Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Object trusted identity secure coding method

A security coding and identity technology, applied in the field of trusted identity security coding of things, can solve the problems of counterfeiting, forgery, tampering, and increasing security risks.

Pending Publication Date: 2018-05-04
江苏信源久安信息科技有限公司
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the opening of the network, devices exist independently in the Internet (wireless) environment, and the encoding of these objects is in plain text, which may be counterfeited, forged, or tampered with, which greatly increases the security risk of the application of objects in the Internet environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0022] Assume that the original code of the object is M, the name code of the manufacturer is N, the production date is P, and the production batch is Q. (M+N+P+Q) forms a complete description of the properties (or attributes) of the thing. We first define the summary of the information of the manufacturer of the object as H, that is: H=N+P+Q, if it is expected to use this method for security protection, then construct the security protection coding formula H'=f(x, H), x is the variable factor parameter, and f is the coding logic. M is the original information of the user, including the affiliated unit, scope of use, control level, etc., which are coded according to the coding rules of the user. Similarly, use the above method to construc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an object trusted identity secure coding method. Original information of an object is segmented into one or more pieces of original data. The original data is encrypted to formone or more cipher identity quantity values. The cipher identity quantity values are publicized as public keys. Original attributes of the object are hidden, and verification and calculation also canbe carried out. The cipher identity quantity values are used as the public keys, so the possibility that original information is tampered and copied is prevented, the network application security ofan identity of the object is improved, and the identity is taken as the trusted identity on the network.

Description

technical field [0001] The invention relates to a secure coding method for trusted identities of things, belonging to the technical field of cryptography. Background technique [0002] In our real life, there are various behaviors and activities of remote control of things. The concept of these things includes various sensing and working devices in the Internet of Things (hereinafter referred to as things in this article). In the Internet of Things, intelligent robots, and intelligent manufacturing, these devices need to perform simplex and duplex control and data transmission on objects, such as issuing instructions to objects, making them accept instructions and execute them, or objects according to agreed rules and according to received instructions. Instructions perform operations or send data, and so on. [0003] Usually, the coding method for objects is generally to use custom coding serial numbers, chip embedded serial numbers, combined coding serial numbers, product...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/08H04L9/06
CPCH04L9/0643H04L9/0866H04L9/30Y02P90/30
Inventor 顾俊
Owner 江苏信源久安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products