CN109547303A - Control method and relevant device - Google Patents
Control method and relevant device Download PDFInfo
- Publication number
- CN109547303A CN109547303A CN201811390756.6A CN201811390756A CN109547303A CN 109547303 A CN109547303 A CN 109547303A CN 201811390756 A CN201811390756 A CN 201811390756A CN 109547303 A CN109547303 A CN 109547303A
- Authority
- CN
- China
- Prior art keywords
- equipment end
- factor
- control terminal
- transmission
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Automation & Control Theory (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of control method, comprising: when receiving control instruction, sends director data transmission request to equipment end, triggers the equipment end and carry out authentication to the control terminal;When authentication of the control terminal by the equipment end, the first transmission key is determined, director data to be transmitted is encrypted;It will be transmitted to the equipment end by the described instruction data of encryption, so that execution is corresponding with described instruction data to control operation after the equipment end obtains described instruction data;By applying method of the invention, equipment end improves safety of the data in transmission process by the authentication to control terminal;By the transmission key of determine instruction data encrypting and decrypting in transmission, director data is encrypted in transmission, is realized safety of the data in transmission, be ensure that the confidentiality of data transmission.
Description
Technical field
The present invention relates to data information security fields, more particularly to a kind of control method and relevant device.
Background technique
With the fast development of science and technology, smart machine applies the every aspect in we live, and can pass through
Long-range internet connection is also or local area network is connected with the bluetooth near field, NFC, by the plaintext transmission of data, realizes remote
Process control smart machine, realizes smart home life, keeps our life more convenient.
Inventor pass through the prior art the study found that digital information during transmission be easy stolen by criminal,
Safety is low, therefore needs to encrypt the data of transmission, protects the data information to be transmitted, improves the peace of data information
Quan Xing.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of control method, can digital information transmission process
The middle safety for improving digital information, reduces a possibility that information is stolen, the safety of improve data transfer.
The present invention also provides a kind of control devices, to guarantee the realization and application of the above method in practice.
A kind of control method, comprising:
When receiving control instruction, director data transmission instruction is sent to equipment end, triggers the equipment end to described
Control terminal carries out authentication;
When authentication of the control terminal by the equipment end, the first channel calculation factor is determined;
According to the first channel calculation factor, the first transmission key carried out data transmission with the equipment end is generated;
The first channel calculation factor is encrypted using first transmission key, generates encrypted cipher text;
The encrypted cipher text is sent to the equipment end, is solved with triggering the equipment end to the encrypted cipher text
It is close, the first channel calculation factor is obtained, and the first channel calculation factor and pre-generated second channel are calculated
The factor is compared;
When the first channel calculation factor and the second channel, which calculate the factor, compares consistent, passed using described first
Defeated key encrypts director data to be transmitted;
It will be transmitted to the equipment end by the described instruction data of encryption, so that the equipment end obtains described instruction number
According to rear, execution control operation corresponding with described instruction data.
In above-mentioned method, optionally, the triggering equipment end carries out authentication to the control terminal, comprising:
It triggers the equipment end and sends identification strings and random string to the control terminal;
When receiving the identification strings, preset certification root key is called to carry out the identification strings
Disperse operation, obtains the first authentication key;
The random string is encrypted according to first authentication key, obtains certification ciphertext;
The certification ciphertext is sent to the equipment end, so that the certification ciphertext is decrypted in the equipment end,
The random string for including in the certification ciphertext is obtained, and authenticates the random string for including in ciphertext by described and is sent to
The random string of the control terminal is matched, and when matching consistent, passes through the authentication to the control terminal.
In above-mentioned method, optionally, the first channel calculation of determination factor, comprising:
According to preset channel root key, operation is carried out to the identification strings, obtains the first channel meter
Calculate the factor.
In above-mentioned method, optionally, the first transmission key that the generation carries out data transmission with the equipment end, packet
It includes:
Obtain the single channel encryption factor;
According to the first channel calculation factor, cryptographic calculation is carried out to the single channel encryption factor, obtains described first
Transmission key.
In above-mentioned method, optionally, the encrypted cipher text is decrypted in the triggering equipment end, described in acquisition
The first channel calculation factor, comprising:
It triggers the equipment end and calls the second pre-generated transmission key, the encrypted cipher text is decrypted, obtain
The first channel calculation factor, second transmission key are the equipment end according to the second channel calculating factor, meter
Calculate the transmission key obtained.
A kind of control device is applied to control terminal, comprising:
Trigger unit, for sending director data transmission to equipment end and requesting, described in triggering when receiving control instruction
Equipment end carries out authentication to the control terminal;
Determination unit, for determining the first channel calculation when authentication of the control terminal by the equipment end
The factor;
Generation unit, for what is carried out data transmission according to the first channel calculation factor, generation with the equipment end
First transmission key;
First encryption unit, for being encrypted using first transmission key to the first channel calculation factor,
Generate encrypted cipher text;
Transmission unit is added for the encrypted cipher text to be sent to the equipment end with triggering the equipment end to described
Ciphertext is decrypted, and obtains the first channel calculation factor, and by the first channel calculation factor and pre-generated
Second channel calculates the factor and is compared;
Second encryption unit, for calculating the factor when the first channel calculation factor and the second channel and comparing unanimously
When, using first transmission key, director data to be transmitted is encrypted;
First control unit, for the described instruction data for passing through encryption to be transmitted to the equipment end, so that described set
After standby end obtains described instruction data, control operation corresponding with described instruction data is executed.
A kind of control method is applied to equipment end, comprising:
When receiving the director data by encryption of control terminal transmission, according to preset second transmission key pair
The director data by encryption is decrypted, and obtains described instruction data;
The equipment end is controlled according to described instruction data.
Above-mentioned method, optionally, second transmission key preset process, comprising:
The factor is calculated using preset second channel, the single channel encryption factor for including in the equipment end is added
Close operation obtains second transmission key.
A kind of control unit is applied to equipment end, comprising:
Decryption unit, for when receive control terminal transmission by encryption director data when, according to preset
The director data by encryption is decrypted in second transmission key, obtains described instruction data;
Second control unit, for controlling according to described instruction data the equipment end.
A kind of control system, comprising:
Control terminal and equipment end;
Wherein:
The control terminal, for executing the above-mentioned control method applied to control terminal;
The equipment end, for executing the above-mentioned control method applied to equipment end.
Compared with prior art, the present invention includes the following advantages:
In method provided in an embodiment of the present invention, comprising: when receiving control instruction, send director data to equipment end
Transmission request triggers the equipment end and carries out authentication to the control terminal;When the control terminal passes through the equipment end
When authentication, the first transmission key is determined, the ciphertext according to the encryption of the first transmission key is sent to the equipment end, with touching
Sending out equipment end described is decrypted the encrypted cipher text, and by applying method of the invention, equipment end passes through to control terminal body
Part certification, and when control terminal has been determined to transmission data command encrypted, equipment end to the data command of encryption into
The transmission key of row decryption, to improve the safety for transmitting data command between both-end, the confidentiality of data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of control method flow chart provided by the invention;
Fig. 2 is a kind of another flow chart of control method provided by the invention;
Fig. 3 is a kind of another flow chart of control method provided by the invention;
Fig. 4 is a kind of another flow chart of control method provided by the invention;
Fig. 5 is a kind of another flow chart of control method provided by the invention;
Fig. 6 is a kind of structural schematic diagram of control device provided by the invention;
Fig. 7 is a kind of another structural schematic diagram of control device provided by the invention;
Fig. 8 is a kind of structural schematic diagram of control system provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In this application, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship on border perhaps sequence the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, from
And to include the process, method, article or equipments of a series of elements not only to include those elements, but also including not bright
The other element really listed, or further include for elements inherent to such a process, method, article, or device.Do not having
In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that include the element process,
There is also other identical elements in method, article or equipment.
The present invention can be used in numerous general or specialized network equipment environment or configuration.Such as: personal computer, server
Computer, internet device, intelligent door lock, intelligent air condition, electronic product including any of the above device or intelligence etc..
The embodiment of the invention provides a kind of control method, this method can be applied in a variety of smart electronics products,
Its executing subject can be the server or smart electronics product main body of smart electronics product, such as personal computer, put down
Plate computer, smart phone etc., the flow chart of the method is as shown in Figure 1, specifically include:
S101: when receiving control instruction, director data transmission instruction is sent to equipment end, triggers the equipment end pair
The control terminal carries out authentication;
In method provided in an embodiment of the present invention, when control terminal receives the control instruction that user operates equipment end
When, control terminal sends the data transfer request of control instruction to equipment end, thus triggers the equipment end to the control terminal
Authentication process;
It should be noted that the control terminal and equipment end can be the smart machine end with wireless connecting function, than
Such as control terminal and equipment end can be carried out the connection of internet, local area network, bluetooth or NFC wireless network, can pass through
Electronic channel carries out data transmission and receives, and control terminal can be smart phone, tablet computer etc., and equipment end can be can be into
The air-conditioning of row bluetooth connection or internet connection, refrigerator, intelligent door lock etc..
S102: when authentication of the control terminal by the equipment end, the first channel calculation factor is determined;
In method provided in an embodiment of the present invention, when authentication of the control terminal by the equipment end, control
End sends acquisition instruction to equipment end, and equipment end sends identification strings, control when receiving the acquisition instruction, to control terminal
End processed carries out operation when receiving the identification strings, to the identification strings, obtains the first channel calculation factor.This
In the method that inventive embodiments provide, the identification strings can be the device id of the equipment end.
S103: according to the first channel calculation factor, the first transmission carried out data transmission with the equipment end is generated
Key;
In method provided in an embodiment of the present invention, control terminal obtains the single channel encryption factor, and according to the first channel meter
The factor is calculated, operation is carried out to the single channel encryption factor of acquisition, it is close to obtain the carry out data transmission with the equipment end first transmission
Key, first transmission key is for encrypting described instruction data, to guarantee the safety of data transmission.
In method provided in an embodiment of the present invention, the single channel encryption factor can be obtained from equipment end, the channel
The random number that encryption factor can generate for equipment end is also possible to generation that control terminal is made an appointment with equipment end, synchronous
Data.
S104: encrypting the first channel calculation factor using first transmission key, generates encrypted cipher text;
S105: being sent to the equipment end for the encrypted cipher text, with trigger the equipment end to the encrypted cipher text into
Row decryption, obtains the first channel calculation factor, and by the first channel calculation factor and pre-generated second channel
The factor is calculated to be compared;
In method provided in an embodiment of the present invention, the control terminal is sent to the equipment end to the first channel calculation factor
The encrypted cipher text for carrying out encryption generation, triggers the control terminal and operation is decrypted to the encrypted cipher text, when equipment end is to institute
It states encrypted cipher text to be decrypted, obtains the first channel calculation because of the period of the day from 11 p.m. to 1 a.m, equipment end is by the first channel calculation factor and in advance
The second channel of generation calculates the factor and is compared, when the alignment is identical, it is determined that control terminal to director data to be transmitted into
The key of row encryption;The pre-generated second channel calculates the factor, is that the equipment end is raw according to preset mode
At.
S106: when the first channel calculation factor and the second channel, which calculate the factor, compares consistent, using described
First transmission key encrypts director data to be transmitted;
In method provided in an embodiment of the present invention, when the first channel calculation factor that equipment end is decrypted with preset
It is compared in the second channel factor of equipment end, when the two is consistent, the control terminal applies first transmission key, right
Director data to be transmitted is encrypted, to realize the confidentiality of data;It should be noted that when equipment end decrypt the
When the one channel calculation factor and the second channel calculating factor compare consistent, to control terminal feedback ratio to consistent information;Thus really
The key that control terminal encrypts director data to be transmitted, i.e. the first transmission key are determined.
S107: will be transmitted to the equipment end by the described instruction data of encryption, so that described in equipment end acquisition
After director data, control operation corresponding with described instruction data is executed;
In method provided in an embodiment of the present invention, the encrypted director data of the control terminal is sent to the equipment end,
It is decrypted after equipment end receives the encrypted instruction, to obtain described instruction data, according to described instruction data
Execute corresponding instruction control operation.
In method provided in an embodiment of the present invention, when receiving control instruction, transmission director data is sent to equipment end
Request triggers the equipment end and carries out authentication to control terminal;When the control terminal passes through the authentication of the equipment end
When, the control terminal sends the director data by encryption to the equipment end, and the equipment end is decrypted, and foundation
Obtained director data executes corresponding instruction control operation;In providing method of the embodiment of the present invention, by equipment end to control
The authentication at end improves safety of the data in transmission, when director data is transmitted, it is determined that director data exists
The key encrypted when transmission, data are encrypted, and ensure that the confidentiality of data, method provided in an embodiment of the present invention
It is one-time pad, effectively prevents Replay Attack, improves the safety of data.
In method provided in an embodiment of the present invention, the equipment end needs to carry out authentication to the control terminal, to keep away
Exempt from equipment end to be attacked by criminal, cause damages, the authentication process to control terminal is as shown in Fig. 2, detailed process is as follows
It is shown:
S201: the equipment end is triggered to the control terminal and sends identification strings and random string;
In method provided in an embodiment of the present invention, when needing to carry out authentication to the control terminal, the control terminal
The instruction for obtaining identification strings and random string is sent to the equipment end;The equipment end receives acquisition instruction, to
The control terminal feedback indicator character string and random string, the identification strings can be the unique identifying number of equipment end,
It is also possible to the coordinates datas such as sequence number SN;It should be noted that the unique identifying number of the equipment end is that equipment end is producing
When be previously written unique, unduplicated identification number character string;The random string is 8 bytes that equipment end generates at random
Random string, generate random string be also possible to 16 bytes, 32 bytes etc., it is not limited to 8 bytes it is random
Character string;It should be noted that can be sent simultaneously when equipment end sends identification strings and random string to control terminal,
It can also successively send.
It should be noted that equipment end is sent in this step identification strings and random string can be encrypted transmission
, such as using control terminal is transferred to after control terminal public key encryption, this ensure that identification strings, random string transmit
Safety.
S202: when receiving the identification strings, call preset certification root key to the mark character
String carries out dispersion operation, obtains the first authentication key;
In method provided in an embodiment of the present invention, when receiving the identification strings of the equipment end feedback, the control
End processed calls preset certification root key to carry out dispersion operation to the identification strings, obtains the first authentication key;
It should be noted that the preset certification root key is the symmetric key of 16 bytes, root key pair is authenticated
Unique identification number carries out dispersion operation, obtains unique authentication key, the authentication key of each equipment end is all different;Recognize
Card key is used to authenticate external accessed node, such as the identity of certification control terminal.
S203: encrypting the random string according to first authentication key, obtains certification ciphertext;
In method provided in an embodiment of the present invention, when the certification root key carries out dispersion fortune to the identification strings
It calculates, after obtaining the first authentication key, carries out cryptographic calculation according to random string of first authentication key to acquisition, obtain
To certification ciphertext.
S204: the certification ciphertext is sent to the equipment end, so that the equipment end carries out the certification ciphertext
Decryption, obtain it is described certification ciphertext in include random string, and by it is described certification ciphertext in include random string with
The random string for being sent to the control terminal is matched, and when matching consistent, passes through the authentication to the control terminal;
In method provided in an embodiment of the present invention, when the equipment end receives the certification ciphertext of control terminal transmission, use
Operation is decrypted to the certification ciphertext in the authentication key for being set in advance in equipment end, obtains the identification strings, works as institute
State random string it is consistent with the random string of the equipment end when, then the identity of the control terminal is legal, i.e. control terminal
Authentication passes through.
It should be noted that when equipment end sent to control terminal be the unique identifying number for being previously written equipment end when, if
Standby termination receives the certification ciphertext encrypted by control terminal, equipment end use the authentication key of the production system write-in in production into
Row decryption oprerations;The authentication key, which is production system, carries out dispersion fortune to the unique identifying number of equipment end using certification root key
It calculates, obtains corresponding authentication key;
It should be noted that be set in advance in equipment end authentication key be equipment end in process of production, by certification root
Its unique identification number of key pair carries out dispersion operation, obtains unique authentication key, and unique authentication key is write
Enter in equipment end, the equipment end can be intelligent door lock, intelligent air condition or intelligent water heater etc..
In method provided in an embodiment of the present invention, when sending director data to equipment end, equipment end is first to control terminal
Identity is authenticated, and a possibility that equipment end is attacked by criminal is reduced, and improves the safety of data transmission;?
After the certification that control terminal passes through equipment end, control terminal is also required to authenticate equipment end, avoids data transmission from occurring with this
Mistake, the safety and correctness of improve data transfer, the encrypting and decrypting mathematical algorithm used in this embodiment can be state
Border general-purpose algorithm 3DES, the close SM4 algorithm of state and equivalent symmetric key algorithm.
In method provided in an embodiment of the present invention, after the authentication that the equipment end passes through control terminal, control terminal
The single channel encryption factor is called to carry out operation, in order to obtain the first channel calculation factor, details are provided below:
Obtain the single channel encryption factor;
According to the first channel calculation factor, cryptographic calculation is carried out to the single channel encryption factor, obtains described first
Transmission key;
In method provided in an embodiment of the present invention, control terminal uses the first channel calculation by obtaining the single channel encryption factor
The single channel encryption factor described in factor pair carries out cryptographic calculation, to obtain the first transmission key;The single channel encryption factor is not only
The random number that only can be equipment end generation is also possible to the random number of control terminal itself generation;Also or control terminal and equipment
The data generated that end is made an appointment, synchronous, such as the count value that synchronous time factor, coincidence counter generate;The control
End processed is obtaining single channel encryption because of the period of the day from 11 p.m. to 1 a.m, can be by calling itself middleware, and centre obtains the laggard of the single channel encryption factor
Row follow-up process.
In method provided in an embodiment of the present invention, when control terminal passes through the authentication of equipment end, it is thus necessary to determine that data
The transmission key of transmission, the detailed process is as shown in figure 3, concrete operations described in Fig. 3 can be by the centre in control terminal
Part carries out operation processing, and particular content is as follows:
S301: the single channel encryption factor for calling the identification strings of the equipment end and the equipment end to generate;
In method provided in an embodiment of the present invention, the identification strings that the equipment end is sent are to mark involved in Fig. 2
Know character string, the identification strings are that equipment end is sent to control terminal when authenticating to the identity of control terminal;Optionally,
This programme can also re-request the identification strings for obtaining equipment end after the authentication that control terminal passes through equipment end;
Optionally, this programme also can be used when the identity of equipment end certification control terminal, the identification strings that Xiang Suoshu control terminal is sent;
The identification strings are the unique identifying numbers of equipment end, are also possible to the coordinates datas such as sequence number SN, are equal to equipment end
ID number;
The single channel encryption factor that the equipment end generates is one group of random number that equipment end generates, when the control terminal is to control
When end processed sends acquisition instruction, the equipment end generates one group of random number, and optionally, the random number is 16 bytes.
It is not only limited to random number when single channel encryption factor practical application, is also possible to control terminal and equipment end appoints in advance
Fixed, the synchronous data generated, such as the count value that synchronous time factor, coincidence counter generate, with equipment end generate with
The mode of machine number is compared, and the process that the random number of generation is transferred to control terminal by equipment end is eliminated.
S302: carrying out operation to the identification strings according to preset channel root key, obtains first letter
Road calculates the factor;
In method provided in an embodiment of the present invention, mark of the channel root key to acquisition for being set in advance in control terminal is used
Character string carries out dispersion operation using decentralized algorithm, obtains the first channel calculation factor;It should be noted that the channel root is close
Key is that have in control terminal, i.e., pre-set;Channel root key is the symmetric key of 16 bytes.
S303: operation is carried out according to the single channel encryption factor described in the first channel calculation factor pair, obtains described first
Transmission key;
In method provided in an embodiment of the present invention, by using the first channel calculation factor be to the single channel encryption because
Son carries out operation using Encryption Algorithm, obtains the first transmission key, and the single channel encryption factor is the random number that equipment end generates;
The Encryption Algorithm can be international calculation 3DES, the close SM4 algorithm of state and equivalent symmetric key algorithm;
In method provided in an embodiment of the present invention, control terminal sends acquisition instruction to equipment end, and equipment end response instructs, to
The equipment end feeds back the random number of 16 bytes, random number, that is, single channel encryption factor of 16 byte;Such as smart phone with
Intelligent door lock, now need to authenticate the identity of intelligent door lock, smart phone to intelligent door lock send obtain channel calculation
The instruction of the factor is to intelligent door lock, and after intelligent door lock receives instruction, response instruction sends one group of single channel encryption to smart phone
The factor;Optionally, the byte number of this group of single channel encryption factor can be 8 bytes, 16 bytes etc., it is provided in an embodiment of the present invention
In method, Preferable scheme is that equipment end sends the random number of 16 bytes of itself generation;
It should be noted that random string described in the random number and Fig. 2 of the single channel encryption factor herein is not etc.
Together, random number herein be when the identity of control terminal is by the certification of equipment end, what equipment end generated at random again, herein
Random number generates transmission key for carrying out operation;And the random string in Fig. 2 is when needing to authenticate the identity of control terminal
It generates, the random string is for authenticating the identity of control terminal.
When practical application, the single channel encryption factor is not only limited to random number, is also possible to control terminal and equipment end is preparatory
Agreement, the synchronous data generated, such as the count value that synchronous time factor, coincidence counter generate.
S304: encrypting the first channel calculation factor using first transmission key, generates encrypted cipher text,
It is sent to the equipment end, the equipment end is triggered and the encrypted cipher text is decrypted;
In method provided in an embodiment of the present invention, equipment end is using the first transmission key generated to the first channel meter
It calculates the factor to be encrypted, encrypted cipher text is sent to equipment end, triggering equipment end uses the second pre-generated transmission key pair
The ciphertext is decrypted, by the first channel calculation factor that decryption obtains and the second channel factor for being set in advance in equipment end
It is compared, compares unanimously, then establish secure transmission tunnel between control terminal and equipment end;Control terminal is transmitted using described first
Key pair needs the director data transmitted to be encrypted, and is sent to equipment end, the equipment end is using the second transmission key to institute
The director data for stating encryption is decrypted, and the director data obtained according to decryption executes corresponding control operation;
It should be noted that calculating the factor to the first channel calculation factor and second channel when control section receives equipment end
When comparing consistent message, thereby determine that control terminal to the encryption key of director data to be transmitted, i.e. the first transmission key;
Equipment end is also determined to the decruption key of the director data of encryption, i.e. the second transmission key;Director data is carried out when determining
When the key of encryption and decryption, control terminal passes through the authentication to equipment end.
It should be noted that second transmission key of equipment end is according to the second channel meter for being set in advance in equipment end
The factor is calculated, what cryptographic calculation obtained is carried out to the single channel encryption factor;The second channel for being set in advance in equipment end, which calculates the factor, is
During production, production system carries out dispersion operation using unique identifying number of the channel root key to equipment end and obtains equipment end
It arrives, then in write device end;The channel root key has three groups of different differences of key according to safe and secret rule
Key, it is corresponding to generate three groups of different channel calculation factors.
In method provided in an embodiment of the present invention, dispersed by the identification strings to equipment end using decentralized algorithm
Operation obtains the first channel calculation factor;Operation is carried out using Encryption Algorithm to the single channel encryption factor using the first channel factors,
The first transmission key is obtained, the first transmission key encrypts the first channel factors, is sent to equipment end, triggers equipment end
Decryption process, the ciphertext is decrypted when pre-set second transmission key can be used in equipment end, will be decrypted
To the first channel calculation factor calculate the factor with the second channel for being set in advance in equipment end and be compared, compare consistent then the
One transmission key is the key encrypted when transmitting director data, and the second transmission key is equipment end in the finger for receiving encryption
Enable key when data for decrypting;
It is worth noting that in the present invention the second transmission key also can be used as equipment end to control terminal transmit director data when
The key encrypted.
In method provided in an embodiment of the present invention, further includes: when equipment end sends director data to control terminal, using institute
The director data that the second transmission key sends the equipment end is stated to encrypt.
In method provided in an embodiment of the present invention, secure transmission tunnel is established in control terminal and equipment end, carries out data biography
When defeated, the second transmission key that the first transmission key and equipment end that control terminal generates generate is identical traffic key;Control terminal
The director data for needing to be transmitted to equipment end can be encrypted using the first transmission key, equipment end is receiving the warp
When crossing the director data of encryption, the director data by encryption is decrypted using the second transmission key.The present invention is real
In the method for applying example offer, when equipment end needs to transmit data to control terminal, equipment end can be close by second transmission
The data that key transmits needs encrypt, with the safety for the data for ensuring to transmit to control terminal.
By applying method of the invention, safety of the data in transmission ensure that, by the instruction number to be transmitted
According to being encrypted, confidentiality of the director data in transmission ensure that, and then improve safety of the data in transmission process.
In method provided in an embodiment of the present invention, it is applied to equipment end;When equipment end receives control terminal by encryption
It needs that operation is decrypted when director data, equipment end is decrypted, the control process executed instruction is as shown in figure 4, tool
Body is as described below:
S401: when receiving the director data by encryption of control terminal transmission, according to preset second transmission
Director data described in key pair by encryption is decrypted, and obtains described instruction data;
In method provided in an embodiment of the present invention, when equipment end receives the director data by encryption of control terminal transmission
When, the decryption process in equipment end is triggered, equipment end is decrypted using preset second transmission key, described to set in advance
The second fixed transmission key is that equipment end uses the pre-set second channel factor pair single channel encryption factor to use Encryption Algorithm
It is calculated, equipment end is decrypted the director data of encryption according to the second transmission key;The single channel encryption because
Son is the single channel encryption factor that equipment end generates, that is, is sent to the single channel encryption factor of control terminal.
S402: the equipment end is controlled according to described instruction data;
In method provided in an embodiment of the present invention, solved by using director data of second transmission key to encryption
It is close, director data is obtained, executes corresponding control operation according to director data.
In method provided in an embodiment of the present invention, using method provided by the invention, recognized by the identity to both sides
Card improves safety of the data when sending, avoids attack of the data by criminal, transmitted in director data
When, director data is encrypted using by the transmission key confirmed, encipherment protection further has been carried out to director data, into
One step prevents the leakage of director data, the safety of improve data transfer.
In method provided in an embodiment of the present invention, when the equipment end receives the instruction by encryption of control terminal transmission
When data, encrypted director data is decrypted using preset second transmission key;Its decrypting process is as described below:
The factor is calculated using preset second channel, the single channel encryption factor for including in the equipment end is added
Close operation obtains second transmission key;
In method provided in an embodiment of the present invention, equipment end calculates the factor by using preset second channel, right
The single channel encryption factor that the equipment end generates carries out cryptographic calculation, obtains second transmission key;The single channel encryption because
Son is one group of random number that equipment end itself generates, and the single channel encryption factor is sent to control terminal, in order to control terminal
Generate the first transmission key;The equipment end using second channel calculate factor pair be sent to the single channel encryption factor of control terminal into
Row cryptographic calculation obtains the second transmission key, and the director data by encryption is decrypted by using the second transmission key,
Described instruction data are obtained, and according to described instruction data, execute corresponding control operation.
In method provided in an embodiment of the present invention, carried out by the channel calculation factor by encryption for sending control terminal
Decryption determines that the decruption key to encrypted instruction data, the director data for avoiding transmission are intercepted or are cracked, improve
The safety of data transmission, ensure that the safety of data transmission;In method provided in an embodiment of the present invention, in order to further
Illustrate method provided by the invention, carries out more detailed discussion in the examples below.
In a kind of control method provided in an embodiment of the present invention, it is applied to a kind of control system, the control system includes
Control terminal and transmitting terminal send data transfer request to equipment end, trigger the equipment when control terminal receives control instruction
End authenticates the identity of control terminal, by obtaining the identification strings and random string that equipment end is sent, using preparatory
The operation process of setting is generated authentication key, encrypts random string using authentication key, be sent to equipment end, into
And the decryption process to certification ciphertext of equipment end is triggered, detailed process is as follows for certification;
The control terminal sends acquisition instruction to equipment end, and acquisition instruction is to obtain identification strings and random string
Instruction sends instruction transmission request to equipment end in control terminal and contains the acquisition identification strings instruction, and the present invention is implemented
In the method that example provides, preferred scheme is that random string is 8 bytes;Equipment end receives acquisition instruction, and response obtains
It instructs to equipment end and returns to identification strings and random string;When control terminal receives identification strings, the identifier word
Symbol string is to be set in advance in the coordinates datas such as unique identifying number or the sequence number SN of equipment end, with pre-set certification root
Unique identifying number described in key pair is calculated, and the first authentication key is obtained, according to the first authentication key to random string into
Row cryptographic calculation, obtains ciphertext data D1, and certification ciphertext will be sent to equipment end by control terminal;Equipment end use is set in advance in
Ciphertext data D1 is decrypted in the authentication key of equipment end, obtains authentication data D2, equipment end decryption is obtained with
Machine character string is compared with the random string for being sent to the control terminal, compares consistent then identity of the equipment end to control terminal
Certification passes through;
Optionally, when equipment end receives acquisition instruction, equipment end response instruction sends mark character to control terminal
String, control terminal use preset certification root key, carry out dispersion operation to the identification strings of acquisition, it is close to obtain the first certification root
Key;The equipment end sends random string to control terminal again, control terminal using generation first authentication key to obtain with
Machine character string carries out cryptographic calculation, and the certification ciphertext of encryption is sent to equipment end by the certification ciphertext encrypted;In order to set
Standby end is decrypted using pre-set authentication key, and equipment end compares the random string and be sent to control that decryption obtains
Whether the random string at end is consistent, if unanimously, the identity of control terminal passes through certification;It should be noted that equipment end is rung
The control instruction for answering control terminal to send, when equipment end sends identification strings and random string to control terminal, the two can be same
When send;It can also successively send, there is no successive point when successively sending.
The authentication key for being set in advance in equipment end is equipment end in production, and the certification root key in production system is to setting
The unique identifying number at standby end carries out dispersion operation, forms authentication key corresponding with each identification number, and by the authentication key
It is written in corresponding equipment end, the authentication key of each equipment end is different.
After the certification that the identity of the control terminal passes through equipment end, it is thus necessary to determine that adding for transmission director data
Close transmission key, and to the counterpart keys that the director data of encryption is decrypted;Control terminal obtains the unique of equipment end transmission
Identification strings carry out dispersion operation to the unique identification character string according to pre-set channel root key, obtain first
The channel calculation factor;Cryptographic calculation is carried out using the first channel calculation factor pair single channel encryption factor, obtains the first transmission key;
The first channel calculation factor is encrypted using the first transmission key, is sent to equipment end, equipment end is according to pre- Mr.
At the second transmission key be decrypted, by the obtained channel calculation factor and the single channel encryption factor for being set in advance in equipment end
Be compared, if comparing consistent, it is determined that director data carry out encryption with encrypted director data is decrypted it is close
Key;
When the authentication of equipment end passes through, control terminal encrypts director data using the first transmission key, hair
It send to the equipment end, the equipment end is decrypted using the second transmission key, and execution obtains corresponding director data.
Specific flow chart is as shown in figure 5, specific content is as follows:
Control terminal sends acquisition instruction to equipment end, and the acquisition instruction is " 008400010 ", and equipment end response, which obtains, to be referred to
It enables, Xiang Suoshu control terminal feedback channel encryption factor, it is preferred that in method provided in an embodiment of the present invention, the single channel encryption
The factor is the random number for 16 bytes that equipment end generates at random;It optionally, can be to control when equipment end responds acquisition instruction
End sends the single channel encryption factor and identification strings, and the two can send simultaneously when sending, can also successively send;It can also only send
The single channel encryption factor.
When equipment end only sends single channel encryption because of the period of the day from 11 p.m. to 1 a.m to control terminal, control terminal uses pre-set channel root key pair
The identification strings of equipment end originally obtained carry out dispersion operation, obtain the first channel calculation factor, it is described it is original
The identification strings of equipment end through obtaining are in the identity of equipment end certification control terminal, to the mark character of control terminal transmission
Number;The channel root key is the symmetric key of 16 bytes;The first channel calculation factor pair single channel encryption factor, which uses, to be added
Close algorithm carries out operation, obtains the first transmission key, is added using the first transmission key to the first channel calculation factor
It is close, it is sent to equipment end;
When equipment end sends the single channel encryption factor and identification strings to control terminal, control terminal uses pre-set letter
Road root key carries out dispersion operation to the identification strings of the equipment end of acquisition, obtains the first channel calculation factor, the channel
Root key is the symmetric key of 16 bytes;The first channel calculation factor pair single channel encryption factor is transported using Encryption Algorithm
It calculates, obtains the first transmission key, the channel calculation factor is encrypted using the first transmission key, is sent to equipment end;
Equipment end carries out the first channel calculation factor by encryption using the second pre-generated transmission key
Decryption, when the first channel calculation factor that decryption obtains is consistent with the pre-set second channel calculating factor, it is determined that biography
The key that defeated instruction is encrypted and the key that the transmission instruction by encryption is decrypted;
The second pre-generated transmission key is that equipment end is believed using pre-set second channel calculating factor pair
Road encryption factor carries out what cryptographic calculation obtained, and it is equipment end in production that the pre-set second channel, which calculates the factor,
Production system carries out dispersion operation by using unique identifying number of the channel root key to equipment end, obtains unique second channel
The factor is calculated, and is written into equipment end;The channel calculation factor of each equipment end is different;
For equipment end to control terminal feedback ratio pair as a result, if certification passes through, current control terminal uses the first transmission key
Director data is encrypted, sends it to current equipment end, current equipment end is using the second transmission key to encryption
Director data be decrypted, operation is instructed according to obtained instruction execution accordingly;
Preferably, when control terminal determines the first transmission key, when equipment end determines the second transmission key, after equipment end
It is continuous when carrying out data transmission to control terminal, the second transmission key can be used, the data of required transmission are encrypted, sends out
It send to control terminal;The control terminal is decrypted the data of encryption using the second transmission key determined.
Such as intelligent door lock receives the director data by encryption of mobile phone remote transmission, intelligent door lock is passed by second
Director data of the defeated key pair by encryption is decrypted, and the director data decrypted is the password for opening intelligent door lock, then
Intelligent door lock executes corresponding instruction and controls after encrypted director data is decrypted, i.e. opening door lock;It can also be
Intelligent air condition sends the director data of encryption receiving mobile phone, and described instruction data are to open air-conditioning ten minutes later, and temperature is set
It sets at 24 degrees Celsius;After the encrypted instruction for receiving mobile phone remote transmission operation is decrypted, and very in intelligent air condition
Air-conditioning is opened after clock, by temperature setting at 24 degrees Celsius;
After the data transfer ends between control terminal and equipment end, i.e. the channel of control terminal and receiving end transmission data
After interruption, when control terminal sends director data again to equipment end, the identity needs of both sides re-start certification, transmit
Key is also required to re-start determination, realizes one-time pad.
Using method provided in an embodiment of the present invention, it is mutually authenticated by identity between both sides, ensure that data are passing
Safety when defeated ensure that confidentiality of the director data in transmission by encrypting to the director data to be transmitted, into
And safety of the data in transmission process is improved, and after the channel interruption of control terminal and data terminal transmission data, control
When end needs to transmit equipment end again control instruction, need again bipartite identity authenticate, again really
Determine transmission key, a possibility that carrying out Replay Attack success by criminal is reduced with this.
It is corresponding with Fig. 1, correspond to control terminal, the embodiment of the invention also provides a kind of control devices, are applied to control
End, structural schematic diagram is as shown in fig. 6, specifically include:
Trigger unit 601, for sending director data transmission request, triggering to equipment end when receiving control instruction
The equipment end carries out authentication to the control terminal;
Determination unit 602, for determining the first channel meter when authentication of the control terminal by the equipment end
Calculate the factor;
Generation unit 603, for according to the first channel calculation factor, generation to carry out data transmission with the equipment end
The first transmission key;
First encryption unit 604, for adding using first transmission key to the first channel calculation factor
It is close, generate encrypted cipher text;
Transmission unit 605, for the encrypted cipher text to be sent to the equipment end, to trigger the equipment end to described
Encrypted cipher text is decrypted, and obtains the first channel calculation factor, and by the first channel calculation factor and pre-generate
Second channel calculate the factor be compared;
Second encryption unit 606, for being compared when the first channel calculation factor calculates the factor with the second channel
When consistent, using first transmission key, director data to be transmitted is encrypted;
First control unit 607, for the described instruction data for passing through encryption to be transmitted to the equipment end, so that described
After equipment end obtains described instruction data, control operation corresponding with described instruction data is executed.
It is corresponding with Fig. 4, correspond to equipment end, the embodiment of the invention also provides a kind of control device, applied to setting
Standby end, structural schematic diagram is as shown in fig. 7, specifically include:
Decryption unit 701, for when receiving the director data by encryption of control terminal transmission, foundation to be preset
The second transmission key to it is described by encryption director data be decrypted, obtain described instruction data;
Second control unit 702, for controlling according to described instruction data the equipment end.
In method provided in an embodiment of the present invention, equipment end authenticates the identity of control terminal, realizes in instruction number
According to the certification when being transmitted to equipment end to external equipment identities, to improve safety of the data in transmission, control
The key that determine instruction data in end processed are encrypted when being transmitted, equipment end are determined to the director data after encryption
The key being decrypted;In this way, confidentiality of the data in transmission is improved.By applying method of the invention, pass through
Authentication of the equipment end to control terminal, ensure that data transmission when safety, by the director data to be transmitted into
Row encryption ensure that confidentiality of the director data in transmission, and then improve safety of the data in transmission process.
The embodiment of the invention also provides a kind of control system, structural schematic diagram is as shown in figure 8, specifically include control terminal
801 and equipment end 802;
The control terminal 801 is performed the following operation with equipment end 802:
When receiving control instruction, director data transmission request is sent to equipment end, triggers the equipment end to described
Control terminal carries out authentication;When authentication of the control terminal by the equipment end, determine the first channel calculation because
Son;According to the first channel calculation factor, the first transmission key carried out data transmission with the equipment end is generated;Using institute
It states the first transmission key to encrypt the first channel calculation factor, generates encrypted cipher text;The encrypted cipher text is sent
It to the equipment end, is decrypted with triggering the equipment end to the encrypted cipher text, obtains the first channel calculation factor,
And the first channel calculation factor is calculated into the factor with pre-generated second channel and is compared;When the first channel meter
When the calculation factor and the second channel calculating factor compare consistent, using first transmission key, to instruction number to be transmitted
According to being encrypted;It will be transmitted to the equipment end by the described instruction data of encryption, so that the equipment end obtains the finger
After enabling data, control operation corresponding with described instruction data is executed.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, same and similar part cross-reference between each embodiment.
For type of device, since it is basically similar to the method embodiment, so being described relatively simple, related place is referring to side
The part of method embodiment illustrates.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system or
For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method
The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct
The unit of separate part description may or may not be physically separated, component shown as a unit can be or
Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root
According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill
Personnel can understand and implement without creative efforts.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
1. a kind of control method, which is characterized in that the method is applied to control terminal, comprising:
When receiving control instruction, director data transmission request is sent to equipment end, triggers the equipment end to the control
End carries out authentication;
When authentication of the control terminal by the equipment end, the first channel calculation factor is determined;
According to the first channel calculation factor, the first transmission key carried out data transmission with the equipment end is generated;
The first channel calculation factor is encrypted using first transmission key, generates encrypted cipher text;
The encrypted cipher text is sent to the equipment end, is decrypted, is obtained with triggering the equipment end to the encrypted cipher text
The first channel calculation factor, and by the first channel calculation factor and pre-generated second channel calculate the factor into
Row compares;
It is close using first transmission when the first channel calculation factor and the second channel, which calculate the factor, compares consistent
Key encrypts director data to be transmitted;
It will be transmitted to the equipment end by the described instruction data of encryption, so that the equipment end obtains described instruction data
Afterwards, control operation corresponding with described instruction data is executed.
2. the method according to claim 1, wherein the triggering equipment end carries out body to the control terminal
Part certification, comprising:
It triggers the equipment end and sends identification strings and random string to the control terminal;
When receiving the identification strings, preset certification root key is called to disperse the identification strings
Operation obtains the first authentication key;
The random string is encrypted according to first authentication key, obtains certification ciphertext;
The certification ciphertext is sent to the equipment end, so that the certification ciphertext is decrypted in the equipment end, is obtained
The random string for including in the certification ciphertext, and by the random string for including in the certification ciphertext and be sent to described
The random string of control terminal is matched, and when matching consistent, passes through the authentication to the control terminal.
3. according to the method described in claim 2, it is characterized in that, the determination the first channel calculation factor, comprising:
According to preset channel root key, operation is carried out to the identification strings, obtain first channel calculation because
Son.
4. method according to claim 1 or 3, which is characterized in that the generation carries out data transmission with the equipment end
The first transmission key, comprising:
Obtain the single channel encryption factor;
According to the first channel calculation factor, cryptographic calculation is carried out to the single channel encryption factor, obtains first transmission
Key.
5. the method according to claim 1, wherein the triggering equipment end carries out the encrypted cipher text
Decryption obtains the first channel calculation factor, comprising:
It triggers the equipment end and calls the second pre-generated transmission key, the encrypted cipher text is decrypted, described in acquisition
The first channel calculation factor, second transmission key are the equipment end according to the second channel calculating factor, and calculating obtains
The transmission key obtained.
6. a kind of control device is applied to control terminal, comprising:
Trigger unit, for sending director data transmission request to equipment end, triggering the equipment when receiving control instruction
End carries out authentication to the control terminal;
Determination unit, for determining the first channel calculation factor when authentication of the control terminal by the equipment end;
Generation unit, for generating first carried out data transmission with the equipment end according to the first channel calculation factor
Transmission key;
First encryption unit is generated for encrypting using first transmission key to the first channel calculation factor
Encrypted cipher text;
Transmission unit, it is close to the encryption to trigger the equipment end for the encrypted cipher text to be sent to the equipment end
Text is decrypted, and obtains the first channel calculation factor, and by the first channel calculation factor and pre-generated second
The channel calculation factor is compared;
Second encryption unit, for when the first channel calculation factor and the second channel calculate the factor and compare consistent,
Using first transmission key, director data to be transmitted is encrypted;
First control unit, for the described instruction data for passing through encryption to be transmitted to the equipment end, so that the equipment end
After obtaining described instruction data, control operation corresponding with described instruction data is executed.
7. a kind of control method, which is characterized in that be applied to equipment end, comprising:
When receiving the director data by encryption of control terminal transmission, according to preset second transmission key to described
It is decrypted by the director data of encryption, obtains described instruction data;
The equipment end is controlled according to described instruction data.
8. the method according to the description of claim 7 is characterized in that second transmission key presets process, comprising:
The factor is calculated using preset second channel, cryptographic calculation is carried out to the single channel encryption factor in the equipment end,
Obtain second transmission key.
9. a kind of control device, which is characterized in that be applied to equipment end, comprising:
Decryption unit, for when receive control terminal transmission by encryption director data when, according to preset second
The director data by encryption is decrypted in transmission key, obtains described instruction data;
Second control unit, for controlling according to described instruction data the equipment end.
10. a kind of control system characterized by comprising
Control terminal and equipment end;
Wherein:
The control terminal, for control method described in 1~5 any one of perform claim;
The equipment end requires control method described in 7 or 8 any one for perform claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811390756.6A CN109547303B (en) | 2018-11-21 | 2018-11-21 | Control method and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811390756.6A CN109547303B (en) | 2018-11-21 | 2018-11-21 | Control method and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109547303A true CN109547303A (en) | 2019-03-29 |
CN109547303B CN109547303B (en) | 2021-06-25 |
Family
ID=65848806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811390756.6A Active CN109547303B (en) | 2018-11-21 | 2018-11-21 | Control method and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547303B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110366183A (en) * | 2019-08-02 | 2019-10-22 | 中国工商银行股份有限公司 | Short message safety protecting method and device |
CN112751872A (en) * | 2020-12-30 | 2021-05-04 | Tcl空调器(中山)有限公司 | Control method and control authority request method of air conditioner, air conditioner and communication module |
CN115065522A (en) * | 2022-06-09 | 2022-09-16 | 北谷电子有限公司 | Security authentication method, vehicle-mounted controller, remote communication terminal, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102421096A (en) * | 2011-12-22 | 2012-04-18 | 厦门雅迅网络股份有限公司 | Method for safely transmitting data based on wireless network |
CN104993981A (en) * | 2015-05-14 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for controlling access of device |
CN106658488A (en) * | 2016-09-30 | 2017-05-10 | 海尔优家智能科技(北京)有限公司 | Intelligent household electric appliance, method and apparatus for safely accessing the intelligent household electric appliance |
CN106790156A (en) * | 2016-12-29 | 2017-05-31 | 海尔优家智能科技(北京)有限公司 | A kind of smart machine binding method and device |
US9853977B1 (en) * | 2015-01-26 | 2017-12-26 | Winklevoss Ip, Llc | System, method, and program product for processing secure transactions within a cloud computing system |
-
2018
- 2018-11-21 CN CN201811390756.6A patent/CN109547303B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102421096A (en) * | 2011-12-22 | 2012-04-18 | 厦门雅迅网络股份有限公司 | Method for safely transmitting data based on wireless network |
US9853977B1 (en) * | 2015-01-26 | 2017-12-26 | Winklevoss Ip, Llc | System, method, and program product for processing secure transactions within a cloud computing system |
CN104993981A (en) * | 2015-05-14 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for controlling access of device |
CN106658488A (en) * | 2016-09-30 | 2017-05-10 | 海尔优家智能科技(北京)有限公司 | Intelligent household electric appliance, method and apparatus for safely accessing the intelligent household electric appliance |
CN106790156A (en) * | 2016-12-29 | 2017-05-31 | 海尔优家智能科技(北京)有限公司 | A kind of smart machine binding method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110366183A (en) * | 2019-08-02 | 2019-10-22 | 中国工商银行股份有限公司 | Short message safety protecting method and device |
CN112751872A (en) * | 2020-12-30 | 2021-05-04 | Tcl空调器(中山)有限公司 | Control method and control authority request method of air conditioner, air conditioner and communication module |
CN112751872B (en) * | 2020-12-30 | 2023-05-23 | Tcl空调器(中山)有限公司 | Control method of air conditioner, control authority request method, air conditioner and communication module |
CN115065522A (en) * | 2022-06-09 | 2022-09-16 | 北谷电子有限公司 | Security authentication method, vehicle-mounted controller, remote communication terminal, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109547303B (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11070364B2 (en) | Secure communication method and smart lock system based thereof | |
CN106130982B (en) | Intelligent household appliance remote control method based on PKI system | |
CN109618334B (en) | Control method and related equipment | |
CN106034028B (en) | A kind of terminal device authentication method, apparatus and system | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
CN108881304A (en) | A kind of pair of internet of things equipment carries out the method and system of safety management | |
CN109410406A (en) | A kind of authorization method, device and system | |
Saxena et al. | Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication | |
CN110198295A (en) | Safety certifying method and device and storage medium | |
CN109951513B (en) | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card | |
CN108809633B (en) | Identity authentication method, device and system | |
CN109309566B (en) | Authentication method, device, system, equipment and storage medium | |
CN107682152B (en) | Group key negotiation method based on symmetric cipher | |
EP3000216B1 (en) | Secured data channel authentication implying a shared secret | |
CN105162808A (en) | Safety login method based on domestic cryptographic algorithm | |
Sethia et al. | NFC secure element-based mutual authentication and attestation for IoT access | |
CN108509787A (en) | A kind of program authentication method | |
CN109547303A (en) | Control method and relevant device | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN110519052A (en) | Data interactive method and device based on Internet of Things operating system | |
CN106792700A (en) | The method for building up and system of a kind of secure communication environment of wearable device | |
CN113411187A (en) | Identity authentication method and system, storage medium and processor | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN109922022A (en) | Internet of Things communication means, platform, terminal and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |