CN107948178A - Intelligent domestic system and information ciphering method and device, terminal - Google Patents
Intelligent domestic system and information ciphering method and device, terminal Download PDFInfo
- Publication number
- CN107948178A CN107948178A CN201711261222.9A CN201711261222A CN107948178A CN 107948178 A CN107948178 A CN 107948178A CN 201711261222 A CN201711261222 A CN 201711261222A CN 107948178 A CN107948178 A CN 107948178A
- Authority
- CN
- China
- Prior art keywords
- information
- gateway
- sequence number
- key sequence
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Abstract
Present invention is disclosed a kind of intelligent domestic system and information ciphering method and device, terminal, belong to Computer Applied Technology field.Intelligent domestic system includes terminal, gateway and home equipment, wherein:Terminal obtains the Ciphering Key Sequence Number that gateway is sent, and obtains encryption key according to key is chosen from the key sequence that it is stored according to Ciphering Key Sequence Number when generating control information according to the control operation of triggering, to be sent to gateway after control information is encrypted;Gateway is in the encryption information that receiving terminal is sent, decruption key is chosen according to the Ciphering Key Sequence Number of its transmission, encryption information to be decrypted to obtain control information, then control information is sent to relevant home equipment, so that home equipment works according to control information.In addition, additionally provide information encryption device and terminal.Above-mentioned intelligent domestic system can ensure the communication security in LAN with information ciphering method and device, terminal, improve the security that home equipment control is carried out by LAN.
Description
Technical field
The present invention relates to Computer Applied Technology field, more particularly to a kind of intelligent domestic system and information ciphering method and
Device, terminal.
Background technology
With the high speed development of smart home technology, more and more home equipments realize intelligence.Mobile phone, tablet electricity
Control terminal of the terminals such as brain as smart home, is connected by the communication with gateway, and intelligent family is collectively constituted with home equipment
System is occupied, so as to fulfill the intelligentized control method to home equipment.
In intelligent domestic system, to avoid the control to home equipment by instrument, ensure the security of communication, need to be to control
Information processed is encrypted.At present, for intelligent domestic system when carrying out the control of home equipment, terminal A is according to default close
Key is sent to gateway B after being encrypted to control information into row information, so gateway B after encryption information is got by default close
Encryption information is decrypted in key, obtains control information, and due to other-end and is unaware of the default key, thus other
Even if terminal gets the encryption information, successfully the encryption information can not be also decrypted, known in the encryption information
Real content, so as to fulfill the encrypted purpose of information in LAN.
However, when other-end is truncated to terminal A and is sent to the encryption information of gateway B, gateway B gets encryption letter
After breath, although it can not know the real content in the encryption information, it can pretend to be terminal A at other times to gateway B
Send the encryption information, make terminal B mistake time perform the encryption information in real content, so as to can not ensure intelligence
Communication security in house system.
The content of the invention
In order to solve the technical problem that communication security is poor in the intelligent domestic system in correlation technique, the present invention provides
A kind of intelligent domestic system and information ciphering method and device, terminal.
First aspect, there is provided a kind of intelligent domestic system, the intelligent domestic system include:Terminal, gateway and household
Equipment, wherein:
The terminal, when generating control information according to the control operation of triggering, obtains the key sequence that the gateway is sent
Number, and choose key from default key sequence according to the Ciphering Key Sequence Number and obtain encryption key, further according to the encryption
Key is sent to the gateway after the control information is encrypted;
The gateway, when receiving the encryption information that the terminal is sent, according to the Ciphering Key Sequence Number of its transmission from key
Choose decruption key in sequence, and be decrypted to obtain control information to the encryption information with the decruption key, then by institute
State control information and be sent to relevant home equipment, so that the home equipment works according to the control information.
Second aspect, there is provided information ciphering method, including:
Terminal obtains the Ciphering Key Sequence Number that gateway is sent when generating control information according to the control operation of triggering;
Key is chosen from default key sequence according to the Ciphering Key Sequence Number, obtains encryption key;
The control information is encrypted to obtain encryption information according to the encryption key;
The encryption information is sent to the gateway.
The third aspect, there is provided another information ciphering method, including:
The encryption information that gateway receiving terminal is sent;
Respond the reception of the encryption information, the gateway is according to the Ciphering Key Sequence Number that the terminal is sent from default
Key is chosen in key sequence, obtains decruption key;
The encryption information is decrypted to obtain control information by the decruption key;
The control information is sent to related home equipment, so that the home equipment is carried out according to the control information
Work.
Fourth aspect, there is provided a kind of information encryption device, including:
Ciphering Key Sequence Number acquisition module, for terminal when generating control information according to the control operation of triggering, obtains net
Close the Ciphering Key Sequence Number sent;
Encryption key chooses module, for choosing key from default key sequence according to the Ciphering Key Sequence Number, obtains
To encryption key;
Encrypting module, for being encrypted to obtain encryption information to the control information according to the encryption key;
Encryption information sending module, for sending the encryption information to the gateway.
5th aspect, there is provided another information encryption device, including:
Encryption information receiving module, the encryption information sent for gateway receiving terminal;
Decruption key chooses module, and for responding the reception of the encryption information, the gateway is sent out according to the terminal
The Ciphering Key Sequence Number sent chooses key from default key sequence, obtains decruption key;
Deciphering module, for being decrypted to obtain control information to the encryption information by the decruption key;
Control information sending module, for the control information to be sent to related home equipment, so that the household is set
It is standby to work according to the control information.
6th aspect, there is provided a kind of terminal, including:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes the such as the 4th when being performed by the processor
Method described in aspect.
7th aspect, there is provided a kind of gateway, including:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes the such as the 5th when being performed by the processor
Method described in aspect.
Eighth aspect, there is provided a kind of computer readable storage medium, is stored thereon with computer program, the calculating
Machine program realizes the method such as second or third aspect when executed.
The technical solution provided by the embodiment of the present invention can obtain following beneficial effect:
For intelligent domestic system during the control of home equipment is carried out, terminal is generating control according to the control operation of triggering
During information processed, the Ciphering Key Sequence Number that gateway is sent is obtained, key is chosen from default key sequence according to Ciphering Key Sequence Number, is obtained
To encryption key, control information is encrypted according to encryption key to obtain encryption information, to gateway transmission encryption information, and by
The Ciphering Key Sequence Number that encryption key is generated in terminal is that gateway is sent, thus gateway can be obtained according to the Ciphering Key Sequence Number and solved
Key, and then can smoothly identify control information after after receiving the encryption information by decryption key decryption, so as to only need
Inform that Ciphering Key Sequence Number would know that encryption key and decruption key, avoid the other-end in LAN from knowing the encryption information
Decruption key, ensure that the communication security in intelligent domestic system, substantially increase what related home equipment was controlled
Security.
It should be appreciated that the general description and following detailed description of the above are only exemplary, the present invention and from
Limitation.
Brief description of the drawings
Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining the principle of the present invention together with specification.
Fig. 1 is the schematic diagram of an implementation environment according to involved by the disclosure.
Fig. 2 is a kind of block diagram of terminal 100 according to an exemplary embodiment.
Fig. 3 is a kind of structure diagram of intelligent domestic system according to an exemplary embodiment.
Fig. 4 is the structure diagram that another intelligent domestic system for implementing to exemplify is corresponded to according to Fig. 3.
Fig. 5 is a kind of information ciphering method flow chart according to an exemplary embodiment.
Fig. 6 is a kind of specific implementation flow that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5
Figure.
Fig. 7 is another specific implementation stream that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5
Cheng Tu.
Fig. 8 is another information ciphering method flow chart according to an exemplary embodiment.
Fig. 9 is a kind of specific implementation flow that step S240 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 8
Figure.
Figure 10 is that home equipment is controlled in a kind of intelligent domestic system according to an exemplary embodiment
Method schematic diagram.
Figure 11 is a kind of block diagram of information encryption device according to an exemplary embodiment.
Figure 12 is to correspond to Ciphering Key Sequence Number acquisition module in information encryption device shown in exemplary embodiment according to Figure 11
A kind of 110 block diagram.
Figure 13 is to correspond to Ciphering Key Sequence Number acquisition module in information encryption device shown in exemplary embodiment according to Figure 11
110 another block diagram.
Figure 14 is the block diagram of another information encryption device according to an exemplary embodiment.
Figure 15 is to correspond to control information sending module 240 in information encryption device shown in exemplary embodiment according to Figure 14
A kind of block diagram.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following exemplary is implemented
Embodiment described in example does not represent all embodiments consistent with the present invention.On the contrary, they are only and such as institute
The example of the consistent apparatus and method of described, of the invention some aspects in attached claims.
Fig. 1 is the schematic diagram of an implementation environment according to involved by the disclosure.The implementation environment includes:Terminal, gateway
200 and the router 300 that carries out data transmission for terminal 100 and gateway 200.
Terminal 100 obtains the Ciphering Key Sequence Number that gateway 200 is sent when generating control information, and according to Ciphering Key Sequence Number
Key is chosen from default key sequence and obtains encryption key, control information is encrypted according still further to encryption key and is added
Confidential information, by router 300 to gateway 200 send encryption information, and gateway 200 according to its to terminal 100 send key
Sequence number, key is chosen from default key sequence, obtains decruption key, and encryption information is carried out by the decruption key
Decryption, obtains control information and relevant device is controlled.
Terminal 100 can be the computer equipments such as mobile phone, computer, specific implementation from the present embodiment limitation.
Fig. 2 is a kind of block diagram of terminal 100 according to an exemplary embodiment.
With reference to figure 2, terminal 100 can include one or more following component:Processing component 101, memory 102, electricity
Source component 103, multimedia component 104, audio component 105, sensor component 107 and communication component 108.Wherein, above-mentioned group
Part is simultaneously not all necessary, and terminal 100 can increase other assemblies according to itself functional requirement or reduce some components, this implementation
Example is not construed as limiting.
The integrated operation of the usual control terminal 100 of processing component 101, such as with display, call, data communication, phase
Operation that machine operates and record operation is associated etc..Processing component 101 can be performed including one or more processors 109
Instruction, to complete all or part of step of aforesaid operations.In addition, processing component 101 can include one or more modules, just
Interaction between processing component 101 and other assemblies.For example, processing component 101 can include multi-media module, it is more to facilitate
Interaction between media component 104 and processing component 101.
Memory 102 is configured as storing various types of data to support the operation in terminal 100.These data are shown
Example includes the instruction of any application program or method for operating on the terminal 100.Memory 102 can be by any kind of
Volatibility or non-volatile memory device or combinations thereof are realized, such as SRAM (Static Random Access
Memory, static RAM), EEPROM (Electrically Erasable Programmable Read-
Only Memory, electrically erasable programmable read-only memory), EPROM (Erasable Programmable Read Only
Memory, Erasable Programmable Read Only Memory EPROM), (Programmable Read-Only Memory, may be programmed read-only PROM
Memory), ROM (Read-Only Memory, read-only storage), magnetic memory, flash memory, disk or CD.Storage
One or more modules are also stored with device 102, which is configured to by the one or more processors 109
Perform, to complete all or part of step in any shown method of Fig. 5, Fig. 6 and Fig. 7.
Power supply module 103 provides electric power for the various assemblies of terminal 100.Power supply module 103 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal 100.
Multimedia component 104 is included in the screen of one output interface of offer between the terminal 100 and user.One
In a little embodiments, screen can include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch
Panel, touch panel).If screen includes touch panel, screen may be implemented as touch-screen, from the user to receive
Input signal.Touch panel includes one or more touch sensors to sense the gesture on touch, slip and touch panel.Institute
The boundary of a touch or slide action can not only be sensed by stating touch sensor, but also be detected and the touch or slide phase
The duration and pressure of pass.
Audio component 105 is configured as output and/or input audio signal.For example, audio component 105 includes a Mike
Wind, when terminal 100 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone is configured as connecing
Receive external audio signal.The received audio signal can be further stored in memory 102 or be sent out via communication component 108
Send.In certain embodiments, audio component 105 further includes a loudspeaker, for exports audio signal.
Sensor component 107 includes one or more sensors, and the state for providing various aspects for terminal 100 is commented
Estimate.For example, sensor component 107 can detect opening/closed mode of terminal 100, the relative positioning of component, sensor group
Part 107 can be changed with the coordinate of 100 1 components of detection terminal 100 or terminal and the temperature change of terminal 100.At some
In embodiment, which can also include Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 108 is configured to facilitate the communication of wired or wireless way between terminal 100 and other equipment.Terminal
100 can access the wireless network based on communication standard, such as WiFi (Wireless-Fidelity, wireless network), 2G or 3G,
Or combinations thereof.In one exemplary embodiment, communication component 108 receives via broadcast channel and comes from external broadcasting management
The broadcast singal or broadcast related information of system.In one exemplary embodiment, the communication component 108 further includes NFC
(Near Field Communication, near-field communication) module, to promote junction service.For example, it can be based in NFC module
RFID (Radio Frequency Identification, radio frequency identification) technology, IrDA (Infrared Data
Association, Infrared Data Association) technology, UWB (Ultra-Wideband, ultra wide band) technology, BT (Bluetooth, it is blue
Tooth) technology and other technologies realize.
In the exemplary embodiment, terminal 100 can be by one or more ASIC (Application Specific
Integrated Circuit, application specific integrated circuit), DSP (Digital Signal Processing, at digital signal
Manage device), PLD (Programmable Logic Device, programmable logic device), FPGA (Field-Programmable
Gate Array, field programmable gate array), controller, microcontroller, microprocessor or other electronic components realize, be used for
Perform the above method.
Processor performs the concrete mode of operation in the related information ciphering method in server in the embodiment
Embodiment in perform detailed description, will no longer elaborate explanation herein.
Fig. 3 is a kind of structure diagram of intelligent domestic system according to an exemplary embodiment, as shown in figure 3, should
Intelligent domestic system includes:Terminal 100, gateway 200 and home equipment 300, wherein:
Terminal 100 obtains the Ciphering Key Sequence Number that gateway 200 is sent when generating control information according to the control operation of triggering
Key is chosen from default key sequence and obtains encryption key, is sent after control information is encrypted further according to encryption key
To gateway 200;
Gateway 200 is in the encryption information that receiving terminal 100 is sent, according to the Ciphering Key Sequence Number of its transmission from key sequence
Middle selection decruption key, and with decruption key encryption information is decrypted to obtain control information, then control information is sent to
Relevant home equipment 300, so that home equipment works according to control information, so that gateway is chosen according to Ciphering Key Sequence Number
Judgement of the decruption key into the row information true and false is obtained, avoids other-end from knowing the encryption key or encryption information of the control information
Decruption key, and when encryption information is sent by pretending to be so that be mistakenly controlled to related home equipment 300 so that
It ensure that the communication security in intelligent domestic system, substantially increase the security being controlled to related home equipment.
Home equipment 300 can be the household electrical appliances such as intelligent refrigerator, intelligent air condition or Intelligent wall switch, air-conditioning companion
Companion, the first-class smart home device of intelligent camera, specific implementation from the present embodiment limitation.
Communication connection can be carried out by LANs such as ZIGBEE, bluetooths between terminal 100 and gateway 200, can also led to
Cross the outer nets such as WIFI, 2G/3G/4G/5G and carry out communication connection.
When carrying out communication connection by LAN between terminal 100 and gateway 200, even if terminal 100 can not connect outer net,
Also it can realize the control in intelligent domestic system to home equipment, and communicate limitation of the connection from outer net network quality, significantly
Provide the convenience of intelligent domestic system.
Optionally, Fig. 4 is that the structure diagram of another intelligent domestic system for implementing to exemplify, such as Fig. 4 are corresponded to according to Fig. 3
Shown, which further includes cloud server 400, and cloud server 400 connects with terminal 100, the communication of gateway 200
When connecing, Key production information is sent respectively to terminal 100, gateway 200, terminal 100 and gateway 200 are respectively according to each receiving
The generation of key or decruption key is encrypted in key generating mode in Key production information.
Fig. 5 is a kind of information ciphering method flow chart according to an exemplary embodiment, as shown in figure 5, the information
Encryption method may comprise steps of.
In step s 110, terminal obtains the close of gateway transmission when generating control information according to the control operation of triggering
Key sequence number.
Control information is the information that relevant equipment is controlled in local area network.
Implementation environment schematic diagram as described in Figure 1, user generate phase by being manipulated to the APP run in terminal
The control information answered.
Gateway send Ciphering Key Sequence Number mode have it is a variety of, can be with fixed frequency to terminal send Ciphering Key Sequence Number,
Ciphering Key Sequence Number can also be sent when terminal is inquired to gateway, can also be and send broadcast in other way.
It should be noted that the Ciphering Key Sequence Number that gateway is sent every time is different, even if other-end is obtaining
During certain Ciphering Key Sequence Number once, attacked by pretending to be, gateway after the encryption information of other-end transmission is received,
Decruption key will be generated according to new key sequence number, so that the encryption information that can not be sent to other-end is decrypted, so that
Further avoid other-end from being attacked by pretending to be, enable the gateway to the encryption information successful decryption sent to other-end
And mistake performs corresponding operating according to the control information obtained after decryption, it ensure that and relevant device is controlled by LAN
Security.
In the step s 120, key is chosen from default key sequence according to Ciphering Key Sequence Number, obtains encryption key.
Key sequence is set in advance.
Key sequence includes the order set of multiple keys, and each key is mutually different in key sequence.
Key can be numeral or phrase, can also be other forms, herein not to the concrete form of key into
Row limits.For example, key sequence is to include 100,000 mutually different numerals.
Therefore, according to a specific Ciphering Key Sequence Number, it can be chosen from key sequence and obtain a specific key.
Terminal chosen according to Ciphering Key Sequence Number from default key sequence key mode have it is a variety of, can be from key sequence
The key for being ordered as the Ciphering Key Sequence Number is chosen in row;Can also be according to the Ciphering Key Sequence Number, from default key sequence
Choose a key being ordered as before or after the key of the Ciphering Key Sequence Number;Can also be in other way, according to
Ciphering Key Sequence Number chooses key from default key sequence, this not to according to Ciphering Key Sequence Number from default key sequence
The concrete mode for choosing key is defined.
It should be noted that the key sequence in terminal and gateway can be identical or corresponding,
After key in the key sequence that i.e. terminal is stored according to it is encrypted into row information, and gateway is then according to the key sequence of its storage
In key can succeed into row information decrypt.That is, it can encrypt and believe into row information by an identical key
Breath decryption;Can also be encrypted by a key into row information, by another with the encrypted corresponding key of key into
Row information is decrypted, so as to ensure that gateway being capable of successful decryption after encryption information is received.
In step s 130, control information is encrypted according to encryption key to obtain encryption information.
It should be noted that terminal chooses key according to Ciphering Key Sequence Number from default key sequence obtains encryption key
Into row information encrypt, and gateway then chosen according to the Ciphering Key Sequence Number from identical key sequence key obtain decruption key into
Row information is decrypted, and since key sequence is identical or corresponding, Ciphering Key Sequence Number is identical, thus gateway is after encryption information is received
Can successful decryption obtain control information.
In step S140, encryption information is sent to gateway.
Using method as described above, intelligent domestic system is during the control of home equipment is carried out, and terminal is in basis
During the control operation generation control information of triggering, selected according to the Ciphering Key Sequence Number for obtaining gateway transmission from default key sequence
Take key to obtain encryption key, and according to encryption key control information is encrypted to obtain encryption information, then sent to gateway
Encryption information, and since the Ciphering Key Sequence Number for obtaining encryption key is that gateway is sent, thus gateway can be according to the key sequence
Row number obtains decruption key from key sequence, and then can be smooth after reception encryption information and by decryption key decryption
Control information is identified, so as to need to only pass through the transmission of Ciphering Key Sequence Number, you can realize the encryption and decryption of control information, avoid it
His terminal knows the encryption key of the control information or the decruption key of encryption information, and when encryption information is sent by pretending to be,
So that mistake is controlled relevant home equipment, the communication security in intelligent domestic system ensure that, substantially increase pair
The security that related home equipment is controlled.
Optionally, Fig. 6 is the detailed description that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5,
As shown in fig. 6, the step S110 in the information ciphering method can also comprise the following steps.
In step S111, terminal receives the Ciphering Key Sequence Number that gateway is sent according to default time interval.
The time interval that gateway sends Ciphering Key Sequence Number is a pre-set time range value, which cannot
Set excessive, can not set too small, in actual intelligent domestic system, the time interval can be finely adjusted in advance.
In one exemplary embodiment, time interval is preset as 5 seconds.
For terminal when receiving the Ciphering Key Sequence Number that gateway is sent with fixed frequency, it does not immediately obtain the key sequence
Number and key is chosen from default key sequence, and only according to the control operation of triggering generate control information when, just obtain
Take the Ciphering Key Sequence Number that it is received.
Since terminal according to the control operation of triggering when generating control information, control information is encrypted it is time-consuming,
By encryption information be sent to the encryption information that the time-consuming and gateway receiving terminal of gateway sends it is time-consuming be it is very short, because
And as long as the fixed frequency that gateway sends Ciphering Key Sequence Number is not very big, i.e., gateway sends the interval time of Ciphering Key Sequence Number
Be not it is especially small, gateway receive terminal transmission encryption information when, can know terminal be according to its transmission which
What the key that a Ciphering Key Sequence Number is chosen was encrypted.
In step S112, obtain what is received when generating control information from the Ciphering Key Sequence Number for receiving gateway transmission
Ciphering Key Sequence Number.
Using method as above, gateway sends Ciphering Key Sequence Number according to default time interval to terminal, so that terminal exists
When generating control information, the last Ciphering Key Sequence Number received is directly searched in the Ciphering Key Sequence Number for receiving gateway transmission
, without specially inquiring Ciphering Key Sequence Number to gateway, substantially increase the convenience for obtaining Ciphering Key Sequence Number.
Optionally, Fig. 7 is another details that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5
Description, as shown in fig. 7, the step S110 in the information ciphering method can also comprise the following steps.
In step S114, terminal sends Ciphering Key Sequence Number when generating control information, to gateway and obtains request.
In LAN, terminal sends Ciphering Key Sequence Number to gateway by router and obtains request.
Ciphering Key Sequence Number obtains the instruction that request is the acquisition request Ciphering Key Sequence Number that terminal is sent to gateway.
For ensure to make gateway after encryption information is received can successful decryption obtain control information, terminal need to be made from default
Key sequence in the Ciphering Key Sequence Number chosen when obtaining encryption key choose and solved from default key sequence with gateway
Ciphering Key Sequence Number during key is identical.Therefore, when terminal generation control information needs encryption key, by being sent to gateway
Ciphering Key Sequence Number obtains request, obtains the Ciphering Key Sequence Number that gateway is sent, and then according to the Ciphering Key Sequence Number from default key
Chosen in sequence and obtain encryption key, so as to ensure that terminal chooses to obtain the Ciphering Key Sequence Number of encryption key and chooses to obtain with gateway
The Ciphering Key Sequence Number of decruption key is identical.
In step sl 15, the Ciphering Key Sequence Number that gateway response key sequence number obtains request and sends is received.
Using method as described above, terminal sends Ciphering Key Sequence Number when generating control information, to gateway and obtains request,
Gateway is asked to send Ciphering Key Sequence Number, so that ensureing that terminal is chosen from default key sequence obtains the key sequence of encryption key
The Ciphering Key Sequence Number that row number chooses to obtain decruption key with gateway is identical, further ensures gateway and is receiving terminal transmission
Encryption information after can successful decryption and obtain control information, without successful decryption other-end by pretend to be transmission plus
Confidential information, ensure that the communication security in intelligent domestic system, improves in intelligent domestic system and relevant device is controlled
Security.
Fig. 8 is a kind of information ciphering method flow chart according to an exemplary embodiment, as shown in figure 8, the information
Encryption method may comprise steps of.
In step S210, the encryption information of gateway receiving terminal transmission.
The encryption information that gateway receiving terminal is sent is that terminal sends encryption information by LAN to gateway.
In step S220, the reception of encryption information is responded, gateway is according to the Ciphering Key Sequence Number that terminal is sent from default
Key sequence in choose key, obtain decruption key.
For gateway in the encryption information that receiving terminal is sent, the Ciphering Key Sequence Number sent immediately according to it to the terminal is from pre-
If key sequence in choose key obtain decruption key.
Since Ciphering Key Sequence Number is identical, default key sequence is identical or corresponding, thus gateway is receiving encryption letter
After breath can successful decryption obtain can identified control information.
In step S230, encryption information is decrypted by decruption key to obtain control information.
As previously described, terminal is to obtain encryption information after control information is encrypted.Therefore, decruption key pair is passed through
Information is will be controlled after encryption information decryption.
The decruption key that encryption information is decrypted with gateway such as the encryption key that control information is encrypted in gateway
Identical, then control information is obtained after encryption information being decrypted by decruption key can then be identified, i.e. this time sends encryption
Information is effective, and gateway will be controlled relevant device according to the control information;As control information is encrypted in gateway
Encryption key it is different from the decruption key that encryption information is decrypted in gateway, then by decruption key to encryption information carry out
Control information is obtained after decryption cannot then be successfully identified, i.e. the encryption information of this transmission is invalid.Therefore, when gateway exists
During None- identified control information, then the encryption information for showing this transmission is invalid, and gateway abandons the control information, not
Corresponding operating is performed according to the control information.
In step S240, control information is sent to related home equipment so that home equipment according to control information into
Row work.
Using method as described above, gateway in receiving encryption key, according to the Ciphering Key Sequence Number that terminal is sent from
Key is chosen in default key sequence and obtains decruption key, and encryption information is decrypted by the decruption key and is controlled
Information processed, even if other-end by pretending to be the encryption information attacked to send to be decrypted, is also only believed in control
When breath is identified, just relevant device is controlled according to control information, so that the peace being further controlled to relevant device
Quan Xing, ensure that the communication security in intelligent domestic system.
Optionally, Fig. 9 is the detailed description that step S240 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 8,
As shown in figure 9, the step S240 in the information ciphering method can also comprise the following steps.
In step S241, when identifying control information, relevant device is controlled according to control information.
In step S242, in None- identified control information, then control information is abandoned.
It is understood that if control information is the content of the control information to obtained from encryption information successful decryption
It can usually be successfully identified.
But to avoid encryption information from being successfully decrypted after obtaining control information, the information content of None- identified control information is but
Will the control information be sent to relevant home equipment, it would be possible to cause the home equipment operation produce failure, to the family
Equipment is occupied to cause to damage.
Therefore, after the information content of control information is successfully identified, the control information is just sent into related home equipment,
Substantially increase the security being controlled to related home equipment.
And after the information content of control information cannot be identified successfully, then the control information is abandoned, no longer control this
Information sends related home equipment.
Figure 10 is that home equipment is controlled in a kind of intelligent domestic system according to an exemplary embodiment
Method schematic diagram.
In step S310, terminal, gateway are connected by the communication with high in the clouds, receive the key sequence that high in the clouds is sent respectively
Row.
It is understood that encryption key or decruption key that terminal is chosen with gateway are the shapes with key sequence
Formula is stored in advance in its respective storage, and then the Ciphering Key Sequence Number that terminal is sent according to gateway is chosen from key sequence
Control information is encrypted to encryption key, and by the encryption key, and gateway passes through it after encryption information is received
Chosen to the Ciphering Key Sequence Number that the terminal is sent from the key sequence for going storage and obtain decruption key, and according to the decruption key
Encryption information is decrypted.
And when terminal, gateway communicate with high in the clouds connect first, high in the clouds will be generated comprising the key of key generating mode believes
Breath is sent respectively to terminal and gateway, and terminal and the key sequence that gateway receives respectively are identical, so as to ensure end
After being encrypted to control information and being then forwarded to gateway, gateway can be smoothed out decrypting and identifying the control letter after decryption at end
Breath.
In step s 320, terminal obtains the close of gateway transmission when generating control information according to the control operation of triggering
Key sequence number.
In step S330, terminal chooses key according to Ciphering Key Sequence Number from default key sequence, obtains encrypting close
Key.
In step S340, terminal is encrypted to obtain encryption information according to encryption key to control information, and to gateway
Send encryption information.
In step S350, the encryption information of gateway receiving terminal transmission, and according to the Ciphering Key Sequence Number sent to terminal
Key is chosen from default key sequence, obtains decruption key.
In step S360, gateway is decrypted encryption information by decruption key to obtain control information.
In step S370, when identifying control information, relevant device is controlled according to control information.
Following is present system embodiment, can be used for performing above- mentioned information encryption method embodiment.For the present invention
The details not disclosed in system embodiment, refer to information ciphering method embodiment of the present invention.
Figure 11 is a kind of block diagram of information encryption device according to an exemplary embodiment, which includes running on
Ciphering Key Sequence Number acquisition module 110, encryption key in the application program of terminal choose module 120, encrypting module 130 and encryption
Information sending module 140.
