Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method and device, equipment, server, storage medium and system

A technology for access equipment and access authentication, applied in the field of Internet of Things, can solve the problems of complex system structure, high cost of certificate issuance and maintenance, high difficulty in management and maintenance, and achieve the effect of reducing risks.

Pending Publication Date: 2022-05-13
CHENGDU SENSETIME TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the common device authentication mechanism in the general Internet of Things scenario has problems such as complex system structure and high difficulty in management and maintenance, while the public key certificate authentication mechanism has defects such as difficult certificate management, high cost of certificate issuance and maintenance, and high resource requirements for terminal devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method and device, equipment, server, storage medium and system
  • Access authentication method and device, equipment, server, storage medium and system
  • Access authentication method and device, equipment, server, storage medium and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The technical solution of the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of the present application.

[0045] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0046] In the following description, the use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating the description of the present application an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access authentication method and device, equipment, a server, a storage medium and a system.The method is applied to access equipment, and the method comprises the steps that registration is conducted through a registration API interface of equipment management service in an Internet of Things server; sending a registration authentication credential of the access equipment to the equipment management service through the registration API interface; receiving a first security credential sent by the equipment management service; wherein the first security credential is generated by the equipment management service under the condition that the registration authentication credential is successfully authenticated; signing identification information of the access equipment based on the first security credential to obtain a second security credential; and accessing the business system service in the Internet of Things server by using the second security credential.

Description

technical field [0001] The embodiment of the present application relates to the Internet of Things technology, and relates to but not limited to an access authentication method and device, device, server, storage medium and system. Background technique [0002] IoT (Internet of Things, Internet of Things) is an important part of the new generation of information technology. It is widely used in the integration of networks through communication perception technologies such as intelligent perception, recognition technology and pervasive computing. The third wave of the development of the world's information industry after the Internet. [0003] Currently, in the IoT scenario, IoT devices generally need to establish an IoT connection through an open public network. When a device is connected to the cloud-side system, security authentication must be performed to confirm the legal identity of the device. However, the common device authentication mechanism in the general Internet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L67/12
CPCH04L63/08H04L63/083H04L63/0876H04L9/3247H04L67/12
Inventor 雷震宇张帅伊帅
Owner CHENGDU SENSETIME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products