Lightweight authentication method based on equipment identity label and gateway
A lightweight authentication and device identity technology, applied in the field of IoT, which can solve problems such as insufficient security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0080] Example one:
[0081] Such as figure 1 As shown, a lightweight authentication method based on device identification includes: a registration method and an authentication method;
[0082] Registration methods, including:
[0083] Step S101: In response to the registration application request, obtain the identity information of the terminal sending the registration application request;
[0084] Step S102: Generate a terminal ID public key based on the identity information;
[0085] Step S103: Obtain the encrypted private key and the signed public key of the terminal based on the terminal ID public key;
[0086] Step S104: Obtain the session key negotiated with the terminal;
[0087] Step S105: Encrypt the encryption private key and the signing public key based on the session key to obtain first encrypted information;
[0088] Step S106: Send the first encrypted information to the terminal, thereby completing the registration of the terminal at the gateway.
[0089] In a specific applic...
Example Embodiment
[0126] Embodiment two:
[0127] Such as Figure 4 As shown, a lightweight authentication method based on device identification, the medium authentication method includes:
[0128] Step S401: In response to the authentication request, obtain the identity information of the terminal sending the authentication request;
[0129] Step S402: Generate a terminal ID based on the identity information;
[0130] Step S403: Confirm whether the terminal is successfully registered based on the terminal ID;
[0131] Step S404: Receive the authentication request message of the successfully registered terminal, and generate a first communication key;
[0132] Step S405: Generate an authentication request reply message based on the authentication request message and the first communication key;
[0133] Step S406: Receive an authentication message obtained based on the authentication request reply message, the authentication message is obtained based on the authentication reply message, and the authenticat...
Example Embodiment
[0169] Embodiment three:
[0170] The embodiment of the present invention provides a gateway including a memory and a processor,
[0171] Memory, which stores executable instructions;
[0172] The processor runs the executable instructions in the memory to implement a lightweight authentication method based on the device identity.
[0173] The memory is used to store non-transitory computer readable instructions. Specifically, the memory may include one or more computer program products, and the computer program product may include various forms of computer-readable storage media, such as volatile memory and / or nonvolatile memory. The volatile memory may include random access memory (RAM) and / or cache memory (cache), for example. The non-volatile memory may include read-only memory (ROM), hard disk, flash memory, etc., for example.
[0174] The processor may be a central processing unit (CPU) or other form of processing unit with data processing capability and / or instruction executio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap