Check patentability & draft patents in minutes with Patsnap Eureka AI!

Terminal-based method and architecture for using security, monitoring and management of equipment account

A technology for managing terminals and equipment, applied in the direction of secure communication devices, digital transmission systems, electrical components, etc., can solve problems such as insufficient protection strength, unprotected equipment passwords of IoT devices, and failure to provide protection effects, etc., to increase usability And the effect of convenience and high safety

Pending Publication Date: 2022-06-17
GLOBAL WISDOM SOFTWARE TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The industry often uses its own dedicated system or manual operations to manage IoT device passwords, but there are still a large number of IoT devices whose device passwords are not protected at all, or the protection strength is seriously insufficient; in fact, even if a dedicated system is adopted, it is obvious that Unable to provide satisfactory protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal-based method and architecture for using security, monitoring and management of equipment account
  • Terminal-based method and architecture for using security, monitoring and management of equipment account
  • Terminal-based method and architecture for using security, monitoring and management of equipment account

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to illustrate the present invention more clearly, preferred embodiments are given and described in detail with the accompanying drawings as follows. figure 1 Shown is a network usage architecture 1 according to an embodiment of the present invention, including a decentralized network 10 , a device network 20 , a terminal device 30 , and an identity management system 40 .

[0038]The device network 20 includes a plurality of devices (not shown). The identity management system 40 is responsible for managing at least one digital identity of one of the devices allowed to use the device network 20 . In detail, each of the digital identities corresponds to a real user, and the user must pass authentication to confirm that the identity is correct, in order to obtain the digital identity to which it belongs, and then use the digital identity on the device network 20 through the digital identity. the device. In order to ensure the credibility of the authentication, ea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a framework for safe use, monitoring and terminal management of an equipment account, which are used for connecting and managing a plurality of equipment by using a decentralized network. The method comprises the following steps: applying for a decentralized identity in a decentralized network, binding the decentralized identity with a digital identity, and storing correspondingly generated binding information in the decentralized network; authorizing a device to which the digital identity is allowed to be connected and a specific account to which the device can be connected, and storing correspondingly generated authorization information in the decentralized network; if necessary, updating authentication information of the plurality of identities and storing the updated authentication information in the decentralized network; the authentication information is extracted from the decentralized network through a terminal device for authentication when the device is connected. According to the invention, higher security can be provided, and the usability and the convenience are also increased at the same time.

Description

technical field [0001] The present invention is related to the connection and management of network-connected devices; in particular, it refers to a method and structure for storing and reading authentication, management and use information by using a decentralized network, which can ensure the authentication required for user and device authentication actions Use security of information and equipment use process, so as to ensure the safety of equipment use. Background technique [0002] In the information age, news of hacker attacks has been heard from time to time. Although the methods are changing with each passing day, the main attack method is still through the theft of account passwords to achieve intrusion. Since most of the important devices in enterprises or organizations are accessed through remote connection through terminal devices, such an operation structure is easy for hackers to take advantage of. For example, in May 2020, many enterprises, including China N...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/0876
Inventor 李志宏罗杰陈志顺陈志忠
Owner GLOBAL WISDOM SOFTWARE TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More