TW202301831A - Authentication and encryption method for intelligent Internet of Things can provide simple, fast, and convenient authentication functions for the smart device that is installed with the application program, and can encrypt the authentication of the gateway to form a double protection - Google Patents
Authentication and encryption method for intelligent Internet of Things can provide simple, fast, and convenient authentication functions for the smart device that is installed with the application program, and can encrypt the authentication of the gateway to form a double protection Download PDFInfo
- Publication number
- TW202301831A TW202301831A TW110122441A TW110122441A TW202301831A TW 202301831 A TW202301831 A TW 202301831A TW 110122441 A TW110122441 A TW 110122441A TW 110122441 A TW110122441 A TW 110122441A TW 202301831 A TW202301831 A TW 202301831A
- Authority
- TW
- Taiwan
- Prior art keywords
- encryption method
- encryption
- gateway
- smart device
- authentication
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 91
- 230000006870 function Effects 0.000 title description 21
- 238000013475 authorization Methods 0.000 claims abstract description 9
- 230000000875 corresponding effect Effects 0.000 claims description 12
- 238000010561 standard procedure Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 4
- 230000008447 perception Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000007405 data analysis Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
本發明係有關於一種認證及加密方法,特別是有關於一種智慧型物聯網認證及加密方法。The present invention relates to an authentication and encryption method, in particular to an authentication and encryption method for an intelligent internet of things.
物聯網裝置目前已廣泛應用在用戶的生活中,其係根據物聯網裝置的功能提供用戶不同的體驗與便利性。IoT devices have been widely used in users' lives at present, which provide users with different experiences and conveniences according to the functions of the IoT devices.
承上所述,物聯網裝置在使用上,係由用戶透過智慧型裝置與閘道器配對,並透過閘道器控制物聯網裝置。然而,現今的智慧型裝置與閘道器配對及認證的程序往往過於繁雜,並且,當配對的智慧型裝置數量增加,亦即當用戶數增加時,更容易產生連線、配對上的錯誤,亦即產生閘道器的控制權無法順利地由智慧型裝置設定問題。As mentioned above, in the use of IoT devices, users pair smart devices with gateways and control IoT devices through gateways. However, the procedures for pairing and authentication between smart devices and gateways are often too complicated, and when the number of paired smart devices increases, that is, when the number of users increases, errors in connection and pairing are more likely to occur. That is to say, the control right of the gateway cannot be smoothly set by the smart device.
請參閱圖6,其係為物聯網系統的架構示意圖。在物聯網系統中,包含感知層、網路層、雲端計算層、資料分析層及應用層。感知層包含各種具有感測或辨識能力的元件,網路層透過有線或無線的方式連結到網際網路,並透過網際網路將感測的訊號及資料傳送到雲端計算層及資料分析層進行資料的運算及分析。由於物聯網系統係包含各種具有感測、計算及通訊能力的元件,各個元件在物聯網系統各個層之間的資料及訊號傳輸上若無使用保密機制,將有資料外洩的風險。Please refer to FIG. 6 , which is a schematic diagram of the architecture of the IoT system. In the IoT system, it includes perception layer, network layer, cloud computing layer, data analysis layer and application layer. The perception layer includes various components with sensing or identification capabilities. The network layer is connected to the Internet through wired or wireless methods, and the sensed signals and data are transmitted to the cloud computing layer and data analysis layer through the Internet for further analysis. Data processing and analysis. Since the IoT system includes various components with sensing, computing and communication capabilities, there will be a risk of data leakage if the data and signal transmission between the various layers of the IoT system is not secured.
承上所述,以感知層、網路層與雲端計算層之間的傳輸為例,感知層的感測元件將感測的訊號傳送至閘道器,由閘道器透過網路層傳送到雲端計算層及資料分析層進行資料的運算,而網路層係透過無線網路的技術傳送資料。然而,由於無線傳輸的介面具有開放的性質,亦即,任何無線的設備都可能透過竊取的方式造成金鑰外洩、資料竄改和身份被冒用等問題。Continuing from the above, taking the transmission between the perception layer, the network layer and the cloud computing layer as an example, the sensing element of the perception layer transmits the sensed signal to the gateway, and the gateway transmits the signal through the network layer to the The cloud computing layer and data analysis layer perform data calculations, while the network layer transmits data through wireless network technology. However, due to the open nature of the wireless transmission interface, that is, any wireless device may cause problems such as key leakage, data tampering, and identity fraud through theft.
據此,如何提供一種智慧型物聯網認證及加密方法已成為目前急需研究的課題。Accordingly, how to provide an authentication and encryption method for the smart Internet of Things has become an urgent research topic.
鑑於上述問題,本發明揭露一種智慧型物聯網認證及加密方法,包含下列步驟:加密一認證檔案;由該閘道器儲存及解密加密後之該認證檔案,以產生一加密函數之一加密公鑰;藉由該加密公鑰加密該閘道器傳送至該雲端伺服器的一閘道器資料;該雲端伺服器藉由儲存之一加密私鑰解密該閘道器傳送之該閘道器資料;以及若當該雲端伺服器成功解密該閘道器資料時,該雲端伺服器取得該閘道器之一授權。In view of the above problems, the present invention discloses an authentication and encryption method for the smart Internet of Things, comprising the following steps: encrypting an authentication file; storing and decrypting the encrypted authentication file by the gateway to generate an encryption function of an encryption function Key; Encrypt a gateway data sent by the gateway to the cloud server by the encrypted public key; The cloud server decrypts the gateway data sent by the gateway by storing an encrypted private key ; and if the cloud server successfully decrypts the data of the gateway, the cloud server obtains an authorization of the gateway.
承上所述,本發明智慧型物聯網認證及加密方法可透過應用程式,針對安裝的智慧型裝置提供簡易、快速、便利的認證功能,並可在不互相干擾的情況下,針對不同的智慧型裝置的用戶,根據各個物聯網裝置不同的功能設定不同的情境操作。再者,透過加密機制,可針對閘道器的認證進行加密,並與智慧型裝置的認證及加密機制形成雙重保護,以保護物聯網系統在使用上各個層面上的資訊安全。Based on the above, the smart Internet of Things authentication and encryption method of the present invention can provide simple, fast, and convenient authentication functions for installed smart devices through applications, and can target different smart devices without mutual interference. Users of small devices set different contextual operations according to the different functions of each IoT device. Furthermore, through the encryption mechanism, the authentication of the gateway can be encrypted, and it can form a double protection with the authentication and encryption mechanism of the smart device, so as to protect the information security of the Internet of Things system at all levels of use.
請參閱圖1,其係為本發明智慧型物聯網加密方法的步驟流程圖。智慧型物聯網加密方法包含下列步驟:於步驟S11中,加密認證檔案。於步驟S12中,由閘道器儲存及解密加密後之認證檔案,以產生一加密函數之一加密公鑰。於步驟S13中,藉由該加密公鑰加密閘道器傳送至雲端伺服器的閘道器資料。於步驟S14中,由雲端伺服器藉由儲存之加密私鑰解密閘道器傳送的閘道器資料。於步驟S15中,若當雲端伺服器成功解密閘道器資料,由雲端伺服器取得閘道器的授權。Please refer to FIG. 1 , which is a flow chart of the steps of the encryption method for the smart Internet of Things of the present invention. The encryption method for the smart internet of things includes the following steps: In step S11, the authentication file is encrypted. In step S12, the encrypted authentication file is stored and decrypted by the gateway to generate an encryption public key of an encryption function. In step S13, the gateway data transmitted from the gateway to the cloud server is encrypted by the encryption public key. In step S14, the gateway data transmitted by the gateway is decrypted by the cloud server through the stored encrypted private key. In step S15, if the cloud server successfully decrypts the data of the gateway, the cloud server obtains the authorization of the gateway.
於本發明之實施例中,認證檔案係藉由進階加密標準(AES; Advanced Encryption Standard)方法加密,並在閘道器生產出廠時即加密儲存到閘道器中。In the embodiment of the present invention, the authentication file is encrypted by the Advanced Encryption Standard (AES; Advanced Encryption Standard) method, and is encrypted and stored in the gateway when the gateway is manufactured.
閘道器透過韌體解密加密後的認證檔案,以產生加密函數的加密公鑰,而加密私鑰係對應於加密公鑰,並預先儲存在雲端伺服器中。於本發明之實施例中,加密函數係為非對稱加密演算法(asymmetric encryption algorithm; RSA)。The gateway decrypts the encrypted authentication file through the firmware to generate the encryption public key of the encryption function, and the encryption private key corresponds to the encryption public key and is pre-stored in the cloud server. In the embodiment of the present invention, the encryption function is an asymmetric encryption algorithm (RSA).
於本發明之實施例中,一個認證檔案係單獨對應於一個閘道器的編號,亦即,A認證檔案係對應於A閘道器,B認證檔案係對應於B閘道器。若將A認證檔案儲存到B閘道器中,則B閘道器並無法利用A認證檔案與雲端伺服器連線。In the embodiment of the present invention, one authentication file corresponds to the serial number of one gateway independently, that is, the A authentication file corresponds to the A gateway, and the B authentication file corresponds to the B gateway. If the A authentication file is stored in the B gateway, the B gateway cannot use the A authentication file to connect to the cloud server.
請參閱圖2,其係為本發明智慧型物聯網加密方法的加密及解密示意圖。於圖2的實施例中,係以非對稱金鑰加密函數針對閘道器傳送到雲端伺服器的資料進行加密。在非對稱加密方法中,加密與解密分別使用不同的金鑰,包含公鑰與私鑰,以公鑰加密而成的檔案,僅能使用私鑰才能解出加密後的檔案。於圖2實施例的加密過程中,閘道器的認證檔案利用進階加密標準加密後儲存於閘道器中,並由閘道器的韌體解密後成為加密函數的公鑰,並利用公鑰將加密後的閘道器資料傳送至雲端伺服器,由雲端伺服器利用私鑰配合解密函數解密,若成功解密後,代表閘道器傳送到雲端伺服器的認證檔案為合法的認證檔案,閘道器與雲端伺服器之間則可建立連線,亦即,雲端伺服器可取得閘道器的授權,使得智慧型裝置可透過雲端伺服器取得閘道器之控制權,進一步透過閘道器控制物聯網裝置。Please refer to FIG. 2 , which is a schematic diagram of encryption and decryption of the encryption method for the smart Internet of Things of the present invention. In the embodiment of FIG. 2 , the data transmitted from the gateway to the cloud server is encrypted with an asymmetric key encryption function. In the asymmetric encryption method, different keys are used for encryption and decryption, including the public key and the private key. The files encrypted with the public key can only be decrypted with the private key. In the encryption process of the embodiment shown in Fig. 2, the authentication file of the gateway is encrypted by the Advanced Encryption Standard and then stored in the gateway, and is decrypted by the firmware of the gateway to become the public key of the encryption function, and is used to key to send the encrypted gateway data to the cloud server, and the cloud server uses the private key to decrypt it with the decryption function. If it is successfully decrypted, it means that the authentication file sent by the gateway to the cloud server is a legal authentication file. A connection can be established between the gateway and the cloud server, that is, the cloud server can obtain the authorization of the gateway, so that the smart device can obtain the control right of the gateway through the cloud server, and further pass through the gateway controller to control IoT devices.
請參閱圖3,其係為本發明智慧型物聯網認證及加密系統另一實施例的方法流程圖。與上述實施例不同之處在於此實施例中,除了針對閘道器與雲端伺服器之間所傳輸的資料進行加密之外,更進一步針對在智慧型裝置與雲端伺服器之間所傳輸的資料進行加密,以達到雙重加密的效果。再者,於此實施例中,除了包含雙重加密的加密機制之外,同時更包含智慧型裝置的認證機制,形成認證及雙重加密的效果,進一步強化物聯網系統在網路層中的資料傳輸安全性。Please refer to FIG. 3 , which is a method flowchart of another embodiment of the smart Internet of Things authentication and encryption system of the present invention. The difference from the above embodiment is that in this embodiment, in addition to encrypting the data transmitted between the gateway and the cloud server, it further targets the data transmitted between the smart device and the cloud server Encrypt to achieve the effect of double encryption. Furthermore, in this embodiment, in addition to the encryption mechanism of double encryption, it also includes the authentication mechanism of the smart device, forming the effect of authentication and double encryption, and further strengthening the data transmission of the Internet of Things system in the network layer safety.
