Unlock instant, AI-driven research and patent intelligence for your innovation.

A smart home authentication method based on euicc

An authentication method and smart home technology, applied in the field of authentication security, can solve the problems of user privacy exposure, brute force cracking and hijacking, security risks, etc., and achieve the effect of ensuring information security

Active Publication Date: 2021-12-07
JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Insufficient password strength and lax password management lead to the risk of user names and passwords being leaked, scanned, violently cracked, and hijacked
[0006] (2) Missing access authorization
[0007] Access to most smart home devices does not require additional authorization. When a device is compromised and accessed illegally, the device owner does not know, which leads to the device being easily manipulated and user privacy exposed invisibly.
[0008] (3) IP address exposure
In addition to the security risks of smart home devices, many public outdoor network devices also have the risk of being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A smart home authentication method based on euicc
  • A smart home authentication method based on euicc

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the disclosure, application or uses.

[0046] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those who are skilled in the art. Numerous specific details are set forth such as examples of specific components, devices and methods, to provide a thorough understanding of embodiments of the present disclosure. To those skilled in the art, specific details need not be employed, example embodiments may be embodied in many different forms, and neither should be construed to limit the scope of the disclosure. In some example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.

[0047] The technical problems raised by the present disclosure will be described i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an eUICC-based smart home authentication method. The eUICC application is installed in a home center device, and the authentication method is divided into device binding authentication and access authentication in turn. Through the key between the home center terminal device and the authentication server Negotiate to complete device binding and access authentication. The present invention also provides an eUICC-based smart home authentication system, which implements an eUICC-based smart home authentication method. After the device authentication and communication with eUICC are realized, it can be applied to other IoT devices, and the security encryption and decryption capabilities of the eUICC internal card application can be used to realize the two-way authentication between the device and the application platform.

Description

technical field [0001] The invention relates to the field of authentication security, in particular to an eUICC-based smart home authentication method. Background technique [0002] The rapid development of Internet technology has increased people's demand for the safety and convenience of home life. With the emergence of smart home and various technologies of the Internet of Things, effective information interaction can be carried out between smart home devices, cloud control centers and users. While users obtain more internal family information, they also have higher and higher security requirements for authentication. Traditional authentication mostly uses business account numbers and passwords or SMS verification codes, which have risks such as password leakage and SMS interception. At present, many device security incidents have been exposed, such as illegal access to cameras and manipulation of IoT devices by illegal platforms. At the same time, the improvement of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0853H04L63/0876
Inventor 钱京崔可曲继松
Owner JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD