Method, device and system for device identity authentication
A device identity and device technology, applied in user identity/authority verification, security devices, transmission systems, etc., can solve the problem that device identity is easy to be forged and tampered with
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0134] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0135] The system on which the invention is based can be as figure 1 As shown in , it mainly includes certified devices and certified devices. The authenticated device can be any physical device, including but not limited to: mobile phones, computers, network devices, smart home devices, wearable devices, smart medical devices, etc. Wherein the computer may include but not limited to PC, notebook computer, tablet computer and so on. Network devices may include, but are not limited to, routers, switches, network cards, hubs, and so on. Smart home devices may include, but are not limited to, smart TVs, smart air conditioners, smart humidifiers, smart water heaters, smart kitchen appliances, smart doors and windows, and smart air purifiers. Wearab...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



