Information authentication method in smart home
An authentication method and smart home technology, applied in the directions of secure communication devices, home automation networks, user identity/authority verification, etc., can solve problems such as information leakage and unattended information security in smart homes, to meet security requirements and improve The effect of accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] like figure 1 Shown, a kind of information authentication method in smart home, it comprises the following steps:
[0044] S1. Divide a dedicated storage area in the server, and the dedicated storage area is used for encrypted data storage. Optionally, the dedicated storage area is encrypted by means of hardware encryption to ensure the security of data storage in the server.
[0045] S2. Obtain the identification information of each member within the home range through the sensor; send the identification information of each user to the server; obtain the identification information of each member through the sensor and send it to the server. The identification information of the member is only configured in the server Information used to verify that a user's request is legitimate, so it is transmitted once and cannot be stolen for subsequent use.
[0046] S3. The server processes all the identification information according to the first preset algorithm to obtain the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
