Internet of Things identity authentication method and device and electric power Internet of Things identity authentication system

A technology of identity authentication and the Internet of Things, applied in user identity/authority verification, transmission systems, digital transmission systems, etc., can solve the problems of complex interconnection and interoperability of online identity verification, to ensure safe and efficient operation, ensure authenticity, and reduce complexity degree of effect

Active Publication Date: 2020-11-17
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
View PDF9 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, the technical problem to be solved by the present invention is to overcome the defect that the online identity verification of the power Internet of Things system in the prior a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things identity authentication method and device and electric power Internet of Things identity authentication system
  • Internet of Things identity authentication method and device and electric power Internet of Things identity authentication system
  • Internet of Things identity authentication method and device and electric power Internet of Things identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment provides an identity authentication method for the Internet of Things, which is applied to the service provider's password server in the power Internet of Things system to realize the interconnection between the service provider's password server and the Internet of Things terminal, such as figure 1 As shown, the IoT identity authentication method includes the following steps:

[0037] S11. Obtain public parameters of the identification password of the terminal password server.

[0038] Exemplarily, the terminal password server is a password server of an electric power Internet of Things terminal manufacturer. The identification password public parameter is a system parameter of the terminal password server, which can be generated according to the system parameter generation algorithm steup. The terminal password server can provide the identity TPID and the corresponding factory private key TO-RK for the electric power IoT terminal TPID .

[0039] S12...

Embodiment 2

[0058] This embodiment provides an identity authentication method for the Internet of Things, which is applied to the Internet of Things terminal in the power Internet of Things system to realize the interconnection between the service provider's password server and the Internet of Things terminal, such as figure 2 As shown, the IoT identity authentication method includes the following steps:

[0059] S21. Obtain the terminal identity and private key of the terminal password server.

[0060] Exemplarily, the terminal password server is a password server of an electric power Internet of Things terminal manufacturer. The terminal identity is the identity TPID provided by the terminal password server for the electric power Internet of Things terminal. The private key is the factory private key TO-RK built into the power Internet of Things terminal by the terminal password server TPID . Wherein, the terminal identity is the first public key of the electric power Internet of Th...

Embodiment 3

[0077] This embodiment provides an identity authentication device for the Internet of Things, which is applied to the service provider's password server in the electric power Internet of Things system, so as to realize the interconnection between the service provider's password server and the Internet of Things terminal, such as image 3 As shown, the IoT identity authentication device includes:

[0078] The first acquiring module 31 is configured to acquire the identification password public parameter of the terminal password server. For details, refer to the relevant description of step S11 corresponding to the above method embodiment, and details are not repeated here.

[0079] The first receiving module 32 is configured to receive the encryption request information sent by the terminal identification and encryption module, and the terminal identification and encryption module is set in the terminal. For details, refer to the relevant description of step S12 corresponding ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Internet of Things identity authentication method and device and an electric power Internet of Things identity authentication system, and the method comprises the steps thata terminal obtains a terminal identity and a private key from a terminal password server, and obtains a second public key corresponding to a service provider password server; encryption request information is generated according to the terminal identity, the private key and the second public key, and the encryption request information is sent to a service provider password server; the service provider password server receives the encryption request information and obtains an identification password public parameter of the terminal password server; decryption and signature verification are performed on the encryption request information, and if signature verification is passed, an encryption service private key corresponding to the encryption request information is generating and the encryption service private key is sent to the terminal; and the terminal decrypts the received encryption service private key to obtain a service private key. Through the implementation of the invention, additional online identity authentication is not needed, the interconnection and intercommunication complexity of the Internet of Things system is reduced on the basis of meeting the application requirements of the power Internet of Things system, and the user experience is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an identity authentication method and device for the Internet of Things and an identity authentication system for the Internet of Things. Background technique [0002] The power Internet of Things mainly includes the perception layer, network layer, platform layer and application layer from the bottom up. The main entities include the power Internet of Things terminal at the perception layer, the edge access device of the power Internet of Things terminal at the network layer, and various service entities at the platform layer. . In order to ensure the information security of the power Internet of Things system, it is necessary to build an identity authentication system for the power Internet of Things system. The existing identity authentication system is mainly based on the public key infrastructure (Public Key Infrastructure, PKI) system based on digital certificates. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06Q50/06
CPCH04L63/08H04L63/0442H04L67/12H04L9/3247G06Q50/06Y04S40/20
Inventor 高昆仑安宁钰赵保华梁潇王志皓任春卉
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products