Internet of Things security chip trusted mechanism

A security chip, the technology of the Internet of Things, applied in the field of Internet of Things security, can solve the problems of poor security, illegal access of authentication information, etc., to achieve the effect of improving security and enriching sources

Active Publication Date: 2020-12-29
南京航灵信息科技有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Device authentication is the first step in the security of the entire Internet of Things. For legitimate devices, the identity authentication mechanism allows them to access the Internet of Things for data communication and information exchange with other devices. For illegal devices, the identity authentication mechanism restricts their access to the Internet of Things. In order to avoid the hidden dangers brought by it, in summary, using the traditional logo as authentication information is prone to illegal access, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security chip trusted mechanism
  • Internet of Things security chip trusted mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The subject matter described herein will now be discussed with reference to example implementations. It should be understood that the discussion of these implementations is only to enable those skilled in the art to better understand and realize the subject matter described herein, and is not intended to limit the protection scope, applicability or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as needed. For example, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with respect to some examples may also be combined in other examples.

[0050] The "entropy" mentioned in the present invention is originally a concept of thermodynamics. In cryptography, this word i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things security chip trusted mechanism, and relates to the technical field of Internet of Things security. The mechanism comprises the following steps: obtaininga physical unclonable function of a chip, and extracting a plurality of excitation corresponding pairs from the physical unclonable function; extracting a response part of the excitation corresponding pair as a first entropy value, and adding the first entropy value into an entropy pool; the Internet of Things equipment extracting communication protocol information in the communication process asa second entropy value and adding the second entropy value into an entropy pool; combining the first entropy value and the second entropy value in the entropy pool to obtain physical feature information; inputting the physical feature information into a fuzzy extractor, outputting auxiliary data P and a uniform random value R by the fuzzy extractor, and registering an identity by taking the auxiliary data P and the uniform random value R as registration information. The random feature physical fingerprint in the chip production and manufacturing process is used as identity registration information, the block chain is used as an identity generation and registration platform, and the safety is high.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, and more specifically, it relates to a trusted mechanism of an Internet of Things security chip. Background technique [0002] Uniquely identifying an IoT device is a basic function that can have many application scenarios, such as software authorization (how to ensure that your software can only be used on a specific machine after authorization), software license, device identification, device identification, etc. There are many problems with the current common method: [0003] (1) Network card MAC address [0004] MAC address may be the most commonly used identification method, but now this method is basically unreliable: a computer may have multiple network cards and multiple MAC addresses, such as a typical notebook may have multiple MAC addresses such as wired, wireless, and bluetooth. With the change of different connection methods, the MAC address will change every ti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L9/08H04L29/06
CPCH04L9/3278H04L9/3226H04L9/0866H04L9/0869H04L9/0643H04L63/083H04L63/0876
Inventor 裴景秋
Owner 南京航灵信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products