Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Burning verification method and device of Internet of Things device and identity authentication method and device of Internet of Things device

An identity authentication device and a technology of Internet of Things equipment, which is applied in the field of burning and verification of Internet of Things equipment, can solve the problems of inability to guarantee the safe operation of the server platform side of the Internet of Things service security, and is easy to be maliciously stolen, so as to improve security , to ensure the effect of safe operation

Active Publication Date: 2018-06-12
ALIBABA (CHINA) CO LTD
View PDF11 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When burning IoT devices, the identity and device private key between IoT devices may be related and directly burned in the storage space of IoT devices, so it is easy to be maliciously stolen
Furthermore, in the subsequent communication between IoT devices, other devices may pretend to be IoT devices to request services from the IoT service platform, which cannot guarantee the security of IoT services and the safe operation of the server platform.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Burning verification method and device of Internet of Things device and identity authentication method and device of Internet of Things device
  • Burning verification method and device of Internet of Things device and identity authentication method and device of Internet of Things device
  • Burning verification method and device of Internet of Things device and identity authentication method and device of Internet of Things device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0079] Definition of Terms:

[0080] Internet of Things device: refers to a device that performs information interaction in the Internet of Things (Internet of Things, IoT), for example, a smart home appliance and the like.

[0081] The identity of the IoT device can uniquely identify the IoT device in the IoT.

[0082] Trusted Execution Environment (TEE, Trusted Execution Environment) is a secure area on the main processor of the IoT device, which can guarantee the security, confi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a burning verification method and device of an Internet of Things device, and an identity authentication method and device of the Internet of Things device. The burning verification method comprises the steps of receiving a burning request sent by a burning production line by a burning verification device, wherein the burning request is used for requesting the burning verification device to distribute an identity identifier and a device key to a to-be-burnt Internet of Things device, the device key comprises a device private key and a device public key; verifying whetherthe burning request is lawful by the burning verification device; if so, distributing the identity identifier and the device key to the to-be-burnt Internet of Things device; sending the identity identifier and the device key to the burning production line by the burning verification device, so that the burning production line can burn the identity identifier and the device key to the corresponding Internet of Things. By adoption of the embodiment, the safety of identity authentication of the Internet of Things device can be improved, and the cost of a platform side can be reduced.

Description

technical field [0001] The present application relates to the technical field of Internet of Things data processing, and in particular to a method and device for burning and verifying Internet of Things devices, an identity authentication method and device for Internet of Things devices, and an identity authentication system. Background technique [0002] The Internet of Things (IoT) is the Internet where things are connected. Therefore, the core and foundation of the Internet of Things is the Internet, which is an extended and expanded network based on the Internet, and the client side of the Internet of Things extends and expands to any item for information exchange and communication, that is, the Internet of Things Things are closely related. [0003] Users of the Internet of Things use IoT devices to interact with information. In the process of information exchange between any IoT device, each IoT device needs to use an identity to uniquely represent its own identity. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/06H04L63/083H04L63/0876H04L67/12H04W12/04H04W4/70G06F21/44H04W12/35H04W12/71H04W12/0431H04W12/041H04W12/122H04W12/069G06F7/588H04L9/0897H04L63/0442H04L63/0884H04L9/40H04L65/40
Inventor 方强刘大鹏
Owner ALIBABA (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products