CN104038484B - A kind of anti-identity attack method and system in intelligent domestic system - Google Patents

A kind of anti-identity attack method and system in intelligent domestic system Download PDF

Info

Publication number
CN104038484B
CN104038484B CN201410240358.1A CN201410240358A CN104038484B CN 104038484 B CN104038484 B CN 104038484B CN 201410240358 A CN201410240358 A CN 201410240358A CN 104038484 B CN104038484 B CN 104038484B
Authority
CN
China
Prior art keywords
management system
central control
control management
control command
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410240358.1A
Other languages
Chinese (zh)
Other versions
CN104038484A (en
Inventor
李沁
陈文龙
谭维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Wanghe Intelligent Technology Co Ltd
Original Assignee
Beijing Wang He Time Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wang He Time Technology Co Ltd filed Critical Beijing Wang He Time Technology Co Ltd
Priority to CN201410240358.1A priority Critical patent/CN104038484B/en
Publication of CN104038484A publication Critical patent/CN104038484A/en
Application granted granted Critical
Publication of CN104038484B publication Critical patent/CN104038484B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention discloses the anti-identity attack method and system in a kind of intelligent domestic system, its method comprises the following steps:Interaction controller is to central control management system registry;Interaction controller sends control command to central control management system;Central control management system validating identity identifier;Central control management system verifies Dynamic Recognition code;Central control management system is extracted control command and sent.The present invention is producing different Dynamic Recognition codes at different moments by Dynamic Recognition code generator, and the Dynamic Recognition code only has interaction controller and central control management system to possess, and realizes one-time pad, effectively prevent illegal manipulation and identity forgery attack.

Description

A kind of anti-identity attack method and system in intelligent domestic system
Technical field
The present invention relates to the anti-identity attack method and system in a kind of intelligent domestic system, belong to intelligent domestic system Security technology area.
Background technology
At present, the most basic target of smart home be for people provide one it is comfortable, conveniently, safely with efficient life cycle Border.For smart home product, it is most important that using practicality as core, product is based on practicality, ease for use and hommization. Smart home using house as platform, using comprehensive wiring technology, the network communications technology, security precautions technology, automatic control technology, Audio frequency and video technology integrates the relevant facility of life staying idle at home, builds the management system of efficient housing facilities and family's schedule affairs System, lifting house security, convenience, comfortableness, artistry, and realize the living environment of environmental protection and energy saving.Smart home can Allowing user to have more easily, means manage household equipment, such as, by touch-screen, Digiplex, phone, internet or Speech recognition controlled housed device;On the other hand, the various equipment in smart home can communicate each other, it is not necessary to which user refers to Wave also can according to the interactive operation of different state, so as to user bring farthest it is efficient, convenient, comfortable with it is safe.
Cut-off 2013, in global range information technology innovation constantly accelerate, message area new product, new demand servicing are largely gushed It is existing, new consumption demand is constantly excited, turns into the consumption hot spot become increasingly active.China market is in large scale, is in resident and disappears Take upgrading and informationization, industrialization, urbanization, agricultural modernization are accelerated the stage of fusion development, information consumption has good hair Exhibition basis and great potential.The Chinese government was also sent out on the 14th in order to promote information-based, intelligent city to develop in August in 2013 Table surveys the popularization of development broadband, broadband speed-raising, accelerates to promote letter energetically on promoting some opinions that information consumption is expanded domestic demand Breath consumption sustainable growth, this all lays a solid foundation for the development of smart home, Internet of Things industry.
It is using comprehensive wiring technology, the network communications technology that smart home is integrated, security precautions technology, automatically controls skill Art, audio frequency and video technology are by the relevant integration of equipments of life staying idle at home.The technical standard and the difference of agreement used due to smart home, Most of intelligent domestic systems all use comprehensive wiring mode, but minority system may not use comprehensive wiring technology, such as electricity Power carrier wave, no matter any situation, all necessarily there is the corresponding network communications technology to complete required signal transformation task, therefore The network communications technology is one of integrated middle crucial technology of smart home.With the fast development of mobile Internet, smart home Product uses wireless communication technology, such as wifi, zigbee, IrDA infrared technique, 3G/4G technologies, channel radio more and more Letter technology biggest advantage is exactly flexibly convenient, can extend or reequip at any time according to demand.
Security precautions technology is technology essential in intelligent domestic system, in cell and indoor video intercom, family The fields such as monitoring, home security alarm, the cell all-purpose card relevant with family are all widely used.Because smart home highly pastes The various privacy informations of the life of persons of modern times, domestic environment and user's life by network transmission, and be stored in it is local or High in the clouds, user controls also by network and manages household equipment, therefore the secure communication of smart home is most important.It is unsafe Communication system will person under attack interference and fail or even controlled completely by attacker, cause the leakage of smart home data The even collapse of whole system.
The content of the invention
(1) technical problems to be solved
The technical problem to be solved in the present invention is:Ensure between smart home central control management system and interaction controller Communication security, resist the attack of identity-based.
(2) technical scheme
In order to solve the above technical problems, on the one hand, the invention provides the anti-identity attack in a kind of intelligent domestic system Method, comprise the following steps:
Interaction controller is to central control management system registry;
Interaction controller sends control command to central control management system;
Central control management system validating identity identifier;
Central control management system verifies Dynamic Recognition code;
Central control management system is extracted control command and sent.
Wherein more preferably, the interaction controller further comprised to the step of central control management system registry:
Central control management system installs Dynamic Recognition code generator in interaction controller, and in central control management system Blanket insurance deposits two tuples.
Wherein more preferably, the step of interaction controller sends control command to central control management system is further wrapped Include:
Control command is produced in user's operating interactive controller;
The Dynamic Recognition code at interaction controller current time, and form control command point with identity and control command Group;
Interaction controller after control command block encryption to sending to central control management system.
Wherein more preferably, the step of central control management system validating identity identifier further comprises:
The central control management system docking is received after control command is grouped to control command packet deciphering;
Identification in the extraction control command packet of central control management system identifies and in local search;
If the identification mark in being grouped without control command, abandons the packet;
Identification in being grouped if control command identifies, then verifies Dynamic Recognition code.
Wherein more preferably, the step of central control management system checking Dynamic Recognition code further comprises:
Central control management system uses;
The Dynamic Recognition code that central control management system is generated and the Dynamic Recognition code in control command;
Packet is abandoned if inconsistent;
Control command is extracted if consistent and is sent.
Wherein more preferably, the step of central control management system is extracted control command and sent also includes controlling user The step of system order learns and stored.
On the other hand the present invention a kind of intelligent domestic system using the above method is also provided, in including interaction controller, Central control management system and domestic. applications subsystem;
The interaction controller and the domestic. applications subsystem are communicated by network with the central control management system Connection;
The control command that the interaction controller is sent is transmitted through the network to the central control management system, in described Sent after entreating Control management system processing to the domestic. applications subsystem.
Wherein more preferably, the interaction controller can be remote control or the control terminal on IOS/Android.
Wherein more preferably, the domestic. applications subsystem be Household security system, electrical apparatus control system, home theater with it is more One or more in media system, environmental monitoring and control system.
(3) beneficial effect
Anti- identity attack method and system in a kind of intelligent domestic system provided by the invention, are given birth to by Dynamic Recognition code Grow up to be a useful person and producing different Dynamic Recognition codes at different moments, and the Dynamic Recognition code only has interaction controller and central control management System possesses, and realizes one-time pad, effectively prevent illegal manipulation and identity forgery attack.
Brief description of the drawings
Fig. 1 is the system structure diagram of the intelligent domestic system based on wireless network;
Fig. 2:The structural representation of smart home subsystem;
Fig. 3:Anti- identity attack method flow schematic diagram in intelligent domestic system.
Embodiment
With reference to the accompanying drawings and examples, the embodiment of the present invention is described in further detail.Implement below Example is used to illustrate the present invention, but is not limited to the scope of the present invention.
Fig. 1 shows the general structure of the intelligent domestic system based on wireless network, and it includes interaction controller, center The subsystem such as Control management system and Household security system.User is led to by interaction controller and central control management system Letter, interaction controller can be the remote control based on the technology such as IrDA infrared techniques, Bluetooth technology, wifi, zigbee, can also It is the remote control terminal based on 3G/4G networks.The wireless communication technology such as infrared, bluetooth, wifi, zigbee is suitable for household master People communicates with central control management system (these short-range communication technologies are referred to as into " indoor wireless communication technology " below) indoors, The communication being also used between subsystems and central control management system;It is remote out of doors that 3G/4G technologies are suitable for home owner Process control central control management system.The form of interaction controller is varied, can be traditional remote control or The APP run in IOS/Android systems.User sends control command by interaction controller to central management control system, And the latter is then the core of whole intelligent domestic system, it receives the control command of user and is communicated to subsystems, also may be used With Automated condtrol subsystems.Central control management system is also responsible for data storage, and the subsystem in smart home will be each It is sent to from the data message of collection, user can check these data messages or start the self-study of central control management system Function is practised, this functionality can find the favorite family of owner from substantial amounts of data by machine learning and data mining technology Habitat environment and the comfort conditions that subsystems are adjusted to be best suitable for owner.Subsystem in intelligent domestic system includes family Safety-protection system, electrical apparatus control system, home theater and multimedia system, environmental monitoring and control system etc., wherein, household safety-protection System is " smart home " indispensability, and other is all optional.Household security system uses video monitoring, burglar alarm, electric lock The technologies such as gate inhibition, smog alarm ensure the physical security of house system;Environmental monitoring then utilizes sensor technology with control system Indoor environment index is monitored, and is adjusted to the state of most suitable owner lives.
Fig. 2 shows the general structure of smart home subsystem.Smart home subsystem includes communication module, control mould Block and sampling module.Communication module is responsible for the communication between central control management system, the data that it collects sampling module Information is sent to central control management system and receives the control signal of its transmission.Control module is then responsible for processing control signal simultaneously The signal is converted into corresponding action.By taking Illumination Control Subsystem as an example, user is sent by interaction controller " changes light The control signal of color ", the signal send central control management system to by wireless communication technology first, then send illumination to The communication module of control subsystem, finally it is communicated to the control module of Illumination Control Subsystem.Control module identification " changes light The behavior of subsystem is translated into after the control signal of color ":Light color is changed into that user specifies or random Certain color.Sampling module can then collect the corresponding relation of light color and date-time, and by the information transmission in Control management system is entreated to preserve, so, when user does not send control command, Illumination Control Subsystem can be adjusted automatically Whole light color is the period favorite color of user.
As shown in figure 3, the anti-identity attack method in intelligent domestic system provided by the invention, specifically includes following step Suddenly:Interaction controller is to central control management system registry;Interaction controller sends control command to central control management system; Central control management system validating identity identifier;Central control management system verifies Dynamic Recognition code;Central control management system Extraction control command is simultaneously sent.Below to present invention expansion detailed description.
First, the step of interaction controller is to central control management system registry.
For interaction controller to central control management system registry, the interaction controller can be that remote control can also be peace Control terminal on IOS/Android.Each interaction controller has unique identity, and different interactive controllings Utensil has different identity.Interaction controller is being needed in before coming into force (before can be used in sending control command) Centre Control management system is registered and installs corresponding Dynamic Recognition code generator.Mutual controller is to central control management system registry When, central control management system installs Dynamic Recognition code generator in interaction controller, and in central control management system sheet Ground preserves two tuples (identity, Dynamic Recognition code generator).Its Dynamic Recognition code generator is with having the identity Interaction controller on Dynamic Recognition code generator it is the same, it is synchronous at every predetermined time to produce identical Dynamic Recognition code. The identity of each interaction controller is different, and the Dynamic Recognition code generator that they are used is also different.After registration, Interaction controller can uses.
Secondly, the step of interaction controller is to central control management system transmission control command is introduced.
Interaction controller sends control command to central control management system.Interaction controller produces under the operation of user Control command.The order can be that simple coding can also be complicated binary data.The Dynamic Recognition of interaction controller Code generator generates the Dynamic Recognition code at the moment, and it forms control command packet together with identity, control command.Interaction Controller by wireless network after control command block encryption to being sent to central control management system.If control command is grouped Sent in the form of plaintext, then attacker is easy to obtain these packets by eavesdropping shared channel and therefrom identified Related order, further learns the controlling behavior corresponding to order, so being needed before control command packet is sent pair It is encrypted.But the packet after encryption be not it is safe because attacker by send identical 0-1 sequences to Central control management system, it is possible to realize identical controlling behavior.So interaction controller must use Dynamic Recognition code skill Art.Dynamic Recognition code at different moments is different, and the Dynamic Recognition code only has interaction controller and central control management system Possess, therefore same interaction controller is all different in the control command sent at different moments, this is equivalent to realize One-time pad, it effectively prevent illegal manipulation and identity forgery attack.
Again, the step of introducing central control management system validating identity identifier.
Central control management system validating identity identifier.It is first after central control management system receives control command packet First control command packet is decrypted.Central control management system extracts the identity in control command packet and in local Inquiry, if the body in not finding control command packet in all (identity, Dynamic Recognition code generator) records Part mark, then control command packet is abandoned, otherwise central control management system checking Dynamic Recognition code.Central control management system Data are decrypted first after receiving order, then carry out authentication (including identity checking and Dynamic Recognition code Checking), it can be just performed by the control command of authentication.
4th, introduce the step of central control management system verifies Dynamic Recognition code.
Central control management system verifies Dynamic Recognition code.Central control management system uses (identity, Dynamic Recognition Code generator) Dynamic Recognition code generator generates corresponding Dynamic Recognition code in record.Central control management system gives birth to oneself Into Dynamic Recognition code and control command be grouped in Dynamic Recognition code compare, if inconsistent, abandon packet, otherwise center control Management system processed is extracted control command and sent.
Finally, the step of introducing central control management system extraction control command and sending.
Control command in the extraction control command packet of central control management system, and send it to correlation subsystem and hold OK.
In summary, the present invention is producing different Dynamic Recognition codes at different moments by Dynamic Recognition code generator, and The Dynamic Recognition code only has interaction controller and central control management system to possess, and realizes one-time pad, effectively prevent Illegal manipulation and identity forgery attack.
Embodiment of above is merely to illustrate the present invention, and not limitation of the present invention, about the common of technical field Technical staff, without departing from the spirit and scope of the present invention, it can also make a variety of changes and modification, thus it is all Equivalent technical scheme falls within scope of the invention, and scope of patent protection of the invention should be defined by the claims.