Ciphering Key Sequence Number acquisition module 110, for terminal when generating control information according to the control operation of triggering, obtains
The Ciphering Key Sequence Number that gateway is sent;
Encryption key chooses module 120, for choosing key from default key sequence according to Ciphering Key Sequence Number, obtains
Encryption key;
Encrypting module 130, for control information to be encrypted according to encryption key to obtain encryption information;
Encryption information sending module 140, for sending encryption information to gateway.
In above device the function of modules and effect to realize that process specifically refers to right in above- mentioned information encryption method
That answers step realizes process, and details are not described herein.
Optionally, as shown in figure 12, Ciphering Key Sequence Number acquisition module 110 is further included but is not limited to:Ciphering Key Sequence Number receives
Unit 111 and first key sequence number acquiring unit 112.
Ciphering Key Sequence Number receiving unit 111, the key sequence sent for terminal reception gateway according to default time interval
Row number;
First key sequence number acquiring unit 112, for being obtained from the Ciphering Key Sequence Number for receiving gateway transmission in life
The Ciphering Key Sequence Number received during into control information.
Optionally, as shown in figure 13, Ciphering Key Sequence Number acquisition module 110 is further included but is not limited to:Ciphering Key Sequence Number receives
114 and second Ciphering Key Sequence Number acquiring unit 115 of unit.
Ciphering Key Sequence Number receiving unit 114, for terminal when generating control information, sends Ciphering Key Sequence Number to gateway and obtains
Take request;
Second Ciphering Key Sequence Number acquiring unit 115, obtains what is asked and send for obtaining gateway response key sequence number
Ciphering Key Sequence Number.
Figure 14 is the block diagram of another information encryption device according to an exemplary embodiment, which includes operation
Encryption information receiving module 210, decruption key in the application program of gateway choose module 220, deciphering module 230 and control
Information sending module 240.
Encryption information receiving module 210, the encryption information sent for gateway receiving terminal;
Decruption key chooses module 220, and for responding the reception of encryption information, gateway is according to the key sequence sent to terminal
Row number chooses key from default key sequence, obtains decruption key;
Deciphering module 230, for encryption information to be decrypted by decruption key to obtain control information;
Control information sending module 240, for control information to be sent to related home equipment so that home equipment according to
Control information works.
Optionally, as shown in figure 15, control information sending module 240 is further included but is not limited to:Information content reading unit
241 and control information transmitting element 242.
Information content reading unit 241, for reading the information content of control information;
Control information transmitting element 242, for when the information content is successfully identified, control information to be sent to related family
Equipment is occupied, so that home equipment works according to control information.
Optionally, the control information sending module 240 shown in Figure 15 is further included but is not limited to:Control information abandons mould
Block.
Control information discard module, for when identification information content can not be succeeded, abandoning control information.
Optionally, the present invention also provides a kind of terminal, any shown information ciphering method of Fig. 5, Fig. 6 and Fig. 7 is performed
All or part of step.The terminal includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction is realized as above-mentioned when being performed by the processor
Method described in either exemplary embodiment.
Processor performs the concrete mode of operation in the related information ciphering method in terminal in the embodiment
Detailed description is performed in embodiment, explanation will be not set forth in detail herein.
Optionally, the present invention also provides a kind of gateway, the whole of any shown information ciphering methods of execution Fig. 8 and Fig. 9
Or part steps.The gateway includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction is realized as above-mentioned when being performed by the processor
Method described in either exemplary embodiment.
Processor performs the concrete mode of operation in the related information ciphering method in gateway in the embodiment
Detailed description is performed in embodiment, explanation will be not set forth in detail herein.
In the exemplary embodiment, a kind of storage medium is additionally provided, which is situated between for computer readable storage
Matter, such as can be the provisional and non-transitory computer readable storage medium for including instruction.The storage medium for example wraps
The memory 102 of instruction is included, above-metioned instruction can be performed by the processor 109 of terminal 100 to complete above- mentioned information encryption method.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, sheet
Field technology personnel can perform various modifications and change without departing from the scope.The scope of the present invention only will by appended right
Ask to limit.
Claims (15)
1. a kind of intelligent domestic system, it is characterised in that the intelligent domestic system includes:Terminal, gateway and home equipment, its
In:
The terminal, when generating control information according to the control operation of triggering, obtains the Ciphering Key Sequence Number that the gateway is sent,
And choose key from the key sequence that it is stored according to the Ciphering Key Sequence Number and obtain encryption key, it is close further according to the encryption
Key is sent to the gateway after the control information is encrypted;
The gateway, when receiving the encryption information that the terminal is sent, according to the Ciphering Key Sequence Number of its transmission from the close of storage
Choose decruption key in key sequence, and with the decruption key encryption information is decrypted to obtain control information, then will
The control information is sent to relevant home equipment, so that the home equipment works according to the control information.
2. intelligent domestic system according to claim 1, it is characterised in that pass through office between the terminal and the gateway
Domain net carries out communication connection.
3. intelligent domestic system according to claim 1, it is characterised in that the intelligent domestic system further includes high in the clouds clothes
Business device, the cloud server are sent out respectively when being connected with the terminal, gateway communication to the terminal, the gateway
Key sequence is sent, the terminal and the gateway are chosen according to Ciphering Key Sequence Number from the key sequence each received respectively to be added
Key or decruption key.
A kind of 4. information ciphering method, it is characterised in that the described method includes:
Terminal obtains the Ciphering Key Sequence Number that gateway is sent when generating control information according to the control operation of triggering;
Key is chosen from default key sequence according to the Ciphering Key Sequence Number, obtains encryption key;
The control information is encrypted to obtain encryption information according to the encryption key;
The encryption information is sent to the gateway.
5. according to the method described in claim 4, it is characterized in that, the terminal is generating control according to the control operation of triggering
During information, obtain gateway initiate broadcast the step of include:
Terminal receives the Ciphering Key Sequence Number that gateway is sent according to default time interval;
The Ciphering Key Sequence Number received when generating control information is obtained from the Ciphering Key Sequence Number for receiving the gateway transmission;Or
Person
The terminal according to the control operation of triggering generate control information when, obtain gateway initiate broadcast the step of include:
Terminal sends Ciphering Key Sequence Number when generating control information, to gateway and obtains request;
Obtain gateway and respond the Ciphering Key Sequence Number that the Ciphering Key Sequence Number obtains request and sends.
A kind of 6. information ciphering method, it is characterised in that the described method includes:
The encryption information that gateway receiving terminal is sent;
Respond the reception of the encryption information, the gateway is according to the Ciphering Key Sequence Number that the terminal is sent from default key
Key is chosen in sequence, obtains decruption key;
The encryption information is decrypted to obtain control information by the decruption key;
The control information is sent to related home equipment, so that the home equipment carries out work according to the control information
Make.
7. according to the method described in claim 6, it is characterized in that, described be sent to related household by the control information and set
It is standby, so that the home equipment further includes the step of work according to the control information:
Read the information content of the control information;
When described information content is successfully identified, the control information is sent to related home equipment, so that the household
Equipment works according to the control information.
8. the method according to the description of claim 7 is characterized in that the method further includes:
When can not successfully identify described information content, then the control information is abandoned.
9. a kind of information encryption device, it is characterised in that described device includes:
Ciphering Key Sequence Number acquisition module, for terminal when generating control information according to the control operation of triggering, obtains gateway hair
The Ciphering Key Sequence Number sent;
Encryption key chooses module, for choosing key from default key sequence according to the Ciphering Key Sequence Number, is added
Key;
Encrypting module, for being encrypted to obtain encryption information to the control information according to the encryption key;
Encryption information sending module, for sending the encryption information to the gateway.
10. device according to claim 9, it is characterised in that the Ciphering Key Sequence Number acquisition module includes key sequence
Number receiving unit and first key sequence number acquiring unit, or the Ciphering Key Sequence Number acquisition module connect including Ciphering Key Sequence Number
Unit and the second Ciphering Key Sequence Number acquiring unit are received, wherein:
Ciphering Key Sequence Number receiving unit, the Ciphering Key Sequence Number sent for terminal reception gateway according to default time interval;
First key sequence number acquiring unit, is controlled for being obtained from the Ciphering Key Sequence Number for receiving the gateway transmission in generation
The Ciphering Key Sequence Number received during information processed;
Ciphering Key Sequence Number receiving unit, for terminal when generating control information, sends Ciphering Key Sequence Number to gateway and obtains request;
Second Ciphering Key Sequence Number acquiring unit, the key for responding the Ciphering Key Sequence Number for obtaining gateway and obtaining request and sending
Sequence number.
11. a kind of information encryption device, it is characterised in that described device includes:
Encryption information receiving module, the encryption information sent for gateway receiving terminal;
Decruption key chooses module, and for responding the reception of the encryption information, the gateway to the terminal according to sending
Ciphering Key Sequence Number chooses key from default key sequence, obtains decruption key;
Deciphering module, for being decrypted to obtain control information to the encryption information by the decruption key;
Control information sending module, for the control information to be sent to related home equipment, so that the home equipment is pressed
Work according to the control information.
12. according to the devices described in claim 11, it is characterised in that the control information sending module includes:
Information content reading unit, for reading the information content of the control information;
Control information transmitting element, for when described information content is successfully identified, the control information to be sent to correlation
Home equipment, so that the home equipment works according to the control information.
13. a kind of terminal, it is characterised in that the terminal includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes such as claim when being performed by the processor
4-5 any one of them methods.
14. a kind of gateway, it is characterised in that the gateway includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes such as claim when being performed by the processor
6-7 any one of them methods.
15. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that the computer journey
Sequence is realized such as claim 4-8 any one of them methods when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711261222.9A CN107948178A (en) | 2017-12-04 | 2017-12-04 | Intelligent domestic system and information ciphering method and device, terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711261222.9A CN107948178A (en) | 2017-12-04 | 2017-12-04 | Intelligent domestic system and information ciphering method and device, terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107948178A true CN107948178A (en) | 2018-04-20 |
Family
ID=61947485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711261222.9A Pending CN107948178A (en) | 2017-12-04 | 2017-12-04 | Intelligent domestic system and information ciphering method and device, terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107948178A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769009A (en) * | 2018-05-28 | 2018-11-06 | 深圳和而泰数据资源与云技术有限公司 | Data communications method, smart machine and intelligent gateway |
CN109039588A (en) * | 2018-10-16 | 2018-12-18 | 深圳市华腾物联科技有限公司 | A kind of data safe transmission method and equipment based on block chain |
CN111355683A (en) * | 2018-12-20 | 2020-06-30 | 航天信息股份有限公司 | Method, device and storage medium for ensuring http data transmission safety |
CN111431706A (en) * | 2020-03-18 | 2020-07-17 | 中孚信息股份有限公司 | Method, system and equipment for improving SM4 algorithm speed by using FPGA logic |
WO2021104448A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Method for synchronizing key information, system and device |
CN113612775A (en) * | 2021-08-04 | 2021-11-05 | 西安思安云创科技有限公司 | 4C remote control safety protection method, device and system based on Internet of things equipment |
CN113824688A (en) * | 2021-08-24 | 2021-12-21 | 广州市瑞立德信息系统有限公司 | Encrypted communication method, network controller and access control system |
CN113839958A (en) * | 2021-09-29 | 2021-12-24 | 广州河东科技有限公司 | Communication encryption method and device for smart home, control system and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820344A (en) * | 2010-03-23 | 2010-09-01 | 中国电信股份有限公司 | AAA server, home network access method and system |
CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
CN104125124A (en) * | 2014-07-11 | 2014-10-29 | 京信通信系统(中国)有限公司 | Smart home remote control method, device and system |
CN104301303A (en) * | 2014-09-15 | 2015-01-21 | 汕头大学 | Intelligent home Internet of Things safety protection method and system |
CN105227516A (en) * | 2014-05-28 | 2016-01-06 | 中兴通讯股份有限公司 | The access method of Smart Home, control centre's equipment and dress terminal |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN105634729A (en) * | 2015-12-25 | 2016-06-01 | 上海云丞聚智能科技有限公司 | Mobile phone encryption and decryption method based on bluetooth equipment |
CN106100830A (en) * | 2016-05-24 | 2016-11-09 | 飞天诚信科技股份有限公司 | A kind of method and apparatus writing seed key in NFC dynamic token |
CN106817358A (en) * | 2015-12-02 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The encryption and decryption method and equipment of a kind of user resources |
CN107195060A (en) * | 2017-07-07 | 2017-09-22 | 东峡大通(北京)管理咨询有限公司 | The control system and method for a kind of intelligent bicycle lock, intelligent bicycle lock |
CN107393066A (en) * | 2017-06-30 | 2017-11-24 | 北京康得新创科技股份有限公司 | Unlocking method, terminal, server and the system for unlocking of smart lock |
-
2017
- 2017-12-04 CN CN201711261222.9A patent/CN107948178A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101820344A (en) * | 2010-03-23 | 2010-09-01 | 中国电信股份有限公司 | AAA server, home network access method and system |
CN102682506A (en) * | 2012-05-25 | 2012-09-19 | 北京华大信安科技有限公司 | Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique |
CN105227516A (en) * | 2014-05-28 | 2016-01-06 | 中兴通讯股份有限公司 | The access method of Smart Home, control centre's equipment and dress terminal |
CN104125124A (en) * | 2014-07-11 | 2014-10-29 | 京信通信系统(中国)有限公司 | Smart home remote control method, device and system |
CN104301303A (en) * | 2014-09-15 | 2015-01-21 | 汕头大学 | Intelligent home Internet of Things safety protection method and system |
CN105260668A (en) * | 2015-10-10 | 2016-01-20 | 北京搜狗科技发展有限公司 | File encryption method and electronic device |
CN106817358A (en) * | 2015-12-02 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The encryption and decryption method and equipment of a kind of user resources |
CN105634729A (en) * | 2015-12-25 | 2016-06-01 | 上海云丞聚智能科技有限公司 | Mobile phone encryption and decryption method based on bluetooth equipment |
CN106100830A (en) * | 2016-05-24 | 2016-11-09 | 飞天诚信科技股份有限公司 | A kind of method and apparatus writing seed key in NFC dynamic token |
CN107393066A (en) * | 2017-06-30 | 2017-11-24 | 北京康得新创科技股份有限公司 | Unlocking method, terminal, server and the system for unlocking of smart lock |
CN107195060A (en) * | 2017-07-07 | 2017-09-22 | 东峡大通(北京)管理咨询有限公司 | The control system and method for a kind of intelligent bicycle lock, intelligent bicycle lock |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108769009A (en) * | 2018-05-28 | 2018-11-06 | 深圳和而泰数据资源与云技术有限公司 | Data communications method, smart machine and intelligent gateway |
CN109039588A (en) * | 2018-10-16 | 2018-12-18 | 深圳市华腾物联科技有限公司 | A kind of data safe transmission method and equipment based on block chain |
CN111355683A (en) * | 2018-12-20 | 2020-06-30 | 航天信息股份有限公司 | Method, device and storage medium for ensuring http data transmission safety |
WO2021104448A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Method for synchronizing key information, system and device |
CN111431706A (en) * | 2020-03-18 | 2020-07-17 | 中孚信息股份有限公司 | Method, system and equipment for improving SM4 algorithm speed by using FPGA logic |
CN111431706B (en) * | 2020-03-18 | 2023-07-28 | 中孚信息股份有限公司 | Method, system and equipment for improving SM4 algorithm speed by using FPGA logic |
CN113612775A (en) * | 2021-08-04 | 2021-11-05 | 西安思安云创科技有限公司 | 4C remote control safety protection method, device and system based on Internet of things equipment |
CN113824688A (en) * | 2021-08-24 | 2021-12-21 | 广州市瑞立德信息系统有限公司 | Encrypted communication method, network controller and access control system |
CN113839958A (en) * | 2021-09-29 | 2021-12-24 | 广州河东科技有限公司 | Communication encryption method and device for smart home, control system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107948178A (en) | Intelligent domestic system and information ciphering method and device, terminal | |
CN107947924A (en) | Intelligent domestic system and information ciphering method and device, terminal | |
EP2885936B1 (en) | Configuration of a new enrollee device for use in a communication network | |
CN107968736A (en) | Intelligent domestic system and information ciphering method and device, terminal | |
CN105471628B (en) | Smart machine grouping system, method and device | |
CN105357262B (en) | Apparatus control method and device | |
CN104869612A (en) | Method and device for accessing network | |
CN107508735A (en) | Network collocating method and system, home appliance and mobile terminal | |
CN105933899A (en) | Access method and device of wireless access point | |
KR101878708B1 (en) | Energy management system of smart electric home appliances using security-enhanced residential gateway device | |
CN104993981A (en) | Method and apparatus for controlling access of device | |
CN107612909A (en) | Information interacting method, device and equipment on internet of things equipment | |
CN104378801A (en) | Method and device for having access to wireless network | |
CN104503688A (en) | Intelligent hardware device control achieving method and device | |
CN107483715A (en) | The method and system of terminal and equipment communication, terminal, storage medium | |
CN104159226A (en) | Network connection method and device | |
CN104765990A (en) | Setting method and device for management account of intelligent device | |
CN105282158A (en) | Intelligent equipment networking method, routing equipment, intelligent equipment and system | |
CN105049416A (en) | Method and apparatus for accessing to wifi network | |
CN105517103A (en) | Network access method and device based on intelligent terminal device | |
CN105101339A (en) | Use permission obtaining method and device | |
CN110086765A (en) | Selectivity allows access into network share session | |
CN105246138A (en) | Control method and device of Internet-of-things device | |
CN105182783A (en) | Method, apparatus and terminal for controlling intelligent devices | |
KR101876183B1 (en) | Security-enhanced residential gateway device based on internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180420 |