A cryptographic technology-based identification method for the Internet of Things

A technology of IoT identification and cryptography, applied in key distribution, can solve problems affecting the development and application of the IoT, and achieve the effect of achieving reliability and non-tampering, achieving confidentiality, and ensuring uniqueness.

Active Publication Date: 2021-12-28
BEIJING INST OF COMP TECH & APPL
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] These flaws in the IoT logo have seriously affected the development and application of the IoT

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cryptographic technology-based identification method for the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0021] figure 1 It is a flow chart of a cryptographic technology-based identification method for the Internet of Things of the present invention, such as figure 1 As shown, the IoT identification methods based on cryptography include:

[0022] Relevant parties include service parties and user parties. The service party is responsible for the operation of the identification system, and provides services such as user party registration, item identification registration, item status collection, and item information query for the user side.

[0023] (1) The start-up steps of the identification system include: the service party selects the appropriate asymmetric cryptography technology and parameters, generates its own pu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a cryptographic technology-based identification method for the Internet of Things, which includes: the service party generates the root key of the identification system and the service party's public key and private key; the user side generates its own public key and private key, and uses its own The name and public key are passed to the service party; the user side generates the item identification and secret key, and passes the user side identification, item identification, item information ciphertext and signature to the service party; the user side generates the item secret key, and the user side identification, item information The identification, item status information ciphertext and signature are passed to the service party; when the user side queries the information of the item, the user side passes the user side identification, item identification and signature to the service party, and the service party performs verification after receiving it. After the verification is passed, the service The party retrieves the item identification record and the item status record corresponding to the item identification, and transmits the user identification, item identification and state information ciphertext and signature to the user party. The invention combines cryptography and item identification confidentially, and will play an important role in the field of the Internet of Things.

Description

technical field [0001] The invention relates to the security technology of the Internet of Things, in particular to an identification method of the Internet of Things based on cryptographic technology. Background technique [0002] Identification refers to giving an item an identifier or code that is easy to be recognized and processed by machines and humans according to certain rules. In the Internet of Things, the item identifier is the identity of the object in the information network of the Internet of Things, and it is a physical code that realizes the digitization of the object. Standardized coding can eliminate the ambiguity of item naming, and provide unique and computer-processable code identification for items within the scope of application, so that items in the real world and information in the information world have a common "language" and become The basis for the interconnection of objects and information systems. [0003] The IoT identifier is mainly used to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08
CPCH04L63/0435H04L67/12H04L9/0861
Inventor 蒋遂平车春立于鸿飞阮志成
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products