CN107819673A - It is a kind of based on the intelligent home furnishing control method to communicate in time - Google Patents
It is a kind of based on the intelligent home furnishing control method to communicate in time Download PDFInfo
- Publication number
- CN107819673A CN107819673A CN201711190984.4A CN201711190984A CN107819673A CN 107819673 A CN107819673 A CN 107819673A CN 201711190984 A CN201711190984 A CN 201711190984A CN 107819673 A CN107819673 A CN 107819673A
- Authority
- CN
- China
- Prior art keywords
- data
- mrow
- server
- msub
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention belongs to smart home field, disclose a kind of intelligent home furnishing control method based on instant messaging, keeper is set in client first, the keeper has setting domestic consumer number, sets the right of normal user permission, the domestic consumer can send control instruction in its own right to server, the server can receive the control instruction of keeper and domestic consumer, it is capable of the status information of feedback intelligent household simultaneously, the smart home performs first instruction received and the status information in work is sent to server.The present invention is efficiently integrated the relevant facility of life staying idle at home using the network communications technology, automatic control technology, build the control method of efficient housing facilities and family's schedule affairs, home furnishings intelligent, safe and convenient, comfortable is lifted, and realizes the comprehensive intelligent household network control system of environmental protection and energy saving.
Description
Technical field
The invention belongs to smart home field, more particularly to a kind of intelligent home furnishing control method based on instant messaging.
Background technology
Currently, as mobile internetwork and the rapid development of cloud computing, smart home are quickly popularized.Existing intelligence
Home management system includes intelligent household terminal and server, forwards the control instruction of user whole to smart home by server
The operation at end is managed.Each intelligent household terminal in intelligent household management system is both provided with operating system, wherein,
Operating system manages itself hardware, software and data resource for intelligent household terminal, and controls the program of itself to run.
However, the intelligent household terminal in family is more and more, because smart home can receive the difference of different user
Control instruction, it is possible to cause to repeat, while certain user has the authority for forbidding its smart home used, causes whole
The confusion of individual intelligent home control system.
Instant messaging (Instant messaging, abbreviation IM) have become user communicated by network it is important
Means, and dispose and apply in smart home more and more.
Many households are realized immediately using the mode of the online service center MSN based on Internet at present
The function of communication.This MSN is primarily to realize the instant messaging between household and user, but can not also realize
Flexible, settable instant communication function between household and user.
Such as some households wish externally free and open;Some households are not opened to the outside world, can only be known in person, it is not necessary to quilt
Criminal invades information;As valuable cargo stores household;It could be accessed after some household mandates,
In summary, the problem of prior art is present be:Smart home can receive the different control instructions of different user,
It is likely to cause and repeats, while certain user has the authority for forbidding its smart home used, if invasion, is easily caused
The confusion of whole intelligent home control system;And prior art lacks the control program.
The content of the invention
The problem of existing for prior art, the invention provides a kind of Intelligent housing side based on instant messaging
Method.
The present invention is achieved in that a kind of intelligent home furnishing control method based on instant messaging, described to be based on IMU
The intelligent home furnishing control method of letter, set in client with setting domestic consumer number, the right of setting normal user permission,
Domestic consumer sends control instruction in its own right to server;Server receives client and the control of domestic consumer refers to
Order;The status information of feedback intelligent household simultaneously;Smart home performs the client instructions received and sends work to server
In status information;
Client has the right that positive closing is carrying out domestic consumer's control instruction;
The running status for the smart home that the client and domestic consumer can be inquired about in its own right;
Communication between the client and domestic consumer and smart home uses built-in intelligence gateway;
The built-in intelligence gateway includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption
Network configuration data;
Cipher key store, for storing the private key to match with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module
According to authentication module, for the private key corresponding to obtaining in the cipher key store with the public key, after the private key pair encryption
Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out
Certification, certification is after by operator database shown in Network authentication data and network configuration data deposit;
The authentication module being connected with the operator database, for being reflected using the network in the operator database
Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and
Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module
Explanation module, for explaining the order from the client, and the order after explanation is sent to corresponding server;
The interface communication module being connected with the command interpretation module, for being communicated with the client;
Described client includes:
Preset unit, for preset user account number and user cipher;
Physical control, for providing physical certifying code;
Client transmitting element, for user account number and user cipher to be sent into the server, for physics to be recognized
Card code is sent to certification end;
Client receiving unit, the result for the reception server;
Described server includes:
Certification end;Server receiving unit, the user account number and user cipher sent for receiving the client;
Server controls, for the user account number, and server information to be sent into the certification end, and receive
The authentication information that the certification end is sent;
Server authentication ciphering unit, tested for authentication information, user cipher, user account number, generation described in comprehensive descision
Demonstrate,prove result;
Server transmitting element, for sending the result to the client;
The client receives and stores the information of user's offer and the data of input;
The client matches to the part in the checking information with the data stored;The match is successful
Afterwards, the remainder of the checking information is sent to the server and taken after further verifying by the client
The result for device feedback of being engaged in;
The encryption method of the preset unit includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mapping the z of the r Line independent for F~randomly select1,…,zr∈k[x1,…,x2l], one
Individual point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
The process that centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingThat is two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
There is provided the physical control decryption method of physical certifying code includes:
Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;Comprise the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
Further, the client includes carrying out the intelligent APP of data sharing with server;The data of the intelligent APP
Sharing method includes:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one passes through Streaming Media
Agreement can obtain the address information of the stream medium data;
The address information is sent to server;Wherein, the address information is used to make the server according to described
Stream medium data described in the information acquisition of location.
Further, based on the streaming media service, after the confirmation of the server is received, to the server
Export the stream medium data.
Further, included according to first data for sharing request determination for sharing:
If from it is described share request in get any data file stored in the client memory file letter
Breath, it is determined that any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true
It is set to the first data for sharing.
Further, before the stream medium data is exported to the server, further comprise:
Control information is sent to the server, the control information is used to make the server according to the control information
It is determined that perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file
The address information of the stream medium data can be obtained by stream media protocol by being partially converted to stream medium data and generation one;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
Any data file is converted into stream medium data and generation one can obtain institute by stream media protocol
State the address information of stream medium data;
Obtain the currently processed positional information of any data file and parameter information, and by the positional information and parameter
Information is added in the files in stream media, makes server video text according to the positional information and parameter information continued broadcasting
Part;
Request is shared in the acquisition to be included:
If detecting that user performs the operation information of setting operation, request is shared according to operation information generation;
It is described after the confirmation of the server is received, still further comprise:Terminate any data file
Handling process;
After sharing request described in acquisition, further comprise:
Using the data inputted in real time as the first data, input in real time first is counted based on the calling streaming media service
According to being converted into stream medium data.
Another object of the present invention is to provide a kind of intelligent home control system based on instant messaging.
Advantages of the present invention and good effect are:The intelligent home furnishing control method based on instant messaging utilizes network service
Technology, automatic control technology are efficiently integrated the relevant facility of life staying idle at home, build efficient housing facilities and Family Day
The control method of journey affairs, lifting home furnishings intelligent, safe and convenient, comfortable, and realize the comprehensive intelligent household network of environmental protection and energy saving
Control system.
The present invention can also be realized between household and user except supporting the instant messaging between household and user by setting
Instant communication function, and with good confidentiality and it is safe the characteristics of.
The encipher-decipher method of the present invention, greatly protection can user right, intelligent gateway of the invention is safe.This
Invention APP data sharing ensure that the instant messaging of user and smart home.
Brief description of the drawings
Fig. 1 is in the smart home of instant messaging in the intelligent home furnishing control method provided by the invention based on instant messaging
The schematic diagram of control system.
In figure:1st, client;2nd, domestic consumer;3rd, server;4th, smart home;5th, intelligent APP.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that specific embodiment described herein is not used to limit only to explain the present invention
The fixed present invention.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
Fig. 1, the intelligent home furnishing control method provided by the invention based on instant messaging, passes through the smart home of instant messaging
Control system is controlled, and the right with 2 numbers of setting domestic consumer, setting normal user permission is set in client 1, general
General family sends control instruction in its own right to server;Server 3 receives client and the control of domestic consumer refers to
Order;The status information of feedback intelligent household simultaneously;Smart home 4 performs the client instructions received and sends work to server
In status information;
Client has the right that positive closing is carrying out domestic consumer's control instruction;
The running status for the smart home that the client and domestic consumer can be inquired about in its own right;
Communication between the client and domestic consumer and smart home uses built-in intelligence gateway;
The built-in intelligence gateway includes:
Network data download module, for being downloaded from carrier server by the Network authentication data and net after public key encryption
Network configuration data;
Cipher key store, for storing the private key to match with the public key of the carrier server;
Operator database, for storing Network authentication data and network configuration data;
The network number being connected respectively with the cipher key store, the operator database and the network data download module
According to authentication module, for the private key corresponding to obtaining in the cipher key store with the public key, after the private key pair encryption
Network authentication data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are carried out
Certification, certification is after by operator database shown in Network authentication data and network configuration data deposit;
The authentication module being connected with the operator database, for being reflected using the network in the operator database
Flexible strategy are according to completion authentication request;
The network selection module being connected with the operator database, for by set the Network authentication data and
Network configuration data;
The order being connected respectively with the network data download module, the authentication module and the network selection module
Explanation module, for explaining the order from the client, and the order after explanation is sent to corresponding server;
The interface communication module being connected with the command interpretation module, for being communicated with the client;
Described client includes:
Preset unit, for preset user account number and user cipher;
Physical control, for providing physical certifying code;
Client transmitting element, for user account number and user cipher to be sent into the server, for physics to be recognized
Card code is sent to certification end;
Client receiving unit, the result for the reception server;
Described server includes:
Certification end;Server receiving unit, the user account number and user cipher sent for receiving the client;
Server controls, for the user account number, and server information to be sent into the certification end, and receive
The authentication information that the certification end is sent;
Server authentication ciphering unit, tested for authentication information, user cipher, user account number, generation described in comprehensive descision
Demonstrate,prove result;
Server transmitting element, for sending the result to the client;
The client receives and stores the information of user's offer and the data of input;
The client matches to the part in the checking information with the data stored;The match is successful
Afterwards, the remainder of the checking information is sent to the server and taken after further verifying by the client
The result for device feedback of being engaged in;
The encryption method of the preset unit includes:
Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;
Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], one
Point set P, two reversible affine transformation L1And L2And their inverse composition;
The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '=
(z1′,…,zn′);
The process that centralizing mapping reconfigures comprises the following steps:
First, it is a smaller integer to select r, randomly chooses r Line independent equation
Map Z:k2l→krIt is identified below:
Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),
Secondly, the multinomial that 2l total degree is 2 is randomly selected
MappingIt is identified below:
Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:
Wherein f1 *,…,f2l *∈k[x1,…,x2l],
Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:
The public key generation comprises the following steps:
Choose finite field k, and its addition and multiplication structure;
Choose 2l secondary multinomial groups:
f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];
Described private key generation comprises the following steps:
Choose mappingThat is two random number α1, α2;
Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];
It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:
Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;
Choose two reversible affine transformation L1And L2And theirs is inverse;
Described ciphering process comprises the following steps:
Given message M '=(x1′,…,xn′);
With the public key of selection to being encrypted in plain text, the ciphertext after encryption is:
Z '=(z1′,…,zn'), wherein
There is provided the physical control decryption method of physical certifying code includes:
Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;Comprise the following steps:
Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:
Y '=L2 -1(Z ')=(y1′,…,y2l′);
For the every bit (μ, λ) in point set P, calculate:
Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;
Finally calculate:
M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),
If only unique one group of (m1′,…,m2l'), then M ' just must be corresponding plaintext, if exceeded
One group of (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
The client includes carrying out the intelligent APP 5 of data sharing with server;The data sharing side of the intelligent APP
Method includes:
Request is shared in acquisition;
Share request according to described, call a streaming media service, and determine first data for being used to share;
Based on the streaming media service, first data are converted into stream medium data and generation one passes through Streaming Media
Agreement can obtain the address information of the stream medium data;
The address information is sent to server;Wherein, the address information is used to make the server according to described
Stream medium data described in the information acquisition of location.
Based on the streaming media service, after the confirmation of the server is received, institute is exported to the server
State stream medium data.
Included according to first data for sharing request determination for sharing:
If from it is described share request in get any data file stored in the client memory file letter
Breath, it is determined that any data file is the first data for sharing;
It is if in any data file handling procedure, receiving and sharing request, then currently processed any data file is true
It is set to the first data for sharing.
Before the stream medium data is exported to the server, further comprise:
Control information is sent to the server, the control information is used to make the server according to the control information
It is determined that perform the stream medium data application program;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
The currently processed positional information of any data file is obtained, and will be untreated in any data file
The address information of the stream medium data can be obtained by stream media protocol by being partially converted to stream medium data and generation one;
When in any data file handling procedure, receive it is described share request, according to it is described share ask determination to be used for
The first data shared, and first data are converted into stream medium data and generation one can be obtained by stream media protocol
Obtaining the address information of the stream medium data includes:
Currently processed any data file is defined as the first data for sharing;
Any data file is converted into stream medium data and generation one can obtain institute by stream media protocol
State the address information of stream medium data;
Obtain the currently processed positional information of any data file and parameter information, and by the positional information and parameter
Information is added in the files in stream media, makes server video text according to the positional information and parameter information continued broadcasting
Part;
Request is shared in the acquisition to be included:
If detecting that user performs the operation information of setting operation, request is shared according to operation information generation;
It is described after the confirmation of the server is received, still further comprise:Terminate any data file
Handling process;
After sharing request described in acquisition, further comprise:
Using the data inputted in real time as the first data, input in real time first is counted based on the calling streaming media service
According to being converted into stream medium data.
The intelligent home furnishing control method based on instant messaging is given birth to household using the network communications technology, automatic control technology
Relevant facility living is efficiently integrated, and builds the control method of efficient housing facilities and family's schedule affairs, lifts household
It is intelligent, safe and convenient, comfortable, and realize the comprehensive intelligent household network control system of environmental protection and energy saving.
The present invention can also be realized between household and user except supporting the instant messaging between household and user by setting
Instant communication function, and with good confidentiality and it is safe the characteristics of.
The encipher-decipher method of the present invention, greatly protection can user right, intelligent gateway of the invention is safe.This
Invention APP data sharing ensure that the instant messaging of user and smart home.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.
Claims (6)
- A kind of 1. intelligent home furnishing control method based on instant messaging, it is characterised in that the intelligent family based on instant messaging Control method is occupied, sets in client and exists with setting domestic consumer number, the right of setting normal user permission, domestic consumer In its own right control instruction is sent to server;Server receives client and the control instruction of domestic consumer;It is simultaneously anti- Present the status information of smart home;Smart home, which performs the client instructions received and the state in work is sent to server, to be believed Breath;Client has the right that positive closing is carrying out domestic consumer's control instruction;The running status for the smart home that the client and domestic consumer can be inquired about in its own right;Communication between the client and domestic consumer and smart home uses built-in intelligence gateway;The built-in intelligence gateway includes:Network data download module, matched somebody with somebody for being downloaded from carrier server by the Network authentication data after public key encryption and network Put data;Cipher key store, for storing the private key to match with the public key of the carrier server;Operator database, for storing Network authentication data and network configuration data;The network data being connected respectively with the cipher key store, the operator database and the network data download module is recognized Module is demonstrate,proved, for the private key corresponding to obtaining in the cipher key store with the public key, passes through the network after the private key pair encryption Authorization data and network configuration data are decrypted, and the Network authentication data after decryption and network configuration data are recognized Card, certification is after by operator database shown in Network authentication data and network configuration data deposit;The authentication module being connected with the operator database, for using the network authentication number in the operator database According to completion authentication request;The network selection module being connected with the operator database, for by setting the Network authentication data and network Configuration data;The command interpretation being connected respectively with the network data download module, the authentication module and the network selection module Module, for explaining the order from the client, and the order after explanation is sent to corresponding server;The interface communication module being connected with the command interpretation module, for being communicated with the client;Described client includes:Preset unit, for preset user account number and user cipher;Physical control, for providing physical certifying code;Client transmitting element, for user account number and user cipher to be sent into the server, for by physical certifying code It is sent to certification end;Client receiving unit, the result for the reception server;Described server includes:Certification end;Server receiving unit, the user account number and user cipher sent for receiving the client;Server controls, for the user account number, and server information to be sent into the certification end, and described in reception The authentication information that certification end is sent;Server authentication ciphering unit, for authentication information, user cipher, user account number described in comprehensive descision, generation checking knot Fruit;Server transmitting element, for sending the result to the client;The client receives and stores the information of user's offer and the data of input;The client matches to the part in the checking information with the data stored;After the match is successful, The remainder of the checking information is sent to the server and serviced after further verifying by the client The result of device feedback;The encryption method of the preset unit includes:Public key generates:Public key is by finite field k, and its addition and multiplication structure and n secondary multinomial compositions;Private key generates:Private key is by mappingThe z of the r Line independent randomly selected1,…,zr∈k[x1,…,x2l], a point set P, two reversible affine transformation L1And L2And their inverse composition;The i.e. given plaintext M '=(x of ciphering process1′,…,xn'), it is encrypted with the public key of selection, formation ciphertext Z '= (z1′,…,zn′);The process that centralizing mapping reconfigures comprises the following steps:First, it is a smaller integer to select r, randomly chooses r Line independent equation<mrow> <msub> <mi>z</mi> <mn>1</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&alpha;</mi> <mrow> <mi>j</mi> <mn>1</mn> </mrow> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&beta;</mi> <mn>1</mn> </msub> </mrow><mrow> <msub> <mi>z</mi> <mi>r</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>,</mo> <mo>.</mo> <mo>.</mo> <mo>.</mo> <mo>,</mo> <msub> <mi>x</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>=</mo> <munderover> <mi>&Sigma;</mi> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </munderover> <msub> <mi>&alpha;</mi> <mi>jr</mi> </msub> <msub> <mi>x</mi> <mi>j</mi> </msub> <mo>+</mo> <msub> <mi>&beta;</mi> <mi>r</mi> </msub> </mrow>Map Z:k2l→krIt is identified below:Z(x1,…,x2l)=(z1(x1,…,x2l),…,zr(x1,…,x2l)),Secondly, the multinomial that 2l total degree is 2 is randomly selectedMappingIt is identified below:Then, perturbed hard-chain F is defined*:k2l→k2lForIt is compound with Z:Wherein f1 *,…,f2l *∈k[x1,…,x2l],Finally, F is mapped with internal disturbance*Disturb original centralizing mappingNew public key is mapped as:The public key generation comprises the following steps:Choose finite field k, and its addition and multiplication structure;Choose 2l secondary multinomial groups:f1(x1,…,x2l),…,f2l(x1,…,x2l)∈k[x1,…,x2l];Described private key generation comprises the following steps:Choose mappingThat is two random number α1, α2;Randomly select the z of r Line independent1,…,zr∈k[x1,…,xn];It is all mappings to choose point set a P, PPicture and preimage set, i.e.,:<mrow> <mi>P</mi> <mo>=</mo> <mo>{</mo> <mrow> <mo>(</mo> <mi>&mu;</mi> <mo>,</mo> <mi>&lambda;</mi> <mo>|</mo> <mover> <mi>F</mi> <mo>^</mo> </mover> <mo>(</mo> <mi>&mu;</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>&lambda;</mi> <mo>}</mo> <mo>,</mo> </mrow>Point set P is by 2l quadratic polynomial randomly selectingIt is determined that;Choose two reversible affine transformation L1And L2And theirs is inverse;Described ciphering process comprises the following steps:Given message M '=(x1′,…,xn′);With the public key of selection to being encrypted in plain text, the ciphertext after encryption is:Z '=(z1′,…,zn'), whereinThere is provided the physical control decryption method of physical certifying code includes:Decrypting process is the inverse process of encryption, the private key for decrypting key used to choose;Comprise the following steps:Obtaining ciphertext Z '=(z1′,…,z2l') after, calculate first:Y '=L2 -1(Z ')=(y1′,…,y2l′);For the every bit (μ, λ) in point set P, calculate:<mrow> <mo>(</mo> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mrow> <mo>&prime;</mo> <mo>&prime;</mo> </mrow> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mrow> <mo>&prime;</mo> <mo>&prime;</mo> </mrow> </msup> <mo>)</mo> <mo>=</mo> <msup> <mover> <mi>F</mi> <mo>~</mo> </mover> <mrow> <mo>-</mo> <mn>1</mn> </mrow> </msup> <mo>(</mo> <mo>(</mo> <mrow> <msup> <msub> <mi>y</mi> <mn>1</mn> </msub> <mo>&prime;</mo> </msup> <mo>,</mo> <mo>...</mo> <mo>,</mo> <msup> <msub> <mi>y</mi> <mrow> <mn>2</mn> <mi>l</mi> </mrow> </msub> <mo>&prime;</mo> </msup> </mrow> <mo>)</mo> <mo>+</mo> <mi>&lambda;</mi> <mo>)</mo> <mo>,</mo> </mrow>Then Z (y are verified1″,…,y2l")=μ, if invalid, abandon this class value;Otherwise carry out in next step;Finally calculate:M '=L1 -1(y1″,…,y2l")=(m1′,…,m2l'),If only unique one group of (m1′,…,m2l'), then M ' must be just corresponding plaintext, if obtained more than one group (m1′,…,m2l'), then determine unique plaintext with the mode of Hash functions or increase checking equation.
- 2. the intelligent home furnishing control method based on instant messaging as claimed in claim 1, it is characterised in that the client bag Include the intelligent APP that data sharing is carried out with server;The data sharing method of the intelligent APP includes:Request is shared in acquisition;Share request according to described, call a streaming media service, and determine first data for being used to share;Based on the streaming media service, first data are converted into stream medium data and generation one passes through stream media protocol The address information of the stream medium data can be obtained;The address information is sent to server;Wherein, the address information is used to make the server according to the address be believed Breath obtains the stream medium data.
- 3. the intelligent home furnishing control method based on instant messaging as claimed in claim 2, it is characterised in thatBased on the streaming media service, after the confirmation of the server is received, the stream is exported to the server Media data.
- 4. the intelligent home furnishing control method based on instant messaging as claimed in claim 2, it is characterised in that shared according to described The first data that request determines to be used to share include:If from it is described share the fileinfo of any data file stored in the client memory is got in request, It is the first data for sharing to determine any data file;If in any data file handling procedure, receiving and sharing request, then currently processed any data file is defined as For the first data shared.
- 5. the intelligent home furnishing control method based on instant messaging as claimed in claim 2, it is characterised in that to the service Before device exports the stream medium data, further comprise:Control information is sent to the server, the control information is used to make the server determine according to the control information Perform the stream medium data application program;When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing The first data, and first data are converted into stream medium data and generation one institute can be obtained by stream media protocol Stating the address information of stream medium data includes:Currently processed any data file is defined as the first data for sharing;Obtain the currently processed positional information of any data file, and by untreated part in any data file The address information of the stream medium data can be obtained by stream media protocol by being converted to stream medium data and generation one;When in any data file handling procedure, receive it is described share request, share request according to described and determine for sharing The first data, and first data are converted into stream medium data and generation one institute can be obtained by stream media protocol Stating the address information of stream medium data includes:Currently processed any data file is defined as the first data for sharing;Any data file is converted into stream medium data and generation one can obtain the stream by stream media protocol The address information of media data;Obtain the currently processed positional information of any data file and parameter information, and by the positional information and parameter information It is added in the files in stream media, makes server video file according to the positional information and parameter information continued broadcasting;Request is shared in the acquisition to be included:If detecting that user performs the operation information of setting operation, request is shared according to operation information generation;It is described after the confirmation of the server is received, still further comprise:Terminate the place of any data file Manage flow;After sharing request described in acquisition, further comprise:Using the data inputted in real time as the first data, the first data inputted in real time are turned based on the calling streaming media service Turn to stream medium data.
- A kind of 6. intelligent family based on instant messaging of the intelligent home furnishing control method based on instant messaging as claimed in claim 1 Occupy control system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711190984.4A CN107819673A (en) | 2017-11-24 | 2017-11-24 | It is a kind of based on the intelligent home furnishing control method to communicate in time |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711190984.4A CN107819673A (en) | 2017-11-24 | 2017-11-24 | It is a kind of based on the intelligent home furnishing control method to communicate in time |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107819673A true CN107819673A (en) | 2018-03-20 |
Family
ID=61609950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711190984.4A Pending CN107819673A (en) | 2017-11-24 | 2017-11-24 | It is a kind of based on the intelligent home furnishing control method to communicate in time |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107819673A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109258240A (en) * | 2018-08-15 | 2019-01-25 | 安徽省农业科学院土壤肥料研究所 | A kind of vegetable breeding isolation canopy control system and control method based on Internet of Things |
CN109474977A (en) * | 2018-11-29 | 2019-03-15 | 华普特科技(深圳)股份有限公司 | A kind of monitoring method of equipment, apparatus and system |
CN109529130A (en) * | 2018-08-30 | 2019-03-29 | 吉林大学 | A kind of thoracic surgery nursing drainage device and control method |
CN109617858A (en) * | 2018-11-05 | 2019-04-12 | 视联动力信息技术股份有限公司 | A kind of encryption method and device of Streaming Media link |
CN110225038A (en) * | 2019-06-13 | 2019-09-10 | 江苏亨通工控安全研究院有限公司 | Method, apparatus and system for industrial information safety |
CN110730247A (en) * | 2019-10-23 | 2020-01-24 | 国网重庆市电力公司电力科学研究院 | Communication control system based on power line carrier |
CN111143834A (en) * | 2019-11-12 | 2020-05-12 | 国家电网有限公司 | Power grid intranet safety management and vulnerability automatic verification method and system |
WO2021135593A1 (en) * | 2019-12-31 | 2021-07-08 | 华为技术有限公司 | Device sharing method and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468630A (en) * | 2014-12-31 | 2015-03-25 | 北京海尔广科数字技术有限公司 | Access control method and device of intelligent household electrical appliances |
CN104615004A (en) * | 2014-12-31 | 2015-05-13 | 北京海尔广科数字技术有限公司 | Intelligent household electrical appliance operating authorization control method and device |
WO2017052357A1 (en) * | 2015-09-23 | 2017-03-30 | Linkdood Technologies Sdn Bhd | A type of humanized smart home network gateway and access method |
CN106557034A (en) * | 2015-09-29 | 2017-04-05 | 北京北信源软件股份有限公司 | A kind of intelligent home furnishing control method based on instant messaging |
CN107332895A (en) * | 2017-06-24 | 2017-11-07 | 武汉万千无限科技有限公司 | The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence |
-
2017
- 2017-11-24 CN CN201711190984.4A patent/CN107819673A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468630A (en) * | 2014-12-31 | 2015-03-25 | 北京海尔广科数字技术有限公司 | Access control method and device of intelligent household electrical appliances |
CN104615004A (en) * | 2014-12-31 | 2015-05-13 | 北京海尔广科数字技术有限公司 | Intelligent household electrical appliance operating authorization control method and device |
WO2017052357A1 (en) * | 2015-09-23 | 2017-03-30 | Linkdood Technologies Sdn Bhd | A type of humanized smart home network gateway and access method |
CN106557034A (en) * | 2015-09-29 | 2017-04-05 | 北京北信源软件股份有限公司 | A kind of intelligent home furnishing control method based on instant messaging |
CN107332895A (en) * | 2017-06-24 | 2017-11-07 | 武汉万千无限科技有限公司 | The industrial data collection control system of BOUND communication plug-in unit after a kind of intelligence |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109258240A (en) * | 2018-08-15 | 2019-01-25 | 安徽省农业科学院土壤肥料研究所 | A kind of vegetable breeding isolation canopy control system and control method based on Internet of Things |
CN109529130A (en) * | 2018-08-30 | 2019-03-29 | 吉林大学 | A kind of thoracic surgery nursing drainage device and control method |
CN109617858A (en) * | 2018-11-05 | 2019-04-12 | 视联动力信息技术股份有限公司 | A kind of encryption method and device of Streaming Media link |
CN109474977A (en) * | 2018-11-29 | 2019-03-15 | 华普特科技(深圳)股份有限公司 | A kind of monitoring method of equipment, apparatus and system |
CN110225038A (en) * | 2019-06-13 | 2019-09-10 | 江苏亨通工控安全研究院有限公司 | Method, apparatus and system for industrial information safety |
CN110730247A (en) * | 2019-10-23 | 2020-01-24 | 国网重庆市电力公司电力科学研究院 | Communication control system based on power line carrier |
CN111143834A (en) * | 2019-11-12 | 2020-05-12 | 国家电网有限公司 | Power grid intranet safety management and vulnerability automatic verification method and system |
WO2021135593A1 (en) * | 2019-12-31 | 2021-07-08 | 华为技术有限公司 | Device sharing method and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107819673A (en) | It is a kind of based on the intelligent home furnishing control method to communicate in time | |
US20210089679A1 (en) | Method for handling privacy data | |
CN105959189B (en) | Household appliance and its with the communication system and method for Cloud Server and terminal, terminal | |
CN109246096B (en) | Multifunctional fine-grained access control method suitable for cloud storage | |
CN105376216B (en) | A kind of remote access method, proxy server and client | |
CN106101147B (en) | A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption | |
CN109144961A (en) | Authority sharing method and device | |
CN104396183B (en) | Method and system for firmware or software to be sent to multiple equipment | |
CN109639677A (en) | A kind of cloud storage outsourcing decryption properties base encryption method limiting access times | |
CN103026657B (en) | For anti-manipulation key certificate is provided method and apparatus | |
CN105069876A (en) | Control method and system for intelligent access control | |
CN108632035B (en) | Inadvertent transmission system and method with access control | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
EP3121795A1 (en) | Establishment of a communication connection with a user device over an access control device | |
CN108400871B (en) | In conjunction with the searching ciphertext system and method for identity and the support proxy re-encryption of attribute | |
Schwaiger et al. | Smart card based security for fieldbus systems | |
CN103561044A (en) | Data transmission method and data transmission system | |
CN105871918A (en) | Household appliance, communication system and method between household appliance and cloud server as well as cloud server | |
CN105897784B (en) | Internet-of-things terminal equipment encryption communication method and device | |
CN107769912A (en) | A kind of quantum key chip and the encipher-decipher method based on quantum key chip | |
CN109286491A (en) | A kind of key policy attribute base encryption method based on proxy revocation | |
CN106603508A (en) | Wireless encryption communication method, intelligent household electrical appliance, server, and terminal | |
CN105450750A (en) | Secure interaction method for intelligent terminal | |
CN105847005A (en) | Encryption device and method | |
CN105634884B (en) | A kind of control instruction wiring method, intelligent home furnishing control method and relevant apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180320 |