CN108494553A - A kind of intelligent sound box and its encryption communication method - Google Patents

A kind of intelligent sound box and its encryption communication method Download PDF

Info

Publication number
CN108494553A
CN108494553A CN201810416521.3A CN201810416521A CN108494553A CN 108494553 A CN108494553 A CN 108494553A CN 201810416521 A CN201810416521 A CN 201810416521A CN 108494553 A CN108494553 A CN 108494553A
Authority
CN
China
Prior art keywords
private key
key element
sound box
intelligent sound
secret note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810416521.3A
Other languages
Chinese (zh)
Other versions
CN108494553B (en
Inventor
王声平
郑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Infinite Power Development Co., Ltd.
Original Assignee
Shenzhen Water World Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Water World Co Ltd filed Critical Shenzhen Water World Co Ltd
Priority to CN201810416521.3A priority Critical patent/CN108494553B/en
Priority to PCT/CN2018/094129 priority patent/WO2019210571A1/en
Publication of CN108494553A publication Critical patent/CN108494553A/en
Application granted granted Critical
Publication of CN108494553B publication Critical patent/CN108494553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14131D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

The present invention relates to speaker technology field, more particularly to a kind of intelligent sound box and its encryption communication method.The method includes:Scan bar code;According to the bar code generating at private key;User data is encrypted using the private key;Encrypted user data is sent to high in the clouds.Private key is generated by scanning bar code, user data is encrypted using private key later, user data is just finally sent to high in the clouds, the present invention can replace private key at any time, and randomness is high, it is not easy to crack, it is intended to solve the problem of that most of user data of existing intelligent sound box is all not carry out any encryption to be sent to the user data that high in the clouds causes to be easy to be read user by others.

