Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet of Things terminal security authentication method based on security chip

An Internet of Things terminal and security chip technology, applied in the field of Internet of Things, can solve problems such as potential safety hazards, achieve high security levels, strong defense capabilities, and reduce the effect of system coupling

Active Publication Date: 2019-12-06
北京方研矩行科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the era of the Internet of Everything, the security networking of smart terminals is a key issue, and in the security networking technology, the most critical thing is the server's security authentication of networked terminals. How to make smart terminals have a strong level of authentication is a very important task. , there are more or less hidden security risks in the current common traditional Internet software authentication methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things terminal security authentication method based on security chip
  • Internet of Things terminal security authentication method based on security chip
  • Internet of Things terminal security authentication method based on security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] figure 1 It is a flow chart of a security chip-based IoT terminal security authentication method according to an embodiment of the present application, wherein the main process of the IoT terminal security authentication method is shown.

[0036] This embodiment provides a security chip-based IoT terminal security authentication method, such as figure 1 shown, which includes:

[0037] 101: A network connection is formed between the IoT terminal and the cloud server;

[0038]102: The security chip set in the IoT terminal constructs a registration request and sends it to the cloud server, and the cloud server verifies the legitimacy of the IoT terminal according to the registration request, and generates the IoT terminal corresponding to this session after the verification is successful. The temporary terminal ID and the temporary terminal secret key are saved, and then the server-side final session secret key is generated in the cloud server, and the generated temporar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of Things terminal security authentication method based on a security chip. Whole-process safety guarantee of three stages of registration service interaction, authentication service interaction and data service interaction between the Internet of Things terminal and the cloud server is completed. Security authentication is carried out in a mode of combining hardware authentication such as product digital signature authentication and software authentication such as security chip temporary terminal digital signature authentication, and the relatively strong defense capability can be provided for both hardware attacks and software attacks. Besides, all operations related to encryption and decryption are carried out by the cloud and the two ends of the security chip, the communication terminal is transparent, only data acquisition, processing and forwarding are carried out by the communication terminal, and security calculation is not carried out, so that separation of security logic and service logic is realized, the coupling degree of the whole system is reduced, and a higher security level is achieved.

Description

technical field [0001] The present application relates to the field of the Internet of Things, in particular to a method for security authentication of an Internet of Things terminal based on a security chip. Background technique [0002] In recent years, with the continuous development of IoT technology and the increasing number of IoT devices, the vulnerabilities of IoT devices have also been gradually exposed. Whether it is botnets, worms, DDoS attacks, or replay attacks, they are all at a faster rate. IoT devices are threatened in more subtle and complex ways. [0003] From small smart bracelets, smart watches, to web cameras, to smart door locks, while IoT technology brings convenience to our work and life, it also introduces various risks. Compared with the PC Internet and mobile Internet, due to the wide variety of devices, the huge number, and the complex and concealed attack methods, the security problems in the Internet of Things era have become more serious. If t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0853H04L63/083H04L63/0807H04L63/12H04L9/3247H04L67/12
Inventor 董方王科岩
Owner 北京方研矩行科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products