CN102571338B - A kind of Internet of Things authentication method based on PKI technology and system - Google Patents

A kind of Internet of Things authentication method based on PKI technology and system Download PDF

Info

Publication number
CN102571338B
CN102571338B CN201010603710.5A CN201010603710A CN102571338B CN 102571338 B CN102571338 B CN 102571338B CN 201010603710 A CN201010603710 A CN 201010603710A CN 102571338 B CN102571338 B CN 102571338B
Authority
CN
China
Prior art keywords
node
host computer
certificate
certification
heartbeat data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010603710.5A
Other languages
Chinese (zh)
Other versions
CN102571338A (en
Inventor
黄孝斌
魏剑平
樊勇
朱学锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing times Polytron Technologies Inc
Original Assignee
BEIJING LOIT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LOIT TECHNOLOGY Co Ltd filed Critical BEIJING LOIT TECHNOLOGY Co Ltd
Priority to CN201010603710.5A priority Critical patent/CN102571338B/en
Publication of CN102571338A publication Critical patent/CN102571338A/en
Application granted granted Critical
Publication of CN102571338B publication Critical patent/CN102571338B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a kind of Internet of Things authentication method based on PKI technology and system, the method comprises: sensor node sends the heartbeat data using host computer public key encryption to host computer according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key; After host computer receives described heartbeat data, use host computer private key to be decrypted, obtain node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent to certification authority CA together with described node certificate; After described CA receives node certificate and random number, certification is carried out to described node certificate, authentication result is sent to described host computer together with described random number; Described host computer knows the authentication result of the sensor node of initiating certification according to the authentication result received and random number.

Description

A kind of Internet of Things authentication method based on PKI technology and system
Technical field
The present invention relates to Internet of Things, particularly relate to a kind of Internet of Things authentication method and system.
Background technology
PKIX (Public Key Infrastructure, be called for short PKI) refers to be implemented by PKI concept and technology and to provide the security infrastructure with universality of security service.
Complete PKI system must have the basic comprising parts such as certified authority (CA), digital certificate storehouse, cipher key backup and recovery system, certificate calcellation system, application interface (API), builds PKI and also will set about building round this five big systems.
PKI technology is the core of information security technology, is also key and the basic technology of ecommerce.The basic technology of PKI comprises encryption, digital signature, data integrity mechanism, digital envelope, dual digital signature etc.Typical case, complete, an effective PKI application system at least should have with lower part: the backup of public key certificate management, the issue of blacklist and management, key and recovery, automatically more new key, automatically management history key, and support cross-certification.
Certification authority (CA): the i.e. application of digital certificate and issuing authority, CA must possess authoritative feature;
Digital certificate storehouse: for storing the digital certificate and PKI signed and issued, user can obtain certificate and the PKI of other required users thus;
Cipher key backup and recovery system: if user lost the key for data decryption, then data cannot be decrypted, this will cause valid data to lose.For avoiding this situation, PKI provides backup and the mechanism recovering key.But notably, the backup of key must have been come by believable mechanism with recovery.Further, cipher key backup can only for decruption key with recovery, and signature private key is for guaranteeing that its uniqueness can not back up.
Certificate calcellation system: certificate calcellation treatment system is the indispensable assembly of of PKI.The same with the various identity documents in daily life, also may need within validity period of certificate to cancel, reason may be key medium loss or user identity change etc.For realizing this point, PKI must provide a series of mechanism of revoked certificate.
Application interface (API): the value of PKI is to enable user use the security services such as encryption, digital signature easily, therefore a complete PKI must provide good application interface system, make various application with safety, consistent, believable mode and PKI alternately, integrality and the ease for use of secure network environment can be guaranteed.
As a rule, CA be certificate sign and issue mechanism, it is the core of PKI.As everyone knows, the core content building cryptographic service system how to realize key management.Public key system relates to pair of secret keys (i.e. private key and PKI), private key is only independently grasped by user, need not at transfers on network, disclosed in PKI is then, need in online transmission, therefore the key management of public key system is mainly for the problem of management of PKI, solution is digital certificate mechanism preferably at present.
Certificate: certificate is Data Elements most important, the most basic in PKI.The various services (confidentiality, integrality, non-repudiation etc.) that PKI provides, all will be realized by certificate.
Digital certificate generally comprises: content; Version, sequence number; Sign originator (Issuer); Certificate main body (Subject), i.e. subscriber; The term of validity; Subscriber's PKI; Algorithm mark and key; Sign the signature of originator (i.e. CA); Signature algorithm identifier; Signature result etc., specifically can see X.509 certificate format.
Internet of Things (Internet of Things), from the understanding of narrow sense, is exactly Sensor Network, various transducer is tied, and forms a network.Bottom perception is mainly divided into four classes: identity perception, state aware, image perception, location aware.And wireless sensor network is the network of a self-organizing, be applicable to very much the collection of bottom perception data.
Internet of Things is that the Internet extends to bottom in fact.The formation of Internet of Things is divided into several level: bottom is data collection layer, namely sensing layer, has four class perception.Be up transport layer, the data of transmission perception, transmission means is divided into the modes such as wired, wireless.3rd, transmission will calculate data later, data mining, and this part can use cloud computing technology.Then, valid data support applications is used.Comprise the types of applications such as municipal administration's management, security management and control, emergency disposal.
For avoiding overlapping investment, each department of government is all considering that carrying out the unified of Internet of Things builds.But how to utilize existing resource, realize the unified safety authentication of Internet of things node, the difficult problem that is convenient, fast, high-performance, high efficiency authentication mode are the consideration of current government department is provided.
Summary of the invention
The technical problem to be solved in the present invention is, provides a kind of Internet of Things authentication method based on PKI technology and system, can carry out unified certification to Internet of things node, convenient, efficient.
In order to solve the problems of the technologies described above, the present invention proposes a kind of Internet of Things authentication method based on PKI technology, comprising:
Sensor node sends the heartbeat data using host computer public key encryption to host computer according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key;
After host computer receives described heartbeat data, use host computer private key to be decrypted, obtain node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent to certification authority CA together with described node certificate;
After described CA receives node certificate and random number, certification is carried out to described node certificate, authentication result is sent to described host computer together with described random number;
Described host computer knows the authentication result of the sensor node of initiating certification according to the authentication result received and random number.
Further, said method also can have following characteristics:
Heartbeat effective time is also comprised in described heartbeat data;
Described host computer, after deciphering heartbeat data, first judges that whether the heartbeat in the heartbeat data obtained is still effective for effective time, if effectively, just deciphers the node certificate of described node encrypted private key.
Further, said method also can have following characteristics:
Described host computer is after knowing that the sensor node certification initiating certification is passed through, start timer, timing is a temporary term of validity preset, before described timer then, the heartbeat data of the sensor node that described certification is passed through is not processed, at described timer to constantly, continue to process the heartbeat data of the sensor node that described certification is passed through;
Described default temporary term of validity is greater than described default report cycle.
Further, said method also can have following characteristics:
When described host computer uses host computer private key to be decrypted, if decipher unsuccessfully, then carry out alarming processing; And/or
Described host computer when the authentication result of the sensor node knowing initiation certification is authentification failure, then carries out alarming processing.
Further, said method also can have following characteristics:
Described node certificate comprises: version number, sequence number, signature, issuer, the term of validity, main body and main body public key information.
In order to solve the problems of the technologies described above, the present invention also proposes a kind of Internet of Things Verification System based on PKI technology, comprising:
Sensor node, sends the heartbeat data using host computer public key encryption according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key;
Host computer, receives described heartbeat data, uses host computer private key to be decrypted it, obtains node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent together with described node certificate; And receive authentication result and random number, know the authentication result of the sensor node of initiating certification according to this;
Certification authority CA, receives described node certificate and described random number, carries out certification to described node certificate, authentication result sent together with described random number.
Further, said system also can have following characteristics:
Heartbeat effective time is also comprised in described heartbeat data;
Described host computer, after deciphering heartbeat data, first judges that whether the heartbeat in the heartbeat data obtained is still effective for effective time, if effectively, just deciphers the node certificate of described node encrypted private key.
Further, said system also can have following characteristics:
Described host computer, also after knowing that the sensor node certification initiating certification is passed through, start timer, timing is a temporary term of validity preset, before described timer then, the heartbeat data of the sensor node that described certification is passed through is not processed, at described timer to constantly, continue to process the heartbeat data of the sensor node that described certification is passed through;
Described default temporary term of validity is greater than described default report cycle.
Further, said system also can have following characteristics:
Described host computer, when using host computer private key to be decrypted, if decipher unsuccessfully, also carries out alarming processing; And/or
Described host computer, when the authentication result of the sensor node knowing initiation certification is authentification failure, also carries out alarming processing.
Further, said system also can have following characteristics:
Described node certificate comprises: version number, sequence number, signature, issuer, the term of validity, main body and main body public key information.
A kind of Internet of Things authentication method based on PKI technology provided by the invention and system, can carry out unified certification to Internet of things node, convenient, efficient.
Accompanying drawing explanation
Fig. 1 is a kind of Internet of Things Verification System block diagram based on PKI technology of the embodiment of the present invention;
Fig. 2 is a kind of Internet of Things authentication method flow chart based on PKI technology of the embodiment of the present invention.
Embodiment
Embodiment of the present invention is described in detail below in conjunction with accompanying drawing.
See Fig. 1, the figure shows a kind of Internet of Things Verification System based on PKI technology of the embodiment of the present invention, comprise one or more sensor node, host computer and certification authority CA, wherein:
Described sensor node, sends the heartbeat data using host computer public key encryption according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key.
Described host computer, receives described heartbeat data, uses host computer private key to be decrypted it, obtains node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent to described CA together with described node certificate; And receive the authentication result and random number that described CA returns, know the authentication result of the sensor node of initiating certification according to this.
Described CA, receives node certificate and random number that described host computer sends, carries out certification, authentication result is sent to described host computer together with described random number to described node certificate.
Wherein, each sensor node has oneself certificate, and described certificate can be signed and issued by CA.Specifically can sign and issue according to area type, or sign and issue according to industry type, the present invention does not limit at this.
Described host computer, after knowing the authentication result of sensor node, can carry out data processing according to authentication result, such as, can receive only the data of the sensor node that certification is passed through, thus guarantee the reliability of data.The embodiment of the present invention sends authentication request by sensor node to host computer dexterously; i.e. heartbeat data; and key protection mechanism is increased between host computer and sensor node; host computer after determining the correctness of heartbeat data, then is reported CA, carries out certification; and return authentication result is to host computer; thus for the feature of Internet of Things, apply PKI technology dexterously and set up Internet of Things authentication system, guarantee the reliability of Internet of Things data.
Preferably, in order to effectively save the resource of host computer, heartbeat effective time in described heartbeat data, can also be comprised.Described host computer is after deciphering heartbeat data, also can obtain the heartbeat effective time of described heartbeat data, before the node certificate of described node encrypted private key is decrypted, first judge that whether described heartbeat is still effective for effective time, if effectively, just decipher the node certificate of described node encrypted private key.If invalid, then think that described heartbeat data is expired, no longer accurately, can abandon, without the need to performing the decryption step to node certificate again.
Preferably, in order to save the resource of host computer, described host computer can also after knowing that the sensor node certification initiating certification is passed through, start timer, timing is a temporary term of validity preset, and before described timer then, does not process the heartbeat data of the sensor node that described certification is passed through, at described timer to constantly, continue to process the heartbeat data of the sensor node that described certification is passed through.Described default temporary term of validity is greater than described default report cycle.
Preferably, the Internet of Things Verification System that the present invention is based on PKI technology can also increase alarm mechanism.Specifically, Ke Yishi, described host computer, when using host computer private key to be decrypted, if decipher unsuccessfully, carries out alarming processing.Can also be that described host computer, when the authentication result of the sensor node knowing initiation certification is authentification failure, carries out alarming processing.
Consider that the transmittability of sensor node is lower, transmission speed is lower, and preferably, the embodiment of the present invention carries out cutting to the information in X.509 certificate, retains key message wherein, thus reduces transmitted data amount, makes it to be more suitable for Internet of Things feature.The embodiment of the present invention provides a kind of node certificate at this, and it can comprise version number, sequence number, signature, issuer, the term of validity, main body and main body public key information.Wherein:
Described version number, for the version (version 1, version 2 or version 3) of identity certificate.
Described sequence number is the unique identification of this certificate distributed by certificate authority person.
Described signature, is signature algorithm identifier symbol, adds that relevant parameter forms, for illustration of the Digital Signature Algorithm that this certificate is used by object identifier.Such as, the object identifier of SHA-1 and RSA is just used for illustrating that this digital signature utilizes RSA to encrypt SHA-1 hash.
Described issuer, the distinguished name (DN) of the person that is certificate authority.
The described term of validity is the time period of validity period of certificate.Its field can be made up of " Not Before " and " NotAfter " two, and they are respectively by UTC time or general time representation (having detailed time representation rule in RFC2459).
Described main body, be the distinguished name of certificate owner, this field is non-NULL, unless had another name in certificate extension.
Described main body public key information is the PKI (and algorithm identifier) of main body.
Preferably, a kind of Internet of Things Verification System based on PKI technology of the embodiment of the present invention can manage certificate, neatly to guarantee the fail safe of certification further.Such as, certificate update function can be provided, when specific implementation, can be host computer after each verification process, after namely receiving authentication result, prompting user upgrades in time certificate.Also can according to different requirement cancellation of doucment.The mode of such as OCSP online query can also be used to realize the issue of certificate revocation list.Etc..
The embodiment of the present invention additionally provides a kind of method utilizing said system to realize Internet of Things certification, as shown in Figure 2, comprises step:
Step S201: sensor node sends the heartbeat data using host computer public key encryption to host computer according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key;
Step S202: after host computer receives described heartbeat data, uses host computer private key to be decrypted, obtains node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent to certification authority CA together with described node certificate;
