CN108111303A - A kind of secure connection method of intelligent home gateway - Google Patents
A kind of secure connection method of intelligent home gateway Download PDFInfo
- Publication number
- CN108111303A CN108111303A CN201711439751.3A CN201711439751A CN108111303A CN 108111303 A CN108111303 A CN 108111303A CN 201711439751 A CN201711439751 A CN 201711439751A CN 108111303 A CN108111303 A CN 108111303A
- Authority
- CN
- China
- Prior art keywords
- key
- home gateway
- party server
- date
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/103—Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a kind of secure connection methods of intelligent home gateway, this method uses the identifier and initial key of third-party server home gateway registered in advance, home gateway allows to third-party server certification oneself and accordingly third-party server to know the network address and communication key of oneself based on log-on message, then client is equally based on log-on message to third-party server certification oneself, and the network address and communication key of home gateway are known from third-party server, so as to establish secure connection with home gateway.
Description
【Technical field】
The invention belongs to smart home and computer safety field more particularly to a kind of secure connection sides of smart home
Method.
【Background technology】
In recent years, as people’s lives have been goed deep into the fast development of computer industry, computer technology, have begun
Gradually combine with our living environment, the concept of wired home occur.So-called wired home is exactly to utilize calculating
Various electrical equipments in family are all connected to together, by a central controller by the technologies such as machine, communication, sensor, household electrical appliances
It is controlled, so as to provide an extremely convenient living environment to people.
After wired home is introduced, people remotely can also set the intelligence in family by client (such as smart mobile phone)
It is standby to be controlled, such as before family, first opening air-conditioning in family, etc..In order to realize the purpose, wired home is usual
There is provided one family gateways, Internet exportation of the home gateway as all devices in wired home, and client passes through mutual
Network remote connects the home gateway, so as to control the smart machine in family by the home gateway.
In this case it is necessary to consider the security of home gateway, the internet address of one side home gateway very may be used
Can not be fixed, the internet address of Terminal Server Client is also uncertain.Therefore when client needs long-range connection family
During gateway, how to determine the address of home gateway just into a problem.Likewise, home gateway is for the client that remotely connects
End, it is also desirable to which it is legal client to confirm client.
【The content of the invention】
In order to solve the technical issues of existing, the present invention proposes a kind of secure connection method of intelligent home gateway.
The technical solution adopted by the present invention is as follows:
A kind of secure connection method of intelligent home gateway, comprises the following steps:
(1) user is registered in believable third-party server, and log-on message includes the identifier ID of the home gateway,
And an initial key Key, the log-on message are stored in simultaneously in the third-party server, home gateway and client;
(2) after the home gateway is connected to internet, a communication key K is generated at random, and assembles a ground
Location notification message bag M0The third-party server is sent to, wherein:
M0={ ID, EKey(K, ID, Date) }
EKey() is an asymmetric encryption function being encrypted using key Key, and Date is current date;Also, family
Gateway monitors the network address of itself at any time, once the network address of itself changes, which just re-executes one
All over step (2);
(3) third-party server obtains the network address of the home gateway of connection, and to described address notification message
Wrap M0It is parsed, obtains ID and E thereinKey(K, ID, Date);
(4) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding first
Beginning key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks and decrypts obtained ID and the solution
Whether identical obtained ID is analysed, if it is not the same, then address notification message bag M0It is illegal, directly ignore address notice and disappear
Breath bag M0;If identical, the triple (K, ID, Date) that decryption obtains is obtained;
(5) third-party server judges whether the triple that decryption obtains has existed in the database, if deposited
Then ignoring address notification message bag M0, if it does not exist, then the triple is stored in the database, preserve simultaneously
The network address of the home gateway;
(6) when client needs to obtain the network address of home gateway, an address query message package M is assembled1,
I.e.:
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, Date1It is current date;
(7) described address is inquired message package M by the client1It is sent to the third-party server, the third party
Server is to M1It is parsed, obtains ID and E thereinKey(ID, Salt, Date1);
(8) third-party server is according to parsing M1Obtained ID obtains corresponding log-on message, and obtains corresponding
Initial key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the obtained ID of decryption and
Parse M1Whether obtained ID is identical, if it is not the same, then address query message package M1It is illegal, ignore the address query and disappear
Breath bag M1, end processing;If identical, triple (ID, Salt, Date that decryption obtains are obtained1);
(9) third-party server judges triple (ID, Salt, Date1) whether have existed in the database, such as
Fruit exists, then ignores address query message package M1, end processing;If it does not exist, then by the triple (ID, Salt,
Date1) preserve in the database, continue subsequent step;
(10) third-party server assembles an address response message bag M2The client is returned to, i.e.,:M2=
EKey(IP, ID, K), wherein IP are the network address of the home gateway;
(11) client uses initial key Key to M2It is decrypted, obtains IP, ID and K;
(12) client judge the obtained ID of decryption whether be the home gateway to be connected ID, if it is not,
Then ignore address response message bag M2, if so, it may be considered that IP is the network address of the home gateway of required connection,
Network connection is established with home gateway so as to which client is based on the IP, and is encrypted using communication key K and the home gateway
Communication.
