Unlock instant, AI-driven research and patent intelligence for your innovation.

Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control

A user mobile and encryption key technology, applied in wireless communication, signal transmission system, user identity/authority verification, etc., can solve problems such as easy to be stolen, communication method theft and cracking, and security risks

Inactive Publication Date: 2015-04-29
GUIZHOU CONGLING INTERNET CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Smart IoT control applications for mobile devices all involve wireless control, but the security of wireless communication control still needs to be improved
[0003] The existing IoT control technologies basically use wifi and bluetooth for wireless control, and the security protocols adopt international common standards. These two standard communication methods have the disadvantage of being directly stolen and cracked. First, the wifi method is currently common The most important is 64-bit WEP encryption and 128-bit WEP encryption. It is very common to crack these two methods, especially 64-bit WEP encryption. Second, there are still a large number of Bluetooth 2.0+EDR standards in the Bluetooth standard, which are also used Various methods of cracking have the disadvantage of being cracked;
[0004] The existing wifi and bluetooth password pairing methods basically use an independent password method, that is, the password is set by a person with authority, and this method is easy to be stolen
[0005] In addition to the wireless standard password, the existing smart wireless control keys are generated by an independent authorized person, that is, one person can completely determine the content or method of the wireless control key, as long as the person does not keep it well key, there will be a security risk
[0006] The encryption control method of wifi password and Bluetooth password pairing is cumbersome in terms of user experience, especially the Bluetooth method is used on actual mass mobile devices. It is necessary to increase the opening process of Bluetooth every time, and the user experience is cumbersome, which directly affects the experience of related products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control
  • Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control
  • Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The realization method of the multi-party collaborative authorization key is based on the establishment of the system management background. The system management background is equipped with independent authority entrances or automatic Extract the native code of the method, and match the software and hardware that realize the multi-party authorization mechanism. Two or more of the independent authorization information of the owner of the IoT control device, the independent authorization key of the equipment operation and maintenance manager, the user registration ID of the user's mobile device, the MAC address code of the mobile device, and the MAC code of the key controller More than two kinds of information are collected to the system management background, and the system management background writes the collected information into the dynamic key generation program, and the dynamic key generation program generates a multi-party collaborative authorization key. Accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to realizing for a multi-party cooperation authorization key and a system adopting the same for mobile wireless control. According to the method, on the basis of setting a system management background, two or more of independent authorization permission information of an thing control equipment owner, an independent authorization key of an equipment operation and maintenance management part, a user registration ID (identity) of user mobile equipment, an MAC address code of the mobile equipment and an MAC code of a key controller are acquired to the system management background, the system management background writes the acquired information into a dynamic key generating program and the dynamic key generating program generates the multi-party cooperation authorization key. According to the invention, the defect that a common key is easy to crack, steal and lose can be effectively prevented and safety is improved.

Description

technical field [0001] The invention relates to a method for realizing a multi-party authorization key and a system for controlling lower-level equipment using the key, belonging to the field of security control of the Internet of Things. Background technique [0002] The intelligent IoT control applications of mobile devices all involve wireless control, but the security of wireless communication control still needs to be improved. [0003] The existing IoT control technologies basically use wifi and bluetooth for wireless control, and the security protocols adopt international common standards. These two standard communication methods have the disadvantage of being directly stolen and cracked. First, the wifi method is currently common The most important is 64-bit WEP encryption and 128-bit WEP encryption. It is very common to crack these two methods, especially 64-bit WEP encryption. Second, there are still a large number of Bluetooth 2.0+EDR standards in the Bluetooth st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04W12/04G08C17/02H04L9/32
Inventor 唐劲段项勇徐勇
Owner GUIZHOU CONGLING INTERNET CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More