Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for secure communication in Internet of Things

A technology for secure communication and the Internet of Things, applied in the field of secure communication methods and devices, can solve problems such as lack of identity verification, lack of security control mechanisms, and information leakage in smart devices, so as to ensure communication security and prevent devices from being counterfeited and peers. The effect of counterfeiting and ensuring communication security

Inactive Publication Date: 2016-07-20
QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
View PDF5 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the binding between smart devices and applications on mobile terminals lacks the necessary security control mechanism. Smart devices do not have authentication mechanisms and technical means, and are easy to be counterfeited, leading to security issues such as information leakage and unauthorized access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for secure communication in Internet of Things
  • Method and device for secure communication in Internet of Things
  • Method and device for secure communication in Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0050] In the first embodiment of the present invention, a secure communication method in the Internet of Things, in the Internet of Things including cloud platform, smart device and mobile terminal three-party device interconnection, such as figure 1 As shown, for the communication between any two devices, assuming that any two devices are the first device and the second device, the steps performed by the first device include:

[0051] Step S101 , by verifying the digital signature of the digital certificate, judging the legitimacy of identity with the second device; wherein, the digital certificates and corresponding digital signatures of the three-party devices are all issued by the same CA center.

[0052] Specifically, step S101 includes:

[0053] Exchanging respective digital certificates with the second device for the second device to verify whether the digital signature of the digital certificate of the first device is legal, and,

[0054] The first device verifies wh...

no. 2 example

[0061] The second embodiment of the present invention is a secure communication method in the Internet of Things. The method described in this embodiment is substantially the same as that in the first embodiment. The difference is that step S101 of this embodiment specifically includes:

[0062] Exchanging respective digital certificates with the second device, so that the second device verifies whether the digital signature of the digital certificate of the first device and the attributes of the digital certificate are legal, and,

[0063] The first device verifies whether the digital signature of the digital certificate of the second device and the attributes of the digital certificate are legal, and if legal, determines that the second device has successfully passed the identity legality judgment; otherwise, determines that the second device cannot pass the identity legality judgment.

[0064] Further, the first device verifies whether the digital signature of the digital ce...

no. 3 example

[0067] The third embodiment of the present invention is a secure communication method in the Internet of Things. The method described in this embodiment is substantially the same as that in the first embodiment. The difference is that in step S102, the method described in this embodiment performs Communications, including:

[0068] The encryption mode negotiated with the second device is used to communicate with the second device.

[0069] Specifically, the process of negotiating with the second device to determine the encryption method includes:

[0070] After both the first device and the second device successfully pass the identity legality judgment, they negotiate with the second device to determine the encryption method; wherein, the messages exchanged during the negotiation process are encrypted and decrypted using an asymmetric encryption algorithm, and the negotiation determines the encryption method. The encryption method includes: a symmetric encryption algorithm su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for secure communication in Internet of Things. For communication between devices of any two parties, namely a first device and a second device, in the Internet of Things with interconnected devices of three parties, namely a cloud platform, an intelligent device and a mobile terminal, the first device executes the following steps of carrying out identity validity judgement with the second device through a method for verifying a digital signature of a digital certificate; and communicating with the second device when the first device and the second device both successfully pass through the identity validity judgement. Through adopting the method for verifying the digital certificate to carry out identity authentication on various interconnected intelligent devices in the Internet of Things, and the security control of bidirectional authentication is realized in a process for communication between the intelligent devices, so that the security risks that the devices are counterfeit and the opposite terminal is forged are effectively prevented and the communication security of the intelligent device is guaranteed. After identity authentication, the encrypted communication is carried out, so that the hacking risk is effectively prevented and the communication security is more completely guaranteed.

Description

technical field [0001] The present invention relates to the technical field of intelligent IoT, in particular to a secure communication method and device in the IoT. Background technique [0002] Intelligent device (intelligent device) refers to any kind of equipment, apparatus or machine with computing power. As computer technology becomes more and more advanced and cheaper, various types of equipment can be built. In addition to personal computers and palmtop computers, there are many smart devices, including medical equipment, geological equipment and household appliances. [0003] Smart devices usually have the function of connecting to the network, and can perform operations such as query, binding and management through corresponding applications installed on mobile terminals such as smart phones or tablet computers. [0004] A digital certificate is an authoritative electronic document issued by an authoritative and impartial third-party organization, that is, a CA (C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0838H04L9/3247H04L9/3263H04L63/0823H04L63/0876
Inventor 白秀杰
Owner QINGDAO HAIER INTELLIGENT HOME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products