Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for secure registration and access of Internet of Things terminal

A technology of IoT terminal and access method, which is applied in the field of security registration and access method and system of IoT terminal, can solve problems such as complex analysis process, large amount of negotiation data, cumbersome structure, etc., and achieve saving of computing resources, coding The effect of high decoding efficiency and simplified negotiation process

Active Publication Date: 2022-07-05
确信信息股份有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The storage space of IoT terminal entities is limited. At present, the size of a single digital certificate file is about 2~4KB, which is not conducive to the storage of IoT terminal entities
[0006] (2) The computing power of the terminal entity of the Internet of Things is limited, and the efficiency of parsing digital certificates becomes the key to whether it is applicable to the Internet of Things
The current recursive definition and ASN.1 encoding and decoding methods used in digital certificates lead to cumbersome structures and complex parsing processes, especially for large certificate chains, which also have problems in non-binding protocols such as EAP-TLS, unless the number of bytes sent by the server Less than three times the number of bytes received before validating the client address, otherwise the latency would increase significantly
[0007] (3) For some battery-powered IoT terminal devices, encoding and decoding digital certificates will lead to excessive power consumption, which is not suitable for battery-powered devices;
[0008] (4) Internet of Things applications generally have a large number of terminal devices, and traditional manual offline registration, issuance and import of certificates has a large workload and cannot guarantee the accuracy and security of human operations, and cannot meet the needs of Internet of Things application scenarios;
[0009] (5) For the transmission confidentiality of IoT communication data, the traditional TLS protocol adopts the TCP protocol, the negotiation process is cumbersome, and the amount of negotiation data is large, which cannot meet the requirements of the restricted environment and network of the IoT

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for secure registration and access of Internet of Things terminal
  • Method and system for secure registration and access of Internet of Things terminal
  • Method and system for secure registration and access of Internet of Things terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] This embodiment provides a secure registration and access method for an IoT terminal;

[0068] like Figure 4 As shown in the figure, the security registration and access method of the IoT terminal includes:

[0069] S101: After the IoT terminal goes online, perform session key negotiation with a second certificate certification authority server; during the negotiation, the second certificate certification authority server verifies the pre-registration certificate of the IoT terminal using the first root certificate; verifying After passing, the session key is obtained through key exchange;

[0070] S102: The IoT terminal sends an acquisition request for the second root certificate and the certificate revocation list to the second certificate certification authority server;

[0071] S103: The second certificate certification authority server sends the second root certificate to the IoT terminal; the IoT terminal saves the second root certificate;

[0072] S104: The I...

Embodiment 2

[0207] This embodiment provides an IoT terminal security registration and access system;

[0208] IoT terminal security registration and access system, including: IoT terminal;

[0209] After the IoT terminal goes online, the session key negotiation is performed with the second certificate certification authority server; during the negotiation process, the second certificate certification authority server uses the first root certificate to verify the pre-registration certificate of the IoT terminal; after the verification is passed , obtain the session key through key exchange;

[0210] The IoT terminal sends an acquisition request for the second root certificate and the certificate revocation list to the second certificate certification authority server;

[0211] The second certificate certification authority server sends the second root certificate to the IoT terminal; the IoT terminal stores the second root certificate;

[0212] The IoT terminal generates key information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of secret communication, and discloses an Internet of Things terminal security registration and access method and system. The method comprises the following steps: the Internet of Things terminal performs session key negotiation with a second certificate authentication mechanism server; the second certificate authentication mechanism server verifies the pre-registered certificate of the Internet of Things terminal by using the first root certificate; a session key is obtained after the verification is passed; the Internet of Things terminal sends an acquisition request of a second root certificate and a certificate logout list to a second certificate authentication mechanism server; the second certificate authentication mechanism server sends a second root certificate to the Internet of Things terminal; the Internet of Things terminal generates a digital certificate registration request instruction; the Internet of Things terminal sends the digital certificate registration request instruction to a second certificate authentication mechanism server; and after receiving the registration request instruction, the second certificate authentication mechanism server generates a digital certificate and feeds the digital certificate back to the Internet of Things terminal. And automatic and safe registration and access processes are realized through a simplified certificate coding mode with a compact certificate structure.

Description

technical field [0001] The present invention relates to the field of secure communication, in particular to a method and system for secure registration and access of Internet of Things terminals. Background technique [0002] The statements in this section merely provide background related to the present disclosure and do not necessarily constitute prior art. [0003] The Internet of Things is an information carrier based on the Internet, traditional telecommunication networks, etc. It enables all common physical objects that can be independently addressed to form an interconnected network. With the rapid development of information technology and various sensors, microprocessor devices have the ability to detect their own state, environmental parameters, network transmission and data exchange, making people enter the era of Internet of Things. With the rapid development of the Internet of Things, the application of the Internet of Things in life is becoming more and more ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/32H04L9/40G16Y30/10
CPCH04L9/3066H04L9/302H04L9/3239H04L9/3247H04L9/3263H04L63/0861G16Y30/10
Inventor 王立伟王吉伟刘伟张雪
Owner 确信信息股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products