A secure communication method and system based on identification algorithm

A technology of secure communication and identification algorithm, which is applied in the field of secure communication methods and systems based on identification algorithms, which can solve problems such as user loss, hijacking, and NB-IoT modules that cannot guarantee security, and achieve secure transmission and avoid key leakage Effect

Active Publication Date: 2018-12-18
BEIJING GAS GRP
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing NB-IoT module cannot guarantee sufficient security, and there may be a risk of be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication method and system based on identification algorithm
  • A secure communication method and system based on identification algorithm
  • A secure communication method and system based on identification algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0030] The technical problem to be solved by the present invention is to provide a security module and a corresponding security communication protocol to realize end-to-end business data encryption and entity authentication in view of the characteristics of the Internet of Things gas industry.

[0031] figure 1 For a schematic structural diagram of a security communication system based on an identification algorithm provided by an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure communication method and a system based on an identification algorithm, wherein the method comprises the following steps of: combining a security chip with an NB-IoT communication module is encapsulated into a security module and arranged in the terminal; when the terminal access the network for the first time, the terminal sends the request activation message to the background, the background receives the request activation message, verifies the authenticity of the identification signature data, if the verification is passed, the terminal generates the updateddistribution information according to the gas label, and sends the APDU instruction package to the terminal; the terminal verifies the authenticity of the update signature data, and if the verification is passed, the secondary distribution message cipher is decrypted to obtain the renewal distribution information, and the initial distribution information is replaced with the renewal distribution information to store the renewal distribution information; according to the grade of the reported data, the terminal sends the plaintext of the common data and the MAC value obtained by calculating thecommon data to the background, or sends the key data ciphertext obtained by encrypting the plaintext of the key data and the key data signature obtained by signing the key data ciphertext to the background.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for safe communication based on an identification algorithm. Background technique [0002] Narrow Band Internet of Things (NB-IoT) is built on a cellular network and only consumes about 180KHz of bandwidth. It can be directly deployed on a GSM network, UMTS network or LTE network, and has become an important branch of the Internet of Things. The NB-IoT network has the characteristics of large connection, low power consumption, low cost, and wide coverage, which meets the needs of smart gas terminals. The application of NB-IoT Internet of Things technology will promote the "Internet +" information construction of new gas management, promote the technical standardization and industrial scale of the gas industry, and jointly create an industry benchmark for smart gas. [0003] The NB-IoT module is a packaged communication module based on the NB-IoT baseband chip, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04L29/06H04L9/32H04L9/08
CPCH04L9/0866H04L9/3247H04L63/0876H04W12/02H04W12/06
Inventor 高顺利王嵩梅黄冬虹籍瑞春张耀辉柴家凤王林董新利金沙涂航
Owner BEIJING GAS GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products