CN107819673A - It is a kind of based on the intelligent home furnishing control method to communicate in time - Google Patents

It is a kind of based on the intelligent home furnishing control method to communicate in time Download PDF

Info

Publication number
CN107819673A
CN107819673A CN201711190984.4A CN201711190984A CN107819673A CN 107819673 A CN107819673 A CN 107819673A CN 201711190984 A CN201711190984 A CN 201711190984A CN 107819673 A CN107819673 A CN 107819673A
Authority
CN
China
Prior art keywords
data
mrow
server
msub
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711190984.4A
Other languages
Chinese (zh)
Inventor
朱治广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Province Ishida Furniture Co Ltd
Original Assignee
Anhui Province Ishida Furniture Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Province Ishida Furniture Co Ltd filed Critical Anhui Province Ishida Furniture Co Ltd
Priority to CN201711190984.4A priority Critical patent/CN107819673A/en
Publication of CN107819673A publication Critical patent/CN107819673A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention belongs to smart home field, disclose a kind of intelligent home furnishing control method based on instant messaging, keeper is set in client first, the keeper has setting domestic consumer number, sets the right of normal user permission, the domestic consumer can send control instruction in its own right to server, the server can receive the control instruction of keeper and domestic consumer, it is capable of the status information of feedback intelligent household simultaneously, the smart home performs first instruction received and the status information in work is sent to server.The present invention is efficiently integrated the relevant facility of life staying idle at home using the network communications technology, automatic control technology, build the control method of efficient housing facilities and family's schedule affairs, home furnishings intelligent, safe and convenient, comfortable is lifted, and realizes the comprehensive intelligent household network control system of environmental protection and energy saving.

Description

It is a kind of based on the intelligent home furnishing control method to communicate in time
Technical field
The invention belongs to smart home field, more particularly to a kind of intelligent home furnishing control method based on instant messaging.
Background technology
Currently, as mobile internetwork and the rapid development of cloud computing, smart home are quickly popularized.Existing intelligence Home management system includes intelligent household terminal and server, forwards the control instruction of user whole to smart home by server The operation at end is managed.Each intelligent household terminal in intelligent household management system is both provided with operating system, wherein, Operating system manages itself hardware, software and data resource for intelligent household terminal, and controls the program of itself to run.
However, the intelligent household terminal in family is more and more, because smart home can receive the difference of different user Control instruction, it is possible to cause to repeat, while certain user has the authority for forbidding its smart home used, causes whole The confusion of individual intelligent home control system.
Instant messaging (Instant messaging, abbreviation IM) have become user communicated by network it is important Means, and dispose and apply in smart home more and more.
Many households are realized immediately using the mode of the online service center MSN based on Internet at present The function of communication.This MSN is primarily to realize the instant messaging between household and user, but can not also realize Flexible, settable instant communication function between household and user.
Such as some households wish externally free and open;Some households are not opened to the outside world, can only be known in person, it is not necessary to quilt Criminal invades information;As valuable cargo stores household;It could be accessed after some household mandates,
In summary, the problem of prior art is present be:Smart home can receive the different control instructions of different user, It is likely to cause and repeats, while certain user has the authority for forbidding its smart home used, if invasion, is easily caused The confusion of whole intelligent home control system;And prior art lacks the control program.
The content of the invention
The problem of existing for prior art, the invention provides a kind of Intelligent housing side based on instant messaging Method.
The present invention is achieved in that a kind of intelligent home furnishing control method based on instant messaging, described to be based on IMU The intelligent home furnishing control method of letter, set in client with setting domestic consumer number, the right of setting normal user permission, Domestic consumer sends control instruction in its own right to server;Server receives client and the control of domestic consumer refers to Order;The status information of feedback intelligent household simultaneously;Smart home performs the client instructions received and sends work to server In status information;
Client has the right that positive closing is carrying out domestic consumer's control instruction;
The running status for the smart home that the client and domestic consumer can be inquired about in its own right;
Communication between the client and domestic consumer and smart home uses built-in intelligence gateway;
The built-in intelligence gateway includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption Network configuration data;
Cipher key store, for storing the private key to match with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module According to authentication module, for the private key corresponding to obtaining in the cipher key store with the public key, after the private key pair encryption Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out Certification, certification is after by operator database shown in Network authentication data and network configuration data deposit;
The authentication module being connected with the operator database, for being reflected using the network in the operator database Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module Explanation module, for explaining the order from the client, and the order after explanation is sent to corresponding server;
The interface communication module being connected with the command interpretation module, for being communicated with the client;
Described client includes:
Preset unit, for preset user account number and user cipher;
Physical control, for providing physical certifying code;
Client transmitting element, for user account number and user cipher to be sent into the server, for physics to be recognized Card code is sent to certification end;
Client receiving unit, the result for the reception server;
Described server includes:
Certification end;Server receiving unit, the user account number and user cipher sent for receiving the client;
Server controls, for the user account number, and server information to be sent into the certification end, and receive The authentication information that the certification end is sent;
Server authentication ciphering unit, tested for authentication information, user cipher, user account number, generation described in comprehensive descision Demonstrate,prove result;
Server transmitting element, for sending the result to the client;
The client receives and stores the information of user's offer and the data of input;
The client matches to the part in the checking information with the data stored;The match is successful Afterwards, the remainder of the checking information is sent to the server and taken after further verifying by the client The result for device feedback of being engaged in;
The encryption method of the preset unit includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
The process that centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingThat is two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
There is provided the physical control decryption method of physical certifying code includes:
Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;Comprise the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
Further, the client includes carrying out the intelligent APP of data sharing with server;The data of the intelligent APP Sharing method includes:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one passes through Streaming Media Agreement can obtain the address information of the stream medium data;
The address information is sent to server;Wherein, the address information is used to make the server according to described Stream medium data described in the information acquisition of location.
Further, based on the streaming media service, after the confirmation of the server is received, to the server Export the stream medium data.
Further, included according to first data for sharing request determination for sharing:
If from it is described share request in get any data file stored in the client memory file letter Breath, it is determined that any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true It is set to the first data for sharing.
Further, before the stream medium data is exported to the server, further comprise:
Control information is sent to the server, the control information is used to make the server according to the control information It is determined that perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file The address information of the stream medium data can be obtained by stream media protocol by being partially converted to stream medium data and generation one;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
Any data file is converted into stream medium data and generation one can obtain institute by stream media protocol State the address information of stream medium data;
Obtain the currently processed positional information of any data file and parameter information, and by the positional information and parameter Information is added in the files in stream media, makes server video text according to the positional information and parameter information continued broadcasting Part;
Request is shared in the acquisition to be included:
If detecting that user performs the operation information of setting operation, request is shared according to operation information generation;
It is described after the confirmation of the server is received, still further comprise:Terminate any data file Handling process;
After sharing request described in acquisition, further comprise:
Using the data inputted in real time as the first data, input in real time first is counted based on the calling streaming media service According to being converted into stream medium data.
Another object of the present invention is to provide a kind of intelligent home control system based on instant messaging.
Advantages of the present invention and good effect are:The intelligent home furnishing control method based on instant messaging utilizes network service Technology, automatic control technology are efficiently integrated the relevant facility of life staying idle at home, build efficient housing facilities and Family Day The control method of journey affairs, lifting home furnishings intelligent, safe and convenient, comfortable, and realize the comprehensive intelligent household network of environmental protection and energy saving Control system.
The present invention can also be realized between household and user except supporting the instant messaging between household and user by setting Instant communication function, and with good confidentiality and it is safe the characteristics of.
The encipher-decipher method of the present invention, greatly protection can user right, intelligent gateway of the invention is safe.This Invention APP data sharing ensure that the instant messaging of user and smart home.
Brief description of the drawings
Fig. 1 is in the smart home of instant messaging in the intelligent home furnishing control method provided by the invention based on instant messaging The schematic diagram of control system.
In figure:1st, client;2nd, domestic consumer;3rd, server;4th, smart home;5th, intelligent APP.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that specific embodiment described herein is not used to limit only to explain the present invention The fixed present invention.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
Fig. 1, the intelligent home furnishing control method provided by the invention based on instant messaging, passes through the smart home of instant messaging Control system is controlled, and the right with 2 numbers of setting domestic consumer, setting normal user permission is set in client 1, general General family sends control instruction in its own right to server;Server 3 receives client and the control of domestic consumer refers to Order;The status information of feedback intelligent household simultaneously;Smart home 4 performs the client instructions received and sends work to server In status information;
Client has the right that positive closing is carrying out domestic consumer's control instruction;
The running status for the smart home that the client and domestic consumer can be inquired about in its own right;
Communication between the client and domestic consumer and smart home uses built-in intelligence gateway;
The built-in intelligence gateway includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption Network configuration data;
Cipher key store, for storing the private key to match with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module According to authentication module, for the private key corresponding to obtaining in the cipher key store with the public key, after the private key pair encryption Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out Certification, certification is after by operator database shown in Network authentication data and network configuration data deposit;
The authentication module being connected with the operator database, for being reflected using the network in the operator database Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module Explanation module, for explaining the order from the client, and the order after explanation is sent to corresponding server;
The interface communication module being connected with the command interpretation module, for being communicated with the client;
Described client includes:
Preset unit, for preset user account number and user cipher;
Physical control, for providing physical certifying code;
Client transmitting element, for user account number and user cipher to be sent into the server, for physics to be recognized Card code is sent to certification end;
Client receiving unit, the result for the reception server;
Described server includes:
Certification end;Server receiving unit, the user account number and user cipher sent for receiving the client;
Server controls, for the user account number, and server information to be sent into the certification end, and receive The authentication information that the certification end is sent;
Server authentication ciphering unit, tested for authentication information, user cipher, user account number, generation described in comprehensive descision Demonstrate,prove result;
Server transmitting element, for sending the result to the client;
The client receives and stores the information of user's offer and the data of input;
The client matches to the part in the checking information with the data stored;The match is successful Afterwards, the remainder of the checking information is sent to the server and taken after further verifying by the client The result for device feedback of being engaged in;
The encryption method of the preset unit includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
The process that centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingThat is two random number α1, α2
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
There is provided the physical control decryption method of physical certifying code includes:
Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;Comprise the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
The client includes carrying out the intelligent APP 5 of data sharing with server;The data sharing side of the intelligent APP Method includes:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one passes through Streaming Media Agreement can obtain the address information of the stream medium data;
The address information is sent to server;Wherein, the address information is used to make the server according to described Stream medium data described in the information acquisition of location.
Based on the streaming media service, after the confirmation of the server is received, institute is exported to the server State stream medium data.
Included according to first data for sharing request determination for sharing:
If from it is described share request in get any data file stored in the client memory file letter Breath, it is determined that any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true It is set to the first data for sharing.
Before the stream medium data is exported to the server, further comprise:
Control information is sent to the server, the control information is used to make the server according to the control information It is determined that perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file The address information of the stream medium data can be obtained by stream media protocol by being partially converted to stream medium data and generation one;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
Any data file is converted into stream medium data and generation one can obtain institute by stream media protocol State the address information of stream medium data;
Obtain the currently processed positional information of any data file and parameter information, and by the positional information and parameter Information is added in the files in stream media, makes server video text according to the positional information and parameter information continued broadcasting Part;
Request is shared in the acquisition to be included:
If detecting that user performs the operation information of setting operation, request is shared according to operation information generation;
It is described after the confirmation of the server is received, still further comprise:Terminate any data file Handling process;
After sharing request described in acquisition, further comprise:
Using the data inputted in real time as the first data, input in real time first is counted based on the calling streaming media service According to being converted into stream medium data.
The intelligent home furnishing control method based on instant messaging is given birth to household using the network communications technology, automatic control technology Relevant facility living is efficiently integrated, and builds the control method of efficient housing facilities and family's schedule affairs, lifts household It is intelligent, safe and convenient, comfortable, and realize the comprehensive intelligent household network control system of environmental protection and energy saving.
The present invention can also be realized between household and user except supporting the instant messaging between household and user by setting Instant communication function, and with good confidentiality and it is safe the characteristics of.
The encipher-decipher method of the present invention, greatly protection can user right, intelligent gateway of the invention is safe.This Invention APP data sharing ensure that the instant messaging of user and smart home.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.

Claims (6)

  1. A kind of 1. intelligent home furnishing control method based on instant messaging, it is characterised in that the intelligent family based on instant messaging Control method is occupied, sets in client and exists with setting domestic consumer number, the right of setting normal user permission, domestic consumer In its own right control instruction is sent to server;Server receives client and the control instruction of domestic consumer;It is simultaneously anti- Present the status information of smart home;Smart home, which performs the client instructions received and the state in work is sent to server, to be believed Breath;
    Client has the right that positive closing is carrying out domestic consumer's control instruction;
    The running status for the smart home that the client and domestic consumer can be inquired about in its own right;
    Communication between the client and domestic consumer and smart home uses built-in intelligence gateway;
    The built-in intelligence gateway includes:
    Network data download module, matched somebody with somebody for being downloaded from carrier server by the Network authentication data after public key encryption and network Put data;
    Cipher key store, for storing the private key to match with the public key of the carrier server;
    Operator database, for storing Network authentication data and network configuration data;
    The network data being connected respectively with the cipher key store, the operator database and the network data download module is recognized Module is demonstrate,proved, for the private key corresponding to obtaining in the cipher key store with the public key, passes through the network after the private key pair encryption Authorization data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are recognized Card, certification is after by operator database shown in Network authentication data and network configuration data deposit;
    The authentication module being connected with the operator database, for using the network authentication number in the operator database According to completion authentication request;
    The network selection module being connected with the operator database, for by setting the Network authentication data and network Configuration data;
    The command interpretation being connected respectively with the network data download module, the authentication module and the network selection module Module, for explaining the order from the client, and the order after explanation is sent to corresponding server;
    The interface communication module being connected with the command interpretation module, for being communicated with the client;
    Described client includes:
    Preset unit, for preset user account number and user cipher;
    Physical control, for providing physical certifying code;
    Client transmitting element, for user account number and user cipher to be sent into the server, for by physical certifying code It is sent to certification end;
    Client receiving unit, the result for the reception server;
    Described server includes:
    Certification end;Server receiving unit, the user account number and user cipher sent for receiving the client;
    Server controls, for the user account number, and server information to be sent into the certification end, and described in reception The authentication information that certification end is sent;
    Server authentication ciphering unit, for authentication information, user cipher, user account number described in comprehensive descision, generation checking knot Fruit;
    Server transmitting element, for sending the result to the client;
    The client receives and stores the information of user's offer and the data of input;
    The client matches to the part in the checking information with the data stored;After the match is successful, The remainder of the checking information is sent to the server and serviced after further verifying by the client The result of device feedback;
    The encryption method of the preset unit includes:
    Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
    Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], a point set P, two reversible affine transformation L1And L2And their inverse composition;
    The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);
    The process that centralizing mapping reconfigures comprises the following steps:
    First, it is a smaller integer to select r, randomly chooses r Line independent equation
    <mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>j</mi> <mn>1</mn> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mn>1</mn> </msub> </mrow>
    <mrow> <msub> <mi>z</mi> <mi>r</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&amp;alpha;</mi> <mi>jr</mi> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&amp;beta;</mi> <mi>r</mi> </msub> </mrow>
    Map Z:k2l→krIt is identified below:
    Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
    Secondly, the multinomial that 2l total degree is 2 is randomly selected
    MappingIt is identified below:
    Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
    Wherein f1 *,…,f2l *∈k[x1,…,x2l],
    Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
    The public key generation comprises the following steps:
    Choose finite field k, and its addition and multiplication structure;
    Choose 2l secondary multinomial groups:
    f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
    Described private key generation comprises the following steps:
    Choose mappingThat is two random number α1, α2
    Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
    It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
    <mrow> <mi>P</mi> <mo>=</mo> <mo>{</mo> <mrow> <mo>(</mo> <mi>&amp;mu;</mi> <mo>,</mo> <mi>&amp;lambda;</mi> <mo>|</mo> <mover> <mi>F</mi> <mo>^</mo> </mover> <mo>(</mo> <mi>&amp;mu;</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>&amp;lambda;</mi> <mo>}</mo> <mo>,</mo> </mrow>
    Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
    Choose two reversible affine transformation L1And L2And theirs is inverse;
    Described ciphering process comprises the following steps:
    Given message M '=(x1′,…,xn′);
    With the public key of selection to being encrypted in plain text, the ciphertext after encryption is:
    Z '=(z1′,…,zn'), wherein
    There is provided the physical control decryption method of physical certifying code includes:
    Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;Comprise the following steps:
    Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
    Y '=L2 -1(Z ')=(y1′,…,y2l′);
    For the every bit (μ, λ) in point set P, calculate:
    <mrow> <mo>(</mo> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mrow> <mo>&amp;prime;</mo> <mo>&amp;prime;</mo> </mrow> </msup> <mo>)</mo> <mo>=</mo> <msup> <mover> <mi>F</mi> <mo>~</mo> </mover> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>(</mo> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&amp;prime;</mo> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>&amp;prime;</mo> </msup> </mrow> <mo>)</mo> <mo>+</mo> <mi>&amp;lambda;</mi> <mo>)</mo> <mo>,</mo> </mrow>
    Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
    Finally calculate:
    M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
    If only unique one group of (m1′,…,m2l'), then M ' must be just corresponding plaintext, if obtained more than one group (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
  2. 2. the intelligent home furnishing control method based on instant messaging as claimed in claim 1, it is characterised in that the client bag Include the intelligent APP that data sharing is carried out with server;The data sharing method of the intelligent APP includes:
    Request is shared in acquisition;
    Share request according to described, call a streaming media service, and determine first data for being used to share;
    Based on the streaming media service, first data are converted into stream medium data and generation one passes through stream media protocol The address information of the stream medium data can be obtained;
    The address information is sent to server;Wherein, the address information is used to make the server according to the address be believed Breath obtains the stream medium data.
  3. 3. the intelligent home furnishing control method based on instant messaging as claimed in claim 2, it is characterised in that
    Based on the streaming media service, after the confirmation of the server is received, the stream is exported to the server Media data.
  4. 4. the intelligent home furnishing control method based on instant messaging as claimed in claim 2, it is characterised in that shared according to described The first data that request determines to be used to share include:
    If from it is described share the fileinfo of any data file stored in the client memory is got in request, It is the first data for sharing to determine any data file;
    If in any data file handling procedure, receiving and sharing request, then currently processed any data file is defined as For the first data shared.
  5. 5. the intelligent home furnishing control method based on instant messaging as claimed in claim 2, it is characterised in that to the service Before device exports the stream medium data, further comprise:
    Control information is sent to the server, the control information is used to make the server determine according to the control information Perform the stream medium data application program;
    When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing The first data, and first data are converted into stream medium data and generation one institute can be obtained by stream media protocol Stating the address information of stream medium data includes:
    Currently processed any data file is defined as the first data for sharing;
    Obtain the currently processed positional information of any data file, and by untreated part in any data file The address information of the stream medium data can be obtained by stream media protocol by being converted to stream medium data and generation one;
    When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing The first data, and first data are converted into stream medium data and generation one institute can be obtained by stream media protocol Stating the address information of stream medium data includes:
    Currently processed any data file is defined as the first data for sharing;
    Any data file is converted into stream medium data and generation one can obtain the stream by stream media protocol The address information of media data;
    Obtain the currently processed positional information of any data file and parameter information, and by the positional information and parameter information It is added in the files in stream media, makes server video file according to the positional information and parameter information continued broadcasting;
    Request is shared in the acquisition to be included:
    If detecting that user performs the operation information of setting operation, request is shared according to operation information generation;
    It is described after the confirmation of the server is received, still further comprise:Terminate the place of any data file Manage flow;
    After sharing request described in acquisition, further comprise:
    Using the data inputted in real time as the first data, the first data inputted in real time are turned based on the calling streaming media service Turn to stream medium data.
  6. A kind of 6. intelligent family based on instant messaging of the intelligent home furnishing control method based on instant messaging as claimed in claim 1 Occupy control system.
CN201711190984.4A 2017-11-24 2017-11-24 It is a kind of based on the intelligent home furnishing control method to communicate in time Pending CN107819673A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711190984.4A CN107819673A (en) 2017-11-24 2017-11-24 It is a kind of based on the intelligent home furnishing control method to communicate in time

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711190984.4A CN107819673A (en) 2017-11-24 2017-11-24 It is a kind of based on the intelligent home furnishing control method to communicate in time

Publications (1)

Publication Number Publication Date
CN107819673A true CN107819673A (en) 2018-03-20

Family

ID=61609950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711190984.4A Pending CN107819673A (en) 2017-11-24 2017-11-24 It is a kind of based on the intelligent home furnishing control method to communicate in time

Country Status (1)

Country Link
CN (1) CN107819673A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109258240A (en) * 2018-08-15 2019-01-25 安徽省农业科学院土壤肥料研究所 A kind of vegetable breeding isolation canopy control system and control method based on Internet of Things
CN109474977A (en) * 2018-11-29 2019-03-15 华普特科技(深圳)股份有限公司 A kind of monitoring method of equipment, apparatus and system
CN109529130A (en) * 2018-08-30 2019-03-29 吉林大学 A kind of thoracic surgery nursing drainage device and control method
CN109617858A (en) * 2018-11-05 2019-04-12 视联动力信息技术股份有限公司 A kind of encryption method and device of Streaming Media link
CN110225038A (en) * 2019-06-13 2019-09-10 江苏亨通工控安全研究院有限公司 Method, apparatus and system for industrial information safety
CN110730247A (en) * 2019-10-23 2020-01-24 国网重庆市电力公司电力科学研究院 Communication control system based on power line carrier
CN111143834A (en) * 2019-11-12 2020-05-12 国家电网有限公司 Power grid intranet safety management and vulnerability automatic verification method and system
WO2021135593A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Device sharing method and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468630A (en) * 2014-12-31 2015-03-25 北京海尔广科数字技术有限公司 Access control method and device of intelligent household electrical appliances
CN104615004A (en) * 2014-12-31 2015-05-13 北京海尔广科数字技术有限公司 Intelligent household electrical appliance operating authorization control method and device
WO2017052357A1 (en) * 2015-09-23 2017-03-30 Linkdood Technologies Sdn Bhd A type of humanized smart home network gateway and access method
CN106557034A (en) * 2015-09-29 2017-04-05 北京北信源软件股份有限公司 A kind of intelligent home furnishing control method based on instant messaging
CN107332895A (en) * 2017-06-24 2017-11-07 武汉万千无限科技有限公司 The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468630A (en) * 2014-12-31 2015-03-25 北京海尔广科数字技术有限公司 Access control method and device of intelligent household electrical appliances
CN104615004A (en) * 2014-12-31 2015-05-13 北京海尔广科数字技术有限公司 Intelligent household electrical appliance operating authorization control method and device
WO2017052357A1 (en) * 2015-09-23 2017-03-30 Linkdood Technologies Sdn Bhd A type of humanized smart home network gateway and access method
CN106557034A (en) * 2015-09-29 2017-04-05 北京北信源软件股份有限公司 A kind of intelligent home furnishing control method based on instant messaging
CN107332895A (en) * 2017-06-24 2017-11-07 武汉万千无限科技有限公司 The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109258240A (en) * 2018-08-15 2019-01-25 安徽省农业科学院土壤肥料研究所 A kind of vegetable breeding isolation canopy control system and control method based on Internet of Things
CN109529130A (en) * 2018-08-30 2019-03-29 吉林大学 A kind of thoracic surgery nursing drainage device and control method
CN109617858A (en) * 2018-11-05 2019-04-12 视联动力信息技术股份有限公司 A kind of encryption method and device of Streaming Media link
CN109474977A (en) * 2018-11-29 2019-03-15 华普特科技(深圳)股份有限公司 A kind of monitoring method of equipment, apparatus and system
CN110225038A (en) * 2019-06-13 2019-09-10 江苏亨通工控安全研究院有限公司 Method, apparatus and system for industrial information safety
CN110730247A (en) * 2019-10-23 2020-01-24 国网重庆市电力公司电力科学研究院 Communication control system based on power line carrier
CN111143834A (en) * 2019-11-12 2020-05-12 国家电网有限公司 Power grid intranet safety management and vulnerability automatic verification method and system
WO2021135593A1 (en) * 2019-12-31 2021-07-08 华为技术有限公司 Device sharing method and electronic device

Similar Documents

Publication Publication Date Title
CN107819673A (en) It is a kind of based on the intelligent home furnishing control method to communicate in time
US20210089679A1 (en) Method for handling privacy data
CN105959189B (en) Household appliance and its with the communication system and method for Cloud Server and terminal, terminal
CN109246096B (en) Multifunctional fine-grained access control method suitable for cloud storage
CN105376216B (en) A kind of remote access method, proxy server and client
CN106101147B (en) A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption
CN109144961A (en) Authority sharing method and device
CN104396183B (en) Method and system for firmware or software to be sent to multiple equipment
CN109639677A (en) A kind of cloud storage outsourcing decryption properties base encryption method limiting access times
CN103026657B (en) For anti-manipulation key certificate is provided method and apparatus
CN105069876A (en) Control method and system for intelligent access control
CN108632035B (en) Inadvertent transmission system and method with access control
CN105516110A (en) Mobile equipment secure data transmission method
EP3121795A1 (en) Establishment of a communication connection with a user device over an access control device
CN108400871B (en) In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute
Schwaiger et al. Smart card based security for fieldbus systems
CN103561044A (en) Data transmission method and data transmission system
CN105871918A (en) Household appliance, communication system and method between household appliance and cloud server as well as cloud server
CN105897784B (en) Internet-of-things terminal equipment encryption communication method and device
CN107769912A (en) A kind of quantum key chip and the encipher-decipher method based on quantum key chip
CN109286491A (en) A kind of key policy attribute base encryption method based on proxy revocation
CN106603508A (en) Wireless encryption communication method, intelligent household electrical appliance, server, and terminal
CN105450750A (en) Secure interaction method for intelligent terminal
CN105847005A (en) Encryption device and method
CN105634884B (en) A kind of control instruction wiring method, intelligent home furnishing control method and relevant apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180320