WO2022116209A1 - Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement - Google Patents

Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement Download PDF

Info

Publication number
WO2022116209A1
WO2022116209A1 PCT/CN2020/134087 CN2020134087W WO2022116209A1 WO 2022116209 A1 WO2022116209 A1 WO 2022116209A1 CN 2020134087 W CN2020134087 W CN 2020134087W WO 2022116209 A1 WO2022116209 A1 WO 2022116209A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
key
random number
cloud platform
authentication
Prior art date
Application number
PCT/CN2020/134087
Other languages
English (en)
Chinese (zh)
Inventor
罗朝明
茹昭
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2020/134087 priority Critical patent/WO2022116209A1/fr
Priority to CN202080106961.4A priority patent/CN116420338A/zh
Publication of WO2022116209A1 publication Critical patent/WO2022116209A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present application relates to the field of wireless communications, and in particular, to a method, apparatus, device, and storage medium for access authentication of IoT devices.
  • IoT devices In the Internet of Things (IoT) technology, IoT devices usually involve cross-platform access scenarios, and need to access the cloud platform to issue access keys for IoT devices.
  • the IoT device In order to ensure the security of access, in the process of each result of the IoT device, before the access cloud platform issues the access key for the IoT device, the IoT device needs to be authenticated at least once. , to issue access keys for IoT devices.
  • the embodiments of the present application provide an access authentication method, apparatus, device, and storage medium for an Internet of Things device.
  • a method for authentication of IoT device access is provided, the method is performed by an access cloud platform, and the method includes:
  • the device key is set in the IoT device and the device cloud platform;
  • a method for authentication of IoT device access is provided, the method is performed by the IoT device, and the method includes:
  • the first random number is generated by the access cloud platform, and the device cloud platform that obtains the IoT device passes the device key and the first random number. provided after the first access key generated by a random number; the device key is set in the IoT device and the device cloud platform;
  • a method for authentication of IoT device access is provided, the method is performed by an access cloud platform, and the method includes:
  • the device information of the IoT device send the first random number to the device cloud platform corresponding to the IoT device;
  • the IoT device Receive an access authentication request sent by the IoT device, where the access authentication request includes a second access key, where the second access key is obtained by the IoT device according to the device key, the generated by the encrypted ciphertext and the first random number;
  • a method for authentication of IoT device access is provided, the method is performed by the IoT device, and the method includes:
  • the encrypted ciphertext is the encrypted ciphertext obtained by the access cloud platform through the first encryption key for the first access password.
  • the encrypted ciphertext obtained by encrypting the key; the first encryption key is the key generated by the device cloud platform of the Internet of Things device encrypting the first random number with the device key; the device key is set in the IoT device and the device cloud platform;
  • the first random number is encrypted by the device key to generate the second encryption key
  • an IoT device access authentication apparatus the apparatus is used for accessing a cloud platform, and the apparatus includes:
  • the device information acquisition module is used to acquire the device information of the IoT device
  • a first random number generating module for generating a first random number
  • a first random number sending module configured to send the first random number to the device cloud platform according to the device information of the IoT device
  • a first access key receiving module configured to receive the first access key generated by the device cloud platform through the device key and the first random number; the device key is set in the IoT device and in the device cloud platform;
  • a first random number providing module configured to provide the first random number to the Internet of Things device
  • the authentication request receiving module is configured to receive an access authentication request sent by the Internet of Things device, the access authentication request includes a second access key, and the second access key is the Internet of Things device according to generated by the device key and the first random number;
  • An access authentication module configured to perform access authentication on the IoT device according to the first access key and the second access key.
  • an apparatus for authentication of IoT device access is provided, the apparatus is used in an IoT device, and the apparatus includes:
  • a device information providing module configured to provide the device information of the IoT device to the access cloud platform
  • a first random number acquisition module configured to acquire a first random number provided by the access cloud platform, where the first random number is generated by the access cloud platform and obtained from the device cloud of the IoT device The platform is provided after the first access key generated by the device key and the first random number; the device key is set in the IoT device and the device cloud platform;
  • a second access key generation module configured to generate a second access key according to the device key and the first random number
  • an authentication request sending module configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first The access key and the second access key are used to perform access authentication on the IoT device.
  • an IoT device access authentication apparatus the apparatus is used for accessing a cloud platform, and the apparatus includes:
  • the device information acquisition module is used to acquire the device information of the IoT device
  • a random number and key generation module for generating a first random number and a first access key
  • a first random number sending module configured to send the first random number to a device cloud platform corresponding to the IoT device according to the device information of the IoT device;
  • a first encryption key receiving module configured to receive a first encryption key generated by the device cloud platform by encrypting the first random number with the device key
  • an encrypted ciphertext obtaining module configured to encrypt the first access key by using the first encryption key to obtain an encrypted ciphertext
  • a ciphertext and random number providing module configured to provide the encrypted ciphertext and the first random number to the IoT device
  • the authentication request receiving module is configured to receive an access authentication request sent by the Internet of Things device, the access authentication request includes a second access key, and the second access key is the Internet of Things device according to generated by the device key, the encrypted ciphertext and the first random number;
  • An access authentication module configured to perform access authentication on the IoT device according to the first access key and the second access key.
  • an apparatus for authentication of IoT device access is provided, the apparatus is used in an IoT device, and the apparatus includes:
  • a device information providing module configured to provide the device information of the IoT device to the access cloud platform
  • the ciphertext and random number acquisition module is used to acquire the encrypted ciphertext provided by the access cloud platform and the first random number generated by the access cloud platform; the encrypted ciphertext is obtained by the access cloud platform through the first random number.
  • the second encryption key generation module is used for encrypting the first random number by the device key to generate the second encryption key
  • a second access key obtaining module configured to decrypt the encrypted ciphertext by using the second encryption key to obtain a second access key
  • an authentication request sending module configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first The access key and the second access key are used to perform access authentication on the IoT device.
  • a device for accessing a cloud platform includes: a processor and a transceiver connected to the processor; wherein,
  • the processor is used for acquiring device information of the IoT device; generating a first random number;
  • the transceiver is configured to send the first random number to the device cloud platform according to the device information of the Internet of Things device; receive the first random number generated by the device cloud platform through the device key and the first random number; a first access key; the device key is set in the IoT device and the device cloud platform;
  • the processor configured to provide the first random number to the Internet of Things device
  • the transceiver is configured to receive an access authentication request sent by the Internet of Things device, where the access authentication request includes a second access key, and the second access key is based on the Internet of Things device. generated by the device key and the first random number;
  • the processor is configured to perform access authentication on the Internet of Things device according to the first access key and the second access key.
  • an IoT device comprising: a processor and a transceiver connected to the processor; wherein,
  • the processor is configured to provide device information of the Internet of Things device to the access cloud platform; obtain a first random number provided by the access cloud platform, where the first random number is generated by the access cloud platform generated and provided after obtaining the first access key generated by the device cloud platform of the IoT device through the device key and the first random number; the device key is set on the IoT device and in the device cloud platform;
  • the processor configured to generate a second access key according to the device key and the first random number
  • the transceiver is configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first
  • the access key and the second access key are used to perform access authentication on the IoT device.
  • a device for accessing a cloud platform includes: a processor and a transceiver connected to the processor; wherein,
  • the processor for acquiring device information of the IoT device; generating a first random number and a first access key;
  • the transceiver is configured to send the first random number to the device cloud platform corresponding to the Internet of Things device according to the device information of the Internet of Things device; the first encryption key generated by encrypting the first random number;
  • the processor is configured to encrypt the first access key by using the first encryption key to obtain encrypted ciphertext; provide the encrypted ciphertext and the first random number to the IoT devices;
  • the transceiver is configured to receive an access authentication request sent by the Internet of Things device, where the access authentication request includes a second access key, and the second access key is based on the Internet of Things device. generated by the device key, the encrypted ciphertext and the first random number;
  • the processor is configured to perform access authentication on the Internet of Things device according to the first access key and the second access key.
  • an IoT device comprising: a processor and a transceiver connected to the processor; wherein,
  • the processor is configured to provide the device information of the Internet of Things device to the access cloud platform; obtain the encrypted ciphertext provided by the access cloud platform and the first random number generated by the access cloud platform; the The encrypted ciphertext is the encrypted ciphertext obtained by the access cloud platform using the first encryption key to encrypt the first access key; the first encryption key is the device cloud platform of the IoT device through the device A key generated by encrypting the first random number with a key; the device key is set in the IoT device and the device cloud platform;
  • the processor is configured to encrypt the first random number with a device key to generate a second encryption key; decrypt the encrypted ciphertext with the second encryption key to obtain a second access key ;
  • the transceiver is configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first
  • the access key and the second access key are used to perform access authentication on the IoT device.
  • a computer-readable storage medium is provided, and a computer program is stored in the readable storage medium, and the computer program is loaded and executed by a processor to implement the method for authentication of access to an Internet of Things device as described in the above aspects .
  • a chip is provided, the chip includes a programmable logic circuit and/or program instructions, and when the chip runs on a network device, it is used to implement the Internet of Things described in the above aspect Device access authentication method.
  • a computer program product which when running on a processor of a network device, enables the network device to execute the method for authentication of IoT device access described in the above aspect.
  • the device key is preset in the IoT device and the device cloud platform.
  • the access cloud platform can obtain the first access key by interacting with the device cloud platform. and the first random number generated by itself, where the first access key is generated by the device key and the first random number, that is, after the access cloud platform provides the first random number to the IoT device , the IoT device can obtain the second access key for access through the locally stored device key, combined with the first random number, and use the second access key to request access to the cloud platform for access authentication.
  • the access cloud platform does not directly provide the access key to the IoT device, but also enables the IoT device to obtain the access key correctly, which can ensure security.
  • Device identity authentication can simplify the access authentication process, thereby improving the efficiency of IoT device access authentication while ensuring the security of access authentication.
  • FIG. 1 is a block diagram of an access authentication system provided by an exemplary embodiment of the present application.
  • FIG. 2 is a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application
  • FIG. 3 is a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application
  • FIG. 4 is a flowchart of access authentication in the network distribution process involved in the embodiment shown in FIG. 3;
  • FIG. 5 is a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application
  • FIG. 6 is a flow chart of access authentication after completion of the distribution network involved in the embodiment shown in FIG. 5;
  • FIG. 7 is a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application.
  • FIG. 8 is a flowchart of access authentication in the network distribution process involved in the embodiment shown in FIG. 7;
  • FIG. 9 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 10 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 11 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 12 is a structural block diagram of an access authentication method and apparatus provided by an exemplary embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a computer device provided by an exemplary embodiment of the present application.
  • Soft Wireless Access Point Soft Access Point, Soft AP
  • Soft AP is a technology that uses special software to realize AP function on non-AP devices through wireless network card. It can replace AP (Access Point, wireless access point) in wireless network, thereby reducing the cost of wireless networking.
  • Soft AP The hardware part of Soft AP is a standard wireless network card, which provides the same signal transfer, routing and other functions as AP through drivers. Compared with traditional AP, the cost of Soft AP is very low. Compared with ordinary wireless network cards, the integrated driver/software of Soft AP can provide great convenience for users who are new to the network.
  • Network distribution refers to a process in which a device to be connected to the network obtains network access information (such as a network identifier and an access key), and accesses the network based on the network access information.
  • network access information such as a network identifier and an access key
  • the distribution network based on Soft AP refers to the process that the device to be connected to the network requests network access information and accesses the network with the help of the distribution network device (such as a mobile phone) through the Soft AP function.
  • Scanning the code to configure the network means that the device to be connected to the Internet scans the graphic code (such as a two-dimensional code) through an image acquisition component (such as a camera) and decodes it, obtains the network access information carried in the graphic code, and connects based on the network access information. the process of entering the network.
  • the graphic code such as a two-dimensional code
  • an image acquisition component such as a camera
  • FIG. 1 shows a block diagram of an access authentication system provided by an exemplary embodiment of the present application.
  • the system may include: an Internet of Things device 12 , an access cloud platform 14 , and a device cloud platform 16 .
  • the IoT device 12 may be a smart device (such as VR (Virtual Reality, virtual reality) glasses, a smart wearable device, etc.), a terminal device, a sensor device, or other device with network access capability, which is not made in this embodiment of the present application. limited.
  • a smart device such as VR (Virtual Reality, virtual reality) glasses, a smart wearable device, etc.
  • terminal device such as a terminal device, a sensor device, or other device with network access capability, which is not made in this embodiment of the present application. limited.
  • the IoT devices 12 may be smart home devices such as smart TVs, smart speakers, smart air conditioners, smart lights, smart doors and windows, smart curtains, and smart sockets.
  • the number of IoT devices 12 may be combined with application requirements or access the cloud platform 14. The maximum number of devices that can be managed is determined.
  • the access cloud platform 14 includes an access point device 141 and an access cloud 142 .
  • the access point device 141 is used to provide network access services to the IoT device 12 , for example, the access point device 141 may be a wireless router, a wireless gateway device, and the like. In some scenarios, the access point device 141 may also be implemented as a terminal device, such as a mobile phone, a tablet computer, a wearable device, and the like.
  • the number of access point devices 141 may be one or multiple, which is not limited in this embodiment of the present application. Generally, for the consideration of resource saving and other aspects, the number of access point devices 141 is one .
  • the access cloud 142 may be a cloud server of the access point device 141 .
  • the access point device 141 and the access cloud 142 are connected through a wired or wireless network.
  • the IoT device 12 is developed based on the device cloud platform cloud 16 .
  • a communication link exists between the access cloud 142 and the device cloud platform 16 .
  • the access cloud 142 interacts with the device cloud platform 16 during the access process of the IoT device 12 .
  • the above-mentioned access cloud 142 and device cloud platform 16 may be implemented as a cloud computing resource pool in the field of cloud technology, and multiple types of virtual resources are deployed in the resource pool for external customers to choose and use.
  • the cloud computing resource pool mainly includes: computing devices (which are virtualized machines, including operating systems), storage devices, and network devices. It can be an independent physical server, a server cluster or a distributed system composed of multiple physical servers, or a cloud service, cloud database, cloud computing, cloud function, cloud storage, network service, cloud communication, intermediate Cloud servers for basic cloud computing services such as software services, domain name services, security services, Content Delivery Network (CDN), and big data and artificial intelligence platforms.
  • CDN Content Delivery Network
  • the system may further include a network distribution device 18, and the access cloud 142 and the network distribution device 18 are connected through a wired or wireless network.
  • the network distribution device 18 is a device for the user to operate to control the network distribution process of the IoT device 12 .
  • the distribution network device 18 may be implemented as a terminal device, such as a mobile phone, a tablet computer, a wearable device, and the like.
  • FIG. 2 shows a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application.
  • the method can be applied to the access authentication system shown in FIG. 1, and is performed interactively by the Internet of Things device 12, the access cloud platform 14 and the device cloud platform 16, and the method can include the following steps:
  • Step 201 the IoT device provides the device information of the IoT device to the access cloud platform; correspondingly, the access cloud platform obtains the device information of the IoT device.
  • the above-mentioned device information includes a device identification (Identity, ID) of the Internet of Things device, for example, a Media Access Control (Media Access Control, MAC) address of the Internet of Things device.
  • ID a device identification
  • MAC Media Access Control
  • the above-mentioned device information may also include indication information of the device cloud platform corresponding to the IoT device, for example, the device information also includes the manufacturer information of the IoT device, or the address of the device cloud platform, and so on.
  • the IoT device may provide the device information of the IoT device to the access cloud platform through the network configuration terminal during the network distribution process.
  • the IoT device provides the device information of the IoT device to the access cloud platform through the network distribution terminal in the Soft AP distribution method or the scanning code distribution method.
  • the IoT device may directly send the device information of the IoT device to the access cloud platform after completing the network configuration.
  • Step 202 the access cloud platform performs key generation interaction with the device cloud platform corresponding to the IoT device according to the device information of the IoT device, and obtains a first access key and key indication information; wherein the first access key and key indication information are obtained;
  • the access key and the key indication information are information associated with a device key; the device key is set in the IoT device and the device cloud platform.
  • the same device key is stored in the device cloud platform and the IoT device, respectively.
  • the access cloud platform When the access cloud platform assigns the access key to the IoT device, it interacts with the device cloud. In this process, in addition to generating the first access key, it also obtains key indication information, and the first access key is The key and the key indication information are associated by the device key, that is, the first access key can be obtained by encrypting or decrypting the key indication information by using the device key.
  • Step 203 the access cloud platform provides the key indication information to the IoT device; correspondingly, the IoT device obtains the key indication information provided by the access cloud platform.
  • the device cloud platform provides key indication information to the IoT device, but does not directly provide the access key.
  • the access cloud platform provides key indication information to the IoT device through the network configuration terminal.
  • the access cloud platform provides key indication information to the IoT device through the network distribution terminal in the Soft AP distribution method or the scanning code distribution method.
  • the access cloud platform may directly send key indication information to the IoT device.
  • Step 204 the IoT device generates a second access key according to the device key and the key indication information.
  • the IoT device Since the key indication information and the first access key are associated with the device key, after the IoT device obtains the key indication information, it can encrypt/decrypt the key indication information with the device key to obtain the encrypted key indication information. /Decryption is the above-mentioned second access key.
  • Step 205 the IoT device sends an access authentication request including the second access key to the access cloud platform; correspondingly, the access cloud platform receives the access authentication request sent by the IoT device.
  • Step 206 the access cloud platform performs access authentication on the Internet of Things device according to the first access key and the second access key.
  • the device key is preset in the IoT device and the device cloud platform, and the IoT device initiates access to the access cloud platform, and the access cloud platform passes The device cloud platform interacts to obtain the first access key and the key indication information, wherein the first access key and the key indication information are associated with the device key, that is, the access cloud platform will After the key indication information is provided to the IoT device, the IoT device can obtain the second access key for access through the locally stored device key, combined with the key indication information, and request the access key through the second access key. Access to the cloud platform for access authentication.
  • the access cloud platform does not directly provide the access key to the IoT device, but also enables the IoT device to obtain the access key correctly, which can ensure security and at the same time , because the identity authentication of the IoT device is not required in this process, the access authentication process can be simplified, thereby improving the efficiency of the access authentication of the IoT device while ensuring the security of the access authentication.
  • the above-mentioned first access key may be generated by the device cloud platform , and the above key indication information includes the first random number generated by the access cloud platform.
  • access the cloud platform to obtain device information of the IoT device; generate a first random number; send the first random number to the device cloud platform according to the device information of the IoT device; receive the device cloud platform A first access key generated by the device key and the first random number; the device key is set in the IoT device and the device cloud platform; the first random number is provided to the IoT device; receiving An access authentication request sent by the IoT device, where the access authentication request includes a second access key, and the second access key is generated by the IoT device according to the device key and the first random number ; According to the first access key and the second access key, perform access authentication on the Internet of Things device.
  • the IoT device provides the device information of the IoT device to the access cloud platform; obtains the first random number provided by the access cloud platform, the first random number is generated by the access cloud platform, and obtained
  • the device cloud platform of the IoT device is provided after the device key and the first access key generated by the first random number; the device key is set in the IoT device and the device cloud platform; according to the device key and the first random number to generate a second access key; send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform According to the first access key and the second access key, access authentication is performed on the Internet of Things device.
  • FIG. 3 shows a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application.
  • the method can be applied to the access authentication system as shown in FIG. 1, and is executed interactively by the Internet of Things device 12, the access cloud platform 14 and the device cloud platform 16, and the method can include the following steps:
  • Step 301 the IoT device provides the device information of the IoT device to the access cloud platform; correspondingly, the access cloud platform obtains the device information of the IoT device.
  • the device information can be provided to the access cloud platform.
  • the above-mentioned device information includes a device identification (Identity, ID) of the Internet of Things device, for example, a Media Access Control (Media Access Control, MAC) address of the Internet of Things device.
  • ID a device identification
  • MAC Media Access Control
  • the above-mentioned device information may also include indication information of the device cloud platform corresponding to the IoT device, for example, the device information also includes the manufacturer information of the IoT device, or the address of the device cloud platform, and so on.
  • the IoT device may provide the device information of the IoT device to the access cloud platform through the network configuration terminal during the network distribution process.
  • the IoT device provides the device information of the IoT device to the access cloud platform through the network distribution terminal in the Soft AP distribution method or the scanning code distribution method.
  • the IoT device may directly send the device information of the IoT device to the access cloud platform after completing the network configuration.
  • Step 302 accessing the cloud platform to generate a first random number.
  • the first random number is used as key indication information.
  • the access cloud platform generates the first random number corresponding to the IoT device through a preset random number generation algorithm.
  • the access cloud platform also generates an access authentication identifier of the IoT device.
  • the access cloud platform after the access cloud platform obtains the device information of the IoT device, it can generate an access authentication identifier for the IoT device, and the access authentication identifier is used to identify when the IoT device initiates access the IoT device.
  • the access cloud platform also generates a device registration code of the IoT device.
  • the access cloud platform may also generate a corresponding device registration code for the IoT device, and the device registration code is used as an additional or auxiliary access authentication information when the IoT device initiates access .
  • Step 303 the access cloud platform sends the first random number to the device cloud platform according to the device information of the IoT device; correspondingly, the device cloud platform receives the first random number.
  • the access cloud platform may determine the device cloud platform corresponding to the IoT device according to the device information of the IoT device, and send the first random number to the determined device cloud platform.
  • the access cloud platform can use the device manufacturer information to determine the address/interface of the device cloud platform corresponding to the IoT device (for example, through the device The vendor information looks up the table to obtain the address/interface of the device cloud platform), and sends the above-mentioned first random number to the device cloud platform through the determined address/interface.
  • Step 304 the device cloud platform generates a first access key by using the device key of the IoT device and the first random number.
  • the above-mentioned device cloud platform encrypts the first random number through the device key corresponding to the IoT device to generate the first access key.
  • the device manufacturer may preset a device key for the IoT device, and the device key is set in the IoT device before the IoT device leaves the factory. At the same time, the device manufacturer also sets the device corresponding to the IoT device
  • the device key of the IoT device is stored in the cloud platform, for example, the corresponding relationship between the device identifier (eg, MAC address) of the IoT device and the device key is stored in the device cloud platform.
  • Step 305 the device cloud platform returns the first access key to the access cloud platform, and the access cloud platform receives the first access key.
  • the access cloud platform receives the first access key generated by the device cloud platform by encrypting the first random number with the device key.
  • the access cloud platform further establishes an association relationship between the above-mentioned access authentication identifier and the first access key.
  • the access cloud platform may pre-establish an association table between the access authentication identifier and the access key. Whenever the access cloud platform generates an access authentication identifier for an IoT device and obtains the first access key, the access authentication identifier of the IoT device and the first access key are stored in the association table correspondingly , so that it can be queried and used in the subsequent access authentication process.
  • Step 306 the access cloud platform provides the first random number to the IoT device, and accordingly, the IoT device obtains the first random number provided by the access cloud platform.
  • the access cloud platform delivers key indication information to the IoT device that requires the device key processing to obtain the access key, rather than directly delivering the access key, thereby ensuring that the key is downloaded hair security.
  • the access cloud platform also provides the access authentication identifier to the IoT device; correspondingly, the IoT device obtains the access authentication identifier provided by the access cloud platform.
  • the access cloud platform also provides the device registration code to the IoT device; correspondingly, the IoT device obtains the device registration code provided by the access cloud platform.
  • the access cloud platform also provides the access authentication identifier and the device registration code to the IoT device; correspondingly, the IoT device obtains the access authentication identifier and device provided by the access cloud platform registration code.
  • Step 307 the IoT device generates a second access key by using the device key and the first random number.
  • the IoT device encrypts the first random number with the device key to generate the second access key.
  • the IoT device after the IoT device obtains the key indication information sent by the access cloud platform (that is, the above-mentioned first random number), it can encrypt the first random number according to the device key stored by itself. to obtain the second access key.
  • the key indication information sent by the access cloud platform that is, the above-mentioned first random number
  • the device cloud platform encrypts the first random number to obtain the encryption algorithm used for the first access key
  • the IoT device encrypts the first random number with the device key to obtain the second encryption algorithm.
  • the encryption algorithm used for the access key is the same.
  • the IoT device needs the locally stored device key to process the key indication information to obtain the access key, that is, only the IoT device with a specific identity can obtain the correct access key, Therefore, the identity authentication in the access key distribution process is realized without the need for an additional authentication process, thereby ensuring the security of the key distribution and reducing the complex process of authentication.
  • Step 308 the IoT device sends an access authentication request including the second access key to the access cloud platform; correspondingly, the access cloud platform receives the access authentication request sent by the IoT device.
  • the access cloud platform sends an access authentication request including the second access key and the access authentication identifier to the access cloud platform.
  • the access cloud platform sends an access authentication request including the second access key and the device registration code to the access cloud platform.
  • the access cloud platform sends an access authentication request including the second access key, the access authentication identifier and the device registration code to the access cloud platform.
  • Step 309 the access cloud platform performs access authentication on the IoT device according to the first access key and the second access key.
  • the access cloud platform establishes a Transport Layer Security (Transport Layer Security, TLS)/Datagram Transport Layer Security (Datagram) protocol according to the first access key and the second access key.
  • Transport Layer Security, DTLS) pre-shared key (Pre-Shared Key, PSK) method to establish and authenticate the data connection of IoT devices.
  • the access cloud platform can use the second access key in the request as the PSK to match the first access key. If they match, the access authentication is confirmed to be successful, and a TLS/DTLS connection is established.
  • the access cloud platform queries the above association relationship according to the access authentication identifier carried in the access authentication request, and obtains the first access key; and according to the queried first access key and the The second access key is used to authenticate the access of the IoT device.
  • the access cloud platform establishes a secure data connection with the IoT device through the TLS/DTLS pre-shared key PSK method according to the device registration code carried in the access authentication request;
  • the access key and the second access key are used for one-way or two-way challenge authentication.
  • the IoT device sends the random value S1 and the verification value X1 generated by using the second access key to the access cloud platform, and the access cloud platform uses the first access key and the random value S1 to generate the verification value X2, and the verification value X2 is generated with the first access key and the random value S1.
  • X1 is compared; at the same time, the access cloud platform sends the random value S2 and the verification value X3 generated with the first access key to the IoT device, and the IoT device uses the second access key and the random value S2 to generate the verification value X4 Come and compare with X3.
  • the access cloud platform establishes a secure data connection with the IoT device in an anonymous way through TLS/DTLS; Challenge authentication.
  • FIG. 4 shows a flowchart of access authentication in the network distribution process involved in the embodiment of the present application.
  • the access authentication process of IoT devices is as follows:
  • the IoT device broadcasts the beacon frame or displays the QR code; the distribution network device obtains the device information of the IoT device through the Soft AP discovery or code scanning method.
  • the distribution network device can receive the beacon frame broadcast by the IoT device through Soft AP discovery, and parse the Service Set Identifier (SSID)/Basic Service Set Identifier (BSSID) in the beacon frame. / Manufacturer-defined information element (Information Element, IE) to obtain device information of the IoT device, for example, the MAC address of the IoT device (denoted as ID1, corresponding to the device identifier in the above embodiment), and the device manufacturer information of the IoT device .
  • SSID Service Set Identifier
  • BSSID Basic Service Set Identifier
  • IE Manufacturer-defined information element
  • the distribution network device scans the QR code on the IoT device through the camera (which can be displayed through the entity label or display screen), and decodes to obtain the above-mentioned device information of the IoT device.
  • the network distribution device establishes a secure connection with the access cloud platform.
  • the network distribution device sends the above-mentioned device information of the IoT device to the access cloud platform, such as ID1 and device manufacturer information.
  • the access cloud platform determines the device cloud platform according to the device manufacturer information.
  • the access cloud platform generates an ID2 (corresponding to the above-mentioned access authentication identifier) allocated to the IoT device according to the ID1, and a random number R1 (corresponding to the above-mentioned first random number). In a possible implementation manner, the access cloud platform also allocates a device registration code A1 to the IoT device.
  • the access cloud platform establishes a secure connection with the device cloud platform.
  • the access cloud platform sends ID1 and R1 to the device cloud platform.
  • the device cloud platform obtains the key K of the IoT device (corresponding to the above-mentioned device key) according to ID1.
  • the device cloud platform encrypts R1 through K to generate K1 (corresponding to the above-mentioned first access key).
  • the device cloud platform returns K1 to the access cloud platform.
  • the access cloud platform returns the ID2 and the random number R1 to the distribution network device. In a possible implementation manner, the access cloud platform also returns A1 to the distribution network device.
  • the IoT device obtains ID2, R1, network information, and access cloud platform address through Soft AP discovery or code scanning; in a possible implementation, the IoT device also obtains A1 through Soft AP discovery or scanning code.
  • a Soft AP-based connection is established between the distribution terminal and the IoT device, and the distribution terminal sends the above ID2, R1, network information, and access cloud platform address (optionally including A1) to the IoT device.
  • the distribution terminal generates and displays a QR code based on the above ID2, R1, network information, and access cloud platform address (optionally including A1), and the IoT device scans the QR code to obtain ID2, R1, network information, access Cloud platform address (optionally including A1) and other information.
  • the IoT device uses the locally stored K to encrypt R1 to obtain K1' (corresponding to the above-mentioned second access key).
  • the IoT device uses K1' as the key to establish a TLS/DTLS connection with the access cloud platform through PSK.
  • the IoT device may also perform the following step S415.
  • the IoT device uses A1 as the key to establish a TLS/DTLS connection with the access cloud platform through PSK; and uses K1' as the key to perform one-way or two-way challenge authentication with the access cloud platform.
  • the IoT device manufacturer assigns a unique key K to each device (identified by device ID1), and presets the key K into the corresponding device.
  • the key K and the corresponding The ID1 of the device is stored in the device cloud platform of the device manufacturer.
  • the access cloud platform Access the cloud platform to obtain the device ID1 from the device.
  • the access cloud platform generates ID2 for the device according to the device ID1, and a random value R1 (the access cloud platform needs to save the R1 and the ID2 of the corresponding device).
  • the access cloud platform sends the aforementioned ID1 and R1 to the device cloud platform.
  • the device cloud platform generates a key K1, and the generation method is as follows: use a predefined key generation algorithm S1 for R1, such as Advanced Encryption Standard (AES) 256-Code-Based Message Authentication Code (Code-Based Message Authentication Code) , CMAC) algorithm, key derivative function (Key Derivation Function, KDF) based on HMAC algorithm, wherein, HMAC algorithm refers to the message authentication code (Message Authentication Code, MAC) algorithm based on hash (Hash), password-based key Derived function (Password-Based Key Derivation Function, PBKDF) algorithm, etc., use K encryption to obtain K1.
  • AES Advanced Encryption Standard
  • CMAC CMAC
  • KDF key derivative function
  • HMAC algorithm refers to the message authentication code (Message Authentication Code, MAC) algorithm based on hash (Hash), password-based key Derived function (Password-Based Key Derivation Function, PBKDF) algorithm, etc.
  • the device cloud platform returns K1 to the access cloud platform.
  • the access cloud platform returns ID2 and R1 to the device through the distribution network terminal.
  • the device uses the predefined key generation algorithm S1 to encrypt R1 with K to obtain K1' (equivalent to K1).
  • the intermediate node (such as the distribution network terminal) does not have K, so K1 cannot be obtained, which can prevent the key leakage caused by the cracking and hijacking of the distribution network terminal.
  • the device uses K1' as a pre-shared key to establish a TLS/DTLS connection with the mobile phone cloud platform through PSK.
  • ID2 is used to uniquely identify the device on the access cloud platform and to index K1.
  • the network distribution device sends network information, ID2, R1, device registration code A1 and access cloud address to the IoT device. Every time the IoT device connects to the above-mentioned access cloud platform, it uses TLS/ The DTLS method uses the device registration code as the pre-shared key or negotiates the communication key in an anonymous way to establish a secure connection, and then uses K1 as the key to perform one-way or two-way challenge authentication with the mobile cloud platform.
  • the device key is preset in the IoT device and the device cloud platform, and the IoT device initiates access to the access cloud platform, and the access cloud platform passes The device cloud platform interacts to obtain the first access key and the first random number generated by itself, wherein the first access key is generated by the device key and the first random number, that is, After accessing the cloud platform and providing the first random number to the IoT device, the IoT device can obtain the second access key for access by combining the locally stored device key and the first random number, and use the second access key for access.
  • the access key requests access to the cloud platform for access authentication.
  • the access cloud platform does not directly provide the access key to the IoT device, but also enables the IoT device to obtain the access key correctly.
  • the access authentication process can be simplified, thereby improving the efficiency of access authentication of IoT devices while ensuring the security of access authentication. .
  • the first access key can be generated by the device cloud platform, and
  • the above key indication information includes the first random number generated by the access cloud platform.
  • the above-mentioned first access key may be generated based on the first random number and the second random number allocated by the IoT device itself.
  • FIG. 5 shows a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application.
  • the method can be applied to the access authentication system shown in FIG. 1, and is executed interactively by the Internet of Things device 12, the access cloud platform 14 and the device cloud platform 16, and the method can include the following steps:
  • Step 501 the IoT device generates a second random number.
  • the IoT device further encrypts the second random number by using the device key to generate the first device authentication information.
  • the IoT device in addition to providing the second random number, the IoT device also encrypts the second random number with the device key to obtain the first device authentication information , which is used for subsequent device cloud platforms to authenticate IoT devices.
  • Step 502 the IoT device provides a second random number and device information of the IoT device to the access cloud platform; correspondingly, the access cloud platform obtains the second random number and device information of the IoT device.
  • the IoT device further acquires the first device authentication information provided by the IoT device.
  • Step 503 accessing the cloud platform to generate a first random number.
  • the first random number is used as key indication information.
  • the access cloud platform also generates an access authentication identifier of the IoT device.
  • the access cloud platform also generates a device registration code of the IoT device.
  • Step 504 the access cloud platform sends the first random number and the second random number to the device cloud platform according to the device information of the IoT device; correspondingly, the device cloud platform receives the first random number and the second random number .
  • the access cloud platform sends the first random number, the second random number and the first device authentication information to the device cloud platform; correspondingly, the device cloud platform receives the first random number, the second random number and the first random number. number and first device authentication information.
  • Step 505 the device cloud platform encrypts the first random number and the second random number through the device key corresponding to the IoT device to generate a first access key.
  • the device cloud platform uses the device key to encrypt the second random number to generate the second device authentication information, and uses the second device authentication information to authenticate the first device authentication information. After the device authentication information passes the authentication of the first device authentication information, the device cloud platform generates a third random number, and encrypts the second random number and the third random number with the device key to generate the first cloud authentication information.
  • Step 506 the device cloud platform returns the first access key to the access cloud platform, and the access cloud platform receives the first access key.
  • the access cloud platform receives the first access key, the first cloud authentication information, and the third random sent by the device cloud platform after passing the authentication of the first device authentication information according to the second device authentication information number.
  • the second device authentication information is generated by the device cloud platform by encrypting the second random number through the device key; the first cloud authentication information is the device cloud platform using the device key to encrypt the second random number. generated by encrypting the third random number and the third random number; the third random number is generated by the device cloud platform.
  • the access cloud platform further establishes an association relationship between the above-mentioned access authentication identifier and the first access key.
  • Step 507 the access cloud platform provides the first random number to the IoT device, and correspondingly, the IoT device obtains the first random number provided by the access cloud platform.
  • the access cloud platform further provides the first cloud authentication information and the third random number to the IoT device.
  • the access cloud platform also provides the access authentication identifier to the IoT device; correspondingly, the IoT device obtains the access authentication identifier provided by the access cloud platform.
  • the access cloud platform also provides the device registration code to the IoT device; correspondingly, the IoT device obtains the device registration code provided by the access cloud platform.
  • the access cloud platform also provides the access authentication identifier and the device registration code to the IoT device; correspondingly, the IoT device obtains the access authentication identifier and device provided by the access cloud platform registration code.
  • Step 508 the IoT device encrypts the first random number and the second random number with the device key to generate the second access key.
  • the IoT device encrypts the second random number and the third random number with the device key to generate the second cloud authentication information; when authenticating the first cloud authentication information according to the second cloud authentication information After passing, the second access key is generated according to the device key and the key indication information.
  • the algorithm used by the IoT device to encrypt the second random number and the third random number through the device key and the algorithm used by the device cloud platform to encrypt the second random number and the third random number through the device key.
  • the algorithm used by the IoT device to encrypt the first random number and the second random number through the device key is the same as the algorithm used by the device cloud platform to encrypt the first random number and the second random number through the device key.
  • the algorithm used is the same.
  • Step 509 the IoT device sends an access authentication request including the second access key to the access cloud platform; correspondingly, the access cloud platform receives the access authentication request sent by the IoT device.
  • the access cloud platform sends an access authentication request including the second access key and the access authentication identifier to the access cloud platform.
  • the access cloud platform sends an access authentication request including the second access key and the device registration code to the access cloud platform.
  • the access cloud platform sends an access authentication request including the second access key, the access authentication identifier and the device registration code to the access cloud platform.
  • Step 510 the access cloud platform performs access authentication on the IoT device according to the first access key and the second access key.
  • the access cloud platform authenticates the IoT device for establishing a data connection by using the TLS/DTLS pre-shared key PSK method according to the first access key and the second access key.
  • the access cloud platform queries the above association relationship according to the access authentication identifier carried in the access authentication request, and obtains the first access key; and according to the queried first access key and the The second access key is used to authenticate the access of the IoT device.
  • the access cloud platform establishes a secure data connection with the IoT device through the TLS/DTLS pre-shared key PSK method according to the device registration code carried in the access authentication request;
  • the access key and the second access key are used for one-way or two-way challenge authentication.
  • the access cloud platform establishes a secure data connection with the IoT device in an anonymous way through TLS/DTLS; Challenge authentication.
  • the access cloud platform receives the first access key, the third cloud authentication information, the third device authentication information, and the third random number sent by the device cloud platform; the third The cloud authentication information is generated by the device cloud platform by encrypting the second random number with the device key; the third device authentication information is generated by the device cloud platform by encrypting the third random number; the third The random number is generated by the device cloud platform;
  • the access cloud platform Before receiving the access authentication request sent by the IoT device, the access cloud platform also provides the third cloud authentication information and the third random number to the IoT device;
  • the access cloud platform When the access cloud platform receives the access authentication request sent by the Internet of Things device, it receives the access authentication request sent by the Internet of Things device after passing the authentication of the third cloud authentication information according to the fourth cloud authentication information; the fourth cloud The authentication information is generated by the Internet of Things device by encrypting the second random number with the device key; the access authentication request also includes fourth device authentication information, and the fourth device authentication information is the Internet of Things device through the The device key is generated by encrypting the third random number;
  • the access cloud platform When the access cloud platform performs access authentication on the IoT device according to the first access key and the second access key, after passing the authentication on the fourth device authentication information according to the third device authentication information , and perform access authentication on the Internet of Things device according to the first access key and the second access key.
  • the IoT device before generating the second access key according to the device key and the first random number, obtains the third cloud authentication information and the third random number provided by the access cloud platform; the third cloud authentication The information is generated by the device cloud platform by encrypting the second random number with the device key; the third random number is generated by the device cloud platform;
  • the IoT device When the IoT device generates a second access key according to the device key and the first random number, the second random number is encrypted by the device key to generate fourth cloud authentication information; After the authentication information has passed the authentication of the third cloud authentication information, the second access key is generated according to the device key and the first random number;
  • the IoT device also encrypts the third random number through the device key to generate fourth device authentication information
  • the IoT device When the IoT device sends an access authentication request containing the second access key to the access cloud platform, it sends the access cloud platform the access authentication request containing the second access key and the fourth device authentication information. Access authentication request.
  • FIG. 6 shows a flowchart of access authentication after the network distribution is completed according to the embodiment of the present application.
  • the access authentication process of IoT devices is as follows:
  • the IoT device establishes a secure connection with the access cloud platform.
  • the IoT device generates a random string R2 (corresponding to the above-mentioned second random number), and encrypts R2 with the device key K to generate device authentication information Hc1 (corresponding to the above-mentioned first device authentication information).
  • the IoT device sends R2, Hc1, and device information of the IoT device (including the device identifier ID1 of the IoT device and the device manufacturer information) to the access cloud platform.
  • the access cloud platform determines the device cloud platform according to the device manufacturer information.
  • the access cloud platform generates an ID2 (corresponding to the above-mentioned access authentication identifier) allocated to the IoT device according to the ID1, and a random number R1 (corresponding to the above-mentioned first random number). In a possible implementation manner, the access cloud platform also allocates a device registration code A1 to the IoT device.
  • the access cloud platform establishes a secure connection with the device cloud platform.
  • the access cloud platform sends ID1, R1, R2 and Hc1 to the device cloud platform.
  • the device cloud platform obtains the key K of the IoT device (corresponding to the above-mentioned device key) according to ID1.
  • the device cloud platform encrypts R2 by K, and generates Hc1' (corresponding to the above-mentioned second device authentication information); if Hc1' is the same as Hc1, the IoT device is authenticated successfully, and the process goes to S610, otherwise the authentication fails.
  • the device cloud platform generates a random number R3 (that is, the above-mentioned third random number).
  • the device cloud platform encrypts R2 and R3 by K to generate cloud authentication information Hc2 (corresponding to the above-mentioned first cloud authentication information).
  • the device cloud platform encrypts R1 through K to generate K1 (corresponding to the above-mentioned first access key).
  • the device cloud platform returns K1, R3 and Hc2 to the access cloud platform.
  • the access cloud platform returns ID2, R1, R3 and Hc2 to the IoT device. In a possible implementation manner, the access cloud platform also returns A1 to the IoT device.
  • the IoT device obtains ID2, R1, R3, and Hc2 network information, and accesses the cloud platform address through a secure connection; in a possible implementation, the IoT device also obtains A1 through a secure connection.
  • the IoT device encrypts R2 and R3 through K to generate Hc2' (corresponding to the above-mentioned second cloud authentication information).
  • the IoT device compares Hc2' and Hc2, if they are the same, the authentication succeeds, and the process proceeds to S618, otherwise the authentication fails.
  • the IoT device uses the locally stored K to encrypt R1 and R2 to obtain K1' (corresponding to the above-mentioned second access key).
  • the IoT device uses K1' as the key to establish a TLS/DTLS connection with the access cloud platform through PSK.
  • the IoT device may also perform the following step S415.
  • the IoT device uses A1 as the key to establish a TLS/DTLS connection with the access cloud platform through PSK; and uses K1' as the key to perform one-way or two-way challenge authentication with the access cloud platform.
  • the device key is preset in the IoT device and the device cloud platform, and the IoT device initiates access to the access cloud platform, and the IoT device sends the access to the cloud platform.
  • the cloud platform provides the second random number, and the access cloud platform can obtain the first access key and the first random number generated by itself by interacting with the device cloud platform, wherein the first access key is obtained by the device.
  • the key is generated from the first random number and the second random number, that is to say, after accessing the cloud platform to provide the first random number to the IoT device, the IoT device can use the locally stored device key and the second random number.
  • the second access key for access is obtained in combination with the first random number, and the second access key is used to request access to the cloud platform for access authentication.
  • the access cloud platform does not directly contact the cloud platform.
  • the IoT device provides the access key, which can also enable the IoT device to obtain the access key correctly, which can ensure security.
  • the access authentication process can be simplified. , so as to improve the efficiency of the access authentication of the IoT device under the condition of ensuring the security of the access authentication.
  • the above-mentioned first access key can be accessed by the cloud platform. generated, and the key indication information includes the ciphertext obtained by encrypting the first access key.
  • access the cloud platform to obtain device information of the IoT device; generate a first random number and a first access key; Send the first random number; receive the first encryption key generated by the device cloud platform encrypting the first random number with the device key; encrypt the first access key with the first encryption key , obtain the encrypted ciphertext; provide the encrypted ciphertext and the first random number to the IoT device; receive an access authentication request sent by the IoT device, where the access authentication request includes the second access key , the second access key is generated by the IoT device according to the device key, the encrypted ciphertext and the first random number;
  • the IoT device performs access authentication.
  • the IoT device provides the device information of the IoT device to the access cloud platform; obtains the encrypted ciphertext provided by the access cloud platform and the first random number generated by the access cloud platform; the encrypted ciphertext is the The encrypted ciphertext obtained by the access cloud platform encrypting the first access key with the first encryption key; the first encryption key is the first random number obtained by the device cloud platform of the IoT device through the device key A key generated by encryption; the device key is set in the IoT device and the device cloud platform; the first random number is encrypted by the device key, and a second encryption key is generated; through the second encryption key Decrypt the encrypted ciphertext to obtain a second access key; send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform According to the first access key and the second access key, access authentication is performed on the Internet of Things device.
  • FIG. 7 shows a flowchart of a method for authentication of IoT device access provided by an exemplary embodiment of the present application.
  • the method can be applied to the access authentication system as shown in FIG. 1, and is executed interactively by the Internet of Things device 12, the access cloud platform 14 and the device cloud platform 16, and the method can include the following steps:
  • Step 701 the IoT device provides the device information of the IoT device to the access cloud platform; correspondingly, the access cloud platform obtains the device information of the IoT device.
  • step 701 reference may be made to the description under step 401 in the embodiment shown in FIG. 3 , and details are not repeated here.
  • Step 702 the access cloud platform generates a first random number and a first access key.
  • the access cloud platform in addition to generating the first random number, the access cloud platform also generates a first access key.
  • the access cloud platform also generates an access authentication identifier of the IoT device.
  • the access cloud platform also generates a device registration code of the IoT device.
  • the access cloud platform further establishes an association relationship between the above-mentioned access authentication identifier and the first access key.
  • Step 703 the access cloud platform sends the first random number to the device cloud platform according to the device information of the IoT device; correspondingly, the device cloud platform receives the first random number.
  • Step 704 the device cloud platform encrypts the first random number through the device key corresponding to the IoT device to generate a first encryption key.
  • Step 705 the device cloud platform returns the first encryption key to the access cloud platform, and the access cloud platform receives the first encryption key.
  • the access cloud platform receives the first encryption key generated by the IoT device by encrypting the first random number with the device key.
  • Step 706 the access cloud platform encrypts the first access key with the first encryption key to obtain the encrypted ciphertext.
  • the above encrypted ciphertext and the first random number are key indication information.
  • Step 707 the access cloud platform provides the encrypted ciphertext and the first random number to the IoT device, and accordingly, the IoT device obtains the encrypted ciphertext and the first random number provided by the access cloud platform.
  • the access cloud platform also provides the access authentication identifier to the IoT device; correspondingly, the IoT device obtains the access authentication identifier provided by the access cloud platform.
  • the access cloud platform also provides the device registration code to the IoT device; correspondingly, the IoT device obtains the device registration code provided by the access cloud platform.
  • the access cloud platform also provides the access authentication identifier and the device registration code to the IoT device; correspondingly, the IoT device obtains the access authentication identifier and device provided by the access cloud platform registration code.
  • Step 708 the IoT device encrypts the first random number with the device key to generate a second encryption key; decrypts the encrypted ciphertext with the second encryption key to obtain a second access key.
  • the encryption algorithm used by the IoT device to encrypt the first random number by using the device key is the same as the encryption algorithm used by the device cloud platform to encrypt the first random number by using the device key.
  • the algorithm for decrypting the encrypted ciphertext by the second encryption key of the IoT device matches the algorithm for encrypting the first access key by the access cloud platform using the first encryption key.
  • Step 709 the IoT device sends an access authentication request including the second access key to the access cloud platform; correspondingly, the access cloud platform receives the access authentication request sent by the IoT device.
  • the access cloud platform sends an access authentication request including the second access key and the access authentication identifier to the access cloud platform.
  • the access cloud platform sends an access authentication request including the second access key and the device registration code to the access cloud platform.
  • the access cloud platform sends an access authentication request including the second access key, the access authentication identifier and the device registration code to the access cloud platform.
  • Step 710 the access cloud platform performs access authentication on the IoT device according to the first access key and the second access key.
  • the access cloud platform performs data connection establishment authentication on the IoT device through the pre-shared key TLS/DTLSPSK method according to the first access key and the second access key.
  • the access cloud platform queries the above association relationship according to the access authentication identifier carried in the access authentication request, and obtains the first access key; and according to the queried first access key and the The second access key is used to authenticate the access of the IoT device.
  • the access cloud platform establishes a secure data connection with the IoT device through the TLS/DTLS pre-shared key PSK method according to the device registration code carried in the access authentication request;
  • the access key and the second access key are used for one-way or two-way challenge authentication.
  • the access cloud platform establishes a secure data connection with the IoT device in an anonymous way through TLS/DTLS; Challenge authentication.
  • FIG. 8 shows a flowchart of access authentication in the network distribution process involved in the embodiment of the present application.
  • the access authentication process of IoT devices is as follows:
  • the IoT device broadcasts the beacon frame or displays the QR code; the distribution network device obtains the device information of the IoT device through Soft AP discovery or code scanning.
  • the network distribution device establishes a secure connection with the access cloud platform.
  • the network distribution device sends the above-mentioned device information of the IoT device to the access cloud platform, such as ID1 and device manufacturer information.
  • the access cloud platform determines the device cloud platform according to the device manufacturer information.
  • the access cloud platform generates an ID2 (corresponding to the above-mentioned access authentication identifier) allocated to the IoT device according to the ID1, a key K1 (corresponding to the above-mentioned first access key) and a random number R1 (corresponding to the above-mentioned first random number).
  • the access cloud platform also allocates a device registration code A1 to the IoT device.
  • the access cloud platform establishes a secure connection with the device cloud platform.
  • the access cloud platform sends ID1 and R1 to the device cloud platform.
  • the device cloud platform obtains the key K of the IoT device (corresponding to the above-mentioned device key) according to ID1.
  • the device cloud platform encrypts R1 through K to generate K2 (corresponding to the above-mentioned first encryption key).
  • the device cloud platform returns K2 to the access cloud platform.
  • the access cloud platform returns the ID2, the random number R1, and the ciphertext C1 to the distribution network device. In a possible implementation manner, the access cloud platform also returns A1 to the distribution network device.
  • the IoT device obtains ID2, R1, ciphertext C1, network information, and access cloud platform address through the Soft AP discovery or code scanning method; in a possible implementation, the IoT device also discovers or scans the code through the Soft AP way to get A1.
  • a Soft AP-based connection is established between the distribution terminal and the IoT device, and the distribution terminal sends the above ID2, R1, C1, network information, and access cloud platform address (optionally including A1) to the IoT device.
  • the distribution network terminal generates and displays a QR code based on the above ID2, R1, C1, network information, and access cloud platform address (optionally including A1), and the IoT device scans the QR code to obtain ID2, R1, C1, network Information, access cloud platform address (optionally including A1) and other information.
  • the IoT device uses the locally stored K to encrypt R1 to obtain K2' (corresponding to the above-mentioned second encryption key), and decrypts C1 through K2' to obtain K1' (corresponds to the above-mentioned second access key).
  • the IoT device uses K1' as the key to establish a TLS/DTLS connection with the access cloud platform through PSK.
  • the IoT device may also perform the following step S816.
  • the IoT device uses A1 as the key to establish a TLS/DTLS connection with the access cloud platform through PSK; and uses K1' as the key to perform one-way or two-way challenge authentication with the access cloud platform.
  • the device key is preset in the IoT device and the device cloud platform, and the IoT device initiates access to the access cloud platform, and the access cloud platform passes By interacting with the device cloud platform, you can obtain the first access key generated by yourself, the first random number generated by yourself, and the ciphertext obtained by encrypting the first random number with the device key. After the text and the first random number are provided to the IoT device, the IoT device can obtain the second access key for access by combining the first random number and the cipher text with the device key stored locally, and pass the second access key through the second access key. The access key requests access to the cloud platform for access authentication.
  • the access cloud platform does not directly provide the access key to the IoT device, but also enables the IoT device to obtain the access key correctly.
  • the access authentication process can be simplified, thereby improving the efficiency of access authentication of IoT devices while ensuring the security of access authentication. .
  • FIG. 9 shows a structural block diagram of an IoT device access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus can be used to access a cloud platform to become an access cloud platform device, or to become an access cloud platform device.
  • the device includes:
  • a first random number generation module 902 configured to generate a first random number
  • a first random number sending module 903 configured to send the first random number to the device cloud platform according to the device information of the IoT device;
  • the first access key receiving module 904 is configured to receive the first access key generated by the device cloud platform through the device key and the first random number; the device key is set in the IoT device and in the device cloud platform;
  • a first random number providing module 905, configured to provide the first random number to the IoT device
  • An authentication request receiving module 906, configured to receive an access authentication request sent by the IoT device, where the access authentication request includes a second access key, and the second access key is the IoT device generated according to the device key and the first random number;
  • An access authentication module 907 configured to perform access authentication on the IoT device according to the first access key and the second access key.
  • the apparatus further includes:
  • the second random number obtaining module is configured to obtain the first random number generated by the IoT device before the first random number sending module sends the first random number to the device cloud platform according to the device information of the IoT device.
  • the first random number sending module configured to send the first random number and the second random number to the device cloud platform according to the device information of the IoT device;
  • the first access key receiving module is configured to receive the first access key generated by the device cloud platform by encrypting the first random number and the second random number with the device key; key.
  • the apparatus further includes:
  • a first device authentication information acquisition module configured to acquire the first random number and the second random number before the first random number sending module sends the first random number and the second random number to the device cloud platform according to the device information of the Internet of Things device first device authentication information, where the first device authentication information is generated by the Internet of Things device encrypting the second random number by using the device key;
  • the first random number sending module is configured to send the first random number, the second random number and the first device authentication information to the device cloud platform according to the device information of the IoT device;
  • the first access key receiving module is configured to receive the first access key, the first access key and the first access key sent by the device cloud platform after passing the authentication of the first device authentication information according to the second device authentication information.
  • Cloud authentication information and a third random number the second device authentication information is generated by the device cloud platform encrypting the second random number with the device key; the first cloud authentication information is the The device cloud platform encrypts and generates the second random number and the third random number by using the device key; the third random number is generated by the device cloud platform;
  • the device also includes:
  • a first cloud authentication information providing module configured to provide the first cloud authentication information and the third random number to the Internet of Things before the authentication request receiving module receives the access authentication request sent by the Internet of Things device equipment;
  • the authentication request receiving module is configured to receive the access authentication request sent by the IoT device after passing the authentication of the first cloud authentication information according to the second cloud authentication information; the second cloud authentication information is the The IoT device encrypts the second random number and the third random number with the device key and generates it.
  • the first access key receiving module is configured to receive the first access key, third cloud authentication information, and third device authentication information sent by the device cloud platform , and a third random number; the third cloud authentication information is generated by the device cloud platform encrypting the second random number with the device key; the third device authentication information is the device The cloud platform is encrypted and generated by the third random number; the third random number is generated by the device cloud platform;
  • the device also includes:
  • An authentication information and random number providing module configured to provide the third cloud authentication information and the third random number to the Internet of Things before the authentication request receiving module receives the access authentication request sent by the Internet of Things device equipment;
  • the authentication request receiving module is configured to receive the access authentication request sent by the IoT device after passing the authentication of the third cloud authentication information according to the fourth cloud authentication information;
  • the fourth cloud authentication information is the The Internet of Things device encrypts the second random number with the device key;
  • the access authentication request also includes fourth device authentication information, and the fourth device authentication information is the Internet of Things device Generated by encrypting the third random number with the device key;
  • the access authentication module is configured to, according to the first access key and the second access key, authenticate the fourth device authentication information according to the third device authentication information and pass the authentication.
  • the Internet of Things device performs access authentication.
  • the access authentication module is configured to, according to the first access key and the second access key, authenticate the IoT devices perform data connection establishment authentication.
  • the apparatus further includes:
  • a device registration code generating module configured to generate a device registration code before the authentication request receiving module receives the access authentication request sent by the IoT device;
  • a device registration code providing module configured to provide the device registration code to the IoT device
  • the authentication request receiving module configured to receive the access authentication request carrying the device registration code
  • the access authentication module is used for,
  • the device registration code carried in the access authentication request through the TLS/DTLS pre-shared key PSK method, establish a secure data connection with the IoT device;
  • One-way or two-way challenge authentication is performed according to the first access key and the second access key.
  • the access authentication module is configured to:
  • One-way or two-way challenge authentication is performed according to the first access key and the second access key.
  • the apparatus further includes:
  • an access authentication identifier generating module configured to generate an access authentication identifier of the IoT device before the authentication request receiving module receives the access authentication request sent by the IoT device;
  • an association relationship establishing module configured to establish an association relationship between the access authentication identifier and the first access key
  • an access authentication identifier providing module configured to provide the access authentication identifier to the Internet of Things device
  • the authentication request receiving module configured to receive the access authentication request carrying the access authentication identifier
  • the access authentication module is used for,
  • FIG. 10 shows a structural block diagram of an IoT device access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus can be used in an IoT device to be implemented as an IoT device, or be implemented as an IoT device in the IoT device.
  • the device includes:
  • a first random number obtaining module 1002 configured to obtain a first random number provided by the access cloud platform, where the first random number is generated by the access cloud platform and obtained from the device of the Internet of Things device
  • the cloud platform is provided after the device key and the first access key generated by the first random number; the device key is set in the IoT device and the device cloud platform;
  • a second access key generation module 1003, configured to generate a second access key according to the device key and the first random number
  • An authentication request sending module 1004 configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first access key.
  • An access key and the second access key are used to perform access authentication on the IoT device.
  • the apparatus further includes:
  • a second random number generating module configured to generate a second random number before the first random number obtaining module obtains the first random number provided by the access cloud platform;
  • a second random number providing module configured to provide the second random number to the access cloud platform
  • the second access key generation module is configured to encrypt the first random number and the second random number by using the device key to generate the second access key.
  • the apparatus further includes:
  • a first device authentication information generation module configured to obtain the first random number provided by the access cloud platform and encrypt the second random number with the device key to generate first device authentication information
  • a first device authentication information providing module configured to provide the first device authentication information to the access cloud platform
  • the first cloud authentication information and the third random number acquisition module are configured to acquire the access key before the second access key generation module generates the second access key according to the device key and the first random number.
  • the authentication information is generated by encrypting the second random number and the third random number with the device key after passing the authentication of the first device authentication information; the second device authentication information is the device Generated by the cloud platform encrypting the second random number by using the device key;
  • the second access key generation module is used for,
  • the second access key is generated according to the device key and the first random number.
  • the apparatus further includes:
  • the authentication information and random number acquisition module is configured to acquire the access key provided by the access cloud platform before the second access key generation module generates the second access key according to the device key and the first random number.
  • third cloud authentication information and a third random number is generated by the device cloud platform encrypting the second random number with the device key; the third random number is the generated by the device cloud platform;
  • the second access key generation module is used for,
  • the device also includes:
  • a fourth device authentication information generating module configured to encrypt the third random number by using the device key to generate fourth device authentication information
  • the authentication request sending module is configured to send the access authentication request including the second access key and the fourth device authentication information to the access cloud platform.
  • the apparatus further includes:
  • a device registration code obtaining module configured to obtain the device registration code provided by the access cloud platform before the authentication request sending module sends the access authentication request including the second access key to the access cloud platform;
  • the authentication request sending module is configured to send the access authentication request including the second access key and the device registration code to the access cloud platform.
  • the apparatus further includes:
  • an access authentication identification acquiring module configured to acquire the access authentication provided by the access cloud platform before the authentication request sending module sends the access authentication request including the second access key to the access cloud platform, the The access authentication logo of the IoT device;
  • the authentication request sending module is configured to send the access authentication request including the second access key and the access authentication identifier to the access cloud platform.
  • FIG. 11 shows a structural block diagram of an IoT device access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus can be used to access a cloud platform to become an access cloud platform device, or to become an access cloud platform device.
  • the device includes:
  • a random number and key generation module 1102 configured to generate a first random number and a first access key
  • a first random number sending module 1103, configured to send the first random number to the device cloud platform corresponding to the IoT device according to the device information of the IoT device;
  • a first encryption key receiving module 1104 configured to receive a first encryption key generated by the device cloud platform by encrypting the first random number with the device key;
  • An encrypted ciphertext obtaining module 1105 configured to encrypt the first access key by using the first encryption key to obtain an encrypted ciphertext
  • a ciphertext and random number providing module 1106, configured to provide the encrypted ciphertext and the first random number to the IoT device;
  • An authentication request receiving module 1107 configured to receive an access authentication request sent by the IoT device, where the access authentication request includes a second access key, and the second access key is the IoT device generated according to the device key, the encrypted ciphertext and the first random number;
  • An access authentication module 1108, configured to perform access authentication on the IoT device according to the first access key and the second access key.
  • the access authentication module is configured to, according to the first access key and the second access key, authenticate the IoT devices perform data connection establishment authentication.
  • the apparatus further includes:
  • a device registration code generating module configured to generate a device registration code before the authentication request receiving module receives the access authentication request sent by the IoT device;
  • a device registration code providing module configured to provide the device registration code to the IoT device
  • the authentication request receiving module configured to receive the access authentication request carrying the device registration code
  • the access authentication module is used for,
  • the device registration code carried in the access authentication request through the TLS/DTLS pre-shared key PSK method, establish a secure data connection with the IoT device;
  • One-way or two-way challenge authentication is performed according to the first access key and the second access key.
  • the access authentication module is configured to:
  • One-way or two-way challenge authentication is performed according to the first access key and the second access key.
  • the apparatus further includes:
  • an access authentication identifier generating module configured to generate an access authentication identifier of the IoT device before the authentication request receiving module receives the access authentication request sent by the IoT device;
  • an association relationship establishing module configured to establish an association relationship between the access authentication identifier and the first access key
  • an access authentication identifier providing module configured to provide the access authentication identifier to the Internet of Things device
  • the authentication request receiving module configured to receive the access authentication request carrying the access authentication identifier
  • the access authentication module is used for,
  • FIG. 12 shows a block diagram of the structure of an IoT device access authentication apparatus provided by an exemplary embodiment of the present application.
  • the apparatus can be used in an IoT device, implemented as an IoT device, or implemented as an IoT device in an IoT device.
  • the device includes:
  • the ciphertext and random number acquisition module 1202 is configured to acquire the encrypted ciphertext provided by the access cloud platform and the first random number generated by the access cloud platform; the encrypted ciphertext is obtained by the access cloud platform through the The encrypted ciphertext obtained by encrypting the first access key with the first encryption key; the first encryption key is the first random number encrypted by the device cloud platform of the IoT device through the device key The generated key; the device key is set in the IoT device and the device cloud platform;
  • the second encryption key generation module 1203 is configured to encrypt the first random number with the device key, and generate a second encryption key
  • a second access key obtaining module 1204 configured to decrypt the encrypted ciphertext by using the second encryption key to obtain a second access key
  • An authentication request sending module 1205 is configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform to request the access cloud platform according to the first access key.
  • An access key and the second access key are used to perform access authentication on the IoT device.
  • the apparatus further includes:
  • a device registration code obtaining module configured to obtain the device registration code provided by the access cloud platform before the authentication request sending module sends the access authentication request including the second access key to the access cloud platform;
  • the authentication request sending module is configured to send the access authentication request including the second access key and the device registration code to the access cloud platform.
  • the apparatus further includes:
  • an access authentication identification acquiring module configured to acquire the access authentication provided by the access cloud platform before the authentication request sending module sends the access authentication request including the second access key to the access cloud platform, the The access authentication logo of the IoT device;
  • the authentication request sending module is configured to send the access authentication request including the second access key and the access authentication identifier to the access cloud platform.
  • FIG. 13 shows a schematic structural diagram of a computer device (such as an Internet of Things device, an access cloud platform device, or a device platform cloud) provided by an exemplary embodiment of the present application.
  • the computer device includes: a processor 131 , a receiver 132 , a transmitter 133, memory 134 and bus 135.
  • the processor 131 includes one or more processing cores, and the processor 131 executes various functional applications and information processing by running software programs and modules.
  • the receiver 132 and the transmitter 133 may be implemented as a communication component, which may be a communication chip.
  • the memory 134 is connected to the processor 131 through the bus 135 .
  • the memory 134 may be configured to store at least one instruction, and the processor 131 may be configured to execute the at least one instruction to implement the various steps in the above method embodiments.
  • memory 134 may be implemented by any type or combination of volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
  • volatile or non-volatile storage devices including, but not limited to, magnetic or optical disks, electrically erasable programmable Read Only Memory (Electrically-Erasable Programmable Read Only Memory, EEPROM), Erasable Programmable Read Only Memory (EPROM), Static Random Access Memory (SRAM), Read Only Memory (Read-Only Memory, ROM), magnetic memory, flash memory, programmable read-only memory (Programmable Read-Only Memory, PROM).
  • the computer device includes a processor, a memory, and a transceiver (the transceiver may include a receiver for receiving information and a transmitter for transmitting information) and a transmitter.
  • the transceiver may include a receiver for receiving information and a transmitter for transmitting information
  • the processor is used for acquiring device information of the IoT device; generating a first random number;
  • the transceiver is configured to send the first random number to the device cloud platform according to the device information of the Internet of Things device; receive the first random number generated by the device cloud platform through the device key and the first random number; a first access key; the device key is set in the IoT device and the device cloud platform;
  • the processor configured to provide the first random number to the Internet of Things device
  • the transceiver is configured to receive an access authentication request sent by the Internet of Things device, where the access authentication request includes a second access key, and the second access key is based on the Internet of Things device. generated by the device key and the first random number;
  • the processor is configured to perform access authentication on the Internet of Things device according to the first access key and the second access key.
  • the computer device when the computer device is implemented as an IoT device,
  • the processor is configured to provide device information of the Internet of Things device to the access cloud platform; obtain a first random number provided by the access cloud platform, where the first random number is generated by the access cloud platform generated and provided after obtaining the first access key generated by the device cloud platform of the IoT device through the device key and the first random number; the device key is set on the IoT device and in the device cloud platform;
  • the processor configured to generate a second access key according to the device key and the first random number
  • the transceiver is configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first access key.
  • the access key and the second access key are used to perform access authentication on the IoT device.
  • the processor is used for acquiring device information of the IoT device; generating a first random number and a first access key;
  • the transceiver is configured to send the first random number to the device cloud platform corresponding to the Internet of Things device according to the device information of the Internet of Things device; the first encryption key generated by encrypting the first random number;
  • the processor is configured to encrypt the first access key by using the first encryption key to obtain encrypted ciphertext; provide the encrypted ciphertext and the first random number to the IoT devices;
  • the transceiver is configured to receive an access authentication request sent by the Internet of Things device, where the access authentication request includes a second access key, and the second access key is based on the Internet of Things device. generated by the device key, the encrypted ciphertext and the first random number;
  • the processor is configured to perform access authentication on the Internet of Things device according to the first access key and the second access key.
  • the computer device when the computer device is implemented as an IoT device,
  • the processor is configured to provide the device information of the Internet of Things device to the access cloud platform; obtain the encrypted ciphertext provided by the access cloud platform and the first random number generated by the access cloud platform; the The encrypted ciphertext is the encrypted ciphertext obtained by the access cloud platform using the first encryption key to encrypt the first access key; the first encryption key is the device cloud platform of the IoT device through the device A key generated by encrypting the first random number with a key; the device key is set in the IoT device and the device cloud platform;
  • the processor is configured to encrypt the first random number with a device key to generate a second encryption key; decrypt the encrypted ciphertext with the second encryption key to obtain a second access key ;
  • the transceiver is configured to send an access authentication request including the second access key to the access cloud platform, where the access authentication request is used to request the access cloud platform according to the first
  • the access key and the second access key are used to perform access authentication on the IoT device.
  • the processor and transceiver in the computer device involved in the embodiments of the present application may perform any of the methods shown in FIG. 2 to FIG. The steps performed by accessing the platform cloud or the IoT device will not be repeated here.
  • a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, and the computer program is loaded and executed by a processor to implement the methods provided by the foregoing method embodiments.
  • An IoT device access authentication method performed by a computer device.
  • a computer program product which, when running on a processor of a computer device, enables a network device to execute the method for authentication of IoT device access described in the above aspects.
  • a chip is also provided, the chip includes a programmable logic circuit and/or program instructions, when the chip runs on a computer device, for implementing the IoT device described in the above aspects Access authentication method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente demande se rapporte au domaine des communications sans fil. L'invention divulgue un procédé et un appareil d'authentification d'accès à un dispositif de l'Internet des objets, un dispositif, et un support d'enregistrement. Le procédé comprend les étapes consistant à : obtenir des informations de dispositif d'un dispositif de l'Internet des objets ; générer un premier nombre aléatoire ; envoyer le premier nombre aléatoire à une plateforme en nuage de dispositif en fonction des informations de dispositif ; recevoir une première clé d'accès générée par la plateforme en nuage de dispositif au moyen d'une clé de dispositif et du premier nombre aléatoire ; fournir le premier nombre aléatoire au dispositif de l'Internet des objets ; et recevoir une demande d'authentification d'accès envoyée par le dispositif de l'Internet des objets, la demande d'authentification d'accès comprenant une seconde clé d'accès générée par le dispositif de l'Internet des objets selon la clé de dispositif et le premier nombre aléatoire, et effectuer une authentification d'accès sur l'Internet des objets selon la première clé d'accès et la seconde clé d'accès. Dans le procédé, il est inutile d'effectuer une authentification d'identité sur le dispositif de l'Internet des objets, de sorte qu'un procédé d'authentification d'accès puisse être simplifié, ce qui permet d'améliorer l'efficacité de l'authentification d'accès de dispositifs de l'Internet des objets tout en assurant la sécurité de l'authentification d'accès.
PCT/CN2020/134087 2020-12-04 2020-12-04 Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement WO2022116209A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/134087 WO2022116209A1 (fr) 2020-12-04 2020-12-04 Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement
CN202080106961.4A CN116420338A (zh) 2020-12-04 2020-12-04 物联网设备接入认证方法、装置、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/134087 WO2022116209A1 (fr) 2020-12-04 2020-12-04 Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement

Publications (1)

Publication Number Publication Date
WO2022116209A1 true WO2022116209A1 (fr) 2022-06-09

Family

ID=81852872

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/134087 WO2022116209A1 (fr) 2020-12-04 2020-12-04 Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement

Country Status (2)

Country Link
CN (1) CN116420338A (fr)
WO (1) WO2022116209A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115967735A (zh) * 2022-12-30 2023-04-14 广东百德朗科技有限公司 一种基于物联网平台的设备管理方法及系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116668203B (zh) * 2023-08-02 2023-10-20 浙江大华技术股份有限公司 设备认证方法、物联网设备、认证平台以及可读存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603234A (zh) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 一种设备身份认证的方法、装置和系统
CN109167778A (zh) * 2018-08-28 2019-01-08 南京邮电大学 物联网中终端设备无身份通用认证方法
US20190156019A1 (en) * 2017-11-22 2019-05-23 Aeris Communications, Inc. Secure authentication of devices for internet of things
CN110324287A (zh) * 2018-03-31 2019-10-11 华为技术有限公司 接入认证方法、装置及服务器
CN110636062A (zh) * 2019-09-20 2019-12-31 百度在线网络技术(北京)有限公司 设备的安全交互控制方法、装置、电子设备及存储介质
CN110995432A (zh) * 2020-03-05 2020-04-10 杭州字节物联安全技术有限公司 基于边缘网关的物联网感知节点认证方法
CN112019358A (zh) * 2019-05-28 2020-12-01 阿里巴巴集团控股有限公司 网络配置方法、装置、设备和系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603234A (zh) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 一种设备身份认证的方法、装置和系统
US20190156019A1 (en) * 2017-11-22 2019-05-23 Aeris Communications, Inc. Secure authentication of devices for internet of things
CN110324287A (zh) * 2018-03-31 2019-10-11 华为技术有限公司 接入认证方法、装置及服务器
CN109167778A (zh) * 2018-08-28 2019-01-08 南京邮电大学 物联网中终端设备无身份通用认证方法
CN112019358A (zh) * 2019-05-28 2020-12-01 阿里巴巴集团控股有限公司 网络配置方法、装置、设备和系统
CN110636062A (zh) * 2019-09-20 2019-12-31 百度在线网络技术(北京)有限公司 设备的安全交互控制方法、装置、电子设备及存储介质
CN110995432A (zh) * 2020-03-05 2020-04-10 杭州字节物联安全技术有限公司 基于边缘网关的物联网感知节点认证方法

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GONG CHUN-YAN, ZHU JIAN-YONG: "Study on authentication protocol and key agreement algorithm for IoT of industrial control", INTERNET OF THINGS TECHNOLOGIES, no. 3, 15 March 2013 (2013-03-15), pages 42 - 44, XP055937513, ISSN: 2095-1302, DOI: 10.16667/j.issn.2095-1302.2013.03.020 *
RONG XING, JIANG RONG, TIAN LIYE: "A Group Access Authentication Protocol for Things of Internet", COMPUTER ENGINEERING, vol. 41, no. 3, 15 March 2015 (2015-03-15), CN , pages 15 - 20, XP055937516, ISSN: 1000-3428, DOI: 10.3969/j.issn.1000-3428.2015.03.003 *
SAFKHANI MASOUMEH; BAGHERI NASOUR; KUMARI SARU; TAVAKOLI HAMIDREZA; KUMAR SACHIN; CHEN JIAHUI: "RESEAP: An ECC-Based Authentication and Key Agreement Scheme for IoT Applications", IEEE ACCESS, vol. 8, 28 October 2020 (2020-10-28), USA , pages 200851 - 200862, XP011820067, DOI: 10.1109/ACCESS.2020.3034447 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115967735A (zh) * 2022-12-30 2023-04-14 广东百德朗科技有限公司 一种基于物联网平台的设备管理方法及系统
CN115967735B (zh) * 2022-12-30 2023-10-24 广东百德朗科技有限公司 一种基于物联网平台的设备管理方法及系统

Also Published As

Publication number Publication date
CN116420338A (zh) 2023-07-11

Similar Documents

Publication Publication Date Title
US11178125B2 (en) Wireless network connection method, wireless access point, server, and system
US10667131B2 (en) Method for connecting network access device to wireless network access point, network access device, and application server
US10027664B2 (en) Secure simple enrollment
US11496320B2 (en) Registration method and apparatus based on service-based architecture
CN102595404B (zh) 用于存储和执行访问控制客户端的方法及装置
WO2018077232A1 (fr) Procédé d'authentification de réseau, et dispositif et système associés
CN110770695A (zh) 物联网(iot)设备管理
TWI455559B (zh) 虛擬用戶識別模組
US11075752B2 (en) Network authentication method, and related device and system
US9699655B1 (en) Cellular device authentication
WO2019041802A1 (fr) Procédé et appareil de découverte basés sur une architecture orientée service
US9608971B2 (en) Method and apparatus for using a bootstrapping protocol to secure communication between a terminal and cooperating servers
EP4231680A1 (fr) Système, procédé et appareil d'authentification d'identité, dispositif et support de stockage lisible par ordinateur
US20160227412A1 (en) Wireless Terminal Configuration Method, Apparatus, and Wireless Terminal
WO2022116209A1 (fr) Procédé et appareil d'authentification d'accès à un dispositif de l'internet des objets, dispositif et support d'enregistrement
US20190356485A1 (en) Secure methods and systems for identifying bluetooth connected devices with installed application
WO2023083170A1 (fr) Procédé et appareil de génération de clé, dispositif terminal et serveur
WO2013044766A1 (fr) Procédé et dispositif d'accès aux services pour un terminal sans carte
JP2020078067A (ja) モバイルデバイスを有するユーザがスタンドアロンコンピューティングデバイスの能力にアクセスすることをセキュアに可能にするためのシステム及び方法
US11070546B2 (en) Two-user authentication
CN115868142A (zh) 设备验证方法、设备和云端
KR101172876B1 (ko) 사용자 단말기와 서버 간의 상호 인증 방법 및 시스템
WO2022094936A1 (fr) Procédé d'accès, dispositif, et dispositif de plateforme en nuage
JP2020010099A (ja) 認証情報の設定を仲介するための装置及び方法
CN113543131A (zh) 网络连接管理方法、装置、计算机可读介质及电子设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20964054

Country of ref document: EP

Kind code of ref document: A1