CN108809954A - The methods, devices and systems of data transmission - Google Patents

The methods, devices and systems of data transmission Download PDF

Info

Publication number
CN108809954A
CN108809954A CN201810495272.1A CN201810495272A CN108809954A CN 108809954 A CN108809954 A CN 108809954A CN 201810495272 A CN201810495272 A CN 201810495272A CN 108809954 A CN108809954 A CN 108809954A
Authority
CN
China
Prior art keywords
equipment end
equipment
control terminal
public key
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810495272.1A
Other languages
Chinese (zh)
Inventor
魏中志
胡伯良
安晓江
蒋红宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201810495272.1A priority Critical patent/CN108809954A/en
Publication of CN108809954A publication Critical patent/CN108809954A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a kind of methods, devices and systems of data transmission.Wherein, this method includes:The public key fed back under factory state according to equipment end is treated encryption information and is encrypted, and request message is verified;Checking request message is sent to equipment end;The response message returned according to equipment end is communicated.The present invention is solved due to caused by being communicated in the prior art by identity informations such as IP and MAC Address the technical issues of network security.

Description

The methods, devices and systems of data transmission
Technical field
The present invention relates to communication technology application fields, a kind of method, apparatus in particular to data transmission and are System.
Background technology
Internet technology medium-long range acquires and control institute usage scenario is more and more, and equipment establishes connection method between each other It is the agreement (Internet Protocol, abbreviation IP) and physical address (Media generally by being interconnected between internet Access Control, abbreviation MAC) address is as identity information access internet, based on this identity information by internet Carry out the transmission of data.
But the identity informations such as IP and MAC Address are fixed, once leakage, which is easy to be imitated, leads to illegal node System Jie Ru not caused dangerous, while whole network equipment all needs monitored data.
It carries out due in the prior art communicating caused network security by identity informations such as IP and MAC Address for above-mentioned The problem of, currently no effective solution has been proposed.
Invention content
An embodiment of the present invention provides a kind of methods, devices and systems of data transmission, at least to solve due to existing skill Caused by being communicated by identity informations such as IP and MAC Address in art the technical issues of network security.
One side according to the ... of the embodiment of the present invention provides a kind of method of data transmission, including:Existed according to equipment end The public key fed back under factory state is treated encryption information and is encrypted, and request message is verified;Verification is sent to equipment end to ask Seek message;The response message returned according to equipment end is communicated.
Optionally, it is treated before encryption information is encrypted in the public key fed back under factory state according to equipment end, side Method further includes:In the case where equipment end is in factory state, equipment end is added by short-range communication;It is sent to equipment end public Key request instruction;The public key response message that receiving device end returns, wherein public key response message includes:Public key and equipment identities Identification code.
Optionally, the public key fed back under factory state according to equipment end is treated encryption information and is encrypted, and is verified Request message includes:In the case where information to be encrypted includes random number and equipment identities identification code, according to public key to random number It is encrypted with equipment identities identification code, is verified request message.
Further, optionally, according to public key to random number and equipment identities identification code be encrypted including:According to public key The random number and equipment identities identification code of presetting numerical digit are encrypted.
Optionally, the response message returned according to equipment end carries out communication:Response message is decrypted, is set The random number and/or equipment identities identification code that standby end returns;If the random number and/or equipment identities identification code of equipment end with it is to be added Random number and/or equipment identities identification code in confidential information is identical, it is determined that equipment end is credible, and passes through designated lane and equipment End carries out data interaction, wherein designated lane is used as key according to symmetric encipherment algorithm to data exchange process by random number In data be encrypted;If random number in the random number and/or equipment identities identification code of equipment end and confidential information to be added and/ Or equipment identities identification codes is different, then sign off.
Optionally, after the response message returned according to equipment end is communicated, method further includes:Pass through designated lane It is sent to equipment end and releases communication instruction, wherein released communication instruction, be used to indicate equipment end and restore to factory state, and break Open the connection with control terminal.
Another aspect according to the ... of the embodiment of the present invention additionally provides a kind of method of data transmission, including:Receive control terminal The checking request message of transmission;Checking request message is decrypted, equipment identities identification code is obtained;Judge that equipment identities identify Whether code and the equipment identities identification code to prestore are identical;In the case where the judgment result is yes, it is returned to control terminal encrypted Response message, and carry out data interaction with control terminal.
Optionally, before receiving the checking request message that control terminal is sent, method further includes:Receive what control terminal was sent Public key request instruction;According to public key request instruction, public key response message is generated, wherein public key response message includes:It public key and sets Standby identity code;Public key response message is returned to control terminal.
Optionally, checking request message is decrypted, obtaining equipment identities identification code further includes:Pass through preset private key Checking request message is decrypted, equipment identities identification code and random number are obtained.
