RFID entrusted authentication method for smart home

An authentication method and smart home technology, applied in encryption devices with shift registers/memory, inductive record carriers, transmission systems, etc., can solve problems such as potential safety hazards, high risks, and threats to residents' property safety

Active Publication Date: 2017-12-01
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the sudden incident, A did not hand over the key to B in advance, so B has no other more convenient way to enter A's house and complete the entrusted affairs other than breaking in. Therefore, the traditional door based on mechanical lock obviously cannot meet this demand. But the access control system using RFID technology can solve this problem
One possible method is to notify the control center (such as the property management center) to open the door for B, but this entrustment method is risky. On the one hand, the control center is not completely trustworthy, and setting it in advance to have the authority to open the door has certain security risks. ; On the other hand, once the control center is maliciously attacked by hackers, the property safety of all residents will be seriously threatened, so this method is not advisable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID entrusted authentication method for smart home
  • RFID entrusted authentication method for smart home
  • RFID entrusted authentication method for smart home

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0021] The technical scheme that the present invention solves the problems of the technologies described above is: with reference to Figure 1-Figure 3 said,

[0022] (1) Ordinary authentication. This authentication process corresponds to the authentication process performed by the user according to his own Tag and his own Reader. The specific steps are as follows:

[0023] A) Tag Tag-A generates a random number x Tg then calculate h Tg =h(ID Tg_A ||PW Tg_A ||t Tg ||T Tg ), where r, TS=(Ts(r)modp), p is the public key of the trusted third party, s is the private key of the trusted third party, ID Tg is the name of the tag Tag-A, PW Tg is the shared password between Tag-A and the trusted third ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention claims the protection for a RFID entrusted authentication method for smart home, and relates to the field of smart home. A RFID-based access control system is widely applied to resolutions for smart home. Current access control verification plans fail to be entrusted to scenarios, such as when a user travels or is on business trip and can not entrust other to enter his/her home to complete certain tasks. The invention provides a RFID entrusted authentication plan which can be authorized on the user's own to address the problem. According to the invention, firstly, a general RFID authentication protocol is designed and is applied to general authentication scenarios in smart home; and on the basis of the general RFID authentication protocol, for matters entrusted, an entrusted authentication protocol is provided. The technical solution is designed based on Chebyshev chaotic map, such that the user can remote complete matters entrusted.

Description

technical field [0001] The invention belongs to the field of smart home, and relates to a smart home-oriented RFID entrusted authentication method. Background technique [0002] Smart home has been sought after by experts and people because of its great convenience. Using RFID technology in the access control system can not only save users from the cumbersome use and inconvenient maintenance of traditional key unlocking, but also solve the problems that traditional mechanical door locks cannot solve. For example, when a user (A) cannot return on time during a business trip or travel, he needs to entrust another person (B) to enter his home to complete certain tasks, such as feeding pets. Due to the sudden incident, A did not hand over the key to B in advance, so B has no other more convenient way to enter A's house and complete the entrusted affairs other than breaking in. Therefore, the traditional door based on mechanical lock obviously cannot meet this demand. But the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10H04L9/00H04L9/06H04L9/08
CPCG06K7/10257G06K7/10287H04L9/001H04L9/0643H04L9/0866H04L9/0869H04L9/0877
Inventor 周由胜李缘蒋溢王永
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products