-
1.
公开(公告)号:US20250007889A1
公开(公告)日:2025-01-02
申请号:US18709826
申请日:2023-05-25
Applicant: BOE Technology Group Co., Ltd.
Inventor: Haitao ZHENG , Hongda YU , Huailiang WANG , Hongjun DU , Gao JI , Guoqi LI
Abstract: An Internet of Things system, an authentication and communication method therefor, and a related device. The Internet of Things system comprises: an Internet of Things terminal, configured to establish a connection with a proxy server by using a connection certificate of the Internet of Things terminal, and send device information and an authentication identifier of the Internet of Things terminal to the proxy server; the proxy server, configured to receive the device information and the authentication identifier, and send the device information and the authentication identifier to an Internet of Things platform; and the Internet of Things platform, configured to receive the device information and the authentication identifier, perform identity verification on the Internet of Things terminal according to the device information and the authentication identifier, and in response to the fact that the verification passes, return a verification success message to the proxy server.
-
2.
公开(公告)号:US20240106889A1
公开(公告)日:2024-03-28
申请号:US18264458
申请日:2021-10-28
Applicant: BOE Technology Group Co., Ltd.
Inventor: Haitao ZHENG
IPC: H04L67/1074 , H04L45/7453
CPC classification number: H04L67/1074 , H04L45/7453
Abstract: A data resource storage method includes: in response to an edge computing server acquiring a first data resource, storing, on the basis of a first distributed hash routing table maintained by the edge computing server and a hash value for uniquely identifying the first data resource, the first data resource in at least one edge computing server in an edge node to which the edge computing server belongs; and in response to the edge node acquiring a second data resource, storing, on the basis of a second distributed hash routing table maintained by the edge node and a hash value for uniquely identifying the second data resource, the second data resource in at least one edge node in an edge computing system.
-
公开(公告)号:US20250106002A1
公开(公告)日:2025-03-27
申请号:US18558706
申请日:2022-08-31
Inventor: Lirong XU , Haitao ZHENG , Xinyin WU , Honglei ZHANG
Abstract: A resource distribution method and apparatus. The method is applied to a first server side, including: in response to a resource acquisition request initiated by a first consumer terminal for a target resource, obtaining, from a blockchain network, pre-acquisition information corresponding to the resource acquisition request; when the obtained pre-acquisition information indicates that there is a resource pre-acquisition transaction corresponding to the first consumer terminal and the target resource stored in a blockchain ledger of the blockchain network, returning the target resource to the first consumer terminal. This method can achieve reliable certification of resource distribution records by executing transactions. Based on transactions stored in the blockchain, the distribution process of target resources can be traced, thereby improving the control of target resources and reducing the security risks and infringement hazards of the resource distribution process to a certain extent.
-
公开(公告)号:US20240143727A1
公开(公告)日:2024-05-02
申请号:US18280213
申请日:2022-09-21
Applicant: BOE Technology Group Co., Ltd.
Inventor: Haitao ZHENG
IPC: G06F21/44
CPC classification number: G06F21/44
Abstract: The present disclosure relates to a device authentication method and system, an IoT device, and an authentication server. The method includes: obtaining random data; obtaining public input parameters including the random data, and generating an authentication proof based on a preset proof parameter and the public input parameters; sending the authentication proof to an authentication server, such that the authentication server verifies the authentication proof based on a preset verification parameter to obtain an authentication result; obtaining the authentication result returned by the authentication server. This embodiment can use authentication proof without the need to use device key information for authentication, improving authentication security. Moreover, the authentication server is unable to restore device key information based on the authentication proof, further avoiding leakage of the device key information and improving information security.
-
-
-