Key generation method, system and equipment in Internet of things
A technology of key generation and Internet of Things, which is applied in the field of network security, can solve problems such as cumbersome implementation process, and achieve the effect of simplifying the implementation process and avoiding the operation of key distribution and management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] In order to solve the problem of how to avoid key distribution and management under the premise of realizing data encryption in the Internet of Things, an embodiment of the present invention provides a method for generating a key in the Internet of Things. In this method, the terminal is based on the generated first random number , The identification information and hash algorithm of the communication smart card in the terminal to obtain the basic key, and the server side obtains the basic key according to the first random number sent by the terminal, the identification information of the communication smart card in the terminal and the hash algorithm.
[0037] See figure 1 , The method for generating a key in the Internet of Things provided by an embodiment of the present invention includes the following steps:
[0038] Step 10: The terminal generates a first random number, obtains the identification information of the communication smart card in the terminal, executes a has...
PUM

Abstract
Description
Claims
Application Information

- Generate Ideas
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com