This application claims the priority of Korean Patent Application No. 10-2004-0081118, filed on Oct. 11, 2004, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein in its entirety by reference.
1. Field of the Invention
The present invention relates to a method and home network system for authentication between a remote terminal and a home network using a smart card, and more particularly, to a home network system connecting a plurality of household appliances via a home server including a server smart card and a method for authentication between a remote user having a client smart card and the home network system through a network.
2. Description of the Related Art
Recently, a home network system has been highlighted.
Referring to
A home network system provides great convenience for users. However, if a safe security system is not supported, great confusion may prevail. The connection between a remote terminal and a conventional home network as shown in
For authentication of a remote user accessing the conventional home network system, verification on access and authority is performed based on an identifier and a password. Accordingly, the identifier and the password must be carefully managed, which may be troublesome. Moreover, since communication data is not encrypted (i.e. plaintext is used in communication), the conventional home network is easily exposed to external attacks and is vulnerable to attacks on a home server.
To overcome these problems, expensive network security equipment has been provided for companies but is costly and burdensome to individuals. Accordingly, a home network system that provides reliable security at low cost and without burden of management is desired.
The present invention provides a method and home network system for authentication and communication between a remote terminal and a home network using a function as a safe storage device and security function of a smart card.
The present invention also provides a method and apparatus for enhancing security in authentication, by which a home network is constructed based on a home server equipped with a smart card to allow household appliances and outside devices to communicate with each other only through the home server so that an external intruder is efficiently blocked out and only a remote user having a smart card issued by the home server is allowed to access the household appliances through the home server.
The present invention also provides an authentication system including only a remote user and a home network without a third element.
According to an aspect of the present invention, there is provided a method for authentication between a remote terminal and a home network, which are connected with each other through a network, using a smart card, the method including enabling access between the remote terminal and the home network through the network, performing authentication using first shared secret data stored in a server smart card connected to the home network and second secret data stored in a client smart card connected to the remote terminal, and when the authentication succeeds, creating a security tunnel between the remote terminal and the home network.
According to another aspect of the present invention, there is provided a method of issuing a client smart card that is connected to a remote terminal and used for authentication between the remote terminal and a home network, the method including connecting the client smart card to be used for the remote terminal to the home network, receiving shared secret data to be shared with the client smart card from a server smart card connected to the home network, and storing the shared secret data received from the server smart card in the client smart card.
According to still another aspect of the present invention, there is provided a home network system which performs authentication between a remote terminal and a home network using a smart card. Here, the home network includes a home server that is connected with a household appliance and a server smart card storing first shared secret data needed for authentication of the remote terminal, and the remote terminal includes a terminal that is connected with a client smart card storing the first shared secret data and second shared secret data needed for the authentication and, when the authentication performed between the remote terminal and the home network using the first shared secret data and the second shared secret data succeeds, controls the home network to operate the household appliance.
The above and other features and advantages of the present invention will become more apparent by describing in detail preferred embodiments thereof with reference to the attached drawings in which:
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the attached drawings. Like reference numerals in the drawings denote like elements.
The network 230 is a data communication network for data exchange and processing between data devices, and particularly, may be an Internet network. However, the present invention is not restricted thereto, and the network 230 may be configured in various forms.
The remote terminal 200 accesses the home network 260 via the network 230 using a terminal 220 connected with a client smart card 210. The remote terminal 200 controls diverse household appliances included in the home network 260. The terminal 220 may be a personal computer (PC) 222, a laptop computer 224, a mobile phone 226, or a personal digital assistant (PDA) 228. The PC 222, the laptop computer 224, the mobile phone 226, and the PDA 228 are just examples of the terminal 220, and diverse modifications can be made by those skilled in the art within the scope of the present invention.
The home network 260 includes a home server 280 connected with a server smart card 290 and a household appliance network 270 which include a plurality of household appliances connected with one another and is connected with the home server 280. The outside can access the household appliances within the home network 260 only through the home server 280. Similarly, the household appliances within the home network 260 can communicate with the outside only through the home server 280.
The home server 280 communicates with the terminal 220 connected with the client smart card 210 using the server smart card 290 and authenticates the remote terminal 200. After the authentication, the home server 280 creates a security tunnel between the remote terminal 200 and the home network 260 and encrypts messages used for communication, which will be described in detail with reference to
The home server 280 functions as an inevitable gateway for communication between the household appliance network 270 and the outside through the network 230 and communication between the network 230 and the household appliance network 270 and thereby blocks out malicious attacks on the home network 260. The home server 280 may further include an intrusion detector to prevent illegitimate access, such as hacking, through the network 230. When it is determined using the intrusion detector connected with the home server 280 that a current access is an illegitimate access that is not predefined by a current protocol, the home server 280 can interrupt the access.
The client smart card 210 and the server smart card 290 are respectively connected to the terminal 220 and the home server 280 through card readers (not shown) and wired/wireless connectors 215 and 285. The home server 280 may include the server smart card 290 therewithin.
Issuing the client smart card 210 to the remote terminal 200 using the home server 280 and the server smart card 290 in the home network system described above will be described with reference to
Next, in operation S320, the home server 280 receives shared secret data to be shared with the client smart card 210 from the server smart card 290. The server smart card 290 generates the shared secret data according to a method defined in a security policy selected when the home network system is configured. It is apparent to those skilled in the art that various security policies can be used without departing from the scope of the present invention.
Next, in operation S340, the home server 280 transmits the shared secret data to the client smart card 210.
Through this procedure, the home network system issues the client smart card 210 that can be connected to the remote terminal 200 using the home server 280 connected with the server smart card 290. As a result, security service can be provided without needing a third element other than the remote terminal 200 and the home network 260 in configuring home network security.
A procedure for safe communication through authentication between the remote terminal 200 and the home server 280 using the client smart card 210 and the server smart card 290 in the home network system having the above-described structure will be described with reference to
Referring to
Next, in operation S410, the home server 280 determines whether the access of the remote terminal 200 is legitimate via the network 230. When the access is determined as illegitimate, the access has been attempted through hacking or other illegitimate ways. Since such illegitimate access is interrupted, a security level of the home network 260 can be increased. Meanwhile, when the access is determined as legitimate, in operation S420 authentication is performed using the client smart card 210 connected with the terminal 220 of the remote terminal 200 and the server smart card 290 connected with the home server 280. For example, the authentication may be performed by determining whether results of performing a security algorithm (i.e., an authentication algorithm) based on the shared secret data transmitted to the client smart card 210 during the procedure shown in
Next, in operation S430, it is determined whether the authentication between the client smart card 210 and the server smart card 290 has succeeded. When it is determined that the authentication has not succeeded, in operation S440 the home server 280 interrupts the access of the remote terminal 200.
However, when it is determined that the authentication has succeeded, in operation S450 a security tunnel is created between the home server 280 and the remote terminal 200. Messages transmitted through the security tunnel between the home server 280 and the remote terminal 200 are encrypted before being transmitted and thus not revealed to the outside. Communication between the remote terminal 200 and the home server 280 is performed through the security tunnel. A method of configuring the security tunnel varies with a type of security algorithm and is not restricted to a particular one.
Next, when the access request is legitimate, in operation S510 the home server 280 of the home network 260 permits an access. In the embodiment illustrated in
If the access is permitted, in operation S520 the terminal 220 requests data needed for authentication from the client smart card 210. In operation S525, the client smart card 210 transmits the data needed for authentication to the terminal 220 in response to the request from the terminal 220. Meanwhile, in operation S530, the home server 280 requests data needed for authentication from the server smart card 290. In operation S535, the server smart card 290 transmits the data needed for authentication to the home server 280 in response to the request from the home server 280.
Thereafter, in operation S540, the terminal 220 and the home server 280 perform authentication. For the authentication, an authentication algorithm is performed using a shared secret data shared by the client smart card 210 and the server smart card 290. As described above, the authentication algorithm is not restricted to a particular one.
When the authentication succeeds, in operation S550 a security tunnel is created between the terminal 220 of the remote terminal 200 and the home server 280 of the home network 260. A method of creating the security tunnel is not restricted to a particular one.
A home network system using a smart card and operations thereof according to the present invention have been described by explaining examples shown in the attached drawings. However, they may change a little according to a security algorithm performed between a client smart card and a server smart card. Accordingly, the present invention will not be restricted by the attached drawings.
The invention can also be embodied as computer readable codes on a computer readable recording medium. The computer readable recording medium is any data storage device that can store data which can be thereafter read by a computer system. Examples of the computer readable recording medium include read-only memory (ROM), random-access memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (such as data transmission through a network). The computer readable recording medium can also be distributed over network coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
The present invention provides a strict authentication method including mutual authentication between a home network and a remote terminal using a security function of a smart card and creates a safe security tunnel between the remote terminal and a home server for communication therebetween, thereby solving a conventional problem of weak security in the home network. In addition, since a client smart card is issued using a home server and a server smart card at home, a home network security system can be constructed without needing intermediation of a third party. Moreover, since a security algorithm is performed within the smart card, the present invention provides convenience and strong security for users carrying the client smart card.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.
Number | Date | Country | Kind |
---|---|---|---|
10-2004-0081118 | Oct 2004 | KR | national |