CN107968736A - Intelligent domestic system and information ciphering method and device, terminal - Google Patents
Intelligent domestic system and information ciphering method and device, terminal Download PDFInfo
- Publication number
- CN107968736A CN107968736A CN201711260484.3A CN201711260484A CN107968736A CN 107968736 A CN107968736 A CN 107968736A CN 201711260484 A CN201711260484 A CN 201711260484A CN 107968736 A CN107968736 A CN 107968736A
- Authority
- CN
- China
- Prior art keywords
- timestamp
- gateway
- information
- control information
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2807—Exchanging configuration information on appliance services in a home automation network
- H04L12/2814—Exchanging control software or macros for controlling appliance services in a home automation network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Selective Calling Equipment (AREA)
Abstract
Present invention is disclosed a kind of intelligent domestic system and information ciphering method and device, terminal, belong to Computer Applied Technology field.The intelligent domestic system includes:Terminal, gateway and home equipment, terminal are communicated with gateway by LAN, and terminal adds the timestamp of gateway transmission when generating control information according to control operation, in control information, and is sent to gateway after the control information of addition timestamp is encrypted;Timestamp of the gateway in control information is obtained after the encryption information and decryption that receiving terminal is sent obtain control information, when the time interval between the timestamp in timestamp and control information in receiving encryption key is less than default time threshold, control information is sent to related home equipment.In addition, additionally provide information ciphering method, device and terminal.Above-mentioned intelligent domestic system can ensure the communication security in LAN with information ciphering method and device, terminal, improve the security that home equipment control is carried out by LAN.
Description
Technical field
The present invention relates to Computer Applied Technology field, more particularly to a kind of intelligent domestic system and information ciphering method and
Device, terminal.
Background technology
With the high speed development of smart home technology, more and more home equipments realize intelligence.Mobile phone, tablet electricity
Control terminal of the terminals such as brain as smart home, is connected by the communication with gateway, and intelligent family is collectively constituted with home equipment
System is occupied, so as to fulfill the intelligentized control method to home equipment.
In intelligent domestic system, to avoid the control to home equipment by instrument, ensure the security of communication, need to be to control
Information processed is encrypted.At present, for intelligent domestic system when carrying out the control of home equipment, terminal A is according to default close
Key is sent to gateway B after being encrypted to control information into row information, so gateway B after encryption information is got by default close
Encryption information is decrypted in key, obtains control information, and due to other-end and is unaware of the default key, thus other
Even if terminal gets the encryption information, successfully the encryption information can not be also decrypted, known in the encryption information
Real content, so as to fulfill the encrypted purpose of information in LAN.
However, when other-end is truncated to terminal A and is sent to the encryption information of gateway B, gateway B gets encryption letter
After breath, although it can not know the real content in the encryption information, it can pretend to be terminal A at other times to gateway B
Send the encryption information, make terminal B mistake time perform the encryption information in real content, so as to can not ensure intelligence
Communication security in house system.
The content of the invention
In order to solve the technical problem that communication security is poor in the intelligent domestic system in correlation technique, the present invention provides
A kind of intelligent domestic system and information ciphering method and device, terminal.
First aspect, there is provided a kind of intelligent domestic system, the intelligent domestic system include:Terminal, gateway and household
Equipment, wherein:
The terminal, when generating control information according to the control operation of triggering, the timestamp that the gateway is sent is added
Enter to the control information, and the gateway is sent to after the control information to adding the timestamp is encrypted;
The gateway, the control is obtained after the encryption information and decryption for receiving the terminal transmission obtain control information
Timestamp in information, the time between the timestamp in timestamp and the control information when receiving the encryption information
When interval is less than default time threshold, the control information is sent to relevant home equipment, so that the home equipment
Worked according to the control information.
Second aspect, there is provided a kind of information encryption device, including:
Timestamp acquisition module, for terminal when generating control information according to the control operation of triggering, obtains gateway hair
The timestamp sent;
Encrypting module, for adding timestamp in the control information, and according to default key to adding timestamp
The control information be encrypted, obtain encryption information;
Encryption information sending module, for sending the encryption information to the gateway.
The third aspect, there is provided a kind of information encryption device, including:
Encryption information receiving module, the encryption information sent for gateway receiving terminal;
Deciphering module, for the encryption information to be decrypted according to default key, obtains control information;
Time interval judgment module, for obtaining the timestamp in the control information, judges to receive the encryption information
When timestamp and the control information in timestamp between time interval whether be less than default time threshold;
Control module, between the timestamp in the timestamp and the control information when receiving the encryption information
Time interval when being less than default time threshold, relevant home equipment is controlled according to the control information.
Fourth aspect, there is provided a kind of information ciphering method, including:
Terminal obtains the timestamp that gateway is sent when generating control information according to the control operation of triggering;
Timestamp, and the control information according to default key to addition timestamp are added in the control information
It is encrypted, obtains encryption information;
The encryption information is sent to the gateway.
5th aspect, there is provided a kind of information ciphering method, including:
The encryption information that gateway receiving terminal is sent;
The encryption information is decrypted according to default key, obtains control information;
The timestamp in the control information is obtained, timestamp when judging to receive the encryption information is believed with the control
Whether the time interval between timestamp in breath is less than default time threshold, if it has, then
The control information is sent to relevant home equipment so that the home equipment according to the control information into
Row work.
6th aspect, there is provided a kind of terminal, including:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes the such as the 4th when being performed by the processor
Method described in aspect.
7th aspect, there is provided a kind of gateway, including:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes the such as the 5th when being performed by the processor
Method described in aspect.
Eighth aspect, there is provided a kind of computer readable storage medium, is stored thereon with computer program, the calculating
Machine program is realized such as the method in terms of the 4th or the 5th when executed.
The technical solution provided by the embodiment of the present invention can obtain following beneficial effect:
For intelligent domestic system when carrying out the control of home equipment, terminal generates control letter according to the control operation of triggering
Breath, the timestamp of gateway transmission is added in control information, and is sent to after the control information to adding timestamp is encrypted
Gateway, timestamp of the gateway in control information is obtained after the encryption information and decryption that receiving terminal is sent obtain control information,
The time interval between the timestamp in timestamp and control information in receiving encryption key is less than default time threshold
When, control information is sent to relevant home equipment so that home equipment works according to control information, thus according to when
Between stab the judgement into the row information true and false, avoid gateway receiving other-end by pretend to be send comprising other times stab plus
During confidential information, mistakenly relevant device is controlled, so as to ensure that the communication security in intelligent domestic system, is greatly improved
The security that is controlled to related home equipment.
It should be appreciated that the general description and following detailed description of the above are only exemplary, the present invention and from
Limitation.
Brief description of the drawings
Attached drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining the principle of the present invention together with specification.
Fig. 1 is the schematic diagram of an implementation environment according to involved by the disclosure.
Fig. 2 is a kind of block diagram of terminal 100 according to an exemplary embodiment.
Fig. 3 is a kind of structure diagram of intelligent domestic system according to an exemplary embodiment.
Fig. 4 is the structure diagram that another intelligent domestic system for implementing to exemplify is corresponded to according to Fig. 3.
Fig. 5 is a kind of information ciphering method flow chart according to an exemplary embodiment.
Fig. 6 is a kind of specific implementation flow that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5
Figure.
Fig. 7 is another specific implementation stream that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5
Cheng Tu.
Fig. 8 is another information ciphering method flow chart according to an exemplary embodiment.
Fig. 9 is the side being controlled in a kind of intelligent domestic system according to an exemplary embodiment to home equipment
Method schematic diagram.
Figure 10 is a kind of block diagram of information encryption device according to an exemplary embodiment.
Figure 11 is to be corresponded in the information encryption device shown in exemplary embodiment to broadcast the one of acquisition module 110 according to Figure 10
Kind block diagram.
Figure 12 is to be corresponded in the information encryption device shown in exemplary embodiment to broadcast the another of acquisition module 110 according to Figure 10
A kind of block diagram.
Figure 13 is the block diagram of another information encryption device according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following exemplary is implemented
Embodiment described in example does not represent all embodiments consistent with the present invention.On the contrary, they are only and such as institute
The example of the consistent apparatus and method of described, of the invention some aspects in attached claims.
Fig. 1 is the schematic diagram of an implementation environment according to involved by the disclosure.The implementation environment includes:Terminal, gateway
200 and the router 300 that carries out data transmission for terminal 100 and gateway 200.
After terminal 100 sends encryption information by router 300 to gateway 200,200 default manner of decryption pair of gateway adds
Confidential information is decrypted to obtain control information, and the timestamp in the timestamp and control information when calculating receiving encryption key it
Between time interval, when the time interval is less than default time threshold, then relevant device is controlled according to control information
System.
Terminal 100 can be the computer equipments such as mobile phone, computer, specific implementation from the present embodiment limitation.
Fig. 2 is a kind of block diagram of terminal 100 according to an exemplary embodiment.
With reference to figure 2, terminal 100 can include one or more following component:Processing component 101, memory 102, electricity
Source component 103, multimedia component 104, audio component 105, sensor component 107 and communication component 108.Wherein, above-mentioned group
Part is simultaneously not all necessary, and terminal 100 can increase other assemblies according to itself functional requirement or reduce some components, this implementation
Example is not construed as limiting.
The integrated operation of the usual control terminal 100 of processing component 101, such as with display, call, data communication, phase
Operation that machine operates and record operation is associated etc..Processing component 101 can be performed including one or more processors 109
Instruction, to complete all or part of step of aforesaid operations.In addition, processing component 101 can include one or more modules, just
Interaction between processing component 101 and other assemblies.For example, processing component 101 can include multi-media module, it is more to facilitate
Interaction between media component 104 and processing component 101.
Memory 102 is configured as storing various types of data to support the operation in terminal 100.These data are shown
Example includes the instruction of any application program or method for operating on the terminal 100.Memory 102 can be by any kind of
Volatibility or non-volatile memory device or combinations thereof are realized, such as SRAM (Static Random Access
Memory, static RAM), EEPROM (Electrically Erasable Programmable Read-
Only Memory, electrically erasable programmable read-only memory), EPROM (Erasable Programmable Read Only
Memory, Erasable Programmable Read Only Memory EPROM), (Programmable Read-Only Memory, may be programmed read-only PROM
Memory), ROM (Read-Only Memory, read-only storage), magnetic memory, flash memory, disk or CD.Storage
One or more modules are also stored with device 102, which is configured to by the one or more processors 109
Perform, to complete all or part of step in any shown method of Fig. 2, Fig. 3, Fig. 4, Fig. 5 and Fig. 6.
Power supply module 103 provides electric power for the various assemblies of terminal 100.Power supply module 103 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for terminal 100.
Multimedia component 104 is included in the screen of one output interface of offer between the terminal 100 and user.One
In a little embodiments, screen can include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch
Panel, touch panel).If screen includes touch panel, screen may be implemented as touch-screen, from the user to receive
Input signal.Touch panel includes one or more touch sensors to sense the gesture on touch, slip and touch panel.Institute
The boundary of a touch or slide action can not only be sensed by stating touch sensor, but also be detected and the touch or slide phase
The duration and pressure of pass.
Audio component 105 is configured as output and/or input audio signal.For example, audio component 105 includes a Mike
Wind, when terminal 100 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone is configured as connecing
Receive external audio signal.The received audio signal can be further stored in memory 102 or be sent out via communication component 108
Send.In certain embodiments, audio component 105 further includes a loudspeaker, for exports audio signal.
Sensor component 107 includes one or more sensors, and the state for providing various aspects for terminal 100 is commented
Estimate.For example, sensor component 107 can detect opening/closed mode of terminal 100, the relative positioning of component, sensor group
Part 107 can be changed with the coordinate of 100 1 components of detection terminal 100 or terminal and the temperature change of terminal 100.At some
In embodiment, which can also include Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 108 is configured to facilitate the communication of wired or wireless way between terminal 100 and other equipment.Terminal
100 can access the wireless network based on communication standard, such as WiFi (WIreless-Fidelity, wireless network), 2G or 3G,
Or combinations thereof.In one exemplary embodiment, communication component 108 receives via broadcast channel and comes from external broadcasting management
The broadcast singal or broadcast related information of system.In one exemplary embodiment, the communication component 108 further includes NFC
(Near Field Communication, near-field communication) module, to promote junction service.For example, it can be based in NFC module
RFID (Radio Frequency Identification, radio frequency identification) technology, IrDA (Infrared Data
Association, Infrared Data Association) technology, UWB (Ultra-Wideband, ultra wide band) technology, BT (Bluetooth, it is blue
Tooth) technology and other technologies realize.
In the exemplary embodiment, terminal 100 can be by one or more ASIC (Application Specific
Integrated Circuit, application specific integrated circuit), DSP (Digital Signal Processing, at digital signal
Manage device), PLD (Programmable Logic Device, programmable logic device), FPGA (Field-Programmable
Gate Array, field programmable gate array), controller, microcontroller, microprocessor or other electronic components realize, be used for
Perform the above method.
Processor performs the concrete mode of operation by the related information ciphering method in server in the embodiment
It is described in detail in embodiment, will no longer elaborates explanation herein.
Fig. 3 is a kind of structure diagram of intelligent domestic system according to an exemplary embodiment, as shown in figure 3, should
Intelligent domestic system includes:Terminal 100, gateway 200 and home equipment 300, wherein:
Terminal 100 according to the control operation of triggering when generating control information, in control information addition gateway transmission
Between stab, and to add timestamp control information be encrypted after be sent to gateway;
Gateway 200 is in control information is obtained after the encryption information and decryption that receiving terminal 100 is sent obtain control information
Timestamp, the time interval between the timestamp in timestamp and control information in receiving encryption key is less than default
During time threshold, control information is sent to relevant home equipment 500, so that home equipment 500 is carried out according to control information
Work, so as to avoid gateway from receiving other-end by pretending to be transmission to wrap into the judgement of the row information true and false according to timestamp
During the encryption information of the stamp containing other times, mistakenly relevant device is controlled, so as to ensure that in intelligent domestic system
Communication security, substantially increases the security being controlled to related home equipment.
Home equipment 300 can be the household electrical appliances such as intelligent refrigerator, intelligent air condition or Intelligent wall switch, air-conditioning companion
Companion, the first-class smart home device of intelligent camera, specific implementation from the present embodiment limitation.
Communication connection can be carried out by LANs such as ZIGBEE, bluetooths between terminal 100 and gateway 200, can also led to
Cross the outer nets such as WIFI, 2G/3G/4G/5G and carry out communication connection.
When carrying out communication connection by LAN between terminal 100 and gateway 200, even if terminal 100 can not connect outer net,
Also it can realize the control in intelligent domestic system to home equipment, and communicate limitation of the connection from outer net network quality, significantly
Provide the convenience of intelligent domestic system.
Optionally, Fig. 4 is that the structure diagram of another intelligent domestic system for implementing to exemplify, such as Fig. 4 are corresponded to according to Fig. 3
Shown, which further includes cloud server 400, and cloud server 400 connects with terminal 100, the communication of gateway 200
When connecing, key information is sent respectively to terminal 100, gateway 200, terminal 100 and gateway 200 are respectively according to the key each received
The encryption or decryption of key in information into row information.
Fig. 5 is a kind of information ciphering method flow chart according to an exemplary embodiment, as shown in figure 5, the information
Encryption method may comprise steps of.
In step s 110, terminal according to the control operation of triggering generate control information when, obtain gateway send when
Between stab.
Control information is the information that relevant equipment is controlled in local area network.
Implementation environment schematic diagram as described in Figure 1, user generate phase by being manipulated to the APP run in terminal
The control information answered.
Obtaining the mode for the timestamp that gateway is sent has a variety of, can be by setting gateway with fixed frequency to terminal
Sending time is stabbed, and can also be received the timestamp that gateway returns when terminal is asked to the acquisition that gateway sending time is stabbed, may be used also
Be in other way obtain gateway send timestamp.
Timestamp is the time mark that gateway carries out in a time metric.
Optionally, timestamp can be marked or in timer the time carried out on the system time of gateway
The time mark of upper progress, the time mark that can also be carried out in other forms.
In the step s 120, timestamp is added in the control information, and according to control of the default key to addition timestamp
Information processed is encrypted, and obtains encryption information.
Key is the parameter set in advance for being encrypted or decrypting to control information.
It should be noted that between the key that cloud server is sent respectively to terminal and gateway, the two keys can be with
It is identical or corresponding, i.e., after terminal is encrypted according to the key that it is received into row information, and gateway is then according to it
The key of reception can succeed to be decrypted into row information.That is, can by same key into row information encrypt and information
Decryption;It can also be encrypted into row information by a key, carried out by another and the encrypted corresponding key of key
Information is decrypted, so as to ensure that gateway being capable of successful decryption after encryption information is received.
Have to the mode that control information is encrypted a variety of, for example, RSA Algorithm, aes algorithm etc., control is not believed herein
The concrete mode being encrypted is ceased to be defined.
In step s 130, encryption information is sent to gateway.
Using method as described above, terminal obtains gateway hair when generating control information according to the control operation of triggering
The timestamp sent, and timestamp is added in control information, and then the control for adding timestamp is believed according to default key
Breath is encrypted, then will obtain encryption information and be sent to gateway, when the gateway is decrypted to obtain control information to encryption information, according to
Timestamp, so as to ensure that the communication security in intelligent domestic system, is substantially increased to correlation into the judgement of the row information true and false
The security that home equipment is controlled.
Optionally, Fig. 6 is that a kind of details that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5 is retouched
State, as shown in fig. 6, the step S110 in the information ciphering method can also comprise the following steps.
In step S111, terminal receives the timestamp that gateway is sent according to default time interval.
The time interval of gateway sending time stamp is a pre-set time range value, which cannot be set
It is excessive, it can not set too small, in actual intelligent domestic system, the time interval can be finely adjusted in advance.Show one
In example property embodiment, time interval is preset as 5 seconds.
For terminal when receiving the timestamp that gateway is sent at predetermined intervals, it does not immediately obtain the time
Stamp, and only when generating control information according to the control operation of triggering, just obtains timestamp that it receives and is added into
In control information.
In step S112, the timestamp received when generating control information is obtained in the timestamp sent from gateway.
Using method as above, gateway is stabbed according to default time interval to terminal sending time, so that terminal is generating
During control information, the last timestamp received is directly searched in the timestamp for receiving gateway transmission, so that nothing
It need to be stabbed to the special query time of gateway, substantially increase the convenience for obtaining timestamp.
Optionally, Fig. 7 is that the another kind details that step S110 in the information ciphering method for implementing to exemplify is corresponded to according to Fig. 5 is retouched
State, as shown in fig. 7, the step S110 in the information ciphering method can also comprise the following steps.
In step S114, terminal stabs to gateway sending time when generating control information and obtains request.
As previously described, timestamp is the time mark carried out in a time metric.
To ensure the accuracy of timestamp, make gateway after receive information can according to timestamp sentencing into the row information true and false
Disconnected, gateway will be appreciated that the timestamp that terminal adds in the control information.Therefore, when terminal will send control information to gateway,
Request is obtained by being stabbed to gateway sending time, request gateway sending time stamp, so as to ensure that the timestamp is that gateway is known
Timestamp.
In LAN, terminal is stabbed to gateway sending time by router and obtains request.
In step sl 15, the timestamp for receiving gateway respond request and returning.
Gateway is stabbed to terminal sending time immediately when the timestamp that receiving terminal is sent obtains request.
