CN113724482A - Radio frequency remote control method, device, storage medium and electronic equipment - Google Patents

Radio frequency remote control method, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113724482A
CN113724482A CN202110894664.7A CN202110894664A CN113724482A CN 113724482 A CN113724482 A CN 113724482A CN 202110894664 A CN202110894664 A CN 202110894664A CN 113724482 A CN113724482 A CN 113724482A
Authority
CN
China
Prior art keywords
receiver
transmitter
target
secret key
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110894664.7A
Other languages
Chinese (zh)
Other versions
CN113724482B (en
Inventor
杨如昆
曹阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN202110894664.7A priority Critical patent/CN113724482B/en
Publication of CN113724482A publication Critical patent/CN113724482A/en
Application granted granted Critical
Publication of CN113724482B publication Critical patent/CN113724482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The specification discloses a radio frequency remote control method, a radio frequency remote control device, a storage medium and electronic equipment. The remote control system can be applied to the field of unmanned driving, and the unmanned equipment is controlled in a radio frequency remote control mode. In the radio frequency remote control method provided in this specification, a negotiation platform is introduced, and the negotiation platform stores information of each transmitter after authentication, so that the transmitter can be verified through a negotiation center with the receiver as a relay device, and when the transmitter passes the verification, a target key for conversation with the receiver is generated for the transmitter and the receiver.

Description

Radio frequency remote control method, device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of communications, and in particular, to a radio frequency remote control method, apparatus, storage medium, and electronic device.
Background
In the prior art, a remote control device can send a control instruction to a device equipped with a matched receiver, so as to achieve the effect of controlling the device. For example, a remote control of an automobile may instruct the automobile to unlock, open, etc. through control instructions.
However, in general, the control command is sent in the form of plaintext by a transmitter of the radio frequency signal, in this case, the device may be attacked in a replay manner according to the recorded control command, that is, the same control command may be sent to the device again, still taking the car as an example, when the recorded control command is an unlock command, the effect of stealing the car may be achieved by the attack in the replay manner.
With the development of scientific technology, the radio frequency remote control mode is applied to more fields, for example, the radio frequency remote control mode can be applied to the brake control of unmanned equipment, and the radio frequency remote control mode also needs higher safety.
Currently, before application, a receiver of radio frequency signals may negotiate with a transmitter, and transmit signals during application according to the negotiated key. However, since the receiver itself does not have the capability of identifying whether the transmitter is safe or not, any transmitter can obtain the key through negotiation with the receiver and realize control over the device through the key, which obviously cannot guarantee safe control over the device.
Therefore, how to ensure the transmission security of signals between the transmitter and the receiver in the radio frequency remote control is an urgent problem to be solved.
Disclosure of Invention
The present specification provides a radio frequency remote control method, device, storage medium and electronic apparatus, so as to partially solve the above problems in the prior art.
The technical scheme adopted by the specification is as follows:
the present specification provides a radio frequency remote control method, comprising:
in response to the received identification information and verification information of the transmitter forwarded by the receiver, verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
when the transmitter passes the verification, generating a target secret key;
and sending the target key to a receiver so that the receiver stores the target key and forwards the target key to a transmitter, so that the transmitter can control the target equipment carrying the receiver through a control instruction encrypted by the target key.
Optionally, before generating the target key, the method further includes:
responding to the received identification information and verification information of the receiver sent by the receiver, and verifying the receiver according to the identification information of the receiver and the verification information of the receiver;
when the transmitter passes the verification, generating a target key, specifically including:
when both the transmitter and receiver check pass, a target key is generated.
Optionally, verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter includes:
determining a first secret key stored in advance corresponding to the identification information according to the identification information of the transmitter;
decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information correspondingly stored in the identification information of the transmitter, and determining a comparison result;
and determining a verification result of the transmitter according to the comparison result.
Optionally, verifying the receiver according to the identification information of the receiver and the verification information of the receiver includes:
determining a second secret key which is stored in advance corresponding to the identification information according to the identification information of the receiver;
decrypting the verification information of the receiver by using the second secret key, comparing the plaintext of the verification information obtained by decryption with the verification information correspondingly stored in the identification information of the receiver, and determining a comparison result;
and determining a verification result of the receiver according to the comparison result.
Optionally, sending the target key to a receiver specifically includes:
and sending the target secret key to a receiver, wherein the target secret key at least comprises a ciphertext of the target secret key encrypted by the first secret key, so that the receiver forwards the ciphertext of the target secret key encrypted by the first secret key to the transmitter, and the transmitter can obtain a plaintext of the decrypted target secret key according to the preset first secret key.
Optionally, sending the target key to a receiver specifically includes:
determining a second key stored in correspondence with the identification information of the receiver;
the method comprises the steps of determining a first ciphertext of a target secret key encrypted by a first secret key and a second ciphertext of the target secret key encrypted by a second secret key, and sending the first ciphertext and the second ciphertext to a receiver, so that the receiver stores the second ciphertext of the target secret key encrypted by the second secret key, and forwards the first ciphertext of the target secret key encrypted by the first secret key to a transmitter, so that the transmitter can obtain a decrypted plaintext of the target secret key according to a preset first secret key, and the receiver can obtain the decrypted plaintext of the target secret key according to the preset second secret key.
The present specification provides a radio frequency remote control method, comprising:
determining target equipment and generating a control instruction for the target equipment;
encrypting the control instruction according to a target secret key negotiated in advance by any one of the methods;
and sending the ciphertext of the control instruction to a receiver carried by the target equipment by adopting a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
The present specification provides a radio frequency remote control device comprising:
the verification module is used for responding to the received identification information and verification information of the transmitter forwarded by the receiver and verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
the generating module is used for generating a target secret key when the transmitter passes the verification;
and the sending module is used for sending the target key to the receiver so that the receiver stores the target key and forwards the target key to the transmitter, and the transmitter controls the target equipment carrying the receiver through a control instruction encrypted by the target key.
The present specification provides a radio frequency remote control device comprising:
the generating module is used for determining the target equipment and generating a control instruction for the target equipment;
the encryption module is used for encrypting the control instruction according to a pre-negotiated target secret key;
and the sending module is used for sending the ciphertext of the control instruction to a receiver carried by the target equipment in a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
The present specification provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the above-described radio frequency remote control method.
The present specification provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the above radio frequency remote control method when executing the program.
The technical scheme adopted by the specification can achieve the following beneficial effects:
in the radio frequency remote control method provided in this specification, a negotiation platform is introduced, and the negotiation platform stores information of each transmitter after authentication, so that the transmitter can be verified through a negotiation center with the receiver as a relay device, and when the transmitter passes the verification, a target key for conversation with the receiver is generated for the transmitter and the receiver.
Drawings
The accompanying drawings, which are included to provide a further understanding of the specification and are incorporated in and constitute a part of this specification, illustrate embodiments of the specification and together with the description serve to explain the specification and not to limit the specification in a non-limiting sense. In the drawings:
fig. 1 is a schematic flow chart of a radio frequency remote control method in the present specification;
fig. 2 is a schematic diagram of a radio frequency remote control device provided in the present specification;
FIG. 3 is a schematic view of another RF remote control provided herein;
fig. 4 is a schematic structural diagram of an electronic device provided in this specification.
Detailed Description
In the above-described aspect, any one of the transmitters may negotiate with the receiver and obtain a negotiated key to realize range remote control of a target device equipped with the receiver, and in addition to this, in order to improve security, the transmitter may be preset with a corresponding first key, and the receiver may pre-store first keys of all authenticated (i.e., secure) transmitters, and at this time, the receiver may authenticate the transmitter with the first key according to information transmitted by the transmitter, thereby realizing negotiation with only the transmitter storing the same first key and obtaining a target key for interaction.
However, this means that the receiver needs to pre-store the first secret keys of all authenticated transmitters to negotiate with the secure transmitter, and when the receiver needs to negotiate with the transmitter to be authenticated, the receiver often cannot negotiate the secret key with the transmitter to be authenticated in time.
In order to make the objects, technical solutions and advantages of the present disclosure more clear, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without any creative effort belong to the protection scope of the present specification.
Based on the above problem, in the radio frequency remote control method provided in the embodiments of the present specification, a negotiation platform is introduced, where the negotiation platform stores information of each authenticated transmitter, and can flexibly add or delete the stored information of the transmitter, for example, the information of each transmitter may be stored in a form of a database, so that the transmitter may be verified by a negotiation center, and when the transmitter passes verification, a target key for a session with the receiver is generated for the transmitter and the receiver.
The radio frequency remote control method provided in the embodiments of the present specification can be applied to the field of unmanned driving, and is used for the transmitter to transmit a control instruction to a receiver of an unmanned device so as to realize control of the unmanned device.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a radio frequency remote control method provided in an embodiment of the present specification.
The embodiment of the specification provides a radio frequency remote control system, which comprises a transmitter, a receiver and a target device carrying the receiver.
The target device may be an unmanned device, such as an unmanned vehicle, an unmanned aerial vehicle, or the like, and the unmanned device implemented in this specification may be used in the field of logistics distribution, and particularly may be used for takeaway distribution.
The transmitter and the receiver are corresponding transmitting and receiving devices, and the type of the signal transmitted by the transmitter is the type of the signal received by the receiver, for example, the signal transmitted by the transmitter may include Near Field Communication (NFC), Radio Frequency Identification (RFID), Radio Frequency Communication (RF), and the like, which is not limited in this specification.
After the transmitter and the receiver negotiate a corresponding target key, the transmitter and the receiver may be considered as a corresponding pair of transmitting and receiving devices, and at this time, the transmitter may control the target device equipped with the receiver by sending a control instruction to the receiver. The embodiments in this specification do not limit the types of target devices, and may be unmanned vehicles, unmanned aerial vehicles, and the like, and the following portions of this specification take the target device as an unmanned vehicle as an example for illustration only.
According to the type of the controlled target device, the transmitter may instruct the drone to perform different types of actions through the control command, for example, the drone may be controlled to unlock, brake, and the like, and when the target device is a drone, the drone may be instructed to fly by the control command, and the like, which is not limited in this specification.
As shown in fig. 1, the radio frequency remote control method provided in real time in this specification is divided into a negotiation stage and a remote control stage.
In the negotiation stage, the negotiation platform, the transmitter and the receiver negotiate a target key for encrypting the interaction in the remote control stage, and in an embodiment of the present specification, the target key of the transmitter and the target key of the receiver may be the same key for symmetric encryption.
The device is limited by the transmitter, which is simple in structure, usually the transmitter is a single chip, and the System mounted by the transmitter is usually a Real Time Operating System (RTOS), so the transmitter usually only includes a radio frequency communication function, and cannot interact with the transmitter through a cellular network, an ethernet network, and the like, and the computing resources are also few, and therefore, in the embodiment of the present specification, the target key of the transmitter negotiated in the negotiation stage is the same as the target key of the receiver.
In the remote control stage, the transmitter encrypts the control command according to the negotiated target key and transmits the encrypted control command to the target device with the receiver, so that the effect of safely transmitting the control command is achieved.
Specifically, after the target key is determined, the target device may be controlled by using the method shown in fig. 2.
S200: determining a target device, generating a control instruction for the target device,
S204: and encrypting the control command according to a target key negotiated in advance by any method.
S206: and sending the ciphertext of the control instruction to a receiver carried by the target equipment by adopting a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
After generating the control instruction for the target device, the transmitter may encrypt the control instruction with the target key, and send the encrypted control instruction to the receiver, so that the receiver obtains a plaintext of the control instruction according to the target key stored in the receiver, thereby controlling the target device.
In an embodiment of this specification, each transmitter may correspond to a plurality of receivers, each receiver may also correspond to a plurality of transmitters, each corresponding target key may be different from each target key, and when a receiver receives a signal encrypted by a target key that is not stored by the receiver, the receiver may consider that the signal is a non-control command that is not negligible. Furthermore, when the receiver receives the unencrypted control command, the unencrypted control command can be considered to be sent by the untrusted transmitter, so that the unencrypted control command is ignored, and the security of the target device is ensured. After the receiver receives the control instruction, a corresponding acknowledgement signal may also be returned to the transmitter.
Fig. 1 shows a radio frequency remote control method in an embodiment of this specification, where in a negotiation stage, a transmitter may generate identification information and check information of itself and send the identification information and the check information to a receiver, the receiver forwards the identification information and the check information of the transmitter to a negotiation center, and the negotiation center verifies the transmitter according to the received identification information and check information of the transmitter, and specifically, the negotiation center may store the identification information and the check information of each transmitter, so that the negotiation center may determine the check information corresponding to the identification information of the transmitter according to the identification information of the transmitter and compare the check information with the check information of the transmitter forwarded by the receiver to obtain a verification result of the transmitter.
In an embodiment of this specification, the negotiation center may correspondingly store three types of information, including: identification information, keys, and verification information such that the three types of information stored are for the same transmitter.
Fig. 3 shows a radio frequency remote control method in the negotiation stage of the present specification, taking the negotiation center as the executing body.
S300: and responding to the received identification information and the verification information of the transmitter forwarded by the receiver, and verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter.
The transmitter may be preset with a first secret key, for example, the first secret key may be written on the transmitter during a production process of the transmitter, in this case, the check information sent by the transmitter to the receiver may be a ciphertext of the check information encrypted with the first secret key, and of course, the ciphertext of the first check information and the plaintext of the first check information may be forwarded to the negotiation center together with the plaintext of the transmitter, so that the check center determines the first secret key stored corresponding to the identification information according to the plaintext of the identification information of the transmitter, and decrypts the received ciphertext of the check information of the transmitter according to the first secret key.
Specifically, the decrypted plaintext of the transmitter verification information may be compared with the pre-stored verification information corresponding to the identifier information of the transmitter, so as to determine a comparison result, and determine whether the transmitter verification passes or not according to the comparison result. Generally, if the comparison result is the same, the transmitter verification result can be considered to pass.
S302: when the transmitter check passes, a target key is generated.
In the embodiments of the present specification, the generated target key may be a random number, and the random number may be a fixed length, and may be 16 bits, for example.
S304: and sending the target key to a receiver so that the receiver stores the target key and forwards the target key to a transmitter, and controlling the target equipment carrying the receiver by the transmitter through a control command encrypted by the target key.
The negotiation center may then send the generated target key to the receiver, store it by the receiver itself, and forward it to the transmitter.
In an embodiment of this specification, in order to ensure security when the receiver sends the target key to the transmitter, the negotiation center may encrypt the target key with the first secret key after generating the target key, so that the receiver forwards the received target key encrypted with the first secret key to the transmitter. And the transmitter adopts the first secret key to decrypt according to the received ciphertext of the target secret key to obtain the plaintext of the target secret key.
In an embodiment of the present specification, a communication environment between the receiver and the negotiation center may be considered to be secure, and therefore, the target key sent by the negotiation center includes, in addition to the target key encrypted by the first secret key for the receiver to forward to the transmitter, a plaintext of the target key, so that the receiver directly stores the plaintext of the target key.
The above is an embodiment of a radio frequency remote control method in this specification.
In the radio frequency remote control method provided in the foregoing embodiment, the check information sent by the transmitter is encrypted by using a first secret key, and the negotiation center decrypts a ciphertext of the check information of the transmitter according to the stored first secret key corresponding to the identification information of the transmitter to obtain the check information, that is, a secret key predetermined for the transmitter is the same as that stored in the negotiation center in advance, and the encryption of the check information is symmetric encryption.
In addition to the need to authenticate the transmitter, another embodiment of this specification requires that the receiver be authenticated and that the target key be generated only if both the transmitter and the receiver are verified.
Specifically, the receiver generates its own identification information and verification information, and sends the own identification information and verification information to the negotiation center, and the negotiation center may determine a verification result of the receiver according to the identification information and verification information of the receiver through any one of the above-mentioned verification transmitters, and similar to the transmitter, the second secret key determined in advance for the receiver may be a second secret key corresponding to the identification information of the receiver stored in the negotiation center, but the secret key determined in advance for the receiver threshold may also be a fourth secret key corresponding to the second secret key corresponding to the identification information of the receiver stored in the negotiation center, and the second secret key and the fourth secret key are asymmetrically encrypted.
In this case, after determining the target key, the negotiation center may encrypt the target key with the first key and the second key, respectively, and obtain a first ciphertext of the target key encrypted with the first key and a second ciphertext of the target key encrypted with the second key, and send the first ciphertext and the second ciphertext to the receiver.
The receiver stores the second ciphertext and obtains the plaintext of the decrypted target key by using the second key or the fourth key stored in the receiver, and in addition, the receiver also forwards the first ciphertext to the transmitter, so that the transmitter obtains the plaintext of the decrypted target key according to the first key or the third key.
The above is an example of the negotiation phase provided for embodiments of the present specification.
Because the negotiation platform stores the information of each authenticated transmitter and can flexibly add or delete the stored information of the transmitters, for example, the information of each transmitter can be stored in a database form, so that the transmitters can be verified through the negotiation center, and when the transmitters pass the verification, a target secret key used for conversation with the receiver is generated for the transmitters and the receiver.
In addition, when the transmitter is lost, the negotiation platform may instruct the receiver to delete the transmitter's corresponding target key to prevent theft of the transmitter's target device.
The above radio frequency remote control method provided for one or more embodiments of the present specification is based on the same idea, and the present specification further provides a corresponding radio frequency remote control device, as shown in fig. 2 and fig. 3.
Fig. 2 is a radio frequency remote control method provided in this specification, including:
a verification module 200, configured to respond to the received identification information and verification information of the transmitter forwarded by the receiver, and verify the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
a generating module 202, configured to generate a target key when the transmitter passes verification;
a sending module 204, configured to send the target key to a receiver, so that the receiver stores the target key and forwards the target key to a transmitter, so that the transmitter controls a target device equipped with the receiver through a control instruction encrypted with the target key.
Optionally, before generating the target key, the verification module 200 is further configured to, in response to the received identification information and verification information of the receiver sent by the receiver, verify the receiver according to the identification information of the receiver and the verification information of the receiver;
when the transmitter passes the verification, the verification module 200 is specifically configured to generate a target key when both the transmitter and the receiver pass the verification.
Optionally, the verification module 200 is specifically configured to determine, according to the identification information of the transmitter, a first key stored in advance in correspondence with the identification information; decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information correspondingly stored in the identification information of the transmitter, and determining a comparison result; and determining a verification result of the transmitter according to the comparison result.
Optionally, the verification module 200 is specifically configured to determine, according to the identification information of the receiver, a second key stored in advance in correspondence with the identification information; decrypting the verification information of the receiver by using the second secret key, comparing the plaintext of the verification information obtained by decryption with the verification information correspondingly stored in the identification information of the receiver, and determining a comparison result; and determining a verification result of the receiver according to the comparison result.
Optionally, the sending module 204 is specifically configured to send the target key to the receiver, where the target key at least includes a ciphertext of the target key encrypted with the first secret key, so that the receiver forwards the ciphertext of the target key encrypted with the first secret key to the transmitter, so that the transmitter obtains a plaintext of the decrypted target key according to a preset first secret key.
Optionally, the sending module 204 is specifically configured to determine a second key stored in correspondence with the identification information of the receiver; the method comprises the steps of determining a first ciphertext of a target secret key encrypted by a first secret key and a second ciphertext of the target secret key encrypted by a second secret key, and sending the first ciphertext and the second ciphertext to a receiver, so that the receiver stores the second ciphertext of the target secret key encrypted by the second secret key, and forwards the first ciphertext of the target secret key encrypted by the first secret key to a transmitter, so that the transmitter can obtain a decrypted plaintext of the target secret key according to a preset first secret key, and the receiver can obtain the decrypted plaintext of the target secret key according to the preset second secret key.
Fig. 3 is a radio frequency remote control method provided in this specification, including:
a generating module 300, configured to determine a target device and generate a control instruction for the target device;
an encryption module 302, configured to encrypt the control instruction according to a pre-negotiated target key;
a sending module 304, configured to send the ciphertext of the control instruction to a receiver mounted on the target device in a radio frequency transmission manner, so that the receiver, in response to the received ciphertext of the control instruction, determines a plaintext of the control instruction according to the target key, so that the target device executes an operation indicated by the control instruction according to the control instruction.
The present specification also provides a computer-readable storage medium storing a computer program, which is operable to execute the above-described radio frequency remote control method.
The present specification also provides a schematic structural diagram of the electronic device shown in fig. 4. As shown in fig. 4, at the hardware level, the electronic device includes a processor, an internal bus, a memory, and a non-volatile memory, but may also include hardware required for other services. The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to realize the radio frequency remote control method.
Of course, besides the software implementation, the present specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may be hardware or logic devices.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the various elements may be implemented in the same one or more software and/or hardware implementations of the present description.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present specification, and is not intended to limit the present specification. Various modifications and alterations to this description will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present specification.

Claims (11)

1. A radio frequency remote control method, comprising:
in response to the received identification information and verification information of the transmitter forwarded by the receiver, verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
when the transmitter passes the verification, generating a target secret key;
and sending the target key to a receiver so that the receiver stores the target key and forwards the target key to a transmitter, so that the transmitter can control the target equipment carrying the receiver through a control instruction encrypted by the target key.
2. The method of claim 1, wherein prior to generating the target key, the method further comprises:
responding to the received identification information and verification information of the receiver sent by the receiver, and verifying the receiver according to the identification information of the receiver and the verification information of the receiver;
when the transmitter passes the verification, generating a target key, specifically including:
when both the transmitter and receiver check pass, a target key is generated.
3. The method of claim 1, wherein verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter comprises:
determining a first secret key stored in advance corresponding to the identification information according to the identification information of the transmitter;
decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information correspondingly stored in the identification information of the transmitter, and determining a comparison result;
and determining a verification result of the transmitter according to the comparison result.
4. The method of claim 2, wherein verifying the receiver according to the identification information of the receiver and the verification information of the receiver comprises:
determining a second secret key which is stored in advance corresponding to the identification information according to the identification information of the receiver;
decrypting the verification information of the receiver by using the second secret key, comparing the plaintext of the verification information obtained by decryption with the verification information correspondingly stored in the identification information of the receiver, and determining a comparison result;
and determining a verification result of the receiver according to the comparison result.
5. The method of claim 3, wherein sending the target key to a receiver specifically comprises:
and sending the target secret key to a receiver, wherein the target secret key at least comprises a ciphertext of the target secret key encrypted by the first secret key, so that the receiver forwards the ciphertext of the target secret key encrypted by the first secret key to the transmitter, and the transmitter can obtain a plaintext of the decrypted target secret key according to the preset first secret key.
6. The method of claim 5, wherein sending the target key to a receiver specifically comprises:
determining a second key stored in correspondence with the identification information of the receiver;
the method comprises the steps of determining a first ciphertext of a target secret key encrypted by a first secret key and a second ciphertext of the target secret key encrypted by a second secret key, and sending the first ciphertext and the second ciphertext to a receiver, so that the receiver stores the second ciphertext of the target secret key encrypted by the second secret key, and forwards the first ciphertext of the target secret key encrypted by the first secret key to a transmitter, so that the transmitter can obtain a decrypted plaintext of the target secret key according to a preset first secret key, and the receiver can obtain the decrypted plaintext of the target secret key according to the preset second secret key.
7. A radio frequency remote control method, comprising:
determining target equipment and generating a control instruction for the target equipment;
encrypting the control instruction according to a target key negotiated in advance by the method according to any of the preceding claims 1-6;
and sending the ciphertext of the control instruction to a receiver carried by the target equipment by adopting a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
8. A radio frequency remote control device, characterized in that, the device specifically includes:
the verification module is used for responding to the received identification information and verification information of the transmitter forwarded by the receiver and verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
the generating module is used for generating a target secret key when the transmitter passes the verification;
and the sending module is used for sending the target key to the receiver so that the receiver stores the target key and forwards the target key to the transmitter, and the transmitter controls the target equipment carrying the receiver through a control instruction encrypted by the target key.
9. A radio frequency remote control device, characterized in that, the device specifically includes:
the generating module is used for determining the target equipment and generating a control instruction for the target equipment;
the encryption module is used for encrypting the control instruction according to a pre-negotiated target secret key;
and the sending module is used for sending the ciphertext of the control instruction to a receiver carried by the target equipment in a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
10. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method of any of the preceding claims 1 to 7.
11. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 7 when executing the program.
CN202110894664.7A 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment Active CN113724482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110894664.7A CN113724482B (en) 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110894664.7A CN113724482B (en) 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113724482A true CN113724482A (en) 2021-11-30
CN113724482B CN113724482B (en) 2023-05-30

Family

ID=78674913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110894664.7A Active CN113724482B (en) 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113724482B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114613117A (en) * 2022-03-16 2022-06-10 深圳数马电子技术有限公司 Remote control method for copying remote controller, copying remote controller and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105109672A (en) * 2015-08-17 2015-12-02 广州飞米电子科技有限公司 Method and device for controlling aircraft in flight control system
CN106888206A (en) * 2017-02-13 2017-06-23 海信集团有限公司 Key exchange method, apparatus and system
US20180027600A1 (en) * 2016-07-25 2018-01-25 Ford Global Technologies, Llc Private vehicle-to-vehicle communication
CN111147474A (en) * 2019-12-23 2020-05-12 平安医疗健康管理股份有限公司 Data encryption transmission method and device, computer equipment and storage medium
CN111357305A (en) * 2019-01-25 2020-06-30 深圳市大疆创新科技有限公司 Communication method, device, system and storage medium of movable platform
CN111406390A (en) * 2018-12-26 2020-07-10 深圳市大疆创新科技有限公司 Encrypted communication method, device, system and computer storage medium
CN112448808A (en) * 2019-08-29 2021-03-05 斑马智行网络(香港)有限公司 Communication method, device, access point, server, system and storage medium
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105109672A (en) * 2015-08-17 2015-12-02 广州飞米电子科技有限公司 Method and device for controlling aircraft in flight control system
US20180027600A1 (en) * 2016-07-25 2018-01-25 Ford Global Technologies, Llc Private vehicle-to-vehicle communication
CN106888206A (en) * 2017-02-13 2017-06-23 海信集团有限公司 Key exchange method, apparatus and system
CN111406390A (en) * 2018-12-26 2020-07-10 深圳市大疆创新科技有限公司 Encrypted communication method, device, system and computer storage medium
CN111357305A (en) * 2019-01-25 2020-06-30 深圳市大疆创新科技有限公司 Communication method, device, system and storage medium of movable platform
CN112448808A (en) * 2019-08-29 2021-03-05 斑马智行网络(香港)有限公司 Communication method, device, access point, server, system and storage medium
CN111147474A (en) * 2019-12-23 2020-05-12 平安医疗健康管理股份有限公司 Data encryption transmission method and device, computer equipment and storage medium
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114613117A (en) * 2022-03-16 2022-06-10 深圳数马电子技术有限公司 Remote control method for copying remote controller, copying remote controller and storage medium

Also Published As

Publication number Publication date
CN113724482B (en) 2023-05-30

Similar Documents

Publication Publication Date Title
CN109218263B (en) Control method and device
US8923514B2 (en) Apparatus and method for authentication for motor vehicles
KR102404543B1 (en) Apparatus and method for controlling vehicle using user terminal
US9516024B2 (en) Connection authentication
CN109902477B (en) Ensuring audio communication security
CN111741028B (en) Service processing method, device, equipment and system
US11212080B2 (en) Communication system, vehicle, server device, communication method, and computer program
CN112906037A (en) Communication encryption system, method and device
CN104618422A (en) Bluetooth type automobile starting control method and mobile terminal
US20170353315A1 (en) Secure electronic entity, electronic apparatus and method for verifying the integrity of data stored in such a secure electronic entity
CN109560933B (en) Authentication method and system based on digital certificate, storage medium and electronic equipment
CN104527576A (en) WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal
US20190026478A1 (en) Vehicle secure communication method and apparatus, vehicle multimedia system, and vehicle
US20210136051A1 (en) Apparatus and method for in-vehicle network communication
CN113724482B (en) Radio frequency remote control method and device, storage medium and electronic equipment
CN111431922A (en) Internet of things data encryption transmission method and system
CN113709696A (en) Vehicle remote control method and device and key initialization method and device
CN113179258B (en) Vehicle-mounted data encryption method based on multi-encryption algorithm
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
CN112585042B (en) Vehicle control method, communication device, and computer-readable storage medium
CN114980083A (en) Secure communication method based on self-adaptive application and server
CN114553428B (en) Trusted verification system, trusted verification device, trusted verification storage medium and electronic equipment
CN113961931A (en) Adb tool using method and device and electronic equipment
KR20180012221A (en) Method for providing an authenticated connection between at least two communication partners
CN112906416A (en) Safe communication module and safe communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant