CN102801722A - Internet of things authentication method and system - Google Patents

Internet of things authentication method and system Download PDF

Info

Publication number
CN102801722A
CN102801722A CN2012102812476A CN201210281247A CN102801722A CN 102801722 A CN102801722 A CN 102801722A CN 2012102812476 A CN2012102812476 A CN 2012102812476A CN 201210281247 A CN201210281247 A CN 201210281247A CN 102801722 A CN102801722 A CN 102801722A
Authority
CN
China
Prior art keywords
internet
authentication information
authentication
accessory
things equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102812476A
Other languages
Chinese (zh)
Other versions
CN102801722B (en
Inventor
于辉
林晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN WULIAN WORLD INFORMATION TECHNOLOGY Co Ltd
Original Assignee
FUJIAN WULIAN WORLD INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN WULIAN WORLD INFORMATION TECHNOLOGY Co Ltd filed Critical FUJIAN WULIAN WORLD INFORMATION TECHNOLOGY Co Ltd
Priority to CN201210281247.6A priority Critical patent/CN102801722B/en
Publication of CN102801722A publication Critical patent/CN102801722A/en
Application granted granted Critical
Publication of CN102801722B publication Critical patent/CN102801722B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an Internet of things authentication method. The method comprises the following steps: a, an Internet of things device generates first authentication information through a number of at least one part in the Internet of things device; b, the Internet of things device registers first authentication information to a management platform; c, the Internet of things device generates second authentication information to be sent to the management platform; and d, the management platform judges whether the second authentication information passes through the authentication through comparing whether the first authentication information is consistent with the second authentication information. according to the invention, by adopting a simple and feasibly authentication mode, the Internet of things device can be effectively authorized with less occupied data and without basically changing a hardware device; and when a plurality of Internet of things devices exists, the load of the management platform can be effectively reduced. Through authorizing the device, the security of the Internet of things device and the whole network can be effectively improved. Meanwhile, when hardware change exists in the Internet of things device, the method can be used for carrying out accurate judgment effectively.

Description

Internet of Things authentication method and system
Technical field
The present invention relates to the Internet of Things field, more specifically, relate to the authentication method and the system that use in the Internet of Things.
Background technology
Internet of Things is the important component part of generation information technology.The English name of Internet of Things is " The Internet of things ".As its name suggests, Internet of Things is exactly " the Internet that the thing thing links to each other ".This has the two-layer meaning: the first, and the core and the basis of Internet of Things remain the Internet, are extension and the network of expansion on the basis, the Internet; The second, its user side extends and has expanded between any object and the object, carries out information exchange and communicates by letter.Therefore; The definition of Internet of Things is: through information sensing equipment such as radio frequency identification (RFID), infrared inductor, global positioning system, laser scanners; Agreement by agreement; Be connected any object with the Internet, carry out information exchange and communicate by letter, to realize a kind of network intellectuality identification, location, tracking, monitoring and the management of object.
" Internet of Things notion " is on the basis of " the Internet notion ", and its user side is extended and expands between any article and the article, carries out information exchange and a kind of network concept of communicating by letter.Its definition is: through information sensing equipment such as radio frequency identification (RFID), infrared inductor, global positioning system, laser scanners; Agreement by agreement; Be connected any article with the Internet; Carry out information exchange and communicate by letter, to realize a kind of network concept of intelligent identification, location, tracking, monitoring and management.
With reference to accompanying drawing 1, the USN high-level architecture of describing in Y.2002 advising with reference to ITU-T here, the principle according to information generation, transmission, processing and application can be divided into 4 layers to Internet of Things: perception identification layer, network layer, management platform and integrated application layer.
1) perception identification layer.
Sensing layer is made up of with the sensing net (passive sensor) that transducer fuses transducer and part, is in the bottom, and this also is most basic connection of Internet of Things and management object.The most in broad terms, transducer is the device that converts various non electrical quantities to electric weight, and non electrical quantity can be physical quantity, chemistry amount, biomass or the like.
Perception identification is the core technology of Internet of Things, is the tie of contact physical world and information world.The perception identification layer had both comprised that information such as radio frequency identification (RFID), wireless senser generated equipment automatically, comprised that also various smart electronics products are used for artificial generation information.RFID is the technology that can let article " lift up one's voice ": storing standard in the RFID label and have the information of interoperability, collecting CIS to them automatically through wireless data communication network, realizing the identification and the management of article.In addition, as a kind of emerging technology, wireless sensor network is mainly carried out extensive, long-term, real-time obtaining through various types of transducers to information such as physical property, ambient condition, behavior patterns.In the last few years, all kinds of electronic products of networking emerged in an endless stream, and smart mobile phone, PDA(Personal Digital Assistant), multimedia player (MP4), net book, notebook computer etc. are popularized rapidly, and people can be connected into the Internet whenever and wherever possible, sharing information.The variation of information generating mode is the key character that Internet of Things is different from other networks.
2) network layer.The main effect of this layer is to insert the Internet to lower floor's (perception identification layer) data, keeps supplying layer service and uses.The Internet and Next Generation Internet (comprising technology such as IPv6) are the core networks of Internet of Things, and the various wireless networks that are in the edge then provide network insertion service anywhere or anytime.Wireless wide area network comprises present mobile communications network and evolution technology (comprising 3G, the 4G communication technology) thereof, and network insertion service continuous in the broad range is provided.Wireless MAN comprises existing WiMAX technology (802.16 series standard), and metropolitan area scope (about 100 kms) high-speed data transmission service is provided.WLAN comprises widely popular WiFi (802.11 series standard) now, for the user on (family, campus, dining room, airport etc.) in certain zone provides network access service.Wireless Personal Network comprises bluetooth (802.15.1 standard), ZigBee communication protocols such as (802.15.4 standards).The characteristics of this type network are low-power consumption, low transmission rate, short distance, generally are used as fields such as the personal electric product is interconnected, industrial equipment control.Various dissimilar wireless networks are applicable to different environment, make a concerted effort to provide network insertion easily, are to realize the interconnected important foundation facility of thing thing.
3) management platform.Under the support of high-performance calculation and mass memory technology, management platform with large-scale data efficiently, organize reliably provides the support platform of intelligence for the upper strata sector application.Storage is the first step of information processing.Database Systems and the various mass memory technology that grow up thereafter comprise networking storage (like the data center), have been widely used in industries such as IT, finance, telecommunications, commercial affairs.In the face of magnanimity information, how effectively tissue and data query are key problems.Late 1990s is the new generation network information query technique sudden emergence of representative with the Web search engine, has nowadays become the important inlet in the internet information world.The main feature of management platform is " wisdom ".Had and enriched full and accurate data, " wisdom bursts out " means such as operational research theory, machine learning, data mining, expert system have had the more wide stage of putting to good use.In addition, information security and secret protection become more and more important.How to guarantee that data are not destroyed, are not revealed, do not become the significant challenge that Internet of Things faces by abuse.
4) integrated application layer.The Internet is used for realizing communicating by letter between the computer at first, and then develops into the user of connection with artificial main body, just advances towards interconnected this target of thing thing now.Be accompanied by this process; Earth-shaking variation has also taken place in network application; Be the file transfer of principal character, Email from service; Application to customer-centric like World Wide Web (WWW), ecommerce, video request program, game on line, social networks etc., develops into item tracing, environment sensing, intelligent logistics, intelligent transportation, intelligent grid etc. again.Network application quantity is increased sharply, and presents variation, scale, characteristics such as industry-specific.
Because the number of devices of Internet of Things is huge, and need in the middle of unspecific network, transmit, so how the equipment that identifies is carried out authentication, and then service is provided, be the current problem that presses for solution.Equipment through after the authentication can not only provide security guarantee, and can effectively alleviate the pressure of management platform.
In patent documentation CN102571338A, disclose a kind ofly, wherein used the method for node PKI, private key sending node certificate based on PKI technology point Internet of Things authentication method and system.But the certificate method of its use is comparatively complicated, requires node to have stronger data-handling capacity, is unfavorable for the control of cost.
In patent documentation CN102137069A, disclose a kind of Internet of Things Application and implementation method and system, disclose a kind of basic framework of Internet of Things, wherein the Internet of Things platform carries out authentication to user identity.
Obtain the authentication method of peak performance with the minimal data cost, the data volume that not only requires to take is little, and requires these data reliable, is difficult for distorting.It is the problem that the present invention faces that a kind of simple efficient and safe authentication method is provided.
Summary of the invention
In order to solve the deficiency of prior art, the present invention provides a kind of Internet of Things authentication method, comprises the steps:
A. Internet of Things equipment generates first authentication information through the numbering of at least one accessory in the said equipment;
B. Internet of Things equipment is registered first authentication information to management platform;
C. Internet of Things equipment generates second authentication information and sends to management platform;
Whether d. said management platform is consistent with said second authentication information through more said first, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Preferably, said step a. comprises following steps:
At least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
Preferably, said step b. comprises following steps: said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
Preferably, said step c comprises following steps: at least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates; Said Internet of Things equipment sends to management platform with second authentication information.
Preferably, first digital certificates are first authentication code, and second digital certificates are second authentication code, in the said steps d, through more said first whether consistent with said second authentication code, judge that whether second authentication code is through authentication.
Preferably, the numbering of said accessory, the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
Preferably, the numbering with said accessory is stored on the memory device of accessory.
Preferably, after said Internet of Things device fabrication finishes, i.e. execution in step b.; When perhaps said Internet of Things equipment uses for the first time, execution in step b..
Preferably, said Internet of Things equipment, when being connected into network at every turn, all execution in step c. and steps d..
Preferably, after accessory changes in the Internet of Things equipment, execution in step b. again.
Preferably, digital certificates have been adopted encryption measures, generated digital certificates through encrypting.
The present invention also provides a kind of Internet of things system, comprising:
Internet of Things equipment, the numbering through at least one accessory in the said equipment generates first authentication information; Said Internet of Things equipment is registered first authentication information to management platform; Said Internet of Things equipment generates second authentication information and sends to management platform;
Management platform through more said first whether consistent with said second authentication information, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Preferably, said Internet of Things equipment is numbered at least one accessory in the said Internet of Things equipment; From said at least one accessory, read said numbering; The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
Preferably, said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
Preferably, at least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates; Said Internet of Things equipment sends to management platform with second authentication information.
Preferably, said first digital certificates are first authentication code, and said second digital certificates are second authentication code, and whether management platform is consistent with said second authentication code through more said first, judges that whether second authentication code is through authentication.
Preferably, the numbering of said accessory, the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
Preferably, the numbering with said accessory is stored on the memory device of accessory.
Preferably, said Internet of Things equipment has adopted encryption measures to digital certificates, generates the digital certificates through encrypting.
Beneficial effect
The simple and easy to do authentication mode that the present invention adopts can carry out authentication to Internet of Things equipment effectively, and it is few to take data, need not change hardware device basically, when the Internet of Things number of devices is huge, can reduce the burden of management platform effectively.The fail safe that authentication can improve Internet of Things equipment and whole network effectively to the equipment process.When equipment generation hardware change, this authentication method can accurately be differentiated effectively simultaneously.
Description of drawings
Fig. 1 is existing Internet of Things basic structure sketch map;
Fig. 2 is the basic flow sheet of authentication method of the present invention;
Fig. 3 is the block diagram of Verification System of the present invention.
Embodiment
Internet of Things authentication method of the present invention below is described.
Referring to Fig. 2; Authentication method of the present invention comprises basic step: 101) generate first authentication information earlier; 102) first authentication information is registered in management platform; 103) second authentication information is sent to management platform, 104) in management platform authentication information is compared at last, judge whether through authentication.
Explain that at first the present invention generates the mode of digital certificates.
The digital certificates of equipment are that the numbering through the concrete accessory in the equipment generates.This numbering changes according to accessory is different.General Internet of Things equipment contains a plurality of accessories, and except the transducer accessory, the transfer of data accessory also can contain accessories such as processor.The present invention adopts numbering that multiple generating mode is arranged:
A) this numbering adopts the numbering that accessory carries, such as the sequence number that dispatches from the factory, and the PUK code that carries in the sim module, the MAC Address of network interface card, perhaps IMEI number of mobile phone or the like.
B) artificial numbering.Such as device A, in production equipment A, 3 accessories picking out are wherein numbered, and one is MCU, and one is communication module, and one is built-in SIM module.MCU numbering 01, communication module numbering 02, SIM module numbering 03.
The equipment of the numbering that the employing accessory carries does not need the extra memory device that adds again to store the numbering data specially.Because it is intrinsic that its numbering is an accessory.Can reduce the input of equipment aspect like this, help cuing down expenses.
Adopt the equipment of artificial numbering, need be within equipment with the number record that generates, so this accessory need carry memory function, perhaps extra interpolation memory device.The numbering of said accessory is stored on the memory device of accessory.The demand of this storage, data volume is little, adjusts voluntarily according to environment for use to get final product, as long as can store numbering.
Processor in the Internet of Things equipment reads the numbering of each accessory, generates the device specific digital certificates through numbering and pre-defined algorithm.
For example: comprise MCU, communication module, SIM module and power module such as device A.Select 3 accessories picking out wherein and number, one is MCU, and one is communication module, and one is built-in SIM module.MCU numbering 01, communication module numbering 02, SIM module numbering 03.Use above " 01 ", " 02 ", " 03 " to generate the specific electron certificate according to pre-defined algorithm.
Pre-defined algorithm below is described:
A) can be directly with encoding according to the data frame format of " 010203 "; Also can get second " 1 " of " 01 ", get first " 0 " of " 02 ", get second " 3 " of " 03 ", constitute digital certificates " 103 " according to predefined algorithm;
B) be binary code with the data conversion in " 01 ", " 02 ", " 03 ", get the 1st respectively, the 2nd, the 1st, constitute new digital certificates.The order of this extraction can be set through rule in advance.
C) also can adopt existing function,, ask cryptographic hash, different algorithms such as average like Fourier's function.
Above algorithm is full of for example, is not to be used to limit scope of the present invention, as long as through after the pre-defined algorithm, generate the distinctive unique digital certificates of this device A and get final product.Obviously the numbering that can get more accessory in actual use.Following the example of of numbering can be longer, also can adopt letter to wait other characters.
In addition, in realizing the pre-defined algorithm process, can consider safety measure, digital certificates are encrypted, can prevent people's altered data like this, falsely use equipment.Frame such as to " 010203 " carries out rsa encryption, perhaps symmetric key encryption algorithm DES.This encryption can be carried out in the process of pre-defined algorithm itself, also can after accomplishing digital certificates, digital certificates be encrypted.Those skilled in the art can select according to software and hardware condition at that time.
Below explanation the present invention registers the mode of digital certificates.
After production equipment A finished, manufacturer did not also sell equipment, comes into the market.For with product composition one cover rounded system, can before selling product, just device A be registered on management platform.The user does not just need to carry out again registration process after taking equipment like this.It should be noted that the user does not know the existence of this registration process, not representing just not needs this registration process.Only fulfil ahead of schedule by manufacturer.
Alternatively, manufacturer is based on certain reason, not the registered in advance device A.And by the user when using for the first time, accomplish registration process.Be example with the device A also, when it uses, connect electricity and network that at this time MCU can extract the numbering 01 of self, communication module numbering 02, SIM numbering 03 combines the digital certificates pre-defined algorithm to generate digital certificates then.
Said registration comprises the identifying information that is used for identification equipment A at least, and the digital certificates produced of device A.
The mode of authentication digital certificates of the present invention below is described.
The information of management platform receiving equipment A, and with its write storage device (being generally database).The information of device A comprises the identifying information of device A and the digital certificates of device A; The identifying information of the A that management platform is come according to transmission, and digital certificates, whether whether the identifying information that relatively receives is consistent with identifying information and the digital certificates originally registered with digital certificates, thereby judge through authentication.When inconsistent, authentication is not passed through, and does not carry out subsequent step.Such as feedback denial of service message.When unanimity, authentication is passed through, and then continues subsequent step.Receive service message such as sending.
Management platform can comprise following several kinds of modes to the processing of authentication information:
Direct digital certificates with the digital certificates that receive and original registration compare, and judge; Perhaps
When registration, just identifying information and digital certificates are carried out data processing, generate authentication code; When authentication, the digital certificates that receive are carried out identical data processing with identifying information, generate new authentication code; Judge through authentication code relatively is whether consistent whether authentication is passed through.
In actual use, all need regenerate digital certificates when equipment networks at every turn, carry out verification process; Also can be set at after networking and periodically carry out authentication, once such as authentication every day; Also can cause verification process, can initiate verification process according to the instruction that the operator imported such as equipment with certain conditions as trigger condition.
As alternate embodiment, there is discrete certificate server in the management platform, accomplish the function of aforesaid authentication digital certificates through certificate server.Those skilled in the art are understood that also said management platform can be through DBM, the processor module in the management platform, and perhaps one of associated components such as certificate server of platform or combination are accomplished.As long as can accomplish above-mentioned relatively arbitration functions.
When equipment after management platform was registered; If wherein any one accessory is modified or cancels; The certificate that can not Generate Certificate or generate owing to lack coding so changes and can't mate with the authentication information on the management platform, all can't login platform.Can not pass through authenticated device, management platform is not carried out subsequent step, and then application layer equipment also need not to connect, thereby reduces unnecessary spending.Certainly, also can, accessory carry out registration step again after changing, thereby through follow-up verification process.
At last,, the use system for carrying out said process is provided also among the application, has comprised referring to Fig. 3:
Internet of Things equipment, the numbering through at least one accessory in the said equipment generates first authentication information; Said Internet of Things equipment is registered first authentication information to management platform; Said Internet of Things equipment generates second authentication information and sends to management platform;
Management platform through more said first whether consistent with said second authentication information, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Preferably, said Internet of Things equipment is numbered at least one accessory in the said Internet of Things equipment; From said at least one accessory, read said numbering; The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
Preferably, said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
Preferably, at least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates; Said Internet of Things equipment sends to management platform with second authentication information.
Preferably, said first digital certificates are first authentication code, and said second digital certificates are second authentication code, and whether management platform is consistent with said second authentication code through more said first, judges that whether second authentication code is through authentication.
Preferably, the numbering of said accessory, the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
Preferably, the numbering with said accessory is stored on the memory device of accessory.
Preferably, said Internet of Things equipment has adopted encryption measures to digital certificates, generates the digital certificates through encrypting.
Although through describing with reference to some embodiment of the present invention, the present invention is not limited to above-described embodiment in the present invention.Those skilled in the art can make variation and the modification to above-described embodiment under the enlightenment of above-mentioned technology.Scope of the present invention limits with reference to claim subsequently.

Claims (10)

1. an Internet of Things authentication method comprises the steps:
A. Internet of Things equipment generates first authentication information through the numbering of at least one accessory in the said equipment;
B. Internet of Things equipment is registered first authentication information to management platform;
C. Internet of Things equipment generates second authentication information and sends to management platform;
Whether d. said management platform is consistent with said second authentication information through more said first, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
2. the method for claim 1 is characterized in that, said step a. comprises following steps:
At least one accessory in the said Internet of Things equipment is numbered;
From said at least one accessory, read said numbering;
The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
3. method as claimed in claim 2 is characterized in that, said step b. comprises following steps:
Said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
4. method as claimed in claim 3 is characterized in that, said step c comprises following steps:
At least one accessory in the said Internet of Things equipment is numbered;
From said at least one accessory, read said numbering;
The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates;
Said Internet of Things equipment sends to management platform with second authentication information.
5. method as claimed in claim 4 is characterized in that, said first digital certificates are first authentication code; Said second digital certificates are second authentication code; In the said steps d,, judge that whether second authentication code is through authentication through more said first whether consistent with said second authentication code.
6. the method for claim 1 is characterized in that, the numbering of said accessory, and the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
7. the method for claim 1 is characterized in that, the numbering of said accessory is stored on the memory device of accessory.
8. the method for claim 1 is characterized in that,
After said Internet of Things device fabrication finishes, i.e. execution in step b.; Perhaps
When said Internet of Things equipment uses for the first time, execution in step b..
9. the method for claim 1 is characterized in that,
Said Internet of Things equipment, when being connected into network at every turn, all execution in step c. and steps d..
10. Internet of things system comprises:
Internet of Things equipment, the numbering through at least one accessory in the said equipment generates first authentication information; Said Internet of Things equipment is registered first authentication information to management platform; Said Internet of Things equipment generates second authentication information and sends to management platform;
Management platform through more said first whether consistent with said second authentication information, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
CN201210281247.6A 2012-08-09 2012-08-09 Internet of Things authentication method and system Expired - Fee Related CN102801722B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210281247.6A CN102801722B (en) 2012-08-09 2012-08-09 Internet of Things authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210281247.6A CN102801722B (en) 2012-08-09 2012-08-09 Internet of Things authentication method and system

Publications (2)

Publication Number Publication Date
CN102801722A true CN102801722A (en) 2012-11-28
CN102801722B CN102801722B (en) 2016-08-03

Family

ID=47200685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210281247.6A Expired - Fee Related CN102801722B (en) 2012-08-09 2012-08-09 Internet of Things authentication method and system

Country Status (1)

Country Link
CN (1) CN102801722B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354506A (en) * 2013-07-03 2013-10-16 南京邮电大学 IOT service structure and service combining method
TWI576779B (en) * 2015-10-13 2017-04-01 Nat Sun Yat-Sen Univ Method and Method of Payment Authentication System for Internet of Things
CN108055300A (en) * 2017-12-05 2018-05-18 珠海格力电器股份有限公司 Equipment access method, device and system
CN108206760A (en) * 2016-12-16 2018-06-26 南京联成科技发展股份有限公司 A kind of safe O&M framework of industrial control system
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
CN108696501A (en) * 2017-03-31 2018-10-23 柯尼卡美能达美国研究所有限公司 The IPv6 link local secure networks of internet of things equipment are protected using biometric secure
WO2018227685A1 (en) * 2017-06-16 2018-12-20 深圳市盛路物联通讯技术有限公司 Method and system for secure access of terminal device to internet of things
CN109347875A (en) * 2018-11-29 2019-02-15 深圳力维智联技术有限公司 Internet of things equipment, platform of internet of things and the method and system for accessing platform of internet of things
CN109379387A (en) * 2018-12-14 2019-02-22 成都三零嘉微电子有限公司 Safety certification and data communication system between a kind of internet of things equipment
WO2019153751A1 (en) * 2018-02-07 2019-08-15 海信集团有限公司 Terminal authentication method and device
CN110445774A (en) * 2019-07-24 2019-11-12 阿里巴巴集团控股有限公司 Safety protecting method, device and the equipment of IoT equipment
US11070546B2 (en) 2015-07-09 2021-07-20 Nokia Technologies Oy Two-user authentication
TWI754464B (en) * 2020-11-23 2022-02-01 中華電信股份有限公司 Authentication system and method for interent of things device based on edge computing and edge authentication server thereof
CN114079566A (en) * 2020-08-05 2022-02-22 阿里巴巴集团控股有限公司 Internet of things equipment authentication method, equipment and storage medium
CN114710290A (en) * 2022-06-06 2022-07-05 科大天工智能装备技术(天津)有限公司 Safety certification method for intelligent greenhouse sensor equipment
CN116192447A (en) * 2022-12-20 2023-05-30 江苏云涌电子科技股份有限公司 Multi-factor identity authentication method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1447269A (en) * 2003-04-10 2003-10-08 深圳市深信服电子科技有限公司 Certificate authentication system and method based on hardware characteristics
CN101316167A (en) * 2008-07-04 2008-12-03 宇龙计算机通信科技(深圳)有限公司 Registration and login method of safety authentication, system and mobile terminal
CN101964066A (en) * 2010-09-17 2011-02-02 浙江大学 Method for distributing electronic tag management client in Internet of things
CN101969438A (en) * 2010-10-25 2011-02-09 胡祥义 Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things
CN102012994A (en) * 2010-07-09 2011-04-13 北京哈工大计算机网络与信息安全技术研究中心 Method for interconnecting readers in internet of things and reader
CN102137069A (en) * 2010-01-27 2011-07-27 中兴通讯股份有限公司 Method and system for realizing application of internet of things
US20120079092A1 (en) * 2009-12-28 2012-03-29 Telefonaktiebolaget L M Ericsson (Publ) Management of data flows between user equipment nodes and clusters of networked resource nodes

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1447269A (en) * 2003-04-10 2003-10-08 深圳市深信服电子科技有限公司 Certificate authentication system and method based on hardware characteristics
CN101316167A (en) * 2008-07-04 2008-12-03 宇龙计算机通信科技(深圳)有限公司 Registration and login method of safety authentication, system and mobile terminal
US20120079092A1 (en) * 2009-12-28 2012-03-29 Telefonaktiebolaget L M Ericsson (Publ) Management of data flows between user equipment nodes and clusters of networked resource nodes
CN102137069A (en) * 2010-01-27 2011-07-27 中兴通讯股份有限公司 Method and system for realizing application of internet of things
CN102012994A (en) * 2010-07-09 2011-04-13 北京哈工大计算机网络与信息安全技术研究中心 Method for interconnecting readers in internet of things and reader
CN101964066A (en) * 2010-09-17 2011-02-02 浙江大学 Method for distributing electronic tag management client in Internet of things
CN101969438A (en) * 2010-10-25 2011-02-09 胡祥义 Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354506A (en) * 2013-07-03 2013-10-16 南京邮电大学 IOT service structure and service combining method
CN103354506B (en) * 2013-07-03 2016-09-28 南京邮电大学 A kind of internet of things service framework and combinations of services method
US11070546B2 (en) 2015-07-09 2021-07-20 Nokia Technologies Oy Two-user authentication
TWI576779B (en) * 2015-10-13 2017-04-01 Nat Sun Yat-Sen Univ Method and Method of Payment Authentication System for Internet of Things
CN108206760B (en) * 2016-12-16 2020-11-17 南京联成科技发展股份有限公司 Safe operation and maintenance architecture of industrial control system
CN108206760A (en) * 2016-12-16 2018-06-26 南京联成科技发展股份有限公司 A kind of safe O&M framework of industrial control system
CN108696501A (en) * 2017-03-31 2018-10-23 柯尼卡美能达美国研究所有限公司 The IPv6 link local secure networks of internet of things equipment are protected using biometric secure
WO2018227685A1 (en) * 2017-06-16 2018-12-20 深圳市盛路物联通讯技术有限公司 Method and system for secure access of terminal device to internet of things
CN108055300A (en) * 2017-12-05 2018-05-18 珠海格力电器股份有限公司 Equipment access method, device and system
CN108055300B (en) * 2017-12-05 2019-02-15 珠海格力电器股份有限公司 Equipment access method, device and system
CN108270571B (en) * 2017-12-08 2019-10-11 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
CN108270571A (en) * 2017-12-08 2018-07-10 西安电子科技大学 Internet of Things identity authorization system and its method based on block chain
WO2019153751A1 (en) * 2018-02-07 2019-08-15 海信集团有限公司 Terminal authentication method and device
CN109347875A (en) * 2018-11-29 2019-02-15 深圳力维智联技术有限公司 Internet of things equipment, platform of internet of things and the method and system for accessing platform of internet of things
CN109379387A (en) * 2018-12-14 2019-02-22 成都三零嘉微电子有限公司 Safety certification and data communication system between a kind of internet of things equipment
CN109379387B (en) * 2018-12-14 2020-12-22 成都三零嘉微电子有限公司 Safety certification and data communication system between Internet of things equipment
CN110445774A (en) * 2019-07-24 2019-11-12 阿里巴巴集团控股有限公司 Safety protecting method, device and the equipment of IoT equipment
CN110445774B (en) * 2019-07-24 2022-04-22 创新先进技术有限公司 Security protection method, device and equipment for IoT (Internet of things) equipment
CN114079566A (en) * 2020-08-05 2022-02-22 阿里巴巴集团控股有限公司 Internet of things equipment authentication method, equipment and storage medium
TWI754464B (en) * 2020-11-23 2022-02-01 中華電信股份有限公司 Authentication system and method for interent of things device based on edge computing and edge authentication server thereof
CN114710290A (en) * 2022-06-06 2022-07-05 科大天工智能装备技术(天津)有限公司 Safety certification method for intelligent greenhouse sensor equipment
CN116192447A (en) * 2022-12-20 2023-05-30 江苏云涌电子科技股份有限公司 Multi-factor identity authentication method
CN116192447B (en) * 2022-12-20 2024-01-30 江苏云涌电子科技股份有限公司 Multi-factor identity authentication method

Also Published As

Publication number Publication date
CN102801722B (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN102801722A (en) Internet of things authentication method and system
CN102801723A (en) Access device and method for Internet of things
CN104495545B (en) Electronic elevator maintenance supervision and management system and method for elevator maintenance based on dynamic two-dimensional codes
Chen An IBE-based security scheme on internet of things
CN104885404B (en) Method for mutual authentication between radio tag and reader
CN101853369B (en) Random Harsh based two-way authentication method
CN102638446A (en) Secure smart poster
CN109191033A (en) Item Information retroactive method and system
Khowaja et al. A secure data sharing scheme in community segmented vehicular social networks for 6G
CN104348908A (en) Intelligent library system based on Internet of Things technology
CN105305615A (en) Wireless test and data transmission system monitoring method
Zeng A security framework for internet of things based on 4G communication
Pang et al. Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard
CN105072636A (en) Wireless testing and data transmission system
CN103377333A (en) Virtual and real identity verification circuit, system and electronic consumption method
CN101789862A (en) Encryption and decryption device and method based on gravity acceleration
CN103107888B (en) The identity identifying method that the dynamic multi-attribute of facing moving terminal is multi-level
Kumar et al. Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)
CN103716164A (en) Ultra-lightweight RFID mutual authentication method
CN103970895A (en) Multimedia document processing system platform and method based on mobile terminal and cloud technology
CN104753898A (en) Verification method, terminal and server
CN102509128B (en) Security authentication method of radio-frequency identification system
CN107040363B (en) Lightweight RFID ownership transfer method and system based on chaotic encryption
Jisha et al. Rfid based security platform for internet of things in health care environment
Hsi et al. Solving scalability problems on secure RFID grouping-proof protocol

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 350001, No. 58, barracks, Gulou District, Fujian, Fuzhou

Applicant after: Fujian Wulian World Information Technology Co.,Ltd.

Address before: 350001, No. 431, building 1, Xinhua Plaza, No. 54, 162 East drum street, Drum Tower, Gulou District, Fujian, Fuzhou

Applicant before: FUJIAN WULIAN WORLD INFORMATION TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160803

Termination date: 20210809

CF01 Termination of patent right due to non-payment of annual fee