Claims (7)

1. a kind of anti-identity attack method in intelligent domestic system, it is characterised in that comprise the following steps:
Interaction controller is to central control management system registry;
Interaction controller sends control command to central control management system;
Central control management system validating identity identifier;
Central control management system verifies Dynamic Recognition code;
Central control management system is extracted control command and sent;
Wherein, central control management system installs Dynamic Recognition code generator, each interactive controlling utensil in interaction controller There is unique Dynamic Recognition code production device, and two tuples are preserved in central control management system;
Wherein, the step of interaction controller sends control command to central control management system further comprises:
User's operating interactive controller produces control command;
The Dynamic Recognition code at interaction controller current time, identity and control command are formed into control command packet;
Interaction controller after control command block encryption to sending to central control management system.
2. anti-identity attack method as claimed in claim 1, it is characterised in that the central control management system verifies identity The step of mark, further comprises:
The central control management system is received after control command is grouped to control command packet deciphering;
Central control management system extracts the identity in control command packet and in local search;
If the identity in being grouped without control command, abandons the packet;
Identity in being grouped if control command, then verify Dynamic Recognition code.
3. anti-identity attack method as claimed in claim 1, it is characterised in that the central control management system checking dynamic The step of identification code, further comprises:
The Dynamic Recognition code that central control management system generates central control management system and the Dynamic Recognition in control command Code compares;
Packet is abandoned if inconsistent;
Control command is extracted if consistent and is sent.
4. anti-identity attack method as claimed in claim 1, it is characterised in that the central control management system extraction control The step of the step of ordering and sending also includes user control command is learnt and stored.
5. a kind of intelligent domestic system using claim 1-4 any one methods describeds, it is characterised in that controlled including interaction Device, central control management system and domestic. applications subsystem processed;
The interaction controller and the domestic. applications subsystem are communicated to connect by network and the central control management system;
The control command that the interaction controller is sent is transmitted through the network to the central control management system, the center control Sent after management system processing processed to the domestic. applications subsystem.
6. intelligent domestic system as claimed in claim 5, it is characterised in that the interaction controller is remote control or is arranged on Control terminal on IOS/Android.
7. intelligent domestic system as claimed in claim 5, it is characterised in that the domestic. applications subsystem is household safety-protection system One or more in system, electrical apparatus control system, home theater and multimedia system, environmental monitoring and control system.
CN201410240358.1A 2014-05-30 2014-05-30 A kind of anti-identity attack method and system in intelligent domestic system Expired - Fee Related CN104038484B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410240358.1A CN104038484B (en) 2014-05-30 2014-05-30 A kind of anti-identity attack method and system in intelligent domestic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410240358.1A CN104038484B (en) 2014-05-30 2014-05-30 A kind of anti-identity attack method and system in intelligent domestic system

Publications (2)

Publication Number Publication Date
CN104038484A CN104038484A (en) 2014-09-10
CN104038484B true CN104038484B (en) 2018-02-23

Family

ID=51469073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410240358.1A Expired - Fee Related CN104038484B (en) 2014-05-30 2014-05-30 A kind of anti-identity attack method and system in intelligent domestic system

Country Status (1)

Country Link
CN (1) CN104038484B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301303B (en) * 2014-09-15 2018-06-22 汕头大学 A kind of smart home Internet of Things safety protecting method and system
US9432380B2 (en) * 2014-09-22 2016-08-30 Empire Technology Development Llc Network control security
CN104618899A (en) * 2015-01-29 2015-05-13 杭州晟元芯片技术有限公司 ZigBee router with built-in safety module
CN105100268B (en) * 2015-08-26 2018-07-06 中国联合网络通信集团有限公司 A kind of method of controlling security of internet of things equipment, system and application server
CN106656946B (en) * 2015-11-03 2020-05-19 东莞酷派软件技术有限公司 Dynamic authentication method and device
CN107465649A (en) * 2016-06-02 2017-12-12 中兴通讯股份有限公司 Control method of electronic device, terminal and control system
CN106789456A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of home equipment control method and device
CN106789378B (en) * 2017-03-29 2018-08-03 宁夏灵智科技有限公司 Information prevents leakage method and system in smart home
CN108954655A (en) * 2018-07-23 2018-12-07 奥克斯空调股份有限公司 A kind of remote air conditioner monitoring control method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063102A (en) * 2010-11-19 2011-05-18 深圳市科陆电子科技股份有限公司 Remote control system and control method for intelligent home
CN102621956A (en) * 2012-03-28 2012-08-01 中山市澳信信息科技有限公司 Intelligent household control system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102142961B (en) * 2010-06-30 2014-10-08 华为技术有限公司 Method, device and system for authenticating gateway, node and server
CN102694645A (en) * 2012-05-23 2012-09-26 南京吉印信息科技有限公司 Method and device for safely controlling geographic spatial data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063102A (en) * 2010-11-19 2011-05-18 深圳市科陆电子科技股份有限公司 Remote control system and control method for intelligent home
CN102621956A (en) * 2012-03-28 2012-08-01 中山市澳信信息科技有限公司 Intelligent household control system

Also Published As

Publication number Publication date
CN104038484A (en) 2014-09-10

Similar Documents

Publication Publication Date Title
CN104038484B (en) A kind of anti-identity attack method and system in intelligent domestic system
CN104217478B (en) Hotel's control of bluetooth access intelligent management
US20200410797A1 (en) Method and system for activating electronic lockers
CN105631987A (en) Bluetooth access control unlocking method, device and system
CN104898507B (en) A kind of blue-tooth intelligence cloud lock system and blue-tooth intelligence lock working method
CN203849784U (en) NFC-based access control system
CN104635539A (en) Intelligent hardware remote voice security control method and system thereof
CN102223370B (en) Comprehensive management system of open type laboratory
CN105049306A (en) Smart home control structure based on instant messaging
CN101702690A (en) Method for carrying out human-computer interaction by embedded equipment through internet instant messaging system
CN104933792B (en) The method that Intelligent mobile equipment controls vehicle vehicle ring mandate
CN105099839B (en) Intelligent socket and method for connecting network and system, radio network gateway and matching method
CN104052817A (en) Intelligent door and intelligent door control method and system
CN104899950B (en) Vehicle mandate based on bluetooth recognition passes in and out method
CN107403496A (en) Recognition of face intelligent lock system and recognition of face control method based on mobile device
CN103631202A (en) Hotel guest room intelligent monitoring system and method based on internet of things
CN106301793A (en) A kind of PLC certification and the method for secure communication
CN102572818A (en) Application key management method and system of MTC group device
CN104992485B (en) Banister based on Internet of Things controls open method
CN106330632A (en) Intelligent home Internet of Things communication device
CN110099374A (en) The network-building method of a kind of electronic equipment
CN102855427B (en) A kind of equipment unlock method, device and subscriber equipment
CN104821055A (en) Intelligent household security and protection system
TWM501462U (en) Visible light identification system
CN208444348U (en) A kind of communications equipment room face recognition door control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190515

Address after: Room 106, Tianzuo Road, Xingcheng City, Mount Camera, Xigang Office, Qixia District, Nanjing, Jiangsu Province

Patentee after: NANJING WANGHE INTELLIGENT TECHNOLOGY CO., LTD.

Address before: 100083 Block B 608, Caizhi International Building, 18 Zhongguancun East Road, Haidian District, Beijing

Patentee before: Beijing Wang He Time Technology Co., Ltd

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180223

Termination date: 20210530

CF01 Termination of patent right due to non-payment of annual fee