A method of providing security protection for item identification and its analysis service

A technology for parsing service and item identification, applied in the field of Internet of Things information systems, and can solve problems such as limited coding space

Active Publication Date: 2016-05-11
FUDAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the problem of limited coding space, this method provides security extension codes for different security application requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of providing security protection for item identification and its analysis service
  • A method of providing security protection for item identification and its analysis service
  • A method of providing security protection for item identification and its analysis service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be described in further detail below in conjunction with the examples.

[0055] figure 1 Shown is the security item identification analysis service process completed by the cooperation of enterprise information system, key management system, local ONS server, DNS tree service network supporting DNSSEC and client. image 3 Swimlane flowchart for secure coding services.

[0056] An example is given below to specifically illustrate the whole process of security item code from generation to analysis. Assume that a manufacturer uses the Serialized Global Trade Identification Number (SGTIN-96) to mark items, which has a length of 96 bits. The first 58 bits have a fixed meaning and are used to indicate the category of the product, and the last 38 bits are freely defined by the manufacturer. For cost considerations, the RFID tag capacity selected by the manufacturer is 96 bits, and a space-sensitive 8-bit verification code is selected to provide se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of an Internet of Things information system, and particularly relates to a method for providing safety protection for item identification and an item resolution service. The method ensures that the item identification in Internet of Things can not be easily forged, and the effect that a resource address returned by the item resolution service is safe and credible is guaranteed. A mode of a safety extended code is used for encrypting the item identification, and custom configuration can be conducted on part of parameters in a strategy by a manufacturer according to product space sensitiveness, required safety levels and other factors. A safety coding strategy and a secret key are registered in a unified secret key management system by the manufacturer, and the secret key management provides an open coding authentication service. After an item is put in circulation, a user owning the item can authenticate authenticity of the item through the open coding authentication service, the resolution service protected by DNSSEC is transferred to acquire a safe and credible item detailed information source, and then detailed information of the item is acquired.

Description

technical field [0001] The invention belongs to the technical field of Internet of Things information systems, and relates to a method for security extension of item identification and its analysis service in the Internet of Things. Background technique [0002] "Internet of Things" (Internet of Things, IOT) is called the third wave of information technology after computers and the Internet. Its core idea is to extend the application of the Internet to the physical world through the research and integration of a series of technologies and disciplines (including sensors, chips, broadband networks, massive information processing and information security, etc.), which is an organic integration of information technology and society. . As an integral part of the future Internet, the Internet of Things is considered to be a global dynamic network facility with self-configuration capabilities based on standards and interactive communication protocols; in this network, virtual and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L29/12
Inventor 李敏波朱珠沈烁
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products