Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device of equipment and computer storage medium

A technology for identity authentication and device identity information, applied in the fields of computer storage media, identity authentication methods and devices for devices, and can solve problems such as insecure identity authentication, prevent data leakage, improve efficiency and security, and improve efficiency and security. The effect of reliability

Active Publication Date: 2019-03-08
GCI SCI & TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a device identity authentication method and device, and a computer storage medium. Identity authentication is performed through multiple simple hash calculations, which can effectively solve the problem of insecurity in the process of device identity authentication in the prior art, and reduce the cost of the device. The security threats brought about when accessing the network can effectively improve the efficiency and security of identity authentication, thereby effectively improving the efficiency, security and reliability of device information transmission, and preventing data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device of equipment and computer storage medium
  • Identity authentication method and device of equipment and computer storage medium
  • Identity authentication method and device of equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0041] see figure 1 , is a schematic flowchart of an identity authentication method for a device provided in an embodiment of the present invention, including:

[0042] S11. In response to the query instruction sent by the management platform, the device calculates a first hash value according to the device identity information and the received random number, and sends the first hash value to the management platform; wherein, the The random number is generated by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and device of equipment and a computer storage medium. The method comprises that in response to an inquiry instruction sent by a management platform, the device calculates a first hash value according to the device identity information and a received random number, and sends the first hash value to the management platform; the device sendsthe first hash value to the management platform according to the first hash value; the random number is generated by the management platform after the device joins the network; in response to a queryresponse instruction sent by the device, the management platform calculates the received first hash value, obtains a second hash value and sends it to the server; the server performs legitimacy authentication on the device according to the first hash value, obtains authentication information corresponding to the device and returns the authentication information to the management platform, so thatthe management platform calculates a third hash value according to the authentication information; according to the received third hash value, the device authenticates the validity of the management platform, which can effectively improve the efficiency and security of identity authentication, and effectively improve the efficiency and security and reliability of equipment information transmission.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a device identity authentication method and device, and a computer storage medium. Background technique [0002] With the rapid development of electronic communication technology, smart terminal devices including smart phones are more and more widely used, but these smart terminal devices bring great convenience to people, but also bring security of smart terminal devices Sexual issues, such as illegal reading, location tracking, illegal eavesdropping, camouflage, and replay, which in turn cause violations of the privacy of smart terminal device users. How to combine smart devices with user identity authentication to improve the security of user identity authentication is an important research direction of user identity authentication. Contents of the invention [0003] Embodiments of the present invention provide a device identity authentication method and devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 林凡成杰张秋镇张振华杨峰李盛阳
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products