Smart home security communication system and communication method

A secure communication and smart home technology, applied to secure communication devices and key distribution, can solve problems such as low key rate, reduced related system security, user data and privacy leakage, etc., to improve security and reduce the risk of being stolen Risks, Preventing Predicted Effects

Pending Publication Date: 2022-07-29
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the keys used for identity authentication, user data and privacy protection in smart home devices are a series of pseudo-random numbers generated based on traditional key generation equipment and technologies, and pseudo-random numbers are predictable to a certain extent. , which brings a great risk of leakage of user data and privacy. At the same time, the key rate generated by traditional methods is low, so it is impossible to encrypt massive data with one-time encryption, which also reduces the security of related systems.
At the same time, the process of identity authentication and data encryption and decryption of smart home devices is relatively simple, which also brings certain hidden dangers to the security of smart home devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart home security communication system and communication method
  • Smart home security communication system and communication method
  • Smart home security communication system and communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] refer to figure 1 ,like figure 1 Shown is a schematic structural diagram of a smart home security communication system provided by this embodiment. The system specifically includes the following structures:

[0058] The entire installation consists of an intelligent control center (ICC), a smart gateway, smart home devices, mobile devices, and quantum key memory cards.

[0059] The intelligent control center is mainly composed of main QRNG (high-speed quantum random number generator), backup QRNG, key storage area, and encryption and decryption algorithm storage area. When the main QRNG works normally, a true random number is generated and packaged into a quantum key product and stored in the key storage area. When the working state of the main QRNG is abnormal, it switches to the standby QRNG to generate true random numbers. The encryption algorithm storage area is preset with encryption algorithms such as AES, RC4, and XOR encryption algorithms of one-time pad. Th...

Embodiment 2

[0071] The specific working principle and process of the aforementioned smart home security communication system are divided into two scenarios, one is the scenario in which the mobile terminal communicates with the intelligent control center and then controls the smart home, and the other is the scenario in which the mobile terminal communicates directly with the smart home device through near field communication. Thereby controlling the scene of the smart home. This embodiment provides a scenario flow in which the mobile terminal communicates with the intelligent control center to control the smart home.

[0072] Before the instruction initiating terminal communicates with the smart home device through the control center, a registration step is also included, and the key storage medium and the smart home device are connected to the control center for registration;

[0073] The registration of the key storage medium includes: connecting the key storage medium offline to the c...

Embodiment 3

[0089] This embodiment provides a scenario flow in which the mobile terminal directly communicates with the smart home device through near field communication to control the smart home.

[0090] Before the instruction initiating terminal directly communicates with the smart home device through near field communication, a registration step is also included, and the key storage medium and the smart home device are connected to the control center for registration;

[0091] The registration of the key storage medium includes: connecting the key storage medium offline to the control center, injecting a certain number of authentication keys and transmission keys into the key storage medium according to requirements, and transferring the key storage medium to the control center. The physical hardware information of the user is registered in the control center, and the user's biometric information is entered in the control center.

[0092] refer to image 3 ,like image 3 Shown is a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a smart home security communication system and a communication method. The system comprises an instruction initiating terminal, a control center, a smart gateway and smart home equipment. According to the invention, the one-time pad encryption requirement of mass data can be met, the risk that the information of the whole device is stolen is reduced through the double authentication mode of remote access and the double-key XOR encryption and decryption of near-field access, and the security of the smart home system is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of smart home communication, and in particular relates to a smart home security communication system and a communication method. Background technique [0002] With the popularity of mobile Internet, smart home devices appear in all aspects of people's lives, so the protection of identity authentication, user data and privacy in smart home devices is particularly important. However, at present, the keys used for identity authentication and user data and privacy protection in smart home devices are a series of pseudo-random numbers generated by traditional key generation equipment and technologies, and pseudo-random numbers are predictable to a certain extent. , which brings a great risk of leakage of user data and privacy. At the same time, the key rate generated by traditional methods is low, so it is impossible to encrypt massive data with one-time pad encryption, which also reduces the security of related ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0869H04L9/0852H04L63/0428H04L63/0861H04L63/0876H04L9/088
Inventor 张亮亮李扬徐兵杰黄伟
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products