Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Dynamic Password Realization Method Under Unstable Wireless Signal

A dynamic password and wireless signal technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as interference, weak base station signal, unstable wireless signal, etc., to achieve effectiveness, prevent malicious manipulation, and improve equipment operation quality effect

Active Publication Date: 2021-01-08
广东蘑菇物联科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the industrial site where the electromechanical equipment is located often encounters situations where the on-site wireless signal is unstable (such as electromagnetic interference, weak base station signal), and the password cannot be issued to the equipment controller.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Dynamic Password Realization Method Under Unstable Wireless Signal
  • A Dynamic Password Realization Method Under Unstable Wireless Signal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] When the signal is unstable, the cloud will randomize 4 digits and try to download it several times without success; then the password will be generated according to the serial number of the IoT module + a specific algorithm. Here is an example:

[0056] (1) Cloud:

[0057] Step 1: The cloud obtains the serial number from the device controller through the IoT module, such as: 2010010001; (the serial number of the module is a ten-digit ID, and the serial number of each module will be different);

[0058] Step 2: Add the obtained serial number to a fixed 9-digit number, assuming that the fixed 9-digit number is: 123456789; then the serial number 2010010001+123456789= 2133466790; where 123456789 is the agreed value between the cloud and the controller, and this value can be passed through artificial modification;

[0059] Step 3: Take the 5th, 6th, 9th, and 10th digits and spell them into four digits; for example, the 5th digit of 2133466790 is 4, the 6th digit is 6, the ...

Embodiment 2

[0069] When the signal is unstable, the cloud will randomize 4 digits and try to download it several times without success; then the password will be generated according to the serial number of the IoT module + a specific algorithm. Here is an example:

[0070] (1) Cloud:

[0071] Step 1: The cloud obtains the serial number from the device controller through the IoT module, such as: 2010010001; (the serial number of the module is a ten-digit ID, and the serial number of each module will be different);

[0072] Step 2: Add a random 9-digit number to the obtained serial number, assuming that the 9-digit random password is: 123456789, 787645321; then select a set of data from the data each time, such as 123456789; then the password generation method is:

[0073] Serial number 2010010001+123456789= 2133466790;

[0074] Step 3: Take the 5th, 6th, 9th, and 10th digits and spell them into four digits; for example, the 5th digit of 2133466790 is 4, the 6th digit is 6, the 9th digit i...

Embodiment 3

[0084] When the signal is stable, the cloud generation method is as follows:

[0085] Step S01, triggering on the application side: when an electromechanical device needs to be operated, the user clicks on the application side to generate a dynamic password, and then calls the cloud data;

[0086] Step S02, the cloud generates a random dynamic password: the cloud generates a random 4-digit password through a password generation algorithm; wherein the dynamic code is a four-digit random number generated by the random method in the Math class of Java;

[0087] Step S03, the cloud issues the password to the IoT module: the cloud issues a 4-digit password to the IoT module through MQTT or HTTP, and the IoT module receives it through a wireless signal; after receiving it, the IoT module then passes the industrial communication Write to the device controller, when the signal is written successfully, the device can be turned on and working;

[0088] From the above, when the signal i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention belongs to the technical field of Internet of Things control, and discloses a method for implementing a dynamic password in the case of unstable wireless signals. Click on the application side to generate a dynamic password, then call the cloud data; step S02, the cloud generates a random dynamic password: the cloud generates a random 4-digit password through a password generation algorithm; the present invention is aimed at electromechanical equipment through dynamic code settings. When the on-site wireless signal is unstable, the effectiveness of the dynamic password mechanism is realized; in addition, through the implementation method of the dynamic password, the electromechanical equipment is prevented from being maliciously manipulated, the operation quality of the equipment is improved, and the safety of the electromechanical equipment is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things control, and in particular relates to a method for realizing a dynamic password in the case of unstable wireless signals. Background technique [0002] Electromechanical equipment widely exists in factory workshops, some of which have extremely high value or affect direct production, so if the equipment is not properly controlled, it will cause very large losses. For example: equipment damage, production stoppage, production of defective products and many other unfavorable losses. Generally, manufacturers will set a general factory password, but this password is a constant static password, so it is extremely unsafe. We use a number of combined technologies: Internet of Things, cloud computing technology, wireless communication, industrial communication to realize dynamic passwords to ensure the security of passwords. However, the industrial site where the electromechanical equipment i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/04
CPCH04W12/04H04W12/009
Inventor 李精华沈国辉
Owner 广东蘑菇物联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products