A realization method of home trust networking based on smart home equipment security pendant
A technology of smart home equipment and security pendants, applied in the direction of public keys, electrical components, network interconnection, etc. of secure communication, can solve the problems of cumbersome user experience, user experience, etc. Confidentiality effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] In order to make the purpose, advantages and technical solutions of the present invention clearer, through the following specific implementation, combined with the attached figure 1 , to further describe the present invention in detail.
[0016] for figure 1 The overall framework of the scheme is described as a whole. In a nutshell, firstly, considering that users can conveniently complete the self-trusted networking of home devices and home gateways, the home device security pendant must obtain a public-private key pair [K D(pub) , K D(pri) ], hardware PIN code ((full name Personal Identification Number, referred to as PIN, is the identification password) and unified key K, and its public key K D(pub) Upload to the home data service center in the cloud, so as to complete the factory initialization of the home equipment security pendant; second, the user's smart home gateway and the home equipment integrated with the initialized home equipment security pendant, with t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


