Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment authentication method, Internet of Things terminal equipment, electronic equipment and storage medium

An Internet of Things terminal and device authentication technology, which is applied to electrical components, digital transmission systems, instruments, etc., can solve problems such as complex design process, reduced verification efficiency, low computing power of terminal equipment and low memory, and achieve the effect of reducing investment

Pending Publication Date: 2022-07-29
北京中宇万通科技股份有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The design process of the scheme based on gateway and other hardware methods is complicated, and the laying cost is high; if it is moved to the terminal device side for verification, it will be limited by the low computing power of the terminal device and limited resources such as memory, resulting in a decrease in verification efficiency. Meet the practical application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment authentication method, Internet of Things terminal equipment, electronic equipment and storage medium
  • Equipment authentication method, Internet of Things terminal equipment, electronic equipment and storage medium
  • Equipment authentication method, Internet of Things terminal equipment, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purposes, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments These are some, but not all, embodiments of the present disclosure. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure.

[0038] In addition, the term "and / or" in this article is only an association relationship to describe associated objects, indicating that there can be three kinds of relationships, for example, A and / or B, it can mean that A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an equipment authentication method, Internet of Things terminal equipment, electronic equipment and a storage medium, and relates to the field of network security, in particular to the field of equipment authentication. The method comprises the following steps: the Internet of Things terminal equipment performs multiplication operation with a preset target S box based on identification data of the Internet of Things terminal equipment to obtain encrypted data, and sends the encrypted data to gateway equipment; the gateway device receives the encrypted data and decrypts the encrypted data based on a preset target S box to obtain decrypted data; the gateway device compares the decrypted data with pre-stored identification data of the Internet of Things terminal device; and if the comparison is successful, allowing the Internet of Things terminal device to access the Internet through the gateway device. In this way, the problems that the cost is high and practical application cannot be met in the implementation scheme of secure access of the terminal equipment can be solved, effective calculation can be independently completed without depending on external knowledge under the condition that the resources of the terminal equipment are limited, and the investment of hardware facilities such as a gateway can be reduced.

Description

technical field [0001] The present disclosure relates to the field of network security, and in particular, to the field of device authentication. Background technique [0002] Terminal devices in the Internet of Things need to access the Internet, and carry out information transmission and interaction based on Internet protocols. In order to ensure the security of terminal devices when accessing the Internet of Things, the most common technical solution for secure access of IoT terminal devices is to set up an access gateway at the Internet entrance, and the gateway will read the access gateway when the IoT terminal device is connected. Identity information, and then verify the validity of the identity of the IoT terminal device through an algorithm. [0003] The design process of the solution mainly based on hardware such as gateways is complicated, and the installation cost is high; if it is moved to the terminal device side for verification, it will be limited by the low...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G16Y40/50
CPCH04L63/0876H04L63/0428G16Y40/50
Inventor 宁宇鹏田稼泉田东波
Owner 北京中宇万通科技股份有限公司