CN107948178A - Intelligent domestic system and information ciphering method and device, terminal - Google Patents

Intelligent domestic system and information ciphering method and device, terminal Download PDF

Info

Publication number
CN107948178A
CN107948178A CN201711261222.9A CN201711261222A CN107948178A CN 107948178 A CN107948178 A CN 107948178A CN 201711261222 A CN201711261222 A CN 201711261222A CN 107948178 A CN107948178 A CN 107948178A
Authority
CN
China
Prior art keywords
information
gateway
sequence number
key sequence
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711261222.9A
Other languages
Chinese (zh)
Inventor
毛勇
张龙
夏天松
刘泽琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lumi United Technology Co Ltd
Original Assignee
Shenzhen Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lumi United Technology Co Ltd filed Critical Shenzhen Lumi United Technology Co Ltd
Priority to CN201711261222.9A priority Critical patent/CN107948178A/en
Publication of CN107948178A publication Critical patent/CN107948178A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Abstract

Present invention is disclosed a kind of intelligent domestic system and information ciphering method and device, terminal, belong to Computer Applied Technology field.Intelligent domestic system includes terminal, gateway and home equipment, wherein:Terminal obtains the Ciphering Key Sequence Number that gateway is sent, and obtains encryption key according to key is chosen from the key sequence that it is stored according to Ciphering Key Sequence Number when generating control information according to the control operation of triggering, to be sent to gateway after control information is encrypted;Gateway is in the encryption information that receiving terminal is sent, decruption key is chosen according to the Ciphering Key Sequence Number of its transmission, encryption information to be decrypted to obtain control information, then control information is sent to relevant home equipment, so that home equipment works according to control information.In addition, additionally provide information encryption device and terminal.Above-mentioned intelligent domestic system can ensure the communication security in LAN with information ciphering method and device, terminal, improve the security that home equipment control is carried out by LAN.

Description

Intelligent domestic system and information ciphering method and device, terminal
Technical field
The present invention relates to Computer Applied Technology field, more particularly to a kind of intelligent domestic system and information ciphering method and Device, terminal.
Background technology
With the high speed development of smart home technology, more and more home equipments realize intelligence.Mobile phone, tablet electricity Control terminal of the terminals such as brain as smart home, is connected by the communication with gateway, and intelligent family is collectively constituted with home equipment System is occupied, so as to fulfill the intelligentized control method to home equipment.
In intelligent domestic system, to avoid the control to home equipment by instrument, ensure the security of communication, need to be to control Information processed is encrypted.At present, for intelligent domestic system when carrying out the control of home equipment, terminal A is according to default close Key is sent to gateway B after being encrypted to control information into row information, so gateway B after encryption information is got by default close Encryption information is decrypted in key, obtains control information, and due to other-end and is unaware of the default key, thus other Even if terminal gets the encryption information, successfully the encryption information can not be also decrypted, known in the encryption information Real content, so as to fulfill the encrypted purpose of information in LAN.
However, when other-end is truncated to terminal A and is sent to the encryption information of gateway B, gateway B gets encryption letter After breath, although it can not know the real content in the encryption information, it can pretend to be terminal A at other times to gateway B Send the encryption information, make terminal B mistake time perform the encryption information in real content, so as to can not ensure intelligence Communication security in house system.
The content of the invention
In order to solve the technical problem that communication security is poor in the intelligent domestic system in correlation technique, the present invention provides A kind of intelligent domestic system and information ciphering method and device, terminal.
First aspect, there is provided a kind of intelligent domestic system, the intelligent domestic system include:Terminal, gateway and household Equipment, wherein:
The terminal, when generating control information according to the control operation of triggering, obtains the key sequence that the gateway is sent Number, and choose key from default key sequence according to the Ciphering Key Sequence Number and obtain encryption key, further according to the encryption Key is sent to the gateway after the control information is encrypted;
The gateway, when receiving the encryption information that the terminal is sent, according to the Ciphering Key Sequence Number of its transmission from key Choose decruption key in sequence, and be decrypted to obtain control information to the encryption information with the decruption key, then by institute State control information and be sent to relevant home equipment, so that the home equipment works according to the control information.
Second aspect, there is provided information ciphering method, including:
Terminal obtains the Ciphering Key Sequence Number that gateway is sent when generating control information according to the control operation of triggering;
Key is chosen from default key sequence according to the Ciphering Key Sequence Number, obtains encryption key;
The control information is encrypted to obtain encryption information according to the encryption key;
The encryption information is sent to the gateway.
The third aspect, there is provided another information ciphering method, including:
The encryption information that gateway receiving terminal is sent;
Respond the reception of the encryption information, the gateway is according to the Ciphering Key Sequence Number that the terminal is sent from default Key is chosen in key sequence, obtains decruption key;
The encryption information is decrypted to obtain control information by the decruption key;
The control information is sent to related home equipment, so that the home equipment is carried out according to the control information Work.
Fourth aspect, there is provided a kind of information encryption device, including:
Ciphering Key Sequence Number acquisition module, for terminal when generating control information according to the control operation of triggering, obtains net Close the Ciphering Key Sequence Number sent;
Encryption key chooses module, for choosing key from default key sequence according to the Ciphering Key Sequence Number, obtains To encryption key;
Encrypting module, for being encrypted to obtain encryption information to the control information according to the encryption key;
Encryption information sending module, for sending the encryption information to the gateway.
5th aspect, there is provided another information encryption device, including:
Encryption information receiving module, the encryption information sent for gateway receiving terminal;
Decruption key chooses module, and for responding the reception of the encryption information, the gateway is sent out according to the terminal The Ciphering Key Sequence Number sent chooses key from default key sequence, obtains decruption key;
Deciphering module, for being decrypted to obtain control information to the encryption information by the decruption key;
Control information sending module, for the control information to be sent to related home equipment, so that the household is set It is standby to work according to the control information.
6th aspect, there is provided a kind of terminal, including:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes the such as the 4th when being performed by the processor Method described in aspect.
7th aspect, there is provided a kind of gateway, including:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes the such as the 5th when being performed by the processor Method described in aspect.
Eighth aspect, there is provided a kind of computer readable storage medium, is stored thereon with computer program, the calculating Machine program realizes the method such as second or third aspect when executed.
The technical solution provided by the embodiment of the present invention can obtain following beneficial effect:
For intelligent domestic system during the control of home equipment is carried out, terminal is generating control according to the control operation of triggering During information processed, the Ciphering Key Sequence Number that gateway is sent is obtained, key is chosen from default key sequence according to Ciphering Key Sequence Number, is obtained To encryption key, control information is encrypted according to encryption key to obtain encryption information, to gateway transmission encryption information, and by The Ciphering Key Sequence Number that encryption key is generated in terminal is that gateway is sent, thus gateway can be obtained according to the Ciphering Key Sequence Number and solved Key, and then can smoothly identify control information after after receiving the encryption information by decryption key decryption, so as to only need Inform that Ciphering Key Sequence Number would know that encryption key and decruption key, avoid the other-end in LAN from knowing the encryption information Decruption key, ensure that the communication security in intelligent domestic system, substantially increase what related home equipment was controlled Security.
It should be appreciated that the general description and following detailed description of the above are only exemplary, the present invention and from Limitation.
Brief description of the drawings
Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention Example, and for explaining the principle of the present invention together with specification.
Fig. 1 is the schematic diagram of an implementation environment according to involved by the disclosure.
Fig. 2 is a kind of block diagram of terminal 100 according to an exemplary embodiment.
Fig. 3 is a kind of structure diagram of intelligent domestic system according to an exemplary embodiment.
Fig. 4 is the structure diagram that another intelligent domestic system for implementing to exemplify is corresponded to according to Fig. 3.
Fig. 5 is a kind of information ciphering method flow chart according to an exemplary embodiment.
Fig. 6 is a kind of specific implementation flow that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5 Figure.
Fig. 7 is another specific implementation stream that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5 Cheng Tu.
Fig. 8 is another information ciphering method flow chart according to an exemplary embodiment.
Fig. 9 is a kind of specific implementation flow that step S240 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 8 Figure.
Figure 10 is that home equipment is controlled in a kind of intelligent domestic system according to an exemplary embodiment Method schematic diagram.
Figure 11 is a kind of block diagram of information encryption device according to an exemplary embodiment.
Figure 12 is to correspond to Ciphering Key Sequence Number acquisition module in information encryption device shown in exemplary embodiment according to Figure 11 A kind of 110 block diagram.
Figure 13 is to correspond to Ciphering Key Sequence Number acquisition module in information encryption device shown in exemplary embodiment according to Figure 11 110 another block diagram.
Figure 14 is the block diagram of another information encryption device according to an exemplary embodiment.
Figure 15 is to correspond to control information sending module 240 in information encryption device shown in exemplary embodiment according to Figure 14 A kind of block diagram.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following exemplary is implemented Embodiment described in example does not represent all embodiments consistent with the present invention.On the contrary, they are only and such as institute The example of the consistent apparatus and method of described, of the invention some aspects in attached claims.
Fig. 1 is the schematic diagram of an implementation environment according to involved by the disclosure.The implementation environment includes:Terminal, gateway 200 and the router 300 that carries out data transmission for terminal 100 and gateway 200.
Terminal 100 obtains the Ciphering Key Sequence Number that gateway 200 is sent when generating control information, and according to Ciphering Key Sequence Number Key is chosen from default key sequence and obtains encryption key, control information is encrypted according still further to encryption key and is added Confidential information, by router 300 to gateway 200 send encryption information, and gateway 200 according to its to terminal 100 send key Sequence number, key is chosen from default key sequence, obtains decruption key, and encryption information is carried out by the decruption key Decryption, obtains control information and relevant device is controlled.
Terminal 100 can be the computer equipments such as mobile phone, computer, specific implementation from the present embodiment limitation.
Fig. 2 is a kind of block diagram of terminal 100 according to an exemplary embodiment.
With reference to figure 2, terminal 100 can include one or more following component:Processing component 101, memory 102, electricity Source component 103, multimedia component 104, audio component 105, sensor component 107 and communication component 108.Wherein, above-mentioned group Part is simultaneously not all necessary, and terminal 100 can increase other assemblies according to itself functional requirement or reduce some components, this implementation Example is not construed as limiting.
The integrated operation of the usual control terminal 100 of processing component 101, such as with display, call, data communication, phase Operation that machine operates and record operation is associated etc..Processing component 101 can be performed including one or more processors 109 Instruction, to complete all or part of step of aforesaid operations.In addition, processing component 101 can include one or more modules, just Interaction between processing component 101 and other assemblies.For example, processing component 101 can include multi-media module, it is more to facilitate Interaction between media component 104 and processing component 101.
Memory 102 is configured as storing various types of data to support the operation in terminal 100.These data are shown Example includes the instruction of any application program or method for operating on the terminal 100.Memory 102 can be by any kind of Volatibility or non-volatile memory device or combinations thereof are realized, such as SRAM (Static Random Access Memory, static RAM), EEPROM (Electrically Erasable Programmable Read- Only Memory, electrically erasable programmable read-only memory), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), (Programmable Read-Only Memory, may be programmed read-only PROM Memory), ROM (Read-Only Memory, read-only storage), magnetic memory, flash memory, disk or CD.Storage One or more modules are also stored with device 102, which is configured to by the one or more processors 109 Perform, to complete all or part of step in any shown method of Fig. 5, Fig. 6 and Fig. 7.
Power supply module 103 provides electric power for the various assemblies of terminal 100.Power supply module 103 can include power management system System, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal 100.
Multimedia component 104 is included in the screen of one output interface of offer between the terminal 100 and user.One In a little embodiments, screen can include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch Panel, touch panel).If screen includes touch panel, screen may be implemented as touch-screen, from the user to receive Input signal.Touch panel includes one or more touch sensors to sense the gesture on touch, slip and touch panel.Institute The boundary of a touch or slide action can not only be sensed by stating touch sensor, but also be detected and the touch or slide phase The duration and pressure of pass.
Audio component 105 is configured as output and/or input audio signal.For example, audio component 105 includes a Mike Wind, when terminal 100 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone is configured as connecing Receive external audio signal.The received audio signal can be further stored in memory 102 or be sent out via communication component 108 Send.In certain embodiments, audio component 105 further includes a loudspeaker, for exports audio signal.
Sensor component 107 includes one or more sensors, and the state for providing various aspects for terminal 100 is commented Estimate.For example, sensor component 107 can detect opening/closed mode of terminal 100, the relative positioning of component, sensor group Part 107 can be changed with the coordinate of 100 1 components of detection terminal 100 or terminal and the temperature change of terminal 100.At some In embodiment, which can also include Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 108 is configured to facilitate the communication of wired or wireless way between terminal 100 and other equipment.Terminal 100 can access the wireless network based on communication standard, such as WiFi (Wireless-Fidelity, wireless network), 2G or 3G, Or combinations thereof.In one exemplary embodiment, communication component 108 receives via broadcast channel and comes from external broadcasting management The broadcast singal or broadcast related information of system.In one exemplary embodiment, the communication component 108 further includes NFC (Near Field Communication, near-field communication) module, to promote junction service.For example, it can be based in NFC module RFID (Radio Frequency Identification, radio frequency identification) technology, IrDA (Infrared Data Association, Infrared Data Association) technology, UWB (Ultra-Wideband, ultra wide band) technology, BT (Bluetooth, it is blue Tooth) technology and other technologies realize.
In the exemplary embodiment, terminal 100 can be by one or more ASIC (Application Specific Integrated Circuit, application specific integrated circuit), DSP (Digital Signal Processing, at digital signal Manage device), PLD (Programmable Logic Device, programmable logic device), FPGA (Field-Programmable Gate Array, field programmable gate array), controller, microcontroller, microprocessor or other electronic components realize, be used for Perform the above method.
Processor performs the concrete mode of operation in the related information ciphering method in server in the embodiment Embodiment in perform detailed description, will no longer elaborate explanation herein.
Fig. 3 is a kind of structure diagram of intelligent domestic system according to an exemplary embodiment, as shown in figure 3, should Intelligent domestic system includes:Terminal 100, gateway 200 and home equipment 300, wherein:
Terminal 100 obtains the Ciphering Key Sequence Number that gateway 200 is sent when generating control information according to the control operation of triggering Key is chosen from default key sequence and obtains encryption key, is sent after control information is encrypted further according to encryption key To gateway 200;
Gateway 200 is in the encryption information that receiving terminal 100 is sent, according to the Ciphering Key Sequence Number of its transmission from key sequence Middle selection decruption key, and with decruption key encryption information is decrypted to obtain control information, then control information is sent to Relevant home equipment 300, so that home equipment works according to control information, so that gateway is chosen according to Ciphering Key Sequence Number Judgement of the decruption key into the row information true and false is obtained, avoids other-end from knowing the encryption key or encryption information of the control information Decruption key, and when encryption information is sent by pretending to be so that be mistakenly controlled to related home equipment 300 so that It ensure that the communication security in intelligent domestic system, substantially increase the security being controlled to related home equipment.
Home equipment 300 can be the household electrical appliances such as intelligent refrigerator, intelligent air condition or Intelligent wall switch, air-conditioning companion Companion, the first-class smart home device of intelligent camera, specific implementation from the present embodiment limitation.
Communication connection can be carried out by LANs such as ZIGBEE, bluetooths between terminal 100 and gateway 200, can also led to Cross the outer nets such as WIFI, 2G/3G/4G/5G and carry out communication connection.
When carrying out communication connection by LAN between terminal 100 and gateway 200, even if terminal 100 can not connect outer net, Also it can realize the control in intelligent domestic system to home equipment, and communicate limitation of the connection from outer net network quality, significantly Provide the convenience of intelligent domestic system.
Optionally, Fig. 4 is that the structure diagram of another intelligent domestic system for implementing to exemplify, such as Fig. 4 are corresponded to according to Fig. 3 Shown, which further includes cloud server 400, and cloud server 400 connects with terminal 100, the communication of gateway 200 When connecing, Key production information is sent respectively to terminal 100, gateway 200, terminal 100 and gateway 200 are respectively according to each receiving The generation of key or decruption key is encrypted in key generating mode in Key production information.
Fig. 5 is a kind of information ciphering method flow chart according to an exemplary embodiment, as shown in figure 5, the information Encryption method may comprise steps of.
In step s 110, terminal obtains the close of gateway transmission when generating control information according to the control operation of triggering Key sequence number.
Control information is the information that relevant equipment is controlled in local area network.
Implementation environment schematic diagram as described in Figure 1, user generate phase by being manipulated to the APP run in terminal The control information answered.
Gateway send Ciphering Key Sequence Number mode have it is a variety of, can be with fixed frequency to terminal send Ciphering Key Sequence Number, Ciphering Key Sequence Number can also be sent when terminal is inquired to gateway, can also be and send broadcast in other way.
It should be noted that the Ciphering Key Sequence Number that gateway is sent every time is different, even if other-end is obtaining During certain Ciphering Key Sequence Number once, attacked by pretending to be, gateway after the encryption information of other-end transmission is received, Decruption key will be generated according to new key sequence number, so that the encryption information that can not be sent to other-end is decrypted, so that Further avoid other-end from being attacked by pretending to be, enable the gateway to the encryption information successful decryption sent to other-end And mistake performs corresponding operating according to the control information obtained after decryption, it ensure that and relevant device is controlled by LAN Security.
In the step s 120, key is chosen from default key sequence according to Ciphering Key Sequence Number, obtains encryption key.
Key sequence is set in advance.
Key sequence includes the order set of multiple keys, and each key is mutually different in key sequence.
Key can be numeral or phrase, can also be other forms, herein not to the concrete form of key into Row limits.For example, key sequence is to include 100,000 mutually different numerals.
Therefore, according to a specific Ciphering Key Sequence Number, it can be chosen from key sequence and obtain a specific key.
Terminal chosen according to Ciphering Key Sequence Number from default key sequence key mode have it is a variety of, can be from key sequence The key for being ordered as the Ciphering Key Sequence Number is chosen in row;Can also be according to the Ciphering Key Sequence Number, from default key sequence Choose a key being ordered as before or after the key of the Ciphering Key Sequence Number;Can also be in other way, according to Ciphering Key Sequence Number chooses key from default key sequence, this not to according to Ciphering Key Sequence Number from default key sequence The concrete mode for choosing key is defined.
It should be noted that the key sequence in terminal and gateway can be identical or corresponding, After key in the key sequence that i.e. terminal is stored according to it is encrypted into row information, and gateway is then according to the key sequence of its storage In key can succeed into row information decrypt.That is, it can encrypt and believe into row information by an identical key Breath decryption;Can also be encrypted by a key into row information, by another with the encrypted corresponding key of key into Row information is decrypted, so as to ensure that gateway being capable of successful decryption after encryption information is received.
In step s 130, control information is encrypted according to encryption key to obtain encryption information.
It should be noted that terminal chooses key according to Ciphering Key Sequence Number from default key sequence obtains encryption key Into row information encrypt, and gateway then chosen according to the Ciphering Key Sequence Number from identical key sequence key obtain decruption key into Row information is decrypted, and since key sequence is identical or corresponding, Ciphering Key Sequence Number is identical, thus gateway is after encryption information is received Can successful decryption obtain control information.
In step S140, encryption information is sent to gateway.
Using method as described above, intelligent domestic system is during the control of home equipment is carried out, and terminal is in basis During the control operation generation control information of triggering, selected according to the Ciphering Key Sequence Number for obtaining gateway transmission from default key sequence Take key to obtain encryption key, and according to encryption key control information is encrypted to obtain encryption information, then sent to gateway Encryption information, and since the Ciphering Key Sequence Number for obtaining encryption key is that gateway is sent, thus gateway can be according to the key sequence Row number obtains decruption key from key sequence, and then can be smooth after reception encryption information and by decryption key decryption Control information is identified, so as to need to only pass through the transmission of Ciphering Key Sequence Number, you can realize the encryption and decryption of control information, avoid it His terminal knows the encryption key of the control information or the decruption key of encryption information, and when encryption information is sent by pretending to be, So that mistake is controlled relevant home equipment, the communication security in intelligent domestic system ensure that, substantially increase pair The security that related home equipment is controlled.
Optionally, Fig. 6 is the detailed description that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5, As shown in fig. 6, the step S110 in the information ciphering method can also comprise the following steps.
In step S111, terminal receives the Ciphering Key Sequence Number that gateway is sent according to default time interval.
The time interval that gateway sends Ciphering Key Sequence Number is a pre-set time range value, which cannot Set excessive, can not set too small, in actual intelligent domestic system, the time interval can be finely adjusted in advance. In one exemplary embodiment, time interval is preset as 5 seconds.
