End-to-end security assurance method under IoT (Internet of Things) cloud environment
A security guarantee and cloud environment technology, applied to secure communication devices, public keys for secure communications, and key distribution, can solve problems such as inability to flexibly implement resource control, achieve identity legitimacy, secure communications, and reduce authentication The effect of times
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0030] 1. The initialization process is as follows:
[0031] Such as figure 1 As shown in , the system administrator configures the identity ID and pre-shared key K for nodes and gateways P ; The gateway and the cloud server register with the RA registration center in the PKI system, and the CA certificate center generates and issues digital certificates CertA and CertB, which can be used to assist in the two-way authentication of the gateway and the cloud server. CertA={ID a ,PU a ,(d a ,s a ),e a , T a} is the digital certificate issued by CA for terminal entity A. Among them, ID a ID assigned to user A by CA; Y a is the public key of user A, Y a = r a ×P,r a ∈[1,n-1] is the private key of user A, where P is the point on E(a,b) on the elliptic curve, n is the order of P; e a Indicates that there is H(TD a ||Y a ||T a ) ge...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com