Credible Internet of Things device and system based on an SIM card and working method of the credible Internet of Things device and system
A technology of IoT devices and networked devices, applied in the field of communications, can solve the problem that IoT device vendors cannot prove their innocence, and achieve the effect of solving unclear responsibilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] like figure 1 As shown, Embodiment 1 of the present application provides a trusted IoT system 1 based on a SIM card, including a trusted IoT device 11 based on a SIM card, an IoT device management platform 12, a front-end access server 13 and a blockchain management system. / auth server 14. in:
[0048] ① Trusted IoT device based on SIM card 11:
[0049] The SIM card-based trusted IoT device 11 includes a SIM card security element 111 and an IoT communication element 112 .
[0050] The SIM card secure element 111 may be an iSIM card, an eSIM card, or a physical SIM card with a data processing function. The SIM card security element 111 is used to carry the operator's 5G network capability configuration and provide access to the operator's network authentication capability; it is used to carry the Internet of Things security service application blockchain Applet, and generate the uplink data management key and device virtual identity ID; When uploading to the chain, ...
Embodiment 2
[0060] like figure 2 As shown, Embodiment 2 of the present application provides a working method of a trusted Internet of Things system based on a SIM card, including:
[0061] Step 210, the IoT device management platform initiates an access request to the front access server;
[0062] Specifically, the IoT device management platform is connected to the IoT device and the front-end access server. If an IoT device needs to be connected to the chain (the way the IoT device accesses the blockchain management / authentication server is called the chain, that is, the information When connecting to the blockchain), the IoT management platform will inform the front-end access server of the mobile phone number of the IoT device that needs to be applied for on-chain, and request the IoT device to access the front-end access server. The access request includes the IoT device The information is preferably the secure element identification of the SIM card in the IoT device, that is, the m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


