A low-power consumption authentication method and auxiliary device for smart device access to the Internet of Things
A technology for power Internet of things and smart devices, applied in encryption devices with shift registers/memory, security devices, secure communication devices, etc., can solve the problems of large storage space, many resources, endangering power system security, etc. The effect of storage resources, high security and saving storage space
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0100] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0101] It should be noted that, in the present invention, the term "one-time" means that every time an access request is involved, a new P g , P d , V s,d , C s,d and other data information, and the values are not the same. If the SGW or STD receives the same value as the previous time within the effective time Δt, it will consider that the received information is retransmitted by a malicious terminal and may be attacked by a man-in-the-middle. Therefore,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


