Security authentication method, security authentication device and security verification system

A technology for security verification and verification of information, applied in security devices, computer security devices, transmission systems, etc., can solve the problems of not taking into account the characteristics of smart home networks, inability to effectively encrypt and decrypt, and low security.

Active Publication Date: 2016-06-01
シェンジェンインムーテクノロジーシーオーエルティーディー
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The pertinence is not strong. Using the traditional encryption method to encrypt the smart home network does not take into account the characteristics of the smart home network, so it cannot be encrypted and decrypted effectively and in a targeted manner.
[0004] 2. Keys or passwords are fixed. The current encryption methods are basically encrypted by encrypting data or encrypting communication lines. These keys or passwords are fixed. As long as they are transmitted, they may be intercepted and cracked by hackers. , the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, security authentication device and security verification system
  • Security authentication method, security authentication device and security verification system
  • Security authentication method, security authentication device and security verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to have a clearer understanding of the above objects, features and advantages of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0044] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0045] figure 1 A schematic flowchart of a security verification method according to an embodiment of the present invention is shown.

[0046] like figure 1 As shown, the security verification metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security authentication method, a security authentication device and a security verification system. The security verification method for a server comprises the following steps: establishing a first communication link with a mobile terminal; receiving request information from the mobile terminal through the first communication link; verifying whether the request information is matched with pre-stored verification information in the server; and when the verification result is yes, allocating manager authority of an intelligent home device that establishes a communication connection with the server to the mobile terminal. By adopting the security verification method provided by the technical scheme of the invention, pointed security authentication is carried out by means of the properties of an intelligent home network, the illegal operation of the intelligent home device resulting from the leakage of a fixed password can be effectively avoided, and the security of the intelligent home network is improved, so that the user experience is improved.

Description

technical field [0001] The present invention relates to the technical field of information verification, in particular, to a security verification method for a server, a security verification device for a server, a security verification method for a mobile terminal, and a security verification device for a mobile terminal. A safety verification device and a safety verification system. Background technique [0002] At present, there is no secure encryption scheme for smart home networks. The encryption and decryption methods used on smart home networks are traditional network encryption and decryption methods, such as symmetric encryption, asymmetric encryption, and one-way encryption. However, existing encryption schemes have at least the following defects: [0003] 1. The pertinence is not strong. Using the traditional encryption method to encrypt the smart home network does not take into account the characteristics of the smart home network, so it cannot be encrypted and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/0846H04L63/10H04W12/06G06F21/00
Inventor 吴坤灵陈峰
Owner シェンジェンインムーテクノロジーシーオーエルティーディー
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products