Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for security protection of Internet of things equipment

An IoT device and security protection technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of security loopholes, low efficiency ratio, and low security of communication encryption and decryption, and achieve high security and efficiency. High ratio, the effect of solving security risks

Active Publication Date: 2022-05-17
杭州安芯物联网安全技术有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The present invention mainly solves the security loopholes in the hardware and software of the Internet of Things equipment in the prior art, as well as the low security and low efficiency of communication encryption and decryption, and provides a security protection system and method for the Internet of Things equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for security protection of Internet of things equipment
  • System and method for security protection of Internet of things equipment
  • System and method for security protection of Internet of things equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0094] In this embodiment, a security protection system for Internet of Things equipment includes communication-connected equipment and servers, and the equipment includes an MCU controller, such as figure 1 As shown, the MCU controller includes safe area 1 and non-safe area 2,

[0095] The safe area can access all resources, and the non-safe area can only access the resources of the non-safe area and is forbidden to access the resources of the safe area. When the non-safe area illegally accesses the resources of the safe area, the MCU controller intercepts and generates an exception from the hardware. The safe area and the non-safe area can be switched, and are strictly monitored by the MCU controller.

[0096] In addition, set the read-write protection function for the MCU controller, and the external debugging tool cannot debug, and cannot read and modify the contents of the flash, sram, and backup registers. When the read protection is released, the hardware will automatic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety protection system and method for Internet of Things equipment. It solves the security loopholes in the hardware and software of IoT devices in the prior art, as well as the low security and low efficiency of communication encryption and decryption. The system includes devices and servers. The devices include MCU controllers. The MCU controllers include secure areas and non-secure areas. A trusted execution environment is deployed in the secure area, and a non-secure environment is deployed in the non-secure area. The trusted execution environment is set with The boot loading module, the secure kernel module, the secure component module, the trusted application and the secure API interface module are provided with a user application and a non-secure kernel module in a non-secure environment. The invention protects sensitive data storage access through three layers of protection measures. The encryption and decryption of information between the device and the server uses identity tokens for verification. The present invention performs security protection on equipment hardware, software, storage access and communication, preventing hardware from being manipulated, software from being cracked, and information from being stolen.

Description

technical field [0001] The present invention relates to the technical field of Internet of Things security, in particular to a security protection system and method for Internet of Things devices. Background technique [0002] With the development of Internet of Things technology, the smart device industry has realized wireless remote monitoring, including data collection and uploading, local storage, abnormal monitoring, remote upgrade, remote control, etc. The current mainstream solution uses wireless communication modules to exchange data with cloud application platforms. Due to considerations of cost and operation and maintenance, the security part is not paid much attention to. Most IoT devices on the market do not have security protection measures. Their communication links and MCU Everything inside is exposed to an attacker. [0003] IoT devices usually use an MCU without a secure core architecture, execute code on bare metal, have no secure software architecture, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/00H04L9/32H04L9/08H04L9/06
CPCH04L63/10H04L63/0876H04L63/1433H04L63/1466H04L63/02H04L63/0478H04L67/34H04L9/3247H04L9/0869H04L9/0838H04L9/0643
Inventor 刘伟陈强贾灵王志军王薪宇邱绿景杨茜宁辉胡海
Owner 杭州安芯物联网安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products