Two-factor identity authentication method for smart home scene
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A smart home, identity authentication technology, applied in the field of information security, to solve forward security problems and resist node capture attacks
Active Publication Date: 2021-07-13
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 4 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] Aiming at the ubiquitous security and storage problems of two-factor identity authentication in the current smart home environment, the present invention proposes a two-factor identity authentication method for smart home scenarios to solve the above problems
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0030] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.
[0031] In the smart home scenario, the limited computing power of device nodes and various security issues emerge in an endless stream are the main problems that the two-factor authentication method needs to solve. In order to design a technical solution capable of solving the above six security issues and a storage issue, the present invention considers the following implementation techniques:
[0032] 1) When a legal user registers at the gateway, he only needs to use the user's own identity and password for the modulo calculation, and store the result in the smart card. The periodicity of the modulo calculation directly prevents the attacker from effectively guessing the user's password, thereby avoiding offline password guessing attacks based on smart cards or mobile devices; legitimate users are equivalent to home users;
[0033] 2) When the leg...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a two-factor identity authentication method for a smart home scene, and belongs to the technical field of information security. The method comprises the following steps: in a registration stage, a user calculates a random hash value by using a national secret algorithm, and a gateway calculates a secret value for the user according to the hash value; in the authentication and negotiation stage, a user transmits request information containing a device identity to a gateway, after the request information is verified by the gateway and the device, the device carries out elliptic curve multiplication twice to generate a session key, and the generated authentication information comprises a parameter generated by binding a secret value of the device with a random parameter through exclusive or operation; and the device sends the ciphertext and the authentication information to the user through the gateway, and after verification is passed, the user obtains a session key and establishes a session with the device. According to the method, internal user attacks are avoided, user plaintext identities are obtained, node capture attacks and user counterfeit attacks can be effectively resisted, the correctness of session keys negotiated by each legal user and equipment is ensured, and meanwhile, the consumption of storage space is greatly reduced.
Description
technical field [0001] The invention belongs to the technical field of information security and relates to an identity information authentication method, in particular to a two-factor identity authentication method under a single-gateway-oriented wireless sensor network. Background technique [0002] Smart Home (Smart Home) connects various devices in the home, such as audio and video equipment, lighting systems, curtain control, air conditioning control, security systems, digital theater systems, audio and video servers, video cabinet systems, network appliances, etc. Together, it provides various functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, burglar alarm, environmental monitoring, HVAC control, infrared forwarding, and programmable timing control. Compared with ordinary homes, smart homes not only have traditional residential functions, but also include construction, network communication...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.