Internet of things equipment identity authentication method and system based on PUF and CPK algorithms, and storage medium
An IoT device and identity authentication technology, applied in the field of IoT device identity authentication, can solve the problems of insufficient identity authentication security and limited resources, and achieve the effect of improving security and reducing resource consumption.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0055]The technical scheme of the present invention will be further explained below in conjunction with the drawings:
[0056]The present invention proposes an identity authentication method for Internet of Things equipment based on PUF and CPK algorithms, such asfigure 1 As shown, it specifically includes the following steps:
[0057]Step 1. Obtain the challenge and response of the IoT device based on PUF, and use the challenge, response of the IoT device and the pre-generated device identification ID to construct a device fingerprint library.
[0058]Before performing the identity authentication of the Internet of Things device, it is necessary to register the device first. The device registration includes generating a device identification ID and obtaining a challenge-response pair of the Internet of Things device.
[0059]The device identification ID is generated based on the multiple features of the device. The specific generation method includes the following steps:
[0060]Obtain basic attr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap