Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

M2M (Machine-to-Machine) terminal security access method and terminal and management platform

A management platform and access method technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of terminals not providing security mechanisms, lack of application layer security mechanisms, etc., and achieve the effect of high security requirements

Active Publication Date: 2012-07-04
CHINA TELECOM CORP LTD
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The M2M terminal and the M2M management platform use the application layer protocol to communicate on the data channel. Although the CDMA network based on the code division multiple access coding technology itself has certain security, most terminals currently do not provide a security mechanism and transmit business data in plain text. , a small number of terminals use SMS channels to send passwords to encrypt data, but there is still a lack of perfect application layer security mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • M2M (Machine-to-Machine) terminal security access method and terminal and management platform
  • M2M (Machine-to-Machine) terminal security access method and terminal and management platform
  • M2M (Machine-to-Machine) terminal security access method and terminal and management platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0047] In the present invention, the built-in User Identity Module (UIM) card in the M2M terminal is used to save the security data, and the security data is also synchronized to the M2M management platform side during the registration process, and the M2M terminal and the M2M management platform are consistent. The security data can be used as the calculation basis of security passwords to realize the encryption and verification of data interaction. This method provides a relatively complete application layer security mechanism for the M2M terminal, which can meet the high security requirements in industry applications.

[0048] The present invention will be described below through several embodiments. Such as figure 1 As shown, it is a schematic flowchart of an embodiment of the M2M terminal secure access method of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an M2M (Machine-to-Machine) terminal security access method. The method comprises the following steps that: the M2M terminal generates login request information including a first random number and encrypts the login request information by using a base password calculated according to security data pre-stored in a UIM (User Identifier Module); the M2M terminal calculates a ciphertext and the base password by using a digest algorithm so as to obtain a first digest; the M2M terminal transmits the ciphertext and the first digest to the M2M management platform; the M2M management platform adopts the digest algorithm to calculate and obtain a second digest; the first digest is compared with the second digest, if the first digest is the same as the second digest, the ciphertext is decrypted according to the base password, thereby obtaining the login request information and accomplishing the login; and the M2M terminal and the M2M management platform adopt the digest algorithm to calculate the security data and the first random number, respectively, thereby obtaining a session password and decrypting a subsequent session process by using the session password. The invention further relates to an M2M terminal and a management platform. According to the invention, a relatively perfect application security mechanism is provided for communication between the M2M terminal and the M2M management platform.

Description

technical field [0001] The present invention relates to a machine-to-machine communication (M2M for short) technology, and in particular to a secure access method for an M2M terminal, a terminal, and a management platform. Background technique [0002] In a broad sense, M2M includes the information interaction between machines and machines, mobile networks and machines, and people and machines, and is the main application form of the Internet of Things at this stage. M2M application is a service that takes M2M terminals as the core, establishes an information exchange link between M2M terminals, M2M management platform and M2M application platform, and completes functions such as terminal access and control, information collection and analysis. [0003] With the rapid development of M2M applications, the number of M2M terminals accessing the CDMA network is increasing, and the security issues of data transmission of M2M terminals are becoming increasingly prominent. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/08H04W12/03H04W12/041
Inventor 何申
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products