Using method as described above, terminal stabs to gateway sending time when generating control information and obtains request, request
Gateway sending time is stabbed, and travel frequently over router without gateway stabs to terminal sending time, so as to avoid the waste of resource.
Fig. 8 is another information ciphering method flow chart according to an exemplary embodiment, as shown in figure 8, the letter
Encryption for information method may comprise steps of.
In step S210, the encryption information of gateway receiving terminal transmission.
The encryption information that gateway receiving terminal is sent is the encryption information that terminal is sent by LAN to gateway.
In step S220, it is decrypted according to default key pair encryption information, obtains control information.
As previously described, the key each preserved in gateway and terminal is identical or corresponding.
One information of terminal-pair is encrypted according to its key stored be sent to gateway after, gateway is deposited according to it after the receipt
The key of storage can successfully be decrypted.
For example, the key stored in terminal is key X1, the key stored in gateway is key X2, key X2 and key X2
Be it is identical or corresponding, can be right by key X2 when being encrypted to obtain encryption information Y2 to information Y1 by key X1
Encryption information Y2 successful decryptions obtain information Y1.
In step S230, the timestamp in control information is obtained, timestamp and control when judging receiving encryption key
Whether the time interval between timestamp in information is less than default time threshold, if yes (Y), then performs step S241;
If NO (N), then perform step S242.
As previously described, terminal is that the control information for adding timestamp is encrypted.
Thus, it is also to include timestamp after encryption information is decrypted, in obtained control information.
As previously described, timestamp is that the time carried out in time metric is marked.Thus, in the timestamp of different time
It is different, the temporal information of timestamp description is to change with the passing of time.
For example, the time that timestamp is the system time progress to gateway marks, terminal is in the control operation according to triggering
When generating control information, the system time 12 that the time stamp T 1 that gateway is sent is gateway is obtained:00:00, and receiving encryption key
When gateway when being receiving encryption key of time stamp T 2 system time 12:00:03.
In another example timestamp is that the time that the timer in gateway carries out is marked, terminal is grasped according to the control of triggering
When making generation control information, the timing 30 that the time stamp T 1 that gateway is sent is gateway Timer is obtained:00:10, and receive and add
The timing 30 of gateway Timer when time stamp T 2 during confidential information is receiving encryption key:00:13.
Time threshold is a pre-set time range value, which cannot set excessive, can not set
It is too small, by the data transfer in actual LAN, time threshold can be finely adjusted.In one exemplary embodiment, the time
Threshold preset is 5 seconds.
If the time interval between the timestamp in timestamp and control information during receiving encryption key is less than default
Time threshold, then it is effective to show the control information, is not that other-end is attacked by pretending to be in LAN.Cause
This, is controlled relevant device according to the control information.Because if control information is effective, terminal-pair control information into
Row encryption is almost instantaneity with gateway receiving encryption key, i.e. terminal-pair control information is encrypted to receive with gateway and encrypts
Time interval between information is typically very little.
If the time interval between the timestamp in timestamp and control information during receiving encryption key is not less than default
Time threshold, then show when terminal-pair control information is encrypted and during encryption information that gateway receiving terminal is sent between
Time interval is larger, it is likely to and the other-end in LAN is attacked by pretending to be, and therefore, abandons the control information,
Corresponding operating is not performed according to the control information.
In step S241, control information is sent to relevant home equipment, so that home equipment is according to control information
Work.
In step S242, control information is abandoned.
Using method as described above, gateway is in the timestamp during control information is obtained after being decrypted to encryption information, only
There is the time interval between the timestamp in the timestamp and control information in receiving encryption key to be less than default time threshold
Value, is just sent to relevant home equipment by the control information, is that the home equipment performs corresponding operating, avoids other-end from leading to
Cross to pretend to be and gateway is attacked, so as to ensure that the communication security in intelligent domestic system, substantially increase to related household
The security that equipment is controlled.
Fig. 9 is the side being controlled in a kind of intelligent domestic system according to an exemplary embodiment to home equipment
Method schematic diagram.
In step S310, terminal, gateway are connected by the communication with cloud server, receive cloud server hair respectively
The key information sent, key information include default key.
It is understood that terminal and gateway are encrypted into row information or key when information is decrypted is side with key information
Formula is stored in advance in its respective storage, and then the key in key information of the terminal by obtaining its storage, and according to this
Control information is encrypted in key, and gateway is after encryption information is received, in the key information by obtaining its storage
Key, and be decrypted according to the key pair encryption information.
And when terminal, gateway communicate with cloud server connect first, cloud server believes the key comprising key
Breath is sent respectively to terminal and gateway, and the key information that terminal receives respectively with gateway is identical, so as to ensure that terminal exists
After being sent to gateway to control information encryption, gateway can be smoothed out decrypting.
In step s 320, terminal adds net when generating control information according to the control operation of triggering in control information
Close the timestamp sent.
In step S330, terminal is encrypted the control information for adding timestamp according to default key, and will
To encryption information be sent to gateway.
In step S340, the encryption information of gateway receiving terminal transmission, believes encryption according to the encryption and decryption mode of agreement
Breath is decrypted, and obtains control information.
In step S350, gateway obtains the timestamp in control information, timestamp when judging receiving encryption key with
Whether the time interval between timestamp in control information is less than default time threshold, if it has, then performing step S361;
If it has not, then perform step S362.
In step S361, gateway is controlled relevant device according to control information.
In step S362, gateway abandons control information.
Following is present system embodiment, can be used for performing above- mentioned information encryption method embodiment.For the present invention
The details not disclosed in system embodiment, refer to information ciphering method embodiment of the present invention.
Figure 10 is a kind of block diagram of information encryption device according to an exemplary embodiment, which includes running on
Timestamp acquisition module 110, encrypting module 120 and encryption information sending module 130 in the application program of terminal.
Timestamp acquisition module 110, for terminal when generating control information according to the control operation of triggering, obtains gateway
The timestamp of transmission;
Encrypting module 120, for adding timestamp in the control information, and according to default key to adding timestamp
Control information is encrypted, and obtains encryption information;
Encryption information sending module 130, for sending encryption information to gateway.
In above device the function of modules and effect to realize that process specifically refers to right in above- mentioned information encryption method
That answers step realizes process, and details are not described herein.
Optionally, as shown in figure 11, timestamp acquisition module 110 is further included but is not limited to:111 He of timestamp receiving unit
Stamp acquiring unit 112 at the first time.
Timestamp receiving unit 111, the timestamp sent for terminal reception gateway according to default time interval;
Stamp acquiring unit 112 at the first time, connects for being obtained from the timestamp that gateway is sent when generating control information
The timestamp of receipts.
Optionally, as shown in figure 12, timestamp acquisition module 110 is further included but is not limited to:Timestamp obtains request unit
114 and the second timestamp acquiring unit 115.
Timestamp obtains request unit 114, and for terminal when generating control information, being obtained to gateway sending time stamp please
Ask;
Second timestamp acquiring unit 115, the timestamp for obtaining request for obtaining gateway response time stamp and sending.
Figure 13 is the block diagram of another information encryption device according to an exemplary embodiment, which includes operation
Encryption information receiving module 210, deciphering module 220, time interval judgment module 230 and control in the application program of gateway
Module 240.
Encryption information receiving module 210, the encryption information sent for gateway receiving terminal;
Deciphering module 220, for being decrypted according to default key pair encryption information, obtains control information;
Time interval judgment module 230, for obtaining the timestamp in control information, when judging receiving encryption key when
Between stamp and control information in timestamp between time interval whether be less than default time threshold;
Control information sending module 240, for the timestamp in the timestamp and control information in receiving encryption key
Between time interval when being less than default time threshold, control information is sent to relevant home equipment, so that household is set
It is standby to be worked according to control information.
Optionally, the information encryption device shown in Figure 13 is further included but is not limited to:Control information discard module.
Control information discard module, between the timestamp in the timestamp and control information in receiving encryption key
Time interval when being not less than default time threshold, abandon control information.
Optionally, the present invention also provides a kind of terminal, any shown information ciphering method of Fig. 5, Fig. 6 and Fig. 7 is performed
All or part of step.The terminal includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction is realized as above-mentioned when being performed by the processor
Method described in either exemplary embodiment.
Processor performs the concrete mode of operation in the related information ciphering method in terminal in the embodiment
Detailed description is performed in embodiment, explanation will be not set forth in detail herein.
Optionally, the present invention also provides a kind of gateway, perform all or part of of the information ciphering method shown in Fig. 8 and walk
Suddenly.The gateway includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction is realized as above-mentioned when being performed by the processor
Method described in either exemplary embodiment.
Processor performs the concrete mode of operation in the related information ciphering method in gateway in the embodiment
Detailed description is performed in embodiment, explanation will be not set forth in detail herein.
In the exemplary embodiment, a kind of storage medium is additionally provided, which is situated between for computer readable storage
Matter, such as can be the provisional and non-transitory computer readable storage medium for including instruction.The storage medium for example wraps
The memory 102 of instruction is included, above-metioned instruction can be performed by the processor 109 of terminal 100 to complete above- mentioned information encryption method.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, sheet
Field technology personnel can perform various modifications and change without departing from the scope.The scope of the present invention only will by appended right
Ask to limit.
Claims (13)
1. a kind of intelligent domestic system, it is characterised in that the intelligent domestic system includes:Terminal, gateway and home equipment, its
In:
The terminal, according to the control operation of triggering generate control information when, by the timestamp that the gateway is sent add to
The control information, and it is sent to the gateway after the control information to adding the timestamp is encrypted;
The gateway, the control information is obtained after the encryption information and decryption for receiving the terminal transmission obtain control information
In timestamp, the time interval between the timestamp in timestamp and the control information when receiving the encryption information
During less than default time threshold, the control information is sent to relevant home equipment so that the home equipment according to
The control information works.
2. intelligent domestic system according to claim 1, it is characterised in that pass through office between the terminal and the gateway
Domain net carries out communication connection.
3. intelligent domestic system according to claim 1, it is characterised in that the intelligent domestic system further includes high in the clouds clothes
Business device, the cloud server are sent out respectively when being connected with the terminal, gateway communication to the terminal, the gateway
Send key information, the terminal and the gateway are respectively according to the key in the key information each received into row information
Encryption or decryption.
A kind of 4. information ciphering method, it is characterised in that the described method includes:
Terminal obtains the timestamp that gateway is sent when generating control information according to the control operation of triggering;
Timestamp is added in the control information, and the control information for adding timestamp is carried out according to default key
Encryption, obtains encryption information;
The encryption information is sent to the gateway.
5. according to the method described in claim 4, it is characterized in that, the terminal is generating control according to the control operation of triggering
During information, obtain gateway send timestamp the step of include:
Terminal receives the timestamp that gateway is sent according to default time interval;
The timestamp received when generating control information is obtained in the timestamp sent from the gateway;Or
The terminal according to the control operation of triggering generate control information when, obtain gateway send timestamp the step of wrap
Include:
Terminal stabs to gateway sending time when generating control information and obtains request;
Obtain gateway and respond the timestamp that the timestamp obtains request and sends.
A kind of 6. information ciphering method, it is characterised in that the described method includes:
The encryption information that gateway receiving terminal is sent;
The encryption information is decrypted according to default key, obtains control information;
The timestamp in the control information is obtained, in timestamp when judging to receive the encryption information and the control information
Timestamp between time interval whether be less than default time threshold, if it has, then
The control information is sent to relevant home equipment, so that the home equipment carries out work according to the control information
Make.
7. according to the method described in claim 6, it is characterized in that, the method further includes:
If the time interval between the timestamp in timestamp and control information when receiving the encryption information is not less than
The default time threshold, then abandon the control information.
8. a kind of information encryption device, it is characterised in that described device includes running on the timestamp in the application program of terminal
Acquisition module, encrypting module and encryption information sending module, wherein:
Timestamp acquisition module, for terminal when generating control information according to the control operation of triggering, obtains what gateway was sent
Timestamp;
Encrypting module, for adding timestamp, and the institute according to default key to addition timestamp in the control information
State control information to be encrypted, obtain encryption information;
Encryption information sending module, for sending the encryption information to the gateway.
9. device according to claim 8, it is characterised in that the timestamp acquisition module includes timestamp receiving unit
Acquiring unit is stabbed with first time, or the timestamp acquisition module includes timestamp and obtains request unit and the second timestamp
Acquiring unit, wherein:
Timestamp receiving unit, the timestamp sent for terminal reception gateway according to default time interval;
Stamp acquiring unit at the first time, for obtaining what is received when generating control information from the timestamp that the gateway is sent
Timestamp;
Timestamp obtains request unit, for terminal when generating control information, is stabbed to gateway sending time and obtains request;
Second timestamp acquiring unit, the timestamp for responding the timestamp for obtaining gateway and obtaining request and sending.
10. a kind of information encryption device, it is characterised in that described device includes running on the encryption letter in the application program of gateway
Receiving module, deciphering module, time interval judgment module and control module are ceased, wherein:
Encryption information receiving module, the encryption information sent for gateway receiving terminal;
Deciphering module, for the encryption information to be decrypted according to default key, obtains control information;
Time interval judgment module, for obtaining the timestamp in the control information, when judging to receive the encryption information
Whether the time interval between timestamp in timestamp and the control information is less than default time threshold;
Control information sending module, for the timestamp in the timestamp when receiving the encryption information and the control information
Between time interval when being less than default time threshold, the control information is sent to relevant home equipment, so that institute
Home equipment is stated to be worked according to the control information.
11. a kind of terminal, it is characterised in that the terminal includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes such as claim when being performed by the processor
4-5 any one of them methods.
12. a kind of gateway, it is characterised in that the gateway includes:
Processor;And
The memory being connected with the processor communication;Wherein,
The memory storage has readable instruction, and the readable instruction realizes such as claim when being performed by the processor
6-7 any one of them methods.
13. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that the computer journey
Sequence is realized such as claim 4-7 any one of them methods when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711260484.3A CN107968736B (en) | 2017-12-04 | 2017-12-04 | Intelligent home system, information encryption method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711260484.3A CN107968736B (en) | 2017-12-04 | 2017-12-04 | Intelligent home system, information encryption method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107968736A true CN107968736A (en) | 2018-04-27 |
CN107968736B CN107968736B (en) | 2021-07-02 |
Family
ID=61997903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711260484.3A Active CN107968736B (en) | 2017-12-04 | 2017-12-04 | Intelligent home system, information encryption method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107968736B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109358520A (en) * | 2018-11-01 | 2019-02-19 | 刘伟良 | A kind of smart home internet of things local dynamic system for unlocking |
CN110222086A (en) * | 2019-05-07 | 2019-09-10 | 深圳壹账通智能科技有限公司 | Data managing method, device, equipment and storage medium based on block chain |
CN112910916A (en) * | 2021-02-23 | 2021-06-04 | 内江佳路云网络科技有限公司 | Intelligent home gateway system information encryption processing method based on cloud computing |
CN113014579A (en) * | 2021-02-24 | 2021-06-22 | 珠海格力电器股份有限公司 | Control instruction transmission method, system, server and storage medium |
CN113839958A (en) * | 2021-09-29 | 2021-12-24 | 广州河东科技有限公司 | Communication encryption method and device for smart home, control system and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331297A1 (en) * | 2004-03-22 | 2012-12-27 | International Business Machines Corporation | Method for receiving/sending multimedia messages |
CN104301303A (en) * | 2014-09-15 | 2015-01-21 | 汕头大学 | Intelligent home Internet of Things safety protection method and system |
CN106712959A (en) * | 2016-12-09 | 2017-05-24 | 深圳竹信科技有限公司 | Implementation method and system of communication safety |
CN107040459A (en) * | 2017-03-27 | 2017-08-11 | 高岩 | A kind of intelligent industrial secure cloud gateway device system and method |
CN107360139A (en) * | 2017-06-19 | 2017-11-17 | 努比亚技术有限公司 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
-
2017
- 2017-12-04 CN CN201711260484.3A patent/CN107968736B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331297A1 (en) * | 2004-03-22 | 2012-12-27 | International Business Machines Corporation | Method for receiving/sending multimedia messages |
CN104301303A (en) * | 2014-09-15 | 2015-01-21 | 汕头大学 | Intelligent home Internet of Things safety protection method and system |
CN106712959A (en) * | 2016-12-09 | 2017-05-24 | 深圳竹信科技有限公司 | Implementation method and system of communication safety |
CN107040459A (en) * | 2017-03-27 | 2017-08-11 | 高岩 | A kind of intelligent industrial secure cloud gateway device system and method |
CN107360139A (en) * | 2017-06-19 | 2017-11-17 | 努比亚技术有限公司 | A kind of mobile terminal, data ciphering method and computer-readable recording medium |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109358520A (en) * | 2018-11-01 | 2019-02-19 | 刘伟良 | A kind of smart home internet of things local dynamic system for unlocking |
CN109358520B (en) * | 2018-11-01 | 2022-01-07 | 南京仁程智能科技有限公司 | Local dynamic unlocking system for smart home Internet of things |
CN110222086A (en) * | 2019-05-07 | 2019-09-10 | 深圳壹账通智能科技有限公司 | Data managing method, device, equipment and storage medium based on block chain |
CN112910916A (en) * | 2021-02-23 | 2021-06-04 | 内江佳路云网络科技有限公司 | Intelligent home gateway system information encryption processing method based on cloud computing |
CN113014579A (en) * | 2021-02-24 | 2021-06-22 | 珠海格力电器股份有限公司 | Control instruction transmission method, system, server and storage medium |
CN113839958A (en) * | 2021-09-29 | 2021-12-24 | 广州河东科技有限公司 | Communication encryption method and device for smart home, control system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107968736B (en) | 2021-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107968736A (en) | Intelligent domestic system and information ciphering method and device, terminal | |
CN107948178A (en) | Intelligent domestic system and information ciphering method and device, terminal | |
CN107947924A (en) | Intelligent domestic system and information ciphering method and device, terminal | |
CN104869612A (en) | Method and device for accessing network | |
CN105933899A (en) | Access method and device of wireless access point | |
CN105681538B (en) | System and method for equipment certification | |
CN105357262B (en) | Apparatus control method and device | |
KR101878708B1 (en) | Energy management system of smart electric home appliances using security-enhanced residential gateway device | |
CN107508735A (en) | Network collocating method and system, home appliance and mobile terminal | |
CN104503688A (en) | Intelligent hardware device control achieving method and device | |
CN104009837B (en) | Key updating method, device and terminal | |
CN104765990A (en) | Setting method and device for management account of intelligent device | |
CN104993981A (en) | Method and apparatus for controlling access of device | |
CN105282158A (en) | Intelligent equipment networking method, routing equipment, intelligent equipment and system | |
CN106888206A (en) | Key exchange method, apparatus and system | |
CN105100190A (en) | Methods, devices and system for managing control relation of account and device | |
CN105045690B (en) | Test the method and device of terminal | |
CN104125055A (en) | Encryption and decryption method and electronic device | |
CN105049416A (en) | Method and apparatus for accessing to wifi network | |
CN105744595B (en) | Access method, apparatus, system and the storage medium of WLAN | |
CN105246138A (en) | Control method and device of Internet-of-things device | |
KR101878710B1 (en) | Smart home maintenance system using security-enhanced residential gateway device | |
CN104091376A (en) | Intelligent lock control method and apparatus thereof | |
CN105611045A (en) | Device control method and device | |
CN106506562B (en) | Method for connecting network, device and the smart machine of smart machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |