CN113037736A - Authentication method, device, system and computer storage medium - Google Patents
Authentication method, device, system and computer storage medium Download PDFInfo
- Publication number
- CN113037736A CN113037736A CN202110229326.1A CN202110229326A CN113037736A CN 113037736 A CN113037736 A CN 113037736A CN 202110229326 A CN202110229326 A CN 202110229326A CN 113037736 A CN113037736 A CN 113037736A
- Authority
- CN
- China
- Prior art keywords
- authentication
- internet
- things
- equipment
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a method, a device and a system for authentication and authorization and a computer storage medium, wherein the method for authentication and authorization is applied to local network equipment; the authentication method comprises the following steps: receiving Internet of things equipment data/network resource data input; receiving user data entry; configuring a mapping relation between user data and Internet of things equipment/network resources, and passing authentication conditions; judging whether a user authentication request sent by the equipment/network resource of the Internet of things meets the condition of accessing the equipment/network resource of the Internet of things or not; if the preset access authentication condition is met, returning a message of successful authentication to the authentication request source. The invention can provide authentication service of a third party for Internet of things equipment, internal application service and the like in a local area network. The ownership and the use authorization of the Internet of things device main body and the internal resources of the local area network are separated, and the use authentication authority and the ownership of the device are logically separated.
Description
Technical Field
The present invention relates to the field of authentication technology, and in particular, to an authentication method, an apparatus, a system, and a computer storage medium.
Background
User authentication is a basic user authority management unit, and in application of the internet, most resources can be accessed and used only by a user through authentication. For example, when a user downloads a document, the user needs to log in a document website, and there are various methods for downloading resources of the website, such as login by using an account and a password registered in the website, login without secret by using a mobile phone number, joint login authentication by using an authentication interface provided by a platform such as a wechat pay bank, and the like. After login authentication is passed, the user can access the specified resources. There may also be a need for authentication at the home network to access resources in the home network. For example, many terminal devices that can be accessed in a home local network may be internet of things terminals, home appliances, mobile phones, nas, monitors, and the like, and these devices are also service and resource providers of the home local network, and these resources are almost self-contained authentication methods or network authentication platforms provided by manufacturers. For a user, the user needs to obtain the right to use the device or the resource through the authentication of the device itself or by using a cloud authentication method provided by a manufacturer.
The authentication system and cloud authentication of the terminal equipment can achieve the purpose of authority authentication, but the existing authentication modes are various and comprise biological identification, passwords, dynamic authentication and the like. However, most of terminal devices of the internet of things have limited system functions and computing power, and all authentication access modes cannot be integrated. The cloud authentication method provided by the manufacturer can support multiple authentication methods, but the cloud authentication also has various problems, such as: 1. the cloud system can store authentication information of a large number of users, and has the problem of data security. 2. The cloud authentication system must ensure that a service terminal can be connected to a network, the internet of things equipment of each manufacturer needs to establish an own authentication platform, the terminal equipment is authenticated by the cloud platform, the concurrence peak value of the authentication platform is linearly increased along with the increase of the equipment holding capacity, and the construction and maintenance cost of the cloud platform is increased. 3. Different devices of an owner need to configure authentication authorities in different manufacturers, operation is complicated, management is complex, and an authentication mode without using a unified authentication platform is convenient.
Disclosure of Invention
The invention provides an authentication method, an authentication device, an authentication system and a computer storage medium, which aim to solve the technical problems.
The technical scheme adopted by the invention is as follows: the authentication method is applied to local network equipment, wherein the local network equipment comprises a gateway, a home router, a PC (personal computer) or embedded equipment, and comprises a storage layer for storing data, a configuration management layer for performing management configuration and a service logic layer for performing service processing;
the authentication method comprises the following steps:
receiving Internet of things device data/network resource data entry, wherein the Internet of things device data comprises one or more of a device identification code, a name, a device attribute, mac and a public key;
receiving a user data entry, the user data including one or more of identity information, a password, biometric data;
configuring a mapping relation between user data and Internet of things equipment/network resources and conditions of passing authentication;
judging whether a user authentication request sent by the equipment/network resource of the Internet of things meets the condition of accessing the equipment/network resource of the Internet of things or not;
if the preset access authentication condition is met, returning a message of successful authentication to the authentication request source.
Preferably, the receiving the user data entry further comprises: and generating an information entry page accessed by the user, sending the url or the access two-dimensional code of the information entry page to the user for remote entry, and entering user access data by a background or a field entry point by the user.
Preferably, the configuring the mapping relationship between the user data and the internet of things device/network resource, and passing the authentication condition further includes: and storing the configuration information and/or automatically generating a management log.
Preferably, the configuring the mapping relationship between the user data and the internet of things device/network resource, and passing the authentication condition further includes: and setting different access rights and limiting conditions according to different resources.
Preferably, all data transmitted and received are stored in an encrypted manner.
Preferably, the method further comprises opening a traffic listening port.
The invention also provides a certification and authentication device, which is a local network device, the local network device comprises a gateway, a home router, a PC or an embedded device, and the certification and authentication device comprises:
the data processing module is used for receiving data entry of equipment/network resources of the Internet of things, user data entry and addition, deletion, modification and check of related data;
the storage module is used for storing the Internet of things equipment data/network resources, the user data and the mapping relation data;
the configuration management module is used for configuring the mapping relation between the data of the user and the Internet of things equipment/network resources and passing the authentication condition;
and the service logic module is used for judging whether the user authentication request sent by the Internet of things equipment/network resource meets the condition of accessing the Internet of things equipment.
The invention also provides an authentication system, which comprises a plurality of Internet of things devices and local network devices in communication connection with the Internet of things devices, wherein the local network devices realize the authentication method during authentication.
The invention also provides a computer storage medium having a computer program stored thereon, which, when executed by a processor, implements the steps of the authentication method described above.
The invention has the beneficial effects that:
(1) the invention can provide authentication service of a third party for Internet of things equipment, internal application service and the like in a local area network. The ownership and the use authorization of the device main body of the Internet of things and the internal resources of the local area network are separated, and the use authentication authority and the ownership of the device are logically separated, so that after different device manufacturers and the application resources of the internal network follow the scheme provided by the invention, the logical unified authentication can be realized on the authority processing of the use authorization.
(2) The remote input of the authentication information of the third-party user and the remote configuration and management of the resources and the use permission of the terminal equipment are supported, and the service efficiency is improved.
(3) The terminal equipment does not need to store the sensitive information of a special user, and the risk of leakage of the sensitive information of the user is reduced.
(4) The use right of the equipment of the Internet of things can be logically mapped, so that the owner of the equipment of the Internet of things can conveniently authorize the use right of the equipment and resources to a user, and an equipment manager can flexibly configure services and scenes which can be used by the user.
(5) The authentication service is provided in the local network, the concept of edge computing is practiced, the computing service of authentication and authentication is configured in the local network of the user, the concurrent peak cost when a manufacturer uses the cloud service is reduced, and the existing resources of the user are fully utilized for business processing.
Drawings
Fig. 1 is a flowchart of an authentication method disclosed in the present invention.
Fig. 2 is a schematic structural diagram of an authentication device disclosed in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings, but embodiments of the present invention are not limited thereto.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
Example 1:
referring to fig. 1, the present embodiment takes remote-managed people as an example to describe an application scenario of the method.
The authentication method is applied to local network equipment, wherein the local network equipment comprises a gateway or a home router, and the local network equipment comprises a storage layer for storing data, a configuration management layer for performing management configuration and a service logic layer for performing service processing.
The authentication method comprises the following steps:
s1: and receiving data entry of the equipment of the Internet of things.
Specifically, the internet of things device data specifically includes one or more of a device identification code, a name, a device attribute, mac, and a public key.
S2: user data entry is received.
The user data includes one or more of identity information, a password, biometric data. When a user needs to stay in a store, a user data entry transaction is created, an information entry page which can be accessed by the user is generated, a url or an access two-dimensional code of the information entry page is sent to the user, the user can enter a password or biological identification data into the authentication and authorization system through the connection, besides remote entry, the user can also enter the password or the biological identification data through entity equipment, such as a fingerprint reader-writer, an identity card reader-writer, a field registration webpage and the like, and sensitive data are encrypted and then stored in a local gateway.
S3: and configuring the mapping relation between the data of the user and the equipment of the Internet of things and the condition of passing authentication.
After the user enters the corresponding authentication data, resources which can be accessed by the user are configured in the authentication system according to the data of the customer order, for example, the user can open a gate of a resident room and a guest room door of a resident room on the day when the user needs to live. The method comprises the steps of adding related equipment and resource access authority of a user to a resident gate and an entrance room and limiting conditions such as the time of the entrance and the like into configuration management, generating a mapping relation between the user and available equipment through the configuration, and storing the mapping relation in a configuration management database. The mapping relationship also stores the generation management log for inspection and the like.
S4: and judging whether the user authentication request sent by the Internet of things equipment meets the condition of accessing the Internet of things equipment.
S5: and if the preset access authentication condition is met, sending a message of successful authentication to the Internet of things equipment and the user.
When a user enters a residence on a scheduled day, the fingerprint lock or the intelligent door lock is unlocked by using the fingerprint lock or the encryption card recorded with user data, the fingerprint lock or the intelligent door lock receives an execution instruction request through user triggering, and the intelligent door lock sends an authentication request to the local gateway, wherein the request comprises an identification code of the equipment, user authentication information encrypted by a private key of the equipment and the like.
After receiving the authentication request, the local gateway queries the public key of the device through the device identification code in the database, decrypts the relevant authentication information of the user by using the public key, queries the user identification code by using the authentication information, confirms whether the user has the authority to access the resource or not by configuring the associated information in management, and confirms whether the current access request accords with the preset access condition (such as access time) or not. If the user meets the condition of accessing the resource currently, the authentication success is returned to the intelligent door lock, otherwise, the authentication failure is returned, and the returned result information needs to be encrypted by using the public key of the intelligent door lock.
After receiving the return of the authentication instruction, the intelligent door lock decrypts the authentication information by using the private key, and executes the instruction or returns an authentication failure prompt according to the return result. When the configured access condition is not satisfied, such as the check-in time expires, the configuration management layer marks the authentication data and the access configuration information of the user as invalid, and the related data is retained or deleted. And ending the business process. In addition, the local gateway opens a monitoring port in the whole course to monitor the service request.
The use of other devices is similar to the service process, such as air-conditioning televisions and the like, and devices without contact sensors can perform authority authentication through an encryption card in a room, so that a flexibly configurable authentication scene is realized.
Example 2
The present embodiment takes network resources (such as movies and songs) that need authentication as an example to introduce an application scenario of the method.
The authentication method is applied to local network equipment, wherein the local network equipment comprises a PC (personal computer) or an embedded device (such as NAS), and the local network equipment comprises a storage layer for storing data, a configuration management layer for performing management configuration and a service logic layer for performing service processing.
The authentication method comprises the following steps:
s1: receiving a network resource data entry.
S2: user data entry is received.
S3: configuring the mapping relation between the user data and the network resources, and passing the authentication condition.
S4: and judging whether the user authentication request sent by the network resource meets the condition of accessing the network resource, and if so, sending a message of successful authentication to the network resource and the user.
Example 3
Referring to fig. 2, an authentication and authorization apparatus, which is a local network device including a gateway, a home router, a PC, or an embedded device, includes:
the data processing module 10 is used for receiving data entry of internet of things equipment/network resources, user data entry and addition, deletion, modification and check of related data;
the storage module 20 is configured to store internet of things device data/network resources, user data, and mapping relationship data;
the configuration management module 30 is used for configuring the mapping relationship between the data of the user and the internet of things device/network resource, and passing the authentication condition;
and the service logic module 40 is configured to determine whether a user authentication request sent by the internet of things device/network resource satisfies a condition for accessing the internet of things device.
Example 4
An authentication and authorization system comprises a plurality of internet of things devices and local network devices in communication connection with the internet of things devices, wherein the local network devices realize the authentication and authorization method in embodiment 1 or 2 when authenticating and authorizing.
Example 5
A computer storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the authentication and authorization method of embodiment 1 or 2.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (9)
1. The authentication method is applied to local network equipment, wherein the local network equipment comprises a gateway, a home router, a PC (personal computer) or embedded equipment, and comprises a storage layer for storing data, a configuration management layer for managing and configuring and a service logic layer for performing service processing;
the authentication method comprises the following steps:
receiving Internet of things device data/network resource data entry, wherein the Internet of things device data comprises one or more of a device identification code, a name, a device attribute, mac and a public key;
receiving a user data entry, the user data including one or more of identity information, a password, biometric data;
configuring a mapping relation between user data and Internet of things equipment/network resources and conditions of passing authentication;
judging whether a user authentication request sent by the equipment/network resource of the Internet of things meets the condition of accessing the equipment/network resource of the Internet of things or not;
if the preset access authentication condition is met, returning a message of successful authentication to the authentication request source.
2. The authentication and authorization method according to claim 1, wherein the receiving user data entry further comprises:
and generating an information entry page accessed by the user, and sending the url or the access two-dimensional code of the information entry page to the user for remote entry.
3. The authentication method according to claim 1, wherein the configuring the mapping relationship between the user data and the internet of things device/network resource, and after passing the authentication condition, further comprises:
and storing the configuration information and/or automatically generating a management log.
4. The authentication method according to claim 1, wherein the configuring the mapping relationship between the user data and the internet of things device/network resource, and after passing the authentication condition, further comprises:
and setting different access rights and limiting conditions according to different resources.
5. The authentication method according to claim 1, wherein all data transmitted and received are stored in an encrypted manner.
6. The authentication method according to any one of claims 1 to 5, further comprising opening a traffic listening port.
7. An authentication device, which is a local network device including a gateway, a home router, a PC or an embedded device, the authentication device comprising:
the data processing module is used for receiving data entry of equipment/network resources of the Internet of things, user data entry and addition, deletion, modification and check of related data;
the storage module is used for storing the Internet of things equipment data/network resources, the user data and the mapping relation data;
the configuration management module is used for configuring the mapping relation between the data of the user and the Internet of things equipment/network resources and passing the authentication condition;
and the service logic module is used for judging whether the user authentication request sent by the Internet of things equipment/network resource meets the condition of accessing the Internet of things equipment.
8. An authentication and authorization system, comprising a plurality of internet of things devices and a local network device in communication connection with the internet of things devices, wherein the local network device implements the authentication and authorization method according to any one of claims 1 to 6 when authenticating and authorizing.
9. A computer storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the steps of the authentication method of any one of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110229326.1A CN113037736B (en) | 2021-03-02 | 2021-03-02 | Authentication method, device, system and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110229326.1A CN113037736B (en) | 2021-03-02 | 2021-03-02 | Authentication method, device, system and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113037736A true CN113037736A (en) | 2021-06-25 |
CN113037736B CN113037736B (en) | 2023-07-14 |
Family
ID=76465413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110229326.1A Active CN113037736B (en) | 2021-03-02 | 2021-03-02 | Authentication method, device, system and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113037736B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114666167A (en) * | 2022-05-23 | 2022-06-24 | 中电云数智科技有限公司 | Safety user authentication method of industrial equipment and industrial equipment |
CN116760610A (en) * | 2023-06-30 | 2023-09-15 | 中国科学院空天信息创新研究院 | User cross-domain authentication system, method, equipment and medium under network limited condition |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120249292A1 (en) * | 2011-01-13 | 2012-10-04 | Hong Kong Applied Science And Technology Research Institute Co., Ltd. | Proximity based biometric identification systems and methods |
US20150128215A1 (en) * | 2013-11-01 | 2015-05-07 | Kt Corporation | Integrated cloud storage service through home gateway |
WO2015161690A1 (en) * | 2014-04-25 | 2015-10-29 | 天地融科技股份有限公司 | Secure data interaction method and system |
CN106991317A (en) * | 2016-12-30 | 2017-07-28 | 中国银联股份有限公司 | Safe verification method, platform, device and system |
CN108650212A (en) * | 2018-03-14 | 2018-10-12 | 北京云信万致科技有限公司 | A kind of Internet of Things certification and access control method and Internet of Things security gateway system |
CN109039642A (en) * | 2018-06-25 | 2018-12-18 | 深圳市招华智能股份有限公司 | A kind of method and system of subscription authentication |
WO2019052532A1 (en) * | 2017-09-18 | 2019-03-21 | 阿里巴巴集团控股有限公司 | Information interaction method, apparatus and device for internet of things device |
CN111182074A (en) * | 2019-12-31 | 2020-05-19 | 南京创维信息技术研究院有限公司 | Intelligent device terminal with edge computing capability and computer-readable storage medium |
CN111385154A (en) * | 2020-03-18 | 2020-07-07 | 成都千立网络科技有限公司 | Internet of things control system and method based on authentication linkage mechanism |
WO2021003816A1 (en) * | 2019-07-05 | 2021-01-14 | 杭州博联智能科技股份有限公司 | Method for authenticating iot device is bound to user, device and medium |
-
2021
- 2021-03-02 CN CN202110229326.1A patent/CN113037736B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120249292A1 (en) * | 2011-01-13 | 2012-10-04 | Hong Kong Applied Science And Technology Research Institute Co., Ltd. | Proximity based biometric identification systems and methods |
US20150128215A1 (en) * | 2013-11-01 | 2015-05-07 | Kt Corporation | Integrated cloud storage service through home gateway |
WO2015161690A1 (en) * | 2014-04-25 | 2015-10-29 | 天地融科技股份有限公司 | Secure data interaction method and system |
CN106991317A (en) * | 2016-12-30 | 2017-07-28 | 中国银联股份有限公司 | Safe verification method, platform, device and system |
WO2019052532A1 (en) * | 2017-09-18 | 2019-03-21 | 阿里巴巴集团控股有限公司 | Information interaction method, apparatus and device for internet of things device |
CN112217831A (en) * | 2017-09-18 | 2021-01-12 | 创新先进技术有限公司 | Information interaction method, device and equipment about Internet of things equipment |
CN108650212A (en) * | 2018-03-14 | 2018-10-12 | 北京云信万致科技有限公司 | A kind of Internet of Things certification and access control method and Internet of Things security gateway system |
CN109039642A (en) * | 2018-06-25 | 2018-12-18 | 深圳市招华智能股份有限公司 | A kind of method and system of subscription authentication |
WO2021003816A1 (en) * | 2019-07-05 | 2021-01-14 | 杭州博联智能科技股份有限公司 | Method for authenticating iot device is bound to user, device and medium |
CN111182074A (en) * | 2019-12-31 | 2020-05-19 | 南京创维信息技术研究院有限公司 | Intelligent device terminal with edge computing capability and computer-readable storage medium |
CN111385154A (en) * | 2020-03-18 | 2020-07-07 | 成都千立网络科技有限公司 | Internet of things control system and method based on authentication linkage mechanism |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114666167A (en) * | 2022-05-23 | 2022-06-24 | 中电云数智科技有限公司 | Safety user authentication method of industrial equipment and industrial equipment |
CN116760610A (en) * | 2023-06-30 | 2023-09-15 | 中国科学院空天信息创新研究院 | User cross-domain authentication system, method, equipment and medium under network limited condition |
CN116760610B (en) * | 2023-06-30 | 2024-05-07 | 中国科学院空天信息创新研究院 | User cross-domain authentication system, method, equipment and medium under network limited condition |
Also Published As
Publication number | Publication date |
---|---|
CN113037736B (en) | 2023-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016273888B2 (en) | Controlling physical access to secure areas via client devices in a networked environment | |
US20210314312A1 (en) | System and method for transferring device identifying information | |
US11736292B2 (en) | Access token management method, terminal, and server | |
CN109510849B (en) | Cloud-storage account authentication method and device | |
CN106330442B (en) | Identity authentication method, device and system | |
CN111783075A (en) | Authority management method, device and medium based on secret key and electronic equipment | |
CN102089767A (en) | Authenticated database connectivity for unattended applications | |
KR20040049272A (en) | Methods and systems for authentication of a user for sub-locations of a network location | |
CN109756446A (en) | A kind of access method and system of mobile unit | |
CN113037736B (en) | Authentication method, device, system and computer storage medium | |
CN112995227B (en) | One-stop information service platform based on three-party credit management | |
CN116668190A (en) | Cross-domain single sign-on method and system based on browser fingerprint | |
KR101278926B1 (en) | Social verification login system being possible to verify user and providing method thereof | |
US9135460B2 (en) | Techniques to store secret information for global data centers | |
CN116915493A (en) | Secure login method, device, system, computer equipment and storage medium | |
CN111538973A (en) | Personal authorization access control system based on state cryptographic algorithm | |
KR102081875B1 (en) | Methods for secure interaction between users and mobile devices and additional instances | |
CN105743883B (en) | A kind of the identity attribute acquisition methods and device of network application | |
CN116260656A (en) | Main body trusted authentication method and system in zero trust network based on blockchain | |
KR20220121045A (en) | Edge computing system and method for controlling network access thereof | |
AU2021102834A4 (en) | A User Authentication System and Method using Smart Cards for Cloud based IoT Applications | |
CN118174874B (en) | Token generation method and device for unified authentication | |
KR20170108667A (en) | System and method for providing a security service based on a security cloud | |
Schaefer et al. | Securing personal data in smart home environments | |
CN115834114A (en) | Method for logging in bastion machine, system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |