Two-factor identity authentication method for smart home scene

A smart home, identity authentication technology, applied in the field of information security, to solve forward security problems and resist node capture attacks

Active Publication Date: 2021-07-13
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the ubiquitous security and storage problems of two-factor identity authentication in the current smart home environment, the present invention proposes a two-factor identity authentication method for smart home scenarios to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor identity authentication method for smart home scene
  • Two-factor identity authentication method for smart home scene
  • Two-factor identity authentication method for smart home scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.

[0031] In the smart home scenario, the limited computing power of device nodes and various security issues emerge in an endless stream are the main problems that the two-factor authentication method needs to solve. In order to design a technical solution capable of solving the above six security issues and a storage issue, the present invention considers the following implementation techniques:

[0032] 1) When a legal user registers at the gateway, he only needs to use the user's own identity and password for the modulo calculation, and store the result in the smart card. The periodicity of the modulo calculation directly prevents the attacker from effectively guessing the user's password, thereby avoiding offline password guessing attacks based on smart cards or mobile devices; legitimate users are equivalent to home users;

[0033] 2) When the leg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-factor identity authentication method for a smart home scene, and belongs to the technical field of information security. The method comprises the following steps: in a registration stage, a user calculates a random hash value by using a national secret algorithm, and a gateway calculates a secret value for the user according to the hash value; in the authentication and negotiation stage, a user transmits request information containing a device identity to a gateway, after the request information is verified by the gateway and the device, the device carries out elliptic curve multiplication twice to generate a session key, and the generated authentication information comprises a parameter generated by binding a secret value of the device with a random parameter through exclusive or operation; and the device sends the ciphertext and the authentication information to the user through the gateway, and after verification is passed, the user obtains a session key and establishes a session with the device. According to the method, internal user attacks are avoided, user plaintext identities are obtained, node capture attacks and user counterfeit attacks can be effectively resisted, the correctness of session keys negotiated by each legal user and equipment is ensured, and meanwhile, the consumption of storage space is greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to an identity information authentication method, in particular to a two-factor identity authentication method under a single-gateway-oriented wireless sensor network. Background technique [0002] Smart Home (Smart Home) connects various devices in the home, such as audio and video equipment, lighting systems, curtain control, air conditioning control, security systems, digital theater systems, audio and video servers, video cabinet systems, network appliances, etc. Together, it provides various functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, burglar alarm, environmental monitoring, HVAC control, infrared forwarding, and programmable timing control. Compared with ordinary homes, smart homes not only have traditional residential functions, but also include construction, network communication...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/041H04W12/0431H04W12/40H04W12/69H04W12/06H04L9/30
CPCH04L9/3066H04W12/06
Inventor 邹仕洪曹强徐国爱王晨宇徐国胜
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products