Internet of things, identity authentication and secret communication method, chip, equipment and medium

A technology of identity authentication and confidential communication, applied in the field of communication security, can solve the problem of high cost, achieve the effect of saving development cost, shortening the development and deployment cycle, and strong versatility

Pending Publication Date: 2021-07-16
NATIONZ TECH INC
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Both the security chip and the white box cipher can be used for M2M identity authentication. The security chip can provide the most secure cryptographic calculation and key storage known, but the cost is relatively high, and it is suitable for devices with high security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of things, identity authentication and secret communication method, chip, equipment and medium
  • Internet of things, identity authentication and secret communication method, chip, equipment and medium
  • Internet of things, identity authentication and secret communication method, chip, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0047] figure 1 It is a schematic diagram of the composition of the Internet of Things provided by the embodiment of this application.

[0048] Internet of Things includes at least one first device M 1 and at least one second device M 2 . First device M 1 The security chip SE is configured inside. Second device M 2 The first device M with internally configured white-box cryptographic algorithms 1 Through the security chip SE and the second device M 2 Perform identity a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an internet of things, an identity authentication and secret communication method, a security chip, equipment and a medium. The Internet of Things comprises at least one first device and at least one second device, and a security chip is configured in the first device; a white-box cryptographic algorithm is configured in the second equipment; wherein the first equipment performs identity authentication and secret communication with the second equipment through the security chip.

Description

technical field [0001] This application relates to the technical field of communication security, and specifically relates to the Internet of Things, identity authentication and secure communication methods, chips, equipment and media. Background technique [0002] As an extension of the Internet, the Internet of Things is essentially the interconnection of things and things and M2M. It collects information through various sensors distributed in different geographical locations, and integrates the information through the network to achieve centralized management and processing. The open nature of the Internet of Things makes the devices in it vulnerable to attacks. Therefore, in order to realize the "Internet of Everything", secure communication is needed as a technical support, and the prerequisite for realizing secure communication is to ensure the authenticity of the identities of both parties in communication, which requires the use of identity authentication technology ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/08H04W4/70G16Y40/50
CPCH04L9/0822H04L9/0866H04L9/0869H04L67/12H04W4/70
Inventor 杨威王宇建吴永强
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products