Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet of things security authentication chip and access control method based on chip

A security authentication and Internet of Things technology, applied in the field of Internet of Things security authentication chips and access control, can solve the problems of insufficient economy and achieve the effect of improving security

Inactive Publication Date: 2017-11-24
陈景辉
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there is only one device for some IoT applications, it is obviously not economical to use an IoT security authentication system to manage
In fact, a large number of IoT applications may only manage the access authentication of a device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things security authentication chip and access control method based on chip
  • Internet of things security authentication chip and access control method based on chip
  • Internet of things security authentication chip and access control method based on chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] see figure 1 , an IoT security authentication chip involved in the present invention includes: a central processing unit, an algorithm module, a storage module, an input / output module, a random number generator and an initialization module, and the chip is provided with an external trigger switch for triggering The work of the initialization module in the chip.

[0027] Among them, the central processing unit is responsible for performing calculations according to the data provided by the algorithm module, storage module, input / output module, random number generator, and initialization module, and finally sends the calculation results to devices or circuits other than the chip through the input / output module. Output; algorithm module, including the symmetric or asymmetric encryption and decryption algorithm program solidified in the module in the form of hardware; the storage module is used to store data related to chip authentication; the input / output module is respons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet of things security authentication chip and an access control method based on the chip. The security authentication chip comprises a central processing unit, and an algorithm module, a memory module, an input / output module, a random number generator and an initialization module which are connected with the central processing unit. The access control method comprises an initialization method for the security authentication chip and a security authentication method. The security authentication chip is mounted in a certain device; after the security authentication chip enters a working state, initialization is carried out; after the initialization, the security authentication chip generates a unique identity and an access key for other device, wherein the unique identity and the access key are used for accessing the device; the other device carries out data interaction with the device on which the chip is mounted; and after the security authentication is carried out on the other device by the chip successfully, the device on which the security authentication chip is mounted can be accessed. The chip and the method have the advantages that any one device which is equipped with the security authentication chip and is connected with the Internet of things can control the access of the other device independently, securely and reliably, and the control of an authentication system of a third party is avoided.

Description

technical field [0001] The invention relates to security authentication of Internet of Things devices, in particular to an Internet of Things security authentication chip and an access control method, which are used to solve the problem of secure access and control of Internet of Things devices. Background technique [0002] The Internet of Things is another technology and application development hotspot that has attracted global attention after the Internet in recent years. As the name implies, the Internet of Things is an interconnection based on objects (devices). Therefore, as we all know, the scale of Internet of Things applications based on devices will be far greater than that of Internet applications based on people. However, looking at the current application of the Internet of Things, it is just like the development state of the Internet in the 1990s. At that time, a large number of applications began to be launched on the Internet, but the security risks of these ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0866H04L9/0869H04L63/0428H04L63/0876H04L67/12
Inventor 陈景辉
Owner 陈景辉