Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology

A technology of identity authentication and symmetric cryptography, which is applied in the field of using symmetric cryptography to enhance MQTT protocol identity authentication, to achieve the effects of easy implementation of development technology, improved security performance, and strong versatility

Pending Publication Date: 2021-11-05
中电信量子科技有限公司
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the MQTT protocol in the prior art, the channel must be established based on the public-private key system to realize the protocol-based identity authentic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
  • Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
  • Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0077] Example one

[0078] The present invention provides a use of symmetric cryptography to enhance the MQTT protocol identity authentication method, which is applied to an identity authentication system, which includes quantum random number generators, quantum exchange cryptos, quantum keyfilling machines, quantum password management services System, Internet of Things terminal, security key chip, and Internet of Things platform.

[0079] The IoT terminal can be publisher in the MQTT protocol, or a subscriber in the MQTT protocol. The Internet of Things platform can be a proxy in the MQTT protocol. During the process of accessing the Internet of Things terminal, the Internet of Things platform needs to be certified to the Internet of Things terminal. If the authentication is passed, the Internet terminal can be transmitted to the Internet of Things platform, for example, the Internet of Things terminal can be connected Platform publishing messages, you can also subscribe to oth...

Example Embodiment

[0118] Example 2

[0119] The present invention provides a method of using a symmetric cryptographic technology to enhance the MQTT protocol identity authentication method, and is applied to the IoT terminal, such as Image 6 with Figure 7 As shown, including:

[0120] First identity authentication:

[0121] S31, the terminal acquires the security chip inside the key request, the security chip returns the key B of the chip key sequence number Z;

[0122] S32, the terminal constructs the initial identification request message according to the MQTT connection message Connect content format: key sequence number Z + terminal ID + ciphertext (time-varying parameter + terminal ID + terminal preset password), ciphertext encryption method can use SM4 and other symmetrical algorithms Completed, the key B taken out of the encryption key is S1;

[0123] S33, the terminal transmits a constructed authentication request message to the Internet of Intracered Proxy address;

[0124] S34, the termi...

Example Embodiment

[0129] Example three

[0130] The present invention provides a method of using a symmetric cryptographic technology to enhance the MQTT protocol identity authentication method, which is applied to the Internet of Things platform, such as Figure 8 with Figure 9 As shown, including:

[0131] First identity authentication:

[0132] S301, the Internet of Things platform acquires the key B syndrome of the key B to the quantum password management service system in the initial identity authentication request message sent by the Internet of Things terminal.

[0133] S302, the Internet of Things platform receives the key B 'returned by the quantum password management service system, and the Internet of Things platform is decrypted by the key B' to decrypt the initial identity authentication request message to obtain a decrypted ciphertext: Time-changing parameter + terminal ID + terminal preset password, and compares the decryption terminal ID and terminal preset password and the backgroun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for enhancing MQTT protocol identity authentication by using a symmetric cryptographic technology, which comprises the following steps of: performing first identity authentication from an Internet of Things terminal to an Internet of Things platform: charging a quantum key into a quantum safety chip by a quantum key charging machine, and recording and storing a corresponding relationship between the charging safety chip and the key, the Internet of Things terminal calls a quantum key in a chip to construct an identity authentication request message to the Internet of Things platform, the Internet of Things platform obtains symmetry, carries out decryption and identity comparison, generates a login token after successful authentication, and returns a verification message to the terminal; second identity authentication: the Internet of Things platform applies for a key according to the terminal ID and constructs an identity authentication request message to the terminal; and the terminal decrypts and verifies the platform ID and the login token. The invention further provides a system and equipment corresponding to the method. The invention has the advantages that identity authentication is performed by using a key set symmetric algorithm in the quantum safety chip, one key is pad at a time, a third party does not need to issue and authenticate a digital certificate. Therefore, the safety is improved.

Description

technical field [0001] The invention belongs to the technical field of security application products, and in particular relates to a method for enhancing MQTT protocol identity authentication by using symmetric encryption technology. Background technique [0002] The MQTT (Message Queuing Telemetry Transport) protocol is a communication protocol based on the publish / subscribe model, which is built on the TCP / IP (Transmission Control Protocol / Internet Protocol) protocol superior. MQTT can provide real-time and reliable message services for connected terminals with less code and limited bandwidth. [0003] In the MQTT protocol, a server (may be referred to as an MQTT server) needs to authenticate an accessed terminal (may be referred to as an MQTT terminal). After successful authentication, the MQTT terminal publishes or subscribes to messages through the MQTT server. In order to improve the security of transmitted data during the authentication process, the prior art gener...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0852H04L9/0866H04L9/3226H04L9/3213H04L63/0435H04L63/083H04L63/0807H04L67/12
Inventor 王丙磊胡缙王建礼
Owner 中电信量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products