WO2019160304A1 - Système et procédé de télécommande reposant sur une balise applicables à un environnement basse puissance ayant une sécurité de haut niveau - Google Patents

Système et procédé de télécommande reposant sur une balise applicables à un environnement basse puissance ayant une sécurité de haut niveau Download PDF

Info

Publication number
WO2019160304A1
WO2019160304A1 PCT/KR2019/001710 KR2019001710W WO2019160304A1 WO 2019160304 A1 WO2019160304 A1 WO 2019160304A1 KR 2019001710 W KR2019001710 W KR 2019001710W WO 2019160304 A1 WO2019160304 A1 WO 2019160304A1
Authority
WO
WIPO (PCT)
Prior art keywords
random number
receiver
transmitter
control signal
beacon
Prior art date
Application number
PCT/KR2019/001710
Other languages
English (en)
Korean (ko)
Inventor
김은서
김도형
Original Assignee
주식회사 커널로그
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 커널로그 filed Critical 주식회사 커널로그
Publication of WO2019160304A1 publication Critical patent/WO2019160304A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present invention relates to a beacon-based remote control system and method, and more particularly to a beacon-based remote control system and method having a high level of security applicable in a low power environment.
  • Beacon is a short-range wireless communication device or a wireless communication method based on the Bluetooth 4.0 (BLE) protocol, and can communicate with devices within a maximum of 70m. High accuracy, low power consumption, inexpensive and small enough to distinguish 5 ⁇ 10cm units is suitable for the IoT, where all the devices are always connected.
  • BLE Bluetooth 4.0
  • beacons are relatively suitable for O2O services that connect online and offline because they support relatively long distance communication. Since both one-to-many and many-to-many services are possible, various active services such as advertisement and information transmission, home automation, and payment according to the user's taste can be provided. Recently, a beacon in the form of a sticker has also been developed, which can be used in various ways for remote control necessary to implement the Internet of Things, and it is also possible to remotely grasp the state of a crop or a machine by installing a beacon attached with an acceleration sensor or a temperature and humidity sensor.
  • beacons that are remotely controlled often require low power such that pairing is difficult.
  • communication consumes a lot of power, it is required to develop a beacon-based protocol that can have a high security level while reducing the number of communication.
  • Korean Patent No. 10-1796144 name of the invention: a user terminal, a remote control server and a user terminal control method using a beacon signal, published date: November 10, 2017
  • 10-2017-0130066 name of the invention: beacon attached remote control device location notification system via a mobile terminal, published date: November 28, 2017
  • the present invention has been proposed to solve the above problems of the conventionally proposed methods, the transmitter and receiver sharing the symmetric key, to enhance the security by using a random number and symmetric key encryption scheme, to transmit control signals, random numbers
  • the beacon with the high level of security that can be applied in the low power environment, which can be used at low power by applying the high level of security technology by reducing the number of times of high power consumption It is an object of the present invention to provide a remote control system and method.
  • the present invention by using the random number generator to store the random number generated in advance in the random number pool, and by using the random number stored in the random number pool in the random number transfer, by minimizing the reception waiting time of the transmitter to reduce power consumption It is another object of the present invention to provide a beacon-based remote control system and method having a high level of security applicable in a low power environment, which can be reduced and prevents security threats through random number generation prediction by a random number generator. .
  • a beacon-based remote control system having a high level of security applicable in a low power environment according to the characteristics of the present invention for achieving the above object
  • the transmitting unit transmits a control signal and receives a random number value from the receiving unit while waiting to receive, and transmits a ciphertext encrypted by using the shared symmetric key to the receiving unit,
  • the receiving unit receives the control signal from the transmitting unit, checks the MAC address received together with the control signal, and transmits the generated random number value to the transmitting unit, and decrypts the cipher text received from the transmitting unit to decrypt the random number value. If this coincides with each other, the control is performed using the received control signal.
  • the transmitting unit Preferably, the transmitting unit,
  • control signal may be transmitted again.
  • the transmitting unit Preferably, the transmitting unit,
  • the cipher text may be generated using the shared symmetric key.
  • the transmitting unit Preferably, the transmitting unit,
  • the random number value may be encrypted using an AES encryption algorithm.
  • the transmitting unit Preferably, the transmitting unit,
  • the random number received from the receiver and the data to be transmitted may be encrypted by using the symmetric key and transmitted.
  • the receiving unit Preferably, the receiving unit, the
  • the random number generator may store the random number generated in advance in the random number pool. If the MAC addresses match, the random number value may be taken in advance and stored in the random number pool and transmitted to the transmitter.
  • the receiving unit Preferably, the receiving unit, the
  • the received information is a control signal or a cipher text while waiting for reception.
  • a beacon-based remote control method having a high level of security applicable in a low power environment according to the characteristics of the present invention for achieving the above object
  • a remote control method for controlling a receiver using a beacon-based transmitter
  • the transmitting unit receiving a random number value from the receiving unit, encrypting the received random number value using a symmetric key shared by the transmitting unit and the receiving unit, and transmitting an encrypted cipher text to the receiving unit;
  • the reception unit decrypts the cipher text received from the transmission unit and, if the random number values match, executes control using the received control signal.
  • a transmitter and a receiver sharing a symmetric key can be secured using a random value and a symmetric key encryption scheme.
  • the receiver stores the random number generated in advance by using a random number generator in the random number pool, and by using the random number stored in the random number pool when the random number is transmitted, the power consumption by minimizing the reception waiting time of the transmitter Can be reduced, and security threats can be prevented through random number generation prediction by the random number generator.
  • FIG. 1 is a diagram showing the configuration of a beacon-based remote control system having a high level of security applicable in a low power environment according to an embodiment of the present invention.
  • FIG. 2 is a diagram illustrating an operation flow of a transmitter and a receiver in a beacon-based remote control system having a high level of security applicable in a low power environment according to an embodiment of the present invention.
  • FIG. 3 is a diagram illustrating a flow of a beacon-based remote control method having a high level of security applicable in a low power environment according to an embodiment of the present invention.
  • step S200 is a diagram illustrating a detailed flow of step S200 in the beacon-based remote control method having a high level of security applicable in a low power environment according to an embodiment of the present invention.
  • step S300 is a detailed flow diagram of step S300 in the beacon-based remote control method having a high level of security applicable in a low power environment according to an embodiment of the present invention.
  • Receiving unit receives a control signal and checks the MAC address and transmits a random number
  • S300 a step in which the transmission unit receives the random number value and encrypts it
  • a beacon-based remote control system 100 having a high level of security applicable in a low power environment according to an embodiment of the present invention may include a receiver (eg, a beacon-based transmitter 110).
  • the remote control system 100 controlling the 120 may include a transmitter 110 and a receiver 120 sharing a symmetric key.
  • the transmitter 110 and the receiver 120 enhance security by using a random number value and a symmetric key encryption method, and minimize the number of communication by transmitting a control signal, receiving a random number value, and transmitting a cipher text, thereby consuming power. It can be applied at low power by reducing the number of communication times, and can enhance security.
  • the transmitter 110 and the receiver 120 may transmit and receive data based on the Bluetooth 4.0 protocol, which is one of short-range wireless communication.
  • the transmitter 110 may transmit a control signal and receive a random number value from the receiver 120 while waiting to receive the signal, and may transmit a ciphertext encrypted using the shared symmetric key to the receiver 120.
  • the transmitter 110 may be a transmitter 110 of the beacon device that requires low power.
  • the receiver 120 is a receiver 120 of the control target device, and the control target device receives a control signal from the beacon apparatus through the receiver 120 and performs an operation according to the control signal, thereby performing remote control by the beacon apparatus. Can be implemented.
  • the receiving unit 120 receives a control signal from the transmitting unit 110, checks the received MAC address together with the control signal, and transmits the generated random number value to the transmitting unit 110 if it matches.
  • the control may be executed using the received control signal. For example, various controls including on / off of a light and on / off of a device can be executed.
  • the MAC address means a unique address of the device, and may include an address uniquely assigned by a user or an administrator, in addition to a unique address previously assigned by the manufacturer. In other words, if the MAC address is unique information that can identify the device, the MAC address may serve as the MAC address of the present invention regardless of the person giving the information or the specific characteristic of the information.
  • each component of the beacon-based remote control system 100 having a high level of security applicable in a low power environment according to an embodiment of the present invention will be described in detail. .
  • FIG. 2 is a view illustrating an operation flow of the transmitter 110 and the receiver 120 in the beacon-based remote control system 100 having a high level of security applicable in a low power environment according to an embodiment of the present invention. to be.
  • the beacon-based remote control system 100 having a high level of security applicable in a low power environment according to an embodiment of the present invention the most preferable case while maintaining a high level of security Remote control is possible with only three data transmission / reception (control signal, random number and cipher text).
  • the transmitter 110 of the beacon apparatus may be turned on and a control signal may be transmitted.
  • the control signal may be various signals including on / off signals of various devices.
  • the control signal may be transmitted by attaching a MAC address of the transmitter 110.
  • the receiver 120 When the receiver 120 is in the standby state and receives the control signal from the transmitter 110, the receiver 120 may check whether the MAC address attached to the control signal matches. If the MAC address is different from the MAC address of the transmitter 110 which is supposed to transmit the control signal, the MAC address may return to the standby state without further progressing.
  • the receiver 120 may transmit a random number generated by the random number generator to the transmitter 110, and the MAC address of the receiver 120 may be attached to the random number.
  • the receiver 120 may generate a random number in the random number generator and transmit the random number to the transmitter 110 when the random number is needed, but stores the random number generated in advance by using the random number generator in the random number pool, and the MAC address matches. If so, the random number stored in advance in the random number pool may be transmitted to the transmitter 110. More specifically, about 1000 random numbers may be generated and stored in advance in the random number pool.
  • the receiver 120 may bring 8 random numbers of 8 random numbers and transmit them to the transmitter 110. have.
  • the receiver 120 stores a random number generated in advance by using a random number generator in a random number pool, and uses random numbers prestored in the random number pool when random numbers are transmitted, thereby predicting random number generation by the random number generator. Security threats can be prevented, and the random number can be transmitted quickly, thereby minimizing reception waiting time of the transmitter 110 and reducing power consumption.
  • the transmitter 110 is in a reception standby state to transmit a control signal and receive a random value from the receiver 120, and when a predetermined time elapses, the transmitter 110 may report that the random number has failed to be transmitted and transmit the control signal again.
  • the predetermined time is set to a very short time such as 1 ms, so that quick remote control can be enabled.
  • the transmitter 110 When the transmitter 110 receives a random value from the receiver 120 while waiting for reception, it checks the MAC address received from the receiver 120 together with the random number, and if it matches, generates a cipher text using a shared symmetric key. have. That is, when the transmitter 110 receives a random value from the receiver 120, the transmitter 110 checks the MAC address of the receiver 120, and when the MAC address mismatches, the transmitter 110 returns to the reception standby state.
  • the transmitter 110 returns to the reception standby state again. If it takes 0.2 ms to check the MAC address, it waits an additional 0.3 ms in a waiting state, and if a random value is not received even during 0.3 ms, it may be regarded as having failed to receive a random number and may transmit a control signal again.
  • the transmitter 110 may transmit the encrypted text encrypted with the received random number value using the shared symmetric key to the receiver 120.
  • the transmitter 110 may use various symmetric key encryption algorithms, and more specifically, may encrypt random numbers using the AES encryption algorithm.
  • the transmitter 110 may encrypt and transmit the random number value and the transmission target data received from the receiver 120 using a symmetric key. That is, when there is data to be transmitted to the receiver 120 (that is, data to be transmitted) by the transmitter 110, the transmitter 110 may encrypt the data to be transmitted together with a random number and transmit the data to the receiver 120.
  • the transmission target data may include private data such as financial information.
  • the transmission unit 110 that transmits the cipher text can be immediately terminated to maintain a low power.
  • Receiving unit 120 determines whether the information received during the reception after the transmission of the random number value is a control signal or a cipher text, and if the determination result is a cipher text, decrypts the cipher text received from the transmitter 110, if the random number value is matched, Control can be performed using control signals. For example, if the control signal is an ON signal of a lamp, the lighting control can be executed. On the other hand, if the determination result is a control signal, the receiver 120 may execute again from the process of confirming the MAC address. At this time, the receiver 120 may determine the signal that is not the control signal as an unconditional cipher text.
  • the reception unit 120 may check the MAC address even when receiving the cipher text, and may wait to receive until a signal matching the MAC address is received.
  • a beacon-based remote control method having a high level of security applicable in a low power environment may include: transmitting, by the transmitter 110, a control signal and waiting to be received.
  • the receiving unit 120 receives the control signal and checks the MAC address and transmits a random number value (S200), the transmitting unit 110 receives and encrypts and transmits the random number value (S300) and the receiving unit (
  • the control may be implemented by using the control signal (S400).
  • the transmitter 110 may transmit a control signal and wait for reception. In this case, the transmitter 110 may transmit the control signal and transmit the control signal again when a predetermined time elapses in the reception standby state.
  • step S200 when the receiving unit 120 receives the control signal from the transmitting unit 110 and checks and matches the received MAC address with the control signal, the receiving unit 120 may transmit the random number stored in advance to the transmitting unit 110 to the transmitting unit 110. have.
  • the detailed flow of step S200 will be described in detail later with reference to FIG. 4.
  • step S300 the transmitter 110 receives a random value from the receiver 120, encrypts the received random number using a symmetric key shared between the transmitter 110 and the receiver 120, and encrypts the encrypted cipher text.
  • the receiver 120 may transmit the data. The detailed flow of step S300 will be described in detail later with reference to FIG. 5.
  • step S400 when the reception unit 120 decrypts the cipher text received from the transmission unit 110 and the random numbers match, the reception unit 120 may execute control using the received control signal. That is, in step S400, the receiver 120 may transmit a control signal to a controller (not shown) of the control target device so that remote control by the control signal is executed.
  • the receiving unit 120 is in the reception waiting state after the transmission of the random number value in step S200, and determines whether the information received by the receiving unit 120 in the reception standby state is a control signal or a cipher text, and if the determination result control step S400 You can go back to step S200 to check your Mac address without running.
  • step S200 of the beacon-based remote control method having a high level of security applicable in a low power environment according to an embodiment of the present invention the receiver 120, from the transmitter 110 Receiving a control signal (S210), the step of checking whether the MAC address match (S220) and transmitting a random value to the transmitter 110 (S230) can be implemented.
  • the receiver 120 may receive a control signal from the transmitter 110.
  • the MAC address of the transmitter 110 may be received together with the control signal.
  • the reception of the control signal may be by a short range wireless communication method based on a beacon.
  • step S220 the receiver 120 may check whether the MAC addresses match. That is, the MAC address received with the control signal in step S210 is checked, and if it matches with the MAC address of the beacon device having the control authority for the control target device, the process proceeds to the next step S230, and if it does not match, the standby state before the step S210 You can go back to
  • the receiver 120 may transmit a random value to the transmitter 110.
  • the reception unit 120 may transmit the random number generated by the random number generator.
  • the reception unit 120 may import the random number generated by using the random number generator and pre-stored in the random number pool, and transmit the random number to the transmitter 110. .
  • step S300 of the beacon-based remote control method having a high level of security applicable in a low power environment according to an embodiment of the present invention the transmitter 110, from the receiver 120 Receiving a random value (S310), a step of checking whether the MAC address match (S320) and the step of encrypting and transmitting the random number using a symmetric key (S330) can be implemented.
  • S310 a random value
  • S320 a step of checking whether the MAC address match
  • S330 the step of encrypting and transmitting the random number using a symmetric key
  • step S310 the transmitter 110 may receive a random value from the receiver 120.
  • the transmitter 110 may receive the random number value of step S310 in the reception standby state of step S100.
  • the transmitter 110 may receive the MAC address of the receiver 120 together with the random number.
  • step S320 the transmitter 110 may check whether the MAC address received from the receiver 120 in step S310 matches. That is, in steps S220 and S320, the transmitter 110 and the receiver 120 may check each other's MAC address, thereby enabling remote control by a legitimate device.
  • step S320 if the transmitter 110 checks the MAC address received from the receiver 120 together with the random number and matches, it executes the next step S330, and if it does not match, the transmitter 110 returns to the reception standby state of step S110 again. have.
  • the transmitter 110 may encrypt and transmit the random number using a symmetric key. That is, in step S330, the cipher text may be generated using a symmetric key shared by the transmitter 110 and the receiver 120. More specifically, the random number value may be encrypted using the AES encryption algorithm.
  • the transmitter 110 may encrypt and transmit the data to be transmitted using a symmetric key together with the random number value received from the receiver 120.
  • the data is encrypted and transmitted together with the random number, so that the security can be strengthened and the data to be transmitted is transmitted together with the random number in one communication. Power consumption by communication can be reduced and economical.
  • the beacon-based remote control system and method having a high level of security applicable in a low power environment according to an embodiment of the present invention, the transmitter 110 and the receiver 120 sharing a symmetric key Security by using random number and symmetric key encryption method, and minimizing the number of communication by transmitting control signal, receiving random value and transmitting cipher text, reducing the number of communication with high power consumption Technology can be applied.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

Selon un système et un procédé de télécommande reposant sur une balise applicables à un environnement basse puissance ayant une sécurité de haut niveau proposés par la présente invention, une unité émettrice et une unité réceptrice partageant une clé symétrique utilisent une valeur de nombre aléatoire et une méthode de chiffrement à clé symétrique pour améliorer la sécurité, et réduire au minimum, par émission d'un signal de commande, réception d'une valeur de nombre aléatoire et émission d'un cryptogramme, le nombre de fois qu'une communication est effectuée. Par conséquent, la présente invention peut réduire le nombre de fois qu'une communication à forte consommation d'énergie est effectuée et permet ainsi l'application d'une technologie de sécurité de haut niveau disponible dans un environnement basse puissance.
PCT/KR2019/001710 2018-02-14 2019-02-12 Système et procédé de télécommande reposant sur une balise applicables à un environnement basse puissance ayant une sécurité de haut niveau WO2019160304A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2018-0018801 2018-02-14
KR1020180018801A KR101909149B1 (ko) 2018-02-14 2018-02-14 저전력 환경에서 적용 가능한 높은 수준의 보안성을 갖는 비콘 기반의 원격 제어 시스템 및 방법

Publications (1)

Publication Number Publication Date
WO2019160304A1 true WO2019160304A1 (fr) 2019-08-22

Family

ID=64099557

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2019/001710 WO2019160304A1 (fr) 2018-02-14 2019-02-12 Système et procédé de télécommande reposant sur une balise applicables à un environnement basse puissance ayant une sécurité de haut niveau

Country Status (2)

Country Link
KR (1) KR101909149B1 (fr)
WO (1) WO2019160304A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487408A (zh) * 2020-12-24 2021-03-12 潍柴动力股份有限公司 用于车内ecu的安全访问方法、系统及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102508448B1 (ko) * 2020-12-28 2023-03-08 연세대학교 산학협력단 적응적 암호화를 이용한 IoT 서비스 방법 및 IoT 장치
KR102299402B1 (ko) * 2021-02-03 2021-09-07 (주)아이지코 비콘 데이터를 이용한 단말기 통제 시스템 및 통제 방법
KR102561784B1 (ko) * 2022-08-30 2023-08-01 주식회사 마크애니 비콘 데이터를 이용한 단말기 통제 시스템 및 통제 방법

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030037145A (ko) * 2001-11-02 2003-05-12 한국전자통신연구원 패스워드 기반 키교환 방법 및 그 시스템
KR20090031154A (ko) * 2007-09-21 2009-03-25 주식회사 케이티 인터넷망에서의 영화감상실 서비스 시스템 및 방법
KR20090042412A (ko) * 2007-10-26 2009-04-30 인하대학교 산학협력단 패스워드 기반 인증 및 키 교환 방법
KR20110011781A (ko) * 2009-07-29 2011-02-09 신용진 맥 어드레스를 이용한 보안 유에스비 메모리 및 이를 이용한 보안 방법

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030037145A (ko) * 2001-11-02 2003-05-12 한국전자통신연구원 패스워드 기반 키교환 방법 및 그 시스템
KR20090031154A (ko) * 2007-09-21 2009-03-25 주식회사 케이티 인터넷망에서의 영화감상실 서비스 시스템 및 방법
KR20090042412A (ko) * 2007-10-26 2009-04-30 인하대학교 산학협력단 패스워드 기반 인증 및 키 교환 방법
KR20110011781A (ko) * 2009-07-29 2011-02-09 신용진 맥 어드레스를 이용한 보안 유에스비 메모리 및 이를 이용한 보안 방법

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MENEZES, A. ET AL.: "Identification and Entity Authentication", HANDBOOK OF APPLIED CRYPTOGRAPHY, 1997, pages 385 - 424 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487408A (zh) * 2020-12-24 2021-03-12 潍柴动力股份有限公司 用于车内ecu的安全访问方法、系统及存储介质
CN112487408B (zh) * 2020-12-24 2022-08-23 潍柴动力股份有限公司 用于车内ecu的安全访问方法、系统及存储介质

Also Published As

Publication number Publication date
KR101909149B1 (ko) 2018-10-17

Similar Documents

Publication Publication Date Title
WO2019160304A1 (fr) Système et procédé de télécommande reposant sur une balise applicables à un environnement basse puissance ayant une sécurité de haut niveau
WO2015126124A1 (fr) Procédé et dispositif pour transmettre et recevoir des informations d'authentification dans un système de communication sans fil
WO2018151390A1 (fr) Dispositif de l'internet des objets
WO2014200240A1 (fr) Procédé et appareil d'enregistrement de dispositif sans fil dans un système de communication sans fil
WO2016137304A1 (fr) Sécurité de bout en bout sur la base de zone de confiance
WO2015041500A1 (fr) Procédé de gestion de sécurité et dispositif de gestion de sécurité dans un système de réseau domestique
WO2010126342A2 (fr) Procédé et système de gestion d'un réseau corporel utilisant un dispositif coordinateur
WO2012044072A2 (fr) Procédé d'attribution de clé utilisateur dans un réseau convergent
WO2015072788A1 (fr) Procédé et appareil de gestion de clé de sécurité dans un système de communication d2d en champ proche
WO2023120906A1 (fr) Procédé permettant de recevoir un micrologiciel et procédé permettant de transmettre un micrologiciel
WO2011152687A2 (fr) Procédé permettant à un dispositif de détecter un autre dispositif
WO2012093900A2 (fr) Procédé et dispositif pour authentifier une entité de réseau personnel
WO2014189262A1 (fr) Méthode d'authentification de terminal d'utilisateur d'un appareil point d'accès
WO2017200291A1 (fr) Procédé et appareil de paiement utilisant une balise
WO2019143212A1 (fr) Appareil électronique, appareil terminal et procédé de commande de celui-ci
WO2017111483A1 (fr) Dispositif d'authentification basée sur des données biométriques, serveur de commande et serveur d'application relié à celui-ci, et procédé de commande associé
WO2019182377A1 (fr) Procédé, dispositif électronique et support d'enregistrement lisible par ordinateur permettant de générer des informations d'adresse utilisées pour une transaction de cryptomonnaie à base de chaîne de blocs
WO2019039795A1 (fr) Répétiteur de climatiseur, système de climatiseur et son procédé de commande
WO2016126023A1 (fr) Appareil de diffusion et procédé d'authentification de données de diffusion
WO2013089427A1 (fr) Procédé et dispositif pour exécuter une instruction de gestion de dispositif sur la base d'un temps d'exécution
WO2020004805A1 (fr) Appareil et procédé pour exécuter une communication de données dans un environnement réseau basé sur un protocole nan
WO2016159496A1 (fr) Procédé de distribution d'application dotée d'une fonction de sécurité ajoutée à celui-ci et son procédé de fonctionnement
WO2022245109A1 (fr) Procédé et dispositif pour réaliser une télémétrie de sécurité à bande ultralarge
WO2018199637A1 (fr) Système d'authentification de sécurité quantique
WO2022035161A1 (fr) Système et procédé de prévention de piratage de réseau informatique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19755194

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19755194

Country of ref document: EP

Kind code of ref document: A1