Device access authentication system and method based on KMS

A technology for device authentication and device access, which is applied in transmission systems, electrical components, etc., can solve problems such as spending a lot of time and cost, public keys are easy to leak, etc., and achieve the effect of convenient operation and flexible authorization

Active Publication Date: 2020-04-14
UNICLOUD (NANJING) DIGITAL TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing secure access of IoT-based devices is basically based on public and private keys. The public key is fixed and burned into the device. The public key is easy to leak, and the public and private key needs to be re-burned into the device if the platform changes. Once the number of devices It takes a lot of time and cost when more

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device access authentication system and method based on KMS
  • Device access authentication system and method based on KMS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further illustrated below in conjunction with the accompanying drawings and specific embodiments.

[0021] figure 1 It is a structure diagram of the present invention. like figure 1 As shown, the KMS-based device access authentication system of the present invention includes a device authentication center server, a KMS key safe, a device server, and a device terminal. The device authentication center server, the KMS key safe, and the device server communicate through an intranet connected, and the device end communicates with the device authentication center server and the device server through the public network respectively.

[0022] The device authentication center server creates an AK key and distributes it to the device; the device carries the AK key request to access the device authentication center server, and the device authentication center server authenticates the AK key of the device, and if the authentication passes, the devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device access authentication system based on a KMS. The system comprises an equipment authentication center server, a KMS secret key safe box, an equipment server and an equipment terminal; the equipment authentication center server, the KMS secret key safe box and the equipment server are in communication connection through an intranet, and the equipment terminal is in communication connection with the equipment authentication center server and the equipment server through a public network. According to the invention, the equipment secret key separation management, flexible authorization, destruction after use, secret key management without external network transmission and a use mechanism can be realized, and better, safe and convenient operation can be providedfor equipment access and management.

Description

technical field [0001] The invention relates to the security field of the Internet of Things, in particular to a KMS-based device access authentication system and method. Background technique [0002] The existing secure access of devices based on the Internet of Things is basically based on public and private keys. The public key is fixed and burned into the device. The public key is easy to leak, and the public and private keys need to be re-burned into the device if the platform changes. Once the number of devices When it is more, it will take a lot of time and cost. Contents of the invention [0003] Purpose of the invention: Based on the above deficiencies, the present invention provides a device access authentication method with separate management of the device and the master key, authorization on demand, and flexible key destruction based on the perspective of security and ease of maintenance, and provides a convenient encryption interface. The work of key managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/062H04L63/10
Inventor 黄乙元马宾
Owner UNICLOUD (NANJING) DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products