Optionally, returning to encrypted response message to control terminal includes:By private key in checking request message with Machine number and/or the equipment identities identification code to prestore are encrypted, and meet with a response message;To control terminal returning response message.
Optionally, after carrying out data interaction with control terminal, this method further includes:Control terminal is received by designated lane The releasing communication instruction of transmission;According to the connection for releasing communication instruction disconnection and control terminal, and restore to factory state.
Another aspect according to the ... of the embodiment of the present invention additionally provides a kind of device of data transmission, including:Encrypting module, Public key for being fed back under factory state according to equipment end is treated encryption information and is encrypted, and request message is verified;Hair Module is sent, for sending checking request message to equipment end;Communication module, the response message for being returned according to equipment end carry out Communication.
It is according to the ... of the embodiment of the present invention in another aspect, additionally provide a kind of device of data transmission, including:Receiving module, Checking request message for receiving control terminal transmission;Deciphering module obtains equipment for checking request message to be decrypted Identity code;Judgment module, for judging whether equipment identities identification code and the equipment identities identification code to prestore are identical;Communication Module returns to encrypted response message in the case where the judgment result is yes to control terminal, and with control terminal into line number According to interaction.
One side according to another embodiment of the present invention additionally provides a kind of system of data transmission, including:Control terminal and Equipment end, wherein control terminal adds equipment end under equipment end factory state, by short-range communication, and is sent to equipment end Public key request instruction;Equipment end receives the public key request instruction that control terminal is sent;According to public key request instruction, public key response is generated Message, wherein public key response message includes:Public key and equipment identities identification code;And return to public key response message to control terminal;? Under equipment end working condition, control terminal is treated encryption information according to the public key that equipment end is fed back under factory state and is encrypted, It is verified request message;And send checking request message to equipment end;Equipment end receives the checking request that control terminal is sent and disappears Breath;Checking request message is decrypted, equipment identities identification code and random number are obtained;Judge equipment identities identification code and prestores Equipment identities identification code it is whether identical;And in the case where the judgment result is yes, to control terminal returning response message, wherein Response message is the encrypted result to identity code and/or random number with private key, and carries out data interaction with control terminal;Control End is communicated according to the response message that equipment end returns;Wherein, in data transmission procedure equipment end and control terminal with random number For key, ciphertext communication is carried out to data using symmetric encipherment algorithm;During releasing connection, control terminal passes through special logical Road sends to equipment end and releases communication instruction;Equipment end receives the releasing communication instruction that control terminal is sent by designated lane;According to According to the connection for releasing communication instruction disconnection and control terminal, and restore to factory state.
Another aspect according to another embodiment of the present invention additionally provides a kind of storage medium, including:Storage medium includes The program of storage, wherein equipment executes where controlling storage medium when program is run:It is anti-under factory state according to equipment end The public key of feedback is treated encryption information and is encrypted, and request message is verified;Checking request message is sent to equipment end;Foundation is set The response message that standby end returns is communicated.
Another aspect according to another embodiment of the present invention additionally provides a kind of processor, including:Processor is for running Program, wherein program executes when running:The public key fed back under factory state according to equipment end is treated encryption information and is added It is close, it is verified request message;Checking request message is sent to equipment end;The response message returned according to equipment end is led to Letter.
In embodiments of the present invention, add by rivest, shamir, adelman and symmetrically using on the basis of IP and MAC Address The combination of close algorithm carries out the communication of equipment room the mode of encryption and decryption, passes through the public affairs fed back under factory state according to equipment end Key is treated encryption information and is encrypted, and request message is verified;Checking request message is sent to equipment end;It is returned according to equipment end The response message returned is communicated, and has been achieved the purpose that communication security between lifting means, has been identified to realize equipment room The technique effect communicated by way of coded communication later, and then solve due in the prior art by IP and MAC Caused by the identity informations such as address are communicated the technical issues of network security.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and is constituted part of this application, this hair Bright illustrative embodiments and their description are not constituted improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the flow diagram of the method for according to embodiments of the present invention one data transmission;
Fig. 2 is the flow diagram of the method for according to embodiments of the present invention two data transmission;
Fig. 3 is the structural schematic diagram of the device of according to embodiments of the present invention three data transmission;
Fig. 4 is the structural schematic diagram of the device of according to embodiments of the present invention four data transmission;
Fig. 5 is the interaction schematic diagram of the system of according to embodiments of the present invention five data transmission.
Specific implementation mode
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The every other embodiment that member is obtained without making creative work should all belong to the model that the present invention protects It encloses.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that using in this way Data can be interchanged in the appropriate case, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover It includes to be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment to cover non-exclusive Those of clearly list step or unit, but may include not listing clearly or for these processes, method, product Or the other steps or unit that equipment is intrinsic.
Embodiment one
According to embodiments of the present invention, a kind of embodiment of the method for data transmission is provided, it should be noted that in attached drawing The step of flow illustrates can execute in the computer system of such as a group of computer-executable instructions, although also, Logical order is shown in flow chart, but in some cases, it can be to execute shown different from sequence herein or retouch The step of stating.
Fig. 1 is the flow diagram of the method for according to embodiments of the present invention one data transmission, as shown in Figure 1, controlling End, this method comprises the following steps:
Step S102, the public key fed back under factory state according to equipment end are treated encryption information and are encrypted, tested Demonstrate,prove request message;
Wherein, in control terminal, the public key fed back under factory state according to equipment end is treated encryption information and is encrypted, obtains To checking request message;Here information to be encrypted includes:Random number and equipment identities identification code;Random number in equipment end for testing Operation is encrypted to subsequent communications according to the random number after demonstrate,proving successfully;Here checking request message is control terminal in equipment It triggers, is communicated to connect for being established with equipment end, under equipment end factory state, control terminal, which receives, to be set under the working condition of end After the public key and equipment identities identification code of standby end feedback, status switching instruction is sent to equipment end, by the equipment end by dispatching from the factory State switches to working condition.
Step S104 sends checking request message to equipment end;
Based on the checking request message that step S102 is generated, the checking request message is sent to the equipment end, so that setting It is verified according to the checking request message at standby end.
Step S106, the response message returned according to equipment end are communicated.
Based on step S104, the checking request message that control terminal is sent to equipment end, in the sound for receiving equipment end return After answering message, if the response message indicating equipment end is proved to be successful, communication can be established, then is led between control terminal and equipment end It crosses designated lane and carries out data interaction;If on the contrary, the response message indicating equipment end authentication failed, control terminal is logical with equipment end Letter terminates, and authentication failed can consider control terminal choosing mistake equipment end to be controlled, need to re-start selection, and configuration, weight The process for the foundation communication newly initiated then repeats step S102 to step S106.
Specifically, by taking smart home as an example, smart mobile phone is made as control terminal, the household electrical appliance such as air-conditioning, television set, refrigerator For equipment end, under factory state, smart mobile phone obtains the public key and equipment of each household electrical appliances respectively in a manner of scanning the two-dimensional code Identity code, and then in the case where smart mobile phone selection needs device to be controlled, if smart mobile phone has selected air-conditioning, lead to It crosses after the equipment identities identification code and random number of air-conditioning is encrypted in the public key that will have been obtained, is verified request message;And The checking request message is sent to air-conditioning, if equipment identities identification code that air-conditioning goes out according to the checking request message extraction and the sky The equipment identities identification code of tune is identical, then explanation be proved to be successful, at this point, air-conditioning according to the random number in checking request message to from The equipment identities identification code of body is encrypted, and generates response message, and return to smart mobile phone;Smart mobile phone receives the response message Afterwards, know that the air-conditioning is proved to be successful, that is, the air-conditioning is credible, therefore carries out data interaction by designated lane and the air-conditioning;Instead It, that is, in the case of air-conditioning authentication failed, smart mobile phone and the air-conditioning sign off.
To sum up, control terminal in the method for data transmission provided by the present application (such as:Mobile phone or computer etc.) and equipment end (example Such as:Air-conditioning, refrigerator, TV, curtain controller and lamp dimmer etc.), encryption key distribution is initiated by control terminal when building network, if Standby end switches the working condition of oneself.
Specifically, the method for data transmission provided by the present application is specific as follows:When equipment end is dispatched from the factory one is generated by manufacturer Unique equipment identities identification code, and user (or in a manner of RFID) is supplied to by quick response code form.Equipment end is gathered around there are two shape State:Factory state and working condition.Under factory state, control terminal is configured by way of Near Field Communication.Working condition Under, equipment end is communicated in such a way that public and private key obtains random key with control terminal.
In embodiments of the present invention, add by rivest, shamir, adelman and symmetrically using on the basis of IP and MAC Address The combination of close algorithm carries out the communication of equipment room the mode of encryption and decryption, passes through the public affairs fed back under factory state according to equipment end Key is treated encryption information and is encrypted, and request message is verified;Checking request message is sent to equipment end;It is returned according to equipment end The response message returned is communicated, and has been achieved the purpose that communication security between lifting means, has been identified to realize equipment room The technique effect communicated by way of coded communication later, and then solve due in the prior art by IP and MAC Caused by the identity informations such as address are communicated the technical issues of network security.
Optionally, the public key fed back under factory state according to equipment end in step s 102 is treated encryption information and is added Before close, the method for data transmission provided by the present application further includes:
Step S99 adds equipment end in the case where equipment end is in factory state by short-range communication;
Here short-range communication includes at least:Radio frequency identity RFID identification communicates and scans two dimension by application APP Code identification equipment communication;Wherein, it for scanning the two-dimensional code identification equipment communication by application APP, is in equipment end Under factory state, control terminal scans the Quick Response Code of the equipment end surface mount by preassembled APP, obtains the equipment end Information and connection type;
Similarly, if RFID identification, control terminal, by the RFID at sensing apparatus end, obtains the equipment end by pre-set programs Information and connection type.
Here new equipment is added for control terminal, and equipment end is connected in a manner of short-range communication.Above-mentioned example only with Subject to the method for realizing data transmission provided by the present application, do not limit specifically.
Step S100 sends public key request instruction to equipment end;
Wherein, after step S99 addition equipment end successes, public key request instruction is sent to the equipment end, so that obtaining The encryption key communicated with equipment end.
Step S101, the public key response message that receiving device end returns, wherein public key response message includes:It public key and sets Standby identity code.
Here after the public key response message for getting equipment end return, which is preserved, and Status switching instruction is sent, which is switched into working condition by factory state.
Optionally, the public key fed back under factory state according to equipment end in step S102 is treated encryption information and is added Close, being verified request message includes:
Step S1021, in the case where information to be encrypted includes random number and equipment identities identification code, according to public key to Machine number and equipment identities identification code are encrypted, and are verified request message.
Further, optionally, packet is encrypted to random number and equipment identities identification code according to public key in step S1021 It includes:
Step S10211 is encrypted the random number and equipment identities identification code of presetting numerical digit according to public key.
Here in conjunction with step S1021 and step S10211, random number and equipment identities identification code are being carried out according to public key During encrypted, control terminal generates the random number of 32 bytes, is carried out to the random number and equipment identities identification code by public key Encryption.Wherein, random number is for follow-up equipment end and control terminal coded communication.
Optionally, the response message returned according to equipment end in step S106 carries out communication:
Step S1061, is decrypted response message, obtains random number and/or the equipment identities identification of equipment end return Code;
Step S1062, if the random number of equipment end and/or equipment identities identification code and the random number in confidential information to be added And/or equipment identities identification code is identical, it is determined that equipment end is credible, and carries out data interaction by designated lane and equipment end, Wherein, designated lane is used as key according to symmetric encipherment algorithm to the data in the data exchange process by the random number It is encrypted;
Wherein, after control terminal is proved to be successful, during follow-up data interacts, it is based on symmetric encipherment algorithm foundation The interaction data that random number pair is come and gone with equipment end is encrypted, and is communicated with the encrypted interaction data, and passes through The channel of above-mentioned communication mode, that is, designated lane provided by the present application.
Step S1063, if the random number of equipment end and/or equipment identities identification code and the random number in confidential information to be added And/or equipment identities identification codes is different, then sign off.
Specifically, after the response message for receiving equipment end return, during the response message is decrypted, Obtain the random number and/or equipment identities identification code of equipment end return, wherein equipment end returns to the response of control terminal and disappears here In breath, if there are any verification conditions to think that the equipment end is credible in control end side, follow-up data interaction can be carried out, In, verification condition includes:Random number, the equipment identities identification code of equipment end or the identification of the equipment identities of random number and equipment end Any one in code.
If by step S1062 and step S1063 it is found that the random number and/or equipment identities identification code of equipment end with wait for Random number and/or equipment identities identification code in encryption information is identical, thens follow the steps S1062;Conversely, executing step S1063.
Optionally, it is provided by the present application after the response message returned in step s 106 according to equipment end is communicated The method of data transmission further includes:
Step S107 is sent to equipment end by designated lane and releases communication instruction, wherein is released communication instruction, is used for Indicating equipment end is restored to factory state, and disconnects the connection with control terminal.
Specifically, control terminal releases equipment:Control terminal is connected to equipment by the designated lane under " working condition ", sends Restore " factory state " instruction and arrive equipment, equipment receives instruction, is switched to " factory state ", disconnects network connection, permits at this time Perhaps it is configured again.
The method of data transmission provided by the present application establishes data designated lane by control terminal, improves the transmission of data Stability;Suspend mode can be carried out for not communication apparatus, reduce the power consumption of whole system.
Embodiment two
Another aspect according to the ... of the embodiment of the present invention, additionally provides a kind of method of data transmission, and Fig. 2 is according to the present invention The flow diagram of the method for the data transmission of embodiment two, as shown in Fig. 2, in equipment end, including:
Step S200 receives the checking request message that control terminal is sent;
Checking request message is decrypted in step S202, obtains equipment identities identification code;
Step S204 judges whether equipment identities identification code and the equipment identities identification code to prestore are identical;
Step S206 returns to encrypted response message to control terminal in the case where the judgment result is yes, and with control End carries out data interaction.
Specifically, one control terminal of corresponding embodiment is in the operating condition to the flow of equipment end, in equipment end side, equipment end Receive the checking request message that control terminal is sent;And checking request message is decrypted, obtain equipment identities identification code;Judge Whether equipment identities identification code and the equipment identities identification code to prestore are identical;In the case where the judgment result is yes, to control terminal Returning response message, and carry out data interaction with control terminal;Otherwise terminate the communication with control terminal.
In embodiments of the present invention, add by rivest, shamir, adelman and symmetrically using on the basis of IP and MAC Address Close algorithm combines the mode that encryption and decryption is carried out to the communication of equipment room, receives the checking request message that control terminal is sent;To verification Request message is decrypted, and obtains equipment identities identification code;The equipment identities identification code for judging equipment identities identification code and prestoring It is whether identical;In the case where the judgment result is yes, to control terminal returning response message, and data interaction is carried out with control terminal, Communication security between lifting means is achieved the purpose that, to realize equipment room after recognition by way of coded communication The technique effect communicated, and then solve due to being communicated in the prior art by identity informations such as IP and MAC Address The technical issues of caused network security.
Optionally, before receiving the checking request message that control terminal is sent in step s 200, data provided by the present application The method of transmission further includes:
Step S197 receives the public key request instruction that control terminal is sent;
Step S198 generates public key response message according to public key request instruction, wherein public key response message includes:Public key With equipment identities identification code;
Step S199 returns to public key response message to control terminal.
Specifically, under factory state, after receiving the public key request instruction that control terminal is sent, public key is generated, and will The equipment identities identification code and public key of itself generate public key response message together, and send the public key response message to control terminal, Wherein, after sending public key response message, the status switching instruction that control terminal is sent is received, factory state is switched into work State.
Optionally, checking request message is decrypted in step S202, obtaining equipment identities identification code further includes:
Step S2021 is decrypted checking request message by preset private key, obtain equipment identities identification code and with Machine number.
Specifically, equipment end receives the checking request message and decrypts, the equipment identities extracted in checking request message are known Other code is compared with the identity code of oneself, wherein it should be noted that in the method for data transmission provided by the present application with Asymmetric cryptosystem mode carries out encryption and decryption in the device authentication stage, and in addition to this, the method for data transmission provided by the present application is also Encryption and decryption can be carried out in the device authentication stage by way of symmetric cryptography, the mode of above-mentioned encryption and decryption is to realize that the application carries Subject to the method for the data transmission of confession, do not limit specifically.
Optionally, returning to encrypted response message to control terminal in step S206 includes:
Step S2061, by private key in checking request message random number and/or the equipment identities identification code that prestores into Row encryption, meet with a response message;
Step S2062, to control terminal returning response message.
Specifically, if consistent, by checking request message random number and/or the equipment identities identification code that prestores It is encrypted, generates response message, after end to be controlled is proved to be successful, by random number to subsequently carrying out data interaction with control terminal Shi Jinhang encryption and decryption.
Optionally, after carrying out data interaction with control terminal in step S206, the side of data transmission provided by the present application Method further includes:
Step S207 receives the releasing communication instruction that control terminal is sent by designated lane;
Step S208 according to the connection for releasing communication instruction disconnection and control terminal, and restores to factory state.
Specifically, equipment end receives releasing communication instruction, it is switched to " factory state ", disconnects network connection, permit at this time Perhaps it is configured again.
Embodiment three
Another aspect according to the ... of the embodiment of the present invention, additionally provides a kind of device of data transmission, and Fig. 3 is according to the present invention The structural schematic diagram of the device of the data transmission of embodiment three, as shown in figure 3, in control terminal, including:
Encrypting module 32, the public key for being fed back under factory state according to equipment end are treated encryption information and are encrypted, It is verified request message;Sending module 34, for sending checking request message to equipment end;Communication module 36 is used for foundation The response message that equipment end returns is communicated.
In embodiments of the present invention, add by rivest, shamir, adelman and symmetrically using on the basis of IP and MAC Address Close algorithm combines the mode that encryption and decryption is carried out to the communication of equipment room, passes through the public key fed back under factory state according to equipment end It treats encryption information to be encrypted, is verified request message;Checking request message is sent to equipment end;It is returned according to equipment end Response message communicated, achieved the purpose that communication security between lifting means, to realize equipment room in identification The technique effect communicated by way of coded communication afterwards, and then solve due in the prior art by IP and MAC Caused by the identity informations such as location are communicated the technical issues of network security.
Example IV
It is according to the ... of the embodiment of the present invention in another aspect, additionally providing a kind of device of data transmission, Fig. 4 is according to the present invention The structural schematic diagram of the device of the data transmission of example IV, as shown in figure 4, in equipment end, including:
Receiving module 40, the checking request message for receiving control terminal transmission;Deciphering module 42, for checking request Message is decrypted, and obtains equipment identities identification code;Judgment module 44, the equipment for judging equipment identities identification code Yu prestoring Whether identity code is identical;Communication module 46, in the case where the judgment result is yes, being returned to control terminal encrypted Response message, and carry out data interaction with control terminal.
In embodiments of the present invention, add by rivest, shamir, adelman and symmetrically using on the basis of IP and MAC Address Close algorithm combines the mode that encryption and decryption is carried out to the communication of equipment room, receives the checking request message that control terminal is sent;To verification Request message is decrypted, and obtains equipment identities identification code;The equipment identities identification code for judging equipment identities identification code and prestoring It is whether identical;In the case where the judgment result is yes, to control terminal returning response message, and data interaction is carried out with control terminal, Communication security between lifting means is achieved the purpose that, to realize equipment room after recognition by way of coded communication The technique effect communicated, and then solve due to being communicated in the prior art by identity informations such as IP and MAC Address The technical issues of caused network security.
Embodiment five
One side according to another embodiment of the present invention, additionally provides a kind of system of data transmission, and Fig. 5 is according to this hair The interaction schematic diagram of the system of the data transmission of bright embodiment five, as shown in figure 5, including:Control terminal 52 and equipment end 54, In,
Control terminal 52 adds equipment end 54 under 54 factory state of equipment end, by short-range communication, and to equipment end 54 Send public key request instruction;Equipment end 54 receives the public key request instruction that control terminal 52 is sent;According to public key request instruction, generate Public key response message, wherein public key response message includes:Public key and equipment identities identification code;And return to public key to control terminal 52 Response message;
Under 54 working condition of equipment end, the public key that control terminal 52 is fed back according to equipment end 54 under factory state is to be added Confidential information is encrypted, and is verified request message;And send checking request message to equipment end 54;Equipment end 54 receives control The checking request message that end 52 is sent;Checking request message is decrypted, equipment identities identification code and random number are obtained;Judge Whether equipment identities identification code and the equipment identities identification code to prestore are identical;And in the case where the judgment result is yes, to control Hold 52 returning response message, wherein response message is the encrypted result to identity code and/or random number with private key, and with Control terminal 52 carries out data interaction;Control terminal 52 is communicated according to the response message that equipment end 54 returns;Wherein, data transmission Equipment end 54 and control terminal 52 carry out ciphertext communication using symmetric encipherment algorithm using random number as key to data in the process;? During releasing connection, control terminal 52 is sent to equipment end 54 by designated lane and releases communication instruction;Equipment end 54 passes through Designated lane receives the releasing communication instruction that control terminal 52 is sent;The connection with control terminal 52 is disconnected according to releasing communication instruction, And restore to factory state.
Embodiment six
Another aspect according to another embodiment of the present invention additionally provides a kind of storage medium, including:Storage medium includes The program of storage, wherein equipment executes where controlling storage medium when program is run:It is anti-under factory state according to equipment end The public key of feedback is treated encryption information and is encrypted, and request message is verified;Checking request message is sent to equipment end;Foundation is set The response message that standby end returns is communicated.
Embodiment seven
Another aspect according to another embodiment of the present invention additionally provides a kind of processor, including:Processor is for running Program, wherein program executes when running:The public key fed back under factory state according to equipment end is treated encryption information and is added It is close, it is verified request message;Checking request message is sent to equipment end;The response message returned according to equipment end is led to Letter.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
In the above embodiment of the present invention, all emphasizes particularly on different fields to the description of each embodiment, do not have in some embodiment The part of detailed description may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, for example, the unit division, Ke Yiwei A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple On unit.Some or all of unit therein can be selected according to the actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (16)

1. a kind of method of data transmission, which is characterized in that including:
The public key fed back under factory state according to equipment end is treated encryption information and is encrypted, and request message is verified;
The checking request message is sent to the equipment end;
The response message returned according to the equipment end is communicated.
2. according to the method described in claim 1, it is characterized in that, in the public affairs fed back under factory state according to equipment end Key is treated before encryption information is encrypted, and the method further includes:
In the case where the equipment end is in factory state, the equipment end is added by short-range communication;
Public key request instruction is sent to the equipment end;
Receive the public key response message that the equipment end returns, wherein the public key response message includes:Public key and equipment identities Identification code.
3. method according to claim 1 or 2, which is characterized in that described to be fed back under factory state according to equipment end Public key is treated encryption information and is encrypted, and is verified request message and includes:
In the case where the information to be encrypted includes random number and equipment identities identification code, according to the public key to described random Number and the equipment identities identification code are encrypted, and obtain the checking request message.
