Equipment authentication method, card equipment and equipment authentication system
A device authentication and device technology, applied in the field of information security, can solve the problem of low security of data interaction and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0046] The invention proposes a device authentication method.
[0047] Please refer to figure 1 , in an embodiment of the present invention, the device authentication method includes the following steps:
[0048] Step S10, when the card device establishes a communication connection with the main device, trigger the card device to generate first random data;
[0049] Specifically, the card device establishes a communication connection with the master device, and the establishment of the communication connection between the card device and the master device triggers the card device to generate first random data; wherein, the first random data is the 64-bit a random data.
[0050] Step S20, the card device transmits the first random data and the card device identification code to the master device, and triggers the ma...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



