Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for access authentication of an internet of things gateway

An Internet of Things gateway and access authentication technology, applied in the field of Internet of Things gateway access authentication methods and systems, can solve problems such as complex computing and storage capabilities, and reduced security.

Active Publication Date: 2018-04-27
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are two main types of problems in realizing the access of IoT devices based on the plug-and-play technology similar to the UPnP framework: 1) Before accessing, the user needs to configure the wireless channel for the IoT device in advance, and manually set the authentication information for wireless access. There is a threshold for users to access the wireless channel provided by the IoT gateway through wireless access authentication; but if the authentication information is not set, the security will be reduced; 2) UPnP protocol is a peer-to-peer structure protocol, Its protocol and accompanying authentication process are too complex for sensor-type IoT devices with weak computing and storage capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for access authentication of an internet of things gateway
  • A method and system for access authentication of an internet of things gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Embodiment 1. A method for access authentication of an Internet of Things gateway, such as figure 1 shown, including:

[0047] S110. After the Internet of Things device is turned on, scan the wireless channel of the corresponding access method according to its own wireless access method, select a wireless channel that meets the predetermined conditions, generate an Internet of Things special access password according to the predetermined rule to access the selected wireless channel, and connect IoT gateway, upload device description information;

[0048] S120. After the IoT gateway detects that an IoT device is connected, it blocks the communication of the IoT device to other devices or networks, performs authentication according to the device description information uploaded by the IoT device, and allows the IoT device if the authentication is successful. Device access, and open data communication between the IoT device and other devices or networks.

[0049]This emb...

Embodiment 2

[0113] Embodiment 2, an Internet of Things gateway access authentication system, comprising:

[0114] The access module is set in the IoT device, and is used to scan the wireless channel of the corresponding access mode according to its own wireless access mode after the IoT device is turned on, select the wireless channel that meets the predetermined conditions, and generate the dedicated network of the Internet of Things according to the predetermined rules. Access the password to access the selected wireless channel, connect to the IoT gateway, and upload device description information;

[0115] The authentication module is set in the Internet of Things gateway, and is used to block the communication of the Internet of Things device to other devices or networks after detecting that an Internet of Things device is connected to the Internet of Things gateway. According to the device description uploaded by the Internet of Things device If the authentication is successful, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an Internet of Things gateway access authentication method and system; the method includes: S110, after the Internet of Things device is turned on, scans the wireless channel of the corresponding access mode according to its own wireless access mode, and selects a wireless channel that meets the predetermined condition, According to predetermined rules, generate a dedicated access password for the Internet of Things to access the selected wireless channel, connect to the Internet of Things gateway, and upload device description information; S120. After the Internet of Things gateway detects that an Internet of Things device is connected, block the Internet of Things device from sending The communication of other devices or networks is authenticated according to the device description information uploaded by the IoT device. If the authentication is successful, the IoT device is allowed to access, and the data communication between the IoT device and other devices or networks is opened. The invention can facilitate the realization of plug-and-play access authentication of the Internet of things equipment.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a method and system for access authentication of an Internet of Things gateway. Background technique [0002] With the rapid development of the Internet of Things, there may be a large number of Internet of Things devices in users' homes in the future. In order to improve the user experience, on the one hand, these IoT devices need to be easily connected to the IoT gateway to achieve plug-and-play; Therefore, it is necessary to perform access authentication for IoT devices. [0003] At present, the research on plug-and-play of IoT devices is relatively weak. The plug-and-play of IoT devices is mainly based on a framework similar to UPnP (Universal Plug and Play) protocol; Access to the wireless channel provided by the IoT gateway, and then realize the access authentication and discovery of the IoT device through the process of service discovery and service request and resp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06H04W48/16
CPCH04W12/06H04W12/08H04W48/16
Inventor 毛峻岭盛明哲
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products