Security verification method and device for household edge computing system

A technology of system security and verification method, applied in the field of home edge computing system security verification method and device, capable of solving big data security issues and other issues

Active Publication Date: 2021-05-18
苏州蓝赫智能科技有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a security verification method and device for a household edge computing system to solve the security problems of household big data generated by the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method and device for household edge computing system
  • Security verification method and device for household edge computing system
  • Security verification method and device for household edge computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0053] Such as figure 1 , figure 2 As shown, a method for verifying the security of an edge computing system for household use is to build a verification cloud on the network cloud, and the verification cloud communicates with a communication node device and a personal smart terminal through an edge gateway. The verification cloud stores the identity code of the subordinate device of the home appliance, the cloud verification signature code, and the communication node device's identity identification code, cloud verification signature code and local verification signature code, and realizes the verification of the edge node, communication node device, and home appliance through the verification cloud. Security verification when the slave device establishes a communication connection.

[0054] In the present invention, the verification and verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security verification method for a household edge computing system, and the method comprises the steps: constructing a verification cloud which stores an identity identification code and a cloud verification signature code of a household appliance slave device, and an identity identification code, a cloud verification signature code and a local verification signature code of a communication node device; and when the edge node, the communication node equipment and the household appliance slave equipment are in communication connection, establishing communication connection between the edge node and the communication node equipment as well as between the communication node equipment and the household appliance slave equipment through the cloud verification signature code and the local verification signature code, and controlling and releasing data verification. According to the invention, two-stage security protection can be realized, so that all networked household appliances have self-protection and system-level protection capabilities, and the security of household big data generated by the Internet of Things is improved.

Description

technical field [0001] The present invention relates to the field of home Internet of Things communication methods, in particular to a security verification method and device for a home edge computing system. Background technique [0002] The family data generated by the Internet of Things mainly empowers property government services and resident service providers, such as home security services, single-living security services, and community government affairs, and more commercial value includes resident services such as education services, health services, and social consumption. The family big data generated by the Internet of Things is a new driving force for the smart home industry. The family includes home time, sleep time, entertainment time, beauty makeup time, reading time, indoor temperature, indoor humidity, meal times, children's work and rest time, exercise, area Data such as activity time, based on household data will build the foundation of a new type of servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L9/32H04L29/06
CPCH04L67/025H04L67/12H04L63/0876H04L9/3226H04L9/3247
Inventor 王斌
Owner 苏州蓝赫智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products