WO2019237502A1 - Procédé et système de communication par cryptage dynamique utilisant une transmission de segmentation pour une maison intelligente - Google Patents

Procédé et système de communication par cryptage dynamique utilisant une transmission de segmentation pour une maison intelligente Download PDF

Info

Publication number
WO2019237502A1
WO2019237502A1 PCT/CN2018/101248 CN2018101248W WO2019237502A1 WO 2019237502 A1 WO2019237502 A1 WO 2019237502A1 CN 2018101248 W CN2018101248 W CN 2018101248W WO 2019237502 A1 WO2019237502 A1 WO 2019237502A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
smart home
module
home appliance
cloud
Prior art date
Application number
PCT/CN2018/101248
Other languages
English (en)
Chinese (zh)
Inventor
王佳骏
Original Assignee
王佳骏
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 王佳骏 filed Critical 王佳骏
Publication of WO2019237502A1 publication Critical patent/WO2019237502A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the invention relates to the technical field of transmission security of smart home appliances, and in particular, to a smart home dynamic encrypted communication method and system using segmented transmission.
  • Intelligent devices integrate microprocessor, sensor technology and communication technology into traditional home appliances, make them intelligent and have network terminal functions. They can obtain and sense the home appliance's own status and service status anytime, anywhere, and can automatically control and Accept user remote control instructions inside and outside the house.
  • the information transmission process between the network terminal of the user's electronic device and the cloud server of the home appliance may be subject to security threats such as viruses, internal interception and destruction, illegal intrusion, illegal access, interception, destruction of information integrity, implantation and impersonation, and privacy leakage.
  • security threats such as viruses, internal interception and destruction, illegal intrusion, illegal access, interception, destruction of information integrity, implantation and impersonation, and privacy leakage.
  • Abdullahi Arabo a researcher at the University of Oxford in the United Kingdom, in his paper on privacy issues brought about by smart home technology, "In reality, smart devices store more information than we store in our brains. As a result, Smart devices can easily be targeted by hackers, Trojans, and unauthorized users.
  • the present invention proposes a smart home dynamic encrypted communication method and system using segmented transmission.
  • a smart home dynamic encrypted communication method using segmented transmission includes the following steps:
  • the smart home appliance establishes a binding relationship with the second mobile terminal and the first mobile terminal respectively and sends the binding relationship to the cloud;
  • the smart home appliances respectively establish a communication channel with the second mobile terminal and the first mobile terminal through the cloud, and a communication channel is established between the second mobile terminal and the first mobile terminal;
  • the first mobile terminal submits an access request to the smart home appliance and sends the access request to the cloud and the second mobile terminal;
  • the second mobile terminal After receiving the access request, the second mobile terminal sends the access request to the smart home appliance and the cloud, respectively;
  • the smart home appliances After receiving the access requests of the first mobile terminal and the second mobile terminal, the smart home appliances respectively agree on an encrypted channel through the cloud with the first mobile terminal and the second mobile terminal through the RSA encryption method;
  • the natural number m is sent to the smart home appliance through the encrypted channel
  • the smart home appliance acquires m to generate a natural number n and m ⁇ n, and sends n to the second mobile terminal;
  • the second mobile terminal sends the received y to the smart home appliance
  • the smart appliance After receiving the x and y, the smart appliance sets x as the first ciphertext and y as the last ciphertext. According to m and n, k is obtained. According to k, x and y are spliced to obtain the primary ciphertext and decrypted. information.
  • the step of establishing an RSA encrypted channel between the second mobile terminal and the smart home appliance includes:
  • the second mobile terminal makes an access request to the smart home appliance, and sends the request to the cloud;
  • the smart home appliance After receiving the access request, the smart home appliance generates a key identifier and sends the key identifier to the cloud;
  • the cloud sends the permission key to the smart home appliance and the permission token to the second mobile terminal;
  • the second mobile terminal sends the permission token to the smart home appliance. After the smart home appliance obtains the permission token, it checks the permission key with the permission key. After the verification, the smart home appliance establishes an encrypted connection with the second mobile terminal.
  • the step of establishing the RSA encrypted channel between the first mobile terminal and the smart home appliance includes:
  • the first mobile terminal makes an access request to the smart home appliance, and sends the request to the cloud;
  • the smart home appliance After receiving the access request, the smart home appliance generates a key identifier and sends the key identifier to the cloud;
  • the cloud sends the permission key to the smart home appliance, and sends the permission token to the first mobile terminal;
  • the first mobile terminal sends the permission token to the smart home appliance. After the smart home appliance obtains the permission token, it checks with the permission key, and after the verification passes, the smart home appliance establishes an encrypted connection with the first mobile terminal.
  • the second mobile terminal is a smart watch with a camera
  • the first mobile terminal is a mobile phone or a tablet computer with a camera
  • the binding relationship is code scanning binding.
  • the smart home appliance is connected to the first mobile terminal and the second mobile terminal, respectively, and the second mobile terminal Connected with the first mobile terminal.
  • the first mobile terminal includes:
  • a first communication module for communicating with a smart home appliance, a cloud server, and a second mobile terminal
  • a first encryption module configured to encrypt information
  • a first operation module configured to split the encrypted ciphertext
  • a first supplementary module configured to complete the split ciphertext with bytes
  • the first supplementary module, the first binding module, and the first encryption module are respectively connected to the first communication module, and the first operation module is respectively connected to the first encryption module and the first encryption module. Supplementary modules.
  • the second mobile terminal includes
  • a second communication module configured to communicate with the smart home appliance, the cloud server, and the first mobile terminal
  • a second encryption module configured to encrypt information
  • a second operation module configured to generate a random number m and calculate k
  • the second communication module is connected to the second binding module, the second encryption module, and the second operation module, respectively.
  • the smart home appliance includes
  • a binding module configured to bind with the first mobile terminal and the second mobile terminal
  • a communication module configured to communicate with the first mobile terminal, the second mobile terminal, and the cloud server;
  • An operation module for generating a random number n and calculating k An operation module for generating a random number n and calculating k
  • a combining module configured to combine the received ciphertexts sent by the first mobile terminal and the second mobile terminal;
  • Encryption module for encrypting information
  • Supplementary module which is used to complete the byte of the split ciphertext
  • the communication module is respectively connected with the encryption module, the binding module, the operation module, the decryption module and the supplementary module
  • the split module is connected with the encryption module and the supplementary module, respectively
  • the split module is connected to the communication and the confidential module respectively.
  • the first mobile terminal and the second mobile terminal are transmitted in sections, and decryption can only be obtained without decrypting according to k.
  • the first mobile terminal and the second mobile terminal generally use a smart phone and a smart watch.
  • the transmission distance is point-to-point transmission. The distance is short, which is convenient for users to monitor, while ensuring that k will not be leaked through the network.
  • the first mobile terminal, the second mobile terminal and the smart home appliances are dynamically encrypted. A dynamic key is generated for each access. It is difficult to crack; at the same time, the parameters m and n of k are also dynamically generated, and each time the encrypted channel between the second mobile terminal and the smart home appliance is just generated, an interaction is performed.
  • the second mobile terminal and the The encrypted channel between smart appliances no longer appears and does not give the outside world time to crack; the first mobile terminal must cooperate with the second mobile terminal to communicate with the smart appliances, and even if one of the terminals is lost, it will not cause information leakage; Both a mobile terminal and a second mobile terminal can stop the entire communication process at any time; the first mobile terminal and the second mobile terminal are separated Bound with smart appliances, even missing one terminal, but also to eliminate the loss of terminal and another terminal of the same model with camouflage smart appliances may operate.
  • FIG. 1 is a schematic flowchart of a method according to an embodiment of the present invention.
  • connection should be understood in a broad sense unless explicitly stated and limited otherwise.
  • they may be fixed connections or removable.
  • Connection, or integral connection it can be mechanical or electrical connection; it can be directly connected, or it can be indirectly connected through an intermediate medium, or it can be the internal communication of two elements.
  • connection, or integral connection it can be mechanical or electrical connection; it can be directly connected, or it can be indirectly connected through an intermediate medium, or it can be the internal communication of two elements.
  • a smart home dynamic encrypted communication method using segmented transmission includes the following steps:
  • the smart home appliance establishes a binding relationship with the second mobile terminal and the first mobile terminal respectively and sends the binding relationship to the cloud;
  • the smart home appliances respectively establish a communication channel with the second mobile terminal and the first mobile terminal through the cloud, and a communication channel is established between the second mobile terminal and the first mobile terminal;
  • the first mobile terminal submits an access request to the smart home appliance and sends the access request to the cloud and the second mobile terminal;
  • the second mobile terminal After receiving the access request, the second mobile terminal sends the access request to the smart home appliance and the cloud, respectively;
  • the smart home appliances After receiving the access requests of the first mobile terminal and the second mobile terminal, the smart home appliances respectively agree on an encrypted channel through the cloud with the first mobile terminal and the second mobile terminal through the RSA encryption method;
  • the natural number m is sent to the smart home appliance through the encrypted channel
  • the smart home appliance acquires m to generate a natural number n and m ⁇ n, and sends n to the second mobile terminal;
  • the second mobile terminal obtains n and calculates
  • k, and sends the number k to the first mobile terminal;
  • the second mobile terminal sends the received y to the smart home appliance
  • the smart appliance After receiving the x and y, the smart appliance sets x as the first ciphertext and y as the last ciphertext. According to m and n, k is obtained. According to k, x and y are spliced to obtain the primary ciphertext and decrypted. information.
  • the command length is shorter and the bytes are shorter, even if it is calculated using an asymmetric algorithm The amount will not be very large.
  • the ciphertext length is also determined. Therefore, different operation commands can be encrypted into a fixed-length ciphertext for transmission during an encrypted communication process. In the decryption process, as long as the ciphertext is ultimately complete, it can be deciphered, and whether it is packed during transmission is not affected by the ciphertext. Therefore, this patent adopts the method of subpackaging and supplementing.
  • the fixed-length ciphertext is divided into two parts before and after, and random characters are supplemented for each part, so that the encrypted ciphertext becomes an undecipherable garble.
  • the ciphertext is not decipherable until it is restored to a complete ciphertext.
  • it can also be agreed with the smart appliance to encrypt the ciphertext once, which will completely disrupt the character sequence.
  • the smart appliance After receiving the ciphertext, the smart appliance first sorts and decrypts it, and then restores the ciphertext. Decryption is performed to further increase the security of transmission.
  • the smart home appliance when the smart home appliance sends information to the first mobile terminal, the encrypted text is also distributed to the first mobile terminal and the second mobile terminal through encryption and packaging mode, and the second mobile terminal sends the information to the first mobile terminal.
  • the information is sent to the first mobile terminal, and the first mobile terminal performs decryption to obtain the information.
  • the second mobile terminal only enables the calculation and encryption mode when transmitting m and n information with the smart home appliance.
  • the second mobile terminal only assumes the information forwarding role of the first mobile terminal and does not participate in the calculation and saves power. Improve battery life, reduce chip requirements, and integrate it into a watch or bracelet.
  • a code scanning method may be adopted, such as dynamically generating a two-dimensional code on the display screen of the smart home appliance.
  • the first mobile terminal scans the two-dimensional code with the smart home appliance.
  • a binding relationship is established, and at the same time, the first mobile terminal and the second mobile terminal can also be bound in a code scanning manner.
  • the first mobile terminal may be a smart phone, and the second mobile terminal may be a smart watch with a camera.
  • the cipher text can also be segmented by manually entering k.
  • k is calculated by the smart watch, A fraudulent character is transmitted randomly, but the k value is displayed on the watch screen, and then the user manually enters the k value, which is similar to the verification code or the "general order" display token in Netease games, preventing k from being transmitted due to transmission problems. The possibility of leakage.
  • the step of establishing an RSA encrypted channel between the second mobile terminal and the smart home appliance includes:
  • the second mobile terminal makes an access request to the smart home appliance, and sends the request to the cloud;
  • the smart home appliance After receiving the access request, the smart home appliance generates a key identifier and sends the key identifier to the cloud;
  • the cloud sends the permission key to the smart home appliance and the permission token to the second mobile terminal;
  • the second mobile terminal sends the permission token to the smart home appliance. After the smart home appliance obtains the permission token, it checks the permission key with the permission key. After the verification, the smart home appliance establishes an encrypted connection with the second mobile terminal.
  • the step of establishing the RSA encrypted channel between the first mobile terminal and the smart home appliance includes:
  • the first mobile terminal makes an access request to the smart home appliance, and sends the request to the cloud;
  • the smart home appliance After receiving the access request, the smart home appliance generates a key identifier and sends the key identifier to the cloud;
  • the cloud sends the permission key to the smart home appliance, and sends the permission token to the first mobile terminal;
  • the first mobile terminal sends the permission token to the smart home appliance. After the smart home appliance obtains the permission token, it checks with the permission key, and after the verification passes, the smart home appliance establishes an encrypted connection with the first mobile terminal.
  • the terminal may send a session request to the smart home appliance by using UDP.
  • the smart home appliance After receiving the session request, the smart home appliance generates a key identifier, and the key identifier may be based on its own device DeviceID calculates the HASH value and XORs the 16 bytes before and after the HASH value to generate the key identifier UDP_KEY_ID, or generate the key identifier by other methods, as long as the key identifier is not less than 32 characters.
  • the smart home appliance can send the key identifier to the cloud and the terminal through the TCP / IP protocol. After the cloud receives the key identifier, it queries whether the device has a binding record in the cloud.
  • the smart home appliance After receiving the key ID, the smart home appliance submits a verification request to the cloud and sends the key ID to the cloud. After the cloud receives the key identifier, it checks whether the terminal that submitted the verification request has a binding relationship with the smart device corresponding to the key identifier according to the key identifier. If it exists, it randomly generates a session key of not less than 32 bits, and The session key is encrypted into a session cipher text according to the permission key, the permission key is encrypted to form a permission token, and the permission token and the session cipher text are sent to the terminal, respectively.
  • the present invention combines the authorization token with the session ciphertext, and the session ciphertext also functions as a domestic authorization token.
  • the session key value is encrypted by using the symmetric encryption algorithm based on the authorization key. Encrypt the value, and then stitch the encrypted value with the hash value of the session key to form the session ciphertext, which contains both the session key and the right key, and acts as a permission token and as a session.
  • the ciphertext reduces the number of sending steps and reduces the chance of leaking.
  • the remote terminal After the remote terminal receives the session cipher text, that is, the session key, it sends the session cipher text to the smart device for verification.
  • the smart device decrypts the session ciphertext according to the permission key, decrypts the session key and calculates the hash value, and checks the obtained hash value with the hash value in the permission token.
  • the second mobile terminal is a smart watch with a camera
  • the first mobile terminal is a mobile phone or tablet computer with a camera
  • the binding relationship is code scanning binding
  • the smart home appliance is connected to the first mobile terminal and the second mobile terminal, respectively, and the second mobile terminal Connected with the first mobile terminal.
  • the first mobile terminal includes:
  • a first communication module for communicating with a smart home appliance, a cloud server, and a second mobile terminal
  • a first encryption module configured to encrypt information
  • a first operation module configured to split the encrypted ciphertext
  • a first supplementary module configured to complete the split ciphertext with bytes
  • the first supplementary module, the first binding module, and the first encryption module are respectively connected to the first communication module, and the first operation module is respectively connected to the first encryption module and the first encryption module. Supplementary modules.
  • the second mobile terminal includes
  • a second communication module configured to communicate with the smart home appliance, the cloud server, and the first mobile terminal
  • a second encryption module configured to encrypt information
  • a second operation module configured to generate a random number m and calculate k
  • the second communication module is connected to the second binding module, the second encryption module, and the second operation module, respectively.
  • the smart home appliance includes
  • a binding module configured to bind with the first mobile terminal and the second mobile terminal
  • a communication module configured to communicate with the first mobile terminal, the second mobile terminal, and the cloud server;
  • An operation module for generating a random number n and calculating k An operation module for generating a random number n and calculating k
  • a combination module configured to combine the received ciphertexts sent by the first mobile terminal and the second mobile terminal;
  • Encryption module for encrypting information
  • Supplementary module which is used to complete the byte of the split ciphertext
  • the communication module is connected to the encryption module, the binding module, the operation module, the decryption module, and the supplementary module
  • the split module is connected to the encryption module and the supplementary module, respectively.
  • the split module is connected to the communication and the confidential module respectively.
  • the first mobile terminal may also have a decryption module and a combination module, so that both the first mobile terminal and the smart home appliance can implement information encryption and decryption.
  • the advantages of the present invention are: in the mode of segmented transmission of the first mobile terminal and the second mobile terminal, only garbled characters can be obtained by decrypting without splitting according to k; the first mobile terminal and the second mobile terminal generally use smart phones And smart watch, the transmission distance is point-to-point transmission, the distance is short, convenient for user monitoring, and at the same time ensure that k will not leak through the network; the first mobile terminal, the second mobile terminal and smart home appliances are dynamically encrypted, each time The access will generate a dynamic key, which is difficult to crack. At the same time, the parameters m and k of k are also dynamically generated, and each time the encrypted channel between the second mobile terminal and the smart home appliance is just generated, the communication process is performed.
  • the encrypted channel between the second mobile terminal and the smart home appliance no longer appears and does not give the outside world time to crack; the first mobile terminal must cooperate with the second mobile terminal to communicate with the smart home appliance, even if one of the terminals is lost, it will not Causes information leakage; both the first mobile terminal and the second mobile terminal can stop the entire communication process at any time; the first mobile terminal With the second mobile terminal and smart appliances are binding, even if lost one terminal, but also to eliminate the loss of terminal and another terminal of the same model with camouflage smart appliances may operate.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention se rapporte au domaine technique de la sécurité de transmission pour des appareils intelligents et, en particulier, à un procédé et à un système de communication par cryptage dynamique utilisant une transmission de segmentation pour une maison intelligente. Des relations de liaison sont établies entre un appareil intelligent et un second terminal mobile et entre l'appareil intelligent et un premier terminal mobile et les relations de liaison sont envoyées à un nuage ; l'appareil intelligent établit de manière séparée un canal de communication avec le second terminal mobile et le premier terminal mobile au moyen du nuage et un canal de communication est établi entre le second terminal mobile et le premier terminal mobile ; le premier terminal mobile émet une demande d'accès à l'appareil intelligent et envoie la demande d'accès au nuage et au second terminal mobile ; le second terminal mobile envoie de manière séparée la demande d'accès à l'appareil intelligent et au nuage après la réception de la demande d'accès ; après la réception séparée des demandes d'accès en provenance du premier terminal mobile et du second terminal mobile, l'appareil intelligent détermine de manière séparée un canal crypté avec le premier terminal mobile et le second terminal mobile par le nuage au moyen du cryptage RSA.
PCT/CN2018/101248 2018-06-14 2018-08-20 Procédé et système de communication par cryptage dynamique utilisant une transmission de segmentation pour une maison intelligente WO2019237502A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810613268.0 2018-06-14
CN201810613268.0A CN108848503B (zh) 2018-06-14 2018-06-14 一种采用分节传输的智能家居动态加密通讯方法及***

Publications (1)

Publication Number Publication Date
WO2019237502A1 true WO2019237502A1 (fr) 2019-12-19

Family

ID=64202206

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/101248 WO2019237502A1 (fr) 2018-06-14 2018-08-20 Procédé et système de communication par cryptage dynamique utilisant une transmission de segmentation pour une maison intelligente

Country Status (2)

Country Link
CN (1) CN108848503B (fr)
WO (1) WO2019237502A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111487887A (zh) * 2020-04-29 2020-08-04 青岛海尔科技有限公司 用于绑定家电设备的方法、装置、用户终端、家电设备及服务器
CN117792668A (zh) * 2023-05-16 2024-03-29 中国标准化研究院 一种基于数字证书管理方法的智慧房屋管理***

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024724B (zh) * 2021-10-25 2023-06-13 四川启睿克科技有限公司 一种基于物联网的对称密钥动态生成方法
CN117993020A (zh) * 2024-04-03 2024-05-07 青岛国创智能家电研究院有限公司 基于安全多方计算的家电网络图的搜索方法、装置和设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271035A (zh) * 2011-09-02 2011-12-07 华为技术有限公司 传输密码的方法和装置
CN102594823A (zh) * 2012-02-20 2012-07-18 南京邮电大学 一种远程安全访问智能家居的可信***
US20160285644A1 (en) * 2015-03-24 2016-09-29 Lenovo (Beijing) Co., Ltd. Device and Method for Smart Home
CN106101147A (zh) * 2016-08-12 2016-11-09 北京同余科技有限公司 一种实现智能设备与远程终端动态加密通讯的方法及***
CN106130958A (zh) * 2016-06-08 2016-11-16 美的集团股份有限公司 家电设备与终端的通讯***及方法、家电设备、终端

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104168666A (zh) * 2014-08-28 2014-11-26 四川长虹电器股份有限公司 WiFi遥控智能家电设备***及方法
CN104660618A (zh) * 2015-03-24 2015-05-27 联想(北京)有限公司 绑定方法和绑定设备
CN104917753B (zh) * 2015-05-04 2018-07-10 北京奇艺世纪科技有限公司 一种基于对称密钥进行通信的方法和***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271035A (zh) * 2011-09-02 2011-12-07 华为技术有限公司 传输密码的方法和装置
CN102594823A (zh) * 2012-02-20 2012-07-18 南京邮电大学 一种远程安全访问智能家居的可信***
US20160285644A1 (en) * 2015-03-24 2016-09-29 Lenovo (Beijing) Co., Ltd. Device and Method for Smart Home
CN106130958A (zh) * 2016-06-08 2016-11-16 美的集团股份有限公司 家电设备与终端的通讯***及方法、家电设备、终端
CN106101147A (zh) * 2016-08-12 2016-11-09 北京同余科技有限公司 一种实现智能设备与远程终端动态加密通讯的方法及***

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111487887A (zh) * 2020-04-29 2020-08-04 青岛海尔科技有限公司 用于绑定家电设备的方法、装置、用户终端、家电设备及服务器
CN111487887B (zh) * 2020-04-29 2023-11-28 青岛海尔科技有限公司 用于绑定家电设备的方法、装置、用户终端、家电设备及服务器
CN117792668A (zh) * 2023-05-16 2024-03-29 中国标准化研究院 一种基于数字证书管理方法的智慧房屋管理***

Also Published As

Publication number Publication date
CN108848503A (zh) 2018-11-20
CN108848503B (zh) 2019-03-26

Similar Documents

Publication Publication Date Title
JP7152466B2 (ja) セキュア通信方法及びそれに基づくスマートロックシステム
WO2019237502A1 (fr) Procédé et système de communication par cryptage dynamique utilisant une transmission de segmentation pour une maison intelligente
US9055047B2 (en) Method and device for negotiating encryption information
TWI642288B (zh) Instant communication method and system
US20070106894A1 (en) Communication device, communication system and authentication method
CN105871920A (zh) 终端与云服务器的通讯***及方法、终端、云服务器
US11736304B2 (en) Secure authentication of remote equipment
CN106162537B (zh) 一种安全认证连接的方法、无线通信设备及终端
CN106101147A (zh) 一种实现智能设备与远程终端动态加密通讯的方法及***
CN103248479A (zh) 云存储安全***、数据保护以及共享方法
CN103561044A (zh) 数据传输方法和数据传输***
CN110572804A (zh) 蓝牙通信认证请求、接收及通信方法、移动端、设备端
RU2645597C2 (ru) Способ аутентификации в канале скрытой передачи данных
US11652640B2 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN106131008B (zh) 视音频监控设备及其安全认证方法、视音频展示设备
CN110224822A (zh) 一种密钥协商方法及***
CN113411187B (zh) 身份认证方法和***、存储介质及处理器
CN104035408A (zh) 一种rtu控制器及其与scada***通信方法
CN109547303A (zh) 控制方法及相关设备
CN107104888B (zh) 一种安全的即时通信方法
TW202231014A (zh) 訊息傳輸系統以及應用其中之使用者裝置與資訊安全硬體模組
KR100789354B1 (ko) 네트워크 카메라, 홈 게이트웨이 및 홈 오토메이션장치에서의 데이터 보안 유지 방법 및 장치
US10972912B1 (en) Dynamic establishment of trust between locally connected devices
CN111489462A (zh) 一种个人用蓝牙钥匙***
CN111489461B (zh) 一种集团用蓝牙钥匙***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18922752

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18922752

Country of ref document: EP

Kind code of ref document: A1