Supercharge Your Innovation With Domain-Expert AI Agents!

Security control method and system based on CPK intelligent switch device

A smart switch and security control technology, applied in the field of data security, can solve problems such as the inability to realize remote unlocking, and achieve the effect of improving convenience, safety, and convenience

Inactive Publication Date: 2018-03-06
北京虎符信息技术有限公司
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this unlocking method usually needs to be unlocked within a limited distance, and remote unlocking cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method and system based on CPK intelligent switch device
  • Security control method and system based on CPK intelligent switch device
  • Security control method and system based on CPK intelligent switch device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] For smart devices based on the CPK identification authentication mechanism, the CPK security module is added to the smart device. According to the key characteristics of the CPK, the overall security mechanism is established in the CPK security module. When the smart device is connected to the Internet, all data must be encrypted. And the source of data must be confirmed, and effective security control is carried out through data encryption and data signature. This mechanism can be used with various identification methods for users, such as fingerprint / iris and other two-factor authentication methods.

[0036]

[0037] Such as figure 1 , is a system architecture diagram of the present invention.

[0038] The invention includes a smart switchgear and at least one smart key. Wherein, at least one smart key includes a management smart key with management authority, and there may be no user smart key, or one or more user smart keys.

[0039] The invention integrates the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security control method and system based on a CPK intelligent switch device. The method comprises the following steps: a user requests to open the CPK intelligent switch device by using a user CPK intelligent key; the CPK intelligent switch device sends a challenge value to the CPK intelligent key; the CPK intelligent key performs digital signature on the challenge valueby using an own user CPK private key and returns the challenge value to the CPK intelligent switch device; and the CPK intelligent switch device extracts the stored user CPK public key, verifies whether the received digital signature is correct, verifies whether the challenge value is sent by itself, and controls to open the intelligent switch or not according to the authorization time and the authorization counts. By adoption of the scheme, the remote control of the intelligent switch device can be achieved, and remote authorization of the intelligent switch is also achieved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a security control method and system based on CPK intelligent switch equipment. Background technique [0002] According to the characteristics of the identification key of CPK, it is more secure and convenient to manage the identity authentication, identity verification and data security of smart devices than other key systems. At present, the security issue is the most important link for smart devices to connect to the network environment. Trusted identification and security authorization are the basic functions that every smart device of the Internet of Things must have. With the ability of smart devices to authenticate identities and protect data, the range of functionality that can be added expands even further. For example: smart door locks, smart car locks, smart safes, etc., not only the function of opening, but the function of enhancing authorization and sharing. [0003] F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30G07C9/00
CPCG07C9/00658H04L9/30H04L9/3247
Inventor 裴志
Owner 北京虎符信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More