Internet of Things terminal security authentication method based on security chip
An Internet of Things terminal and security chip technology, applied in the field of Internet of Things, can solve problems such as potential safety hazards, achieve high security levels, strong defense capabilities, and reduce the effect of system coupling
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0035] figure 1 It is a flowchart of an IoT terminal security authentication method based on a security chip according to an embodiment of the present application, in which the main flow of the IoT terminal security authentication method is shown.
[0036] This embodiment provides a security authentication method for an IoT terminal based on a security chip, such as figure 1 As shown, it includes:
[0037] 101: A network connection is formed between the IoT terminal and the cloud server;
[0038] 102: The security chip set in the Internet of Things terminal constructs a registration request and sends it to the cloud server. The cloud server verifies the legitimacy of the Internet of Things terminal according to the registration request. After the verification is successful, the Internet of Things terminal is generated corresponding to this session. The temporary terminal ID and temporary terminal secret key are saved, and then the server-side final session secret key is generated in ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap