Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information leakage preventing method and system based on internet of things

An Internet of Things and encrypted information technology, which is applied in the field of information leakage prevention based on the Internet of Things, can solve problems such as security and privacy threats, and achieve the effect of protecting information security, increasing difficulty, and protecting security

Active Publication Date: 2013-09-04
WUXI CINSEC INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the communication is carried out in an open wireless environment, it is possible for the surrounding covert attack to obtain the data information on the transponder just like the reader, which constitutes a threat to security and privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leakage preventing method and system based on internet of things
  • Information leakage preventing method and system based on internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] see figure 1 , the present invention discloses an information leakage prevention method and system based on the Internet of Things, the system uses a public key private key encryption mechanism, and the system includes an RFID chip transponder, a reader at the application layer of the Internet of Things; the RFID chip transponder An electronic carrier that stores the identification information of "things" in the Internet of Things.

[0050] The method includes: the RFID chip transponder encrypts the private key and the public key; the reader at the application layer of the Internet of Things decrypts the public key and the private key, and the reader at the application layer of the Internet of Things generates a new private key; the reader at the application layer of the Internet of Things The reader forwards the new private key to the RFID chip transponder and all other readers of the IoT application layer.

[0051] Encryption mechanism used: When the IoT perception l...

Embodiment 2

[0057] The invention discloses an information leakage prevention method and system based on the Internet of Things. The system includes an RFID chip transponder communicating with each other and a reader at the application layer of the Internet of Things.

[0058] The use of public key and private key encryption mechanisms includes private key and public key encryption for RFID chip transponders (electronic carriers that store the identification information of "things" in the Internet of Things), and public and private key decryption for readers at the application layer of the Internet of Things And every time a new private key is generated, and the newly generated private key is forwarded to the RFID chip transponder and all other readers of the Internet of Things application layer.

[0059] see figure 2 , the present invention is based on the Internet of Things anti-information leakage method comprising the following specific steps:

[0060] I. The RFID chip transponder in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information leakage preventing method and system based on the internet of things. An RFID (Radio Frequency Identification Device) chip responder and a reader of an application layer of the internet of things, which are mutually communicated and arranged in the internet of things; and the RFID chip responder stores an electronic carrier of identifying information of things in the internet of things. The method comprises the following steps that the RFID chip responder encrypts a private key and a public key and then transmits encrypted information to the reader of the application layer of the internet of things by a network layer of internet of things; the reader of the application layer of the internet of things decrypts the public key and the private key and generates a new private key every time; and the reader of the application layer of the internet of things encrypts and forwards the new generated private key to the RFID chip responder and readers of other application layers of the internet of things by using the public key. The invention protects the safety of data in the internet of things and prevents the leakage of information by a public key and private key encrypting mechanism. In the whole process of realization, the dynamic replacement of the private key not only further protects information safety but also improves the difficulty of password cracking.

Description

technical field [0001] The invention belongs to the technical field of computer security, and relates to an information leakage prevention method, in particular to an information leakage prevention method based on the Internet of Things; meanwhile, the present invention also relates to an information leakage prevention method based on the Internet of Things. Background technique [0002] The Internet of Things is based on the computer Internet, using RFID, wireless data communication and other technologies to construct an "Internet of Things" covering everything in the world. In this network, items can "communicate" with each other without human intervention. The essence is to use radio frequency automatic identification (RFID) technology to realize the automatic identification of items and the interconnection and sharing of information through the computer Internet. However, with the rapid development of the Internet of Things, the hidden security crisis behind the Internet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06K7/00
Inventor 耿振民刘佳迪章玲玲由文超
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products