4. according to the method described in claim 3, it is characterized in that, described to the random number and described set according to the public key Standby identity code be encrypted including:The random number and the equipment identities of presetting numerical digit are identified according to the public key Code is encrypted.
5. according to the method described in claim 1, it is characterized in that, the response message returned according to the equipment end carries out Communication includes:
The response message is decrypted, the random number and/or equipment identities identification code that the equipment end returns are obtained;
If the random number and/or equipment identities identification code of the equipment end in the confidential information to be added random number and/or set Standby identity code is identical, it is determined that and the equipment end is credible, and carries out data interaction by designated lane and the equipment end, Wherein, the designated lane is used as key according to symmetric encipherment algorithm in the data exchange process by the random number Data are encrypted;
If the random number and/or equipment identities identification code of the equipment end in the confidential information to be added random number and/or set Standby identity code is different, then sign off.
6. according to the method described in claim 1, it is characterized in that, it is described according to the equipment end return response message into After row communication, the method further includes:
It is sent to the equipment end by designated lane and releases communication instruction, wherein the releasing communication instruction is used to indicate institute It states equipment end to restore to factory state, and disconnects the connection with control terminal.
7. a kind of method of data transmission, which is characterized in that including:
Receive the checking request message that control terminal is sent;
The checking request message is decrypted, equipment identities identification code is obtained;
Judge whether the equipment identities identification code and the equipment identities identification code to prestore are identical;
In the case where the judgment result is yes, return to encrypted response message to the control terminal, and with the control terminal into Row data interaction.
8. the method according to the description of claim 7 is characterized in that it is described reception control terminal send checking request message it Before, the method further includes:
Receive the public key request instruction that the control terminal is sent;
According to the public key request instruction, public key response message is generated, wherein the public key response message includes:It public key and sets Standby identity code;
The public key response message is returned to the control terminal.
9. method according to claim 7 or 8, which is characterized in that it is described that the checking request message is decrypted, it obtains Further include to equipment identities identification code:
The checking request message is decrypted by preset private key, obtains the equipment identities identification code and random number.
10. according to the method described in claim 9, it is characterized in that, described return to the encrypted sound to the control terminal The message is answered to include:
By private key in the checking request message random number and/or the equipment identities identification code to prestore add It is close, obtain the response message;
To the control terminal returning response message.
11. the method according to the description of claim 7 is characterized in that it is described carry out data interaction with the control terminal after, The method further includes:
The releasing communication instruction that the control terminal is sent is received by designated lane;
The connection with the control terminal is disconnected according to the releasing communication instruction, and is restored to factory state.
12. a kind of device of data transmission, which is characterized in that including:
Encrypting module, the public key for being fed back under factory state according to equipment end are treated encryption information and are encrypted, tested Demonstrate,prove request message;
Sending module, for sending the checking request message to the equipment end;
Communication module, the response message for being returned according to the equipment end are communicated.
13. a kind of device of data transmission, which is characterized in that including:
Receiving module, the checking request message for receiving control terminal transmission;
Deciphering module obtains equipment identities identification code for the checking request message to be decrypted;
Judgment module, for judging whether the equipment identities identification code and the equipment identities identification code to prestore are identical;
Communication module is used in the case where the judgment result is yes, to the encrypted response message of control terminal return, and with The control terminal carries out data interaction.
14. a kind of system of data transmission, which is characterized in that including:Control terminal and equipment end, wherein
The control terminal adds the equipment end under the equipment end factory state, by short-range communication, and is set to described Standby end sends public key request instruction;The equipment end receives the public key request instruction that the control terminal is sent;According to the public key Request instruction generates public key response message, wherein the public key response message includes:Public key and equipment identities identification code;And to The control terminal returns to the public key response message;
Under the equipment end working condition, public key that the control terminal is fed back according to the equipment end under the factory state It treats encryption information to be encrypted, is verified request message;And send the checking request message to the equipment end;It is described Equipment end receives the checking request message that control terminal is sent;The checking request message is decrypted, equipment identities knowledge is obtained Other code and random number;Judge whether the equipment identities identification code and the equipment identities identification code to prestore are identical;And judging to tie Fruit is in the case of being, to the control terminal returning response message, wherein the response message is with private key to identity code And/or the encrypted result of random number, and carry out data interaction with the control terminal;The control terminal is returned according to the equipment end Response message communicated;Wherein, equipment end described in data transmission procedure and the control terminal are close with the random number Key carries out ciphertext communication using symmetric encipherment algorithm to data;
During releasing connection, the control terminal is sent to the equipment end by designated lane and releases communication instruction;Institute It states equipment end and the releasing communication instruction that the control terminal is sent is received by designated lane;It is disconnected according to the releasing communication instruction With the connection of the control terminal, and restore to factory state.
15. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment execute:The public key fed back under factory state according to equipment end treat encryption information into Row encryption, is verified request message;The checking request message is sent to the equipment end;It is returned according to the equipment end Response message is communicated.
16. a kind of processor, which is characterized in that the processor is for running program, wherein described program executes when running: The public key fed back under factory state according to equipment end is treated encryption information and is encrypted, and request message is verified;To described Equipment end sends the checking request message;The response message returned according to the equipment end is communicated.
CN201810495272.1A 2018-05-22 2018-05-22 The methods, devices and systems of data transmission Pending CN108809954A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810495272.1A CN108809954A (en) 2018-05-22 2018-05-22 The methods, devices and systems of data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810495272.1A CN108809954A (en) 2018-05-22 2018-05-22 The methods, devices and systems of data transmission

Publications (1)

Publication Number Publication Date
CN108809954A true CN108809954A (en) 2018-11-13

Family

ID=64092721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810495272.1A Pending CN108809954A (en) 2018-05-22 2018-05-22 The methods, devices and systems of data transmission

Country Status (1)

Country Link
CN (1) CN108809954A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660609A (en) * 2018-12-07 2019-04-19 北京海泰方圆科技股份有限公司 A kind of device identification method and device and storage medium
CN110233836A (en) * 2019-05-31 2019-09-13 顾宏超 A kind of communication verification method, equipment, system and computer readable storage medium
CN111193761A (en) * 2019-09-11 2020-05-22 腾讯科技(深圳)有限公司 File transmission method and device and readable storage medium
CN113965425A (en) * 2020-07-01 2022-01-21 珠海优特智厨科技有限公司 Access method, device and equipment of Internet of things equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110107102A1 (en) * 2008-06-16 2011-05-05 France Telecom Method for authenticating an entity by a verifier
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television
CN105451129A (en) * 2015-11-04 2016-03-30 广东欧珀移动通信有限公司 Network switching method and wireless loudspeaker box
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110107102A1 (en) * 2008-06-16 2011-05-05 France Telecom Method for authenticating an entity by a verifier
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television
CN105451129A (en) * 2015-11-04 2016-03-30 广东欧珀移动通信有限公司 Network switching method and wireless loudspeaker box
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660609A (en) * 2018-12-07 2019-04-19 北京海泰方圆科技股份有限公司 A kind of device identification method and device and storage medium
CN110233836A (en) * 2019-05-31 2019-09-13 顾宏超 A kind of communication verification method, equipment, system and computer readable storage medium
CN110233836B (en) * 2019-05-31 2021-06-08 顾宏超 Communication verification method, device, system and computer readable storage medium
CN111193761A (en) * 2019-09-11 2020-05-22 腾讯科技(深圳)有限公司 File transmission method and device and readable storage medium
CN113965425A (en) * 2020-07-01 2022-01-21 珠海优特智厨科技有限公司 Access method, device and equipment of Internet of things equipment and computer readable storage medium
CN113965425B (en) * 2020-07-01 2023-07-18 珠海优特智厨科技有限公司 Access method, device and equipment of Internet of things equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN108809954A (en) The methods, devices and systems of data transmission
CN105656941B (en) Identification authentication system and method
CN106101147B (en) A kind of method and system for realizing smart machine and the communication of remote terminal dynamic encryption
CN108173644A (en) Data transmission encryption method and device, storage medium, equipment and server
CN108923927A (en) System and method for being connected to video camera supply dynamic Q R code with BLE
CN107094138B (en) A kind of smart home safe communication system and communication means
CN104301303A (en) Intelligent home Internet of Things safety protection method and system
CN105871918A (en) Household appliance, communication system and method between household appliance and cloud server as well as cloud server
CN110690966B (en) Method, system, equipment and storage medium for connecting terminal and service server
CN106209883A (en) Based on link selection and the multi-chain circuit transmission method and system of broken restructuring
CN106790223A (en) The method and apparatus and its system of a kind of data transfer
CN104661171B (en) Small data secure transmission method and system for MTC (machine type communication) equipment group
CN105007163B (en) Transmission, acquisition methods and the transmission of wildcard, acquisition device
CN105764058A (en) Network access method, device and system
CN104753953A (en) Access control system
CN106789476A (en) A kind of gateway communication method and system
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN108848107A (en) A kind of method of secure transmission web information
CN112398894A (en) Safety verification method and device for vehicle
CN113194476B (en) Equipment activation and authentication binding method
CN111327653A (en) Equipment network distribution method, medium, household appliance and device
CN108306793A (en) Smart machine, intelligent domestic gateway, the method and system for establishing connection
CN105228144B (en) Cut-in method, apparatus and system based on temporary MAC address
CN117118763A (en) Method, device and system for data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113

RJ01 Rejection of invention patent application after publication