Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things security authentication method and system

A technology of security authentication and security authentication module, applied in security devices, transmission systems, digital transmission systems, etc., can solve the problems of low security and increase cost, and achieve the effect of high security

Pending Publication Date: 2019-09-10
BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The disadvantage of software authentication is mainly low security. The highest security level of software authentication is EAL2+. Its core authentication algorithm is implemented by software. Key data and key information are only stored in the software storage area, and the existing operating system and software There are many security holes
[0007] Although the existing hardware authentication scheme has high security, since the terminal equipment needs to be separately loaded with a special security hardware, the issue, installation and use of the hardware modules of the terminal equipment require additional management, and the original Re-design the layout of components in some terminal equipment products, so as to design the security hardware in the terminal equipment
In this way, the existing hardware authentication scheme has the following disadvantages: a separate hardware authentication module needs to be added to the original terminal equipment, which will increase a lot of extra costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] figure 1 Embodiment 1 of the present application provides an Internet of Things security authentication system, which includes: a terminal device 11 and a security authentication module 12, wherein the security authentication module 12 is connected to the terminal device 11;

[0041] The terminal device 11 is configured to send a security authentication request to the security authentication module 12, and receive a security authentication result sent by the security authentication module 12;

[0042] The security authentication module 12 is configured to receive a security authentication request sent by the terminal device 11, perform security authentication on the terminal device 11 according to the security authentication request, and send a security authentication result to the terminal device 11 .

[0043] As a specific embodiment of the present application, the terminal device 11 may be a fixed terminal or a mobile terminal, which is not limited. As an example, ...

Embodiment 2

[0049] See figure 2 The Internet of Things security authentication method provided in Embodiment 2 of the present application includes the following steps:

[0050] S201: The security authentication module 12 receives a security authentication request sent by the terminal device 11.

[0051] The security service is one of the services provided by the security authentication module 12. The terminal device 11 connects to the security authentication module 12 through interfaces such as SPI, Bluetooth, and Uart and initiates a security authentication request. The security authentication request is used to apply for the security authentication module 12. Services. Security authentication requests include encryption and decryption requests, identity authentication requests, and other authentication requests.

[0052] S202: The security authentication module 12 performs security authentication on the terminal device 11 according to the security authentication request, and obtains ...

Embodiment 3

[0064] see image 3 , an Internet of Things security authentication system provided in the embodiment of the present application includes a terminal device 31, a security authentication module and a communication module 33;

[0065] In the embodiment of this application, the terminal device 31 can communicate with figure 1 The functions and structures of the terminal devices 11 in the shown system are the same, and for the sake of brevity, no detailed description is given here.

[0066] The security authentication module 32 has figure 1 In addition to the functions of the security authentication module 12 shown, it is used to receive the security authentication request sent by the terminal device 31, perform security authentication on the terminal device 31 according to the security authentication request, and send the security authentication result to The terminal device 31.

[0067] In addition, the security authentication module 32 can also have the following functions: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an Internet of Things security authentication method and system. The system comprises terminal equipment and a security authentication module. The security authentication module is in communication connection with the terminal equipment, and when the security authentication module receives a security authentication request sent by the terminal equipment, security authentication can be carried out on the terminal equipment according to the security authentication request, and a security authentication result is sent to the terminal equipment. The security authentication module does not belong to the internal module of the terminal equipment. Therefore, based on the system, the cost of the terminal equipment is not increased, and the defects that inthe prior art, when safety authentication is conducted on the Internet of Things, the safety of a software authentication mode is poor, and the cost is increased due to the fact that the internal structure of the terminal equipment needs to be changed in a hardware authentication mode can be overcome at the same time.

Description

technical field [0001] The present application relates to the technical field of security authentication, in particular to a method and system for security authentication of the Internet of Things. Background technique [0002] The Internet of Things is an important part of the new generation of information technology, and it is also an important stage of development in the "informationization" era. Its English name is: "Internet of things (IoT)". As the name suggests, the Internet of Things is the Internet of things connected. This has two meanings: first, the core and foundation of the Internet of Things is still the Internet, which is an extended and expanded network based on the Internet; Exchange and communication, that is, things are closely related. The Internet of Things is widely used in the integration of networks through communication perception technologies such as intelligent perception, identification technology and pervasive computing. Therefore, it is call...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04W12/06
CPCH04L9/3234H04L63/0853H04W12/06
Inventor 刘青王卫东
Owner BEIJING HUAHONG INTEGRATED CIRCUIT DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products