Centerless Internet of Things safety authentication method based on asymmetric encryption
An asymmetric encryption and security authentication technology, applied in digital data authentication, computer security devices, instruments, etc., can solve problems such as platform personal security information leakage, and achieve the effects of strong scalability, strong system robustness, and low maintenance costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] see Figure 1 to Figure 2 , to realize the basic structure of a non-central Internet of Things security authentication method based on asymmetric encryption of the present invention includes a platform system A and a terminal system B; the platform system A consists of an asymmetric encryption algorithm module 10, a secure storage module 13 and a controller 11 and a communication module 12; the terminal system B is composed of a terminal asymmetric encryption algorithm module 20, a secure memory 21, a timer 22, a control module 23 and a communicator 24;
[0034] Implementation steps of the present invention include:
[0035] 1) Platform system A and terminal system B each generate authentication elements
[0036] The platform public key and the platform private key are generated by the asymmetric encryption algorithm module 10 of the platform system A, and the platform private key is stored in the confidential storage module 13, and the platform public key is sent to t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

