Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for dynamic Internet of things security encryption

A security encryption and Internet of Things technology, which is applied in the field of dynamic Internet of Things security encryption, can solve problems such as inability to achieve automatic processing, and achieve the effects of cost saving, good compatibility, and improved security

Active Publication Date: 2019-09-20
SHENZHEN SHIRUIHONG TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, each authentication requires manual input of the password, which cannot be automated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for dynamic Internet of things security encryption
  • A method for dynamic Internet of things security encryption
  • A method for dynamic Internet of things security encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Below in conjunction with accompanying drawing and embodiment, further elaborate the present invention.

[0050] Example to use bluetooth connection between device and phone:

[0051] To transmit data on a wireless device, a connection must be established first. The way to establish a connection is nothing more than entering a password for verification when establishing for the first time, or opening a connection without verification.

[0052] In this example, if figure 1 As shown, the Bluetooth setting of "Device 1" is set to open connection, and the mobile phone can connect to "Device 1" at any time. In this way, there is no security authentication mechanism at all.

[0053] The way of password acquisition in the method of the present invention is as follows: figure 2 Shown, the flow process of the inventive method is as image 3 Shown:

[0054] A general non-secure connection is established first. It may be a one-time authentication method, that is, authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic security encryption method for Internet of Things. The method is used for establishing an initiative authentication mechanism and dynamic password authentication between wireless transmission devices. A system for implementing the method comprises a connecting device, a password book selecting device, an access code judging device, an authentication end pointer maintaining device, an authentication end pointer increasing device, an authentication judging device, a sending end pointer increasing device, a two-end pointer increasing device, a password pointer judging device, a connection maintaining device, a disconnecting device and an irregular authentication device. According to the method, connection is determined in an initiative password authentication mode, further, instead of use of a calculation result obtained with a single formula, irregular authentication and a two-factor authentication mode of password books and dynamic password pointers are adopted, accordingly, a Trojan horse program is prevented from getting a control right, and system automation can be realized.

Description

technical field [0001] The invention relates to the field of encryption technology, in particular to a dynamic Internet of Things security encryption method. Background technique [0002] There are many devices in the Internet of Things, and the simple embedded single chip is the mainstream. It cannot use point-to-point encrypted transmission for every transmission like a computer. At most, it only authenticates once when establishing a connection. In the past, terminal devices only received the control of a single device, and there was no security problem in the transmission process. After the popularity of the Internet of Things, once these devices are connected to the cloud network, hackers or illegal users can use network Trojan horse programs or other means to gain control of the devices, so that they can control the terminal devices. lead to the destruction of the security of the whole system. [0003] The current encrypted transmission method similar to that of a co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 黄剑敏周子勋
Owner SHENZHEN SHIRUIHONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products