A method for controlling and secure communication of an Internet of Things terminal

An IoT terminal and secure communication technology, applied in the field of IoT smart terminal access and management, can solve problems such as illegal device intrusion, and achieve the effect of solving security problems, solving illegal device intrusion, and facilitating access authentication and authority management.

Active Publication Date: 2022-04-15
易联众智能(厦门)科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the security problems of the prior art in terms of IoT terminal control and secure communication, the present invention provides a method for IoT terminal control and secure communication, which can solve the security problems in IoT terminal control and secure communication. Simple and effective, solving the problem of illegal device intrusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for controlling and secure communication of an Internet of Things terminal
  • A method for controlling and secure communication of an Internet of Things terminal
  • A method for controlling and secure communication of an Internet of Things terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The present invention provides a terminal control and secure communication method of the Internet of Things, such as Figure 1-5 As shown, the steps include:

[0033] S100: Number the IoT devices, generate the corresponding key according to the corresponding number through the back-end encryption server according to the key generation rules, and write the key into the corresponding key card in turn; Communication server address, communication key, encryption algorithm information;

[0034] During specific implementation, the key generation rules in S100;

[0035] The master key generation rule is to input the first security data, which is the root key, and input the second security data, which is the master key dispersion factor, and generate the master key through the DEA encryption algorithm;

[0036] The working key generation rule is to input the master key, input the function point number, and generate the working key through the DEA encryption algorithm.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for controlling and secure communication of an Internet of Things terminal. The method includes: numbering an IoT device, generating a corresponding key according to a corresponding number through a back-end encryption server according to a key generation rule, and sequentially writing the key into into the corresponding key card; when installing the IoT device, insert the key card into the card slot of the IoT device; the IoT device sends a request to establish a connection with the corresponding server according to the server address attribute recorded in the key card, After the two parties pass the authentication, the connection is established; when the IoT device communicates with the server, it selects different business servers for connection and access according to different business needs; when communicating, it uses the communication key stored in the key card to generate a The corresponding temporary working key encrypts the sent data, and the server also stores the master key, which can be decrypted after the corresponding temporary working key is generated. Solve security issues in IoT terminal control and secure communication.

Description

technical field [0001] The invention relates to the field of Internet of Things intelligent terminal access and management, in particular to a method for controlling and secure communication of an Internet of Things terminal. Background technique [0002] The Internet of Things technology originated in the media field and is the third revolution of the information technology industry. The Internet of Things refers to the connection of any object with the network through information sensing equipment according to the agreed agreement, and the object exchanges information and communicates through the information transmission medium to realize intelligent identification, positioning, tracking, supervision and other functions. [0003] In large-scale IoT application scenarios, device access and management often face problems such as lack of access control or complicated management and control methods. If the access device cannot be effectively authenticated and managed and comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08H04L67/12H04L67/141
CPCH04L63/0428H04L9/0625H04L9/0869H04L63/083H04L67/12H04L67/141H04L63/0853
Inventor 郜恩光黄兆胜吴坚峰陈键魏琼楼仲启德洪建松柯福重念洪华贡敏琴陈志伟
Owner 易联众智能(厦门)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products