Access authentication method, authentication server and system based on MQTT protocol

A technology of authentication server and authentication method, applied in transmission systems, digital transmission systems, instruments, etc., can solve problems such as uselessness and spam, and achieve the effect of preventing confusion

Pending Publication Date: 2022-01-21
黑龙江航天信息有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the embodiment of the present invention provides an access authentication method, authentication server, and system based on the MQTT protocol to solve the problem that in the prior art, devices placed in public places are easy to be obtained by other people to connect, and a large number of The problem of useless spam

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method, authentication server and system based on MQTT protocol
  • Access authentication method, authentication server and system based on MQTT protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] like figure 1 As shown, this embodiment proposes an access authentication method based on the MQTT protocol, the method is executed by an authentication server, and the authentication server is an IDS4 authentication server. Specifically, the method includes:

[0028] S100. Receive a Token access authentication request sent by an MQTT client, where the Token includes a unique identifier of the client, valid time of the Token, and role information of the client.

[0029] The MQTT client includes a message publisher and a message subscriber. The message publishing end and the message subscribing end perform message publishing and obtain subscription messages pushed by the server respectively according to the subscription topic.

[0030] Further, the method further includes: assigning a unique identifier to the MQTT client device by the IDS4 authentication server.

[0031] In this embodiment, the access authentication request is generated based on the access key, the enc...

Embodiment 2

[0038] Corresponding to Embodiment 1 above, this embodiment proposes an authentication server, where the authentication server includes:

[0039] The authentication request receiving module is used to receive the Token access authentication request sent by the MQTT client, and the Token includes the unique identification of the client, the effective time of the Token and the role information of the client;

[0040] The client authentication module is used to authenticate the MQTT client according to the authentication request, verify whether the Token is valid according to the valid time of the Token, and compare whether the unique identifier of the authentication request and the unique identifier of the client in the Token Match and perform role verification. After the authentication is passed, a Token token containing role information is returned to the MQTT client to establish a connection with the MQTT client after the authentication is passed.

[0041] The functions perfo...

Embodiment 3

[0043] Corresponding to the above embodiments, this embodiment proposes a computer storage medium, which contains one or more program instructions, and one or more program instructions are used to be executed by an access authentication system based on the MQTT protocol As the method of embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an access authentication method based on an MQTT protocol, an authentication server and a system, a client obtains a corresponding role after being authenticated and authorized through an IDS4 (Identity Server 4) authentication server, on one hand, random access of the client is controlled, and on the other hand, the client is prevented from sending messages disorderly. The problem that the connection mode is easy to obtain by other people because the equipment is placed in a public place is fundamentally solved. And by adding an effective permission verification mechanism and sending role control, the disorder of the MQTT service caused by disordered message sending of the user is prevented.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of the Internet, in particular to an access authentication method, authentication server and system based on the MQTT protocol. Background technique [0002] The Internet of Things is not just a network, but a new ecological environment. The essence of what it describes is that more and more objects are connected together through the network and can be controlled by a single or multiple terminal devices. control and use. As we all know, the Internet of Things is a concept extended and expanded on the basis of the traditional Internet. The client extends and expands from the traditional computer to any item and item, and the item collects information through various sensors, and then passes through the computing device. Network information exchange and communication. However, the current mobile Internet is in its infancy and cannot provide reliable network guarantees in many cases....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40H04L67/12G16Y30/10
CPCH04L9/3213H04L63/0876H04L67/12G16Y30/10
Inventor 秦瑛代伟华丁振宁王巍李长城董少华
Owner 黑龙江航天信息有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products