Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Internet of Things security system and communication method based on cryptographic technology

A cryptographic technology and secure communication technology, which is applied in key distribution, can solve the problems of cipher machine participation in control, failure to use cryptographic technology, terminal and platform cannot be generated independently, and achieve the effect of credible identity

Active Publication Date: 2021-11-12
北京安御道合科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) In the existing technology, no cryptography technology is used to solve the security problem of the Internet of Things, and functions such as safe channel, safe storage, data encryption, identity authentication, and digital signature cannot be quickly realized
It cannot be guaranteed that the data in the Internet of Things will not be stolen or tampered with, the identity can be trusted, and the data can be transmitted confidentially
[0006] (2) In the prior art, the encryption key KEK for the encrypted storage of the terminal key only depends on the terminal itself, and cannot be controlled by the cipher machine, and neither the terminal nor the platform can generate it independently
[0007] (3) In the existing technology, there is no distinction between device activation and sign-in. When the device is started and initialized, the device management and control platform cannot participate in the initialization of various keys of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Internet of Things security system and communication method based on cryptographic technology
  • An Internet of Things security system and communication method based on cryptographic technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] In the prior art, no cryptographic technology is used to solve the security problem of the Internet of Things, and functions such as safe channel, safe storage, data encryption, identity authentication, and digital signature cannot be quickly realized. It cannot be guaranteed that the data in the Internet of Things will not be stolen or tampered with, the identity can be trusted, and the data can be transmitted confidentially. Excessively introduced parts:

[0051] Aiming at the problems existing in the prior art, the present invention provides a cryptographic technology-based security system and method for the Inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of cryptographic technology, and discloses a security system and communication method for the Internet of Things based on cryptographic technology, which registers device identifiers and application identifiers and generates protection keys, sign-in keys, data keys, instruction keys, and semi-encrypted keys. key, CPK key and SM9 key; encrypt all the generated keys and store them safely; send a request carrying the terminal ID to the cipher machine, and perform data encrypted transmission after authentication and negotiation between the registration device and the cipher machine; The data is encrypted for transmission, and the cipher machine decrypts the encrypted data after receiving it. The present invention uses a symmetric algorithm or an identification cryptographic algorithm, combined with a series of software and hardware products, to solve the security of the Internet of Things as a whole, and quickly realize functions such as safe channel, safe storage, data encryption, identity authentication, and digital signature. The invention ensures that the data in the Internet of Things is not stolen or tampered with, the identity is credible, and the data can be transmitted confidentially.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and discloses a security system and a communication method for the Internet of Things based on cryptography. Background technique [0002] At present, the closest existing technology: while the Internet of Things is developing vigorously, the hidden security problems behind it are gradually emerging. The application of the Internet of Things needs to rely on the Internet or TCP / IP network to some extent, and there may be security risks in the Internet of Things environment from the hardware layer to the software application layer. [0003] At present, there is a fatal core problem in various Internet + applications such as smart cities, intelligent robots, and smart homes: how to identify identities on the Internet, and how to ensure that data is not stolen or tampered with. If people-people, people-things, and things-things can be trusted to identify each other, and through the confidentia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14H04L9/08
CPCH04L9/0866H04L9/0869H04L9/14H04L63/045
Inventor 叶雷胡瑾王新树
Owner 北京安御道合科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products