Description

A kind of intelligent sound box and its encryption communication method
Technical field
The present invention relates to speaker technology field, more particularly to a kind of intelligent sound box and its encryption communication method.
Background technology
Intelligent sound box is the product of speaker upgrading, is the tool that family consumer is surfed the Internet with voice, than Such as requesting songs, online shopping, or understanding weather forecast, it can also control smart home device, for example open Curtain, setting refrigerator temperature, allow in advance water heater heating etc..
In existing technology, the function of intelligent sound box is more, but its privacy is poor, the user data of intelligent sound box Most of is all not carry out any encryption to be sent to high in the clouds, is easy to be read the user data of user by others.
Invention content
In view of the shortcomings of the prior art, a kind of intelligent sound box of present invention proposition and its encryption communication method, pass through and scan bar shaped Code generates private key, reuses private key and user data is encrypted, it is intended to which the user data for solving existing intelligent sound box is most Number is all not carry out any encryption to be sent to high in the clouds, the problem of causing to be easy to be read the user data of user by others.
Technical solution proposed by the present invention is:
A kind of intelligent sound box encryption communication method, the method includes:
Scan bar code;
According to the bar code generating at private key;
User data is encrypted using the private key;
Encrypted user data is sent to high in the clouds.
Further, before the step of scanning bar code, the method includes:
Receive the selection instruction of encryption mode;
The selection instruction is executed, into encryption mode, and opens barcode scanning function.
Further, according to the bar code generating at private key the step of, including:
When the bar code is one-dimension code, secret note in the one-dimension code is identified, generate the first private key element;
It identifies informal voucher in the one-dimension code, generates the second private key element;
According in the one-dimension code secret note and informal voucher put in order to the first private key element and second private key Element is arranged.
Further, in the step of secret note in identifying the one-dimension code, the first private key element of generation, including:
The width for identifying each secret note in the one-dimension code generates the of respective numbers according to the of different size of each secret note One private key element.
Further, in the step of informal voucher in identifying the one-dimension code, the second private key element of generation, including:
The width for identifying each informal voucher in the one-dimension code generates the of respective numbers according to the of different size of each informal voucher Two private key elements.
Further, after according to the bar code generating at private key the step of, the method includes:
The private key is sent to preset mobile terminal.
The present invention also provides a kind of intelligent sound box, the intelligent sound box includes:
Scan module, for scanning bar code;
Private key generation module is used for according to the bar code generating into private key;
Information encrypting module, for user data to be encrypted using the private key;
First sending module, for encrypted user data to be sent to high in the clouds.
Further, the intelligent sound box includes:
Receiving module, the selection instruction for receiving encryption mode;
Execution module into encryption mode, and opens barcode scanning function for executing the selection instruction.
Further, when the bar code is one-dimension code, the private key generation module includes:
First identification module goes out secret note in the one-dimension code for identification;
Second identification module goes out informal voucher in the one-dimension code for identification;
First generation module, for generating the first private key element according to the secret note identified;
Second generation module, for generating the second private key element according to the informal voucher identified;
Arrange module, for according in the one-dimension code secret note and informal voucher put in order to the first private key element and The second private key element is arranged.
Further, the first identification module includes the first sub- identification module, goes out each secret note in the one-dimension code for identification Width;
First generation module includes the first sub- generation module, for according to the of different size of each secret note, generating respective numbers The first private key element.
Further, the second identification module includes the second sub- identification module, goes out each informal voucher in the one-dimension code for identification Width;
Second generation module includes the second sub- generation module, for according to the of different size of each informal voucher, generating respective numbers The second private key element.
According to above-mentioned technical solution, advantageous effect of the present invention:Private key is generated by scanning bar code, uses private key later User data is encrypted, user data is just finally sent to high in the clouds, the present invention can replace private key, and randomness at any time Height is not easy to crack, it is intended to which it is all not carry out any encryption to send to solve most of user data of existing intelligent sound box To high in the clouds, the problem of causing to be easy to be read the user data of user by others.
Description of the drawings
Fig. 1 is to apply a kind of flow chart of intelligent sound box encryption communication method provided in an embodiment of the present invention;
Fig. 2 is to apply a kind of functional block diagram of intelligent sound box provided in an embodiment of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
As shown in Figure 1, the embodiment of the present invention proposes a kind of intelligent sound box encryption communication method, the method includes following steps Suddenly:
Step S101, bar code is scanned.
In the present embodiment, intelligent sound box front end is scanned bar code.
Before step S101, the method includes:
In booting, choose whether to enter encrypting module;
When selection enters encrypting module, scanning is opened.
It when booting, is selected for user, chooses whether to enter encryption mode.When user selects to enter encryption mould When formula, scanning is opened, when user's selection does not enter encryption mode, is not turned on scanning.If in preset time, user without Selection, then give tacit consent into encryption mode.
In some embodiments, before step S101, the method includes:
Receive the selection instruction of encryption mode;
The selection instruction is executed, into encryption mode, and opens barcode scanning function.
The selection instruction of encryption mode is received, the selection instruction is executed later, into encryption mode, and opens barcode scanning Function.
In the present embodiment, bar code is one-dimension code or Quick Response Code.
When bar code is one-dimension code, it is scanned using laser radar inductor or camera.
When bar code is Quick Response Code, it is scanned using camera.
In the present embodiment, one-dimension code or Quick Response Code are generated at random by cell phone application.
After step slol, the method includes:
After scanning bar code, if identifying not bar code, automatic shutdown in preset time.
Step S102, according to bar code generating at private key.
After scanning bar code, bar code is identified, according to bar code generating at private key.
In the present embodiment, in step s 102, including:
When bar code is one-dimension code, secret note in one-dimension code is identified, generate the first private key element;
It identifies informal voucher in one-dimension code, generates the second private key element;
According in one-dimension code secret note and informal voucher put in order and the first private key element and the second private key element arranged.
When bar code is one-dimension code, one-dimension code is made of secret note and informal voucher, identifies that secret note in one-dimension code generates the One private key element identifies that the informal voucher in one-dimension code generates the second private key element, and the first private key element and the second private key element are not Identical, private key is made of the first private key element and the second private key element.Obtain the first private key element and the second private key element it Afterwards, by the first private key element and the second private key element according in one-dimension code secret note and informal voucher put in order and carry out corresponding row Row.For example, one-dimension code is followed successively by secret note, informal voucher, secret note, secret note represents binary zero, and informal voucher represents binary one, is identifying Secret note in one-dimension code generates 0, and the informal voucher in identifying one-dimension code generates 1, secret note and informal voucher is completed in identification, according still further to secret note It is arranged 0,1 with putting in order for informal voucher, it is 010 to finally obtain one group of data.
In the step of secret note in identifying the one-dimension code, the first private key element of generation, including:
The width for identifying each secret note in the one-dimension code generates the of respective numbers according to the of different size of each secret note One private key element.
In the step of informal voucher in identifying the one-dimension code, the second private key element of generation, including:
The width for identifying each informal voucher in the one-dimension code generates the of respective numbers according to the of different size of each informal voucher Two private key elements.
When bar code is one-dimension code, one-dimension code is made of secret note and informal voucher, identifies that secret note in one-dimension code generates the One private key element identifies that the informal voucher in one-dimension code generates the second private key element, and the first private key element and the second private key element are not Identical, private key is made of the first private key element and the second private key element.Obtain the first private key element and the second private key element it Afterwards, by the first private key element and the second private key element according in one-dimension code secret note and informal voucher put in order and carry out corresponding row Row.
After completing the first private key element of arrangement and the second private key element, the width of each secret note in one-dimension code, root are identified According to the of different size of each secret note, the generation quantity of the first private key element of position corresponding to each secret note is different.Specifically, secret note is wide Degree is bigger, and the first private key element quantity is more.
After completing the first private key element of arrangement and the second private key element, the width of each informal voucher in one-dimension code, root are identified According to the of different size of each informal voucher, the generation quantity of the second private key element of position corresponding to each informal voucher is different.Specifically, informal voucher is wide Degree is bigger, and the second private key element quantity is more.For example, one-dimension code is followed successively by secret note, informal voucher, secret note, wherein first secret note Width is 3L, and the width of Article 2 informal voucher is L, and the width of Article 3 secret note is 2L, and secret note represents binary zero, and informal voucher represents Binary one, the secret note in identifying one-dimension code generate 0, and the informal voucher in identifying one-dimension code generates 1, and secret note is completed in identification And informal voucher, arranged 0,1 according still further to secret note and putting in order for informal voucher, it is 010 to obtain one group of data, further according to secret note and The width of informal voucher, it is 3 that the width of first secret note, which is the quantity that 3L generates Binary Zero, and the width of Article 2 informal voucher generates for L The quantity of binary one is 1, and it is 2 that the width of Article 3 secret note, which is the quantity that 2L generates Binary Zero, for this purpose, finally obtaining one Group data are 000100.
In the present embodiment, after step s 102, the method includes:
Private key is sent to preset mobile terminal.
After intelligent sound box scanning bar code generates private key, the private key of generation is replicated into portion and is sent to default movement eventually End.
Mobile terminal has private key, uses private key that can read the content of user data in the terminal.
In some embodiments, bar code is generated in the terminal to be scanned for intelligent sound box, meanwhile, mobile terminal According to the bar code generating at private key.Wherein, mobile terminal has private key create-rule identical with intelligent sound box, for this purpose, for The same bar code, the private key generated in the terminal are identical with the private key generated in intelligent sound box.
Step S103, user data is encrypted using the private key.
After obtaining private key, user data is encrypted using private key, encrypted user data needs private key The content of user data can be opened.
Private key is to be packaged user data to the cipher mode of user data, it is encrypted, and is not being obtained When private key, it is to provide requirement input password after opening user data, alternatively, being mess code after opening user data, cannot normally reads It reads.
Step S104, encrypted user data is sent to high in the clouds.
Encrypted user data is sent to high in the clouds, beyond the clouds in user data, due to being encrypted, thus need Want private key that could open.
In conclusion generating private key by scanning bar code, user data is encrypted using private key later, finally User data is sent to high in the clouds, this method can replace private key at any time, and randomness is high, is not easy to crack, it is intended to solve existing Most of user data of intelligent sound box is all not carry out any encryption to be sent to high in the clouds, causes to be easy to be read by others to make The problem of user data of user.
As shown in Fig. 2, the embodiment of the present invention also proposes that a kind of intelligent sound box, intelligent sound box 1 include scan module 11, private key Generation module 12, information encrypting module 13 and the first sending module 14.
Scan module 11, for scanning bar code.
In the present embodiment, scan module 11 is set to 1 front end of intelligent sound box, and bar code is swept in 1 front end of intelligent sound box It retouches.
Intelligent sound box 1 includes:
Selecting module, in booting, choosing whether to enter encrypting module;
Opening module, for when selection enters encrypting module, opening scanning.
It when booting, is selected for user, chooses whether to enter encryption mode.When user selects to enter encryption mould When formula, scanning is opened, when user's selection does not enter encryption mode, is not turned on scanning.If in preset time, user without Selection, then give tacit consent into encryption mode.
In some embodiments, the intelligent sound box includes:
Receiving module, the selection instruction for receiving encryption mode;
Execution module into encryption mode, and opens barcode scanning function for executing the selection instruction.
In the present embodiment, bar code is one-dimension code or Quick Response Code.
When bar code is one-dimension code, scan module 11 is laser radar inductor or camera, using laser radar Inductor or camera are scanned.
When bar code is Quick Response Code, scan module 11 is camera, is scanned using camera.
In the present embodiment, one-dimension code or Quick Response Code are generated at random by cell phone application.
Intelligent sound box 1 includes:
Shutdown module, for after scanning bar code, if identifying not bar code in preset time, closing automatically Machine.
Private key generation module 12 is used for according to bar code generating into private key.
After scanning bar code, bar code is identified, according to bar code generating at private key.
In the present embodiment, when bar code is one-dimension code, private key generation module 12 includes:
First identification module goes out secret note in one-dimension code for identification;
Second identification module goes out informal voucher in one-dimension code for identification;
First generation module, for generating the first private key element according to the secret note identified;
Second generation module, for generating the second private key element according to the informal voucher identified;
Arrange module, for according in one-dimension code secret note and informal voucher put in order to the first private key element and the second private key Element is arranged.
When bar code is one-dimension code, one-dimension code is made of secret note and informal voucher, identifies that secret note in one-dimension code generates the One private key element identifies that the informal voucher in one-dimension code generates the second private key element, and the first private key element and the second private key element are not Identical, private key is made of the first private key element and the second private key element.Obtain the first private key element and the second private key element it Afterwards, by the first private key element and the second private key element according in one-dimension code secret note and informal voucher put in order and carry out corresponding row Row.For example, one-dimension code is followed successively by secret note, informal voucher, secret note, secret note represents binary zero, and informal voucher represents binary one, is identifying Secret note in one-dimension code generates 0, and the informal voucher in identifying one-dimension code generates 1, secret note and informal voucher is completed in identification, according still further to secret note It is arranged 0,1 with putting in order for informal voucher, it is 010 to finally obtain one group of data.
First identification module includes the first sub- identification module, goes out the width of each secret note in the one-dimension code for identification;
First generation module includes the first sub- generation module, for according to the of different size of each secret note, generating respective numbers The first private key element.
Second identification module includes the second sub- identification module, goes out the width of each informal voucher in the one-dimension code for identification;
Second generation module includes the second sub- generation module, for according to the of different size of each informal voucher, generating respective numbers The second private key element.
When bar code is one-dimension code, one-dimension code is made of secret note and informal voucher, identifies that secret note in one-dimension code generates the One private key element identifies that the informal voucher in one-dimension code generates the second private key element, and the first private key element and the second private key element are not Identical, private key is made of the first private key element and the second private key element.Obtain the first private key element and the second private key element it Afterwards, by the first private key element and the second private key element according in one-dimension code secret note and informal voucher put in order and carry out corresponding row Row.
After completing the first private key element of arrangement and the second private key element, the width of each secret note in one-dimension code, root are identified According to the of different size of each secret note, the generation quantity of the first private key element of position corresponding to each secret note is different.Specifically, secret note is wide Degree is bigger, and the first private key element quantity is more.
After completing the first private key element of arrangement and the second private key element, the width of each informal voucher in one-dimension code, root are identified According to the of different size of each informal voucher, the generation quantity of the second private key element of position corresponding to each informal voucher is different.Specifically, informal voucher is wide Degree is bigger, and the second private key element quantity is more.For example, one-dimension code is followed successively by secret note, informal voucher, secret note, wherein first secret note Width is 3L, and the width of Article 2 informal voucher is L, and the width of Article 3 secret note is 2L, and secret note represents binary zero, and informal voucher represents Binary one, the secret note in identifying one-dimension code generate 0, and the informal voucher in identifying one-dimension code generates 1, and secret note is completed in identification And informal voucher, arranged 0,1 according still further to secret note and putting in order for informal voucher, it is 010 to obtain one group of data, further according to secret note and The width of informal voucher, it is 3 that the width of first secret note, which is the quantity that 3L generates Binary Zero, and the width of Article 2 informal voucher generates for L The quantity of binary one is 1, and it is 2 that the width of Article 3 secret note, which is the quantity that 2L generates Binary Zero, for this purpose, finally obtaining one Group data are 000100.
In the present embodiment, intelligent sound box 1 further includes:
Private key is sent to preset mobile terminal.
After intelligent sound box scanning bar code generates private key, the private key of generation is replicated into portion and is sent to default movement eventually End.
Mobile terminal has private key, uses private key that can read the content of user data in the terminal.
In some embodiments, bar code is generated in the terminal to be scanned for intelligent sound box, meanwhile, mobile terminal According to the bar code generating at private key.Wherein, mobile terminal has private key create-rule identical with intelligent sound box, for this purpose, for The same bar code, the private key generated in the terminal are identical with the private key generated in intelligent sound box.
Information encrypting module 13, for user data to be encrypted using the private key.
After obtaining private key, user data is encrypted using private key, encrypted user data needs private key The content of user data can be opened.
First sending module 14, for encrypted user data to be sent to high in the clouds.
Encrypted user data is sent to high in the clouds, beyond the clouds in user data, due to being encrypted, thus need Want private key that could open.
In conclusion generating private key by scanning bar code, user data is encrypted using private key later, finally User data is sent to high in the clouds, intelligent sound box 1 can replace private key at any time, and randomness is high, is not easy to crack, it is intended to solve existing Most of the user data of intelligent sound box be all not carry out any encryption to be sent to high in the clouds, cause to be easy to be read by others The problem of user data of user.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (10)

1. a kind of intelligent sound box encryption communication method, which is characterized in that the method includes:
Scan bar code;
According to the bar code generating at private key;
User data is encrypted using the private key;
Encrypted user data is sent to high in the clouds.
2. a kind of intelligent sound box encryption communication method according to claim 1, which is characterized in that in the step of scanning bar code Before rapid, the method includes:
Receive the selection instruction of encryption mode;
The selection instruction is executed, into encryption mode, and opens barcode scanning function.
3. a kind of intelligent sound box encryption communication method according to claim 2, which is characterized in that according to the bar code In the step of generating private key, including:
When the bar code is one-dimension code, secret note in the one-dimension code is identified, generate the first private key element;
It identifies informal voucher in the one-dimension code, generates the second private key element;
According in the one-dimension code secret note and informal voucher put in order to the first private key element and the second private key element It is arranged.
4. a kind of intelligent sound box encryption communication method according to claim 3, which is characterized in that described one-dimensional identifying In the step of secret note in code, the first private key element of generation, including:
The width for identifying each secret note in the one-dimension code, according to the of different size of each secret note, generate respective numbers first is private Key element.
5. a kind of intelligent sound box encryption communication method according to claim 3, which is characterized in that described one-dimensional identifying In the step of informal voucher in code, the second private key element of generation, including:
The width for identifying each informal voucher in the one-dimension code, according to the of different size of each informal voucher, generate respective numbers second is private Key element.
6. according to a kind of intelligent sound box encryption communication method of claim 1-5 any one of them, which is characterized in that according to institute Bar code generating is stated at after the step of private key, the method includes:
The private key is sent to preset mobile terminal.
7. a kind of intelligent sound box, which is characterized in that the intelligent sound box includes:
Scan module, for scanning bar code;
Private key generation module is used for according to the bar code generating into private key;
Information encrypting module, for user data to be encrypted using the private key;
First sending module, for encrypted user data to be sent to high in the clouds.
8. a kind of intelligent sound box according to claim 7, which is characterized in that the intelligent sound box includes:
Receiving module, the selection instruction for receiving encryption mode;
Execution module into encryption mode, and opens barcode scanning function for executing the selection instruction.
9. a kind of intelligent sound box according to claim 8, which is characterized in that described when the bar code is one-dimension code Private key generation module includes:
First identification module goes out secret note in the one-dimension code for identification;
Second identification module goes out informal voucher in the one-dimension code for identification;
First generation module, for generating the first private key element according to the secret note identified;
Second generation module, for generating the second private key element according to the informal voucher identified;
Arrange module, for according in the one-dimension code secret note and informal voucher put in order to the first private key element and described Second private key element is arranged.
10. a kind of intelligent sound box according to claim 9, which is characterized in that the first identification module includes that the first son identifies Module goes out the width of each secret note in the one-dimension code for identification;
First generation module includes the first sub- generation module, and for according to the of different size of each secret note, generating respective numbers One private key element.
CN201810416521.3A 2018-05-03 2018-05-03 Intelligent sound box and encryption communication method thereof Active CN108494553B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810416521.3A CN108494553B (en) 2018-05-03 2018-05-03 Intelligent sound box and encryption communication method thereof
PCT/CN2018/094129 WO2019210571A1 (en) 2018-05-03 2018-07-02 Smart loudspeaker and encrypted communication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810416521.3A CN108494553B (en) 2018-05-03 2018-05-03 Intelligent sound box and encryption communication method thereof

Publications (2)

Publication Number Publication Date
CN108494553A true CN108494553A (en) 2018-09-04
CN108494553B CN108494553B (en) 2020-09-01

Family

ID=63354002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810416521.3A Active CN108494553B (en) 2018-05-03 2018-05-03 Intelligent sound box and encryption communication method thereof

Country Status (2)

Country Link
CN (1) CN108494553B (en)
WO (1) WO2019210571A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104602364A (en) * 2014-12-31 2015-05-06 歌尔声学股份有限公司 Method for connecting wireless device to wireless access point and wireless device, intelligent terminal
CN105070004A (en) * 2015-07-15 2015-11-18 泰凌微电子(上海)有限公司 Intelligent equipment, as well as remote control system and remote control pairing method of intelligent equipment
CN106850392A (en) * 2015-12-04 2017-06-13 腾讯科技(深圳)有限公司 Message treatment method and device, message receival method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205451072U (en) * 2016-02-26 2016-08-10 哈尔滨工业大学(威海) A intelligent algorithm encryption device for computer software protection
CN107786398B (en) * 2016-08-31 2021-02-23 斑马智行网络(香港)有限公司 Data interaction method and device, intelligent terminal, operating system and intelligent refrigerator
CN106685948A (en) * 2016-12-24 2017-05-17 深圳市金立通信设备有限公司 Data processing method, terminal, communication device and data processing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104602364A (en) * 2014-12-31 2015-05-06 歌尔声学股份有限公司 Method for connecting wireless device to wireless access point and wireless device, intelligent terminal
CN105070004A (en) * 2015-07-15 2015-11-18 泰凌微电子(上海)有限公司 Intelligent equipment, as well as remote control system and remote control pairing method of intelligent equipment
CN106850392A (en) * 2015-12-04 2017-06-13 腾讯科技(深圳)有限公司 Message treatment method and device, message receival method and device

Also Published As

Publication number Publication date
WO2019210571A1 (en) 2019-11-07
CN108494553B (en) 2020-09-01

Similar Documents

Publication Publication Date Title
US8990565B2 (en) Method and system for automatically logging in a client
JP6443196B2 (en) Device settings for secure communication
CN102804201B (en) Off-line two-factor user Verification System, its method and program thereof
US9445262B2 (en) Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
CN105069876A (en) Control method and system for intelligent access control
CN104618334A (en) Method and system for generating and verifying dynamic two-dimensional code
CN110417797A (en) Authenticate the method and device of user
CN103023925A (en) NFC (near field communication) personal account information management system and method for implementing same
CN103067381A (en) Third-party service login method, login system and login device by means of platform-party account
WO2016107410A1 (en) Communication control device, authentication device, central control device, and communication system
CN107567072A (en) A kind of WIFI hot spot information amending method and device
CN107819673A (en) It is a kind of based on the intelligent home furnishing control method to communicate in time
CN105590184A (en) Logistics terminal device and goods-receiving method thereof
Hufstetler et al. Nfc unlock: Secure two-factor computer authentication using nfc
CN104050431A (en) Self-signing method and self-signing device for RFID chips
CN106204182A (en) Digital transaction method and device
CN108924906A (en) Smart machine control method, ZigBee gateway and storage medium
CN101990201A (en) Method, system and device for generating general bootstrapping architecture (GBA) secret key
CN109286933A (en) Authentication method, device, system, computer equipment and storage medium
CN106412887A (en) Virtual SIM card rapid authentication method, system, server and terminal
CN102368773B (en) Access control method of mobile memory, mobile memory and system
CN110011959A (en) Date storage method, data query method and system
CN108494553A (en) A kind of intelligent sound box and its encryption communication method
CN111079170B (en) Control method and control device of solid state disk

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190906

Address after: Room 402, 4th floor, Kanghe Sheng Building, New Energy Innovation Industrial Park, No. 1 Chuangsheng Road, Nanshan District, Shenzhen City, Guangdong Province, 518000

Applicant after: Shenzhen Infinite Power Development Co., Ltd.

Address before: 518000 Block 503,602, Garden City Digital Building B, 1079 Nanhai Avenue, Shekou, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: SHENZHEN WOTE WODE CO., LTD.

GR01 Patent grant
GR01 Patent grant