Internet of Things security authentication method and system
A technology of security authentication and security authentication module, applied in security devices, transmission systems, digital transmission systems, etc., can solve the problems of low security and increase cost, and achieve the effect of high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0040] figure 1 Embodiment 1 of the present application provides an Internet of Things security authentication system, which includes: a terminal device 11 and a security authentication module 12, wherein the security authentication module 12 is connected to the terminal device 11;
[0041] The terminal device 11 is configured to send a security authentication request to the security authentication module 12, and receive a security authentication result sent by the security authentication module 12;
[0042] The security authentication module 12 is configured to receive a security authentication request sent by the terminal device 11, perform security authentication on the terminal device 11 according to the security authentication request, and send a security authentication result to the terminal device 11 .
[0043] As a specific embodiment of the present application, the terminal device 11 may be a fixed terminal or a mobile terminal, which is not limited. As an example, ...
Embodiment 2
[0049] See figure 2 The Internet of Things security authentication method provided in Embodiment 2 of the present application includes the following steps:
[0050] S201: The security authentication module 12 receives a security authentication request sent by the terminal device 11.
[0051] The security service is one of the services provided by the security authentication module 12. The terminal device 11 connects to the security authentication module 12 through interfaces such as SPI, Bluetooth, and Uart and initiates a security authentication request. The security authentication request is used to apply for the security authentication module 12. Services. Security authentication requests include encryption and decryption requests, identity authentication requests, and other authentication requests.
[0052] S202: The security authentication module 12 performs security authentication on the terminal device 11 according to the security authentication request, and obtains ...
Embodiment 3
[0064] see image 3 , an Internet of Things security authentication system provided in the embodiment of the present application includes a terminal device 31, a security authentication module and a communication module 33;
[0065] In the embodiment of this application, the terminal device 31 can communicate with figure 1 The functions and structures of the terminal devices 11 in the shown system are the same, and for the sake of brevity, no detailed description is given here.
[0066] The security authentication module 32 has figure 1 In addition to the functions of the security authentication module 12 shown, it is used to receive the security authentication request sent by the terminal device 31, perform security authentication on the terminal device 31 according to the security authentication request, and send the security authentication result to The terminal device 31.
[0067] In addition, the security authentication module 32 can also have the following functions: ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com