Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device of multiple authentications on the basis of AllJoyn

A multi-authentication and authentication method technology, applied in the field of the Internet of Things, can solve the problems that the AllJoyn authentication method is not reliable and flexible, restricts the development of AllJoyn scalability and compatibility, and achieves the effect of enhancing scalability and compatibility

Inactive Publication Date: 2016-04-13
QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The lack of support for multiple authentication mechanisms makes AllJoyn's authentication methods unreliable and flexible, restricting the development of AllJoyn's scalability and compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device of multiple authentications on the basis of AllJoyn
  • Method and device of multiple authentications on the basis of AllJoyn
  • Method and device of multiple authentications on the basis of AllJoyn

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0036] like figure 1 As shown, in the multi-authentication method based on AllJoyn in this embodiment, the process executed on the client side includes: Step S10: Create an authentication ID in the key store, and the authentication ID includes the number of multiple authentications to be authenticated. Step S20: Establish an AllJoyn session with the server. Step S30: Negotiate with the server on the authentication method to reach an agreed authentication method. Step S40: complete the authentication of the number to be authenticated with the server in sequence. .

[0037] In the multi-authentication method of this embodiment, only one bus attachment needs to be created, which saves the resources of the AllJoyn system, maintains the original pattern of the AllJoyn system, facilitates developers to deploy multi-authentication mechanisms, and enhances the scalability and compatibility of the AllJoyn system authentication methods.

[0038] Preferably, the authentication ID is n...

no. 2 example

[0052] like image 3 As shown, in this embodiment, on the basis of the first embodiment, before step S30: negotiating the authentication method with the server and reaching an agreed authentication method, the multi-authentication method in this embodiment further includes: Step S60: according to the authentication level Sort the locally configured authentication methods of the client to form a sequence table of client authentication methods; correspondingly, in step S30: Negotiate with the server on the authentication method to reach an agreed authentication method, which specifically includes: Step S300: Set the client The authentication methods in the client authentication method order table are inquired from the server in turn from high to low, until the authentication method agreed with the server is reached.

[0053] On the basis of the second embodiment, preferably, step S300: inquire the authentication methods in the client authentication method sequence table from hig...

no. 3 example

[0055] On the basis of the second embodiment, step S40: complete the authentication of the quantity to be authenticated sequentially with the server, specifically including: calling the AuthChallenge method, and sending the authentication parameter as the verification code of this authentication request for the server to receive After the parameters are authenticated, it is compared with the local verification code of the server; under the condition that the verification code of this authentication matches the local verification code of the server, the confirmation signal sent by the server is received to complete this Authentication, start the next authentication until the authentication of the quantity to be authenticated is completed.

[0056] Further, after receiving the confirmation signal sent by the server, complete this authentication, start the next authentication until the number of authentications to be authenticated is completed, specifically including: after receiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and device of multiple authentications on the basis of AllJoyn. The method provided by the invention executing a flow at a client comprises: establishing authentication logos in a key store, the authentication logos including the number of multiple authentications to be authenticated; building an AllJoyn conversation with the client; consulting an authentication mode with the client to achieve a consistent authentication mode; completing the authentication of the authentications to be authenticated with the client to improve the scalability and the compatibility of the AllJoyn Security and provide a possibility for developers to use a multiple authentication mode in the frame of the AllJoyn.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an AllJoyn-based multi-authentication method and device. Background technique [0002] AllJoyn implements end-to-end authentication at the application layer through AllJoynSecurity to ensure communication security. AllJoynSecurity includes server-side Provider and client-side Consumer. Once the security authentication is completed between the Provider and Consumer, all methods, signals and attributes will be transmitted to each other in a secure manner. [0003] However, currently AllJoyn Security only supports a single authentication method. When two AllJoyn devices are mutually authenticated, even if the developer deploys a series of authentication mechanisms, AllJoyn will only choose the one with the best encryption performance for authentication. Other authentication methods are ignored. [0004] In a relatively complex situation, in order to ensure the secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L63/105H04L9/32
Inventor 王淼李永华尹珊
Owner QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products