Identity authentication method and device of equipment and computer storage medium

A technology for identity authentication and device identity information, applied in the fields of computer storage media, identity authentication methods and devices for devices, and can solve problems such as insecure identity authentication, prevent data leakage, improve efficiency and security, and improve efficiency and security. The effect of reliability

Active Publication Date: 2019-03-08
GCI SCI & TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a device identity authentication method and device, and a computer storage medium. Identity authentication is performed through multiple simple hash calculations, which can effectively solve the problem of insecurity in the process of device identity authentication in the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device of equipment and computer storage medium
  • Identity authentication method and device of equipment and computer storage medium
  • Identity authentication method and device of equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0041] See figure 1 , Is a schematic flowchart of a device identity authentication method provided by an embodiment of the present invention, including:

[0042] S11. In response to the query instruction sent by the management platform, the device calculates a first hash value according to the device identity information and the received random number, and sends the first hash value to the management platform; wherein, the The random numb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and device of equipment and a computer storage medium. The method comprises that in response to an inquiry instruction sent by a management platform, the device calculates a first hash value according to the device identity information and a received random number, and sends the first hash value to the management platform; the device sendsthe first hash value to the management platform according to the first hash value; the random number is generated by the management platform after the device joins the network; in response to a queryresponse instruction sent by the device, the management platform calculates the received first hash value, obtains a second hash value and sends it to the server; the server performs legitimacy authentication on the device according to the first hash value, obtains authentication information corresponding to the device and returns the authentication information to the management platform, so thatthe management platform calculates a third hash value according to the authentication information; according to the received third hash value, the device authenticates the validity of the management platform, which can effectively improve the efficiency and security of identity authentication, and effectively improve the efficiency and security and reliability of equipment information transmission.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a device identity authentication method and device, and a computer storage medium. Background technique [0002] With the rapid development of electronic communication technology, smart terminal devices including smart phones are more and more widely used, but these smart terminal devices bring great convenience to people, but also bring security of smart terminal devices Sexual issues, such as illegal reading, location tracking, illegal eavesdropping, camouflage, and replay, which in turn cause violations of the privacy of smart terminal device users. How to combine smart devices with user identity authentication to improve the security of user identity authentication is an important research direction of user identity authentication. Contents of the invention [0003] Embodiments of the present invention provide a device identity authentication method and devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 林凡成杰张秋镇张振华杨峰李盛阳
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products