SUZHOU METABRAIN INTELLIGENT TECHNOLOGY CO., LTD. (20240267215). EQUIPMENT IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM simplified abstract

From WikiPatents
Jump to navigation Jump to search

EQUIPMENT IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM

Organization Name

SUZHOU METABRAIN INTELLIGENT TECHNOLOGY CO., LTD.

Inventor(s)

Fuqiang Ma of Suzhou, Jiangsu (CN)

EQUIPMENT IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240267215 titled 'EQUIPMENT IDENTITY AUTHENTICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM

The patent application describes a method and apparatus for authenticating a device identity, involving the construction of trusted nodes in a hierarchical structure for secure operations in a cloud computing platform.

  • Trusted nodes are established in a hierarchical structure for secure operations.
  • Identity authentication is performed between the trusted node and the user device before distributed operations.
  • User devices can securely perform operations in the cloud computing platform.
  • Trusted nodes operate in a secure environment to protect operation confidentiality and integrity.
  • The method ensures that operation content is available but invisible to the cloud computing platform.

Potential Applications: - Secure authentication for devices in cloud computing environments. - Enhanced security for distributed operations in cloud platforms.

Problems Solved: - Ensures secure authentication and operations in cloud computing environments. - Protects operation confidentiality and integrity.

Benefits: - Enhanced security for device authentication and operations. - Secure and confidential operations in cloud computing platforms.

Commercial Applications: Title: Secure Device Authentication for Cloud Computing This technology can be applied in industries requiring secure authentication and operations in cloud computing platforms, such as finance, healthcare, and government sectors. It can also be used by cloud service providers to enhance the security of their platforms.

Questions about the Technology: 1. How does the method ensure the confidentiality and integrity of operations in the cloud computing platform? - The method ensures confidentiality and integrity by performing identity authentication between trusted nodes and user devices before distributed operations, operating in a secure environment.

2. What are the potential risks associated with device authentication in cloud computing environments? - Potential risks include unauthorized access to sensitive data, compromised operation integrity, and security breaches.


Original Abstract Submitted

a method and an apparatus for authenticating a device identity, an electronic device and a storage medium are disclosed by the present application. in the present application, the trusted nodes of a tree-type hierarchical structure are constructed, and before a distributed operation is performed, an identity authentication operation is performed between the trusted node and the user device, which not only may enable the user device to perform distributed operations in the cloud computing platform, at the same time, the trusted node may be in a trusted environment to ensure that the operation content is available but invisible for the cloud computing platform, and confidentiality and integrity of the operation are protected.