Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and server for centrally controlled key management

A key management and centralized control technology, applied in the field of Internet of Things, to achieve the effect of enhancing security and reducing the risk of information theft

Active Publication Date: 2019-11-15
CHINA TELECOM CORP LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there is a high risk for IoT terminals with high security and real-time requirements. If the key used for communication is obtained by other IoT devices, it can easily crack the information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and server for centrally controlled key management
  • Method and server for centrally controlled key management
  • Method and server for centrally controlled key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0061] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0062] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a centralized control-type key management method and a centralized control-type key management server. The method comprises steps: Internet of things group members are ranked, wherein the Internet of things group members comprise an Internet of things gateway and an Internet of things terminal; an initialization seed is generated randomly; a first key chain and a second key chain are generated respectively according to a first one-way function and a second one-way function; and according to the sequence of the Internet of things group members, keys of the first key chain and the second key chain are sent to corresponding Internet of things group members sequentially. Through setting corresponding pairwise keys for communication of different Internet of things group members, the information transmission security in an Internet of things environment is thus enhanced, and the risk that the information is stolen is greatly reduced.

Description

technical field [0001] The invention relates to the field of the Internet of Things, in particular to a method and server for centralized control key management. Background technique [0002] For IoT group communication with security requirements, the system usually assigns the group key corresponding to the group to the IoT devices in the same group, so that the IoT devices in the same group use the same group key for normal group communication , this method can reduce the complexity of server operations and reduce the number of keys maintained and managed by the server. [0003] However, IoT terminals with high security and real-time requirements have high risks. If the key used for communication is obtained by other IoT devices, it can easily decrypt the information. Contents of the invention [0004] In view of the above technical problems, the present invention provides a method and server for centralized control key management, which can enhance the security of info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0435H04L63/06H04L67/02
Inventor 常洁
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products