Method for changing intelligent device into credible intelligent device

A smart device and hardware information technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as low security and unsatisfactory requirements, and achieve information and property security, cost savings, and simple operation Effect

Inactive Publication Date: 2015-07-08
上海金融云服务集团安全技术有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the login mode of existing smart devices uses account numbers and passwords, and security tools such as certificates and U-shields are used in the middle to ensure the security of communication. The security is low and cannot meet the current needs of people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] When the user uses the Android version of the smart device, the operation steps are as follows:

[0055] (1) Download the APP on the designated website;

[0056] (2) Install APP;

[0057] (3) The smart device will generate a unique identification code for installation;

[0058] (4) The APP will randomly read the motherboard, CPU, memory and other information of the smart device;

[0059] (5) Use the installation identification code to encrypt the hardware information to form a TRC; if the hardware information cannot be read, use the installation identification code to encrypt the installation time to form a TRC;

[0060] (6) TRC is saved in the APP configuration file or Keystore;

[0061] (7) Read the hardware information every time you start the APP;

[0062] (8) The user scans the registered QR code and enters the password to log in to the APP;

[0063] (9) The smart device reads the verification QR code;

[0064] (10) Use the installation identification code to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for changing an intelligent device into a credible intelligent device. The safety problem of an existing intelligent device is solved. The method comprises the following steps that firstly, installation time or hardware information is encrypted through a recognition code to form a TRC and stored in an APP; secondly, the hardware information or an installation recognition code is read when the APP is started; thirdly, a user scans a QR code and inputs a password logging into the APP; fourthly, the intelligent device reads and verifies the QR code, the installation recognition code is used for unlocking the TRC, and log-on information is encrypted and submitted to an identity authentication system; sixthly, the identity authentication system is encrypted, a secret key is formed and prestored, and the secret key is sent to the intelligent device; seventhly, the intelligent device sends a registration confirmation request to the identity authentication system; eighthly, the identity authentication system receives and unscrambles the registration confirmation information, the registration information is unloaded to an official registration table, and then registration is successful. The intelligent device used in daily life can become a credible device, identity authentication is carried out, and cost is saved.

Description

technical field [0001] The invention relates to a method for a smart device to become a trusted smart device. Background technique [0002] Since the birth of various smart devices, they have won wide acclaim for their rich functions, friendly cross-section, simple operation, and convenient portability, and have quickly occupied the market and achieved leapfrog development. With the advancement of technology, new products are constantly emerging, and the cost performance is increasing day by day, which has promoted the mass popularization of various smart mobile terminals, and has gradually had a greater impact on people's life and work methods. [0003] However, the login mode of existing smart devices is to use account numbers and passwords, and security tools such as certificates and USB shields are used in the middle to ensure the security of communication. The security is low and cannot meet the current needs of people. Contents of the invention [0004] The inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 胥寅张采荣
Owner 上海金融云服务集团安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products