Internet of Things equipment authentication and key negotiation method

The invention relates to the technical field of communication, in particular to an Internet of Things equipment authentication and key negotiation method. The method is used for identity authentication and key exchange between a visitor terminal and a central server. A preset central server contains...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: XU JIAN, LIU KUANGYE, YANG HAO, ZHANG LINGLING, XIAO YONGCAI
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator XU JIAN
LIU KUANGYE
YANG HAO
ZHANG LINGLING
XIAO YONGCAI
description The invention relates to the technical field of communication, in particular to an Internet of Things equipment authentication and key negotiation method. The method is used for identity authentication and key exchange between a visitor terminal and a central server. A preset central server contains pre-filled encrypted visitor registration information and an access time period, the registration information comprises equipment information of a visitor terminal and identity information of a visitor, and a shared root key exists between the visitor terminal and the central server; an authentication token is calculated by introducing random numbers generated by two communication parties, the random numbers used for generating the authentication token are subjected to encryption protection in a transmission process, and registration information of a visitor is dynamically encrypted, so that keys used in each communication process are different, and the risk of leakage of the keys in a channel transmission process
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN115208702A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN115208702A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN115208702A3</originalsourceid><addsrcrecordid>eNrjZHDzzCtJLcpLLVHIT1MIycjMSy9WSC0szSzITc0rUUgsLckA0pnJiSWZ-XkKiXkpCtmplQp5qen5JZkQsdzUkoz8FB4G1rTEnOJUXijNzaDo5hri7KGbWpAfn1pckJicCrQj3tnP0NDUyMDC3MDI0ZgYNQBlyzQC</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Internet of Things equipment authentication and key negotiation method</title><source>esp@cenet</source><creator>XU JIAN ; LIU KUANGYE ; YANG HAO ; ZHANG LINGLING ; XIAO YONGCAI</creator><creatorcontrib>XU JIAN ; LIU KUANGYE ; YANG HAO ; ZHANG LINGLING ; XIAO YONGCAI</creatorcontrib><description>The invention relates to the technical field of communication, in particular to an Internet of Things equipment authentication and key negotiation method. The method is used for identity authentication and key exchange between a visitor terminal and a central server. A preset central server contains pre-filled encrypted visitor registration information and an access time period, the registration information comprises equipment information of a visitor terminal and identity information of a visitor, and a shared root key exists between the visitor terminal and the central server; an authentication token is calculated by introducing random numbers generated by two communication parties, the random numbers used for generating the authentication token are subjected to encryption protection in a transmission process, and registration information of a visitor is dynamically encrypted, so that keys used in each communication process are different, and the risk of leakage of the keys in a channel transmission process</description><language>chi ; eng</language><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE ; CHECKING-DEVICES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; GENERATING RANDOM NUMBERS ; PHYSICS ; REGISTERING OR INDICATING THE WORKING OF MACHINES ; TIME OR ATTENDANCE REGISTERS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; VOTING OR LOTTERY APPARATUS</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20221018&amp;DB=EPODOC&amp;CC=CN&amp;NR=115208702A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20221018&amp;DB=EPODOC&amp;CC=CN&amp;NR=115208702A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>XU JIAN</creatorcontrib><creatorcontrib>LIU KUANGYE</creatorcontrib><creatorcontrib>YANG HAO</creatorcontrib><creatorcontrib>ZHANG LINGLING</creatorcontrib><creatorcontrib>XIAO YONGCAI</creatorcontrib><title>Internet of Things equipment authentication and key negotiation method</title><description>The invention relates to the technical field of communication, in particular to an Internet of Things equipment authentication and key negotiation method. The method is used for identity authentication and key exchange between a visitor terminal and a central server. A preset central server contains pre-filled encrypted visitor registration information and an access time period, the registration information comprises equipment information of a visitor terminal and identity information of a visitor, and a shared root key exists between the visitor terminal and the central server; an authentication token is calculated by introducing random numbers generated by two communication parties, the random numbers used for generating the authentication token are subjected to encryption protection in a transmission process, and registration information of a visitor is dynamically encrypted, so that keys used in each communication process are different, and the risk of leakage of the keys in a channel transmission process</description><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</subject><subject>CHECKING-DEVICES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>GENERATING RANDOM NUMBERS</subject><subject>PHYSICS</subject><subject>REGISTERING OR INDICATING THE WORKING OF MACHINES</subject><subject>TIME OR ATTENDANCE REGISTERS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>VOTING OR LOTTERY APPARATUS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHDzzCtJLcpLLVHIT1MIycjMSy9WSC0szSzITc0rUUgsLckA0pnJiSWZ-XkKiXkpCtmplQp5qen5JZkQsdzUkoz8FB4G1rTEnOJUXijNzaDo5hri7KGbWpAfn1pckJicCrQj3tnP0NDUyMDC3MDI0ZgYNQBlyzQC</recordid><startdate>20221018</startdate><enddate>20221018</enddate><creator>XU JIAN</creator><creator>LIU KUANGYE</creator><creator>YANG HAO</creator><creator>ZHANG LINGLING</creator><creator>XIAO YONGCAI</creator><scope>EVB</scope></search><sort><creationdate>20221018</creationdate><title>Internet of Things equipment authentication and key negotiation method</title><author>XU JIAN ; LIU KUANGYE ; YANG HAO ; ZHANG LINGLING ; XIAO YONGCAI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN115208702A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</topic><topic>CHECKING-DEVICES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>GENERATING RANDOM NUMBERS</topic><topic>PHYSICS</topic><topic>REGISTERING OR INDICATING THE WORKING OF MACHINES</topic><topic>TIME OR ATTENDANCE REGISTERS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>VOTING OR LOTTERY APPARATUS</topic><toplevel>online_resources</toplevel><creatorcontrib>XU JIAN</creatorcontrib><creatorcontrib>LIU KUANGYE</creatorcontrib><creatorcontrib>YANG HAO</creatorcontrib><creatorcontrib>ZHANG LINGLING</creatorcontrib><creatorcontrib>XIAO YONGCAI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>XU JIAN</au><au>LIU KUANGYE</au><au>YANG HAO</au><au>ZHANG LINGLING</au><au>XIAO YONGCAI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Internet of Things equipment authentication and key negotiation method</title><date>2022-10-18</date><risdate>2022</risdate><abstract>The invention relates to the technical field of communication, in particular to an Internet of Things equipment authentication and key negotiation method. The method is used for identity authentication and key exchange between a visitor terminal and a central server. A preset central server contains pre-filled encrypted visitor registration information and an access time period, the registration information comprises equipment information of a visitor terminal and identity information of a visitor, and a shared root key exists between the visitor terminal and the central server; an authentication token is calculated by introducing random numbers generated by two communication parties, the random numbers used for generating the authentication token are subjected to encryption protection in a transmission process, and registration information of a visitor is dynamically encrypted, so that keys used in each communication process are different, and the risk of leakage of the keys in a channel transmission process</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN115208702A
source esp@cenet
subjects ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE
CHECKING-DEVICES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
GENERATING RANDOM NUMBERS
PHYSICS
REGISTERING OR INDICATING THE WORKING OF MACHINES
TIME OR ATTENDANCE REGISTERS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
VOTING OR LOTTERY APPARATUS
title Internet of Things equipment authentication and key negotiation method
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T10%3A59%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=XU%20JIAN&rft.date=2022-10-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN115208702A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true