IOT (Internet of Things) based equipment authentication method, device and system

An IoT device and authentication method technology, applied in the authentication field of IoT terminals and servers, can solve the problems of unsuitable symmetric key mechanism authentication, untrustworthy platform and IoT devices, and failure to verify server identity, etc., to ensure legality. The effect of equity

Inactive Publication Date: 2014-01-22
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, there is currently no standard agreement on how IoT devices authenticate with application servers or management platforms. Some IoT applications use a shared secret mechanism for one-way authentication of devices. This scheme usually assumes that one of the authentication parties is credible , that is, the server side is considered to be trusted, and only verifies the identity of the device, not the identity of the server, and the key or private information of the device can be pre-stored on the server for subsequent verification
This authentication method cannot be applied to the authentication of a third-party remote management platform, because in this case the platform and the IoT device are untrustworthy, and it is difficult for two untrustworthy entities to share secret information, so it is not suitable to use symmetric key mechanism for authentication
In addition, two-way authentication is not a superposition of two one-way authentication, and the existing one-way authentication scheme cannot be simply extended to two-way authentication for scenarios where both parties are untrustworthy
[0008] Furthermore, if the keys or secret information of all IoT devices are saved on the remote management platform, when the scale of IoT devices increases sharply, the information to be saved will increase massively, making maintenance extremely difficult
Moreover, when IoT devices need to switch remote management platforms due to changes in cooperation strategies, keys or secret information need to be exchanged between the two remote management platforms, which also poses security risks
[0009] Therefore, the existing Internet of Things authentication technology has been unable to meet the needs of Internet of Things devices and remote management platforms to verify each other's legitimacy, so as to ensure the security of the Internet of Things system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IOT (Internet of Things) based equipment authentication method, device and system
  • IOT (Internet of Things) based equipment authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Example 1: Device A is bound to the card p through the registration stage. When the card p is put into the device B, if B is an illegal device and has not been registered on the remote management platform, it can be found in the table maintained by the Internet of Things management platform. Based on the information that B's device is bound to p, the platform directly rejects B's request, and can further blacklist B.

Embodiment 2

[0062] Example 2: Device B has been transformed by an attacker and can arbitrarily forge its ID and IMSI number, and send it to the remote management platform. The process of remotely managing and authenticating IoT device B needs to be compared with the result calculated by B, because B does not have the root key K , so it cannot pass the authentication, and the platform can judge that B does not have the claimed user subscription information, and device B is an illegal device.

Embodiment 3

[0063] Example 3: Device A is legal and the authentication has passed, but the user uses it to do illegal things. After the authentication, the authentication center can know that the illegal act is sent by device A and its bound card p, and can take further measures , such as freezing the function of the magnetic card or device, stopping the business, etc.

[0064] In the authentication method of the present invention, the IoT device and the bound user subscription information are registered on the remote management platform in advance, ensuring that only the legal remote management platform can be connected to the authentication center to obtain K information. The illegal remote management platform cannot be connected to the authentication center, cannot obtain K information, and cannot authenticate the remote management platform through IoT devices.

[0065] Before using the IoT device, it needs to sign a contract with the operator. The smart card in the IoT device is writt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IOT based equipment authentication method, device and system, and relates to the field of authentication of IOT terminals and servers. In order to guarantee the safety of an IOT system and the authentication effectiveness, a remote management platform generates a first message when receiving a bidirectional authentication request of IOT equipment; an IOT equipment message and the generated first message are sent to an authentication center; the authentication center seeks a root key message K corresponding to the IOT equipment according to the IOT equipment message, generates a bidirectional authentication message according to the root key message and the first message and returns the bidirectional authentication message to the remote management platform; and the remote management platform finishes bidirectional authentication according to the bidirectional authentication message and the IOT equipment. According to the provided method and system, only legal IOT equipment can be accessed to the management platform, illegal equipment can be prevented from being accessed, and simultaneously, the legitimate right of a user using the IOT equipment can be protected from loss.

Description

technical field [0001] The invention relates to the field of authentication of terminals and servers of the Internet of Things. Background technique [0002] The Internet of Things is called the third wave of the world's information industry after computers and the Internet, and represents the development direction of the next generation of information technology. The United States, the European Union, China and other countries have issued development plans for the Internet of Things to carry out relevant technology and industry forward-looking layouts . [0003] With the popularization of IoT technology, more and more traditional commodities such as automobiles, smart watches, consumer electronics, and monitoring equipment are embedded with sensors and communication modules to become IoT devices. The working environment of these IoT devices (such as unattended, high temperature, high humidity, frequent vibration and shaking, etc.) is more complex and harsh than traditional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 张尼张云勇李正陶冶刘明辉
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products