Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things

A data integrity and confidential transmission technology, applied in digital data protection, transmission system, digital data authentication, etc., can solve problems such as high establishment cost, insufficient number of managed users, slow PKI/CA authentication, etc.

Active Publication Date: 2011-02-09
胡祥义
View PDF4 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are no information security products at home and abroad that can solve the Internet of Things from the perception layer, the transport layer to the application layer. Cryptographic algorithm and symmetric cryptographic algorithm are used together to establish user identity authentication, file digital signature and data confidentiality transmission system. However, the authentication speed of PKI / CA is too slow, and the number of users managed by a single CA authentication center is insufficient, so many CA authentication centers need to be established The establishment cost is too high, and other user identity authentication, file digital signature and data confidentiality transmission systems based on combined symmetric key technology cannot be directly used for information security of the Internet of Things. In short, existing authentication and digital signature products None of them can meet the market's demand for information security in the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things
  • Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things
  • Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following describes the implementation steps of IoT for device authentication, data integrity and confidential transmission with reference to the accompanying drawings:

[0061] figure 1 : Indicates the process of the sensor transmitting data to the network data center in a complete and confidential manner. After the sensor collects information (set as: data M), it immediately sends a data encryption transmission request to the smart chip according to the data transmission operation command ZC1 in the sensor chip. : Send the data transmission operation instruction ZC1, the identification of the sensor and the information collected by the sensor to the smart chip together. In the smart chip, the operation instruction comparison protocol will store the data transmission operation instruction in the smart chip ciphertext file package (set as: ZC2 ), compared with the received data transmission operation command ZC1 sent by the sensor. If ZC1≠ZC2, it means that ZC1 has ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things (IoT), which is characterized in that the information collected by a sensor is transmitted to a network data center after being subject to digital signature and encryption through an intelligent chip; the network date center obtains the complete and believable information collected by the sensor by utilizing an authentication center (AC) to carry out data deciphering and signature verification; the network data center transmits an operational order to a sensor terminal, the operational order is subject to the digital signature and the encryption by the AC and then transmits to the sensor; the sensor obtains a correct and complete operational order after operational order data obtained by the sensor is subject to the data deciphering and the signature verification through the intelligent chip; and an equipment authentication protocol of the AC to the sensor is used to determine whether the sensor equipment is confirmed to be in a normal operation state or not, thus an information safety system for the infrastructure authentication, the data integrity and the secrecy transmission of the IoT is established.

Description

Technical field: [0001] The invention relates to the field of Internet of Things information security. Background technique: [0002] At present, there are no information security products at home and abroad that can solve the Internet of Things from the perception layer, the transport layer to the application layer. Cryptographic algorithm and symmetric cryptographic algorithm are used together to establish user identity authentication, file digital signature and data confidentiality transmission system. However, the authentication speed of PKI / CA is too slow, and the number of users managed by a single CA authentication center is insufficient, so many CA authentication centers need to be established The establishment cost is too high, and other user identity authentication, file digital signature and data confidentiality transmission systems based on combined symmetric key technology cannot be directly used for information security of the Internet of Things. In short, exis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06F21/00H04L29/06G06F21/44G06F21/64
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products