Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Password authentication method for internet of things by adopting security one-key management technology

A password authentication, Internet of Things technology, applied in the direction of user identity/authority verification, electrical components, transmission systems, etc., can solve the problem that cannot meet the market demand for concurrent authentication of sensor node devices, sensor data decryption and signature verification, and affects the application of PKI technology , the problem of high cost

Inactive Publication Date: 2012-12-19
胡祥义
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, some manufacturers at home and abroad use public key technologies such as PKI for IoT sensor node device authentication based on cryptographic algorithms, confidential transmission of sensing data at the perception layer, and integrity verification. However, IoT sensor The number of node devices is 32 times the number of Internet users. The cost of establishing a CA digital certification center using PKI technology is relatively high, and the CA certification center performs sensor node device certification, sensor data encryption and digital signature, and sensor data decryption and signature. The verification speed is slow, which cannot meet the market demand for concurrent authentication, sensor data decryption and signature verification of ultra-large-scale (massive) sensor node devices, thus affecting the application of PKI technology in the field of Internet of Things password authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password authentication method for internet of things by adopting security one-key management technology
  • Password authentication method for internet of things by adopting security one-key management technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following is a description with reference to the accompanying drawings: the process of using the three single keys in the Internet of Things security protocol, and the implementation steps of data transmission between the four types of devices in the Internet of Things password authentication system:

[0035] figure 1: Explain the use process of three single keys in the Internet of Things security protocol. First, in the smart card chip at the sensor node end, the Internet of Things security protocol at the sensor node end controls the random number generator to generate a set of random numbers. The number is used as the authentication or signature key CK, and the transmission key SK in the smart card chip of the sensor node is used to encrypt the authentication or signature key CK to generate the ciphertext of the authentication or signature key CK: CK', and send CK' To the authentication center, in the authentication center, the Internet of Things security protoco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password authentication method for an internet of things by adopting a security one-key management technology. According to the method, an internet of things security protocol is established by an authentication or a signature key, and the authentication or signature key is encrypted by transmission keys to ensure the security of the process of exchanging and transmitting the authentication or signature key; all transmission keys corresponding to a sensing node end are respectively encrypted by a storage key, to ensure the storage security of the transmission keys on the authentication center end; more encrypting cards are not required to be purchased to store a great amount of transmission keys when the quantity of the sensing node equipment is comparatively great, thereby greatly saving the cost of constructing the authentication center; a security one-key management method is adopted to solve a difficulty on the key updating and management of the one-key password algorithm in the internet of things security protocol, to reduce the cost of one-key updating and maintenance; meanwhile, the advantages of rapid encrypting and decrypting speeds of the one-key password algorithm are developed to effectively improve the operating speed of the internet of things security protocol, thereby establishing an internet of things password authentication system by adopting the security one-key management technology.

Description

Technical field: [0001] The present invention relates to the field of information security, and uses cryptographic technology to authenticate sensor node devices in the Internet of Things, and encrypts and digitally signs sensing data to ensure that the sensor node devices are authentic and credible, and to ensure the transmission of sensing data at the perception layer Security, Confidentiality and Integrity. Background technique: [0002] At present, some manufacturers at home and abroad use public key technologies such as PKI for IoT sensor node device authentication based on cryptographic algorithms, confidential transmission of sensing data at the perception layer, and integrity verification. However, IoT sensor The number of node devices is 32 times the number of Internet users. The cost of establishing a CA digital certification center using PKI technology is relatively high, and the CA certification center performs sensor node device certification, sensor data encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products