Cloud security authentication method and authentication device

An authentication device and security authentication technology, applied in the field of cloud security authentication, can solve the problems of non-existence of authentication process between the device and the cloud network, and the existence of security risks, so as to achieve low authentication costs, increase hardware costs, and improve security.

Inactive Publication Date: 2018-06-08
HANGZHOU BROADLINK ELECTRONICS TECH
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, before the networked communication between smart devices and cloud servers, there is generally no two-party authentication process between devices and cloud networks, which poses security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security authentication method and authentication device
  • Cloud security authentication method and authentication device
  • Cloud security authentication method and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Below, the present invention will be further described in conjunction with the accompanying drawings and specific implementation methods. It should be noted that, under the premise of not conflicting, the various embodiments described below or the technical features can be combined arbitrarily to form new embodiments. .

[0030] A cloud security authentication device such as figure 1 As shown, it includes an electronic device that stores a device private key and a cloud public key; wherein, the device private key is used to encrypt the device signature to obtain a device authentication data packet; the cloud public key is used to decrypt the cloud authentication data; it should be understood that, During device manufacturing, you can choose to burn the device private key and cloud public key into the device storage module, or you can use the data update method to rewrite when the device is updated. The cloud stores a cloud private key and a device public key, wherein t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud security authentication method, comprising a cloud authentication step that an authentication device carries out signature through utilization of a device private key stored in the authentication device, thereby obtaining a device authentication data packet, the authentication device sends the device authentication data packet to the cloud, and a cloud receives the device authentication data packet and then carries out signature authentication on the device authentication data packet through utilization of a device public key stored in the cloud; and an authentication device authentication step that a cloud device carries out signature through unitization of a cloud private key stored in the cloud, thereby obtaining a cloud authentication data packet, the cloud sends the cloud authentication data packet to the authentication device, and the authentication device receives the cloud authentication data packet and then carries out signature authentication through utilization of a cloud public key stored in the authentication device. The invention also relates to the cloud security authentication device. According to the method and the device, the deviceauthentication security is improved, moreover, the authentication cost is low, and the hardware cost does not need to be increased.

Description

technical field [0001] The invention relates to a security authentication method, in particular to a cloud security authentication method. Background technique [0002] Today, smart devices such as smart TVs in meeting rooms, smart heating and air conditioning systems, internet-connected lights, manufacturing processes controlled by smart devices, smart watches and fitness equipment can be said to be almost everywhere. And these are just a very small part of the current enterprise Internet of Things (IoT). On a larger scale, almost any physical object can be intelligently connected to the network. [0003] With the development of the Internet of Things and Industry 4.0, security issues have become a key factor hindering the promotion of industry applications. How to solve the security risks brought by the massive Internet of Things devices connected to the Internet, security companies have also proposed various targeted solutions. , To a certain extent, it solves the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L29/08
CPCH04L9/0869H04L9/3247H04L63/08H04L63/083H04L63/0869H04L67/1097
Inventor 李志为姚博刘宗孺
Owner HANGZHOU BROADLINK ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products