CN106656480B - Key agreement method and device for client of household appliance - Google Patents

Key agreement method and device for client of household appliance Download PDF

Info

Publication number
CN106656480B
CN106656480B CN201610933525.XA CN201610933525A CN106656480B CN 106656480 B CN106656480 B CN 106656480B CN 201610933525 A CN201610933525 A CN 201610933525A CN 106656480 B CN106656480 B CN 106656480B
Authority
CN
China
Prior art keywords
login
client
user account
key agreement
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610933525.XA
Other languages
Chinese (zh)
Other versions
CN106656480A (en
Inventor
吴晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Midea Group Co Ltd
Midea Smart Home Technology Co Ltd
Original Assignee
Midea Group Co Ltd
Midea Smart Home Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Midea Group Co Ltd, Midea Smart Home Technology Co Ltd filed Critical Midea Group Co Ltd
Priority to CN201610933525.XA priority Critical patent/CN106656480B/en
Publication of CN106656480A publication Critical patent/CN106656480A/en
Application granted granted Critical
Publication of CN106656480B publication Critical patent/CN106656480B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The invention discloses a key negotiation method and a device for a client of a household appliance, wherein the method comprises the following steps: detecting the use state of a user account which has logged in the household appliance; judging whether illegal login exists according to the using state of the user account; and if the illegal login exists, carrying out key agreement again with the client bound with the household appliance. According to the method, when the client logs in illegally, the key is renegotiated with the client, so that the safety of the household appliance is protected.

Description

Key agreement method and device for client of household appliance
Technical Field
The present invention relates to the field of home appliances, and in particular, to a key agreement method and device for a client of a home appliance.
Background
At present, with the development of internet technology, smart homes move into the lives of people, wherein the smart homes are used as platforms, facilities related to home life are integrated by utilizing a comprehensive wiring technology, a network communication technology, a safety precaution technology, an automatic control technology and an audio and video technology, an efficient management system of home facilities and home schedule affairs is constructed, the home safety, convenience, comfortableness and artistry can be improved, and the environment-friendly and energy-saving living environment is realized.
However, as the level of intelligence of smart homes is continuously improved, smart homes face security challenges of multiple layers such as network security, privacy security, and the like, for example, a malicious process can control home appliances by intercepting and capturing a secret key of communication between a client and the home appliances, and damage is brought to security of the home appliances.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, a first object of the present invention is to provide a key agreement method for a client of a home appliance, which re-negotiates a key with the client when the client has an illegal login, thereby protecting the security of the home appliance.
A second object of the present invention is to provide a key agreement apparatus for a client of a home appliance.
In order to achieve the above object, an embodiment of a first aspect of the present invention provides a key agreement method for a client of a home appliance, including the following steps: detecting the use state of a user account which has logged in the household appliance;
judging whether illegal login exists according to the using state of the user account;
and if the illegal login exists, carrying out key agreement again with the client bound with the household appliance.
The key agreement device of the client of the household appliance detects the use state of the user account which logs in the household appliance, judges whether illegal login exists according to the use state of the user account, and carries out key agreement with the client bound with the household appliance again if illegal login exists. Therefore, when the client logs in illegally, the key is renegotiated with the client, and the safety of the household appliance is protected.
In addition, the key agreement method for the client of the household appliance in the embodiment of the invention also has the following additional technical characteristics:
in an embodiment of the present invention, the using state is a login address of the user account, and the determining whether there is an illegal login according to the using state of the user account specifically includes:
detecting the current login address of the user account at this time, and acquiring the previous login address;
acquiring the current login time and the previous login time of the current login;
and judging whether illegal login exists according to the current login address, the previous login address, the current login time and the previous login time.
In an embodiment of the present invention, the renegotiating the key agreement with the client bound to the home appliance specifically includes:
disconnecting the current connection with the client;
and carrying out key agreement with the client again.
In an embodiment of the present invention, after the key agreement is performed again with the client bound to the home appliance, the method further includes:
and improving the encryption level or the safety protection level of the encryption with the client.
In an embodiment of the present invention, after the key agreement is performed again with the client bound to the home appliance, the method further includes:
and sending prompt information to the user of the client through a short message.
In order to achieve the above object, a second embodiment of the present invention provides a key agreement apparatus for a client of a home appliance, including: the detection module is used for detecting the use state of a user account of the logged household appliance;
the judging module is used for judging whether illegal login exists according to the using state of the user account;
and the processing module is used for carrying out key negotiation with the client bound with the household appliance again when the illegal login exists.
The key agreement device of the client of the household appliance detects the use state of the user account which logs in the household appliance, judges whether illegal login exists according to the use state of the user account, and carries out key agreement with the client bound with the household appliance again if illegal login exists. Therefore, when the client logs in illegally, the key is renegotiated with the client, and the safety of the household appliance is protected.
In addition, the key agreement device of the client of the household appliance in the embodiment of the present invention further has the following additional technical features:
in an embodiment of the present invention, the usage status is a login address of the user account, and the detection module includes:
the detection unit is used for detecting the current login address of the user account at the current time;
the first acquisition unit is used for acquiring a previous login address; the second acquisition unit is used for acquiring the current login time and the previous login time of the login;
and the judging unit is used for judging whether illegal login exists according to the current login address, the previous login address, the current login time and the previous login time.
In one embodiment of the present invention, the processing module is configured to:
a disconnection unit for disconnecting the current connection with the client;
and the processing unit is used for carrying out key negotiation with the client again.
In one embodiment of the present invention, further comprising:
and the safety processing module is used for improving the encryption level or the safety protection level of the encryption with the client.
In one embodiment of the present invention, further comprising:
and the prompt module is used for sending prompt information to the user of the client through a short message.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which,
FIG. 1 is a schematic diagram of networking in a smart home scenario according to the prior art;
fig. 2 is a flowchart of a key agreement method of a client of a home appliance according to one embodiment of the present invention;
fig. 3 is a flowchart of a client key agreement method of a home appliance according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a key agreement apparatus of a client of a home appliance according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a key agreement apparatus of a client of a home appliance according to another embodiment of the present invention;
fig. 6 is a schematic structural diagram of a key agreement apparatus of a client of a home appliance according to yet another embodiment of the present invention; and
fig. 7 is a schematic structural diagram of a key agreement apparatus of a client of a home appliance according to yet another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
A key agreement method and apparatus of a client of a home appliance according to an embodiment of the present invention will be described with reference to the accompanying drawings.
Generally, as shown in fig. 1, a home appliance may be connected to a smart home cloud platform server through an IP link, a client generally presents a form of a mobile phone application program, and a user may view a current state of the home appliance at the client and control an operation state of the home appliance.
However, the current mainstream security model encrypts the connection link, including the link between the user client and the smart home cloud platform server, and the link between the home appliance and the smart home cloud platform server. Moreover, the encryption key is generally a key generated by dynamic negotiation, for example, the client sends a random number R1 to the smart home cloud platform server, then the smart home cloud platform server replies a random number R2, and then the client uses a concatenation combination of R1 and R2 as the encryption key.
The random numbers R1 and R2 are determined to be unchanged in the connection, so that the encryption key is also unchanged, and if an illegal client acquires key information by other means, the illegal client can access the household appliance illegally.
In order to avoid the above problems, the present invention provides a key agreement method for a client of a home appliance, which specifically comprises the following steps:
fig. 2 is a flowchart of a key agreement method of a client of a home appliance according to one embodiment of the present invention. As shown in fig. 2, the key agreement method of the client of the home appliance includes the following steps:
s101, detecting the use state of the user account of the logged household appliance.
Specifically, the use state of a user account which has logged in the household appliance is detected to know whether an illegal user is connected with the household appliance, wherein the use state of the user account comprises information indicating the use condition of the user account, such as the login address of the user account, the login time of the user account, the login place switching frequency, the login duration and the like.
The user account may include information identifying device uniqueness, such as a user MAC and an SN.
And S102, judging whether illegal login exists according to the using state of the user account.
It should be noted that, according to different application scenarios, the use states of the user accounts include different information, and whether there is an illegal login manner is determined according to the use states of the user accounts, which is described as follows:
in a first example, if the usage status is a login address of a user account, whether an illegal login exists may be determined according to a current login address, a previous login address, a current login time, and a previous login time of the user, that is, whether the user account logs in at two places where the user account cannot reach within a certain time interval may be determined to detect whether the user account logs in illegally.
For example, if the time length from the previous login time to the current login time is 10 minutes, the previous login address is in Beijing and the current login address is in Shanghai, then the existence of illegal login is detected, and if the time length from the previous login time to the current login time is 100 minutes, the previous login address is in Beijing and the current login address is also in Beijing, then the existence of illegal login is detected.
In a second example, if the usage status includes a login address of the user account, whether an illegal login exists may be determined according to a historical login address of the user account, that is, whether the login address of the user account is a common login address may be determined to detect whether the illegal login exists.
For example, if the statistical historical login addresses of the user are Shanghai and Beijing, and the current login address is in the United states, the existence of illegal login is detected, and if the current login address is in Shanghai or Beijing, the existence of illegal login is detected.
And S103, if the illegal login exists, carrying out key agreement again with the client bound with the household appliance.
Specifically, if there is an illegal login, it is indicated that a key for communication between the client and the home appliance may be intercepted by the illegal client, and thus, in order to protect the security of the home appliance, the key agreement is performed again with the client bound to the home appliance, and the previous key is discarded.
It should be noted that, according to different specific application requirements, the manner of re-performing key agreement may be the same as or different from the manner of original key agreement, and the specific manner of performing key agreement may also be selected according to a specific application scenario, for example, as follows:
as an implementation manner, a dynamic negotiation manner may be adopted, in which a client sends a random number a to a relevant server, and the server feeds back a random number B to the server, so that the client concatenates the random number a and the random number B to form an encryption key.
In addition, it should be understood that, according to different application requirements, different from the specific implementation of re-performing key agreement with the client bound to the home appliance, for example, to protect the security of the home appliance, the current connection with the client may be disconnected first, and key agreement with the client may be performed again, or to ensure normal communication between the client and the home appliance, the key agreement with the client may be performed again first, and the negotiated key is used to replace the original key to continue communication.
In summary, the key agreement method for the client of the household appliance according to the embodiment of the present invention detects the use status of the user account that has logged in the household appliance, determines whether there is an illegal login according to the use status of the user account, and performs key agreement again with the client bound to the household appliance if there is an illegal login. Therefore, when the client logs in illegally, the key is renegotiated with the client, and the safety of the household appliance is protected.
In order to more clearly describe how to determine whether an illegal login exists according to the use state of the user account in detail, the following takes the determination manner in the first example described in the above step S102 as an example with reference to fig. 3 to illustrate:
fig. 3 is a flowchart of a client key agreement method of a home appliance according to another embodiment of the present invention, as shown in fig. 3, the method including:
s201, detecting the use state of the user account of the logged household appliance.
The use state of the user account includes a login address and the like.
S202, detecting the current login address of the current user account, and acquiring the previous login address.
For example, the IP address to which the current user account belongs can be obtained, the IP address and the user account are sent to the relevant server, the login address corresponding to the server feedback is obtained, and the previous login address corresponding to the user account is obtained.
S203, obtaining the current login time and the previous login time of the current login.
It can be understood that the time of each login is stored in the related server, and the corresponding relation between the login time and the user account is stored, so that the user account can be uploaded to the related server, and the login time of this time and the previous login time corresponding to the user account fed back by the server are obtained.
And S204, judging whether illegal login exists or not according to the current login address, the previous login address, the current login time and the previous login time.
Specifically, whether the change of the login address is reasonable in the time length ranges of the previous login time and the current login time is judged according to the current login address, the previous login address, the current login time and the previous login time so as to judge whether illegal login exists.
It should be understood that, according to different specific application requirements, whether an illegal login mode exists is determined according to a current login address, a previous login address, a current login time, and a previous login time, which are described as follows:
as an example, the time length between the current login time and the previous login time is calculated, whether the switching from the previous login address to the current login address can be realized within the time length is judged, and whether illegal login exists is known.
In this example, if the time length between the current login time and the previous login time is 100 minutes, switching from the previous login address, xinjiang, to the current login address, guangzhou cannot be realized, and thus it is known that there is an illegal login.
And S205, if the illegal login exists, carrying out key agreement again with the client bound with the household appliance.
Specifically, if the illegal login exists, the client bound with the household appliance performs key agreement again, so that the client intercepting the original key cannot be connected to the household appliance, and the safety of the household appliance is protected.
And S206, improving the encryption level or the safety protection level of encryption with the client.
Specifically, if there is an illegal login, it indicates that the current environment is not safe, such as the network environment, and to further protect the security of the home appliance, the encryption level or security protection level of the client for encryption is increased, such as encrypting the client using a dual encryption algorithm, and increasing the security level of the client to a higher security level mode.
In another embodiment of the present invention, when there is an illegal login, a prompt message may be sent to the user to which the client belongs by means of a short message or the like, for example, a prompt message with a content of "there may be an illegal client maliciously accessing" or the like is sent to the client, so that the user can take corresponding measures at the client, for example, the client controls the household appliance to be turned off to prevent the illegal client from maliciously controlling and the like.
In summary, in the key agreement method for the client of the home appliance according to the embodiment of the present invention, by detecting the current login address of the current user account and obtaining the previous login address, the current login time and the previous login time of the current login are obtained, and whether an illegal login exists is determined according to the current login address, the previous login address, the current login time and the previous login time. So that the key negotiation with the client bound with the household appliance is carried out again when the illegal login exists. Therefore, whether the household appliance is controlled by the illegal client can be accurately known, and the key is renegotiated with the client when the client has illegal login, so that the safety of the household appliance is protected.
In order to implement the foregoing embodiment, the present invention further provides a key agreement device of a client of a home appliance, fig. 4 is a schematic structural diagram of the key agreement device of the client of the home appliance according to an embodiment of the present invention, and as shown in fig. 4, the key agreement device of the client of the home appliance includes a detection module 10, a determination module 20, and a processing module 30.
The detection module 10 is configured to detect a use state of a user account that has logged in the home appliance.
The determining module 20 is configured to determine whether an illegal login exists according to the use state of the user account.
And the processing module 30 is configured to perform key agreement again with the client bound to the home appliance when there is an illegal login.
In an embodiment of the present invention, fig. 5 is a schematic structural diagram of a key agreement device of a client of a home appliance according to another embodiment of the present invention, as shown in fig. 5, and on the basis of fig. 4, a processing module 30 includes: a disconnection unit 31 and a processing unit 32.
Wherein the disconnecting unit 31 is configured to disconnect a current connection with the client.
And the processing unit 32 is configured to perform key agreement again with the client.
It should be noted that the foregoing explanation of the key agreement method for the client of the home appliance is also applicable to the key agreement device for the client of the home appliance in the embodiment of the present invention, and the implementation principle is similar, and is not repeated herein.
In summary, the key agreement device of the client of the home appliance according to the embodiment of the present invention detects the use status of the user account that has logged in the home appliance, determines whether there is an illegal login according to the use status of the user account, and performs key agreement again with the client bound to the home appliance if there is an illegal login. Therefore, when the client logs in illegally, the key is renegotiated with the client, and the safety of the household appliance is protected.
Fig. 6 is a schematic structural diagram of a key agreement device of a client of a home appliance according to another embodiment of the present invention, and as shown in fig. 6, on the basis of fig. 4, a detection module 10 includes: a detection unit 11, a first acquisition unit 12, a second acquisition unit 13, and a determination unit 14.
The detecting unit 11 is configured to detect a current login address of the current user account.
The first obtaining unit 12 is configured to obtain a previous login address.
And the second obtaining unit 13 is configured to obtain a current login time and a previous login time of the login.
And the judging unit 14 is configured to judge whether an illegal login exists according to the current login address, the previous login address, the current login time, and the previous login time.
Further, fig. 7 is a schematic structural diagram of a key agreement device of a client of a home appliance according to another embodiment of the present invention, and as shown in fig. 7, on the basis of fig. 4, the key agreement device of the client of the home appliance further includes a security processing module 40 and a prompting module 50.
The security processing module 40 is configured to increase an encryption level or a security protection level for encrypting with the client.
And the prompt module 50 is used for sending prompt information to the user of the client through a short message.
It should be noted that the foregoing explanation of the key agreement method for the client of the home appliance is also applicable to the key agreement device for the client of the home appliance in the embodiment of the present invention, and the implementation principle is similar, and is not repeated herein.
In summary, in the key agreement device of the client of the home appliance according to the embodiment of the present invention, by detecting the current login address of the current user account and obtaining the previous login address, the current login time and the previous login time of the current login are obtained, and whether an illegal login exists is determined according to the current login address, the previous login address, the current login time and the previous login time. So that the key negotiation with the client bound with the household appliance is carried out again when the illegal login exists. Therefore, whether the household appliance is controlled by the illegal client can be accurately known, and the key is renegotiated with the client when the client has illegal login, so that the safety of the household appliance is protected.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (6)

1. A key agreement method of a client of a household appliance is characterized by comprising the following steps:
detecting the use state of a user account which has logged in the household appliance;
judging whether illegal login exists according to the using state of the user account;
and if the illegal login exists, carrying out key agreement again with the client bound with the household appliance by using a double encryption algorithm, and improving the safety protection level of the client.
2. The key agreement method for the client of the household appliance according to claim 1, wherein the usage status is a login address of the user account, and the determining whether there is an illegal login according to the usage status of the user account specifically comprises:
detecting the current login address of the user account at this time, and acquiring the previous login address;
acquiring the current login time and the previous login time of the current login;
and judging whether illegal login exists according to the current login address, the previous login address, the current login time and the previous login time.
3. The key agreement method of a client of a home appliance according to claim 1, further comprising, after the key agreement is re-performed by the client bound with the home appliance using a double encryption algorithm:
and sending prompt information to the user of the client through a short message.
4. A key agreement apparatus of a client of a home appliance, comprising:
the detection module is used for detecting the use state of a user account of the logged household appliance;
the judging module is used for judging whether illegal login exists according to the using state of the user account;
and the processing module is used for carrying out key negotiation again with the client bound with the household appliance by using a double encryption algorithm when the illegal login exists, and improving the safety protection level of the client.
5. The apparatus of claim 4, wherein the usage status is a login address of the user account, and the detecting module comprises:
the detection unit is used for detecting the current login address of the user account at the current time;
the first acquisition unit is used for acquiring a previous login address;
the second acquisition unit is used for acquiring the current login time and the previous login time of the login;
and the judging unit is used for judging whether illegal login exists according to the current login address, the previous login address, the current login time and the previous login time.
6. The apparatus of claim 4, further comprising:
and the prompt module is used for sending prompt information to the user of the client through a short message.
CN201610933525.XA 2016-10-31 2016-10-31 Key agreement method and device for client of household appliance Active CN106656480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610933525.XA CN106656480B (en) 2016-10-31 2016-10-31 Key agreement method and device for client of household appliance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610933525.XA CN106656480B (en) 2016-10-31 2016-10-31 Key agreement method and device for client of household appliance

Publications (2)

Publication Number Publication Date
CN106656480A CN106656480A (en) 2017-05-10
CN106656480B true CN106656480B (en) 2020-04-03

Family

ID=58821878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610933525.XA Active CN106656480B (en) 2016-10-31 2016-10-31 Key agreement method and device for client of household appliance

Country Status (1)

Country Link
CN (1) CN106656480B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113242212A (en) * 2021-04-15 2021-08-10 杭州链城数字科技有限公司 Network node bidirectional communication authentication method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103023718A (en) * 2012-11-29 2013-04-03 北京奇虎科技有限公司 Device and method for monitoring user login
CN103368916A (en) * 2012-04-01 2013-10-23 百度在线网络技术(北京)有限公司 Technology for generating trusted identity certification of computer terminal based on hardware information
CN104902033A (en) * 2014-03-05 2015-09-09 腾讯科技(深圳)有限公司 Method and device for recording login address
CN105678548A (en) * 2015-12-28 2016-06-15 心动网络股份有限公司 Method for preventing malicious recharging of network game

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101742499B (en) * 2009-12-31 2012-12-26 优视科技有限公司 Account number protection system for mobile communication equipment terminal and application method thereof
CN105959189B (en) * 2016-06-08 2019-09-13 美的集团股份有限公司 Household appliance and its with the communication system and method for Cloud Server and terminal, terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368916A (en) * 2012-04-01 2013-10-23 百度在线网络技术(北京)有限公司 Technology for generating trusted identity certification of computer terminal based on hardware information
CN103023718A (en) * 2012-11-29 2013-04-03 北京奇虎科技有限公司 Device and method for monitoring user login
CN104902033A (en) * 2014-03-05 2015-09-09 腾讯科技(深圳)有限公司 Method and device for recording login address
CN105678548A (en) * 2015-12-28 2016-06-15 心动网络股份有限公司 Method for preventing malicious recharging of network game

Also Published As

Publication number Publication date
CN106656480A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN103067340B (en) The method for authenticating of remote control network information household appliances and system, the Internet home gateway
US10389537B2 (en) System and method for wireless network management
US9596097B2 (en) Apparatus and method for transferring network access information of smart household appliances
CN107770226B (en) Control method and device for smart home, home gateway and mobile terminal
CN106101147A (en) A kind of method and system realizing smart machine and remote terminal dynamic encryption communication
CN105553924B (en) A kind of safety protecting method, smart home and system applied to smart home
WO2012019410A1 (en) Method and apparatus for preventing illegal encroachment in internal network of intelligent home
CN103309307B (en) A kind of intelligent electrical appliance control controlled based on object accesses
CN107094293A (en) A kind of device and method for obtaining WiFi terminal real MAC address
CN105704157A (en) Remote control method and system, intelligent terminal and service terminal application to remote control method and system
CN104753953A (en) Access control system
CN105812140A (en) Authorization access method
CN103874069A (en) MAC authentication device and method of wireless terminal
CN104754571A (en) User authentication realizing method, device and system thereof for multimedia data transmission
CN101984693A (en) Monitoring method and monitoring device for access of terminal to local area network (LAN)
CN106656995B (en) Equipment control method and device
US20130247152A1 (en) Access device, access system and computer program product
CN108111303A (en) A kind of secure connection method of intelligent home gateway
CN101840468A (en) User authentication method and device
WO2018076368A1 (en) Method and system for safely operating device in local area network, and device therefor
CN106656480B (en) Key agreement method and device for client of household appliance
CN107770152A (en) A kind of safety protection method and device, electrical equipment, server and storage medium
CN106302539A (en) A kind of embedded type WEB safety certifying method
CN106936841B (en) Safety protecting method and system in smart home
CN103476025A (en) Progress management method, progress management system and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant