CN108111303A - A kind of secure connection method of intelligent home gateway - Google Patents

A kind of secure connection method of intelligent home gateway Download PDF

Info

Publication number
CN108111303A
CN108111303A CN201711439751.3A CN201711439751A CN108111303A CN 108111303 A CN108111303 A CN 108111303A CN 201711439751 A CN201711439751 A CN 201711439751A CN 108111303 A CN108111303 A CN 108111303A
Authority
CN
China
Prior art keywords
key
home gateway
party server
date
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711439751.3A
Other languages
Chinese (zh)
Other versions
CN108111303B (en
Inventor
张爱国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUAN ER KANG TECHNOLOGY DEVELOPMENT Co.,Ltd.
Original Assignee
张爱国
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 张爱国 filed Critical 张爱国
Priority to CN201711439751.3A priority Critical patent/CN108111303B/en
Publication of CN108111303A publication Critical patent/CN108111303A/en
Application granted granted Critical
Publication of CN108111303B publication Critical patent/CN108111303B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a kind of secure connection methods of intelligent home gateway, this method uses the identifier and initial key of third-party server home gateway registered in advance, home gateway allows to third-party server certification oneself and accordingly third-party server to know the network address and communication key of oneself based on log-on message, then client is equally based on log-on message to third-party server certification oneself, and the network address and communication key of home gateway are known from third-party server, so as to establish secure connection with home gateway.

Description

A kind of secure connection method of intelligent home gateway
【Technical field】
The invention belongs to smart home and computer safety field more particularly to a kind of secure connection sides of smart home Method.
【Background technology】
In recent years, as people’s lives have been goed deep into the fast development of computer industry, computer technology, have begun Gradually combine with our living environment, the concept of wired home occur.So-called wired home is exactly to utilize calculating Various electrical equipments in family are all connected to together, by a central controller by the technologies such as machine, communication, sensor, household electrical appliances It is controlled, so as to provide an extremely convenient living environment to people.
After wired home is introduced, people remotely can also set the intelligence in family by client (such as smart mobile phone) It is standby to be controlled, such as before family, first opening air-conditioning in family, etc..In order to realize the purpose, wired home is usual There is provided one family gateways, Internet exportation of the home gateway as all devices in wired home, and client passes through mutual Network remote connects the home gateway, so as to control the smart machine in family by the home gateway.
In this case it is necessary to consider the security of home gateway, the internet address of one side home gateway very may be used Can not be fixed, the internet address of Terminal Server Client is also uncertain.Therefore when client needs long-range connection family During gateway, how to determine the address of home gateway just into a problem.Likewise, home gateway is for the client that remotely connects End, it is also desirable to which it is legal client to confirm client.
【The content of the invention】
In order to solve the technical issues of existing, the present invention proposes a kind of secure connection method of intelligent home gateway.
The technical solution adopted by the present invention is as follows:
A kind of secure connection method of intelligent home gateway, comprises the following steps:
(1) user is registered in believable third-party server, and log-on message includes the identifier ID of the home gateway, And an initial key Key, the log-on message are stored in simultaneously in the third-party server, home gateway and client;
(2) after the home gateway is connected to internet, a communication key K is generated at random, and assembles a ground Location notification message bag M0The third-party server is sent to, wherein:
M0={ ID, EKey(K, ID, Date) }
EKey() is an asymmetric encryption function being encrypted using key Key, and Date is current date;Also, family Gateway monitors the network address of itself at any time, once the network address of itself changes, which just re-executes one All over step (2);
(3) third-party server obtains the network address of the home gateway of connection, and to described address notification message Wrap M0It is parsed, obtains ID and E thereinKey(K, ID, Date);
(4) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding first Beginning key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks and decrypts obtained ID and the solution Whether identical obtained ID is analysed, if it is not the same, then address notification message bag M0It is illegal, directly ignore address notice and disappear Breath bag M0;If identical, the triple (K, ID, Date) that decryption obtains is obtained;
(5) third-party server judges whether the triple that decryption obtains has existed in the database, if deposited Then ignoring address notification message bag M0, if it does not exist, then the triple is stored in the database, preserve simultaneously The network address of the home gateway;
(6) when client needs to obtain the network address of home gateway, an address query message package M is assembled1, I.e.:
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, Date1It is current date;
(7) described address is inquired message package M by the client1It is sent to the third-party server, the third party Server is to M1It is parsed, obtains ID and E thereinKey(ID, Salt, Date1);
(8) third-party server is according to parsing M1Obtained ID obtains corresponding log-on message, and obtains corresponding Initial key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the obtained ID of decryption and Parse M1Whether obtained ID is identical, if it is not the same, then address query message package M1It is illegal, ignore the address query and disappear Breath bag M1, end processing;If identical, triple (ID, Salt, Date that decryption obtains are obtained1);
(9) third-party server judges triple (ID, Salt, Date1) whether have existed in the database, such as Fruit exists, then ignores address query message package M1, end processing;If it does not exist, then by the triple (ID, Salt, Date1) preserve in the database, continue subsequent step;
(10) third-party server assembles an address response message bag M2The client is returned to, i.e.,:M2= EKey(IP, ID, K), wherein IP are the network address of the home gateway;
(11) client uses initial key Key to M2It is decrypted, obtains IP, ID and K;
(12) client judge the obtained ID of decryption whether be the home gateway to be connected ID, if it is not, Then ignore address response message bag M2, if so, it may be considered that IP is the network address of the home gateway of required connection, Network connection is established with home gateway so as to which client is based on the IP, and is encrypted using communication key K and the home gateway Communication.
Further, the third-party server is built by the manufacturer of home gateway.
Further, which is connected to internet, and with fixed internet domain name or network Location, the internet domain name or network address are stored in advance in the home gateway and client.
Further, the identifier ID of the home gateway is a global unique encodings.
Further, the length of the initial key Key is determined according to the demand of follow-up Encryption Algorithm.
What the present invention was realized has the technical effect that:Client is allowd safely to know the network address of home gateway, And establish secure connection with home gateway.
【Description of the drawings】
Attached drawing described herein be for providing a further understanding of the present invention, forming the part of the application, but It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is the application scenario diagram of the present invention.
【Specific embodiment】
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and say It is bright to be only used for explaining the present invention, but it is not intended as inappropriate limitation of the present invention.
Referring to attached drawing 1, it illustrates the wired home that the present invention is applied, include multiple smart machines in the wired home And one family gateway, it is connected between multiple smart machines and the home gateway by home Intranet, such as WIFI nets Network etc..The home gateway may be coupled to internet, the Internet exportation as entire wired home.User can use visitor Family end (such as smart mobile phone) is remotely connected by internet and the home gateway, so as to by home gateway access and Control each smart machine in family.
