Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things security authentication method and system, and readable medium

An Internet of Things and authentication technology, applied in the field of network security, can solve the problems of being easily invaded by illegal attacks, insecurity, and easy to cause serious consequences, and achieve the effect of ensuring safe and smooth execution, avoiding theft, and enhancing reliability

Inactive Publication Date: 2019-10-11
易联众智能(厦门)科技有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When an IoT terminal device is performing important services, if the smart terminal does not have a security mechanism or the security mechanism can be easily cracked, then the terminal device is easy to be remotely and illegally controlled, which is likely to cause serious consequences
[0003] The existing IoT system does not pay enough attention to business security
Existing IoT terminal devices either do not require authentication or are simply authenticated through static passwords when conducting business. These are extremely insecure and are very easy to be invaded by illegal attacks
The existing market lacks a dynamic authentication and an authentication method with a higher security level to ensure the safe and effective execution of services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security authentication method and system, and readable medium
  • Internet of Things security authentication method and system, and readable medium
  • Internet of Things security authentication method and system, and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] The present invention provides a security authentication method for the Internet of Things, such as Figure 1-Figure 3 As shown, the method includes: installing a key carrier on both the smart terminal of the Internet of Things and the smart gateway, and when the user performs remote operations on the smart terminal of the Internet of Thing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Internet of Things security authentication method and system, and a readable medium. The Internet of Things security authentication method comprises the following steps: performing security authentication on the Internet of Things; installing key carriers on the Internet of Things intelligent terminal and the intelligent gateway, when a user remotely operates the Internetof Things intelligent terminal, enabling the Internet of Things intelligent terminal and the intelligent gateway to carry out bidirectional identity authentication through the key carriers, and afterthe identities of the Internet of Things intelligent terminal and the intelligent gateway are successfully authenticated, allowing the user is to carry out related operation on the Internet of Thingsintelligent terminal. According to the Internet of Things security authentication method provided by the invention, bidirectional identity authentication is carried out on the Internet of Things intelligent terminal and the intelligent gateway in the Internet of Things, so that the Internet of Things intelligent terminal can be effectively prevented from accessing an illegal gateway, and the Internet of Things intelligent terminal is prevented from receiving a false operation instruction; and meanwhile, the illegal Internet of Things intelligent terminal can be prevented from accessing the intelligent gateway, the reliability of the source of the Internet of Things terminal equipment is enhanced, and safe and smooth execution of service is ensured.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to an Internet of Things security authentication method, system and readable medium. Background technique [0002] The Internet of Things (IOT) is the "Internet of Everything Connected". It is an extended and expanded network based on the Internet. It is a huge network formed by combining various information sensing devices with the Internet. Interconnection of people, machines and things. Nowadays, with the rapid development of 5G technology, the Internet of Everything has become possible, and the application of IoT scenarios is becoming more and more extensive, such as smart homes, smart hospitals, smart communities, etc., involving all aspects of life. When an IoT terminal device is performing important services, if the smart terminal does not have a security mechanism or the security mechanism can be easily cracked, then the terminal device is easily remotely a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W12/06
CPCH04W8/183H04W12/06
Inventor 郜恩光黄兆胜吴坚峰陈键魏琼楼仲启德洪建松贡敏琴念洪华陈志伟
Owner 易联众智能(厦门)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products