Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security authentication transmission method and device for Internet of Things terminal

An Internet of Things terminal and data security technology, applied in the field of network security, can solve problems such as lack of scale, large maintenance, and practical operation difficulties, and achieve interactive authentication and data encryption, reduce storage resource consumption, and reduce bandwidth the effect of consumption

Active Publication Date: 2021-01-29
THE FIRST RES INST OF MIN OF PUBLIC SECURITY
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) It is mainly aimed at the security authentication of the upper computer and the business background, and can be applied to the authentication of the gateway and the background, but it is not suitable for the security authentication of the IoT terminal and the gateway
[0006] (2) Since the public key generation of PKI technology does not have a large scale, it is difficult to issue certificates for a large number of Internet of Things terminals with multiple communication protocols.
[0007] (3) The certificate directory needs to be run online, and the public key is stored in the online directory library in the form of a directory, which requires a lot of maintenance and cannot solve the needs of offline authentication between IoT terminals and gateways
[0008] (4) The reliability of authentication depends on the trusted third-party certificate authority (Certificate Authority, CA) authentication chain, which limits the flexibility of authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security authentication transmission method and device for Internet of Things terminal
  • Data security authentication transmission method and device for Internet of Things terminal
  • Data security authentication transmission method and device for Internet of Things terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical content of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] In order to enable those skilled in the art to better understand the present invention, some technical terms appearing in the embodiments of the present invention are explained as follows:

[0042] Host computer software "preset key tool": a dedicated customized production tool for batch, automatic, and graphical realization of key presetting work for client devices. The main body of the tool is an .exe executable client program.

[0043] CPK: Combined Public Key, combined public key authentication technology.

[0044] SM2: In 2012, the State Cryptography Administration publicly released the asymmetric cryptographic algorithm that became the standard of the national cryptographic industry.

[0045] SM4: In 2012, the State Encryption Administration publicly released the symmetric encryption algorithm t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security certification transmission method and device for an Internet of Things terminal. The method comprises the steps: presetting identification key pairs in a factory of an Internet of Things terminal, and presetting a corresponding public key matrix in an edge gateway; according to a preset identification key pair of the Internet of Things terminal and a presetpublic key matrix of the edge gateway, completing the bidirectional authentication of the Internet of Things terminal and the edge gateway, and acquiring a communication encryption / decryption key; andcompleting the encryption and decryption of transmission data between the Internet of Things terminal and the edge gateway by using the communication encryption / decryption key. And the problem that the traditional safety means is difficult to meet the Internet-of-Things scene is effectively solved. A key management system which is realized based on a public key cryptography technology and can beapplied to an Internet of Things terminal is constructed through a lightweight authentication system, online support of a third party is not needed, large-scale key generation is conveniently realized, the authentication efficiency is high, the authentication process is simple, a cryptographic protocol and a cryptographic module are realized on the basis of a national cryptographic algorithm, andthe interactive authentication and data encryption of the Internet of Things terminal are realized.

Description

technical field [0001] The invention relates to a data security authentication transmission method for an Internet of Things terminal, and also relates to a corresponding data security authentication transmission device, belonging to the technical field of network security. Background technique [0002] With the gradual construction of a large number of IoT terminals, ubiquitous IoT terminal devices connected to the IoT network pose a huge threat to the security system based on traditional border security methods. In the overall Internet of Things construction, devices can be divided into perception layer, network layer, platform layer and application layer. At present, mainstream security vendors at home and abroad have relatively mature and complete solutions for network security, cloud security, data security and application The security integrated solution corresponds to the network layer, platform layer, and application layer, so the biggest shortcoming of security capa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G16Y10/75G16Y40/50
CPCH04L63/0869H04L63/045H04L63/06H04L9/3247H04L9/3273G16Y10/75G16Y40/50
Inventor 苟智雄徐常星邢更力肖瑞林刁冯博赵俊博关博健
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products