A Trusted Mechanism for IoT Security Chips

A security chip and Internet of Things technology, applied in the field of Internet of Things security, can solve problems such as illegal access of authentication information and poor security, and achieve the effect of improving security and enriching sources

Active Publication Date: 2022-07-26
南京航灵信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Device authentication is the first step in the security of the entire Internet of Things. For legitimate devices, the identity authentication mechanism allows them to access the Internet of Things for data communication and information exchange with other devices. For illegal devices, the identity authentication mechanism restricts their access to the Internet of Things. In order to avoid the hidden dangers brought by it, in summary, using the traditional logo as authentication information is prone to illegal access, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Trusted Mechanism for IoT Security Chips
  • A Trusted Mechanism for IoT Security Chips

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The subject matter described herein will now be discussed with reference to example implementations. It should be understood that these embodiments are discussed only to enable those skilled in the art to better understand and implement the subject matter described herein, and not to limit the scope of protection, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the description. Various examples may omit, substitute, or add various procedures or components as desired. For example, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with respect to some examples may also be combined in other examples.

[0051] The "entropy" mentioned in the present invention is originally a thermodynamic concept. In cryptography, this word is used as a factor ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a trustworthy mechanism for an Internet of Things security chip, and relates to the technical field of Internet of Things security. The response part of the pair is taken as the first entropy value and added to the entropy pool; the IoT device extracts the communication protocol information of the communication process as the second entropy value and adds it to the entropy pool; the first entropy value and the second entropy value in the entropy pool are The physical feature information is obtained by combining the values; the physical feature information is input into the fuzzy extractor, the fuzzy extractor outputs the auxiliary data P and the uniform random value R, and the auxiliary data P and the uniform random value R are used as the registration information to register the identity; The random feature "physical fingerprint" in the production process is used as identity registration information, and the blockchain is used as a platform for identity generation and registration, with high security.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, and more particularly, to a trustworthy mechanism of a security chip of the Internet of Things. Background technique [0002] Uniquely identifying an IoT device is a basic function and can have many application scenarios, such as software authorization (how to ensure that your software can only be used on a specific machine after authorization), software license, device identification, device identification, etc. There are many problems with the current commonly used methods: [0003] (1) MAC address of the network card [0004] MAC address may be the most commonly used identification method, but now this method is basically unreliable: a computer may have multiple network cards and multiple MAC addresses. For example, a typical notebook may have multiple MAC addresses such as wired, wireless, Bluetooth, etc. With the change of different connection methods, the MAC address w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06H04L9/08H04L9/40
CPCH04L9/3278H04L9/3226H04L9/0866H04L9/0869H04L9/0643H04L63/083H04L63/0876
Inventor 裴景秋
Owner 南京航灵信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products