Step S203: after described CA receives node certificate and random number, carries out certification to described node certificate, and authentication result is sent to described host computer together with described random number;
Step S204: described host computer knows the authentication result of the sensor node of initiating certification according to the authentication result received and random number.
Wherein, each sensor node has oneself certificate, and described certificate can be signed and issued by CA.Specifically can sign and issue according to area type, or sign and issue according to industry type, the present invention does not limit at this.
Described host computer, after knowing the authentication result of sensor node, can carry out data processing according to authentication result, such as, can receive only the data of the sensor node that certification is passed through, thus guarantee the reliability of data.The embodiment of the present invention sends authentication request by sensor node to host computer dexterously; i.e. heartbeat data; and key protection mechanism is increased between host computer and sensor node; host computer after determining the correctness of heartbeat data, then is reported CA, carries out certification; and return authentication result is to host computer; thus for the feature of Internet of Things, apply PKI technology dexterously and set up Internet of Things authentication system, thus guarantee the reliability of Internet of Things data.。
When performing step S201, heartbeat effective time in the heartbeat data that described sensor node reports, can also be comprised.Correspondingly, when performing step S202, described host computer also can obtain heartbeat effective time after deciphering heartbeat data.Described host computer, before being decrypted the node certificate of described node encrypted private key, first judging that whether described heartbeat is still effective for effective time, if effectively, just deciphers the node certificate of described node encrypted private key.If invalid, then thinking that described heartbeat data is expired, no longer accurately, can abandon, without the need to performing the decryption step to node certificate again, thus effectively saving the resource of host computer.
When performing step S204, described host computer is after knowing that the sensor node certification initiating certification is passed through, timer can also be started, timing is a temporary term of validity preset, before described timer then, the heartbeat data of the sensor node that described certification is passed through is not processed, at described timer to constantly, continue to process the heartbeat data of the sensor node that described certification is passed through, thus effectively save the resource of host computer.Wherein, described default temporary term of validity is greater than described default report cycle.
Preferably, alarm mechanism can also be increased.Such as, when performing step S202, when described host computer uses host computer private key to be decrypted, if decipher unsuccessfully, then alarming processing can be carried out.Again such as, when performing step S204, described host computer when the authentication result of the sensor node knowing initiation certification is authentification failure, then can carry out alarming processing.
Consider that the transmittability of sensor node is lower, transmission speed is lower, and preferably, the embodiment of the present invention carries out cutting to the information in X.509 certificate, retains key message wherein, thus reduces transmitted data amount, makes it to be more suitable for Internet of Things feature.The embodiment of the present invention provides a kind of node certificate at this, and it can comprise version number, sequence number, signature, issuer, the term of validity, main body and main body public key information.Wherein:
Described version number, for the version (version 1, version 2 or version 3) of identity certificate.
Described sequence number is the unique identification of this certificate distributed by certificate authority person.
Described signature, is signature algorithm identifier symbol, adds that relevant parameter forms, for illustration of the Digital Signature Algorithm that this certificate is used by object identifier.Such as, the object identifier of SHA-1 and RSA is just used for illustrating that this digital signature utilizes RSA to encrypt SHA-1 hash.
Described issuer, the distinguished name (DN) of the person that is certificate authority.
The described term of validity is the time period of validity period of certificate.Its field can be made up of " Not Before " and " NotAfter " two, and they are respectively by UTC time or general time representation (having detailed time representation rule in RFC2459).
Described main body, be the distinguished name of certificate owner, this field is non-NULL, unless had another name in certificate extension.
Described main body public key information is the PKI (and algorithm identifier) of main body.
Preferably, the embodiment of the present invention can also manage certificate neatly, to guarantee the fail safe of certification further.Such as, certificate update function can be provided, when specific implementation, can be host computer after each verification process, after namely receiving authentication result, prompting user upgrades in time certificate.Also can according to different requirement cancellation of doucment.The mode of such as OCSP online query can also be used to realize the issue of certificate revocation list.Etc..
Certainly; the present invention also can have other various embodiments; when not deviating from the present invention's spirit and essence thereof; those skilled in the art are when making various corresponding change and distortion according to the present invention, but these change accordingly and are out of shape the protection range that all should belong to the claim appended by the present invention.

Claims (9)

1., based on an Internet of Things authentication method for PKI technology, it is characterized in that, comprising:
Sensor node sends the heartbeat data using host computer public key encryption to host computer according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key;
After host computer receives described heartbeat data, use host computer private key to be decrypted, obtain node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent to certification authority CA together with described node certificate;
After described CA receives node certificate and random number, certification is carried out to described node certificate, authentication result is sent to described host computer together with described random number;
Described host computer knows the authentication result of the sensor node of initiating certification according to the authentication result received and random number.
2. the method for claim 1, is characterized in that:
Heartbeat effective time is also comprised in described heartbeat data;
Described host computer, after deciphering heartbeat data, first judges that whether the heartbeat in the heartbeat data obtained is still effective for effective time, if effectively, just deciphers the node certificate of described node encrypted private key.
3. method as claimed in claim 1 or 2, is characterized in that, also comprise:
Described host computer is after knowing that the sensor node certification initiating certification is passed through, start timer, timing is a temporary term of validity preset, before described timer then, the heartbeat data of the sensor node that described certification is passed through is not processed, at described timer to constantly, continue to process the heartbeat data of the sensor node that described certification is passed through;
Described default temporary term of validity is greater than described default report cycle.
4. the method for claim 1, is characterized in that, also comprises:
When described host computer uses host computer private key to be decrypted, if decipher unsuccessfully, then carry out alarming processing; And/or
Described host computer when the authentication result of the sensor node knowing initiation certification is authentification failure, then carries out alarming processing.
5. the method for claim 1, is characterized in that:
Described node certificate comprises: version number, sequence number, signature, issuer, the term of validity, main body and main body public key information.
6., based on an Internet of Things Verification System for PKI technology, it is characterized in that, comprising:
Sensor node, sends the heartbeat data using host computer public key encryption according to the report cycle preset; Described heartbeat data comprises node public key and the node certificate with node encrypted private key;
Host computer, receives described heartbeat data, uses host computer private key to be decrypted it, obtains node public key and the node certificate with node encrypted private key; Use described node public key to decipher the node certificate of described node encrypted private key, obtain node certificate; Generate the random number of this verification process, described random number is sent to certification authority CA together with described node certificate; And receive authentication result and random number, know the authentication result of the sensor node of initiating certification according to this;
Certification authority CA, receives described node certificate and described random number, carries out certification to described node certificate, authentication result is sent to described host computer together with described random number;
Wherein,
Described node certificate comprises: version number, sequence number, signature, issuer, the term of validity, main body and main body public key information.
7. system as claimed in claim 6, is characterized in that:
Heartbeat effective time is also comprised in described heartbeat data;
Described host computer, after deciphering heartbeat data, first judges that whether the heartbeat in the heartbeat data obtained is still effective for effective time, if effectively, just deciphers the node certificate of described node encrypted private key.
8. system as claimed in claims 6 or 7, is characterized in that:
Described host computer, also after knowing that the sensor node certification initiating certification is passed through, start timer, timing is a temporary term of validity preset, before described timer then, the heartbeat data of the sensor node that described certification is passed through is not processed, at described timer to constantly, continue to process the heartbeat data of the sensor node that described certification is passed through;
Described default temporary term of validity is greater than described default report cycle.
9. system as claimed in claim 6, is characterized in that:
Described host computer, when using host computer private key to be decrypted, if decipher unsuccessfully, also carries out alarming processing; And/or
Described host computer, when the authentication result of the sensor node knowing initiation certification is authentification failure, also carries out alarming processing.
CN201010603710.5A 2010-12-23 2010-12-23 A kind of Internet of Things authentication method based on PKI technology and system Active CN102571338B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010603710.5A CN102571338B (en) 2010-12-23 2010-12-23 A kind of Internet of Things authentication method based on PKI technology and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010603710.5A CN102571338B (en) 2010-12-23 2010-12-23 A kind of Internet of Things authentication method based on PKI technology and system

Publications (2)

Publication Number Publication Date
CN102571338A CN102571338A (en) 2012-07-11
CN102571338B true CN102571338B (en) 2015-09-23

Family

ID=46415880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010603710.5A Active CN102571338B (en) 2010-12-23 2010-12-23 A kind of Internet of Things authentication method based on PKI technology and system

Country Status (1)

Country Link
CN (1) CN102571338B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117665B (en) * 2015-07-16 2017-10-31 福建联迪商用设备有限公司 A kind of end product pattern and the method and system of development mode handoff-security
CN105120066B (en) * 2015-07-16 2017-12-08 福建联迪商用设备有限公司 A kind of end product pattern and the method and system of development mode handoff-security
US10587421B2 (en) * 2017-01-12 2020-03-10 Honeywell International Inc. Techniques for genuine device assurance by establishing identity and trust using certificates
CN107688300A (en) * 2017-09-08 2018-02-13 深圳市盛路物联通讯技术有限公司 The control method and associated server of a kind of equipment
CN114070649A (en) * 2021-12-15 2022-02-18 武汉天喻信息产业股份有限公司 Method and system for secure communication between devices
CN113992450B (en) * 2021-12-28 2022-05-13 威晟汽车科技(宁波)有限公司 High-reliability data transmission method based on LIN bus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929380A (en) * 2006-09-23 2007-03-14 西安西电捷通无线网络通信有限公司 Public key certificate state obtaining and verification method
CN101500146A (en) * 2009-02-18 2009-08-05 北京永新视博数字电视技术有限公司 Digital television receiving control method and apparatus based on bi-directional network
CN101867530A (en) * 2010-05-31 2010-10-20 西安电子科技大学 Things-internet gateway system based on virtual machine and data interactive method
CN202103686U (en) * 2010-12-23 2012-01-04 北京时代凌宇科技有限公司 Public key infrastructure (PKI) technology-based internet-of-things authentication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101888295A (en) * 2009-05-15 2010-11-17 南京理工大学 Distributed multi-term safety certification method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929380A (en) * 2006-09-23 2007-03-14 西安西电捷通无线网络通信有限公司 Public key certificate state obtaining and verification method
CN101500146A (en) * 2009-02-18 2009-08-05 北京永新视博数字电视技术有限公司 Digital television receiving control method and apparatus based on bi-directional network
CN101867530A (en) * 2010-05-31 2010-10-20 西安电子科技大学 Things-internet gateway system based on virtual machine and data interactive method
CN202103686U (en) * 2010-12-23 2012-01-04 北京时代凌宇科技有限公司 Public key infrastructure (PKI) technology-based internet-of-things authentication system

Also Published As

Publication number Publication date
CN102571338A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
US11615060B2 (en) Constructing a multiple entity root of trust
EP3289723B1 (en) Encryption system, encryption key wallet and method
CN110096901B (en) Electronic contract data encryption storage method and signing client
CN102571338B (en) A kind of Internet of Things authentication method based on PKI technology and system
WO2013010427A1 (en) Key generation, backup and migration method and system based on trusted computing
CN106941404B (en) Key protection method and device
CN101399666A (en) Safety control method and system for digital certificate of file
WO2022022009A1 (en) Message processing method and apparatus, device, and storage medium
US10958450B1 (en) Constructing a multiple-entity root certificate data block chain
KR20060133403A (en) System and method for detecting the exposure of ocsp responder's session private key
CN114900304B (en) Digital signature method and apparatus, electronic device, and computer-readable storage medium
JP2022521525A (en) Cryptographic method for validating data
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN101984626B (en) Method and system for safely exchanging files
CN111314269B (en) Address automatic allocation protocol security authentication method and equipment
WO2014194818A1 (en) Method for discovering user of equipment, and user equipment
KR20140033824A (en) Encryption systems and methods using hash value as symmetric key in the smart device
Senthil Kumari et al. Key derivation policy for data security and data integrity in cloud computing
Xingliang et al. A new authentication scheme for wireless ad hoc network
CN113569295B (en) Blacklist data sharing method and obtaining method
CN202103686U (en) Public key infrastructure (PKI) technology-based internet-of-things authentication system
Li et al. Enterprise private cloud file encryption system based on tripartite secret key protocol
CN110061895B (en) Close-range energy-saving communication method and system for quantum computing resisting application system based on key fob
CN110048920B (en) Anti-quantum-computation intelligent home near-distance energy-saving communication method and system based on key fob
KR101042834B1 (en) A Self-Certified Signcryption Method for Mobile Communications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 100096 Beijing City, Haidian District Xisanqi building materials City Road No. 18 building 4 layer Bestpower

Patentee after: Beijing times Polytron Technologies Inc

Address before: 100096 Beijing City, Haidian District Xisanqi building materials City Road No. 18 building 4 layer Bestpower

Patentee before: Beijing LOIT Technology Co., Ltd.