The present invention is of interest, is exactly the network address how client remotely determines home gateway on the internet, and Secure connection is established with the home gateway.Detailed description are as follows:
(1) registered first by user in a believable third-party server, log-on message includes the home gateway Identifier ID and an initial key Key.The log-on message is respectively stored in the third-party server, home gateway In client, for subsequently using.
Specifically, can the third-party server be built by the manufacturer of home gateway, third-party server connection To internet, and with fixed internet domain name or network address, the internet domain name or network address are stored in advance in In the home gateway and client, so as to which home gateway and client be facilitated to be directly connected to the third-party server.
The identifier ID of the home gateway can be a global unique encodings, for the unique mark home gateway. The initial key Key is a larger random number, and length is determined according to the demand of follow-up Encryption Algorithm, is, for example, one The random number of 128.
(2) after the home gateway is connected to internet, a communication key K is generated at random, and assembles a ground Location notification message bag M0The third-party server is sent to, wherein:
M0={ ID, EKey(K, ID, Date) }
EKey() is an asymmetric encryption function being encrypted using key Key, be may be used herein arbitrary in this field A kind of well known symmetric encipherment algorithm, such as aes algorithm.Date is current date.
It should be noted that home gateway monitors the network address (such as IP address) of itself at any time, once the net of itself Network address changes, which just needs to re-execute an above-mentioned steps (2), that is, generates at random again newly Communication key, and assemble and send new address notification information bag.
(3) third-party server obtains the network address of the home gateway of connection, and to described address notification message Wrap M0It is parsed, obtains ID and E thereinKey(K, ID, Date).
Since home gateway transmission packet is necessarily required to establish network connection with third-party server, then the third party takes Business device can directly acquire the network address of home gateway by the network connection.
(4) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding first Beginning key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks and decrypts obtained ID and the solution Whether identical obtained ID is analysed, if it is not the same, then address notification message bag M0It is illegal, directly ignore address notice and disappear Breath bag M0;If identical, the triple (K, ID, Date) that decryption obtains is obtained.
As previously mentioned, log-on message is stored in after user's registration in third-party server, and typically, third party's service Device can use a customer data base to preserve all log-on messages, then it can pass through the unique identifier in log-on message ID retrieves corresponding initial key in the database.
(5) third-party server judges whether the triple that decryption obtains has existed in the database, if deposited Then ignoring address notification message bag M0, if it does not exist, then the triple is stored in the database, preserve simultaneously The network address of the home gateway.
The communication key K is a random number, all should be each time different, along with ID and the limit on date System, it is extremely small the probability of identical triple really occur, so if triple has existed in the database, then can recognize For this address, notification message bag had previously received, and current message package is likely to the Replay Attack of hacker, is It is illegal.
Above-mentioned steps (2)-(5) are actually home gateway based on log-on message to the third-party server certification mistake of oneself Journey, third-party server obtain the network address and communication key of home gateway after certification.
(6) when client needs to obtain the network address of home gateway, an address query message package M is assembled1, I.e.:
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, for playing the role of random disturbances, avoids being played out attacking.Date1It is to work as The preceding date.
(7) described address is inquired message package M by the client1It is sent to the third-party server, the third party Server is to M1It is parsed, obtains ID and E thereinKey(ID, Salt, Date1)。
(8) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding first Beginning key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the ID reconciliation that decryption obtains Analyse M1Whether obtained ID is identical, if it is not the same, then address query message package M1It is illegal, ignore the address query message Wrap M1, end is handled, if identical, obtains triple (ID, Salt, Date that decryption obtains1)。
(9) third-party server judges triple (ID, Salt, Date1) whether have existed in the database, such as Fruit exists, then ignores address query message package M1, end processing;If it does not exist, then by the triple (ID, Salt, Date1) preserve in the database, continue subsequent step.
Similar with above-mentioned steps (5), step (9) is also for the Replay Attack for preventing hacker.Above-mentioned steps (6)-(9) are real It is client on border based on log-on message to the third-party server certification process of oneself.
(10) third-party server assembles an address response message bag M2The client is returned to, i.e.,:M2= EKey(IP, ID, K), wherein IP are the network address of the home gateway.
(11) client uses initial key Key to M2It is decrypted, obtains IP, ID and K.
(12) client judge the obtained ID of decryption whether be the home gateway to be connected ID, if it is not, Then ignore address response message bag M2, if so, it may be considered that IP is the network address of the home gateway of required connection, Network connection is established with home gateway so as to which client is based on the IP, and is encrypted using communication key K and the home gateway Communication.In this way, client just establishes secure connection with home gateway.
After this, client can store IP and K, when needing to connect home gateway every time, all use the IP first It is attached with K, but when certain once finds that home gateway can not be connected using the IP and K, illustrates the home gateway Network address may have occurred variation, then client repeats step 6-12, to obtain new IP and K.
The above is only the better embodiment of the present invention, therefore all constructions according to described in present patent application scope, The equivalent change or modification that feature and principle are done, is included in the range of present patent application.

Claims (5)

1. a kind of secure connection method of intelligent home gateway, which is characterized in that comprise the following steps:
(1) user is registered in believable third-party server, the identifier ID of log-on message including the home gateway and One initial key Key, the log-on message are stored in simultaneously in the third-party server, home gateway and client;
(2) after the home gateway is connected to internet, a communication key K is generated at random, and is assembled an address and led to Know message package M0The third-party server is sent to, wherein:
M0={ ID, EKey(K, ID, Date) }
EKey() is an asymmetric encryption function being encrypted using key Key, and Date is current date;Also, home gateway The network address of itself is monitored at any time, once the network address of itself changes, which just re-executes a step Suddenly (2);
(3) third-party server obtains the network address of the home gateway of connection, and to described address notification message bag M0Into Row parsing, obtains ID and E thereinKey(K, ID, Date);
(4) ID that the third-party server is obtained according to parsing obtains corresponding log-on message, and obtains corresponding initial close Key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks that the ID that decryption obtains is parsed with described Whether the ID arrived is identical, if it is not the same, then address notification message bag M0It is illegal, directly ignore the address notification message bag M0;If identical, the triple (K, ID, Date) that decryption obtains is obtained;
(5) third-party server judges whether the triple that decryption obtains has existed in the database, if it is present Ignore address notification message bag M0, if it does not exist, then the triple is stored in the database, while preserve the family The network address of front yard gateway;
(6) when client needs to obtain the network address of home gateway, an address query message package M is assembled1, i.e.,:
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, Date1It is current date;
(7) described address is inquired message package M by the client1It is sent to the third-party server, the third-party server To M1It is parsed, obtains ID and E thereinKey(ID, Salt, Date1);
(8) third-party server is according to parsing M1Obtained ID obtains corresponding log-on message, and obtains corresponding initial close Key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the ID and parsing M that decryption obtains1 Whether the ID arrived is identical, if it is not the same, then address query message package M1It is illegal, ignore address query message package M1, knot Beam processing;If identical, triple (ID, Salt, Date that decryption obtains are obtained1);
(9) third-party server judges triple (ID, Salt, Date1) whether have existed in the database, if deposited Then ignoring address query message package M1, end processing;If it does not exist, then by the triple (ID, Salt, Date1) protect It deposits in the database, continues subsequent step;
(10) third-party server assembles an address response message bag M2The client is returned to, i.e.,:M2=EKey (IP, ID, K), wherein IP are the network address of the home gateway;
(11) client uses initial key Key to M2It is decrypted, obtains IP, ID and K;
(12) client judges whether the ID that decryption obtains is the ID for the home gateway to be connected, if it is not, then neglecting Slightly address response message bag M2, if so, it may be considered that IP is the network address of the home gateway of required connection, so as to Client is based on the IP and establishes network connection with home gateway, and is encrypted and communicated with the home gateway using communication key K.
2. according to the method described in claim 1, it is characterized in that, the third-party server by home gateway manufacturer It builds.
3. according to the method described in claim 1-2 any one, which is characterized in that the third-party server is connected to interconnection Net, and with fixed internet domain name or network address, the internet domain name or network address are stored in advance in the family In front yard gateway and client.
4. according to the method described in claim 1-3 any one, which is characterized in that the identifier ID of the home gateway is one A whole world unique encodings.
5. according to the method described in any of claim 1 to 4, which is characterized in that the length of the initial key Key according to The demand of follow-up Encryption Algorithm determines.
CN201711439751.3A 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway Active CN108111303B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711439751.3A CN108111303B (en) 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711439751.3A CN108111303B (en) 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway

Publications (2)

Publication Number Publication Date
CN108111303A true CN108111303A (en) 2018-06-01
CN108111303B CN108111303B (en) 2021-06-25

Family

ID=62211788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711439751.3A Active CN108111303B (en) 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway

Country Status (1)

Country Link
CN (1) CN108111303B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111163035A (en) * 2018-11-07 2020-05-15 中国电信股份有限公司 Method, device and system for managing remote connection of home gateway
CN113225732A (en) * 2020-01-21 2021-08-06 深圳市云海物联科技有限公司 Data transmission method and device and terminal equipment
US20210326414A1 (en) * 2015-12-31 2021-10-21 Liveramp, Inc. Salting Text in Database Tables, Text Files, and Data Feeds
CN113872761A (en) * 2021-11-17 2021-12-31 湖北工业大学 Smart home equipment batch authentication method, computing equipment and storable medium
CN113890778A (en) * 2021-11-04 2022-01-04 深圳海智创科技有限公司 Intelligent home authentication and encryption method and system based on local area network
CN114710348A (en) * 2022-03-31 2022-07-05 湖北工业大学 Authorization authentication and key agreement method for user to use household intelligent equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060280127A1 (en) * 2004-06-07 2006-12-14 Nippon Telegraph And Telephone Corp Domestic network setting method, home gateway device, home gateway program, and recording medium
CN1996972A (en) * 2006-01-06 2007-07-11 株式会社日立制作所 Apparatus for encrypted communication on network
CN101141422A (en) * 2007-10-26 2008-03-12 中国电信股份有限公司 Method and system to access family gateway and family gateway
CN101345621A (en) * 2007-07-09 2009-01-14 华为技术有限公司 Authentication device, system and method for family network
CN103400269A (en) * 2013-07-24 2013-11-20 江苏晓山信息产业股份有限公司 Smart community home gateway-based safety payment method
CN103731756A (en) * 2014-01-02 2014-04-16 中国科学院信息工程研究所 Smart home remote security access control implementation method based on smart cloud television gateway
CN103873487A (en) * 2014-04-04 2014-06-18 中国科学院信息工程研究所 Method for achieving home credible networking based on safety pendent of smart home device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060280127A1 (en) * 2004-06-07 2006-12-14 Nippon Telegraph And Telephone Corp Domestic network setting method, home gateway device, home gateway program, and recording medium
CN1996972A (en) * 2006-01-06 2007-07-11 株式会社日立制作所 Apparatus for encrypted communication on network
CN101345621A (en) * 2007-07-09 2009-01-14 华为技术有限公司 Authentication device, system and method for family network
CN101141422A (en) * 2007-10-26 2008-03-12 中国电信股份有限公司 Method and system to access family gateway and family gateway
CN103400269A (en) * 2013-07-24 2013-11-20 江苏晓山信息产业股份有限公司 Smart community home gateway-based safety payment method
CN103731756A (en) * 2014-01-02 2014-04-16 中国科学院信息工程研究所 Smart home remote security access control implementation method based on smart cloud television gateway
CN103873487A (en) * 2014-04-04 2014-06-18 中国科学院信息工程研究所 Method for achieving home credible networking based on safety pendent of smart home device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210326414A1 (en) * 2015-12-31 2021-10-21 Liveramp, Inc. Salting Text in Database Tables, Text Files, and Data Feeds
US11620365B2 (en) * 2015-12-31 2023-04-04 Liveramp, Inc. Salting text in database tables, text files, and data feeds
CN111163035A (en) * 2018-11-07 2020-05-15 中国电信股份有限公司 Method, device and system for managing remote connection of home gateway
CN113225732A (en) * 2020-01-21 2021-08-06 深圳市云海物联科技有限公司 Data transmission method and device and terminal equipment
CN113225732B (en) * 2020-01-21 2023-07-04 深圳市云海物联科技有限公司 Data transmission method and device and terminal equipment
CN113890778A (en) * 2021-11-04 2022-01-04 深圳海智创科技有限公司 Intelligent home authentication and encryption method and system based on local area network
CN113890778B (en) * 2021-11-04 2023-08-25 深圳海智创科技有限公司 Intelligent home authentication and encryption method and system based on local area network
CN113872761A (en) * 2021-11-17 2021-12-31 湖北工业大学 Smart home equipment batch authentication method, computing equipment and storable medium
CN113872761B (en) * 2021-11-17 2023-07-07 湖北工业大学 Batch authentication method for intelligent household equipment, computing equipment and storable medium
CN114710348A (en) * 2022-03-31 2022-07-05 湖北工业大学 Authorization authentication and key agreement method for user to use household intelligent equipment

Also Published As

Publication number Publication date
CN108111303B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
CN108111303A (en) A kind of secure connection method of intelligent home gateway
Al‐Turjman et al. An overview of security and privacy in smart cities' IoT communications
CN106101147B (en) A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption
US8639929B2 (en) Method, device and system for authenticating gateway, node and server
CN104980920B (en) Intelligent terminal establishes the method and device of communication connection
CN109314708A (en) Network accessibility detection control
US11616763B2 (en) Secure anonymous communications methods and apparatus
CN105939348A (en) MAC address authentication method and apparatus
CN106537864A (en) Resource access method and apparatus
WO2018177385A1 (en) Data transmission method, apparatus and device
CN103916394A (en) Data transmission method and system under public wifi environment
CN102739684A (en) Portal authentication method based on virtual IP address, and server thereof
CN107104929A (en) The methods, devices and systems of defending against network attacks
CN110392128A (en) The quasi- zero-address IPv6 method and system for disclosing web services are provided
CN108429820A (en) A kind of communication means of internet of things application layer, system and terminal device
CN112073381B (en) Detection method for connecting internet equipment to access intranet
CN105722072A (en) Business authorization method, device, system and router
CN107342964A (en) A kind of message parsing method and equipment
JP2010532126A (en) Network and method for initializing trust center link key
CN106302369A (en) Long-range Activiation method, device and the remote activation system of a kind of network monitoring device
CN108322886A (en) The method for authenticating and device of terminal positioning data
CN109688115B (en) Data security transmission system
CN109587134B (en) Method, apparatus, device and medium for secure authentication of interface bus
CN104396216A (en) Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof
EP3213485A1 (en) Pseudonymous proximity location device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210602

Address after: 100071 room 418, 88 Xisihuan South Road, Fengtai District, Beijing

Applicant after: BEIJING HUAN ER KANG TECHNOLOGY DEVELOPMENT Co.,Ltd.

Address before: 458030 east house, 6th floor, West unit, building 4, family home of Electric Power Bureau, Jiuzhou Road, Qibin District, Hebi City, Henan Province

Applicant before: Zhang Aiguo

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant