Security verification method and device for household edge computing system
A technology of system security and verification method, applied in the field of home edge computing system security verification method and device, capable of solving big data security issues and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0053] Such as figure 1 , figure 2 As shown, a method for verifying the security of an edge computing system for household use is to build a verification cloud on the network cloud, and the verification cloud communicates with a communication node device and a personal smart terminal through an edge gateway. The verification cloud stores the identity code of the subordinate device of the home appliance, the cloud verification signature code, and the communication node device's identity identification code, cloud verification signature code and local verification signature code, and realizes the verification of the edge node, communication node device, and home appliance through the verification cloud. Security verification when the slave device establishes a communication connection.
[0054] In the present invention, the verification and verificatio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com