Decentralized user identification method and system in smart home

A user identification and decentralization technology, applied in transmission systems, home automation networks, data exchange through path configuration, etc., can solve problems such as low security and easy information leakage, and achieve flexibility and security. high effect

Active Publication Date: 2018-07-31
SASHUANG INTELLIGENT TECH (SHANGHAI) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, a central server is often used to control various operations and security permissions. Once the central server is cracked, the information is easily leaked, and the security level is not high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized user identification method and system in smart home

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In an embodiment of the present invention, a decentralized user identification method in a smart home includes the following steps:

[0037] S1. Obtain in advance the unique identification numbers of each smart terminal corresponding to each home user; generate a list of the unique identification numbers of all smart terminals and distribute them to each smart terminal after encryption;

[0038] S2. Classify users according to their status in the family; the grades are divided into four levels: high, medium, low, and temporary; each user corresponds to a corresponding smart terminal;

[0039] S3. Classify the importance of the smart home equipment, and divide the importance into four levels: high level, medium level, low level, and public equipment.

[0040] For example, the importance level of safes and specific information storage devices can be set to a high level, and equipment with high risk factors such as water heaters and gas can be divided into high levels, whi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a decentralization user identification method in an intelligent home. The method comprises the following steps: S1, pre-acquiring a unique identification number of each intelligent terminal corresponding to each domestic consumer; generating a list including the unique identification numbers of all intelligent terminals, encrypting the list, and dispatching the list to each intelligent terminal; S2, classifying grades of the consumers according to the grades of the consumers in the home, wherein the grades include high grade, middle grade, low grade and temporary grade; and each consumer corresponds to a corresponding intelligent terminal; S3, classifying importance of intelligent domestic devices, wherein the importance is classified into a high level, a middle level, a low level and a public device; and S4, invoking an operation request information of the intelligent domestic devices to any one intelligent terminal in the home, acquiring the unique identification umber of the mobile terminal invoking the operation request information, and transmitting the unique identification number of the mobile terminal transmitting the request and the operation request information to other intelligent terminals in the list.

Description

technical field [0001] The invention relates to the technical field of smart home, in particular to a method and system for identifying decentralized user identity in smart home. Background technique [0002] A mobile phone can remotely control multiple home appliances. This is the scene depicted by smart home. Smart homes usually need to be equipped with remote control terminals, home network set-top boxes, home central controllers, smart home appliances and other equipment. Although smart home devices bring convenience to life, they also become targets of hackers after they are connected to the Internet, and smart home security issues have become a bottleneck for their application. Existing smart home security protection mainly includes: WiFi password protection, visitor authentication protection, network account password protection, router security protection, etc., which are collectively referred to as "in-routing" security protection in the present invention. In-routi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/28
CPCH04L12/282H04L63/08H04L63/0876
Inventor 寇学智
Owner SASHUANG INTELLIGENT TECH (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products