Internet of things security authentication chip and access control method based on chip
A security authentication and Internet of Things technology, applied in the field of Internet of Things security authentication chips and access control, can solve the problems of insufficient economy and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] see figure 1 , an IoT security authentication chip involved in the present invention includes: a central processing unit, an algorithm module, a storage module, an input / output module, a random number generator and an initialization module, and the chip is provided with an external trigger switch for triggering The work of the initialization module in the chip.
[0027] Among them, the central processing unit is responsible for performing calculations according to the data provided by the algorithm module, storage module, input / output module, random number generator, and initialization module, and finally sends the calculation results to devices or circuits other than the chip through the input / output module. Output; algorithm module, including the symmetric or asymmetric encryption and decryption algorithm program solidified in the module in the form of hardware; the storage module is used to store data related to chip authentication; the input / output module is respons...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


