Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for device identity authentication and smart home system

A device identity, to-be-authenticated technology, used in digital data authentication, computer security devices, instruments, etc., can solve problems such as failure to successfully complete two-way authentication

Active Publication Date: 2021-09-24
QINGDAO HAIER TECH +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present disclosure provide a method, device, and smart home system for identity authentication to solve the technical problem that two-way authentication cannot be successfully completed between smart devices provided by different manufacturers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for device identity authentication and smart home system
  • Method and device for device identity authentication and smart home system
  • Method and device for device identity authentication and smart home system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to understand the characteristics and technical content of the embodiments of the present disclosure in more detail, the implementation of the embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present disclosure. In the following technical description, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawings.

[0050] The terms "first", "second" and the like in the description and claims of the embodiments of the present disclosure and the above drawings are used to distinguish similar objects, and are not necessarily used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of smart home, and discloses a method for device identity authentication. The method comprises the following steps: a cloud platform encrypts a second address and first authentication information of an edge computing node through a first key to obtain a second encrypted address and first encrypted authentication information, and encrypts a first address and second authentication information of terminal equipment through a second key to obtain a first encrypted address and second encrypted authentication information, the second encrypted address and the second encrypted authentication information are sent to the terminal equipment, and the first encrypted address and the first encrypted authentication information are sent to an edge computing node; the terminal equipment authenticates the edge computing node according to the first encryption authentication information sent by the edge computing node and the first authentication information sent by the cloud platform; the edge computing node authenticates the terminal equipment according to the second encryption authentication information sent by the terminal equipment and the second authentication information sent by the cloud platform. Therefore, the terminal equipment and the edge computing node can complete bidirectional authentication.

Description

technical field [0001] The present application relates to the technical field of smart home, for example, to a method, device and smart home system for device identity authentication. Background technique [0002] At present, the edge computing nodes of the smart home need to be registered on the cloud platform of the smart home, and the terminal devices need to be registered on the edge computing nodes. The edge computing nodes undertake part of the computing and storage capabilities of the cloud platform. The existing registration scheme is as follows: the smart home cloud platform has the public key of the edge computing node, and the edge computing node has a built-in private key, and the two-way authentication between the smart home cloud platform and the edge computing node is completed through the key pair; The public key, the built-in private key of the terminal device, completes the two-way authentication between the edge computing node and the terminal device throu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/44G06F21/60
CPCG06F21/31G06F21/44G06F21/602
Inventor 王淼刘建国
Owner QINGDAO HAIER TECH