Method and system for realizing service application safety

A technology of business application and implementation method, which is applied in the direction of security devices, transmission systems, usage of multiple keys/algorithms, etc., and can solve the problems of reduced security, insufficient security of key strength and algorithm, and difficulty in effectively guaranteeing business security, etc. question

Active Publication Date: 2010-10-27
DATANG MICROELECTRONICS TECH CO LTD
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the user often does not enter the key or the key strength and algorithm entered are not secure enough, a large number of encrypted data transmitted by Bluetooth and WIFI have been illegally cracked, and the security of the key and pairing of other communication technologies needs to be strengthened
[0010] However, batch keys are used between devices for long-distance communication and business application systems. A large number of devices use the same ke

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing service application safety
  • Method and system for realizing service application safety
  • Method and system for realizing service application safety

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0106] The Internet of Things business security system provided by this embodiment is as follows: figure 2 As shown, a business security platform is built in the original Internet of Things architecture, which can communicate with business application systems, wireless communication devices of the Internet of Things and user terminal devices through the network. It can also communicate with OTA (over the air) platform, BOSS (business operation support system) and other business security platforms.

[0107] In order to improve the security of data transmission between devices, this embodiment realizes the safe storage and distribution of keys through the business security platform. Due to the great uncertainty and unpredictability of the relationship between the devices used together, such as A controlled device with positioning function is built in a pet collar, and the key can be preset in the device. After the user purchases the pet collar, he can determine to use, for exa...

no. 2 example

[0156] The IoT service security system of this embodiment is the same as the first embodiment, and also has a service security platform. The process of key generation, storage and distribution in this embodiment is different from that in the first embodiment, and the schematic diagram is as follows Image 6 shown. The corresponding process is as Figure 7 shown, including:

[0157] Step 210, generating the first key and the second key by a trusted institution, same as step 110;

[0158] Step 220, saving the first key and the second key in the service security platform and establishing an association relationship with the security module identifier of the first device;

[0159] The security module identification is preferably generated or acquired by the organization that generates the first key and the second key, and then provided to the operator who manages the service security platform.

[0160] Step 230, the service security platform receives an association request for...

no. 3 example

[0179]The IoT service security system of this embodiment is the same as the first embodiment, and also has a service security platform. The key generation, storage and distribution process of this embodiment is different from the first and second embodiments, the schematic diagram is as follows Figure 8 shown. The corresponding processes include:

[0180] Step 1, the first device generates a first key and a second key for use together;

[0181] Step 2: The first device saves the generated first key, encrypts the second key and the preset security module ID of the device and uploads it to the service security platform, and the service security platform saves the second key and the security module ID after decryption. The module identifies and establishes the relationship between the two;

[0182] The first device can use the public key used by the service security platform for data transmission to encrypt, and the service security platform can use its own private key for da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for realizing service application safety. The system comprises first equipment and second equipment which can communicate with each other, and a service safety platform. The method comprises the following processes of: key filling, namely generating a first key and a second key which are matched with each other, wherein the first key is preset in the first equipment or is transmitted to the first equipment by the service safety platform; and the second key is stored and transmitted to the second equipment by the service safety platform; and key using, namely encrypting and decrypting interactive data based on the first key and the second key when the first equipment communicates with the second equipment. The invention also relates to encrypted transmission between terminal equipment and a service application system. The method and the system of the invention can improve the safety of service data transmission.

Description

technical field [0001] The invention relates to a method and system for realizing business application security. Background technique [0002] At present, there are more and more applications for communicating between devices through short-range communication modules or long-distance communication modules, and the most typical application is the Internet of Things. [0003] The so-called "Internet of Things" refers to the combination of various information sensing devices, such as radio frequency identification (RFID) devices, infrared sensors, global positioning systems, laser scanners and other devices, with the Internet. a huge network. Its purpose is to connect all items to the network for easy identification and management. The Internet of Things is established using ubiquitous network technology and can be divided into three layers: perception layer, network layer and application layer. [0004] figure 1 Shown is an exemplary application scenario of the Internet of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04L9/14H04L9/32H04L29/06H04W12/03H04W12/0431H04W12/0433
Inventor 赵纶郑辉王京阳
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products