Internet of things (IoT) access method and system of terminal equipment

A technology of the Internet of Things system and terminal equipment, which is applied in the transmission system, near-field transmission system, digital transmission system, etc., and can solve the problems that the sensing information is easy to be leaked or tampered, and the security of the sensing information cannot be guaranteed.

Active Publication Date: 2017-10-03
SHENZHEN SHENGLU IOT COMM TECH CO LTD
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the deficiencies in the prior art, the embodiment of the present invention provides a method and system for terminal equipment to securely access the Internet of Things, aiming to solve the problem of RFID tag transmission in the existing method for terminal equipment to access the Internet of Things system. Sensing information is easy to be leaked or tampered with, so the security of sensing information cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things (IoT) access method and system of terminal equipment
  • Internet of things (IoT) access method and system of terminal equipment
  • Internet of things (IoT) access method and system of terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] The Internet of Things is to connect any item to the Internet through radio frequency identification (RFID), infrared sensors, global positioning systems, laser scanners and other information sensing devices according to the agreed agreement, for information exchange and communication, so as to realize intelligentization. A network concept for identifying, locating, tracking, monitoring and managing. Among them, the basic principle of radio frequency identification technology is to use the transmission characteristics of radio frequency signal and space coupling (inductive or electromagnetic coupling) to realize the automatic identification of the identified object. The radio frequency identification system consists of two parts: electronic tags and readers (card readers). figure 1 As shown, in its practical application, the electronic tag is attached to the surface or inside of the object to be identified. When the object passes the range of the reader with the tag, th...

Embodiment 2

[0073] image 3 It shows a flowchart of a method for a terminal device to securely access the Internet of Things provided by the second embodiment of the present invention, as shown in image 3 The methods shown include:

[0074] Step S31, read the first sensing information of the RFID tag, call a set of random numbers as the signature key, encrypt the signature key, and obtain the first ciphertext;

[0075] Step S32, calling the identification of the RFID tag, sending the identification and the first ciphertext to the authentication center of the Internet of Things system;

[0076] Step S33, encrypting the first sensing information to obtain a second ciphertext, and generating a digital signature of the first sensing information;

[0077] Step S34, sending the identification of the RFID tag, the second ciphertext and the digital signature to the IoT system certification center, so that the IoT system certification center can verify the second ciphertext and the Decrypt and...

Embodiment 3

[0082] Figure 4 It shows a flow chart of a method for a terminal device to securely access the Internet of Things provided by the third embodiment of the present invention, and the details are as follows:

[0083] Step S41, the IoT system certification center receives and stores the identification of the RFID tag and the first ciphertext sent by the RFID card reader; and receives the second ciphertext and digital signature sent by the RFID card reader;

[0084] In this step, the authentication center of the Internet of Things system receives the identification and the first ciphertext of the RFID tag sent by the RFID card reader, and stores the identification and the first ciphertext of the RFID tag in the memory. When the identification of the RFID tag and the first ciphertext are stored, the identification of the RFID tag is analyzed and stored according to different categories of the identification of the RFID tag. For example, tags attached to terminal devices in the sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the field of security of system information of the Internet of things (IoT), and provides an IoT access method and an IoT access system of terminal equipment. The method comprises the steps of reading first sensing information of a RFID label, calling a group of random numbers to serve as a signature key, and encrypting the signature key to acquire a first ciphertext; calling the identifier of the RFID label, and sending the identifier of the RFID label and the first ciphertext to an IoT system authentication center; encrypting the first sensing information to acquire a second ciphertext and generating a digital signature of the first sensing information; and sending the second ciphertext and the digital signature to the IoT system authentication center. According to the method and the system provided by the embodiment of the invention, a RFID card reader encrypts information to be sent for two times, and security transmission of the information is ensured; the digital signature of the first sensing information is generated, subsequent verification on the digital signature is facilitated, and security of the information received by the IoT system authentication center is further ensured.

Description

technical field [0001] Embodiments of the present invention belong to the field of information security of an Internet of Things system, and in particular relate to a method and a system for securely connecting a terminal device to the Internet of Things. Background technique [0002] ITO (Internet of Things) is to connect all items to the Internet through radio frequency identification technology (Radio Frequency Identification, RFID), infrared sensors, global positioning systems, laser scanners and other sensing devices, in accordance with the agreed protocol, and connect them to the Internet. Information exchange and communication to realize intelligent identification, positioning, tracking, monitoring and management. Among them, radio frequency identification technology is an automatic identification technology that has gradually matured since the 1980s. It originates from radio communication technology, uses radio waves to identify, integrates modern computer intellige...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04B5/00
CPCH04B5/0062H04L9/0822H04L9/0869H04L9/3247H04L63/0428H04L63/08
Inventor 杜光东
Owner SHENZHEN SHENGLU IOT COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products