CN102801722A - Internet of things authentication method and system - Google Patents
Internet of things authentication method and system Download PDFInfo
- Publication number
- CN102801722A CN102801722A CN2012102812476A CN201210281247A CN102801722A CN 102801722 A CN102801722 A CN 102801722A CN 2012102812476 A CN2012102812476 A CN 2012102812476A CN 201210281247 A CN201210281247 A CN 201210281247A CN 102801722 A CN102801722 A CN 102801722A
- Authority
- CN
- China
- Prior art keywords
- internet
- authentication information
- authentication
- accessory
- things equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an Internet of things authentication method. The method comprises the following steps: a, an Internet of things device generates first authentication information through a number of at least one part in the Internet of things device; b, the Internet of things device registers first authentication information to a management platform; c, the Internet of things device generates second authentication information to be sent to the management platform; and d, the management platform judges whether the second authentication information passes through the authentication through comparing whether the first authentication information is consistent with the second authentication information. according to the invention, by adopting a simple and feasibly authentication mode, the Internet of things device can be effectively authorized with less occupied data and without basically changing a hardware device; and when a plurality of Internet of things devices exists, the load of the management platform can be effectively reduced. Through authorizing the device, the security of the Internet of things device and the whole network can be effectively improved. Meanwhile, when hardware change exists in the Internet of things device, the method can be used for carrying out accurate judgment effectively.
Description
Technical field
The present invention relates to the Internet of Things field, more specifically, relate to the authentication method and the system that use in the Internet of Things.
Background technology
Internet of Things is the important component part of generation information technology.The English name of Internet of Things is " The Internet of things ".As its name suggests, Internet of Things is exactly " the Internet that the thing thing links to each other ".This has the two-layer meaning: the first, and the core and the basis of Internet of Things remain the Internet, are extension and the network of expansion on the basis, the Internet; The second, its user side extends and has expanded between any object and the object, carries out information exchange and communicates by letter.Therefore; The definition of Internet of Things is: through information sensing equipment such as radio frequency identification (RFID), infrared inductor, global positioning system, laser scanners; Agreement by agreement; Be connected any object with the Internet, carry out information exchange and communicate by letter, to realize a kind of network intellectuality identification, location, tracking, monitoring and the management of object.
" Internet of Things notion " is on the basis of " the Internet notion ", and its user side is extended and expands between any article and the article, carries out information exchange and a kind of network concept of communicating by letter.Its definition is: through information sensing equipment such as radio frequency identification (RFID), infrared inductor, global positioning system, laser scanners; Agreement by agreement; Be connected any article with the Internet; Carry out information exchange and communicate by letter, to realize a kind of network concept of intelligent identification, location, tracking, monitoring and management.
With reference to accompanying drawing 1, the USN high-level architecture of describing in Y.2002 advising with reference to ITU-T here, the principle according to information generation, transmission, processing and application can be divided into 4 layers to Internet of Things: perception identification layer, network layer, management platform and integrated application layer.
1) perception identification layer.
Sensing layer is made up of with the sensing net (passive sensor) that transducer fuses transducer and part, is in the bottom, and this also is most basic connection of Internet of Things and management object.The most in broad terms, transducer is the device that converts various non electrical quantities to electric weight, and non electrical quantity can be physical quantity, chemistry amount, biomass or the like.
Perception identification is the core technology of Internet of Things, is the tie of contact physical world and information world.The perception identification layer had both comprised that information such as radio frequency identification (RFID), wireless senser generated equipment automatically, comprised that also various smart electronics products are used for artificial generation information.RFID is the technology that can let article " lift up one's voice ": storing standard in the RFID label and have the information of interoperability, collecting CIS to them automatically through wireless data communication network, realizing the identification and the management of article.In addition, as a kind of emerging technology, wireless sensor network is mainly carried out extensive, long-term, real-time obtaining through various types of transducers to information such as physical property, ambient condition, behavior patterns.In the last few years, all kinds of electronic products of networking emerged in an endless stream, and smart mobile phone, PDA(Personal Digital Assistant), multimedia player (MP4), net book, notebook computer etc. are popularized rapidly, and people can be connected into the Internet whenever and wherever possible, sharing information.The variation of information generating mode is the key character that Internet of Things is different from other networks.
2) network layer.The main effect of this layer is to insert the Internet to lower floor's (perception identification layer) data, keeps supplying layer service and uses.The Internet and Next Generation Internet (comprising technology such as IPv6) are the core networks of Internet of Things, and the various wireless networks that are in the edge then provide network insertion service anywhere or anytime.Wireless wide area network comprises present mobile communications network and evolution technology (comprising 3G, the 4G communication technology) thereof, and network insertion service continuous in the broad range is provided.Wireless MAN comprises existing WiMAX technology (802.16 series standard), and metropolitan area scope (about 100 kms) high-speed data transmission service is provided.WLAN comprises widely popular WiFi (802.11 series standard) now, for the user on (family, campus, dining room, airport etc.) in certain zone provides network access service.Wireless Personal Network comprises bluetooth (802.15.1 standard), ZigBee communication protocols such as (802.15.4 standards).The characteristics of this type network are low-power consumption, low transmission rate, short distance, generally are used as fields such as the personal electric product is interconnected, industrial equipment control.Various dissimilar wireless networks are applicable to different environment, make a concerted effort to provide network insertion easily, are to realize the interconnected important foundation facility of thing thing.
3) management platform.Under the support of high-performance calculation and mass memory technology, management platform with large-scale data efficiently, organize reliably provides the support platform of intelligence for the upper strata sector application.Storage is the first step of information processing.Database Systems and the various mass memory technology that grow up thereafter comprise networking storage (like the data center), have been widely used in industries such as IT, finance, telecommunications, commercial affairs.In the face of magnanimity information, how effectively tissue and data query are key problems.Late 1990s is the new generation network information query technique sudden emergence of representative with the Web search engine, has nowadays become the important inlet in the internet information world.The main feature of management platform is " wisdom ".Had and enriched full and accurate data, " wisdom bursts out " means such as operational research theory, machine learning, data mining, expert system have had the more wide stage of putting to good use.In addition, information security and secret protection become more and more important.How to guarantee that data are not destroyed, are not revealed, do not become the significant challenge that Internet of Things faces by abuse.
4) integrated application layer.The Internet is used for realizing communicating by letter between the computer at first, and then develops into the user of connection with artificial main body, just advances towards interconnected this target of thing thing now.Be accompanied by this process; Earth-shaking variation has also taken place in network application; Be the file transfer of principal character, Email from service; Application to customer-centric like World Wide Web (WWW), ecommerce, video request program, game on line, social networks etc., develops into item tracing, environment sensing, intelligent logistics, intelligent transportation, intelligent grid etc. again.Network application quantity is increased sharply, and presents variation, scale, characteristics such as industry-specific.
Because the number of devices of Internet of Things is huge, and need in the middle of unspecific network, transmit, so how the equipment that identifies is carried out authentication, and then service is provided, be the current problem that presses for solution.Equipment through after the authentication can not only provide security guarantee, and can effectively alleviate the pressure of management platform.
In patent documentation CN102571338A, disclose a kind ofly, wherein used the method for node PKI, private key sending node certificate based on PKI technology point Internet of Things authentication method and system.But the certificate method of its use is comparatively complicated, requires node to have stronger data-handling capacity, is unfavorable for the control of cost.
In patent documentation CN102137069A, disclose a kind of Internet of Things Application and implementation method and system, disclose a kind of basic framework of Internet of Things, wherein the Internet of Things platform carries out authentication to user identity.
Obtain the authentication method of peak performance with the minimal data cost, the data volume that not only requires to take is little, and requires these data reliable, is difficult for distorting.It is the problem that the present invention faces that a kind of simple efficient and safe authentication method is provided.
Summary of the invention
In order to solve the deficiency of prior art, the present invention provides a kind of Internet of Things authentication method, comprises the steps:
A. Internet of Things equipment generates first authentication information through the numbering of at least one accessory in the said equipment;
B. Internet of Things equipment is registered first authentication information to management platform;
C. Internet of Things equipment generates second authentication information and sends to management platform;
Whether d. said management platform is consistent with said second authentication information through more said first, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Preferably, said step a. comprises following steps:
At least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
Preferably, said step b. comprises following steps: said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
Preferably, said step c comprises following steps: at least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates; Said Internet of Things equipment sends to management platform with second authentication information.
Preferably, first digital certificates are first authentication code, and second digital certificates are second authentication code, in the said steps d, through more said first whether consistent with said second authentication code, judge that whether second authentication code is through authentication.
Preferably, the numbering of said accessory, the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
Preferably, the numbering with said accessory is stored on the memory device of accessory.
Preferably, after said Internet of Things device fabrication finishes, i.e. execution in step b.; When perhaps said Internet of Things equipment uses for the first time, execution in step b..
Preferably, said Internet of Things equipment, when being connected into network at every turn, all execution in step c. and steps d..
Preferably, after accessory changes in the Internet of Things equipment, execution in step b. again.
Preferably, digital certificates have been adopted encryption measures, generated digital certificates through encrypting.
The present invention also provides a kind of Internet of things system, comprising:
Internet of Things equipment, the numbering through at least one accessory in the said equipment generates first authentication information; Said Internet of Things equipment is registered first authentication information to management platform; Said Internet of Things equipment generates second authentication information and sends to management platform;
Management platform through more said first whether consistent with said second authentication information, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Preferably, said Internet of Things equipment is numbered at least one accessory in the said Internet of Things equipment; From said at least one accessory, read said numbering; The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
Preferably, said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
Preferably, at least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates; Said Internet of Things equipment sends to management platform with second authentication information.
Preferably, said first digital certificates are first authentication code, and said second digital certificates are second authentication code, and whether management platform is consistent with said second authentication code through more said first, judges that whether second authentication code is through authentication.
Preferably, the numbering of said accessory, the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
Preferably, the numbering with said accessory is stored on the memory device of accessory.
Preferably, said Internet of Things equipment has adopted encryption measures to digital certificates, generates the digital certificates through encrypting.
Beneficial effect
The simple and easy to do authentication mode that the present invention adopts can carry out authentication to Internet of Things equipment effectively, and it is few to take data, need not change hardware device basically, when the Internet of Things number of devices is huge, can reduce the burden of management platform effectively.The fail safe that authentication can improve Internet of Things equipment and whole network effectively to the equipment process.When equipment generation hardware change, this authentication method can accurately be differentiated effectively simultaneously.
Description of drawings
Fig. 1 is existing Internet of Things basic structure sketch map;
Fig. 2 is the basic flow sheet of authentication method of the present invention;
Fig. 3 is the block diagram of Verification System of the present invention.
Embodiment
Internet of Things authentication method of the present invention below is described.
Referring to Fig. 2; Authentication method of the present invention comprises basic step: 101) generate first authentication information earlier; 102) first authentication information is registered in management platform; 103) second authentication information is sent to management platform, 104) in management platform authentication information is compared at last, judge whether through authentication.
Explain that at first the present invention generates the mode of digital certificates.
The digital certificates of equipment are that the numbering through the concrete accessory in the equipment generates.This numbering changes according to accessory is different.General Internet of Things equipment contains a plurality of accessories, and except the transducer accessory, the transfer of data accessory also can contain accessories such as processor.The present invention adopts numbering that multiple generating mode is arranged:
A) this numbering adopts the numbering that accessory carries, such as the sequence number that dispatches from the factory, and the PUK code that carries in the sim module, the MAC Address of network interface card, perhaps IMEI number of mobile phone or the like.
B) artificial numbering.Such as device A, in production equipment A, 3 accessories picking out are wherein numbered, and one is MCU, and one is communication module, and one is built-in SIM module.MCU numbering 01, communication module numbering 02, SIM module numbering 03.
The equipment of the numbering that the employing accessory carries does not need the extra memory device that adds again to store the numbering data specially.Because it is intrinsic that its numbering is an accessory.Can reduce the input of equipment aspect like this, help cuing down expenses.
Adopt the equipment of artificial numbering, need be within equipment with the number record that generates, so this accessory need carry memory function, perhaps extra interpolation memory device.The numbering of said accessory is stored on the memory device of accessory.The demand of this storage, data volume is little, adjusts voluntarily according to environment for use to get final product, as long as can store numbering.
Processor in the Internet of Things equipment reads the numbering of each accessory, generates the device specific digital certificates through numbering and pre-defined algorithm.
For example: comprise MCU, communication module, SIM module and power module such as device A.Select 3 accessories picking out wherein and number, one is MCU, and one is communication module, and one is built-in SIM module.MCU numbering 01, communication module numbering 02, SIM module numbering 03.Use above " 01 ", " 02 ", " 03 " to generate the specific electron certificate according to pre-defined algorithm.
Pre-defined algorithm below is described:
A) can be directly with encoding according to the data frame format of " 010203 "; Also can get second " 1 " of " 01 ", get first " 0 " of " 02 ", get second " 3 " of " 03 ", constitute digital certificates " 103 " according to predefined algorithm;
B) be binary code with the data conversion in " 01 ", " 02 ", " 03 ", get the 1st respectively, the 2nd, the 1st, constitute new digital certificates.The order of this extraction can be set through rule in advance.
C) also can adopt existing function,, ask cryptographic hash, different algorithms such as average like Fourier's function.
Above algorithm is full of for example, is not to be used to limit scope of the present invention, as long as through after the pre-defined algorithm, generate the distinctive unique digital certificates of this device A and get final product.Obviously the numbering that can get more accessory in actual use.Following the example of of numbering can be longer, also can adopt letter to wait other characters.
In addition, in realizing the pre-defined algorithm process, can consider safety measure, digital certificates are encrypted, can prevent people's altered data like this, falsely use equipment.Frame such as to " 010203 " carries out rsa encryption, perhaps symmetric key encryption algorithm DES.This encryption can be carried out in the process of pre-defined algorithm itself, also can after accomplishing digital certificates, digital certificates be encrypted.Those skilled in the art can select according to software and hardware condition at that time.
Below explanation the present invention registers the mode of digital certificates.
After production equipment A finished, manufacturer did not also sell equipment, comes into the market.For with product composition one cover rounded system, can before selling product, just device A be registered on management platform.The user does not just need to carry out again registration process after taking equipment like this.It should be noted that the user does not know the existence of this registration process, not representing just not needs this registration process.Only fulfil ahead of schedule by manufacturer.
Alternatively, manufacturer is based on certain reason, not the registered in advance device A.And by the user when using for the first time, accomplish registration process.Be example with the device A also, when it uses, connect electricity and network that at this time MCU can extract the numbering 01 of self, communication module numbering 02, SIM numbering 03 combines the digital certificates pre-defined algorithm to generate digital certificates then.
Said registration comprises the identifying information that is used for identification equipment A at least, and the digital certificates produced of device A.
The mode of authentication digital certificates of the present invention below is described.
The information of management platform receiving equipment A, and with its write storage device (being generally database).The information of device A comprises the identifying information of device A and the digital certificates of device A; The identifying information of the A that management platform is come according to transmission, and digital certificates, whether whether the identifying information that relatively receives is consistent with identifying information and the digital certificates originally registered with digital certificates, thereby judge through authentication.When inconsistent, authentication is not passed through, and does not carry out subsequent step.Such as feedback denial of service message.When unanimity, authentication is passed through, and then continues subsequent step.Receive service message such as sending.
Management platform can comprise following several kinds of modes to the processing of authentication information:
Direct digital certificates with the digital certificates that receive and original registration compare, and judge; Perhaps
When registration, just identifying information and digital certificates are carried out data processing, generate authentication code; When authentication, the digital certificates that receive are carried out identical data processing with identifying information, generate new authentication code; Judge through authentication code relatively is whether consistent whether authentication is passed through.
In actual use, all need regenerate digital certificates when equipment networks at every turn, carry out verification process; Also can be set at after networking and periodically carry out authentication, once such as authentication every day; Also can cause verification process, can initiate verification process according to the instruction that the operator imported such as equipment with certain conditions as trigger condition.
As alternate embodiment, there is discrete certificate server in the management platform, accomplish the function of aforesaid authentication digital certificates through certificate server.Those skilled in the art are understood that also said management platform can be through DBM, the processor module in the management platform, and perhaps one of associated components such as certificate server of platform or combination are accomplished.As long as can accomplish above-mentioned relatively arbitration functions.
When equipment after management platform was registered; If wherein any one accessory is modified or cancels; The certificate that can not Generate Certificate or generate owing to lack coding so changes and can't mate with the authentication information on the management platform, all can't login platform.Can not pass through authenticated device, management platform is not carried out subsequent step, and then application layer equipment also need not to connect, thereby reduces unnecessary spending.Certainly, also can, accessory carry out registration step again after changing, thereby through follow-up verification process.
At last,, the use system for carrying out said process is provided also among the application, has comprised referring to Fig. 3:
Internet of Things equipment, the numbering through at least one accessory in the said equipment generates first authentication information; Said Internet of Things equipment is registered first authentication information to management platform; Said Internet of Things equipment generates second authentication information and sends to management platform;
Management platform through more said first whether consistent with said second authentication information, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Preferably, said Internet of Things equipment is numbered at least one accessory in the said Internet of Things equipment; From said at least one accessory, read said numbering; The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
Preferably, said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
Preferably, at least one accessory in the said Internet of Things equipment is numbered; From said at least one accessory, read said numbering; The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates; Said Internet of Things equipment sends to management platform with second authentication information.
Preferably, said first digital certificates are first authentication code, and said second digital certificates are second authentication code, and whether management platform is consistent with said second authentication code through more said first, judges that whether second authentication code is through authentication.
Preferably, the numbering of said accessory, the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
Preferably, the numbering with said accessory is stored on the memory device of accessory.
Preferably, said Internet of Things equipment has adopted encryption measures to digital certificates, generates the digital certificates through encrypting.
Although through describing with reference to some embodiment of the present invention, the present invention is not limited to above-described embodiment in the present invention.Those skilled in the art can make variation and the modification to above-described embodiment under the enlightenment of above-mentioned technology.Scope of the present invention limits with reference to claim subsequently.
Claims (10)
1. an Internet of Things authentication method comprises the steps:
A. Internet of Things equipment generates first authentication information through the numbering of at least one accessory in the said equipment;
B. Internet of Things equipment is registered first authentication information to management platform;
C. Internet of Things equipment generates second authentication information and sends to management platform;
Whether d. said management platform is consistent with said second authentication information through more said first, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
2. the method for claim 1 is characterized in that, said step a. comprises following steps:
At least one accessory in the said Internet of Things equipment is numbered;
From said at least one accessory, read said numbering;
The numbering of said accessory according to pre-defined algorithm, is generated the first unique digital certificates.
3. method as claimed in claim 2 is characterized in that, said step b. comprises following steps:
Said management platform receives first authentication information of said Internet of Things equipment, and said management platform is registered said first authentication information.
4. method as claimed in claim 3 is characterized in that, said step c comprises following steps:
At least one accessory in the said Internet of Things equipment is numbered;
From said at least one accessory, read said numbering;
The numbering of said accessory according to said pre-defined algorithm, is generated the second unique digital certificates;
Said Internet of Things equipment sends to management platform with second authentication information.
5. method as claimed in claim 4 is characterized in that, said first digital certificates are first authentication code; Said second digital certificates are second authentication code; In the said steps d,, judge that whether second authentication code is through authentication through more said first whether consistent with said second authentication code.
6. the method for claim 1 is characterized in that, the numbering of said accessory, and the number that adopts accessory to carry, it carries number does not need special memory stores on accessory.
7. the method for claim 1 is characterized in that, the numbering of said accessory is stored on the memory device of accessory.
8. the method for claim 1 is characterized in that,
After said Internet of Things device fabrication finishes, i.e. execution in step b.; Perhaps
When said Internet of Things equipment uses for the first time, execution in step b..
9. the method for claim 1 is characterized in that,
Said Internet of Things equipment, when being connected into network at every turn, all execution in step c. and steps d..
10. Internet of things system comprises:
Internet of Things equipment, the numbering through at least one accessory in the said equipment generates first authentication information; Said Internet of Things equipment is registered first authentication information to management platform; Said Internet of Things equipment generates second authentication information and sends to management platform;
Management platform through more said first whether consistent with said second authentication information, judges that whether second authentication information is through authentication;
Wherein said first authentication information comprises the identifying information of said Internet of Things equipment at least, and first digital certificates of said Internet of Things equipment;
Said second authentication information comprises the identifying information of said Internet of Things equipment at least, and second digital certificates of said Internet of Things equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210281247.6A CN102801722B (en) | 2012-08-09 | 2012-08-09 | Internet of Things authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210281247.6A CN102801722B (en) | 2012-08-09 | 2012-08-09 | Internet of Things authentication method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102801722A true CN102801722A (en) | 2012-11-28 |
CN102801722B CN102801722B (en) | 2016-08-03 |
Family
ID=47200685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210281247.6A Expired - Fee Related CN102801722B (en) | 2012-08-09 | 2012-08-09 | Internet of Things authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102801722B (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103354506A (en) * | 2013-07-03 | 2013-10-16 | 南京邮电大学 | IOT service structure and service combining method |
TWI576779B (en) * | 2015-10-13 | 2017-04-01 | Nat Sun Yat-Sen Univ | Method and Method of Payment Authentication System for Internet of Things |
CN108055300A (en) * | 2017-12-05 | 2018-05-18 | 珠海格力电器股份有限公司 | Equipment access method, device and system |
CN108206760A (en) * | 2016-12-16 | 2018-06-26 | 南京联成科技发展股份有限公司 | A kind of safe O&M framework of industrial control system |
CN108270571A (en) * | 2017-12-08 | 2018-07-10 | 西安电子科技大学 | Internet of Things identity authorization system and its method based on block chain |
CN108696501A (en) * | 2017-03-31 | 2018-10-23 | 柯尼卡美能达美国研究所有限公司 | The IPv6 link local secure networks of internet of things equipment are protected using biometric secure |
WO2018227685A1 (en) * | 2017-06-16 | 2018-12-20 | 深圳市盛路物联通讯技术有限公司 | Method and system for secure access of terminal device to internet of things |
CN109347875A (en) * | 2018-11-29 | 2019-02-15 | 深圳力维智联技术有限公司 | Internet of things equipment, platform of internet of things and the method and system for accessing platform of internet of things |
CN109379387A (en) * | 2018-12-14 | 2019-02-22 | 成都三零嘉微电子有限公司 | Safety certification and data communication system between a kind of internet of things equipment |
WO2019153751A1 (en) * | 2018-02-07 | 2019-08-15 | 海信集团有限公司 | Terminal authentication method and device |
CN110445774A (en) * | 2019-07-24 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Safety protecting method, device and the equipment of IoT equipment |
US11070546B2 (en) | 2015-07-09 | 2021-07-20 | Nokia Technologies Oy | Two-user authentication |
TWI754464B (en) * | 2020-11-23 | 2022-02-01 | 中華電信股份有限公司 | Authentication system and method for interent of things device based on edge computing and edge authentication server thereof |
CN114079566A (en) * | 2020-08-05 | 2022-02-22 | 阿里巴巴集团控股有限公司 | Internet of things equipment authentication method, equipment and storage medium |
CN114710290A (en) * | 2022-06-06 | 2022-07-05 | 科大天工智能装备技术(天津)有限公司 | Safety certification method for intelligent greenhouse sensor equipment |
CN116192447A (en) * | 2022-12-20 | 2023-05-30 | 江苏云涌电子科技股份有限公司 | Multi-factor identity authentication method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1447269A (en) * | 2003-04-10 | 2003-10-08 | 深圳市深信服电子科技有限公司 | Certificate authentication system and method based on hardware characteristics |
CN101316167A (en) * | 2008-07-04 | 2008-12-03 | 宇龙计算机通信科技(深圳)有限公司 | Registration and login method of safety authentication, system and mobile terminal |
CN101964066A (en) * | 2010-09-17 | 2011-02-02 | 浙江大学 | Method for distributing electronic tag management client in Internet of things |
CN101969438A (en) * | 2010-10-25 | 2011-02-09 | 胡祥义 | Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things |
CN102012994A (en) * | 2010-07-09 | 2011-04-13 | 北京哈工大计算机网络与信息安全技术研究中心 | Method for interconnecting readers in internet of things and reader |
CN102137069A (en) * | 2010-01-27 | 2011-07-27 | 中兴通讯股份有限公司 | Method and system for realizing application of internet of things |
US20120079092A1 (en) * | 2009-12-28 | 2012-03-29 | Telefonaktiebolaget L M Ericsson (Publ) | Management of data flows between user equipment nodes and clusters of networked resource nodes |
-
2012
- 2012-08-09 CN CN201210281247.6A patent/CN102801722B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1447269A (en) * | 2003-04-10 | 2003-10-08 | 深圳市深信服电子科技有限公司 | Certificate authentication system and method based on hardware characteristics |
CN101316167A (en) * | 2008-07-04 | 2008-12-03 | 宇龙计算机通信科技(深圳)有限公司 | Registration and login method of safety authentication, system and mobile terminal |
US20120079092A1 (en) * | 2009-12-28 | 2012-03-29 | Telefonaktiebolaget L M Ericsson (Publ) | Management of data flows between user equipment nodes and clusters of networked resource nodes |
CN102137069A (en) * | 2010-01-27 | 2011-07-27 | 中兴通讯股份有限公司 | Method and system for realizing application of internet of things |
CN102012994A (en) * | 2010-07-09 | 2011-04-13 | 北京哈工大计算机网络与信息安全技术研究中心 | Method for interconnecting readers in internet of things and reader |
CN101964066A (en) * | 2010-09-17 | 2011-02-02 | 浙江大学 | Method for distributing electronic tag management client in Internet of things |
CN101969438A (en) * | 2010-10-25 | 2011-02-09 | 胡祥义 | Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103354506A (en) * | 2013-07-03 | 2013-10-16 | 南京邮电大学 | IOT service structure and service combining method |
CN103354506B (en) * | 2013-07-03 | 2016-09-28 | 南京邮电大学 | A kind of internet of things service framework and combinations of services method |
US11070546B2 (en) | 2015-07-09 | 2021-07-20 | Nokia Technologies Oy | Two-user authentication |
TWI576779B (en) * | 2015-10-13 | 2017-04-01 | Nat Sun Yat-Sen Univ | Method and Method of Payment Authentication System for Internet of Things |
CN108206760B (en) * | 2016-12-16 | 2020-11-17 | 南京联成科技发展股份有限公司 | Safe operation and maintenance architecture of industrial control system |
CN108206760A (en) * | 2016-12-16 | 2018-06-26 | 南京联成科技发展股份有限公司 | A kind of safe O&M framework of industrial control system |
CN108696501A (en) * | 2017-03-31 | 2018-10-23 | 柯尼卡美能达美国研究所有限公司 | The IPv6 link local secure networks of internet of things equipment are protected using biometric secure |
WO2018227685A1 (en) * | 2017-06-16 | 2018-12-20 | 深圳市盛路物联通讯技术有限公司 | Method and system for secure access of terminal device to internet of things |
CN108055300A (en) * | 2017-12-05 | 2018-05-18 | 珠海格力电器股份有限公司 | Equipment access method, device and system |
CN108055300B (en) * | 2017-12-05 | 2019-02-15 | 珠海格力电器股份有限公司 | Equipment access method, device and system |
CN108270571B (en) * | 2017-12-08 | 2019-10-11 | 西安电子科技大学 | Internet of Things identity authorization system and its method based on block chain |
CN108270571A (en) * | 2017-12-08 | 2018-07-10 | 西安电子科技大学 | Internet of Things identity authorization system and its method based on block chain |
WO2019153751A1 (en) * | 2018-02-07 | 2019-08-15 | 海信集团有限公司 | Terminal authentication method and device |
CN109347875A (en) * | 2018-11-29 | 2019-02-15 | 深圳力维智联技术有限公司 | Internet of things equipment, platform of internet of things and the method and system for accessing platform of internet of things |
CN109379387A (en) * | 2018-12-14 | 2019-02-22 | 成都三零嘉微电子有限公司 | Safety certification and data communication system between a kind of internet of things equipment |
CN109379387B (en) * | 2018-12-14 | 2020-12-22 | 成都三零嘉微电子有限公司 | Safety certification and data communication system between Internet of things equipment |
CN110445774A (en) * | 2019-07-24 | 2019-11-12 | 阿里巴巴集团控股有限公司 | Safety protecting method, device and the equipment of IoT equipment |
CN110445774B (en) * | 2019-07-24 | 2022-04-22 | 创新先进技术有限公司 | Security protection method, device and equipment for IoT (Internet of things) equipment |
CN114079566A (en) * | 2020-08-05 | 2022-02-22 | 阿里巴巴集团控股有限公司 | Internet of things equipment authentication method, equipment and storage medium |
TWI754464B (en) * | 2020-11-23 | 2022-02-01 | 中華電信股份有限公司 | Authentication system and method for interent of things device based on edge computing and edge authentication server thereof |
CN114710290A (en) * | 2022-06-06 | 2022-07-05 | 科大天工智能装备技术(天津)有限公司 | Safety certification method for intelligent greenhouse sensor equipment |
CN116192447A (en) * | 2022-12-20 | 2023-05-30 | 江苏云涌电子科技股份有限公司 | Multi-factor identity authentication method |
CN116192447B (en) * | 2022-12-20 | 2024-01-30 | 江苏云涌电子科技股份有限公司 | Multi-factor identity authentication method |
Also Published As
Publication number | Publication date |
---|---|
CN102801722B (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102801722A (en) | Internet of things authentication method and system | |
CN102801723A (en) | Access device and method for Internet of things | |
CN104495545B (en) | Electronic elevator maintenance supervision and management system and method for elevator maintenance based on dynamic two-dimensional codes | |
Chen | An IBE-based security scheme on internet of things | |
CN104885404B (en) | Method for mutual authentication between radio tag and reader | |
CN101853369B (en) | Random Harsh based two-way authentication method | |
CN102638446A (en) | Secure smart poster | |
CN109191033A (en) | Item Information retroactive method and system | |
Khowaja et al. | A secure data sharing scheme in community segmented vehicular social networks for 6G | |
CN104348908A (en) | Intelligent library system based on Internet of Things technology | |
CN105305615A (en) | Wireless test and data transmission system monitoring method | |
Zeng | A security framework for internet of things based on 4G communication | |
Pang et al. | Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard | |
CN105072636A (en) | Wireless testing and data transmission system | |
CN103377333A (en) | Virtual and real identity verification circuit, system and electronic consumption method | |
CN101789862A (en) | Encryption and decryption device and method based on gravity acceleration | |
CN103107888B (en) | The identity identifying method that the dynamic multi-attribute of facing moving terminal is multi-level | |
Kumar et al. | Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT) | |
CN103716164A (en) | Ultra-lightweight RFID mutual authentication method | |
CN103970895A (en) | Multimedia document processing system platform and method based on mobile terminal and cloud technology | |
CN104753898A (en) | Verification method, terminal and server | |
CN102509128B (en) | Security authentication method of radio-frequency identification system | |
CN107040363B (en) | Lightweight RFID ownership transfer method and system based on chaotic encryption | |
Jisha et al. | Rfid based security platform for internet of things in health care environment | |
Hsi et al. | Solving scalability problems on secure RFID grouping-proof protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 350001, No. 58, barracks, Gulou District, Fujian, Fuzhou Applicant after: Fujian Wulian World Information Technology Co.,Ltd. Address before: 350001, No. 431, building 1, Xinhua Plaza, No. 54, 162 East drum street, Drum Tower, Gulou District, Fujian, Fuzhou Applicant before: FUJIAN WULIAN WORLD INFORMATION TECHNOLOGY Co.,Ltd. |
|
COR | Change of bibliographic data | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160803 Termination date: 20210809 |
|
CF01 | Termination of patent right due to non-payment of annual fee |