Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Equipment access method, data transmission method and computer readable storage medium

A device access and transmission method technology, applied in the field of communications, can solve the problems affecting the security and reliability of the device system, the low security of the plaintext transmission authentication vector, and the easy leakage of the shared symmetric key, so as to improve the security and reliability. Effectiveness of reliability, enhanced security, and guaranteed benefits

Pending Publication Date: 2021-10-01
厦门市思芯微科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Regarding the related technologies mentioned above, the inventor believes that the security of the plaintext transmission of the authentication vector is not high, and the shared symmetric key is easy to leak, so that the security of the device authentication access server is not high, which in turn affects the security of the device and the system and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment access method, data transmission method and computer readable storage medium
  • Equipment access method, data transmission method and computer readable storage medium
  • Equipment access method, data transmission method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, technical solutions and advantages of this application clearer, the following in conjunction with the attached Figure 1-6 And embodiment, this application is described in further detail. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0055] In traditional technology, due to the possibility of private connection and counterfeiting of data collection equipment, most systems cannot effectively identify the legitimacy of data collection equipment, and once the system is attacked by fake equipment, it is easy to cause the real data collection equipment to be unable to access and use At the same time, it will also bring great risks to the system, such as data leakage or distributed denial of service attacks, and even cause internal network paralysis; in view of the openness of the network, the reliability of data acquisition equipment ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a device access method, a data transmission method and a computer readable storage medium, and belongs to the technical field of communication, and the method comprises the steps that a data collection device sends device information of the data collection device to an intelligent terminal, the intelligent terminal carries out validity judgment according to the device information, and if the device information is valid, network distribution is carried out on the data collection device; the data acquisition device after network distribution sends a secret code of the ID of the data acquisition device to a second server, the second server performs verification according to a secret code white list, if the secret code belongs to the secret code white list, the secret code verification is passed, and the second server agrees the data acquisition device to send an access request to the first server; the data acquisition device passing the secret code verification sends a first server access request to the first server; and the first server decrypts and verifies the first server access request, and agrees the data acquisition device to access the first server if the verification is passed. The method and the device have the effect of improving the safety and the reliability of the equipment and the system.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular, relates to a device access method, a data transmission method, and a computer-readable storage medium. Background technique [0002] At present, with the development of Internet technology and the advent of the 5G era, more and more devices need to be connected to the network. As a new network technology, peer-to-peer (P2P) technology reduces server load and data traffic. It not only improves the release efficiency, but also saves the release cost, and thus has been widely used. [0003] In order to deal with the problem of weak point-to-point technology security protection, it is generally necessary to authenticate users and devices for data transmission or business communication. However, since most devices usually only use one identity to use the device, such as fingerprints, card identification, etc., the identity of the device cannot be guaranteed, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/06H04W12/08
CPCH04W12/068H04W12/08H04W12/03
Inventor 鲁鹏飞鲁霖曾宗云
Owner 厦门市思芯微科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products