Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things device identity verification method

An identity verification method and IoT device technology, applied in the field of Internet of Things identity verification, can solve problems such as forged, tampered or intercepted device data, and achieve the effects of saving construction costs, solving access problems, and ensuring legitimacy

Inactive Publication Date: 2018-08-17
CHENGDU PENGYE SOFTWARE
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Existing IoT devices and system platforms operate in a closed environment, and data exchange is carried out through confidential private protocols. With the rapid development of IoT devices and the rapid establishment of data collection platforms, the data exchange between platforms and devices has increased significantly. There are many types of IoT devices connected to the collection platform, and there are more and more manufacturers. In this case, an open data collection platform emerges as the times require. There is a risk of being forged, tampered with or intercepted. Therefore, how to verify whether the device uploading data is safe and legal is very important.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things device identity verification method
  • Internet of Things device identity verification method
  • Internet of Things device identity verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Such as figure 1 As shown, this embodiment provides a method for authenticating an IoT device, including:

[0046] S1: The verifying device conducts initial authentication of the identity of the device to be verified;

[0047] S2: The verification device receives the uploaded data of the device to be verified, and the uploaded data of the device to be verified includes a dynamic token;

[0048] S3: The verification device generates a dynamic verification token according to the uploaded data of the device to be verified, and verifies whether the dynamic token uploaded by the device to be verified is legal according to the generated dynamic verification token, and if so, determines that the device to be verified is a legal device, otherwise, It is determined that the device to be verified is an illegal device.

[0049] What needs to be explained here is that this embodiment can be used on a data collection platform, and can also be used on other data interaction platfor...

Embodiment 2

[0070] Such as Figure 4 As shown, this embodiment provides an IoT device identity verification method. Compared with the method provided in Embodiment 1, this method has more encryption links, specifically including:

[0071] P1: The verification device conducts initial authentication of the identity of the device to be verified;

[0072] P2: The verification device receives the uploaded data of the device to be verified, and the uploaded data of the device to be verified includes an encrypted data packet;

[0073] P3: The verification device generates a dynamic decryption token based on the uploaded data of the device to be verified, and uses the dynamic decryption token to decrypt the encrypted data packet uploaded by the device to be verified, and verifies whether the decrypted information is legal. If so, determine that the device to be verified is If the device is legal, otherwise, it is determined that the device to be verified is an illegal device.

[0074] What need...

Embodiment 3

[0096] Such as image 3 As shown, this embodiment provides an IoT device identity verification system, including a verification device and a device to be verified, and the verification device includes:

[0097] The first data communication unit: used to read the information of the device to be verified, and also used for the verification device to write information to the device to be verified;

[0098] The first data storage unit: used to store the information read by the data communication unit and the information generated by the authentication unit;

[0099] Device authentication unit: used to generate relevant information according to the information read by the data communication unit, write the generated relevant information into the device to be verified through the data communication unit, and store the generated relevant information in the data storage unit;

[0100] Device verification unit: used to dynamically verify whether the device to be verified is legal acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things device identity verification method. The method comprises the following steps: a verification device performs initial identity verification on a to-be-verified device; the verification device receives uploaded data of the to-be-verified device, wherein the uploaded data of the to-be-verified device comprises a dynamic token; and the verification devicegenerates a dynamic verification token according to the uploaded data of the to-be-verified device and verifies whether the dynamic token uploaded by the to-be-verified device is legal according to the generated dynamic verification token, if yes, judges the to-be-verified device as a legal device, or otherwise judges the to-be-verified device as an illegal device. According to the Internet of Things device identity verification method disclosed by the invention, the initial identity verification is performed on the device at first, the identity information of the device is confirmed in a dynamic verification mode, as the dynamic token or an encrypted data packet encrypted by the dynamic token, and the dynamic verification token or a dynamic decryption token need to be generated in everyverification process, a hacker cannot upload data by forging the data, thereby effectively ensuring the legitimacy of the Internet of Things device that uploads the data.

Description

technical field [0001] The invention relates to the field of Internet of Things identity verification, in particular to an Internet of Things identity verification method. Background technique [0002] Existing IoT devices and system platforms operate in a closed environment, and data exchange is carried out through confidential private protocols. With the rapid development of IoT devices and the rapid establishment of data collection platforms, the data exchange between platforms and devices has increased significantly. There are many types of IoT devices connected to the collection platform, and there are more and more manufacturers. In this case, an open data collection platform emerges as the times require. There is a risk of being forged, tampered with or intercepted. Therefore, how to verify whether the device uploading data is safe and legal is of great significance. Contents of the invention [0003] In view of this, the present invention provides an identity veri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3213H04L63/08
Inventor 张鹏黄万松
Owner CHENGDU PENGYE SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products