that the decryption authentication is passed, and the authentication server sends an access acceptance response message to the communication equipment, otherwise, the authentication server sends an access denial response message to the communication equipment.

Description

technical field [0001] The present invention relates to the field of electric power technology, and more specifically, to a method and system for access authentication of electric power Internet of Things communication equipment. Background technique [0002] With the continuous development of power technology, the degree of automation and intelligence of related power equipment is getting higher and higher. By adding corresponding network access nodes, devices with different transmission protocols can achieve heterogeneous integration on the cloud and platform. It is not difficult to realize, that is, the Internet of Things that is often said in the industry. [0003] However, when the existing Internet of Things is connected to communication devices, it is directly connected by means of interface communication, and the platform lacks corresponding authentication operations, which increases the system security risk caused by network security issues. Contents of the invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/30G16Y10/35G16Y30/10
CPCH04L9/0625H04L9/302H04L63/08G16Y10/35G16Y30/10
Inventor 陈宝仁朱海龙洪丹轲王力张国翊
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products