Internet of Things terminal security authentication method based on security chip

An Internet of Things terminal and security chip technology, applied in the field of Internet of Things, can solve problems such as potential safety hazards, achieve high security levels, strong defense capabilities, and reduce the effect of system coupling

Active Publication Date: 2019-12-06
北京方研矩行科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the era of the Internet of Everything, the security networking of smart terminals is a key issue, and in the security networking technology, the most critical thing is the server's security authentication of networke

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things terminal security authentication method based on security chip
  • Internet of Things terminal security authentication method based on security chip
  • Internet of Things terminal security authentication method based on security chip

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] figure 1 It is a flowchart of an IoT terminal security authentication method based on a security chip according to an embodiment of the present application, in which the main flow of the IoT terminal security authentication method is shown.

[0036] This embodiment provides a security authentication method for an IoT terminal based on a security chip, such as figure 1 As shown, it includes:

[0037] 101: A network connection is formed between the IoT terminal and the cloud server;

[0038] 102: The security chip set in the Internet of Things terminal constructs a registration request and sends it to the cloud server. The cloud server verifies the legitimacy of the Internet of Things terminal according to the registration request. After the verification is successful, the Internet of Things terminal is generated corresponding to this session. The temporary terminal ID and temporary terminal secret key are saved, and then the server-side final session secret key is generated in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things terminal security authentication method based on a security chip. Whole-process safety guarantee of three stages of registration service interaction, authentication service interaction and data service interaction between the Internet of Things terminal and the cloud server is completed. Security authentication is carried out in a mode of combining hardware authentication such as product digital signature authentication and software authentication such as security chip temporary terminal digital signature authentication, and the relatively strong defense capability can be provided for both hardware attacks and software attacks. Besides, all operations related to encryption and decryption are carried out by the cloud and the two ends of the security chip, the communication terminal is transparent, only data acquisition, processing and forwarding are carried out by the communication terminal, and security calculation is not carried out, so that separation of security logic and service logic is realized, the coupling degree of the whole system is reduced, and a higher security level is achieved.

Description

technical field [0001] The present application relates to the field of the Internet of Things, in particular to a method for security authentication of an Internet of Things terminal based on a security chip. Background technique [0002] In recent years, with the continuous development of IoT technology and the increasing number of IoT devices, the vulnerabilities of IoT devices have also been gradually exposed. Whether it is botnets, worms, DDoS attacks, or replay attacks, they are all at a faster rate. IoT devices are threatened in more subtle and complex ways. [0003] From small smart bracelets, smart watches, to web cameras, to smart door locks, while IoT technology brings convenience to our work and life, it also introduces various risks. Compared with the PC Internet and mobile Internet, due to the wide variety of devices, the huge number, and the complex and concealed attack methods, the security problems in the Internet of Things era have become more serious. If t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L63/0853H04L63/083H04L63/0807H04L63/12H04L9/3247H04L67/12
Inventor 董方王科岩
Owner 北京方研矩行科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products