Internet of Things safety management system

A security management and Internet of Things technology, applied in the field of Internet of Things security management system, can solve the problems of inability to protect the security of data entering and exiting equipment, inability to verify the legality of communication access and data legality, and reduce the risk of being illegally hijacked and controlled , High communication security effect

Active Publication Date: 2020-02-11
深圳前海智安信息科技有限公司
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the shortcomings of the existing security management include: (1) The trusted execution environment can only protect the local applications and data of the computing node from being damaged during the operation process, but cannot protect the security of data entering and exiting the device and cannot verify the security of each device. (2) The IoT device only performs identity authentication with the cloud system, but cannot perform end-to-end identity authentication with the end user who legally holds the device. When the cloud system is controlled by illegal personnel At the same time, illegal personnel can operate IoT devices through the cloud system; (3) illegal users can operate IoT terminals on other mobile phones or PCs after obtaining the user name and password of legitimate users, which poses a major security problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things safety management system
  • Internet of Things safety management system
  • Internet of Things safety management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the reaction scheme and specific examples.

[0024] like Figure 1-4As shown, an IoT security management system includes a private key center 1, an application server 2, a client control terminal 3, and an IoT terminal 4, and the private key center 1 and the application server 2 communicate and authenticate data through a soft shield Transmission; the application server 2 communicates with the client control terminal 3 and the IoT terminal 4 at the same time for key distribution, identity authentication and data encryption; the client control terminal 3 and the IoT terminal 4 perform mutual communication of identity authentication and data encryption Communication; private key center 1 includes KPC key production component 11, KMC key management component 12 and key authentication component 13, KPC key production component 11 generates key according to preset algorithm rule, KMC key mana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of Things security management system. A private key center and an application server perform communication authentication data transmission through a soft shield;the application server side performs mutual communication of key distribution, identity authentication and data encryption with the client control terminal and the Internet of Things terminal at the same time; mutual communication of identity authentication and data encryption is carried out between the client control terminal and the Internet of Things terminal, wherein the private key center comprises a KPC key production assembly, a KMC key management assembly and a key authentication assembly, the application server comprises a security edge computing SDK module and a server application module, and the client control terminal comprises an encryption and decryption security module and a client application module, and the Internet of Things terminal comprises an Internet of Things communication module, a security algorithm module and an SE chip. According to the Internet of Things security management system, only the user is completely autonomous and controllable in the Internet of Things system, the cloud system does not have the authority of directly operating the user equipment, and the Internet of Things control security level can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to an Internet of Things security management system. Background technique [0002] With the rapid development of Internet technology, the era of Internet of Everything is gradually coming to us. The existing Internet of Things system will involve a variety of software and hardware products such as cloud systems, embedded software, embedded hardware, and mobile app software. The urgent problem to be solved, especially how to ensure the security interaction management of the Internet of Things, can provide more secure protection for the data interaction between the Internet of Things device and the cloud system, the mobile app and the cloud system, and the Internet of Things device and the mobile app. [0003] In the prior art, when protecting data and applications on the Internet of Things, the trusted execution environment in the computing node is used to safely start...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/083H04L63/0838H04L67/12
Inventor 邹飞黄殿辉
Owner 深圳前海智安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products