A cryptographic technology-based identification method for the Internet of Things
A technology of IoT identification and cryptography, applied in key distribution, can solve problems affecting the development and application of the IoT, and achieve the effect of achieving reliability and non-tampering, achieving confidentiality, and ensuring uniqueness.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0021] figure 1 It is a flow chart of a cryptographic technology-based identification method for the Internet of Things of the present invention, such as figure 1 As shown, the IoT identification methods based on cryptography include:
[0022] Relevant parties include service parties and user parties. The service party is responsible for the operation of the identification system, and provides services such as user party registration, item identification registration, item status collection, and item information query for the user side.
[0023] (1) The start-up steps of the identification system include: the service party selects the appropriate asymmetric cryptography technology and parameters, generates its own pu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com