Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
A two-factor authentication method for smart home scenarios
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A smart home and identity authentication technology, applied in the field of information security, to achieve the effect of resisting node capture attacks and solving forward security problems
Active Publication Date: 2021-10-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] Aiming at the ubiquitous security and storage problems of two-factor identity authentication in the current smart home environment, the present invention proposes a two-factor identity authentication method for smart home scenarios to solve the above problems
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0030] The present invention will be further described in detail with reference to the accompanying drawings and embodiments.
[0031] In the smart home scenario, the limited computing power of device nodes and various security issues emerge in an endless stream are the main problems that the two-factor authentication method needs to solve. In order to design a technical solution capable of solving the above six security issues and a storage issue, the present invention considers the following implementation techniques:
[0032] 1) When a legal user registers at the gateway, he only needs to use the user's own identity and password for the modulo calculation, and store the result in the smart card. The periodicity of the modulo calculation directly prevents the attacker from effectively guessing the user's password, thereby avoiding offline password guessing attacks based on smart cards or mobile devices; legitimate users are equivalent to home users;
[0033] 2) When the leg...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention is a two-factor identity authentication method oriented to a smart home scenario, and belongs to the technical field of information security. The invention includes: in the registration stage, the user uses the national secret algorithm to calculate the random hash value, and the gateway calculates the secret value according to the hash value for the user; in the authentication and negotiation stage, the user transmits the request information including the device identification to the gateway, After the gateway and the device pass the verification, the device performs two elliptic curve multiplication operations to generate the session key, and the authentication information generated at the same time includes the parameters generated by binding its own secret value to random parameters through XOR operation; the device converts the ciphertext and authentication information It is sent to the user through the gateway. After the verification is passed, the user obtains the session key and establishes a session with the device. The invention avoids the internal user attack to obtain the user's plaintext identity, can effectively resist the node capture attack and the user counterfeiting attack, ensures the correctness of the session key negotiated between each legitimate user and the device, and greatly reduces the consumption of storage space.
Description
technical field [0001] The invention belongs to the technical field of information security and relates to an identity information authentication method, in particular to a two-factor identity authentication method under a single-gateway-oriented wireless sensor network. Background technique [0002] Smart Home (Smart Home) connects various devices in the home, such as audio and video equipment, lighting systems, curtain control, air conditioning control, security systems, digital theater systems, audio and video servers, video cabinet systems, network appliances, etc. Together, it provides various functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, burglar alarm, environmental monitoring, HVAC control, infrared forwarding, and programmable timing control. Compared with ordinary homes, smart homes not only have traditional residential functions, but also include construction, network communication...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.