Internet of things data security method based on security certificate
A security authentication and data security technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as Internet of Things security risks, important data leakage, and illegal theft of perceived data, so as to enhance security and guarantee safe effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] The present invention will be described in detail below in conjunction with the accompanying drawings. As a part of this specification, the principle of the present invention will be described through embodiments. Other aspects, features and advantages of the present invention will become clear at a glance through the detailed description.
[0016] refer to figure 1 , the specific process of the Internet of Things data security method is as follows:
[0017] S1. The sensing node continuously perceives data at a natural frequency;
[0018] S2. When the data user needs to perceive the data, send an identity authentication request to the security authentication layer with its own certificate;
[0019] S3. After receiving the identity request information, the security authentication layer checks whether the user has the authority to use important sensory data, and if not, returns feedback information; if yes, requests to establish a secure transmission channel with the dat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com