Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
A technology of identity authentication and symmetric cryptography, which is applied in the field of using symmetric cryptography to enhance MQTT protocol identity authentication, to achieve the effects of easy implementation of development technology, improved security performance, and strong versatility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0077] Example one
[0078] The present invention provides a use of symmetric cryptography to enhance the MQTT protocol identity authentication method, which is applied to an identity authentication system, which includes quantum random number generators, quantum exchange cryptos, quantum keyfilling machines, quantum password management services System, Internet of Things terminal, security key chip, and Internet of Things platform.
[0079] The IoT terminal can be publisher in the MQTT protocol, or a subscriber in the MQTT protocol. The Internet of Things platform can be a proxy in the MQTT protocol. During the process of accessing the Internet of Things terminal, the Internet of Things platform needs to be certified to the Internet of Things terminal. If the authentication is passed, the Internet terminal can be transmitted to the Internet of Things platform, for example, the Internet of Things terminal can be connected Platform publishing messages, you can also subscribe to oth...
Example Embodiment
[0118] Example 2
[0119] The present invention provides a method of using a symmetric cryptographic technology to enhance the MQTT protocol identity authentication method, and is applied to the IoT terminal, such as Image 6 with Figure 7 As shown, including:
[0120] First identity authentication:
[0121] S31, the terminal acquires the security chip inside the key request, the security chip returns the key B of the chip key sequence number Z;
[0122] S32, the terminal constructs the initial identification request message according to the MQTT connection message Connect content format: key sequence number Z + terminal ID + ciphertext (time-varying parameter + terminal ID + terminal preset password), ciphertext encryption method can use SM4 and other symmetrical algorithms Completed, the key B taken out of the encryption key is S1;
[0123] S33, the terminal transmits a constructed authentication request message to the Internet of Intracered Proxy address;
[0124] S34, the termi...
Example Embodiment
[0129] Example three
[0130] The present invention provides a method of using a symmetric cryptographic technology to enhance the MQTT protocol identity authentication method, which is applied to the Internet of Things platform, such as Figure 8 with Figure 9 As shown, including:
[0131] First identity authentication:
[0132] S301, the Internet of Things platform acquires the key B syndrome of the key B to the quantum password management service system in the initial identity authentication request message sent by the Internet of Things terminal.
[0133] S302, the Internet of Things platform receives the key B 'returned by the quantum password management service system, and the Internet of Things platform is decrypted by the key B' to decrypt the initial identity authentication request message to obtain a decrypted ciphertext: Time-changing parameter + terminal ID + terminal preset password, and compares the decryption terminal ID and terminal preset password and the backgroun...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap