Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for security management of Internet of Things devices

An Internet of Things device and security management technology, which is applied in the field of security management of Internet of Things devices, can solve the problems that the Internet of Things system is attacked by the outside world, so as to improve the platform's security and anti-attack capabilities, increase data processing speed, and improve key security. sexual effect

Active Publication Date: 2020-09-29
HENGBAO
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of this application is to provide a method and system for security management of Internet of Things devices, and to solve the technical problem that the Internet of Things system is at risk of being attacked by the outside world in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for security management of Internet of Things devices
  • A method and system for security management of Internet of Things devices
  • A method and system for security management of Internet of Things devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0059] Such as figure 1 As shown, it is a schematic diagram of the certificate issuance relationship between the IoT security management platform and the IoT device in this embodiment. The IoT security management platform issues certificates to each IoT device in a distributed manner. In the figure, the arrow starts from the issuer of the certificate, and the arrow points to the issuer of the certificate. The third-party security organization platform 101 sends to the enterprise 1 IoT security management platform, enterprise 2 IoT security management platform, until The enterprise m IoT security management platform issues the IoT security management platform certificate; each IoT security management platform issues device certificates to the IoT devices (device 1, device 2, device 3, until device n) it manages respectively.

[0060] figure 2 It is a schematic flow chart of a method for security management of IoT devices in this embodiment. An authentication system based on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and system for security management of an Internet-of-Things device. The method comprises: an Internet-of-Things security management platform carries out registrationon a recognized third-party security mechanism platform and the third-party security mechanism platform issues an Internet-of-Things security management platform certificate after successful Internet-of-Things security management platform authentication; an Internet-of-Things device carries out registration on the Internet-of-Things security management platform, the Internet-of-Things security management platform authenticates an Internet-of-Things device subscriber identity module successively and then issues an Internet-of-Things device subscriber identity module certificate to a subscriberidentity module; and when an Internet-of-Things business platform and the Internet-of-Things device carry out business data transmission mutually, the Internet-of-Things security management platform and the subscriber identity module carry out identity authentication and a business data transmission encryption working secret key is negotiated after successful authentication, thereby ensuring highsecurity of dual-side data transmission. Therefore, the Internet-of-Things device is protected from being controlled illegally; and the overall anti-attack capability of the Internet-of-Things systemis enhanced.

Description

technical field [0001] The present application relates to the technical field of the Internet of Things, and in particular to a method and system for security management of Internet of Things devices. Background technique [0002] At present, the Internet of Things technology has achieved great development in smart cities, smart homes, smart industries, smart agriculture, smart transportation and other fields. While the development of science and technology brings convenience to human life, related technical loopholes have also attracted the attention of criminals. In July 2015, two American hackers, Charlie Miller and Chris Valasek, successfully cracked a Jeep Cherokee. They successfully controlled the vehicle's multimedia system, steering system and even the braking system without touching the vehicle. The final result It was the Cherokee that drove into the gutter on the side of the road. In August 2017, 175,000 IoT security cameras manufactured by a company in Shenzhen ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3247H04L63/0428H04L63/061H04L63/0823H04L63/0869H04L63/20H04L63/205H04L67/12
Inventor 尤洪松底明辉何碧波
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products