Unlock instant, AI-driven research and patent intelligence for your innovation.

Data transmission method of Internet of Things device, Internet of things device and authentication platform

A data transmission method and technology of Internet of Things devices, applied in the field of Internet of Things, can solve the problems of easy acquisition by hackers, leak keys, and reduce the security and reliability of data transmission, so as to avoid leakage and improve security and reliability. Effect

Pending Publication Date: 2018-11-16
TENCENT TECH (BEIJING) CO LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the on-site acquisition and control equipment and the central node have pre-stored keys, which makes the on-site acquisition and control equipment and the central node easy to disclose the key when hackers attack; and the on-site acquisition and control equipment and the key are not one-to-one As a result, the on-site acquisition and control equipment is easily simulated by hackers, thereby leaking the key, making it easy for hackers to obtain the transmitted data, tamper with the transmitted data, etc., thereby reducing the security and reliability of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method of Internet of Things device, Internet of things device and authentication platform
  • Data transmission method of Internet of Things device, Internet of things device and authentication platform
  • Data transmission method of Internet of Things device, Internet of things device and authentication platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0055] With the popularization and rapid development of Internet of Things technology, more and more devices tend to be intelligent, and intelligent devices have in-depth applications in the public domain, smart environment, personal and social fields. For example, in environmental monitoring applications, it mainly involves on-site acquisition and control equipment, central nodes, and d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data transmission method of an Internet of Things device, an Internet of Things device, and an Internet of Things authentication platform. The method includes the following steps that: the Internet of Things device sends an activation request to a registration management platform, wherein the activation request carries the identifier of the Internet of Things device to be activated, a manufacturer public key, and a randomly generated chip public key, so that the registration management platform generates a hardware serial number according to the manufacturer public key and the chip public key; the hardware serial number sent by the Internet of Things authentication platform is received, and a symmetric key is generated according to the hardware serial number; and the symmetric key is called to encrypt transmission data to be uploaded, and decrypt received transmission data. The symmetric key is uniquely corresponding to the Internet of Things device, sothat the Internet of Things device is difficult to be imitated by a hacker, and the stored symmetric key is difficult to be obtained by the hacker; the symmetric key is not stored on a service platform, so that a situation that the symmetric key leaks from the service platform can be prevented, and therefore, the security and reliability of data transmission can be improved.

Description

technical field [0001] The present application relates to the technical field of the Internet of Things, and in particular to a data transmission method of an Internet of Things device, an Internet of Things device and an authentication platform. Background technique [0002] At present, in the technical field of the Internet of Things, data transmission is directly performed between various devices of the Internet of Things, or the data is transmitted after simple encryption. For example, in environmental monitoring applications, it mainly involves on-site acquisition and control equipment, central nodes, and data processing centers; on-site acquisition and control equipment collects data, and sends the collected data to the central node for summary; the central node transparently transmits the summarized data to the data processing center for analysis and processing. In the above application, the transmitted data is not encrypted, which makes the transmitted data easy to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0866H04L9/0894H04L63/0435H04L67/12
Inventor 王强申子熹唐小飞
Owner TENCENT TECH (BEIJING) CO LTD