For terminal when receiving the Ciphering Key Sequence Number that gateway is sent with fixed frequency, it does not immediately obtain the key sequence Number and key is chosen from default key sequence, and only according to the control operation of triggering generate control information when, just obtain Take the Ciphering Key Sequence Number that it is received.
Since terminal according to the control operation of triggering when generating control information, control information is encrypted it is time-consuming, By encryption information be sent to the encryption information that the time-consuming and gateway receiving terminal of gateway sends it is time-consuming be it is very short, because And as long as the fixed frequency that gateway sends Ciphering Key Sequence Number is not very big, i.e., gateway sends the interval time of Ciphering Key Sequence Number Be not it is especially small, gateway receive terminal transmission encryption information when, can know terminal be according to its transmission which What the key that a Ciphering Key Sequence Number is chosen was encrypted.
In step S112, obtain what is received when generating control information from the Ciphering Key Sequence Number for receiving gateway transmission Ciphering Key Sequence Number.
Using method as above, gateway sends Ciphering Key Sequence Number according to default time interval to terminal, so that terminal exists When generating control information, the last Ciphering Key Sequence Number received is directly searched in the Ciphering Key Sequence Number for receiving gateway transmission , without specially inquiring Ciphering Key Sequence Number to gateway, substantially increase the convenience for obtaining Ciphering Key Sequence Number.
Optionally, Fig. 7 is another details that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5 Description, as shown in fig. 7, the step S110 in the information ciphering method can also comprise the following steps.
In step S114, terminal sends Ciphering Key Sequence Number when generating control information, to gateway and obtains request.
In LAN, terminal sends Ciphering Key Sequence Number to gateway by router and obtains request.
Ciphering Key Sequence Number obtains the instruction that request is the acquisition request Ciphering Key Sequence Number that terminal is sent to gateway.
For ensure to make gateway after encryption information is received can successful decryption obtain control information, terminal need to be made from default Key sequence in the Ciphering Key Sequence Number chosen when obtaining encryption key choose and solved from default key sequence with gateway Ciphering Key Sequence Number during key is identical.Therefore, when terminal generation control information needs encryption key, by being sent to gateway Ciphering Key Sequence Number obtains request, obtains the Ciphering Key Sequence Number that gateway is sent, and then according to the Ciphering Key Sequence Number from default key Chosen in sequence and obtain encryption key, so as to ensure that terminal chooses to obtain the Ciphering Key Sequence Number of encryption key and chooses to obtain with gateway The Ciphering Key Sequence Number of decruption key is identical.
In step sl 15, the Ciphering Key Sequence Number that gateway response key sequence number obtains request and sends is received.
Using method as described above, terminal sends Ciphering Key Sequence Number when generating control information, to gateway and obtains request, Gateway is asked to send Ciphering Key Sequence Number, so that ensureing that terminal is chosen from default key sequence obtains the key sequence of encryption key The Ciphering Key Sequence Number that row number chooses to obtain decruption key with gateway is identical, further ensures gateway and is receiving terminal transmission Encryption information after can successful decryption and obtain control information, without successful decryption other-end by pretend to be transmission plus Confidential information, ensure that the communication security in intelligent domestic system, improves in intelligent domestic system and relevant device is controlled Security.
Fig. 8 is a kind of information ciphering method flow chart according to an exemplary embodiment, as shown in figure 8, the information Encryption method may comprise steps of.
In step S210, the encryption information of gateway receiving terminal transmission.
The encryption information that gateway receiving terminal is sent is that terminal sends encryption information by LAN to gateway.
In step S220, the reception of encryption information is responded, gateway is according to the Ciphering Key Sequence Number that terminal is sent from default Key sequence in choose key, obtain decruption key.
For gateway in the encryption information that receiving terminal is sent, the Ciphering Key Sequence Number sent immediately according to it to the terminal is from pre- If key sequence in choose key obtain decruption key.
Since Ciphering Key Sequence Number is identical, default key sequence is identical or corresponding, thus gateway is receiving encryption letter After breath can successful decryption obtain can identified control information.
In step S230, encryption information is decrypted by decruption key to obtain control information.
As previously described, terminal is to obtain encryption information after control information is encrypted.Therefore, decruption key pair is passed through Information is will be controlled after encryption information decryption.
The decruption key that encryption information is decrypted with gateway such as the encryption key that control information is encrypted in gateway Identical, then control information is obtained after encryption information being decrypted by decruption key can then be identified, i.e. this time sends encryption Information is effective, and gateway will be controlled relevant device according to the control information;As control information is encrypted in gateway Encryption key it is different from the decruption key that encryption information is decrypted in gateway, then by decruption key to encryption information carry out Control information is obtained after decryption cannot then be successfully identified, i.e. the encryption information of this transmission is invalid.Therefore, when gateway exists During None- identified control information, then the encryption information for showing this transmission is invalid, and gateway abandons the control information, not Corresponding operating is performed according to the control information.
In step S240, control information is sent to related home equipment so that home equipment according to control information into Row work.
Using method as described above, gateway in receiving encryption key, according to the Ciphering Key Sequence Number that terminal is sent from Key is chosen in default key sequence and obtains decruption key, and encryption information is decrypted by the decruption key and is controlled Information processed, even if other-end by pretending to be the encryption information attacked to send to be decrypted, is also only believed in control When breath is identified, just relevant device is controlled according to control information, so that the peace being further controlled to relevant device Quan Xing, ensure that the communication security in intelligent domestic system.
Optionally, Fig. 9 is the detailed description that step S240 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 8, As shown in figure 9, the step S240 in the information ciphering method can also comprise the following steps.
In step S241, when identifying control information, relevant device is controlled according to control information.
In step S242, in None- identified control information, then control information is abandoned.
It is understood that if control information is the content of the control information to obtained from encryption information successful decryption It can usually be successfully identified.
But to avoid encryption information from being successfully decrypted after obtaining control information, the information content of None- identified control information is but Will the control information be sent to relevant home equipment, it would be possible to cause the home equipment operation produce failure, to the family Equipment is occupied to cause to damage.
Therefore, after the information content of control information is successfully identified, the control information is just sent into related home equipment, Substantially increase the security being controlled to related home equipment.
And after the information content of control information cannot be identified successfully, then the control information is abandoned, no longer control this Information sends related home equipment.
Figure 10 is that home equipment is controlled in a kind of intelligent domestic system according to an exemplary embodiment Method schematic diagram.
In step S310, terminal, gateway are connected by the communication with high in the clouds, receive the key sequence that high in the clouds is sent respectively Row.
It is understood that encryption key or decruption key that terminal is chosen with gateway are the shapes with key sequence Formula is stored in advance in its respective storage, and then the Ciphering Key Sequence Number that terminal is sent according to gateway is chosen from key sequence Control information is encrypted to encryption key, and by the encryption key, and gateway passes through it after encryption information is received Chosen to the Ciphering Key Sequence Number that the terminal is sent from the key sequence for going storage and obtain decruption key, and according to the decruption key Encryption information is decrypted.
And when terminal, gateway communicate with high in the clouds connect first, high in the clouds will be generated comprising the key of key generating mode believes Breath is sent respectively to terminal and gateway, and terminal and the key sequence that gateway receives respectively are identical, so as to ensure end After being encrypted to control information and being then forwarded to gateway, gateway can be smoothed out decrypting and identifying the control letter after decryption at end Breath.
In step s 320, terminal obtains the close of gateway transmission when generating control information according to the control operation of triggering Key sequence number.
In step S330, terminal chooses key according to Ciphering Key Sequence Number from default key sequence, obtains encrypting close Key.
In step S340, terminal is encrypted to obtain encryption information according to encryption key to control information, and to gateway Send encryption information.
In step S350, the encryption information of gateway receiving terminal transmission, and according to the Ciphering Key Sequence Number sent to terminal Key is chosen from default key sequence, obtains decruption key.
In step S360, gateway is decrypted encryption information by decruption key to obtain control information.
In step S370, when identifying control information, relevant device is controlled according to control information.
Following is present system embodiment, can be used for performing above- mentioned information encryption method embodiment.For the present invention The details not disclosed in system embodiment, refer to information ciphering method embodiment of the present invention.
Figure 11 is a kind of block diagram of information encryption device according to an exemplary embodiment, which includes running on Ciphering Key Sequence Number acquisition module 110, encryption key in the application program of terminal choose module 120, encrypting module 130 and encryption Information sending module 140.
Ciphering Key Sequence Number acquisition module 110, for terminal when generating control information according to the control operation of triggering, obtains The Ciphering Key Sequence Number that gateway is sent;
Encryption key chooses module 120, for choosing key from default key sequence according to Ciphering Key Sequence Number, obtains Encryption key;
Encrypting module 130, for control information to be encrypted according to encryption key to obtain encryption information;
Encryption information sending module 140, for sending encryption information to gateway.
In above device the function of modules and effect to realize that process specifically refers to right in above- mentioned information encryption method That answers step realizes process, and details are not described herein.
Optionally, as shown in figure 12, Ciphering Key Sequence Number acquisition module 110 is further included but is not limited to:Ciphering Key Sequence Number receives Unit 111 and first key sequence number acquiring unit 112.
Ciphering Key Sequence Number receiving unit 111, the key sequence sent for terminal reception gateway according to default time interval Row number;
First key sequence number acquiring unit 112, for being obtained from the Ciphering Key Sequence Number for receiving gateway transmission in life The Ciphering Key Sequence Number received during into control information.
Optionally, as shown in figure 13, Ciphering Key Sequence Number acquisition module 110 is further included but is not limited to:Ciphering Key Sequence Number receives 114 and second Ciphering Key Sequence Number acquiring unit 115 of unit.
Ciphering Key Sequence Number receiving unit 114, for terminal when generating control information, sends Ciphering Key Sequence Number to gateway and obtains Take request;
Second Ciphering Key Sequence Number acquiring unit 115, obtains what is asked and send for obtaining gateway response key sequence number Ciphering Key Sequence Number.
Figure 14 is the block diagram of another information encryption device according to an exemplary embodiment, which includes operation Encryption information receiving module 210, decruption key in the application program of gateway choose module 220, deciphering module 230 and control Information sending module 240.
Encryption information receiving module 210, the encryption information sent for gateway receiving terminal;
Decruption key chooses module 220, and for responding the reception of encryption information, gateway is according to the key sequence sent to terminal Row number chooses key from default key sequence, obtains decruption key;
Deciphering module 230, for encryption information to be decrypted by decruption key to obtain control information;
Control information sending module 240, for control information to be sent to related home equipment so that home equipment according to Control information works.
Optionally, as shown in figure 15, control information sending module 240 is further included but is not limited to:Information content reading unit 241 and control information transmitting element 242.
Information content reading unit 241, for reading the information content of control information;
Control information transmitting element 242, for when the information content is successfully identified, control information to be sent to related family Equipment is occupied, so that home equipment works according to control information.
Optionally, the control information sending module 240 shown in Figure 15 is further included but is not limited to:Control information abandons mould Block.
Control information discard module, for when identification information content can not be succeeded, abandoning control information.
Optionally, the present invention also provides a kind of terminal, any shown information ciphering method of Fig. 5, Fig. 6 and Fig. 7 is performed All or part of step.The terminal includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction is realized as above-mentioned when being performed by the processor Method described in either exemplary embodiment.
Processor performs the concrete mode of operation in the related information ciphering method in terminal in the embodiment Detailed description is performed in embodiment, explanation will be not set forth in detail herein.
Optionally, the present invention also provides a kind of gateway, the whole of any shown information ciphering methods of execution Fig. 8 and Fig. 9 Or part steps.The gateway includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction is realized as above-mentioned when being performed by the processor Method described in either exemplary embodiment.
Processor performs the concrete mode of operation in the related information ciphering method in gateway in the embodiment Detailed description is performed in embodiment, explanation will be not set forth in detail herein.
In the exemplary embodiment, a kind of storage medium is additionally provided, which is situated between for computer readable storage Matter, such as can be the provisional and non-transitory computer readable storage medium for including instruction.The storage medium for example wraps The memory 102 of instruction is included, above-metioned instruction can be performed by the processor 109 of terminal 100 to complete above- mentioned information encryption method.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, sheet Field technology personnel can perform various modifications and change without departing from the scope.The scope of the present invention only will by appended right Ask to limit.

Claims (15)

1. a kind of intelligent domestic system, it is characterised in that the intelligent domestic system includes:Terminal, gateway and home equipment, its In:
The terminal, when generating control information according to the control operation of triggering, obtains the Ciphering Key Sequence Number that the gateway is sent, And choose key from the key sequence that it is stored according to the Ciphering Key Sequence Number and obtain encryption key, it is close further according to the encryption Key is sent to the gateway after the control information is encrypted;
The gateway, when receiving the encryption information that the terminal is sent, according to the Ciphering Key Sequence Number of its transmission from the close of storage Choose decruption key in key sequence, and with the decruption key encryption information is decrypted to obtain control information, then will The control information is sent to relevant home equipment, so that the home equipment works according to the control information.
2. intelligent domestic system according to claim 1, it is characterised in that pass through office between the terminal and the gateway Domain net carries out communication connection.
3. intelligent domestic system according to claim 1, it is characterised in that the intelligent domestic system further includes high in the clouds clothes Business device, the cloud server are sent out respectively when being connected with the terminal, gateway communication to the terminal, the gateway Key sequence is sent, the terminal and the gateway are chosen according to Ciphering Key Sequence Number from the key sequence each received respectively to be added Key or decruption key.
A kind of 4. information ciphering method, it is characterised in that the described method includes:
Terminal obtains the Ciphering Key Sequence Number that gateway is sent when generating control information according to the control operation of triggering;
Key is chosen from default key sequence according to the Ciphering Key Sequence Number, obtains encryption key;
The control information is encrypted to obtain encryption information according to the encryption key;
The encryption information is sent to the gateway.
5. according to the method described in claim 4, it is characterized in that, the terminal is generating control according to the control operation of triggering During information, obtain gateway initiate broadcast the step of include:
Terminal receives the Ciphering Key Sequence Number that gateway is sent according to default time interval;
The Ciphering Key Sequence Number received when generating control information is obtained from the Ciphering Key Sequence Number for receiving the gateway transmission;Or Person
The terminal according to the control operation of triggering generate control information when, obtain gateway initiate broadcast the step of include:
Terminal sends Ciphering Key Sequence Number when generating control information, to gateway and obtains request;
Obtain gateway and respond the Ciphering Key Sequence Number that the Ciphering Key Sequence Number obtains request and sends.
A kind of 6. information ciphering method, it is characterised in that the described method includes:
The encryption information that gateway receiving terminal is sent;
Respond the reception of the encryption information, the gateway is according to the Ciphering Key Sequence Number that the terminal is sent from default key Key is chosen in sequence, obtains decruption key;
The encryption information is decrypted to obtain control information by the decruption key;
The control information is sent to related home equipment, so that the home equipment carries out work according to the control information Make.
7. according to the method described in claim 6, it is characterized in that, described be sent to related household by the control information and set It is standby, so that the home equipment further includes the step of work according to the control information:
Read the information content of the control information;
When described information content is successfully identified, the control information is sent to related home equipment, so that the household Equipment works according to the control information.
8. the method according to the description of claim 7 is characterized in that the method further includes:
When can not successfully identify described information content, then the control information is abandoned.
9. a kind of information encryption device, it is characterised in that described device includes:
Ciphering Key Sequence Number acquisition module, for terminal when generating control information according to the control operation of triggering, obtains gateway hair The Ciphering Key Sequence Number sent;
Encryption key chooses module, for choosing key from default key sequence according to the Ciphering Key Sequence Number, is added Key;
Encrypting module, for being encrypted to obtain encryption information to the control information according to the encryption key;
Encryption information sending module, for sending the encryption information to the gateway.
10. device according to claim 9, it is characterised in that the Ciphering Key Sequence Number acquisition module includes key sequence Number receiving unit and first key sequence number acquiring unit, or the Ciphering Key Sequence Number acquisition module connect including Ciphering Key Sequence Number Unit and the second Ciphering Key Sequence Number acquiring unit are received, wherein:
Ciphering Key Sequence Number receiving unit, the Ciphering Key Sequence Number sent for terminal reception gateway according to default time interval;
First key sequence number acquiring unit, is controlled for being obtained from the Ciphering Key Sequence Number for receiving the gateway transmission in generation The Ciphering Key Sequence Number received during information processed;
Ciphering Key Sequence Number receiving unit, for terminal when generating control information, sends Ciphering Key Sequence Number to gateway and obtains request;
Second Ciphering Key Sequence Number acquiring unit, the key for responding the Ciphering Key Sequence Number for obtaining gateway and obtaining request and sending Sequence number.
11. a kind of information encryption device, it is characterised in that described device includes:
Encryption information receiving module, the encryption information sent for gateway receiving terminal;
Decruption key chooses module, and for responding the reception of the encryption information, the gateway to the terminal according to sending Ciphering Key Sequence Number chooses key from default key sequence, obtains decruption key;
Deciphering module, for being decrypted to obtain control information to the encryption information by the decruption key;
Control information sending module, for the control information to be sent to related home equipment, so that the home equipment is pressed Work according to the control information.
12. according to the devices described in claim 11, it is characterised in that the control information sending module includes:
Information content reading unit, for reading the information content of the control information;
Control information transmitting element, for when described information content is successfully identified, the control information to be sent to correlation Home equipment, so that the home equipment works according to the control information.
13. a kind of terminal, it is characterised in that the terminal includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes such as claim when being performed by the processor 4-5 any one of them methods.
14. a kind of gateway, it is characterised in that the gateway includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes such as claim when being performed by the processor 6-7 any one of them methods.
15. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that the computer journey Sequence is realized such as claim 4-8 any one of them methods when executed.
CN201711261222.9A 2017-12-04 2017-12-04 Intelligent domestic system and information ciphering method and device, terminal Pending CN107948178A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711261222.9A CN107948178A (en) 2017-12-04 2017-12-04 Intelligent domestic system and information ciphering method and device, terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711261222.9A CN107948178A (en) 2017-12-04 2017-12-04 Intelligent domestic system and information ciphering method and device, terminal

Publications (1)

Publication Number Publication Date
CN107948178A true CN107948178A (en) 2018-04-20

Family

ID=61947485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711261222.9A Pending CN107948178A (en) 2017-12-04 2017-12-04 Intelligent domestic system and information ciphering method and device, terminal

Country Status (1)

Country Link
CN (1) CN107948178A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769009A (en) * 2018-05-28 2018-11-06 深圳和而泰数据资源与云技术有限公司 Data communications method, smart machine and intelligent gateway
CN109039588A (en) * 2018-10-16 2018-12-18 深圳市华腾物联科技有限公司 A kind of data safe transmission method and equipment based on block chain
CN111355683A (en) * 2018-12-20 2020-06-30 航天信息股份有限公司 Method, device and storage medium for ensuring http data transmission safety
CN111431706A (en) * 2020-03-18 2020-07-17 中孚信息股份有限公司 Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
WO2021104448A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Method for synchronizing key information, system and device
CN113612775A (en) * 2021-08-04 2021-11-05 西安思安云创科技有限公司 4C remote control safety protection method, device and system based on Internet of things equipment
CN113824688A (en) * 2021-08-24 2021-12-21 广州市瑞立德信息系统有限公司 Encrypted communication method, network controller and access control system
CN113839958A (en) * 2021-09-29 2021-12-24 广州河东科技有限公司 Communication encryption method and device for smart home, control system and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820344A (en) * 2010-03-23 2010-09-01 中国电信股份有限公司 AAA server, home network access method and system
CN102682506A (en) * 2012-05-25 2012-09-19 北京华大信安科技有限公司 Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN104125124A (en) * 2014-07-11 2014-10-29 京信通信系统(中国)有限公司 Smart home remote control method, device and system
CN104301303A (en) * 2014-09-15 2015-01-21 汕头大学 Intelligent home Internet of Things safety protection method and system
CN105227516A (en) * 2014-05-28 2016-01-06 中兴通讯股份有限公司 The access method of Smart Home, control centre's equipment and dress terminal
CN105260668A (en) * 2015-10-10 2016-01-20 北京搜狗科技发展有限公司 File encryption method and electronic device
CN105634729A (en) * 2015-12-25 2016-06-01 上海云丞聚智能科技有限公司 Mobile phone encryption and decryption method based on bluetooth equipment
CN106100830A (en) * 2016-05-24 2016-11-09 飞天诚信科技股份有限公司 A kind of method and apparatus writing seed key in NFC dynamic token
CN106817358A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The encryption and decryption method and equipment of a kind of user resources
CN107195060A (en) * 2017-07-07 2017-09-22 东峡大通(北京)管理咨询有限公司 The control system and method for a kind of intelligent bicycle lock, intelligent bicycle lock
CN107393066A (en) * 2017-06-30 2017-11-24 北京康得新创科技股份有限公司 Unlocking method, terminal, server and the system for unlocking of smart lock

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101820344A (en) * 2010-03-23 2010-09-01 中国电信股份有限公司 AAA server, home network access method and system
CN102682506A (en) * 2012-05-25 2012-09-19 北京华大信安科技有限公司 Intelligent Bluetooth door access control method and device based on symmetric cryptographic technique
CN105227516A (en) * 2014-05-28 2016-01-06 中兴通讯股份有限公司 The access method of Smart Home, control centre's equipment and dress terminal
CN104125124A (en) * 2014-07-11 2014-10-29 京信通信系统(中国)有限公司 Smart home remote control method, device and system
CN104301303A (en) * 2014-09-15 2015-01-21 汕头大学 Intelligent home Internet of Things safety protection method and system
CN105260668A (en) * 2015-10-10 2016-01-20 北京搜狗科技发展有限公司 File encryption method and electronic device
CN106817358A (en) * 2015-12-02 2017-06-09 阿里巴巴集团控股有限公司 The encryption and decryption method and equipment of a kind of user resources
CN105634729A (en) * 2015-12-25 2016-06-01 上海云丞聚智能科技有限公司 Mobile phone encryption and decryption method based on bluetooth equipment
CN106100830A (en) * 2016-05-24 2016-11-09 飞天诚信科技股份有限公司 A kind of method and apparatus writing seed key in NFC dynamic token
CN107393066A (en) * 2017-06-30 2017-11-24 北京康得新创科技股份有限公司 Unlocking method, terminal, server and the system for unlocking of smart lock
CN107195060A (en) * 2017-07-07 2017-09-22 东峡大通(北京)管理咨询有限公司 The control system and method for a kind of intelligent bicycle lock, intelligent bicycle lock

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769009A (en) * 2018-05-28 2018-11-06 深圳和而泰数据资源与云技术有限公司 Data communications method, smart machine and intelligent gateway
CN109039588A (en) * 2018-10-16 2018-12-18 深圳市华腾物联科技有限公司 A kind of data safe transmission method and equipment based on block chain
CN111355683A (en) * 2018-12-20 2020-06-30 航天信息股份有限公司 Method, device and storage medium for ensuring http data transmission safety
WO2021104448A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Method for synchronizing key information, system and device
CN111431706A (en) * 2020-03-18 2020-07-17 中孚信息股份有限公司 Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
CN111431706B (en) * 2020-03-18 2023-07-28 中孚信息股份有限公司 Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
CN113612775A (en) * 2021-08-04 2021-11-05 西安思安云创科技有限公司 4C remote control safety protection method, device and system based on Internet of things equipment
CN113824688A (en) * 2021-08-24 2021-12-21 广州市瑞立德信息系统有限公司 Encrypted communication method, network controller and access control system
CN113839958A (en) * 2021-09-29 2021-12-24 广州河东科技有限公司 Communication encryption method and device for smart home, control system and storage medium

Similar Documents

Publication Publication Date Title
CN107948178A (en) Intelligent domestic system and information ciphering method and device, terminal
CN107947924A (en) Intelligent domestic system and information ciphering method and device, terminal
EP2885936B1 (en) Configuration of a new enrollee device for use in a communication network
CN107968736A (en) Intelligent domestic system and information ciphering method and device, terminal
CN105471628B (en) Smart machine grouping system, method and device
CN105357262B (en) Apparatus control method and device
CN104869612A (en) Method and device for accessing network
CN107508735A (en) Network collocating method and system, home appliance and mobile terminal
CN105933899A (en) Access method and device of wireless access point
KR101878708B1 (en) Energy management system of smart electric home appliances using security-enhanced residential gateway device
CN104993981A (en) Method and apparatus for controlling access of device
CN107612909A (en) Information interacting method, device and equipment on internet of things equipment
CN104378801A (en) Method and device for having access to wireless network
CN104503688A (en) Intelligent hardware device control achieving method and device
CN107483715A (en) The method and system of terminal and equipment communication, terminal, storage medium
CN104159226A (en) Network connection method and device
CN104765990A (en) Setting method and device for management account of intelligent device
CN105282158A (en) Intelligent equipment networking method, routing equipment, intelligent equipment and system
CN105049416A (en) Method and apparatus for accessing to wifi network
CN105517103A (en) Network access method and device based on intelligent terminal device
CN105101339A (en) Use permission obtaining method and device
CN110086765A (en) Selectivity allows access into network share session
CN105246138A (en) Control method and device of Internet-of-things device
CN105182783A (en) Method, apparatus and terminal for controlling intelligent devices
KR101876183B1 (en) Security-enhanced residential gateway device based on internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180420