IoT equipment authentication and key agreement method and device

An Internet of Things device and key negotiation technology, which is applied in the field of Internet of Things device authentication and key agreement, can solve the problem of "severe link security problems"

Active Publication Date: 2015-12-16
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF6 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The security problem of the "remote terminal-cloud" link can be solved by using a variety of existing technologies, such as SSL, but the security problem of the "cloud-gateway (gateway)-device" link is more serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IoT equipment authentication and key agreement method and device
  • IoT equipment authentication and key agreement method and device
  • IoT equipment authentication and key agreement method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0032] see figure 1 , figure 1 It is a flowchart of the IoT device authentication and key agreement method of the present invention, which mainly includes the following steps:

[0033] Step 101, the IoT device obtains the authorization code information generated by the IoT management center for the IoT device.

[0034] The Internet of Things management center is a computer or computer cluster capable of computing, storing and transmitting Internet of Things information, which can be a local server, workstation, distributed server cluster, cloud, etc.

[0035] The authorization code information generated by the IoT management center for the IoT device includes the root key, and may also include the validity period of the root ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an IoT (Internet of Things) equipment authentication and key agreement method and device. According to a technical scheme, an IoT control center generates an authentication code for the IoT equipment and sends the code to the IoT equipment, generates key information of the IoT equipment, utilizes the authentication code for encrypting the key information and thus obtains the cryptograph and calculates the verification information, and sends the cryptograph and the verification information to the IoT equipment. The IoT equipment utilizes the authentication code information cryptograph for decryption and obtains the key information, and implements IoT equipment authentication according to the verification information. The method and device can be used for realizing IoT communication security.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for authentication and key agreement of an Internet of Things device. Background technique [0002] The Internet of Things (IOT) is an information carrier based on the Internet, traditional telecommunication networks, etc., which enables all ordinary physical objects that can be independently addressed to realize interconnection and intercommunication. In the Internet of Things, everyone can use electronic tags to connect real objects to the Internet, and their specific locations can be found on the Internet of Things. Through the Internet of Things, the central computer can be used to centrally manage and control machines, equipment, and personnel, and can also remotely control home equipment and cars, search for locations, and prevent items from being stolen. [0003] The development of the Internet of Things has pushed the world into the era...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/06H04L63/08H04L63/0823
Inventor 柳亚男陈斌德池浩
Owner SAMSUNG ELECTRONICS CHINA R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products