Method and system for certificateless m2m privacy protection and key management

A privacy protection and key management technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as easy leakage of private information, key security issues, limited capabilities, etc. The effect of implementing operations and improving safety

Inactive Publication Date: 2016-06-22
BEIJING UNIV OF POSTS & TELECOMM +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The main purpose of the present invention is to provide a method and system based on certificate-free M2M privacy protection and key management, so as to solve the problem of energy consumption for maintaining certificates due to the limited capabilities of MTC terminal devices in the Internet of Things. People are on duty, all kinds of private information are easy to leak, key escrow exists in the existing identity-based key management mechanism, the key cannot be updated by itself, and the key security of the entire mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for certificateless m2m privacy protection and key management
  • Method and system for certificateless m2m privacy protection and key management
  • Method and system for certificateless m2m privacy protection and key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]Certain terms are used, for example, in the description and claims to refer to particular components. Those skilled in the art should understand that hardware manufacturers may use different terms to refer to the same component. The specification and claims do not use the difference in name as a way to distinguish components, but use the difference in function of components as a criterion for distinguishing. As mentioned throughout the specification and claims, "comprising" is an open term, so it should be interpreted as "including but not limited to". "Approximately" means that within an acceptable error range, those skilled in the art can solve the technical problem within a certain error range and basically achieve the technical effect. In addition, the term "coupled" herein includes any direct and indirect electrical coupling means. Therefore, if it is described that a first device is coupled to a second device, it means that the first device may be directly electr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for M2M privacy protection and key management based on no certificate. In the method, different terminal devices send their identity information to the service platform, and use their system private key, initial value and identity information to generate the terminal device's identity information. The private key and dynamic factor are stored and returned; the terminal device selects a random value to generate the public-private key pair of the terminal device; when different terminal devices request to communicate, the requesting terminal device according to its random value, identity information and dynamic factors to generate an anonymous message and send it to the requested party; the requested party receives the anonymous message and verifies the public key of the requesting party with the system public key. If the verification is successful, the requested party uses its private key and the anonymous message Negotiate the session key of the two parties and process the session between the two parties; if the verification fails, the communication request is rejected. The invention solves the problems of energy consumption for maintaining certificates, easy leakage of various private information, and key security problems of the whole mechanism.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a certificate-less M2M (Machine to Machine, machine-to-machine communication) privacy protection and key management method and system. Background technique [0002] At present, with the acceleration of the construction of the Internet of Things, various Internet of Things services (such as smart medical care, smart transportation, home furnishing, military, etc.) have gradually entered people's lives. [0003] Because the Internet of Things has the characteristics of compatibility in network technology types and unlimited expansion in business scope, security issues have become an important factor restricting its development. [0004] On the one hand, when national data and personal information are connected to the Internet of Things, more personal privacy information may be illegally obtained at any time and anywhere; [0005] On the other hand, since the country's i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04W12/041H04W12/06
Inventor 李文敏蒋芃张华王心怡
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products