Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things security system based on cryptographic technology and communication method

A cryptographic technology and secure communication technology, applied in key distribution, can solve the problems that the device management and control platform cannot participate in the device key initialization, the terminal and the platform cannot be generated independently, and the cipher machine participates in the control, etc.

Active Publication Date: 2019-11-29
北京安御道合科技有限公司
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) In the existing technology, no cryptography technology is used to solve the security problem of the Internet of Things, and functions such as safe channel, safe storage, data encryption, identity authentication, and digital signature cannot be quickly realized
It cannot be guaranteed that the data in the Internet of Things will not be stolen or tampered with, the identity can be trusted, and the data can be transmitted confidentially
[0006] (2) In the prior art, the encryption key KEK for the encrypted storage of the terminal key only depends on the terminal itself, and cannot be controlled by the cipher machine, and neither the terminal nor the platform can generate it independently
[0007] (3) In the existing technology, there is no distinction between device activation and sign-in. When the device is started and initialized, the device management and control platform cannot participate in the initialization of various keys of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security system based on cryptographic technology and communication method
  • Internet of Things security system based on cryptographic technology and communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] In the prior art, no cryptographic technology is used to solve the security problem of the Internet of Things, and functions such as safe channel, safe storage, data encryption, identity authentication, and digital signature cannot be quickly realized. It cannot be guaranteed that the data in the Internet of Things will not be stolen or tampered with, the identity can be trusted, and the data can be transmitted confidentially. Excessively introduced parts:

[0051] Aiming at the problems existing in the prior art, the present invention provides a cryptographic technology-based security system and method for the Inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of passwords, and discloses an Internet of Things security system and communication method based on a password technology, and the method comprises the steps: registering equipment identifier and an application identifier, and generating a protection secret key, a sign-in secret key, a data secret key, an instruction secret key, a half secret key, a CPKsecret key and an SM9 secret key; encrypting all the generated secret keys and then safely storing the secret keys; sending a request carrying a terminal identifier to the cipher machine, and performing data encryption transmission after the request is authenticated and negotiated by the registration equipment and the cipher machine; and through data encryption transmission, enabling the cipher machine to decrypt the encrypted data after receiving the encrypted data. A symmetric algorithm or an identification cryptographic algorithm is used, a series of software and hardware products are combined, the safety of the Internet of Things is integrally achieved, and the functions of secure channel, secure storage, data encryption, identity authentication, digital signature and the like are rapidly achieved. According to the invention, the data in the Internet of Things is prevented from being stolen and tampered, the identity is credible, and the data can be transmitted secretly.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and discloses a security system and a communication method for the Internet of Things based on cryptography. Background technique [0002] At present, the closest existing technology: while the Internet of Things is developing vigorously, the hidden security problems behind it are gradually emerging. The application of the Internet of Things needs to rely on the Internet or TCP / IP network to some extent, and there may be security risks in the Internet of Things environment from the hardware layer to the software application layer. [0003] At present, there is a fatal core problem in various Internet + applications such as smart cities, intelligent robots, and smart homes: how to identify identities on the Internet, and how to ensure that data is not stolen or tampered with. If people-people, people-things, and things-things can be trusted to identify each other, and through the confidentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14H04L9/08
CPCH04L9/0866H04L9/0869H04L9/14H04L63/045
Inventor 叶雷胡瑾王新树
Owner 北京安御道合科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products