Method for monitoring Wi-Fi label through multiple terminals

A multi-terminal and tag technology, applied in key distribution, can solve the problems of hotspot signal strength being easily affected by the surrounding environment, inability to know the status of the target object, limited usage, etc., to achieve high security, power saving, compatibility Good results

Active Publication Date: 2016-02-24
SYSU CMU SHUNDE INT JOINT RES INST +1
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above schemes have the following disadvantages: the active tags in schemes 1 and 2 need to shake hands with the monitoring terminal regularly to monitor the target object in real time, and the power consumption is high; the Wi-Fi hotspot in scheme 3 must be located indoors and keep the location for a long time Unchanged, limited usage
In addition, existing technical solutions usually use a one-to-one monitoring method, which has poor reliability
For example: in ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for monitoring Wi-Fi label through multiple terminals
  • Method for monitoring Wi-Fi label through multiple terminals
  • Method for monitoring Wi-Fi label through multiple terminals

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach S20

[0069] It is known that monitoring terminals {M1,M2,...,Mi-1} are located within the signal coverage of Wi-Fi label L and have established a long-term monitoring relationship with label L. Label L currently broadcasts random seed s, digital signature d and random number sequence R. At this time, the monitoring terminal Mi tries to access the label L through personal login to verify the authenticity of the label L. Such as Figure 4 As shown, the specific implementation method S20 of the Wi-Fi label L and the monitoring terminal Mi performing four handshakes to update the random seed, digital signature and random number sequence is:

[0070] S201: The tag L broadcasts a random seed s, a digital signature d, and a random number sequence R through the SSID within its signal coverage;

[0071] S202: The monitoring terminal Mi requests the login label L through the personal login method; if the request login fails, then jump to step S208;

[0072] S203: The label L locally recor...

specific Embodiment approach S30

[0081] It is known that the monitoring terminal Mi accesses the Wi-Fi tag L through personal login and verifies that the tag L is true. Such as Figure 5 As shown, the specific implementation method S30 of monitoring the target object by establishing a long-term monitoring relationship between the monitoring terminal Mi and the label L is:

[0082] S301: The monitoring terminal Mi uses a random seed generation method to calculate the random seed s according to the ANonce and SNonce generated during the four-way handshake with the label L;

[0083] In this step, the monitoring terminal Mi generates a random seed s through the random seed generation method used in step S204.

[0084] S302: The monitoring terminal Mi uses a random number generation method to calculate the random number sequence R according to the random seed s and the pre-shared key p and store it locally;

[0085] In this step, the monitoring terminal Mi generates a random number sequence R through the random ...

specific Embodiment approach S40

[0092] It is known that the monitoring terminals {M1, M2,...Mi-1} are located within the signal coverage of the Wi-Fi tag L and have established a long-term monitoring relationship with the tag L. Such as Image 6 As shown, any monitoring terminal Mj in {M1, M2, ..., Mi-1} continues to monitor the target object after the label L updates the random seed, digital signature and random number sequence S40 is as follows:

[0093] S401: The monitoring terminal Mj scans the second and third SSIDs broadcast by the label L and extracts a random seed s and a digital signature d therefrom, respectively;

[0094] S402: The monitoring terminal Mj uses a message digest generation method to calculate a digital signature d2 according to the random seed s currently broadcast by the label L, the last random seed s2 broadcast by the label L and the pre-shared key p;

[0095] In this step, the monitoring terminal Mj generates a digital signature d2 through the message digest generation method us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for monitoring a Wi-Fi label through multiple terminals. The method comprises the following steps that: S1, a monitoring terminal accesses in a personal login manner; S2, a label and the monitoring terminal respectively record ANonce and SNonce generated in the handshake process for four times, and then obtain a new random seed by calculation according to ANonce and SNonce; S3, the label obtains a new digital signature by calculation according to the new random seed, a currently broadcasted random seed and a pre-shared key; S4, the label and the monitoring terminal obtain same random number sequences R by calculation according to the new random seed and the pre-shared key, and respectively store the same random number sequences R locally; S5, the label updates the currently periodic broadcast random seed and the digital signature, and updates the currently cyclic broadcast random number sequences to R; S6, the monitoring terminal regularly scans the random number broadcasted by the label and compares the random number with the random number in the local random number sequences R so as to verify the authenticity of the label; and S7, ending.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a method for using a Wi-Fi tag to realize simultaneous monitoring of a single target object by multiple monitoring terminals. Background technique [0002] In daily life and industrial production, wireless monitoring technology has a wide range of applications. For example: anti-theft of valuables and care of special groups of people, etc. Existing solutions mainly use Bluetooth, RFID, Wi-Fi and other technical means to realize real-time monitoring of target objects: [0003] Solution 1: An item monitoring system using RFID technology. Among them, the RFID tag periodically sends the description information of the target object to the tag reader, and the latter forwards it to the background server and the server verifies the authenticity of the description information. [0004] Solution 2: a method and system for monitoring items using Bluetooth technology. Wherein, the B...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0869H04L9/3247H04L63/0807H04L63/0815
Inventor 冷国春吴裔农革
Owner SYSU CMU SHUNDE INT JOINT RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products