於此實施例中,智慧型物聯網認證及加密方法包含下列步驟:於步驟S21中,藉由第一加密法加密閘道器之認證檔案;於步驟S22中,由閘道器儲存及解密認證檔案;於步驟S23中,根據解密後之認證檔案產生第二加密法之第一加密公鑰;於步驟S24中,藉由第一加密公鑰加密閘道器傳送至雲端伺服器的閘道器資料;於步驟S25中,針對智慧型裝置傳送到雲端伺服器之智慧型裝置資料,以第三加密法加密;於步驟S26中,以第四加密法產生第二加密公鑰以及產生對該第二加密公鑰之第二加密私鑰;於步驟S27中,以第二加密公鑰加密傳送到雲端伺服器之智慧型裝置資料,並儲存第二加密私鑰到雲端伺服器;於步驟S28中,雲端伺服器藉由第一加密私鑰解密閘道器資料,以及藉由第二加密私鑰及第三加密法解密智慧型裝置資料;其中當雲端伺服器成功解密閘道器資料及智慧型裝置資料,且智慧型裝置通過雲端伺服器之認證,則智慧型裝置透過雲端伺服器取得閘道器之控制權;其中控制權包含閘道器對物聯網裝置之情境控制以及功能控制。In this embodiment, the smart IoT authentication and encryption method includes the following steps: In step S21, the authentication file of the gateway is encrypted by the first encryption method; in step S22, the authentication file is stored and decrypted by the gateway file; in step S23, generate the first encryption public key of the second encryption method according to the decrypted authentication file; in step S24, encrypt the gateway with the first encryption public key and send it to the gateway of the cloud server Data; in step S25, encrypt with the third encryption method for the smart device data transmitted from the smart device to the cloud server; in step S26, generate the second encryption public key and The second encryption private key of the second encryption public key; in step S27, encrypt the smart device data sent to the cloud server with the second encryption public key, and store the second encryption private key to the cloud server; in step S28 , the cloud server decrypts the gateway data with the first encryption private key, and decrypts the smart device data with the second encryption private key and the third encryption method; when the cloud server successfully decrypts the gateway data and the smart device Device data, and the smart device passes the authentication of the cloud server, then the smart device obtains the control right of the gateway through the cloud server; the control right includes the context control and function control of the gateway to the IoT device.
承上所述,由於智慧型裝置傳送到雲端伺服器的智慧型裝置資料已先後經過第三加密法及第二加密公鑰加密,因此於步驟S28中,雲端伺服器必須以第二加密私鑰及第三加密法的順序進行解密的動作,並在成功藉由第二加密私鑰解密智慧型裝置資料,以及成功藉由第三加密法解密智慧型裝置資料後,產生解密成功訊息,並加密及傳送解密成功訊息到智慧型裝置。雲端伺服器回傳解密後的訊息係依序藉由第三加密法及第四加密法加密該解密成功訊息。當智慧型裝置接收到加密後的該解密成功訊息,智慧型裝置依序藉由第四加密法及第三加密法解密該解密成功訊息,並於智慧型裝置成功解密該解密成功訊息後,針對解密後的訊息執行對應的動作,所謂執行對應的動作將於以下的說明書內容說明。當智慧型裝置無法藉由第四加密法或第三加密法解密該解密成功訊息時,產生解密失敗訊息,並於智慧型裝置上顯示錯誤訊息。As mentioned above, since the smart device data transmitted from the smart device to the cloud server has been encrypted by the third encryption method and the second encryption public key, in step S28, the cloud server must use the second encryption private key and the third encryption method to decrypt the action, and after successfully decrypting the smart device data through the second encryption private key, and successfully decrypting the smart device data through the third encryption method, a decryption success message is generated and encrypted And send a decryption success message to the smart device. The decrypted message returned by the cloud server is encrypted by the third encryption method and the fourth encryption method in sequence, and the decryption success message is encrypted. When the smart device receives the encrypted decryption success message, the smart device decrypts the decryption success message by the fourth encryption method and the third encryption method in sequence, and after the smart device successfully decrypts the decryption success message, The decrypted message executes the corresponding action, and the so-called execution of the corresponding action will be described in the following specification. When the smart device cannot decrypt the decryption success message by the fourth encryption method or the third encryption method, a decryption failure message is generated and an error message is displayed on the smart device.
於步驟S28中,當雲端伺服器無法藉由第二加密私鑰解密智慧型裝置資料時,或者無法藉由第三加密法解密該智慧型裝置資料後,產生解密失敗訊息,並加密及傳送該解密失敗訊息傳送到智慧型裝置。雲端伺服器依序藉由第三加密法及第四加密法加密該解密失敗訊息。當智慧型裝置接收到加密後的該解密失敗訊息,智慧型裝置依序藉由第四加密法及第三加密法解密該解密失敗訊息,並於智慧型裝置成功解密該解密失敗訊息後,針對解密後的訊息執行對應的動作,所謂執行對應的動作將於以下的說明書內容說明。當智慧型裝置無法藉由第四加密法或第三加密法解密該解密失敗訊息時,於智慧型裝置上顯示錯誤訊息。In step S28, when the cloud server cannot decrypt the smart device data with the second encrypted private key, or cannot decrypt the smart device data with the third encryption method, it generates a decryption failure message, encrypts and sends the A decryption failure message is sent to the smart device. The cloud server encrypts the decryption failure message by the third encryption method and the fourth encryption method in sequence. When the smart device receives the encrypted decryption failure message, the smart device decrypts the decryption failure message by the fourth encryption method and the third encryption method in sequence, and after the smart device successfully decrypts the decryption failure message, The decrypted message executes the corresponding action, and the so-called execution of the corresponding action will be described in the following specification. When the smart device cannot decrypt the decryption failure message by the fourth encryption method or the third encryption method, an error message is displayed on the smart device.
於本發明之實施例中,第一加密法及第三加密法係為進階加密標準方法,第二加密法及第四加密法係為非對稱加密演算法。In the embodiment of the present invention, the first encryption method and the third encryption method are advanced encryption standard methods, and the second encryption method and the fourth encryption method are asymmetric encryption algorithms.
請參閱圖4,其係為本發明智慧型物聯網認證及加密系統的方塊示意圖。智慧型物聯網認證及加密系統1包含一智慧型裝置11及一閘道器12。閘道器12具有辨識資訊及授權資訊,辨識資訊、授權資訊、網路組態設定值以及許可號碼可作為閘道器傳送到雲端伺服器C的閘道器資料,閘道器12藉由網際網路連接雲端伺服器C,並藉由無線通訊協定連接物聯網裝置D。智慧型裝置11安裝有一應用程式111(APP),且應用程式111具有版本資訊,而智慧型裝置11藉由網際網路連接雲端伺服器C,智慧型裝置11具有唯一識別碼,且智慧型裝置11運行應用程式111,並於取得閘道器12之辨識資訊後,透過網際網路傳送至雲端伺服器C比對辨識資訊、唯一識別碼、版本資訊,其中唯一識別碼、版本資訊以及智慧型裝置11取得閘道器12的辨識資料可作為智慧型裝置11傳送到雲端伺服器C的智慧型裝置資料。當智慧型裝置11通過雲端伺服器C之認證後,智慧型裝置11才能取得閘道器12之授權資訊,以及智慧型裝置11通過運行應用程式111,經由雲端伺服器C、閘道器12取得物聯網裝置D之控制權,其中控制權包含物聯網裝置D之情境控制以及功能控制。Please refer to FIG. 4 , which is a schematic block diagram of the smart IoT authentication and encryption system of the present invention. The smart IoT authentication and encryption system 1 includes a
於本發明之一實施例中,網際網路包含消息隊列遙測傳輸協定(Message Queuing Telemetry Transport; MQTT)。In an embodiment of the present invention, the Internet includes Message Queuing Telemetry Transport (MQTT).
於本發明之一實施例中,無線通訊協定包含家庭自動化無線通信協議(Z wave)、紫蜂(Zigbee)、WiFi、藍牙等。於本發明一實施例中,閘道器12透過家庭自動化無線通信協議(Z wave)連接物聯網裝置D,但並不限於此,而是可根據使用者需求選擇連線的無線通訊協定。In an embodiment of the present invention, the wireless communication protocol includes a home automation wireless communication protocol (Z wave), Zigbee, WiFi, Bluetooth, and the like. In an embodiment of the present invention, the
於本發明之一實施例中,辨識資訊係為閘道器12的二維條碼。In one embodiment of the present invention, the identification information is a two-dimensional barcode of the
於本發明之一實施例中,授權資訊係為閘道器12的許可號碼(license)。此外,於本發明之實施例中,智慧型物聯網認證及加密系統1可根據不同的許可號碼提供用戶不同版本的閘道器12支援連接物聯網裝置D的數量以及設定情境操控的數量。In one embodiment of the present invention, the authorization information is the license number (license) of the
於本發明之一實施例中,閘道器12包含一網路組態的設定值,以便於用戶進行網路連線的設定。預設值為動態主機設定協定(Dynamic Host Configuration Protocol; DHCP。此外,於本發明另一實施例中,網路組態的設定值亦支援固定IP位址,以便於用戶可以在自己所屬的網路環境中設定。In one embodiment of the present invention, the
智慧型裝置11運行的應用程式111透過智慧型裝置11掃描閘道器12的二維條碼後,取得閘道器12的序號。The
智慧型裝置11運行的應用程式11具有一登入頁面,並於智慧型裝置11啟動登入頁面時傳送應用程式111的版本資訊至雲端伺服器C,並藉由雲端伺服器C比對版本資訊,並於比對完成後回傳驗證訊息到智慧型裝置11上。當應用程式111的版本資訊與雲端伺服器C所儲存的版本資訊不符合時,雲端伺服器C會強制更新應用程式111,否則智慧型裝置11無法利用應用程式111連線至雲端伺服器C。The
登入頁面包含帳號註冊資訊,帳號註冊資訊係與智慧型裝置11的手機號碼透過網際網路傳送至雲端伺服器C申請。進一步而言,由於使用的閘道器12可能不只一台,因此當使用者欲註冊申請帳號時,係利用智慧型裝置11掃描閘道器12的二維條碼取得閘道器12的序號,並在使用者申請帳號後,與用戶資料一同透過網際網路傳送至雲端伺服器C,以認證該用戶是否具有使用該閘道器12的使用權。在雲端伺服器C確認該智慧型裝置11為合法裝置、且具有閘道器12的使用權後,由雲端伺服器C確認帳號註冊資訊以及智慧型裝置11的手機號碼,以進一步儲存帳號註冊資訊與閘道器12許可號碼的對應關係(Mapping)。The login page includes account registration information, and the account registration information is sent to the cloud server C for application through the Internet with the mobile phone number of the
承上所述,為確保智慧型裝置11在使用閘道器12控制權上的單一性,亦即在同一個時間、同一個帳號只能在一個智慧型裝置11上登入,以確保在物聯網裝置D在控制上的效能及安全性。進一步而言,當用戶使用智慧型裝置11安裝應用程式111時,應用程式111將要求智慧型裝置11提供唯一裝置識別碼(UDID; Unique Device Identifier),並與用戶資訊對映(Mapping)傳送到雲端伺服器C的資料庫(Database)儲存。當用戶通過智慧型裝置11登入應用程式111時,智慧型裝置11會通過應用程式111將唯一裝置識別碼傳送到雲端伺服器C進行比對,並將比對結果回傳到智慧型裝置11。當比對結果異常時,雲端伺服器C則傳送更新要求到智慧型裝置11,表示用戶可能已更換智慧型裝置11,或者是該智慧型裝置11有出現非法登入的狀況。據此,藉由此驗證程序驗證智慧型裝置11,以確保智慧型裝置11在使用上的單一性(single device)。Based on the above, in order to ensure the singleness of the
承上所述,本發明智慧型物聯網認證及加密系統1包含推播功能,用於通知各個智慧型裝置11申請加入物聯網系統的狀態。例如,當用戶使用智慧型裝置11啟動登入頁面時,將產生一標記(Token)資訊,標記資訊係與用戶註冊資訊對應傳送至雲端伺服器C,並在用戶完成註冊或者拒絕註冊等程序時,由雲端伺服器C針對標記資訊發出通知訊號至用戶的智慧型裝置11,以完成對應的驗證程序。Based on the above, the smart IoT authentication and encryption system 1 of the present invention includes a push function for notifying each
於本發明之一實施例中,可進一步針對加入物聯網系統的智慧型裝置11進行身份的設定,並根據不同的身份賦予不同的權限及功能。進一步而言,雲端伺服器C根據閘道器12與智慧型裝置11的配對資料判斷智慧型裝置11是否為主控裝置(Administrator),並於智慧型裝置11為主控裝置時,賦予該智慧型裝置11具有新增、移除、命名及編輯物聯網裝置D的功能。進一步而言,當智慧型裝置11為主控裝置時,智慧型裝置11發送裝置新增或移除的要求至閘道器12,並於閘道器12收到新增或移除的要求後,由閘道器12啟動與物聯網裝置D之間的配對模式,在配對模式下完成新增或移除物聯網裝置D的動作。針對命名及編輯物聯網裝置D的功能,係由主控裝置的智慧型裝置11傳送命名或編輯的要求至雲端伺服器C而完成命名及編輯物聯網裝置D的動作。In one embodiment of the present invention, identity setting can be further performed on the
請參閱圖5,其係為本發明智慧型物聯網認證及加密系統之身份識別示意圖。承上所述,同一個智慧型裝置11可在不同的閘道器12具有不同的身份。例如,A1智慧型裝置11在B1閘道器12中為主控裝置的身份,在B2閘道器12中為使用者身份,A2智慧型裝置11在B1閘道器12中為使用者身份,在B2閘道器12中為主控裝置的身份。此外,若智慧型裝置11在加入閘道器12時,並無其它的智慧型裝置11加入配對,亦即該智慧型裝置11為第1個加入配對,則該智慧型裝置11自動被設定為該閘道器12的主控裝置。再者,主控裝置的身份與使用者身份亦可進行切換。例如,當作為使用者身份的智慧型裝置11獲得閘道器12的存取密碼後,則可與作為主控裝置的智慧型裝置11進行身份的切換。Please refer to FIG. 5 , which is a schematic diagram of identity recognition of the smart Internet of Things authentication and encryption system of the present invention. Based on the above, the same
承上所述,智慧型物聯網認證及加密系統1可根據物聯網裝置D的功能設定不同的使用情境。例如,當物聯網裝置D為一個可調節光源亮度的檯燈時,智慧型裝置11可根據使用者的作息時間調整控制其發亮的強度,設定為一使用情境,並將使用情境以及對應設定的智慧型裝置儲存到雲端伺服器C中。Based on the above, the smart IoT authentication and encryption system 1 can set different usage scenarios according to the functions of the IoT device D. For example, when the IoT device D is a desk lamp that can adjust the brightness of the light source, the
再者,智慧型物聯網認證及加密系統1可進一步結合語音解析及辨識介面運用各種物聯網裝置D的情境控制。例如,目前有三種情境儲存於雲端伺服器C中,當用戶欲啟用第一種物聯網裝置D的情境操控時,可透過語音解析及辨識介面啟用第一種情境操控,其餘各種物聯網裝置D的情境操控亦可根據此方式啟用。Furthermore, the smart IoT authentication and encryption system 1 can further combine speech analysis and recognition interfaces to use contextual control of various IoT devices D. For example, there are currently three scenarios stored in the cloud server C. When the user wants to enable the context control of the first type of IoT device D, the first type of context control can be enabled through the voice analysis and recognition interface, and the rest of the IoT devices D Contextual manipulation of can also be enabled in this way.
承上所述,智慧型裝置成功解密該解密失敗訊息或該解密成功訊息後,針對所謂解密後的訊息執行對應的動作例如上述內容中,智慧型裝置11啟動登入頁面時傳送應用程式111的版本資訊至雲端伺服器C時,則智慧型裝置11會針對應用程式111的版本資訊進行加密的動作,並藉由雲端伺服器C進行解密,並於解密成功後比對版本資訊,並在比對完成後,將驗證訊息進行加密後回傳到智慧型裝置11上,並由智慧型裝置11進行解密。有關加密及解密的係動作如上所述,於此不再贅述。此外,在此僅以應用程式111的版本資訊以及驗證訊息作為加密及解密作為舉例,事實上,上述各個實施例中,智慧型裝置11與雲端伺服器C之間的任何資料傳輸,以及閘道器12及雲端伺服器C之間的任何資料傳輸皆可透過上述的加密及解密過程進行加密及解密,於此不再贅述。As mentioned above, after the smart device successfully decrypts the decryption failure message or the decryption success message, it performs corresponding actions on the so-called decrypted message. For example, in the above content, the
綜上所述,本發明智慧型物聯網認證及加密方法可透過應用程式,針對安裝的智慧型裝置提供簡易、快速、便利的認證功能,並可在不互相干擾的情況下,針對不同的智慧型裝置的用戶,根據各個物聯網裝置不同的功能設定不同的情境操作。再者,透過加密機制,可針對閘道器的認證進行加密,並與智慧型裝置的認證及加密機制形成雙重保護,以保護物聯網系統在使用上各個層面上的資訊安全。To sum up, the smart Internet of Things authentication and encryption method of the present invention can provide simple, fast and convenient authentication functions for installed smart devices through the application program, and can target different smart devices without interfering with each other. Users of small devices set different contextual operations according to the different functions of each IoT device. Furthermore, through the encryption mechanism, the authentication of the gateway can be encrypted, and it can form a double protection with the authentication and encryption mechanism of the smart device, so as to protect the information security of the Internet of Things system at all levels of use.
S11~S15:步驟 S21~S28:步驟 1:智慧型物聯網認證及加密系統 11:智慧型裝置 111:應用程式 12:閘道器 C:雲端伺服器 D:物聯網裝置 A1:智慧型裝置 A2:智慧型裝置 B1:閘道器 B2:閘道器 S11~S15: Steps S21~S28: Steps 1: Smart IoT authentication and encryption system 11:Smart device 111: Apps 12: Gateway C: Cloud server D: IoT device A1: Smart device A2: Smart Device B1: Gateway B2: Gateway
圖1係為本發明智慧型物聯網加密方法的步驟流程圖; 圖2係為本發明智慧型物聯網加密方法的加密及解密示意圖; 圖3係為本發明智慧型物聯網認證及加密系統另一實施例的方法流程圖; 圖4係為本發明智慧型物聯網認證及加密系統的方塊示意圖; 圖5係為本發明智慧型物聯網認證及加密系統之身份識別示意圖;以及 圖6係為物聯網系統的架構示意圖。 Fig. 1 is a flow chart of the steps of the encryption method for the smart internet of things of the present invention; Fig. 2 is a schematic diagram of encryption and decryption of the smart Internet of Things encryption method of the present invention; Fig. 3 is a method flowchart of another embodiment of the intelligent Internet of Things authentication and encryption system of the present invention; Fig. 4 is a schematic block diagram of the intelligent Internet of Things authentication and encryption system of the present invention; Fig. 5 is a schematic diagram of the identification of the smart Internet of Things authentication and encryption system of the present invention; and FIG. 6 is a schematic diagram of the architecture of the Internet of Things system.
S11~S15:步驟 S11~S15: Steps
Claims (22)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW110122441A TW202301831A (en) | 2021-06-18 | 2021-06-18 | Authentication and encryption method for intelligent Internet of Things can provide simple, fast, and convenient authentication functions for the smart device that is installed with the application program, and can encrypt the authentication of the gateway to form a double protection |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW110122441A TW202301831A (en) | 2021-06-18 | 2021-06-18 | Authentication and encryption method for intelligent Internet of Things can provide simple, fast, and convenient authentication functions for the smart device that is installed with the application program, and can encrypt the authentication of the gateway to form a double protection |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW202301831A true TW202301831A (en) | 2023-01-01 |
Family
ID=86658225
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW110122441A TW202301831A (en) | 2021-06-18 | 2021-06-18 | Authentication and encryption method for intelligent Internet of Things can provide simple, fast, and convenient authentication functions for the smart device that is installed with the application program, and can encrypt the authentication of the gateway to form a double protection |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TW202301831A (en) |
-
2021
- 2021-06-18 TW TW110122441A patent/TW202301831A/en unknown
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10951630B2 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
| US10985925B1 (en) | Systems and methods for providing authentication to a plurality of devices | |
| US20190349345A1 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
| US9307405B2 (en) | Method for assigning an agent device from a first device registry to a second device registry | |
| US7185199B2 (en) | Apparatus and methods for providing secured communication | |
| AU2011332180B2 (en) | Secure software licensing and provisioning using hardware based security engine | |
| JP6009083B2 (en) | Method for providing secure app ecosystem with key and data exchange according to corporate information management policy, non-transitory computer readable medium, and mobile computing device | |
| US10579830B1 (en) | Just-in-time and secure activation of software | |
| WO2019129037A1 (en) | Equipment authentication method, over-the-air card writing method, and equipment authentication device | |
| US11516194B2 (en) | Apparatus and method for in-vehicle network communication | |
| KR20160062184A (en) | Remote access control of storage devices | |
| US11949779B2 (en) | Method and apparatus for registering shared key | |
| US11609979B2 (en) | Secure element for processing and authenticating digital key and operation method therefor | |
| KR20160097323A (en) | Near field communication authentication mechanism | |
| KR101966379B1 (en) | Authentication apparatus based on biometric information, control server and application server, and method for data management based on biometric information thereof | |
| WO2015056008A1 (en) | Method for assigning an agent device from a first device registry to a second device registry | |
| WO2021190197A1 (en) | Method and apparatus for authenticating biometric payment device, computer device and storage medium | |
| CN111917536A (en) | Identity authentication key generation method, identity authentication method, device and system | |
| WO2017166362A1 (en) | Esim number writing method, security system, esim number server, and terminal | |
| US20220400015A1 (en) | Method and device for performing access control by using authentication certificate based on authority information | |
| US20110154436A1 (en) | Provider Management Methods and Systems for a Portable Device Running Android Platform | |
| WO2024124804A1 (en) | Software function activation method, apparatus and device, and storage medium | |
| CN106790036A (en) | An information tamper-proof method, device, server and terminal | |
| CN113766496A (en) | Cross-platform binding method and system of intelligent equipment and related equipment | |
| US20190349348A1 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods |