Unlock instant, AI-driven research and patent intelligence for your innovation.

Equipment private key determination method and device, storage medium and electronic equipment

A technology for determining methods and private keys, applied in the computer field, can solve problems such as potential safety hazards, complexity, and solutions that have not yet been proposed, and achieve the effect of safety certification and safety certification equipment

Active Publication Date: 2021-06-11
ZHEJIANG DAHUA TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It is still feasible to use password authentication for a small number of devices, but for a large number of devices, each device uses a password, which leads to too many passwords and is difficult to manage. It is not safe to reuse the same password for multiple devices, and passwords are generally shared, making it impossible to identify specific operators also pose a safety hazard
Although the digital certificate authentication of the PKI system can solve the problem of insecure password authentication, it also requires complicated certificate management for a large number of devices, and a complicated certificate chain verification process is required.
[0004] For the above-mentioned problem of device authentication, no effective solution has been proposed in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment private key determination method and device, storage medium and electronic equipment
  • Equipment private key determination method and device, storage medium and electronic equipment
  • Equipment private key determination method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiments of the present invention will be described in detail below with reference to the drawings and in combination with the embodiments.

[0033] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence.

[0034] The method embodiments provided in the embodiments of the present application may be executed in mobile terminals, computer terminals or similar computing devices. Taking running on a mobile terminal as an example, figure 1 It is a hardware structural block diagram of a mobile terminal according to a method for determining a private key of a device in an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal may include one or more ( figure 1 Only one is shown in the figure) processor 102 (processor 102 may include but not limited to a proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an equipment private key determination method and device, a storage medium and electronic equipment. The method comprises the following steps: receiving first signature data sent by an access control system; decrypting the first encrypted data based on the first signature data to obtain a first random number; obtaining second signature data by using the first random number and the IP address of the first device; sending the second signature data and the first encrypted data to a key service center to indicate the key service center to generate a private key of the first device based on the second signature data and the first encrypted data; and receiving a first encrypted private key sent by the key service center, the first encrypted private key including a private key of the first device. According to the invention, the problem of equipment authentication in related technologies is solved, and the effect of safely authenticating the equipment is achieved.

Description

technical field [0001] Embodiments of the present invention relate to the computer field, and in particular, relate to a method and device for determining a device private key, a storage medium, and an electronic device. Background technique [0002] With the continuous emergence of various smart devices and IoT devices, data sharing between various devices has become an inevitable trend, and how to solve identity authentication between devices is becoming more and more urgent. Currently, identity authentication methods are generally based on passwords or digital certificates of a public key infrastructure (Public Key Infrastructure, PKI) system. [0003] It is still feasible to use password authentication for a small number of devices, but for a large number of devices, each device uses a password, which leads to too many passwords and is difficult to manage. It is not safe to reuse the same password for multiple devices, and passwords are generally shared, making it imposs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3247H04L9/083H04L9/0825H04L2209/72
Inventor 冷国强
Owner ZHEJIANG DAHUA TECH CO LTD