Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device access processing method, device access processing device and terminal

A technology of equipment access and processing methods, which is applied in the direction of security devices, user identity/authority verification, electrical components, etc., and can solve problems such as limitations, insufficient security, and lack of consideration

Active Publication Date: 2016-06-01
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method is to determine that the node to be accessed is close enough to the WBAN through the signal strength, so as to authenticate it, without considering that the attacker may place malicious attack nodes around the WBAN user (for example, in front of and behind the seat)
[0006] The above three authentication methods realize the authentication between the WBAN and the access device under certain conditions, but each has its own defects: or the authentication operation is cumbersome, or limited, or the security is not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device access processing method, device access processing device and terminal
  • Device access processing method, device access processing device and terminal
  • Device access processing method, device access processing device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to have a clearer understanding of the above objects, features and advantages of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0040] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0041] figure 1 A schematic flowchart of a method for processing device access according to an embodiment of the present invention is shown.

[0042] Such as figure 1 As shown, the method for proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a device access processing method, a processing device and a terminal. The processing method comprises following steps: when the terminal receives a device access request from a to-be-accessed device, sending a first random code to the to-be-accessed device; after the to-be-accessed device receives the first random code, calculating a first target key according to the first random code, a pre-stored second random code and a pre-stored first public key; sending the first target key to the terminal; receiving a second random code and the first target key from the to-be-accessed device; calculating a second target key according to the first random code, the second random code and a pre-stored second public key; judging whether the second target key and the first target key are the same; if the judging result is yes, allowing the to-be-accessed device to access a wireless body area network, or forbidding the to-be-accessed device to access the wireless body area network. The technical solution of the invention is general, is low in calculation quantity and can carry out security authentication to the access device in the wireless body area network efficiently.

Description

technical field [0001] The present invention relates to the technical field of terminal access authentication, in particular to a device access processing method, a device access processing device and a terminal. Background technique [0002] WBAN (Wireless Body Area Network, Wireless Body Area Network) is a short-distance wireless network centered on the human body. Specifically, it is a network attached to the human body. It consists of a set of small and movable sensors with communication functions and a body Composition of the main station. As an emerging technology, wireless body area network has very broad application prospects in the fields of medical treatment, health care, and consumer electronics. In order to prevent malicious nodes from accessing the WBAN and then attacking and destroying the WBAN, the devices accessing the WBAN must be authenticated. At present, in the existing technical solutions, there are mainly three authentication methods: [0003] 1) An ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W12/041
CPCH04W12/04H04W12/06H04L9/32
Inventor 钟焰涛傅文治蒋罗
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products