Unlock instant, AI-driven research and patent intelligence for your innovation.

Centerless Internet of Things safety authentication method based on asymmetric encryption

An asymmetric encryption and security authentication technology, applied in digital data authentication, computer security devices, instruments, etc., can solve problems such as platform personal security information leakage, and achieve the effects of strong scalability, strong system robustness, and low maintenance costs

Active Publication Date: 2021-04-30
深圳市鹏橙海越技术有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even the platform often has the problem of personal security information being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centerless Internet of Things safety authentication method based on asymmetric encryption
  • Centerless Internet of Things safety authentication method based on asymmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] see Figure 1 to Figure 2 , to realize the basic structure of a non-central Internet of Things security authentication method based on asymmetric encryption of the present invention includes a platform system A and a terminal system B; the platform system A consists of an asymmetric encryption algorithm module 10, a secure storage module 13 and a controller 11 and a communication module 12; the terminal system B is composed of a terminal asymmetric encryption algorithm module 20, a secure memory 21, a timer 22, a control module 23 and a communicator 24;

[0034] Implementation steps of the present invention include:

[0035] 1) Platform system A and terminal system B each generate authentication elements

[0036] The platform public key and the platform private key are generated by the asymmetric encryption algorithm module 10 of the platform system A, and the platform private key is stored in the confidential storage module 13, and the platform public key is sent to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a centerless Internet of Things safety authentication method based on asymmetric encryption, and relates to the technical field of information. The basic composition structure for realizing the method comprises a platform system and a terminal system, the platform system is composed of an asymmetric encryption algorithm module, a secret storage module, a controller and a communication module. The terminal system is composed of a terminal asymmetric encryption algorithm module, a secret memory, a timer, a control module and a communicator. The method comprises the steps that the platform system and the terminal system generate authentication elements respectively, the platform system authenticates the terminal system, and the terminals authenticate each other. The method has no database, is an identity authentication method completely based on calculation, and does not need any central data support in the authentication process. The expansibility is high, the system robustness is high, and the maintenance cost is low.

Description

technical field [0001] The present invention relates to the field of information technology. Background technique [0002] Existing identity authentication systems usually rely on a central database for implementation. Client identity security is controlled by the central platform. When a mutual trust relationship is established between platforms, the weaker party is completely dependent on the stronger party to have data. Even the platform often has the problem of personal security information being leaked. [0003] In view of the deficiencies of the existing technology, the present invention's asymmetric encryption-based decentralized IoT security authentication method only requires the platform and terminal to have an asymmetric encryption module that can generate public and private keys, and a timer that can generate time stamps. Realize that each terminal does not leak any information related to its own security when providing identity authentication marks. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/45G06F21/60
CPCG06F21/445G06F21/45G06F21/602
Inventor 吕锋赵嘉吴志强
Owner 深圳市鹏橙海越技术有限公司