[go: up one dir, main page]

WO2017016065A1 - Procédé et appareil d'authentification d'équipement de système de maison intelligente - Google Patents

Procédé et appareil d'authentification d'équipement de système de maison intelligente Download PDF

Info

Publication number
WO2017016065A1
WO2017016065A1 PCT/CN2015/091334 CN2015091334W WO2017016065A1 WO 2017016065 A1 WO2017016065 A1 WO 2017016065A1 CN 2015091334 W CN2015091334 W CN 2015091334W WO 2017016065 A1 WO2017016065 A1 WO 2017016065A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
fingerprint data
user fingerprint
authentication
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/091334
Other languages
English (en)
Chinese (zh)
Inventor
郭靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Publication of WO2017016065A1 publication Critical patent/WO2017016065A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2642Domotique, domestic, home control, automation, smart house

Definitions

  • the invention relates to the field of smart homes, in particular to a device authentication method and device for a smart home system.
  • Smart home is a residential platform, using integrated wiring technology, network communication technology, security technology, automatic control technology, audio and video technology to integrate home life related facilities, and build an efficient management system for residential facilities and family schedules. Improve home safety, convenience, comfort, and artistry, and achieve an environmentally friendly and energy-saving living environment.
  • the smart home system may include a terminal device, an intelligent routing device, and a smart home device, and the smart home device includes a smart door lock, a smart refrigerator, a smart television, a smart air conditioner, or a smart washing machine, and the terminal device includes a smart terminal device such as a mobile phone, a computer, and a notebook.
  • the terminal device and the smart home device are connected to the intelligent routing device, and the terminal device controls and manages the smart home device through the intelligent routing device.
  • the terminal equipment In order to ensure the security of the smart home system, the terminal equipment needs to be authenticated to control the smart home equipment.
  • the terminal device In the existing smart home system security authentication technology, the terminal device is usually authenticated by setting a password or an access password, that is, the terminal inputs a password or a password, and matches the password or access password stored in the smart home device, and the technical solution
  • the security is low, and once the password or password is cracked by the criminals, the consequences are unimaginable.
  • the embodiment of the invention discloses a device authentication method and device for a smart home system, which can greatly improve the security of the smart home system, thereby preventing illegal users and terminals from intruding into the smart home system.
  • a first aspect of the embodiments of the present invention provides a device authentication method for a smart home system, including:
  • IMEI International Mobility Equipment Identity
  • the authentication data includes the encrypted first user fingerprint data, the encrypted IMEI, and the control Message.
  • the encrypting the user fingerprint data and the IMEI by using the stored first authentication key and an encryption algorithm including:
  • the sampled first user fingerprint data and IMEI are encrypted using the stored first authentication key and encryption algorithm.
  • the method After the storing the user fingerprint data, the authentication key, and the encryption algorithm, the method also includes:
  • the terminal device authentication When receiving the smart home control command input by the user, determining whether it is within the access period T, if within the access period T, generating a control message sent to the smart home device according to the smart home control command If it is not within the access period T of the terminal, the terminal device authentication is ended.
  • the method further includes:
  • the stored user fingerprint data is deleted after the access period T.
  • a second aspect of the embodiments of the present invention provides a device authentication method for a smart home system, which is used in a smart home device, and includes:
  • the terminal device If the decrypted IMEI passes the check, and the decrypted first user fingerprint data passes the check, the terminal device is successfully authenticated, and the user's control command is executed according to the control message in the authentication data;
  • the terminal device fails to be authenticated, and the user's control is not performed according to the control message in the authentication data. command.
  • the verifying the decrypted IMEI includes:
  • the verifying the decrypted first user fingerprint data includes:
  • the method further includes:
  • the method further includes:
  • the terminal authentication succeeds, if the decryption After the first user fingerprint data fails the verification, the terminal device authentication fails.
  • the method further includes:
  • the second user fingerprint data of the stored terminal device is deleted after the access period T of the terminal device.
  • a third aspect of the embodiments of the present invention provides a terminal device, including:
  • a receiving unit configured to acquire first user fingerprint data
  • a processing unit configured to set a first authentication key and a first encryption algorithm, and store first user fingerprint data, the first authentication key, and an encryption algorithm acquired by the receiving unit;
  • the receiving unit is further configured to receive a smart home control command input by the user, and generate a control message sent to the smart home device according to the smart home control command;
  • the processing unit is further configured to use the stored first authentication key and an encryption algorithm to Encrypting the first user fingerprint data and the IMEI of the terminal device;
  • a sending unit configured to send the authentication data to the smart home device, to trigger the smart home device to implement terminal device authentication according to the authentication data, where the authentication data includes the encrypted first user fingerprint data, and the encrypted IMEI and the control message.
  • the processing unit is specifically configured to:
  • the sampled first user fingerprint data and IMEI are encrypted using the stored first authentication key and encryption algorithm.
  • the processing unit is further configured to:
  • the receiving unit When the receiving unit receives the smart home control command input by the user, determining whether it is within the access period T, if it is within the access period T, generating and transmitting to the smart home according to the smart home control command The control message of the device; if not within the access period T of the terminal, the terminal device authentication is ended.
  • the processing unit is further configured to:
  • the stored user fingerprint data is deleted after the access period T.
  • a fourth aspect of the embodiments of the present invention provides a smart home device, including:
  • a receiving unit configured to acquire second user fingerprint data of the terminal device
  • a processing unit configured to set a second authentication key and a decryption algorithm of the terminal device, and store an IMEI of the terminal device, second user fingerprint data acquired by the receiving unit, the second authentication key, and a decryption algorithm;
  • the receiving unit is further configured to receive authentication data sent by the terminal device
  • the processing unit is further configured to:
  • Sending to the terminal device by using a second authentication key and a decryption algorithm of the stored terminal device Decrypting the first user fingerprint data and the IMEI in the sent authentication data;
  • the terminal device If the decrypted IMEI passes the check, and the decrypted first user fingerprint data passes the check, the terminal device is successfully authenticated, and the user's control command is executed according to the control message in the authentication data;
  • the terminal device fails to be authenticated, and the user's control is not performed according to the control message in the authentication data. command.
  • the processing unit is specifically configured to:
  • the processing unit is specifically configured to:
  • the processing unit is further configured to:
  • the terminal authentication succeeds, if the decryption After the first user fingerprint data fails the verification, the terminal device authentication fails.
  • the processing unit is further configured to:
  • the second user fingerprint data of the stored terminal device is deleted after the access period T of the terminal device.
  • the technical solution provided by the embodiment of the present invention enables the terminal device and the smart home device to respectively acquire and store the first user fingerprint data and the second user fingerprint data of the terminal device, and the terminal uses the first smart home control command input by the user.
  • the authentication key and the encryption algorithm encrypt the first user fingerprint data and the IMEI of the terminal device, and send the encrypted data and the smart home control message as authentication data to the smart home device, and the smart home device uses the authentication data.
  • the second authentication key and the decryption algorithm perform decryption, and use the stored second fingerprint data and the IMEI to check the first user fingerprint data and the IMEI in the authentication data to implement terminal authentication.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint matching and data encryption to authenticate the terminal of the smart home system, thereby greatly improving the security of the smart home system, thereby preventing the illegal user and the terminal from intruding into the smart home system. Is a highly secure terminal device authentication mechanism.
  • the terminal device authentication is started, that is, the authentication data is sent to the smart home device, otherwise the terminal device authentication is cancelled, and if the smart home device is accessed, After receiving the authentication data of the terminal within the time limit T, the terminal device is authenticated, otherwise the terminal device authentication fails, which can effectively control the access rights of the terminal device, and further enhance the security of the smart home system.
  • FIG. 1 is a schematic structural diagram of a smart home system according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a device authentication method of a smart home system according to Embodiment 1 of the present invention
  • FIG. 3 is a schematic flowchart of a device authentication method of a smart home system according to Embodiment 2 of the present invention.
  • FIG. 4 is a schematic flowchart of a device authentication method of a smart home system according to Embodiment 3 of the present invention.
  • FIG. 5 is a schematic flowchart of another device authentication method of a smart home system according to Embodiment 4 of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal device according to Embodiment 5 of the present invention.
  • FIG. 7 is a schematic structural diagram of a smart home device according to Embodiment 6 of the present invention.
  • FIG. 8 is a schematic structural diagram of another terminal device according to Embodiment 7 of the present invention.
  • FIG. 9 is a schematic structural diagram of another smart home device according to Embodiment 8 of the present invention.
  • FIG. 1 is a schematic structural diagram of a smart home system.
  • the smart home system includes a terminal device 11 , an intelligent routing device 12 , and a smart home device 13 , and the smart home device 13 can be a smart door lock.
  • Intelligent appliances such as smart refrigerators, smart TVs, smart air conditioners or smart washing machines that can be managed by the terminal device 11, and the terminal devices include mobile phones, tablet computers, notebook computers, handheld computers, mobile internet devices (MIDs), etc. Equipment for home control functions.
  • MIDs mobile internet devices
  • the terminal device 11, the smart home device 13 and the intelligent routing device 12 are connected through a wireless network, for example, via a wireless local area network (WiFi) or Bluetooth connection, and the terminal device 11 controls and manages the smart home device 13 through the intelligent routing device 12.
  • WiFi wireless local area network
  • the connection between the terminal device 11 and the smart home device 13 and the intelligent routing device 12 is a wireless connection, and in practical applications, it may also be a wired connection.
  • the embodiment of the invention provides a device authentication method and device for a smart home system, which is used for authenticating a terminal device by a smart home device in a smart home system.
  • the embodiment of the present invention provides a device authentication method for a smart home system, which is used in a terminal device of a smart home system, as shown in FIG. 2, a device authentication method for a smart home system according to Embodiment 1 of the present invention
  • the steps can be included:
  • S101 Acquire first user fingerprint data, set a first authentication key and a first encryption algorithm, and store first user fingerprint data, a first authentication key, and an encryption algorithm.
  • the terminal device in the smart home system controls and manages the smart home device to be authenticated by the smart home device.
  • the embodiment of the invention provides a method for combining fingerprint matching and data encryption to realize authentication of the terminal device, thereby greatly improving the smart home system.
  • the security of device authentication is a method for combining fingerprint matching and data encryption to realize authentication of the terminal device, thereby greatly improving the smart home system.
  • the terminal device and the smart home device should obtain user fingerprint data for authenticating the terminal device, where the user enters the first user fingerprint data in the terminal device, and the second user fingerprint data is entered in the smart home device, in the smart
  • the second user fingerprint data in the home device is bound to the IMEI of the terminal device.
  • the terminal device is authenticated and authenticated by using the fingerprint data of the user, and the user inputs the first user fingerprint data and the second user fingerprint data in the terminal device and the smart home device respectively, and the same user is at the terminal.
  • the first user fingerprint data entered by the device and The second user fingerprint data entered by the smart home device should be consistent, so that the smart home device can authenticate the terminal device.
  • the terminal device can be divided into a host terminal device and a guest terminal device, and the guest terminal device is a terminal device that provides convenience and authorization for the guest who is a guest at home.
  • the user fingerprint data of the host terminal device is the fingerprint data of the home owner, and the user fingerprint data of the guest terminal device may be the fingerprint data of the host or the visitor. If the owner simultaneously enters the fingerprint in the owner terminal device and the guest terminal device, the different fingers should be entered. To distinguish.
  • the host terminal device generally has permanent access rights, and the access period is infinitely long.
  • the guest terminal device is generally a temporary access right. After the access period is exceeded, the access rights of the guest terminal device are automatically canceled, and the different smart home devices may be the guest terminal device. Set different access periods.
  • a first authentication key and an encryption algorithm are set in the terminal device, and a second authentication key and a decryption algorithm are set in the smart home device for encrypting and decrypting the first user fingerprint data and the IMEI of the terminal.
  • the first authentication key and the second authentication key may be a public key or a different private key of each terminal device, and the first authentication key, the second authentication key, the encryption algorithm, and the decryption algorithm may be fixed settings. It is also possible that the negotiation between the terminal device and the smart home device is variable, and the embodiment of the present invention is not limited in terms of how to set the authentication key and the encryption and decryption algorithm.
  • the first user fingerprint data, the first authentication key, and the encryption algorithm may be stored in a Security Boot module in the terminal device that can ensure data security.
  • S102 Receive a smart home control command input by the user, and generate a control message sent to the smart home device according to the smart home control command.
  • the terminal device After receiving the smart home control command of the user, the terminal device generates a control message sent to the smart home device according to the control command, where the control message is used to instruct the smart home device to implement the related control operation according to the command of the user.
  • the first user fingerprint data and the IMEI of the terminal device are encrypted by using the first authentication key and the encryption algorithm stored in the secure boot module.
  • IMEI is the world's only fixed identifier of the terminal equipment, which is set when the terminal equipment is shipped from the factory. Set.
  • a part of the first user fingerprint data is generally used for terminal device authentication, and the terminal device may intercept a specified part of the first user fingerprint data to obtain the sampled first user fingerprint data, which is stored in the secure boot module.
  • the first authentication key and the encryption algorithm encrypt the sampled first user fingerprint data and simultaneously encrypt the IMEI.
  • S104 Send the authentication data to the smart home device to trigger the smart home device to implement the terminal device authentication according to the authentication data, where the authentication data includes the encrypted first user fingerprint data, the encrypted IMEI, and the control message.
  • the terminal device After the terminal device encrypts the first user fingerprint data (or the sampled first user fingerprint data) and the IMEI, the first user fingerprint data, the IMEI, and the control message generated in step S102 are configured to be sent into the authentication data.
  • the authentication data triggers smart home devices to implement terminal device authentication.
  • the communication message between the terminal device and the smart home device needs to be forwarded by the intelligent routing device, and the terminal device sends the authentication data to the intelligent routing device, and then the intelligent routing device forwards the authentication data to the smart home device.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint and data encryption to authenticate the terminal of the smart home system, which can greatly improve the security of the smart home system, thereby preventing illegal users and terminals from intruding into the smart home system. It is a highly secure terminal device authentication mechanism.
  • a second embodiment of the present invention provides a device authentication method for a smart home system, which is used in a terminal device of a smart home system, as shown in FIG. 3, a device authentication method for a smart home system according to Embodiment 2 of the present invention The steps can be included:
  • S201 Acquire first user fingerprint data, set a first authentication key and a first encryption algorithm, and store first user fingerprint data, a first authentication key, and an encryption algorithm.
  • the terminal device is authenticated and authenticated by using the fingerprint data of the user, and the user inputs the first user fingerprint data and the second user fingerprint data in the terminal device and the smart home device respectively, in the smart home device.
  • the second user fingerprint data and the IMEI of the terminal device Bind.
  • the first user fingerprint data entered by the same user in the terminal device and the second user fingerprint data entered in the smart home device should be consistent, so that the smart home device authenticates the terminal device.
  • the terminal device can be divided into a host terminal device and a guest terminal device, and the guest terminal device is a terminal device that provides convenience and authorization for the guest who is a guest at home.
  • the user fingerprint data of the host terminal device is the fingerprint data of the home owner, and the user fingerprint data of the guest terminal device may be the fingerprint data of the host or the visitor. If the owner simultaneously enters the fingerprint in the owner terminal device and the guest terminal device, the different fingers should be entered. To distinguish.
  • the master terminal device is generally a permanent access right, the access period is infinitely long, and the guest terminal device is generally a temporary access right. After the access period is exceeded, the access right of the guest terminal device is automatically canceled. Therefore, the access period T can be set in the terminal device, and the terminal device authentication is cancelled when the access period T is exceeded, and the different access period T can be set for the guest terminal device for different smart home devices.
  • S203 Receive a smart home control command input by the user, and determine whether it is within the access period T.
  • the control message sent to the smart home device is generated according to the control command of the user, and the control message is used to instruct the smart home device to implement the related control operation according to the user's command.
  • the first user fingerprint data and the IMEI of the terminal device are encrypted by using the first authentication key and the encryption algorithm stored in the secure boot module.
  • a part of the first user fingerprint data is generally sent for the terminal device to recognize
  • the terminal device may intercept the specified part of the first user fingerprint data, obtain the sampled first user fingerprint data, and use the first authentication key and the encryption algorithm stored in the secure startup module to sample the first user fingerprint data. Encrypt and encrypt the IMEI at the same time.
  • S206 Send the authentication data to the smart home device to trigger the smart home device to implement terminal device authentication according to the authentication data, where the authentication data includes the encrypted first user fingerprint data, the encrypted IMEI, and the control message.
  • the terminal device After the terminal device encrypts the first user fingerprint data (or the sampled first user fingerprint data) and the IMEI, the first user fingerprint data, the IMEI, and the control message generated in step S204 are configured to be sent into the authentication data.
  • the authentication data triggers smart home devices to implement terminal device authentication.
  • the communication message between the terminal device and the smart home device needs to be forwarded by the intelligent routing device, and the terminal device sends the authentication data to the intelligent routing device, and then the intelligent routing device forwards the authentication data to the smart home device.
  • the terminal device may delete the stored user fingerprint data after the T time, so as to save storage space of the terminal device and better control access rights of the terminal device.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint matching and data encryption to authenticate the terminal of the smart home system, thereby greatly improving the security of the smart home system, thereby preventing the illegal user and the terminal from intruding into the smart home system.
  • the terminal device authentication is started, that is, the authentication data is sent to the smart home device, otherwise the terminal device authentication is cancelled, and the access authority of the terminal device can be effectively controlled, and further Enhance the security of smart home systems.
  • the third embodiment of the present invention provides a method for device authentication of a smart home system, which is used in a smart home device.
  • a method for device authentication of a smart home system according to Embodiment 3 of the present invention may include the following. step:
  • S301 Acquire second user fingerprint data of the terminal device, and set a second authentication password of the terminal device.
  • the key and decryption algorithm and store the IMEI of the terminal device, the second user fingerprint data, the second authentication key, and the decryption algorithm.
  • the terminal device in the smart home system controls and manages the smart home device to be authenticated by the smart home device.
  • the embodiment of the invention provides a method for combining fingerprint matching and data encryption to implement authentication of the terminal device.
  • the terminal device and the smart home device should obtain user fingerprint data for authenticating the terminal device, where the user enters the first user fingerprint data in the terminal device, and the second user fingerprint data is entered in the smart home device, in the smart
  • the second user fingerprint data in the home device is bound to the IMEI of the terminal device.
  • the terminal device is authenticated and authenticated by using the fingerprint data of the user, and the user inputs the first user fingerprint data and the second user fingerprint data in the terminal device and the smart home device respectively, and the same user is at the terminal.
  • the first user fingerprint data entered by the device and the second user fingerprint data entered in the smart home device should be consistent, so that the smart home device authenticates the terminal device.
  • the terminal device can be divided into a host terminal device and a guest terminal device, and the guest terminal device is a terminal device that provides convenience and authorization for the guest who is a guest at home.
  • the user fingerprint data of the host terminal device is the fingerprint data of the home owner, and the user fingerprint data of the guest terminal device may be the fingerprint data of the host or the visitor. If the owner simultaneously enters the fingerprint in the owner terminal device and the guest terminal device, the different fingers should be entered. To distinguish.
  • a second authentication key and a decryption algorithm are set in the smart home device for decrypting the first user fingerprint data sent by the terminal device and the IMEI of the terminal.
  • the decryption algorithm set in the smart device and the encryption algorithm set in the terminal device are inverse algorithms for the same terminal device to ensure successful decryption.
  • the second authentication key may be a public key or a different private key of each terminal device, and the second authentication key decryption algorithm may be fixedly set or may be negotiated between the terminal device and the smart home device.
  • the embodiment of the present invention is not limited to how to set the authentication key and the encryption and decryption algorithm.
  • the second user fingerprint data, the second authentication key, and the decryption algorithm may be stored in a Security Boot module in the smart home device that can ensure data security.
  • S302. Receive authentication data sent by the terminal device, and use the second authentication of the stored terminal device.
  • the key and decryption algorithm decrypts the first user fingerprint data and the IMEI in the authentication data sent by the terminal device.
  • the communication message between the terminal device and the smart home device needs to be forwarded by the intelligent routing device, and the terminal device sends the authentication data to the intelligent routing device, and the intelligent routing device forwards the authentication data to the smart home device, and the smart home device
  • the authentication data sent by the terminal device is received from the intelligent routing device.
  • the smart home device When the smart home device receives the authentication data sent by the terminal device, first decrypting the first user fingerprint data and the IMEI in the authentication data sent by the terminal device by using the stored second authentication key and the decryption algorithm.
  • the smart home device After the smart home device decrypts the first user fingerprint data and the IMEI in the authentication data, the decrypted IMEI is verified, and the decrypted first user fingerprint data is verified.
  • the smart home device first verifies the IMEI by comparing the decrypted IMEI with the stored IMEI of the terminal device. If the decrypted IMEI is consistent with the IMEI of the stored terminal device, it is determined that the decrypted IMEI passes the verification. If the decrypted IMEI does not match the IMEI of the stored terminal device, it is determined that the decrypted IMEI has not passed the verification.
  • the smart home device then verifies the first user fingerprint data according to the second user fingerprint data bound by the IMEI.
  • part of the user fingerprint data is generally used as a basis for terminal device authentication, and the smart home device intercepts the IMEI binding. a specified part of the second user fingerprint data to obtain the sampled second user fingerprint data, and compare the decrypted first user fingerprint data with the sampled second user fingerprint data, if the decrypted first user fingerprint data Consistent with the sampled second user fingerprint data, determining that the decrypted first user fingerprint data passes the verification, and if the decrypted first user fingerprint data is inconsistent with the sampled second user fingerprint data, determining the first decrypted data User fingerprint data failed verification.
  • the smart home device determines that the terminal device authentication is successful, and executes the user's control command according to the control message in the authentication data.
  • the terminal device fails to authenticate, and the control command of the user is not executed according to the control message in the authentication data.
  • the terminal device authentication fails, and the user's control command is not executed according to the control message in the authentication data.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint matching and data encryption to authenticate the terminal of the smart home system, thereby greatly improving the security of the smart home system, thereby preventing the illegal user and the terminal from intruding into the smart home system. Is a highly secure terminal device authentication mechanism.
  • a fourth embodiment of the present invention provides a method for device authentication of a smart home system, which is used in a smart home device.
  • a method for device authentication of a smart home system according to Embodiment 4 of the present invention may include the following. step:
  • the terminal device and the smart home device should obtain user fingerprint data for authenticating the terminal device, where the user enters the first user fingerprint data in the terminal device, and the second user fingerprint data is entered in the smart home device, in the smart
  • the second user fingerprint data in the home device is bound to the IMEI of the terminal device.
  • the first user fingerprint data entered by the same user in the terminal device and the second user fingerprint data entered in the smart home device should be consistent, so that the smart home device authenticates the terminal device.
  • a second authentication key and a decryption algorithm are set in the smart home device for decrypting the first user fingerprint data sent by the terminal device and the IMEI of the terminal.
  • the decryption algorithm set in the smart device and the encryption algorithm set in the terminal device are inverse algorithms for the same terminal device, To ensure successful decryption.
  • the second authentication key may be a public key or a different private key of each terminal device, and the second authentication key decryption algorithm may be fixedly set or may be negotiated between the terminal device and the smart home device.
  • the embodiment of the present invention is not limited to how to set the authentication key and the encryption and decryption algorithm.
  • the terminal device can be divided into a host terminal device and a guest terminal device, and the guest terminal device is a terminal device that provides convenience and authorization for the guest who is a guest at home.
  • the master terminal device is generally a permanent access right, the access period is infinitely long, and the guest terminal device is generally a temporary access right. After the access period is exceeded, the access right of the guest terminal device is automatically canceled. Therefore, the smart home device can set the access period T for the terminal device. If the access period T is exceeded, the terminal device authentication is cancelled. For different smart home devices, different access periods T can be set for the guest terminal device, and the set access period is set. T is bound to the IMEI of the terminal.
  • the communication message between the terminal device and the smart home device needs to be forwarded by the intelligent routing device, and the terminal device sends the authentication data to the intelligent routing device, and the intelligent routing device forwards the authentication data to the smart home device, and the smart home device
  • the authentication data sent by the terminal device is received from the intelligent routing device.
  • the smart home device When the smart home device receives the authentication data sent by the terminal device, first decrypting the first user fingerprint data and the IMEI in the authentication data sent by the terminal device by using the stored second authentication key and the decryption algorithm.
  • the smart home device first verifies the IMEI by comparing the decrypted IMEI with the stored IMEI of the terminal device. If the decrypted IMEI is consistent with the IMEI of the stored terminal device, it is determined that the decrypted IMEI passes the verification. If the decrypted IMEI does not match the IMEI of the stored terminal device, it is determined that the decrypted IMEI has not passed the verification.
  • the smart home device determines that the terminal device authentication fails, and does not execute the user's control command according to the control message in the authentication data.
  • the smart terminal device acquires the access period T bound to the IMEI, and verifies whether the terminal device has the access right, that is, whether it is within the access period.
  • the terminal device can be authenticated.
  • the smart home device verifies the first user fingerprint data according to the second user fingerprint data bound by the IMEI.
  • part of the user fingerprint data is generally used as a basis for terminal device authentication, and the smart home device intercepts the IMEI binding.
  • Specifying a portion of the second user fingerprint data to obtain the sampled second user fingerprint data and comparing the decrypted first user fingerprint data with the sampled second user fingerprint data, if the decrypted first user fingerprint data and If the sampled second user fingerprint data is consistent, it is determined that the decrypted first user fingerprint data passes the verification, and if the decrypted first user fingerprint data is different from the sampled second user fingerprint data, the decrypted first user is determined. The fingerprint data did not pass the check.
  • the smart home device determines that the terminal device authentication is successful, and executes the user's control command according to the control message in the authentication data.
  • the smart home device determines that the terminal device authentication fails, and does not execute the user's control command according to the control message in the authentication data.
  • the stored user fingerprint data of the terminal device may be deleted after the access period T time of the terminal device, so as to save the storage space of the smart home device. And better control access to the terminal device.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint matching and data encryption to authenticate the terminal of the smart home system, thereby greatly improving the security of the smart home system, thereby preventing the illegal user and the terminal from intruding into the smart home system.
  • the smart home device receives the authentication data of the terminal within the access period T, the terminal device is authenticated, otherwise the terminal device authentication fails, thereby effectively controlling the access rights of the terminal device, and further enhancing the security of the smart home system. .
  • the fifth embodiment of the present invention provides a terminal device for implementing the device authentication method of the smart home system proposed by the present invention.
  • the device a00 may include a receiving unit a10, a processing unit a20, and a transmitting unit.
  • the receiving unit a10 is configured to acquire first user fingerprint data.
  • the processing unit a20 is configured to set a first authentication key and a first encryption algorithm, and store first user fingerprint data, a first authentication key, and an encryption algorithm acquired by the receiving unit a10;
  • the receiving unit a10 is further configured to receive a smart home control command input by the user, and generate a control message sent to the smart home device according to the smart home control command;
  • the processing unit a20 is further configured to encrypt the first user fingerprint data and the IMEI of the terminal device by using the stored first authentication key and an encryption algorithm;
  • the sending unit a30 is configured to send the authentication data to the smart home device to trigger the smart home device to implement terminal device authentication according to the authentication data, where the authentication data includes the encrypted first user fingerprint data, the encrypted IMEI, and the control message.
  • the specific implementation method for the processing unit a20 to encrypt the first user fingerprint data and the IMEI of the terminal device by using the stored first authentication key and the encryption algorithm is to intercept the specified part of the stored first user fingerprint data to obtain the sampled First user fingerprint data; the sampled first user fingerprint data and IMEI are encrypted using the stored first authentication key and encryption algorithm.
  • the processing unit a20 is further configured to set an access period T of the terminal device; when the receiving unit receives the smart home control command input by the user, determine whether it is within the access period T, if the access period T Then, the control message sent to the smart home device is generated according to the smart home control command; if not within the access period T of the terminal, the terminal device authentication is ended.
  • the processing unit a20 is further configured to delete the stored user fingerprint data after the access period T.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint and data encryption to authenticate the terminal of the smart home system, which can greatly improve the security of the smart home system, thereby preventing illegal users and terminals from intruding into the smart home system. It is a highly secure terminal device authentication mechanism.
  • the sixth embodiment of the present invention provides a smart home device for implementing the device authentication method of the smart home system proposed by the present invention.
  • the device b00 may include a receiving unit b10 and a processing unit b20.
  • a receiving unit b10 configured to acquire second user fingerprint data of the terminal device
  • a processing unit b20 configured to set a second authentication key and a decryption algorithm of the terminal device, and store an IMEI of the terminal device, second user fingerprint data acquired by the receiving unit b10, a second authentication key, and a decryption algorithm;
  • the receiving unit b10 is further configured to receive the authentication data sent by the terminal device;
  • the processing unit b20 is further configured to:
  • the terminal device If the decrypted IMEI passes the verification, and the decrypted first user fingerprint data passes the verification, the terminal device is successfully authenticated, and the user's control command is executed according to the control message in the authentication data;
  • the terminal device authentication fails, and the user's control command is not executed according to the control message in the authentication data.
  • the specific method for the processing unit b20 to verify the decrypted IMEI is to compare the decrypted IMEI with the stored IMEI of the terminal device, and if the decrypted IMEI matches the IMEI of the stored terminal device, determine the decrypted IMEI passes verification, if the decrypted IMEI and the end of storage If the IMEI of the end device is inconsistent, it is determined that the decrypted IMEI has not passed the check.
  • the specific method for verifying the decrypted first user fingerprint data by the processing unit b20 is: intercepting a specified part of the second user fingerprint data of the stored terminal device to obtain the sampled second user fingerprint data; Comparing the first user fingerprint data with the sampled second user fingerprint data, and if the decrypted first user fingerprint data is consistent with the sampled second user fingerprint data, determining that the decrypted first user fingerprint data passes the verification, if After the decrypted first user fingerprint data is inconsistent with the sampled second user fingerprint data, it is determined that the decrypted first user fingerprint data fails the verification.
  • the processing unit b20 is further configured to set an access period T of the terminal device
  • the decrypted first user fingerprint data is verified. If the decrypted user fingerprint data passes the verification, the terminal authentication succeeds, and if the decrypted first user fingerprint data is not After verification, the terminal device authentication fails.
  • the processing unit b20 is further configured to delete the second user fingerprint data of the stored terminal device after the access period T of the terminal device.
  • the technical solution proposed by the present invention adopts a combination of user fingerprint matching and data encryption to authenticate the terminal of the smart home system, thereby greatly improving the security of the smart home system, thereby preventing the illegal user and the terminal from intruding into the smart home system. Is a highly secure terminal device authentication mechanism.
  • the seventh embodiment of the present invention provides another terminal device for implementing the device authentication method of the smart home system proposed by the present invention.
  • the device c00 includes a processor c10, a memory c20, a bus system c30, a receiver c40, and a transmitter c50.
  • the processor c10, the memory c20, the receiver c40 and the transmitter c50 are connected by a bus system c30 for storing instructions for executing the instructions stored in the memory c20 to control the receiver c40 to receive.
  • Signal, and control transmitter c50 to send a signal to complete the steps in the above mobile payment method.
  • the receiver c40 and the transmitter c50 may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the method steps performed by the device c00 may at least include:
  • the authentication data is sent to the smart home device to trigger the smart home device to implement terminal device authentication according to the authentication data, where the authentication data includes the encrypted first user fingerprint data, the encrypted IMEI, and the control message.
  • the device d00 includes a processor d10, a memory d20, a bus system d30, a receiver d40, and a transmitter d50.
  • the processor d10, the memory d20, the receiver d40 and the transmitter d50 are connected by a bus system d30 for storing instructions, and the processor d10 is configured to execute the instructions stored in the memory d20 to control the receiver d40 to receive Signal, and control the transmitter d50 to send a signal to complete the steps in the above mobile payment method.
  • the receiver d40 and the transmitter d50 may be the same or different physical entities. When they are the same physical entity, they can be collectively referred to as transceivers.
  • the method steps performed by the device d00 may at least include:
  • Receiving authentication data sent by the terminal device decrypting the first user fingerprint data and the IMEI in the authentication data sent by the terminal device by using the second authentication key and the decryption algorithm of the stored terminal device;
  • the terminal device If the decrypted IMEI passes the verification, and the decrypted first user fingerprint data passes the verification, the terminal device is successfully authenticated, and the user's control command is executed according to the control message in the authentication data;
  • the terminal device authentication fails, and the user's control command is not executed according to the control message in the authentication data.
  • aspects of the present invention, or possible implementations of various aspects may be embodied as a system, method, or computer program product.
  • aspects of the invention, or possible implementations of various aspects may take the form of a computer program product, which is a computer readable program code stored in a computer readable medium.
  • the computer readable medium can be a computer readable data medium or a computer readable storage medium.
  • the computer readable storage medium includes, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing, such as random access memory (RAM), read only memory (ROM), Erase programmable read-only memory (EPROM or flash memory), optical fiber, portable read-only memory (CD-ROM).
  • the processor in the computer reads the computer readable program code stored in the computer readable medium such that the processor is capable of performing the various functional steps specified in each step of the flowchart, or a combination of steps; A device that functions as specified in each block, or combination of blocks.
  • the computer readable program code can execute entirely on the user's computer, partly on the user's computer, as a separate software package, partly on the user's local computer and partly on the remote computer, or entirely on the remote computer or server. carried out. It should also be noted that in some alternative implementations, the functions noted in the various steps in the flowcharts or in the blocks in the block diagrams may not occur in the order noted. For example, two steps, or two blocks, shown in succession may be executed substantially concurrently or the blocks may be executed in the reverse order.
  • the disclosed apparatus may be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the functional units is only a logical function division.
  • there may be other division manners for example, multiple units may be combined into the same subsystem.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Manufacturing & Machinery (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)
  • Collating Specific Patterns (AREA)

Abstract

L'invention concerne un procédé d'authentification d'équipement de système de maison intelligente. Le procédé comprend : l'acquisition de premières données d'empreintes digitales d'utilisateur, et la mémorisation des premières données d'empreintes digitales d'utilisateur, d'une première clé d'authentification et d'un premier algorithme de chiffrement ; la réception d'une instruction de commande de maison intelligente entrée par un utilisateur, et la génération d'un message de commande ; le chiffrement des premières données d'empreintes digitales d'utilisateur et d'une IMEI d'un équipement terminal au moyen de la première clé d'authentification et du premier algorithme de chiffrement mémorisés ; et l'envoi de données d'authentification à un équipement de maison intelligente, de manière à déclencher l'équipement de maison intelligente afin de réaliser une authentification d'équipement terminal en fonction des données d'authentification, les données d'authentification incluant les premières données d'empreintes digitales d'utilisateur chiffrées, l'IMEI chiffrée et le message de commande. Dans la présente invention, au moyen du procédé d'authentification d'équipement combinant la comparaison d'empreintes digitales et le chiffrement de données, la sécurité du système de maison intelligente peut être grandement améliorée, et les utilisateurs et terminaux non autorisés ne peuvent pas pénétrer dans le système de maison intelligente.
PCT/CN2015/091334 2015-07-29 2015-09-30 Procédé et appareil d'authentification d'équipement de système de maison intelligente Ceased WO2017016065A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510454770.8 2015-07-29
CN201510454770.8A CN105141584B (zh) 2015-07-29 2015-07-29 一种智能家居系统的设备认证方法及装置

Publications (1)

Publication Number Publication Date
WO2017016065A1 true WO2017016065A1 (fr) 2017-02-02

Family

ID=54726793

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/091334 Ceased WO2017016065A1 (fr) 2015-07-29 2015-09-30 Procédé et appareil d'authentification d'équipement de système de maison intelligente

Country Status (2)

Country Link
CN (1) CN105141584B (fr)
WO (1) WO2017016065A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936676A (zh) * 2017-04-20 2017-07-07 青岛海信电器股份有限公司 家居设备控制方法及装置
CN110308663A (zh) * 2019-06-18 2019-10-08 厦门施米德智能科技有限公司 一种智能家居控制系统及其控制方法
CN113918978A (zh) * 2021-10-28 2022-01-11 全民认证科技(杭州)有限公司 一种低功耗高安全性的智能访问控制方法
CN114584983A (zh) * 2022-03-03 2022-06-03 北京亚华物联科技发展有限公司 一种身份认证方法、系统及装置
CN114706315A (zh) * 2022-03-31 2022-07-05 浙江灵鹿智能科技有限公司 智能设备控制系统、方法及存储介质
WO2022140853A1 (fr) * 2020-12-30 2022-07-07 Mastercard Technologies Canada ULC Systèmes, procédés, supports lisibles par ordinateur et dispositifs d'authentification d'utilisateurs
CN117997607A (zh) * 2024-01-16 2024-05-07 青岛国创智能家电研究院有限公司 基于智能家电双内核的跨进程消息预警方法
US12011229B2 (en) 2020-07-15 2024-06-18 Hcl Technologies Limited System and method for providing visual guidance in a medical surgery

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577388A (zh) * 2015-12-31 2016-05-11 金邦达有限公司 一种认证方法、认证装置、器件控制系统
CN105743900B (zh) * 2016-03-04 2019-04-19 广东格兰仕集团有限公司 一种智能家电的安全验证系统以及验证方法
CN105763559B (zh) * 2016-04-12 2018-10-19 北京握奇智能科技有限公司 一种智能家居控制系统及方法
CN107367946B (zh) * 2016-05-11 2021-05-04 珠海格力电器股份有限公司 控制设备的方法及装置
CN106130958B (zh) * 2016-06-08 2019-02-01 美的集团股份有限公司 家电设备与终端的通讯系统及方法、家电设备、终端
CN106773764A (zh) * 2016-12-30 2017-05-31 深圳智乐信息科技有限公司 一种智能家居场景设置和控制的方法及系统
CN106878272A (zh) * 2016-12-30 2017-06-20 深圳智乐信息科技有限公司 基于移动终端管理智能家居的方法及系统
CN106707785A (zh) * 2016-12-30 2017-05-24 深圳智乐信息科技有限公司 基于移动终端的控制方法及系统
CN106845193A (zh) * 2016-12-30 2017-06-13 深圳智乐信息科技有限公司 一种管理智能家居的方法及系统
CN106657655A (zh) * 2016-12-30 2017-05-10 深圳智乐信息科技有限公司 一种控制方法及系统
CN107355140B (zh) * 2017-08-31 2023-04-18 一诺电器有限公司 一种关爱用户隐私的内门锁
CN108712390B (zh) * 2018-04-23 2021-08-31 深圳和而泰数据资源与云技术有限公司 数据处理方法、服务器、智能设备及存储介质
CN111585939B (zh) * 2019-02-18 2023-04-14 深圳市致趣科技有限公司 一种物联网设备间端到端身份认证及通讯加密方法及系统
CN109976171B (zh) * 2019-03-11 2020-12-29 深圳市威尔电器有限公司 全过程记录的血液冷藏冰箱
CN110061894B (zh) * 2019-03-29 2023-09-19 国民技术股份有限公司 一种家居控制方法、系统和家居主控装置
CN110555321B (zh) * 2019-09-11 2021-07-13 腾讯科技(深圳)有限公司 智能家居系统中的数据处理方法、装置及存储介质
CN112987581B (zh) * 2019-12-16 2022-11-11 华为技术有限公司 用于智能家居设备的控制方法及其介质和终端
CN114584412B (zh) * 2020-11-30 2025-05-27 华为技术有限公司 一种获取设备控制权的方法与通信系统
CN113194015A (zh) * 2021-04-29 2021-07-30 洪璐 一种物联网智能家居设备安全控制方法及系统
CN115567565A (zh) * 2021-06-30 2023-01-03 华为技术有限公司 设备控制方法及装置
CN114826574B (zh) * 2022-04-19 2024-10-18 中国电子科技集团公司第三十研究所 智能家居安全通信系统及通信方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624742A (zh) * 2012-04-01 2012-08-01 许继集团有限公司 一种增强移动设备和家庭智能终端之间通信安全的方法
CN103825926A (zh) * 2012-11-19 2014-05-28 五甲(大连)计算机系统研发有限公司 手机作为指纹加密识别终端的智能家电远程控制系统
CN103916696A (zh) * 2014-03-05 2014-07-09 东莞中山大学研究院 一种基于家庭网关实现对智能电视播放控制的方法及系统
CN104732129A (zh) * 2015-02-15 2015-06-24 金硕澳门离岸商业服务有限公司 移动终端控制电子设备进行操作的方法及该移动终端
CN104754571A (zh) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 用于多媒体数据传输的用户认证实现方法、装置及其系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468937A (zh) * 2013-09-12 2015-03-25 中兴通讯股份有限公司 移动终端的数据加、解密方法、装置及保护系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624742A (zh) * 2012-04-01 2012-08-01 许继集团有限公司 一种增强移动设备和家庭智能终端之间通信安全的方法
CN103825926A (zh) * 2012-11-19 2014-05-28 五甲(大连)计算机系统研发有限公司 手机作为指纹加密识别终端的智能家电远程控制系统
CN104754571A (zh) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 用于多媒体数据传输的用户认证实现方法、装置及其系统
CN103916696A (zh) * 2014-03-05 2014-07-09 东莞中山大学研究院 一种基于家庭网关实现对智能电视播放控制的方法及系统
CN104732129A (zh) * 2015-02-15 2015-06-24 金硕澳门离岸商业服务有限公司 移动终端控制电子设备进行操作的方法及该移动终端

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936676A (zh) * 2017-04-20 2017-07-07 青岛海信电器股份有限公司 家居设备控制方法及装置
CN110308663A (zh) * 2019-06-18 2019-10-08 厦门施米德智能科技有限公司 一种智能家居控制系统及其控制方法
US12011229B2 (en) 2020-07-15 2024-06-18 Hcl Technologies Limited System and method for providing visual guidance in a medical surgery
WO2022140853A1 (fr) * 2020-12-30 2022-07-07 Mastercard Technologies Canada ULC Systèmes, procédés, supports lisibles par ordinateur et dispositifs d'authentification d'utilisateurs
US12034562B2 (en) 2020-12-30 2024-07-09 Mastercard Technologies Canada ULC Systems, methods, computer-readable media, and devices for authenticating users
CN113918978A (zh) * 2021-10-28 2022-01-11 全民认证科技(杭州)有限公司 一种低功耗高安全性的智能访问控制方法
CN114584983A (zh) * 2022-03-03 2022-06-03 北京亚华物联科技发展有限公司 一种身份认证方法、系统及装置
CN114706315A (zh) * 2022-03-31 2022-07-05 浙江灵鹿智能科技有限公司 智能设备控制系统、方法及存储介质
CN117997607A (zh) * 2024-01-16 2024-05-07 青岛国创智能家电研究院有限公司 基于智能家电双内核的跨进程消息预警方法

Also Published As

Publication number Publication date
CN105141584B (zh) 2019-01-11
CN105141584A (zh) 2015-12-09

Similar Documents

Publication Publication Date Title
WO2017016065A1 (fr) Procédé et appareil d'authentification d'équipement de système de maison intelligente
CN105516103B (zh) 绑定智能家电设备的方法、装置和系统
WO2015180261A1 (fr) Procédé d'accès à une maison intelligente, dispositif centre de commande, et terminal portable
KR101878708B1 (ko) 보안성이 강화된 레지덴셜 게이트웨이 장치를 이용한 스마트 가전기기의 에너지 관리 시스템
CN105100102B (zh) 一种权限配置以及信息配置方法和装置
CN103401880B (zh) 一种工业控制网络自动登录的系统及方法
EP3668120B1 (fr) Dispositif d'aide auditive doté d'un mode de service et procédé associé
CN113114668B (zh) 一种信息传输方法、移动终端、存储介质及电子设备
KR101876183B1 (ko) IoT 기반의 보안성이 강화된 레지덴셜 게이트웨이 장치
US11546699B2 (en) Hearing device with service mode and related method
CN114221822B (zh) 配网方法、网关设备以及计算机可读存储介质
WO2016201811A1 (fr) Procédé, appareil et système d'authentification d'identité
CN108650219B (zh) 一种用户身份识别方法、相关装置、设备和系统
CN109413648B (zh) 访问控制方法、终端、智能卡、后台服务器及存储介质
CN109005571A (zh) 一种建立WiFi连接的方法、装置及系统
CN103152326A (zh) 一种分布式认证方法及认证系统
US20240372855A1 (en) Techniques for signing into a user account using a trusted client device
US20220407867A1 (en) Proof of authority based access to devices on a network with local token acquisition
WO2017020530A1 (fr) Procédé, dispositif et système d'authentification de certificat de réseau local sans fil (wlan) améliorés
CN110932951B (zh) 一种智能家居控制方法和装置
CN107682380B (zh) 一种交叉认证的方法及装置
CN109639418A (zh) 一种配置信息的认证方法、装置及租赁汽车
CN104579639A (zh) 多方协同授权密匙的实现及用其进行移动无线控制的系统
JP2024501696A (ja) ロック解除通知のインテリジェントな構成
CN106656946B (zh) 一种动态鉴权方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15899417

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15899417

Country of ref document: EP

Kind code of ref document: A1