Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of things data security method based on security certificate

A security authentication and data security technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as Internet of Things security risks, important data leakage, and illegal theft of perceived data, so as to enhance security and guarantee safe effect

Inactive Publication Date: 2013-04-24
WUXI CINSEC INFORMATION TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The Internet of Things is also facing huge security risks. There are no good solutions to problems such as illegal theft of perceived data and leakage of important data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things data security method based on security certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.

[0016] refer to figure 1 , the specific process of the Internet of Things data security method is as follows:

[0017] S1. The sensing node continuously perceives data at a natural frequency;

[0018] S2. When the data user needs to perceive the data, send an identity authentication request to the security authentication layer with its own certificate;

[0019] S3. After receiving the identity request information, the security authentication layer checks whether the user has the authority to use important sensory data, and if not, returns feedback information; if yes, requests to establish a secure transmission channel with the dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of things data security method based on security certificate. The method includes the following steps: (1) sending an identity authentication request to a security certificate layer when a data user needs to perceive data; (2) establishing secure transmission channel between the security certificate layer and the data user through the certificate to receive a data request from the data user; and (3) obtaining perception data from a perception node by the security certificate layer, processing the perception data, and sending the processed data to the data user. According to the Internet of things data security method based on the security certificate, the security certificate layer is added between the perception node and the user, the purpose of user identity recognition is achieved, and the fact that important Internet of things data are accessed illegally by the user can be effectively avoided. Meanwhile, the perception data can also be encrypted in the transmitting process, and thus data security in the transmitting process is ensured.

Description

technical field [0001] The invention belongs to the technical field of information security of the Internet of Things, and in particular relates to a data security method of the Internet of Things based on security authentication. Background technique [0002] With the development of society and the continuous improvement of the level of science and technology, the Internet of Things has been widely developed. The Internet of Things is the application expansion of the Internet and the wide application of various sensing technologies. [0003] With the development of information and communication technology, the security threats faced by communication networks are becoming more and more diversified, and security issues such as leakage and theft of important information are very prominent. The Internet of Things is also facing huge security risks. There are no good solutions to problems such as illegal theft of sensory data and leakage of important data. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李朋飞孙雅耿振民杨磊戴伟强
Owner WUXI CINSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products