Further, the third-party server is built by the manufacturer of home gateway.
Further, which is connected to internet, and with fixed internet domain name or network
Location, the internet domain name or network address are stored in advance in the home gateway and client.
Further, the identifier ID of the home gateway is a global unique encodings.
Further, the length of the initial key Key is determined according to the demand of follow-up Encryption Algorithm.
What the present invention was realized has the technical effect that:Client is allowd safely to know the network address of home gateway,
And establish secure connection with home gateway.
【Description of the drawings】
Attached drawing described herein be for providing a further understanding of the present invention, forming the part of the application, but
It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is the application scenario diagram of the present invention.
【Specific embodiment】
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and say
It is bright to be only used for explaining the present invention, but it is not intended as inappropriate limitation of the present invention.
Referring to attached drawing 1, it illustrates the wired home that the present invention is applied, include multiple smart machines in the wired home
And one family gateway, it is connected between multiple smart machines and the home gateway by home Intranet, such as WIFI nets
Network etc..The home gateway may be coupled to internet, the Internet exportation as entire wired home.User can use visitor
Family end (such as smart mobile phone) is remotely connected by internet and the home gateway, so as to by home gateway access and
Control each smart machine in family.
The present invention is of interest, is exactly the network address how client remotely determines home gateway on the internet, and
Secure connection is established with the home gateway.Detailed description are as follows:
(1) registered first by user in a believable third-party server, log-on message includes the home gateway
Identifier ID and an initial key Key.The log-on message is respectively stored in the third-party server, home gateway
In client, for subsequently using.
Specifically, can the third-party server be built by the manufacturer of home gateway, third-party server connection
To internet, and with fixed internet domain name or network address, the internet domain name or network address are stored in advance in
In the home gateway and client, so as to which home gateway and client be facilitated to be directly connected to the third-party server.
The identifier ID of the home gateway can be a global unique encodings, for the unique mark home gateway.
The initial key Key is a larger random number, and length is determined according to the demand of follow-up Encryption Algorithm, is, for example, one
The random number of 128.
(2) after the home gateway is connected to internet, a communication key K is generated at random, and assembles a ground
Location notification message bag M0The third-party server is sent to, wherein:
M0={ ID, EKey(K, ID, Date) }
EKey() is an asymmetric encryption function being encrypted using key Key, be may be used herein arbitrary in this field
A kind of well known symmetric encipherment algorithm, such as aes algorithm.Date is current date.
It should be noted that home gateway monitors the network address (such as IP address) of itself at any time, once the net of itself
Network address changes, which just needs to re-execute an above-mentioned steps (2), that is, generates at random again newly
Communication key, and assemble and send new address notification information bag.
(3) third-party server obtains the network address of the home gateway of connection, and to described address notification message
Wrap M0It is parsed, obtains ID and E thereinKey(K, ID, Date).
Since home gateway transmission packet is necessarily required to establish network connection with third-party server, then the third party takes
Business device can directly acquire the network address of home gateway by the network connection.
(4) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding first
Beginning key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks and decrypts obtained ID and the solution
Whether identical obtained ID is analysed, if it is not the same, then address notification message bag M0It is illegal, directly ignore address notice and disappear
Breath bag M0;If identical, the triple (K, ID, Date) that decryption obtains is obtained.
As previously mentioned, log-on message is stored in after user's registration in third-party server, and typically, third party's service
Device can use a customer data base to preserve all log-on messages, then it can pass through the unique identifier in log-on message
ID retrieves corresponding initial key in the database.
(5) third-party server judges whether the triple that decryption obtains has existed in the database, if deposited
Then ignoring address notification message bag M0, if it does not exist, then the triple is stored in the database, preserve simultaneously
The network address of the home gateway.
The communication key K is a random number, all should be each time different, along with ID and the limit on date
System, it is extremely small the probability of identical triple really occur, so if triple has existed in the database, then can recognize
For this address, notification message bag had previously received, and current message package is likely to the Replay Attack of hacker, is
It is illegal.
Above-mentioned steps (2)-(5) are actually home gateway based on log-on message to the third-party server certification mistake of oneself
Journey, third-party server obtain the network address and communication key of home gateway after certification.
(6) when client needs to obtain the network address of home gateway, an address query message package M is assembled1,
I.e.:
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, for playing the role of random disturbances, avoids being played out attacking.Date1It is to work as
The preceding date.
(7) described address is inquired message package M by the client1It is sent to the third-party server, the third party
Server is to M1It is parsed, obtains ID and E thereinKey(ID, Salt, Date1)。
(8) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding first
Beginning key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the ID reconciliation that decryption obtains
Analyse M1Whether obtained ID is identical, if it is not the same, then address query message package M1It is illegal, ignore the address query message
Wrap M1, end is handled, if identical, obtains triple (ID, Salt, Date that decryption obtains1)。
(9) third-party server judges triple (ID, Salt, Date1) whether have existed in the database, such as
Fruit exists, then ignores address query message package M1, end processing;If it does not exist, then by the triple (ID, Salt,
Date1) preserve in the database, continue subsequent step.
Similar with above-mentioned steps (5), step (9) is also for the Replay Attack for preventing hacker.Above-mentioned steps (6)-(9) are real
It is client on border based on log-on message to the third-party server certification process of oneself.
(10) third-party server assembles an address response message bag M2The client is returned to, i.e.,:M2=
EKey(IP, ID, K), wherein IP are the network address of the home gateway.
(11) client uses initial key Key to M2It is decrypted, obtains IP, ID and K.
(12) client judge the obtained ID of decryption whether be the home gateway to be connected ID, if it is not,
Then ignore address response message bag M2, if so, it may be considered that IP is the network address of the home gateway of required connection,
Network connection is established with home gateway so as to which client is based on the IP, and is encrypted using communication key K and the home gateway
Communication.In this way, client just establishes secure connection with home gateway.
After this, client can store IP and K, when needing to connect home gateway every time, all use the IP first
It is attached with K, but when certain once finds that home gateway can not be connected using the IP and K, illustrates the home gateway
Network address may have occurred variation, then client repeats step 6-12, to obtain new IP and K.
The above is only the better embodiment of the present invention, therefore all constructions according to described in present patent application scope,
The equivalent change or modification that feature and principle are done, is included in the range of present patent application.
Claims (5)
1. a kind of secure connection method of intelligent home gateway, which is characterized in that comprise the following steps:
(1) user is registered in believable third-party server, the identifier ID of log-on message including the home gateway and
One initial key Key, the log-on message are stored in simultaneously in the third-party server, home gateway and client;
(2) after the home gateway is connected to internet, a communication key K is generated at random, and is assembled an address and led to
Know message package M0The third-party server is sent to, wherein:
M0={ ID, EKey(K, ID, Date) }
EKey() is an asymmetric encryption function being encrypted using key Key, and Date is current date;Also, home gateway
The network address of itself is monitored at any time, once the network address of itself changes, which just re-executes a step
Suddenly (2);
(3) third-party server obtains the network address of the home gateway of connection, and to described address notification message bag M0Into
Row parsing, obtains ID and E thereinKey(K, ID, Date);
(4) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding initial close
Key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks that the ID that decryption obtains is parsed with described
Whether the ID arrived is identical, if it is not the same, then address notification message bag M0It is illegal, directly ignore the address notification message bag
M0;If identical, the triple (K, ID, Date) that decryption obtains is obtained;
(5) third-party server judges whether the triple that decryption obtains has existed in the database, if it is present
Ignore address notification message bag M0, if it does not exist, then the triple is stored in the database, while preserve the family
The network address of front yard gateway;
(6) when client needs to obtain the network address of home gateway, an address query message package M is assembled1, i.e.,:
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, Date1It is current date;
(7) described address is inquired message package M by the client1It is sent to the third-party server, the third-party server
To M1It is parsed, obtains ID and E thereinKey(ID, Salt, Date1);
(8) third-party server is according to parsing M1Obtained ID obtains corresponding log-on message, and obtains corresponding initial close
Key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the ID and parsing M that decryption obtains1
Whether the ID arrived is identical, if it is not the same, then address query message package M1It is illegal, ignore address query message package M1, knot
Beam processing;If identical, triple (ID, Salt, Date that decryption obtains are obtained1);
(9) third-party server judges triple (ID, Salt, Date1) whether have existed in the database, if deposited
Then ignoring address query message package M1, end processing;If it does not exist, then by the triple (ID, Salt, Date1) protect
It deposits in the database, continues subsequent step;
(10) third-party server assembles an address response message bag M2The client is returned to, i.e.,:M2=EKey
(IP, ID, K), wherein IP are the network address of the home gateway;
(11) client uses initial key Key to M2It is decrypted, obtains IP, ID and K;
(12) client judges whether the ID that decryption obtains is the ID for the home gateway to be connected, if it is not, then neglecting
Slightly address response message bag M2, if so, it may be considered that IP is the network address of the home gateway of required connection, so as to
Client is based on the IP and establishes network connection with home gateway, and is encrypted and communicated with the home gateway using communication key K.
2. according to the method described in claim 1, it is characterized in that, the third-party server by home gateway manufacturer
It builds.
3. according to the method described in claim 1-2 any one, which is characterized in that the third-party server is connected to interconnection
Net, and with fixed internet domain name or network address, the internet domain name or network address are stored in advance in the family
In front yard gateway and client.
4. according to the method described in claim 1-3 any one, which is characterized in that the identifier ID of the home gateway is one
A whole world unique encodings.
5. according to the method described in any of claim 1 to 4, which is characterized in that the length of the initial key Key according to
The demand of follow-up Encryption Algorithm determines.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711439751.3A CN108111303B (en) | 2017-12-27 | 2017-12-27 | Safe connection method of intelligent home gateway |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711439751.3A CN108111303B (en) | 2017-12-27 | 2017-12-27 | Safe connection method of intelligent home gateway |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108111303A true CN108111303A (en) | 2018-06-01 |
CN108111303B CN108111303B (en) | 2021-06-25 |
Family
ID=62211788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711439751.3A Active CN108111303B (en) | 2017-12-27 | 2017-12-27 | Safe connection method of intelligent home gateway |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108111303B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111163035A (en) * | 2018-11-07 | 2020-05-15 | 中国电信股份有限公司 | Method, device and system for managing remote connection of home gateway |
CN113225732A (en) * | 2020-01-21 | 2021-08-06 | 深圳市云海物联科技有限公司 | Data transmission method and device and terminal equipment |
US20210326414A1 (en) * | 2015-12-31 | 2021-10-21 | Liveramp, Inc. | Salting Text in Database Tables, Text Files, and Data Feeds |
CN113872761A (en) * | 2021-11-17 | 2021-12-31 | 湖北工业大学 | Smart home equipment batch authentication method, computing equipment and storable medium |
CN113890778A (en) * | 2021-11-04 | 2022-01-04 | 深圳海智创科技有限公司 | Intelligent home authentication and encryption method and system based on local area network |
CN114710348A (en) * | 2022-03-31 | 2022-07-05 | 湖北工业大学 | Authorization authentication and key agreement method for user to use household intelligent equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280127A1 (en) * | 2004-06-07 | 2006-12-14 | Nippon Telegraph And Telephone Corp | Domestic network setting method, home gateway device, home gateway program, and recording medium |
CN1996972A (en) * | 2006-01-06 | 2007-07-11 | 株式会社日立制作所 | Apparatus for encrypted communication on network |
CN101141422A (en) * | 2007-10-26 | 2008-03-12 | 中国电信股份有限公司 | Method and system to access family gateway and family gateway |
CN101345621A (en) * | 2007-07-09 | 2009-01-14 | 华为技术有限公司 | Authentication device, system and method for family network |
CN103400269A (en) * | 2013-07-24 | 2013-11-20 | 江苏晓山信息产业股份有限公司 | Smart community home gateway-based safety payment method |
CN103731756A (en) * | 2014-01-02 | 2014-04-16 | 中国科学院信息工程研究所 | Smart home remote security access control implementation method based on smart cloud television gateway |
CN103873487A (en) * | 2014-04-04 | 2014-06-18 | 中国科学院信息工程研究所 | Method for achieving home credible networking based on safety pendent of smart home device |
-
2017
- 2017-12-27 CN CN201711439751.3A patent/CN108111303B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280127A1 (en) * | 2004-06-07 | 2006-12-14 | Nippon Telegraph And Telephone Corp | Domestic network setting method, home gateway device, home gateway program, and recording medium |
CN1996972A (en) * | 2006-01-06 | 2007-07-11 | 株式会社日立制作所 | Apparatus for encrypted communication on network |
CN101345621A (en) * | 2007-07-09 | 2009-01-14 | 华为技术有限公司 | Authentication device, system and method for family network |
CN101141422A (en) * | 2007-10-26 | 2008-03-12 | 中国电信股份有限公司 | Method and system to access family gateway and family gateway |
CN103400269A (en) * | 2013-07-24 | 2013-11-20 | 江苏晓山信息产业股份有限公司 | Smart community home gateway-based safety payment method |
CN103731756A (en) * | 2014-01-02 | 2014-04-16 | 中国科学院信息工程研究所 | Smart home remote security access control implementation method based on smart cloud television gateway |
CN103873487A (en) * | 2014-04-04 | 2014-06-18 | 中国科学院信息工程研究所 | Method for achieving home credible networking based on safety pendent of smart home device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210326414A1 (en) * | 2015-12-31 | 2021-10-21 | Liveramp, Inc. | Salting Text in Database Tables, Text Files, and Data Feeds |
US11620365B2 (en) * | 2015-12-31 | 2023-04-04 | Liveramp, Inc. | Salting text in database tables, text files, and data feeds |
CN111163035A (en) * | 2018-11-07 | 2020-05-15 | 中国电信股份有限公司 | Method, device and system for managing remote connection of home gateway |
CN113225732A (en) * | 2020-01-21 | 2021-08-06 | 深圳市云海物联科技有限公司 | Data transmission method and device and terminal equipment |
CN113225732B (en) * | 2020-01-21 | 2023-07-04 | 深圳市云海物联科技有限公司 | Data transmission method and device and terminal equipment |
CN113890778A (en) * | 2021-11-04 | 2022-01-04 | 深圳海智创科技有限公司 | Intelligent home authentication and encryption method and system based on local area network |
CN113890778B (en) * | 2021-11-04 | 2023-08-25 | 深圳海智创科技有限公司 | Intelligent home authentication and encryption method and system based on local area network |
CN113872761A (en) * | 2021-11-17 | 2021-12-31 | 湖北工业大学 | Smart home equipment batch authentication method, computing equipment and storable medium |
CN113872761B (en) * | 2021-11-17 | 2023-07-07 | 湖北工业大学 | Batch authentication method for intelligent household equipment, computing equipment and storable medium |
CN114710348A (en) * | 2022-03-31 | 2022-07-05 | 湖北工业大学 | Authorization authentication and key agreement method for user to use household intelligent equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108111303B (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108111303A (en) | A kind of secure connection method of intelligent home gateway | |
Al‐Turjman et al. | An overview of security and privacy in smart cities' IoT communications | |
CN106101147B (en) | A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption | |
US8639929B2 (en) | Method, device and system for authenticating gateway, node and server | |
CN104980920B (en) | Intelligent terminal establishes the method and device of communication connection | |
CN109314708A (en) | Network accessibility detection control | |
US11616763B2 (en) | Secure anonymous communications methods and apparatus | |
CN105939348A (en) | MAC address authentication method and apparatus | |
CN106537864A (en) | Resource access method and apparatus | |
WO2018177385A1 (en) | Data transmission method, apparatus and device | |
CN103916394A (en) | Data transmission method and system under public wifi environment | |
CN102739684A (en) | Portal authentication method based on virtual IP address, and server thereof | |
CN107104929A (en) | The methods, devices and systems of defending against network attacks | |
CN110392128A (en) | The quasi- zero-address IPv6 method and system for disclosing web services are provided | |
CN108429820A (en) | A kind of communication means of internet of things application layer, system and terminal device | |
CN112073381B (en) | Detection method for connecting internet equipment to access intranet | |
CN105722072A (en) | Business authorization method, device, system and router | |
CN107342964A (en) | A kind of message parsing method and equipment | |
JP2010532126A (en) | Network and method for initializing trust center link key | |
CN106302369A (en) | Long-range Activiation method, device and the remote activation system of a kind of network monitoring device | |
CN108322886A (en) | The method for authenticating and device of terminal positioning data | |
CN109688115B (en) | Data security transmission system | |
CN109587134B (en) | Method, apparatus, device and medium for secure authentication of interface bus | |
CN104396216A (en) | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof | |
EP3213485A1 (en) | Pseudonymous proximity location device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210602 Address after: 100071 room 418, 88 Xisihuan South Road, Fengtai District, Beijing Applicant after: BEIJING HUAN ER KANG TECHNOLOGY DEVELOPMENT Co.,Ltd. Address before: 458030 east house, 6th floor, West unit, building 4, family home of Electric Power Bureau, Jiuzhou Road, Qibin District, Hebi City, Henan Province Applicant before: Zhang Aiguo |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |