CN117879950A - Authentication system of embedded equipment - Google Patents

Authentication system of embedded equipment Download PDF

Info

Publication number
CN117879950A
CN117879950A CN202410050425.7A CN202410050425A CN117879950A CN 117879950 A CN117879950 A CN 117879950A CN 202410050425 A CN202410050425 A CN 202410050425A CN 117879950 A CN117879950 A CN 117879950A
Authority
CN
China
Prior art keywords
authentication
local
equipment
cloud server
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410050425.7A
Other languages
Chinese (zh)
Inventor
请求不公布姓名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Chipjet Technology Co Ltd
Original Assignee
Hangzhou Chipjet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Chipjet Technology Co Ltd filed Critical Hangzhou Chipjet Technology Co Ltd
Priority to CN202410050425.7A priority Critical patent/CN117879950A/en
Publication of CN117879950A publication Critical patent/CN117879950A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an authentication system of embedded equipment. The system comprises: the system comprises local embedded equipment, an original cloud server and at least one newly-added equipment; determining authentication equipment from the original cloud server and at least one newly-added equipment; the authentication device authenticates the local embedded device as follows: negotiating a first symmetric encryption key between the authentication device and the local embedded device by adopting an asymmetric encryption algorithm; the authentication device and the local embedded device communicate authentication related data through a first symmetric encryption key so as to complete authentication of the local embedded device; the authentication related data comprises authentication key information and an authentication result. According to the authentication system of the embedded equipment, which is provided by the embodiment of the invention, the authentication equipment is determined from the original cloud server and at least one newly-added equipment, and the local embedded equipment is authenticated by the authentication equipment, so that an authentication channel is increased, and the authentication efficiency and success rate of the local embedded equipment can be improved.

Description

Authentication system of embedded equipment
Technical Field
The embodiment of the invention relates to the technical field of embedded equipment authentication, in particular to an authentication system of embedded equipment.
Background
When consumable chips are arranged in most of the embedded devices (such as 3D printers), the consumable chips need to be authenticated, and only consumables passing the authentication are allowed to be used. In the related art, when a consumable chip in an embedded device is authenticated, the authentication can be performed only according to a single authentication channel, and if the authentication channel is disconnected or abnormal, the authentication process of the embedded device is delayed, so that the authentication efficiency is affected.
Disclosure of Invention
The embodiment of the invention provides an authentication system of embedded equipment, which can improve the authentication efficiency and success rate of local embedded equipment.
In a first aspect, an embodiment of the present invention provides an authentication system of an embedded device, including: the system comprises local embedded equipment, an original cloud server and at least one newly-added equipment; the newly added equipment is newly added local equipment and/or a newly added cloud server;
determining authentication equipment from the original cloud server and the at least one newly-added equipment; the authentication device authenticates the local embedded device as follows: negotiating a first symmetric encryption key between the authentication device and the local embedded device by adopting an asymmetric encryption algorithm; the authentication device and the local embedded device communicate authentication related data through the first symmetric encryption key so as to complete authentication of the local embedded device; the authentication related data comprises authentication key information and an authentication result.
The embodiment of the invention discloses an authentication system of embedded equipment. The system comprises: the system comprises local embedded equipment, an original cloud server and at least one newly-added equipment; the newly-added equipment is newly-added local equipment and/or a newly-added cloud server; determining authentication equipment from the original cloud server and at least one newly-added equipment; the authentication device authenticates the local embedded device as follows: negotiating a first symmetric encryption key between the authentication device and the local embedded device by adopting an asymmetric encryption algorithm; the authentication device and the local embedded device communicate authentication related data through a first symmetric encryption key so as to complete authentication of the local embedded device; the authentication related data comprises authentication key information and an authentication result. According to the authentication system of the embedded equipment, which is provided by the embodiment of the invention, the authentication equipment is determined from the original cloud server and at least one newly-added equipment, and the local embedded equipment is authenticated by the authentication equipment, so that an authentication channel is increased, and the authentication efficiency and success rate of the local embedded equipment can be improved.
Drawings
FIG. 1a is a schematic diagram of an authentication system in the related art;
FIG. 1b is a schematic diagram of an authentication system in the related art;
fig. 2 is a schematic structural diagram of an authentication system of an embedded device according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of negotiating a first symmetric encryption key using an asymmetric encryption algorithm in an embodiment of the present invention;
FIG. 4 is an exemplary diagram of communication of authentication related data with a first symmetric encryption key in an embodiment of the invention;
FIG. 5 is an exemplary diagram of an authentication system of an embedded device in an embodiment of the present invention;
FIG. 6 is an exemplary diagram of an authentication system of an embedded device in an embodiment of the invention;
fig. 7 is an exemplary diagram of an authentication system of an embedded device in an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present invention are shown in the drawings.
Fig. 1 a-1 b are schematic structural diagrams of an authentication system in the related art, as shown in fig. 1a, where the authentication system includes a consumable, an embedded device, and a cloud server, and in the authentication system, the embedded device performs local authentication on the consumable to obtain trusted information; meanwhile, the embedded equipment can report equipment information and consumable information to the cloud server, and authentication is carried out on the cloud to obtain use permission. As shown in fig. 1b, part of the high-end consumables directly participate in cloud authentication, and the consumables are determined as embedded devices at this time, that is, the embedded devices directly perform the cloud authentication process, so as to obtain the permission of the cloud server.
Fig. 2 is a schematic structural diagram of an authentication system of an embedded device according to an embodiment of the present invention, as shown in fig. 2, where the system includes: the system comprises a local embedded device, an original cloud server and at least one newly-added device.
The newly added equipment is newly added local equipment and/or a newly added cloud server. Determining authentication equipment from the original cloud server and at least one newly-added equipment; the authentication device authenticates the local embedded device as follows: negotiating a first symmetric encryption key between the authentication device and the local embedded device by adopting an asymmetric encryption algorithm; the authentication device and the local embedded device communicate authentication related data through the first symmetric encryption key so as to complete authentication of the local embedded device.
The authentication related data comprises authentication key information and an authentication result. The authentication key information may include: the password processor id, the device uid, the total printing times, the internal report count, the local clock, the last verification certificate serial number, the copy count, the ink box count and the like. The authentication result includes authentication success and authentication failure. The local embedded device may be a consumable chip in a 3D printer. The manner of determining the authentication device from the original cloud server and the at least one newly added device may be: determining any one of the original cloud server and at least one newly-added device as an authentication device; or if the newly added device is the newly added local device, determining the newly added local device as an authentication device; or if the newly added equipment is the newly added cloud server, determining the authentication equipment according to the priority between the original cloud server and the newly added cloud server.
In this embodiment, the local embedded device includes a first public key and a first private key; the authentication device includes a second public key and a second private key. And the second public key is stored in the local embedded equipment, and the first public key is stored in the authentication equipment. The first public key and the first private key may be generated by the local embedded device using any key generation algorithm, and the second public key and the second private key may be generated by the authentication device using any key generation algorithm, which is not limited herein. The second public key may be written to the local embedded device by programming firmware.
Specifically, the method for negotiating the first symmetric encryption key between the authentication device and the local embedded device by adopting the asymmetric encryption algorithm may be: the local embedded equipment generates a first random number, encrypts the first random number according to a second public key and sends the encrypted first random number to the authentication equipment; the authentication device generates a second random number, encrypts the second random number according to the first public key, and sends the encrypted second random number to the local embedded device; the local embedded equipment decrypts the encrypted second random number according to the first private key to obtain the second random number; the authentication equipment decrypts the encrypted first random number according to the second private key to obtain the first random number; the local embedded device and the authentication device process the first random number and the second random number by adopting the same algorithm to obtain a first symmetric encryption key.
The first random number and the second random number can be random large numbers, so that the data security can be improved. In this embodiment, any encryption and decryption algorithm may be used for encrypting and decrypting data by the local embedded device and the authentication device, which is not limited herein.
Fig. 3 is a schematic diagram of negotiating a first symmetric encryption key by using an asymmetric encryption algorithm in an embodiment of the present invention, assuming that a first public key and a first private key of a local embedded device are respectively denoted as P1 and S1, a second public key and a second private key of an authentication device are respectively denoted as P2 and S2, as shown in fig. 3, the local embedded device generates a first random number a, encrypts a according to the second public key P2, and sends the encrypted a to the authentication device, and the authentication device decrypts the encrypted a according to the second private key S2 to obtain a. The authentication device generates a second random number B, encrypts the B according to the first public key P1, sends the encrypted B to the local embedded device, and the local embedded device decrypts the encrypted B according to the first private key S1 to obtain B. And finally, the local embedded equipment and the authentication equipment process the A and the B by adopting the same algorithm to obtain a first symmetric encryption key K1.
In this embodiment, if the authentication device is a cloud server, the network layer performs encryption and decryption processing on the communication data again when the local embedded device and the cloud server perform data communication through the network.
Specifically, the manner in which the authentication device and the local embedded device communicate authentication related data through the first symmetric encryption key may be: the local embedded device encrypts the authentication key information according to the first symmetric encryption key and sends the encrypted authentication key information to the authentication device; the authentication equipment decrypts the encrypted authentication key information according to the first symmetric encryption key to obtain the authentication key information, and authenticates the authentication key information to obtain an authentication result; encrypting the authentication result according to the first symmetric encryption key, and sending the encrypted authentication result to the local embedded equipment; and the local embedded equipment decrypts the encrypted authentication result according to the first symmetric encryption key to obtain the decrypted authentication result.
The manner in which the local embedded device and the authentication device encrypt the data according to the first symmetric encryption key may use any encryption algorithm, which is not limited herein.
Fig. 4 is an exemplary diagram illustrating communication of authentication related data by the first symmetric encryption key in the present embodiment, and as shown in fig. 4, the local embedded device encrypts authentication key information represented in plaintext according to the first symmetric encryption key K1 to obtain ciphertext; the local embedded device sends the ciphertext to the authentication device, and the authentication device decrypts the ciphertext according to K1 to obtain authentication key information represented by plaintext; the authentication equipment authenticates the authentication key information to obtain an authentication result; then encrypting an authentication result represented by a plaintext according to K1 to obtain a ciphertext, and transmitting the ciphertext to the local embedded equipment; and the local embedded equipment decrypts the ciphertext according to K1 to obtain an authentication result represented by a plaintext.
Optionally, if at least one of the newly added devices is a newly added local device, determining the newly added local device as an authentication device, and authenticating the local embedded device through the newly added local device.
The newly added local equipment and the local embedded equipment are located in the same local area network. And determining the newly-added local equipment as authentication equipment, namely authenticating the local embedded equipment by the newly-added local equipment, wherein the local embedded equipment and the original cloud server can be disconnected at the moment, or the local embedded equipment and the original cloud server are communicated with non-authentication related data.
Wherein the non-authentication related data may be consumable information. The consumable information may include: the ink cartridge comprises an area, a random ink cartridge identifier, ink cartridge description information, a type, a product line, an hp identifier, a consumable insertion state, an ink quantity remaining percentage, a low ink identifier, a regeneration identifier, a consumable unique id, a color and a first installation identifier.
Fig. 5 is an exemplary diagram of an authentication system of an embedded device in the present embodiment, where, as shown in fig. 5, the newly added device is a newly added local device, and authentication related data is communicated between the local embedded device and the newly added local device; the local embedded equipment and the original cloud server are communicated with non-authentication related data; the newly added local equipment and the original cloud server can be in data communication or disconnected. The authentication process of the local newly-added device to the local embedded device may refer to the authentication process of the authentication device to the local embedded device in the above embodiment, which is not described herein. In this embodiment, the local embedded device is authenticated by the local newly-added device, so that the local embedded device can realize authentication without connecting to an external network, and the authentication efficiency is improved.
Fig. 6 is an exemplary diagram of an authentication system of an embedded device in this embodiment, where, as shown in fig. 6, a newly added device is a newly added local device, and authentication related data and non-authentication related data are communicated between the local embedded device and the newly added local device; the port between the local embedded equipment and the original cloud server is disconnected; the newly added local equipment and the original cloud server can be in data communication or disconnected. The authentication process of the local newly-added device to the local embedded device may refer to the authentication process of the authentication device to the local embedded device in the above embodiment, which is not described herein. In this embodiment, the local embedded device is authenticated by the local newly-added device, so that the local embedded device can realize authentication without connecting to an external network, and the authentication efficiency is improved.
Optionally, if the authentication result of the newly added local device on the local embedded device is authentication failure, the newly added local device communicates authentication related data with the original cloud server, and the newly added local device forwards the authentication result of the original cloud server to the local embedded device through the first symmetric encryption key.
In this embodiment, if the authentication result of the newly added local device on the local embedded device is authentication failure, in order to improve the success rate of authentication, the newly added local device forwards the authentication key information to the original cloud server, the original cloud server continues to authenticate the authentication key information, and the newly added local device forwards the authentication result to the local embedded device. And stored in the newly added local equipment, and cannot be uploaded to the original cloud server. Whether communication authentication is performed between the local embedded device and the newly-added local device or authentication is performed on the original cloud server through the newly-added local device, the communication authentication is stored in the newly-added local device and cannot be uploaded to the original cloud server.
The communication mode of the authentication related data between the newly added local device and the original cloud server may be: the newly added local equipment and the original cloud server adopt an asymmetric encryption algorithm to negotiate a second symmetric encryption key; and the newly added local equipment and the original cloud server communicate authentication related data through a second symmetric encryption key.
The newly added local equipment comprises a third public key and a third private key, and the original cloud server comprises a fourth public key and a fourth private key; and the newly added local device stores the fourth public key, and the original cloud server stores the third public key.
Specifically, the mode of negotiating the second symmetric encryption key by the newly added local device and the original cloud server by adopting the asymmetric encryption algorithm may be: generating a third random number by newly added local equipment, encrypting the third random number according to a fourth public key, and transmitting the encrypted third random number to the original cloud server; the original cloud server generates a fourth random number, encrypts the fourth random number according to the third public key, and sends the encrypted fourth random number to the newly added local equipment; the newly added local device decrypts the encrypted fourth random number according to the third private key to obtain the fourth random number; the original cloud server decrypts the encrypted third random number according to the fourth private key to obtain the third random number; and the newly added local equipment and the original cloud server process the third random number and the fourth random number by adopting the same algorithm to obtain a second symmetric encryption key.
Wherein the third random number and the fourth random number may each be a random large number to provide data security. In this embodiment, the process of negotiating the second symmetric encryption key by the newly added local device and the original cloud server using the asymmetric encryption algorithm is similar to the process of negotiating the first symmetric encryption key by the authentication device and the local embedded device using the asymmetric encryption algorithm in the above embodiment, and will not be repeated here.
Specifically, the communication mode of the authentication related data between the newly added local device and the original cloud server through the second symmetric encryption key may be: the newly added local equipment encrypts the authentication key information according to the second symmetric encryption key and sends the encrypted authentication key information to the original cloud server; the original cloud server decrypts the encrypted authentication key information according to the second symmetric encryption key to obtain authentication key information, and authenticates the authentication key information to obtain an authentication result; encrypting the authentication result according to the second symmetric encryption key, and sending the encrypted authentication result to the newly added local equipment; and the newly added local equipment decrypts the encrypted authentication result according to the second symmetric encryption key to obtain the decrypted authentication result.
In this embodiment, the process of performing the communication of the authentication related data by the newly added local device and the original cloud server through the second symmetric encryption key is similar to the process of performing the communication of the authentication related data by the authentication device and the local embedded device through the first symmetric encryption key in the above embodiment, and will not be described herein.
Specifically, after the newly added local device obtains the decrypted authentication result, the authentication result is continuously encrypted according to the first symmetric encryption key, and the encrypted authentication result is sent to the local embedded device.
Optionally, if the newly added device is a newly added cloud server, determining an authentication device from the original cloud server and at least one newly added cloud server according to the priority; if the authentication result of the authentication equipment is that the authentication is successful, ending the authentication; if the authentication result of the authentication equipment is authentication failure, determining a cloud server with the next priority as new authentication equipment so as to authenticate the local embedded equipment through the authentication equipment; and authenticating the local embedded equipment until the authentication result is that the authentication is successful or the original cloud server and at least one newly-added cloud server are authenticated.
The priorities of the original cloud server and the newly added cloud server can be preconfigured. The authentication process of the authentication device to the local embedded device may refer to the above embodiment, and will not be described herein.
Fig. 7 is an exemplary diagram of an authentication system of an embedded device according to an embodiment of the present invention, as shown in fig. 7, where the system includes a local embedded device, a cloud server 1, and cloud servers 2 and … …, and a cloud server n, where public keys and private keys included in the local embedded device are P0 and S0, respectively, public keys and private keys included in the cloud server 1 are P1 and S1, public keys and private keys included in the cloud server 2 are P2 and S2, and public keys and private keys included in the cloud server n are Pn and Sn, respectively. The local embedded device stores a public key P1, public keys P2 and … … and a public key Pn, and the cloud server 1, the cloud servers 2 and … … and the cloud server n all store a public key P0. And each cloud server sequentially comprises the following steps from high to low according to the priority: cloud server 1, cloud servers 2, … … cloud server n. The local embedded device can generate a random number A0, and the end server 1, the cloud server 2, … … and the cloud server n can respectively generate a random number A1, random numbers A2, … … and a random number An. As shown in fig. 7, the cloud server 1 is first determined as an authentication device, the cloud server 1 authenticates the local embedded device according to the above embodiment, and if the authentication result is successful, the authentication is ended; if the authentication result is failure, the cloud server 2 is continuously determined to be the authentication device, the cloud server 2 authenticates the local embedded device according to the mode of the embodiment, and so on until the authentication result is that the authentication is successful or all the cloud servers authenticate the local embedded device. In this embodiment, at least one cloud server is newly added to increase the authentication channel for the local embedded device, so that the success rate of authentication can be improved.
The authentication system of the embedded device provided in this embodiment includes: the system comprises local embedded equipment, an original cloud server and at least one newly-added equipment; the newly-added equipment is newly-added local equipment and/or a newly-added cloud server; determining authentication equipment from the original cloud server and at least one newly-added equipment; the authentication device authenticates the local embedded device as follows: negotiating a first symmetric encryption key between the authentication device and the local embedded device by adopting an asymmetric encryption algorithm; the authentication device and the local embedded device communicate authentication related data through a first symmetric encryption key so as to complete authentication of the local embedded device; the authentication related data comprises authentication key information and an authentication result. According to the authentication system of the embedded equipment, which is provided by the embodiment of the invention, the authentication equipment is determined from the original cloud server and at least one newly-added equipment, and the local embedded equipment is authenticated by the authentication equipment, so that an authentication channel is increased, and the authentication efficiency and success rate of the local embedded equipment can be improved.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. An authentication system for an embedded device, comprising: the system comprises local embedded equipment, an original cloud server and at least one newly-added equipment; the newly added equipment is newly added local equipment and/or a newly added cloud server;
determining authentication equipment from the original cloud server and the at least one newly-added equipment; the authentication device authenticates the local embedded device as follows: negotiating a first symmetric encryption key between the authentication device and the local embedded device by adopting an asymmetric encryption algorithm; the authentication device and the local embedded device communicate authentication related data through the first symmetric encryption key so as to complete authentication of the local embedded device; the authentication related data comprises authentication key information and an authentication result.
2. The system of claim 1, wherein the local embedded device comprises a first public key and a first private key; the authentication device includes a second public key and a second private key; and the second public key is stored in the local embedded equipment, and the first public key is stored in the authentication equipment.
3. The system of claim 2, wherein the authentication device and the locally embedded device negotiate a first symmetric encryption key using an asymmetric encryption algorithm by:
the local embedded device generates a first random number, encrypts the first random number according to the second public key, and sends the encrypted first random number to the authentication device;
the authentication device generates a second random number, encrypts the second random number according to the first public key, and sends the encrypted second random number to the local embedded device;
the local embedded equipment decrypts the encrypted second random number according to the first private key to obtain the second random number; the authentication equipment decrypts the encrypted first random number according to the second private key to obtain the first random number;
the local embedded device and the authentication device process the first random number and the second random number by adopting the same algorithm to obtain a first symmetric encryption key.
4. The system of claim 2, wherein the authentication device communicates authentication-related data with the local embedded device via the first symmetric encryption key by:
the local embedded device encrypts the authentication key information according to the first symmetric encryption key and sends the encrypted authentication key information to the authentication device;
the authentication equipment decrypts the encrypted authentication key information according to the first symmetric encryption key to obtain authentication key information, and authenticates the authentication key information to obtain an authentication result; encrypting the authentication result according to a first symmetric encryption key, and sending the encrypted authentication result to the local embedded equipment;
and the local embedded equipment decrypts the encrypted authentication result according to the first symmetric encryption key to obtain the decrypted authentication result.
5. The system of claim 1, wherein if the at least one additional device is an additional local device, the additional local device is determined to be an authentication device, and the local embedded device is authenticated by the additional local device.
6. The system of claim 5, wherein if the authentication result of the newly added local device to the local embedded device is an authentication failure, the newly added local device communicates authentication related data with the original cloud server, and the newly added local device forwards the authentication result of the original cloud server to the local embedded device through the first symmetric encryption key.
7. The system of claim 6, wherein the means for communicating authentication related data between the newly added local device and the original cloud server is:
the newly added local equipment and the original cloud server adopt an asymmetric encryption algorithm to negotiate a second symmetric encryption key; and the newly added local equipment and the original cloud server communicate authentication related data through the second symmetric encryption key.
8. The system of claim 7, wherein the newly added local device comprises a third public key and a third private key, and the original cloud server comprises a fourth public key and a fourth private key; the newly added local device stores the fourth public key, and the original cloud server stores the third public key; the mode of negotiating a second symmetric encryption key by the newly added local equipment and the original cloud server through an asymmetric encryption algorithm is as follows:
the newly added local equipment generates a third random number, encrypts the third random number according to the fourth public key, and sends the encrypted third random number to the original cloud server;
the original cloud server generates a fourth random number, encrypts the fourth random number according to the third public key, and sends the encrypted fourth random number to the newly added local device;
the newly added local equipment decrypts the encrypted fourth random number according to the third private key to obtain the fourth random number; the original cloud server decrypts the encrypted third random number according to the fourth private key to obtain the third random number;
and the newly added local equipment and the original cloud server process the third random number and the fourth random number by adopting the same algorithm to obtain a second symmetric encryption key.
9. The system of claim 7, wherein the communication of the authentication related data between the newly added local device and the original cloud server through the second symmetric encryption key is:
the newly added local equipment encrypts the authentication key information according to the second symmetric encryption key and sends the encrypted authentication key information to the original cloud server;
the original cloud server decrypts the encrypted authentication key information according to the second symmetric encryption key to obtain authentication key information, and authenticates the authentication key information to obtain an authentication result; encrypting the authentication result according to a second symmetric encryption key, and sending the encrypted authentication result to the newly added local equipment;
and the newly added local equipment decrypts the encrypted authentication result according to the second symmetric encryption key to obtain the decrypted authentication result.
10. The system of claim 1, wherein if the added device is an added cloud server, determining an authentication device from the original cloud server and at least one of the added cloud servers according to a priority;
if the authentication result of the authentication equipment is that the authentication is successful, ending the authentication;
if the authentication result of the authentication equipment is authentication failure, determining a cloud server with the next priority as new authentication equipment so as to authenticate the local embedded equipment through the authentication equipment; and authenticating the local embedded equipment until the authentication result is that the authentication is successful or the original cloud server and at least one newly-added cloud server authenticate the local embedded equipment.
CN202410050425.7A 2024-01-12 2024-01-12 Authentication system of embedded equipment Pending CN117879950A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410050425.7A CN117879950A (en) 2024-01-12 2024-01-12 Authentication system of embedded equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410050425.7A CN117879950A (en) 2024-01-12 2024-01-12 Authentication system of embedded equipment

Publications (1)

Publication Number Publication Date
CN117879950A true CN117879950A (en) 2024-04-12

Family

ID=90582647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410050425.7A Pending CN117879950A (en) 2024-01-12 2024-01-12 Authentication system of embedded equipment

Country Status (1)

Country Link
CN (1) CN117879950A (en)

Similar Documents

Publication Publication Date Title
US10305870B2 (en) Cryptography and key management device verification
US10951423B2 (en) System and method for distribution of identity based key material and certificate
US8761401B2 (en) System and method for secure key distribution to manufactured products
JP4814339B2 (en) Constrained encryption key
CN101605137B (en) Safe distribution file system
CN113691560B (en) Data transmission method, method for controlling data use, and cryptographic device
EP2461564A1 (en) Key transport protocol
EP4046325B1 (en) Digital signature generation using a cold wallet
KR20170139570A (en) Method, apparatus and system for cloud-based encryption machine key injection
EP3522580A1 (en) Credential provisioning
US20120324218A1 (en) Peer-to-Peer Trusted Network Using Shared Symmetric Keys
CN109981255B (en) Method and system for updating key pool
JP5954609B1 (en) Method and system for backing up private key of electronic signature token
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN108964897B (en) Identity authentication system and method based on group communication
CN111294349B (en) Method and device for sharing data of Internet of things equipment
US20210105136A1 (en) Method for securing a data exchange in a distributed infrastructure
CN110881177A (en) Anti-quantum computing distributed Internet of vehicles method and system based on identity secret sharing
CN110913390A (en) Anti-quantum computing vehicle networking method and system based on identity secret sharing
JP2013207376A (en) Information processing device and program
KR102266654B1 (en) Method and system for mqtt-sn security management for security of mqtt-sn protocol
US20220171832A1 (en) Scalable key management for encrypting digital rights management authorization tokens
KR102569893B1 (en) Method of providing secure in-vehicle network communication and appratus for implementing the same
WO2016068847A1 (en) Key splitting
KR101690093B1 (en) Controlled security domains

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination