Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensing system key protecting method in field of Internet of things and wireless access equipment

A key protection, Internet of Things technology, applied in transmission systems and key distribution, can solve problems such as increasing the burden on nodes and gateways, increasing energy consumption, and entering

Active Publication Date: 2015-04-29
杭州木梢科技有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of the Internet of Things, compared with the Internet, the devices that require access to the Internet will have exponential growth. It is conceivable that this method will cause great trouble to users: the user needs to enter the key every time the device is connected to the network, and the user experience is very unfriendly
[0005] 2) The key is easily cracked
[0007] 3) Risk of information copy forgery
The disadvantage of this method is that the two sides of the communication carry out the calculation of the key required for communication by presetting some secret information in the node and the gateway, which not only improves the energy consumption but also increases the burden of the node and the gateway, and there is also a problem that after physically obtaining the node Possibility to get the key or even enter the network through some reverse engineering means
It solves the problem that the security mechanism of the existing wireless access equipment is complicated. Users do not need to master the basic background knowledge of the operation of wireless network equipment to use it normally. However, after the wireless network is established, the network security problem in the communication process still cannot be solved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensing system key protecting method in field of Internet of things and wireless access equipment
  • Sensing system key protecting method in field of Internet of things and wireless access equipment
  • Sensing system key protecting method in field of Internet of things and wireless access equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] The workflow of the slave machine includes two main processes: initialization process and communication process.

[0041] The initialization process is that after the slave is powered on, it is connected to the master through a secure connection to initialize various parameters required for the subsequent communication process, mainly including device identification, public key and static private key. Participating modules include: registration authentication management module, random number generation module and secure connection communication module.

[0042] The communication process is divided into two parts: the wireless connection establishment process and the dynamic key communication process. During the establishment of wireless communication, the slave sends a connection application and waits for the host to confirm. After the host confirms, the slave obtains the current dynamic private key, and then enters the dynamic encryption communication link. The partic...

Embodiment 2

[0069] The workflow of the host includes two main processes: the initialization process and the communication process.

[0070] The initialization process is the public key initialization process after the master is powered on, and through a secure connection with the slave, it is used to initialize various parameters required for the subsequent communication process, mainly including device identification, public key and static private key. Participating modules include: registration authentication management module, random number generation module and secure connection communication module.

[0071] The communication process is divided into two parts: the wireless connection establishment process and the dynamic key communication process. During the establishment of wireless communication, the host computer confirms the connection application of the slave computer, passes the current dynamic private key to the slave computer, and then enters the dynamic encryption communicat...

Embodiment 3

[0096] image 3 It is a schematic diagram of the device structure of the slave device in the network security key protection method provided by Embodiment 3 of the present invention. The slave device is mainly composed of six modules: a random number generation module, a registration authentication management module, a secure communication module, and a wireless transceiver Module, data packet encryption and decryption module and wireless communication module. Wherein, the registration authentication management module is connected with the random number generation module, the secure communication module and the wireless transceiver module; the wireless transceiver module is connected with the data packet encryption and decryption module; the data packet encryption and decryption module is also connected with the wireless communication module. The functions of each module are as follows:

[0097] Wherein, the random number generating module is used for generating random number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security key protecting method in the field of Internet of things. The network security key protecting method comprises the following steps: a public key is randomly generated after a host computer starts up a work; the host computer and a slave computer complete connection initialization through a reliable connection way; equipment identifiers of counterparts are mutually recorded by the host computer and the slave computer, and a static private key during connection establishment is generated under the domination of the slave computer; after accessing to the network, all communications between the host computer and the slave computer have a dynamic encryption mechanism dominated by the host computer. Through application of a safe connection initializing mechanism and a dynamic key mechanism, network connection between the host computer and the slave computer can be quickly and securely realized, so that a user does not need to remember a security key, but secure wireless connection can be quickly and conveniently established; the risk that the key is monitored by a malicious device and the risk that information is copied and faked are avoided.

Description

technical field [0001] The invention relates to the technical field of Internet of Things security, in particular to a key protection method and a wireless access device of an Internet of Things sensor system. Background technique [0002] The development of the Internet has promoted the sharing of information, but while information sharing has brought great convenience to human beings, it has also brought about problems in information security. As a result, people have introduced a key-controlled information encryption mechanism to ensure information security (unauthorized personnel without a key cannot decrypt encrypted information). The traditional key system has some defects of its own. In the field of Internet of Things, such problems will become more prominent, mainly reflected in the following three aspects: [0003] 1) Unfriendly user experience [0004] The traditional key mechanism requires users to enter when joining the network, thus preventing unauthorized p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06
CPCH04L9/08H04L9/32H04L63/06H04L63/0846H04W12/04H04W76/11H04W76/19
Inventor 孔泉方文票刘伊宁
Owner 杭州木梢科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products