Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method based on pairing and connection between RF4CE devices

An RF4CE and authentication technology, which is applied in the direction of data exchange, electrical components, transmission systems, etc. through path configuration, can solve the problems of no authentication information, potential safety hazards, and no consideration of control equipment, etc.

Inactive Publication Date: 2013-07-10
SHANGHAI RONGZHI INFORMATION TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The RF4CE device has stipulated a security mechanism in the device transmission process and pairing process, but this security mechanism focuses on the data security when the two devices are currently connected, and ensures the security of data transmission by generating a key, but this part of the security Security only guarantees the security of the pairing process of two devices and the security of data transmission, without considering whether the current control device is the device that the target device wants to pair and connect
[0003] In the process of waiting for pairing, the RF4CE target device turns on the current RF4CE device and is in a pairable state. Any control device can request the current device for pairing and connection. If there is no reasonable pairing authentication scheme, when the target device connects When pairing, there is no corresponding authentication information, so that any device can be connected, which has a great security risk. Therefore, a convenient authentication scheme is needed to carry out the device selection and pairing process when the devices are paired and connected. Prevent malicious devices / devices that are not expected by the user from being able to pair and connect to the current target device at will

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on pairing and connection between RF4CE devices
  • Authentication method based on pairing and connection between RF4CE devices
  • Authentication method based on pairing and connection between RF4CE devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0017] Such as figure 1 As shown, an authentication method based on a paired connection between RF4CE devices, including: an RF4CE target device and an RF4CE control device, the paired connection between the RF4CE target device and the RF4CE control device, through authentication in the RF4CE target device The code generation module 3 generates an authentication code, displays the currently generated authentication code on the target device screen, and the RF4CE target control device generates corresponding authentication data through the authentication data generation module 1 according to the authentication code displayed by the target device, and Send the corresponding authentication code to the target device through the authentication data sending module 2, after the target device authentication data receiving module 4 receives the corresponding dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method based on pairing and connection between RF4CE devices. The method includes: the RF4CE devices include an RF4CE target device and an RF4CE control device, the RF4CE target device and the RF4CE control device are paired and connected, the RF4CE target device generates a corresponding authentication code through an authentication code generating module, after receiving the authentication code of the target device, the RF4CE control device generates corresponding authentication data through an authentication data generating module and transmits the authentication data to the RF4CE target device through an authentication data transmitting module, and the target device verifies the authentication data through an authentication data verifying module to judge whether the control device can be paired and connected with the target device. The method avoids malicious control connection or pairing and connection with a target device a user does not expect, and prevents the devices from being controlled maliciously.

Description

technical field [0001] The present invention relates to an authentication method based on a paired connection between RF4CE devices. Before RF4CE devices are connected and paired, an authentication scheme is added to realize a secure connection between devices, avoiding malicious or user-desired control connections and target devices The pairing connection between devices prevents the device from being maliciously controlled. Background technique [0002] At present, home devices integrating RF4CE are becoming more and more popular. RF4CE supports one-to-many and many-to-many topological networks, so different RF4CE devices can be controlled by one device, and one device also allows different control terminals to operate . The RF4CE device has stipulated a security mechanism in the device transmission process and pairing process, but this security mechanism focuses on the data security when the two devices are currently connected, and ensures the security of data transmissi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/28
Inventor 薛丹张纪金蔡俊鹏范仲华
Owner SHANGHAI RONGZHI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products