Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for continuous authentication in the Internet of Things

A technology of Internet of Things and Internet of Things terminals, which is applied in the field of Internet of Things to achieve the effect of reducing security risks and improving resource consumption

Active Publication Date: 2021-10-01
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The present invention uses lightweight authentication for a series of message transmissions in a specific time frame, without performing complex public key / private key authentication operations, and improves the resource consumption problem caused by complex message transmission authentication in the Internet of Things environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for continuous authentication in the Internet of Things
  • A method for continuous authentication in the Internet of Things
  • A method for continuous authentication in the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0018] In either embodiment, if figure 1 As shown, a method for continuous authentication in the Internet of Things of the present invention includes the following steps:

[0019] 1. In the initial authentication stage, the token (token) used for identity verification in the present invention is public in the system, for example, a serial number indicating the type of the Internet of Things device is agreed in advance, etc. Therefore, IoT terminal devices do n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for continuous authentication in the Internet of Things. The Internet of Things terminal device defines a time according to the number of information packets to be continuously sent, and adds it to the request data packet and sends it to the gateway. The request data generates a temporary authentication information. The gateway uses the temporary authentication information for verification within a predetermined time range. The terminal device will add temporary authentication information to each message sent to the gateway within the validity period of the session. There is no need to perform complex public / private key authentication operations, which realizes the concept of continuous authentication, which is of great significance for improving resource consumption due to complex message transmission authentication in IoT environments. At the same time, due to the constraint of timeliness, the temporary authentication information is only valid within the validity period of the session, which reduces the potential security risks caused by using long-term preservation of valid authentication in most systems.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a method for continuous authentication in the Internet of Things. Background technique [0002] In recent years, the Internet of Things has developed rapidly and received attention in both academia and industry. By connecting sensors, tiny smart devices and smart home appliances through the Internet of Things, the Internet of Things provides a new form of "communication" for people and devices, making the virtual information world seamlessly connected with the real world. IoT applications may involve environmental monitoring, e-health, electric vehicles, and smart homes. As many IoT devices as possible can be used in users' daily lives, privacy and security issues are very important. IoT devices are characterized by limited memory and storage capacity and low computing power, and these limited resources limit the functions that IoT devices can achieve. Therefore,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3213H04L9/3226H04L63/0807H04L63/0876H04L63/108H04L67/12
Inventor 杨楚鹍黄欣欣陈梁
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More