A security authentication method based on smart home

A technology of security authentication and smart home, which is applied in the field of security authentication based on smart home, and can solve problems such as security, increased information leakage, and the risk of being intercepted and unsafe

Active Publication Date: 2018-12-25
HANGZHOU NORMAL UNIVERSITY
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while these smart devices bring convenience to our lives, they also create many security problems.
The diversification of product terminals d...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method based on smart home
  • A security authentication method based on smart home
  • A security authentication method based on smart home

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following is a further detailed description in conjunction with the present invention.

[0042] The present invention proposes an improved security authentication protocol under the smart home, so that the user and the M2M device can realize a secure conversation through the local gateway. The user sends his ID to the local gateway through the secure channel, and the local gateway securely stores the registered user ID. Then proceed to the next stage of the conversation process.

[0043] The present invention includes the following steps:

[0044] Step 1. The user is registered and authenticated in the home gateway;

[0045] Step 2. The home gateway sends a message to the smart terminal;

[0046] Step 3. The smart terminal authenticates and forms the session key reply stage;

[0047] Step 4. The home gateway responds to the user stage;

[0048] Step 5. The user and the smart terminal form a session key stage.

[0049] Parameter description: ID u ,PW u Respectively represent th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety authentication method based on intelligent home. The invention comprises the following steps: step 1, a user registers and authenticates at a home gateway; step 2, theuser registers and authenticates at a home gateway. 2, the home gateway sends a message to the intelligent terminal; 3, authenticating the intelligent terminal and forming a session secret key replyphase; 4, the home gateway replies to the user stage; 5, a session secret key is formed between the user and the intelligent terminal. The invention provides a new M2M mode, which is based on the usermobile terminal to transmit information through the home gateway to control the intelligent home terminal, so as to realize the intelligent safety authentication of the home environment, and ensure the message transmission and the data safety in the intelligent home. The invention can provide security attributes such as user anonymity, mutual authentication, session key security, perfect forwardsecurity and the like, and can also resist offline password guessing attack and camouflage attack. And the performance comparison shows that the proposed mechanism has high efficiency.

Description

Technical field [0001] The invention relates to an authentication protocol, and specifically discloses a safety authentication method based on smart home. Background technique [0002] Smart home system refers to a complete system that uses computer technology, network information technology, automation technology, etc. to integrate information in life, and realizes centralized control and real-time control. The key technology of smart home is to realize the connection between smart terminals and users through M2M (machine-to-machine) communication technology. As the Internet of Things technology matures, more and more wireless communication technologies are introduced in the smart home environment. The innovation and progress of information technology will inevitably bring about some hidden dangers such as information leakage. In order to solve these drawbacks, many solutions have been proposed in the field of cryptographic security protocols, but there are few security protoco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0838H04L9/0869H04L9/3226H04L9/3234H04L9/3273H04L9/0844
Inventor 谢琪吴彩霞黄凌锋牟航
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products