Unlock instant, AI-driven research and patent intelligence for your innovation.

Information authentication method in smart home

An authentication method and smart home technology, applied in the directions of secure communication devices, home automation networks, user identity/authority verification, etc., can solve problems such as information leakage and unattended information security in smart homes, to meet security requirements and improve The effect of accuracy

Active Publication Date: 2018-07-24
王锐
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problems of the existing smart home control technology, most of the concerns are focused on the unity of the data transmission protocol, and do not pay attention to the security of the information in the smart home. On the other hand, the identification information of the user is stored in the mobile terminal or server. , there is also the defect of information leakage, the present invention proposes an information authentication method in smart home

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information authentication method in smart home

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] like figure 1 Shown, a kind of information authentication method in smart home, it comprises the following steps:

[0044] S1. Divide a dedicated storage area in the server, and the dedicated storage area is used for encrypted data storage. Optionally, the dedicated storage area is encrypted by means of hardware encryption to ensure the security of data storage in the server.

[0045] S2. Obtain the identification information of each member within the home range through the sensor; send the identification information of each user to the server; obtain the identification information of each member through the sensor and send it to the server. The identification information of the member is only configured in the server Information used to verify that a user's request is legitimate, so it is transmitted once and cannot be stolen for subsequent use.

[0046] S3. The server processes all the identification information according to the first preset algorithm to obtain the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information authentication method in a smart home. The information authentication method in the smart home comprises the following steps: S1, dividing an exclusive storage area in the server, wherein the exclusive storage area is used for data encrypted storage; S2, obtaining the identity recognition information of each member in the home range through sensors; and sending the identity recognition information of each user to the server; S3, processing all the identity recognition information by the server according to a first preset algorithm to obtain a recognitiondata set, and then deleting the identity recognition information of each user; and performing data grouping by the server on the recognition data set according to the members; S4, establishing a mapping relationship between each data group and the intelligent terminals corresponding to the members in the server; and S5, obtaining the corresponding user information through the intelligent terminalwhen the user requests identity authentication; processing the user information through a second preset algorithm to obtain the authentication information; deleting the corresponding user informationobtained by the intelligent terminal; and then sending the authentication information to the server.

Description

technical field [0001] The invention relates to the technical field of smart home information security, in particular to an information authentication method in smart home. Background technique [0002] In order to solve the problems of the existing smart home control technology, most of the concerns are focused on the unity of the data transmission protocol, and do not pay attention to the security of the information in the smart home. On the other hand, the identification information of the user is stored in the mobile terminal or server. , there is also the problem of information leakage. Contents of the invention [0003] In order to solve the problems of the existing smart home control technology, most of the concerns are focused on the unity of the data transmission protocol, and do not pay attention to the security of the information in the smart home. On the other hand, the identification information of the user is stored in the mobile terminal or server. , there ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/32H04L12/28
CPCH04L9/0643H04L9/3239H04L12/2803H04L63/0861
Inventor 覃士忠
Owner 王锐