CN109039844B - Intelligent household Internet of things closed-loop decryption system - Google Patents

Intelligent household Internet of things closed-loop decryption system Download PDF

Info

Publication number
CN109039844B
CN109039844B CN201811295303.5A CN201811295303A CN109039844B CN 109039844 B CN109039844 B CN 109039844B CN 201811295303 A CN201811295303 A CN 201811295303A CN 109039844 B CN109039844 B CN 109039844B
Authority
CN
China
Prior art keywords
instruction
module
control
intelligent power
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811295303.5A
Other languages
Chinese (zh)
Other versions
CN109039844A (en
Inventor
黄宏铭
林沃栈
张强
刘伟良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bairunsheng Technology (Shenzhen) Co.,Ltd.
Original Assignee
Bairunsheng Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bairunsheng Technology Shenzhen Co ltd filed Critical Bairunsheng Technology Shenzhen Co ltd
Priority to CN201811295303.5A priority Critical patent/CN109039844B/en
Publication of CN109039844A publication Critical patent/CN109039844A/en
Application granted granted Critical
Publication of CN109039844B publication Critical patent/CN109039844B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Abstract

The invention relates to an intelligent household Internet of things closed-loop decryption system, which comprises an Internet of things network, wherein the Internet of things network comprises a plurality of intelligent power utilization ends, a control end and an interaction end, the control end is connected with an unlocking server through mobile communication, the interaction end is connected with the unlocking server through broadband communication and can carry out data interaction in a closed-loop decryption mode, the control logic is convenient, the data security is ensured, the possibility of data duplication is avoided, the possibility of controlling the Internet of things by external data is improved, the mobile data is sent to the interaction end in a cloud mode through broadband communication, and thirdly, the unlocking mode data volume is very small, and the response efficiency of the system is ensured.

Description

Intelligent household Internet of things closed-loop decryption system
Technical Field
The invention relates to the field of smart home, in particular to a smart home Internet of things closed-loop decryption system.
Background
The smart home (home automation) is characterized in that a home is used as a platform, facilities related to home life are integrated by utilizing a comprehensive wiring technology, a network communication technology, a safety precaution technology, an automatic control technology and an audio and video technology, an efficient management system of home facilities and home schedule affairs is constructed, home safety, convenience, comfort and artistry are improved, and an environment-friendly and energy-saving living environment is realized. Home automation refers to the integration or control of electronic appliances or systems in the home using microprocessor electronics technology, such as: lighting lamps, coffee stoves, computer equipment, security systems, heating and cooling systems, video and audio systems, etc. The home automation system mainly uses a Central Processing Unit (CPU) to receive messages from related electronic and electrical products (changes in external environmental factors, such as changes in light caused by the first rise of the sun or the west), and then sends appropriate information to other electronic and electrical products by a predetermined program. The central microprocessor must control the electrical products in the home through many interfaces, such as a keyboard, a touch screen, buttons, a computer, a telephone, a remote controller, etc.; the consumer may send signals to or receive signals from the central microprocessor.
A new problem occurs, because the home network generally sends signals to all other devices in the network through a centralized central processing unit or terminal, and thus, other devices in the network are prone to have a problem, because the command structure is simplified, the command information is very easy to intercept, and therefore, the security in the home internet of things is low, and if the actual control command is complex, the response efficiency of the corresponding home device is affected, so an unlocking system with a simple data structure but capable of verifying the information is required.
Disclosure of Invention
In view of the above, the present invention provides a smart home internet of things closed-loop decryption system to solve the above problems.
In order to solve the technical problems, the technical scheme of the invention is as follows: an intelligent household Internet of things closed-loop decryption system comprises an Internet of things network, wherein the Internet of things network comprises a plurality of intelligent power utilization ends, a control end and an interaction end, the control end is connected to an unlocking server through mobile communication, and the interaction end is connected to the unlocking server through broadband communication;
the control end comprises an input module, an instruction sending module and a feedback receiving module, a user inputs user information through the input module, the user generates a control instruction or an unlocking instruction through the input module, the instruction sending module is used for sending the control instruction or the unlocking instruction, and the control instruction comprises a controlled device address and control content;
the intelligent power utilization end comprises a data receiving and transmitting module and a response module, the data receiving and transmitting module is used for receiving the control instruction, the response module is used for responding to the control instruction, the response module comprises a state configuration unit, and the state configuration unit is used for configuring the response module into a static service state or a dynamic service state;
when the response module is in a dynamic service state and receives the control instruction, verifying the control instruction through a verification strategy, sending the verified control instruction to a corresponding intelligent power utilization end through an internet of things according to the address of the controlled equipment, and controlling the intelligent power utilization end to execute the control content in the control instruction;
when the response module is in a static service state and receives the unlocking instruction, a first reference time value is obtained through a timer of the intelligent power utilization end, the first reference time value is encrypted through a first encryption algorithm to obtain a first ciphertext, and the first ciphertext is sent to the control end;
the feedback receiving module is configured with a feedback strategy, and the feedback strategy comprises the steps of decrypting a first ciphertext through a first decryption algorithm to obtain a first secret value and a second ciphertext when the feedback receiving module receives the first ciphertext, and uploading the first ciphertext and user information to the unlocking server according to the second ciphertext; the control end sends the generated first secret value to an instruction sending module, and the first secret value is added into the sent control instruction when the instruction sending module sends the control instruction;
the unlocking server is configured with an unlocking service module, and the unlocking service module comprises a verification analysis unit and a decryption unit; the verification analysis unit is used for analyzing and verifying the user information, and when the user information passes verification, the corresponding second ciphertext is sent to the decryption unit, and the decryption unit is configured with a second decryption algorithm to decrypt the second ciphertext to obtain a second secret value and send the second secret value to the interaction terminal;
the interactive end generates a permission instruction according to the second secret value and sends the permission instruction to a corresponding intelligent power consumption end, the intelligent power consumption end obtains a first secret value according to the first time reference value and the second secret value through a third decryption algorithm, and the obtained first secret value is used as a verification strategy to verify the parameter of the control instruction;
the permission instruction comprises a permission condition, when the intelligent power utilization terminal receives the permission instruction, a first reference time value is used as a verification strategy to verify a parameter of the control instruction, and the state configuration unit configures the response module into a dynamic service state;
and after the intelligent power utilization end meets the permission condition, the state configuration unit configures the response module from a dynamic service state to a static service state.
Further, the input module includes a fingerprint input unit, a sound input unit, a key-in unit and an image input unit, the fingerprint input unit is used for inputting user fingerprint information in user information, the sound input unit is used for inputting user sound information in user information, the key-in unit is used for inputting user text information in user information, and the image input unit is used for inputting user image information in user information.
Furthermore, the control end is configured with an identification number value, and the identification number value is added to the sent control instruction when the instruction sending module sends the control instruction;
and when the intelligent power utilization end receives the identification number value, the identification number value is used as a verification strategy to verify the parameters of the control command.
Further, the identification number value has a size between 8 bits and 16 bits.
Further, the first secret has a size of between 4 bits and 8 bits.
Further, the second secret has a size of between 4 bits and 8 bits.
Further, the intelligent power consumption terminal stores a first reference time value by establishing a position stamp on the timer, wherein the position stamp reflects a relative relationship between the actual time of the timer and the first reference time value, and when the actual time of the timer is modified, the first reference time value of the intelligent power consumption terminal is correspondingly changed.
Further, the permission condition includes configuring a first preset time, and when the corresponding intelligent power consumption end does not receive the control instruction and exceeds the first preset time, the intelligent user end judges that the permission condition is met.
Further, the permission condition includes configuring a first preset number of times, and when the number of times that the corresponding intelligent power consumption end receives the control instruction exceeds the first preset number of times, the intelligent user end determines that the permission condition is satisfied.
The technical effects of the invention are mainly reflected in the following aspects: through setting up like this, can carry out data interaction through the mode of closed loop deciphering, and control logic is convenient, the setting of time reference comes, make data security, guarantee that data can not appear repetitious possibility, improve the possibility that the thing allies oneself with the network by external data control, two come through remove data with the cloud mode through the broadband communication send to the interactive end in, play a closed loop's effect, even guarantee that single communication data is monitored completely, also can't obtain the network input instruction of thing allies oneself with, thirdly, unblock mode data volume is very little, guarantee the response efficiency of system.
Drawings
FIG. 1: the invention relates to a system topological graph of an intelligent household Internet of things closed-loop decryption system;
FIG. 2: the invention discloses a control simplified diagram of an intelligent household Internet of things closed-loop decryption system.
Reference numerals: 100. an intelligent power utilization end; 110. a data transceiver module; 120. a response module; 200. a control end; 210. an input module; 220. an instruction sending module; 230. a feedback receiving module; 300. unlocking the server; 310. a verification analysis unit; 320. a decryption unit; 330. a permitting unit; 400. and (4) an interactive end.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in order to make the technical solution of the present invention easier to understand and understand.
An intelligent household Internet of things closed-loop decryption system comprises an Internet of things network, wherein the Internet of things network comprises a plurality of intelligent power utilization terminals 100, a control terminal 200 and an interaction terminal 400, the control terminal 200 is connected to an unlocking server 300 through mobile communication, and the interaction terminal 400 is connected to the unlocking server 300 through broadband communication; firstly, the intelligent power consumption end 100 includes all intelligent units in the intelligent home system, and as long as the intelligent units have a signal transceiving function and can perform embedded control through instructions, the intelligent units can be used as intelligent power consumption units, such as power consumption devices of a switch, a television, a refrigerator, and lights, and it should be noted that the internet of things can forward data to other intelligent power consumption ends 100 for communication only through any one intelligent power consumption end 100, that is, a general internet of things can control any other intelligent power consumption device through one intelligent power consumption device, the internet of things has the advantage that the intelligent power consumption end 100 at any position can be controlled to operate at any position in a room, the control end 200 is generally selected as a mobile terminal, and the mobile terminal defines each module through an embedded program. The control terminal 200 communicates with the unlocking server 300 through a mobile network, and the unlocking server 300 can verify the user information uploaded by the control terminal 200, which is simple and convenient. The interactive terminal 400 can be understood as a central server in an intelligent home, and can perform network connection, and can perform unified management on all intelligent electric devices in the intelligent home, thereby achieving the gateway effect.
The control terminal 200 includes an input module 210, an instruction sending module 220, and a feedback receiving module 230, where a user inputs user information through the input module 210, the user generates a control instruction or an unlocking instruction through the input module 210, the instruction sending module 220 is configured to send the control instruction or the unlocking instruction, and the control instruction includes a controlled device address and control content; the input module 210 includes a fingerprint input unit, a sound input unit, a key-in unit, and an image input unit, where the fingerprint input unit is used to input user fingerprint information in user information, the sound input unit is used to input user sound information in user information, the key-in unit is used to input user text information in user information, and the image input unit is used to input user image information in user information. The input module 210 is not described in detail, may input user information, and the user verifies the identity of the user, and may also input a control instruction or an unlocking instruction through an interface presented by the control terminal 200 or a preset control policy, and all the intelligent power consumers 100 are in a static state under a normal condition, that is, in a standby state, and only by sending the unlocking instruction, the corresponding intelligent power consumer 100 can be unlocked, and the feedback receiving module 230 is configured to receive information fed back by the intelligent power consumer 100 to confirm that the intelligent power consumer 100 receives the unlocking instruction. For example, the intelligent power consumer 100A receives the control command, and the control command is address information of the intelligent power consumer 100X, so that a needs to forward the information to the intelligent power consumer 100X through the internet of things, and all other intelligent power consumers 100 can be controlled through the intelligent power consumer 100A.
The intelligent power consumption terminal 100 includes a data transceiver module 110 and a response module 120, where the data transceiver module 110 is configured to receive the control instruction, the response module 120 is configured to respond to the control instruction, and the response module 120 includes a state configuration unit, where the state configuration unit is configured to configure the response module 120 into a static service state or a dynamic service state; the data transceiver module 110 has two functions, one is to communicate with the control terminal 200 for receiving an unlocking command or a control command, and the other is to transmit the control command to the inside of the internet of things in a forwarding manner, which has two advantages: 1. the limitation of a control space caused by a centralized control mode is avoided, that is, in any space, as long as the space is connected with the nearest intelligent power utilization terminal 100, all equipment in the internet of things can be controlled to work through the intelligent power utilization terminal 100; 2. the safety of the internet of things is ensured, and the method has the advantages that all other intelligent power consumption ends 100 cannot receive the instruction sent by other intelligent power consumption ends 100 in the control process, so that external control (including the control end 200) is avoided; 3. when one intelligent power consumption terminal 100 is selected, the control command is simplified enough, so that high-speed and high-efficiency control can be realized. The purpose of the response module 120 is to configure the intelligent power consumer 100 into a dynamic service state or a static service state according to the situation, it should be noted that only the intelligent power consumer 100 "activated" by the control terminal 200 is in the dynamic service state, and the other intelligent power consumers 100 are in the static service state.
When the response module 120 is in a dynamic service state and receives the control instruction, verifying the control instruction through a verification policy, sending the verified control instruction to the corresponding intelligent power consumption end 100 through the internet of things according to the address of the controlled device, and controlling the intelligent power consumption end 100 to execute the control content in the control instruction; the static service state does not receive the control instruction, only receives the unlocking instruction, and obtains the first reference time value after simplifying the obtained data by obtaining the first reference time value (the first reference time value obtained at each moment is different) and preferably taking 4 bits after the decimal point after the second when the unlocking instruction is received, so that the static service state is simple and convenient and has a control effect. And then, a first cipher text is obtained by encrypting through a first encryption algorithm, and the response module 120 stores a first reference time value, where the first reference time value may be understood as an independent random value, the intelligent power consumer 100 stores the first reference time value by establishing a position stamp on the timer, where the position stamp reflects a relative relationship between the actual time of the timer and the first reference time value, and when the actual time in the timer is modified, the first reference time value of the intelligent power consumer 100 is correspondingly changed. The first reference time value has a size of between 8 bits and 16 bits. That is, if the timer of the intelligent power consumer 100 is modified, the data intrusion into the intelligent power consumer 100 cannot be realized, and meanwhile, because the time value of each timer is different, the theoretical random number ensures that the required control command is different even after the same intelligent power consumer is activated, and the intelligent power consumer 100 cannot be controlled even if the communication data is intercepted.
When the response module 120 is in the static service state and receives the unlocking instruction, acquiring a first reference time value by using a timer of the intelligent power consumption terminal 100, encrypting the first reference time value by using a first encryption algorithm to obtain a first ciphertext, and sending the first ciphertext to the control terminal 200; the static service state does not receive the control instruction, only receives the unlocking instruction, and obtains the first reference time value after simplifying the obtained data by obtaining the first reference time value (the first reference time value obtained at each moment is different) and preferably taking 4 bits after the decimal point after the second when the unlocking instruction is received, so that the static service state is simple and convenient and has a control effect. And then, a first cipher text is obtained by encrypting through a first encryption algorithm, and the response module 120 stores a first reference time value, where the first reference time value may be understood as an independent random value, the intelligent power consumer 100 stores the first reference time value by establishing a position stamp on the timer, where the position stamp reflects a relative relationship between the actual time of the timer and the first reference time value, and when the actual time in the timer is modified, the first reference time value of the intelligent power consumer 100 is correspondingly changed. The first reference time value has a size of between 8 bits and 16 bits. That is, if the timer of the intelligent power consumer 100 is modified, the data intrusion into the intelligent power consumer 100 cannot be realized, and meanwhile, because the time value of each timer is different, the theoretical random number ensures that the required control command is different even after the same intelligent power consumer is activated, and the intelligent power consumer 100 cannot be controlled even if the communication data is intercepted.
The feedback receiving module 230 is configured with a feedback policy, where the feedback policy includes that when the feedback receiving module 230 receives the first ciphertext, the first ciphertext is decrypted by using a first decryption algorithm to obtain a first secret value and a second ciphertext, and the first ciphertext and the second ciphertext are uploaded to the unlocking server 300 according to the second ciphertext and the user information; the control end 200 sends the generated first secret value to the instruction sending module 220, and the instruction sending module 220 adds the first secret value to the sent control instruction when sending the control instruction; the control terminal 200 has a first decryption algorithm, and decrypts the first ciphertext by the first decryption algorithm to obtain a second ciphertext and a first key, and uploads the second ciphertext and user information, where the user information is used to verify the user identity, that is, after the user identity is confirmed, the unlocking server 300 processes the second ciphertext.
The unlocking server 300 is configured with an unlocking service module, and the unlocking service module includes a verification analysis unit 310 and a decryption unit 320; the verification analysis unit 310 is configured to analyze and verify the user information, and when the user information passes verification, send a corresponding second ciphertext to the decryption unit 320, where the decryption unit 320 is configured with a second decryption algorithm to decrypt the second ciphertext to obtain a second secret value, and send the second secret value to the interaction terminal 400; after the unlocking server 300 processes the second ciphertext, a second secret value is obtained, where the second secret value is different from the first secret value, and the second secret value may be understood as a new secret key, and the secret key is sent to the smart consumer 100 to obtain the first secret value.
The interactive terminal 400 generates a permission instruction according to the second secret value and sends the permission instruction to the corresponding intelligent power consumption terminal 100, the intelligent power consumption terminal 100 obtains a first secret value according to the first time reference value and the second secret value through a third decryption algorithm, and the obtained first secret value is used as a verification strategy to verify the parameter of the control instruction; that is, the third decryption algorithm needs the second secret value and the first time reference value to obtain the first secret value (because the intelligent power consumer 100 is configured with the first encryption algorithm), in order to improve the security, the constant values in the encryption and decryption algorithms used by different intelligent power consumers 100 are different, without affecting the first secret value of the result, which is generated according to the time of the timer, therefore, the method has randomness and ensures data security, at this time, the intelligent power consumption end 100 and the control end 200 respectively have a first secret value (as a 'secret number' for communication between the intelligent power consumption end 100 and the control end 200) corresponding to the same first time reference value, here, for the purpose of communication efficiency, repeated encryption is not set for the first secret value, therefore, the control command can be verified only by the same comparison, which is more convenient.
The permission instruction includes a permission condition, when the intelligent power consumer 100 receives the permission instruction, the intelligent power consumer verifies a parameter of the control instruction by using a first reference time value as a verification policy, and the state configuration unit configures the response module 120 into a dynamic service state; when the intelligent power consumer 100 receives the permission command, it indicates that the verification is completed, and therefore, the command can be switched.
After the intelligent power consumer 100 meets the permission condition, the state configuration unit configures the response module 120 from the dynamic service state to the static service state. The permission condition includes configuring a first preset time, and when the corresponding intelligent power consumption end 100 does not receive the control instruction and exceeds the first preset time, the intelligent user end judges that the permission condition is met. The permission condition includes configuring a first preset number of times, and when the number of times that the corresponding intelligent power consumption terminal 100 receives the control instruction exceeds the first preset number of times, the intelligent user terminal determines that the permission condition is satisfied. The permission condition may be, but is not limited to, a time when another smart user is activated, and a time when the smart user is deactivated, and a time when the smart user is activated.
Preferably, the control end 200 is configured with an identification number value, and the identification number value is added to the sent control instruction when the instruction sending module 220 sends the control instruction; when the control terminal 200 sends a permission instruction to the corresponding intelligent power consumption terminal 100, the identification number value is sent at the same time, and when the intelligent power consumption terminal 100 receives the identification number value, the identification number value is used as a verification strategy to verify the parameter of the control instruction. The safety and the reliability of the system are improved. The identification number value is between 8 bits and 16 bits in size. The first secret has a size of between 4 bits and 8 bits. The second secret has a size of between 4 bits and 8 bits.
The above are only typical examples of the present invention, and besides, the present invention may have other embodiments, and all the technical solutions formed by equivalent substitutions or equivalent changes are within the scope of the present invention as claimed.

Claims (9)

1. The intelligent household Internet of things closed-loop decryption system is characterized by comprising an Internet of things network, wherein the Internet of things network comprises a plurality of intelligent power utilization ends, a control end and an interaction end, the control end is connected to an unlocking server through mobile communication, and the interaction end is connected to the unlocking server through broadband communication;
the control end comprises an input module, an instruction sending module and a feedback receiving module, a user inputs user information through the input module, the user generates a control instruction or an unlocking instruction through the input module, the instruction sending module is used for sending the control instruction or the unlocking instruction, and the control instruction comprises a controlled device address and control content;
the intelligent power utilization end comprises a data receiving and transmitting module and a response module, the data receiving and transmitting module is used for receiving the control instruction, the response module is used for responding to the control instruction, the response module comprises a state configuration unit, and the state configuration unit is used for configuring the response module into a static service state or a dynamic service state;
when the response module is in a dynamic service state and receives the control instruction, verifying the control instruction through a verification strategy, sending the verified control instruction to a corresponding intelligent power utilization end through an internet of things according to the address of the controlled equipment, and controlling the intelligent power utilization end to execute the control content in the control instruction;
when the response module is in a static service state and receives the unlocking instruction, a first reference time value is obtained through a timer of the intelligent power utilization end, the first reference time value is encrypted through a first encryption algorithm to obtain a first ciphertext, and the first ciphertext is sent to the control end;
the feedback receiving module is configured with a feedback strategy, and the feedback strategy comprises the steps of decrypting a first ciphertext through a first decryption algorithm to obtain a first secret value and a second ciphertext when the feedback receiving module receives the first ciphertext, and uploading the first ciphertext and user information to the unlocking server according to the second ciphertext; the control end sends the generated first secret value to an instruction sending module, and the first secret value is added into the sent control instruction when the instruction sending module sends the control instruction;
the unlocking server is configured with an unlocking service module, and the unlocking service module comprises a verification analysis unit and a decryption unit; the verification analysis unit is used for analyzing and verifying the user information, and when the user information passes verification, the corresponding second ciphertext is sent to the decryption unit, and the decryption unit is configured with a second decryption algorithm to decrypt the second ciphertext to obtain a second secret value and send the second secret value to the interaction terminal;
the interactive end generates a permission instruction according to the second secret value and sends the permission instruction to a corresponding intelligent power consumption end, the intelligent power consumption end obtains a first secret value according to a first time reference value and the second secret value through a third decryption algorithm, and the obtained first secret value is used as a verification strategy to verify the parameter of the control instruction;
the permission instruction comprises a permission condition, when the intelligent power utilization terminal receives the permission instruction, a first reference time value is used as a verification strategy to verify a parameter of the control instruction, and the state configuration unit configures the response module into a dynamic service state;
and after the intelligent power utilization end meets the permission condition, the state configuration unit configures the response module from a dynamic service state to a static service state.
2. The smart home internet of things closed-loop decryption system of claim 1, wherein the input module comprises a fingerprint input unit, a sound input unit, a key-in unit and an image input unit, the fingerprint input unit is used for inputting user fingerprint information in user information, the sound input unit is used for inputting user sound information in the user information, the key-in unit is used for inputting user text information in the user information, and the image input unit is used for inputting user image information in the user information.
3. The smart home Internet of things closed-loop decryption system according to claim 1, wherein the control end is configured with an identification number value, and the identification number value is added to the sent control instruction when the instruction sending module sends the control instruction;
and when the intelligent power utilization end receives the identification number value, the identification number value is used as a verification strategy to verify the parameters of the control command.
4. The smart home internet of things closed-loop decryption system of claim 3, wherein the identification number value is between 8 bits and 16 bits.
5. The smart home internet of things closed-loop decryption system of claim 1, wherein the first secret value is between 4 bits and 8 bits in size.
6. The smart home internet of things closed-loop decryption system of claim 1, wherein the second secret value is between 4 bits and 8 bits in size.
7. The smart home internet of things closed-loop decryption system of claim 1, wherein the smart electricity consumer stores a first reference time value by establishing a position stamp on the timer, the position stamp reflecting a relative relationship between an actual time of the timer and the first reference time value, and when the actual time in the timer is modified, the first reference time value of the smart electricity consumer is changed accordingly.
8. The smart home internet of things closed-loop decryption system of claim 1, wherein the permission condition includes configuring a first preset time, and when the corresponding smart power consumption end does not receive the control instruction and exceeds the first preset time, the smart power consumption end determines that the permission condition is satisfied.
9. The smart home internet of things closed-loop decryption system of claim 1, wherein the permission condition includes configuring a first preset number of times, and when the number of times that the corresponding smart user receives the control command exceeds the first preset number of times, the smart user determines that the permission condition is satisfied.
CN201811295303.5A 2018-11-01 2018-11-01 Intelligent household Internet of things closed-loop decryption system Active CN109039844B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811295303.5A CN109039844B (en) 2018-11-01 2018-11-01 Intelligent household Internet of things closed-loop decryption system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811295303.5A CN109039844B (en) 2018-11-01 2018-11-01 Intelligent household Internet of things closed-loop decryption system

Publications (2)

Publication Number Publication Date
CN109039844A CN109039844A (en) 2018-12-18
CN109039844B true CN109039844B (en) 2021-07-16

Family

ID=64614705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811295303.5A Active CN109039844B (en) 2018-11-01 2018-11-01 Intelligent household Internet of things closed-loop decryption system

Country Status (1)

Country Link
CN (1) CN109039844B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Two-way safety verification method and system based on portable device
CN104881014A (en) * 2015-05-29 2015-09-02 四川长虹电器股份有限公司 Control method and intelligent household control device
CN106059869A (en) * 2016-07-26 2016-10-26 北京握奇智能科技有限公司 Internet of things smart home equipment safety control method and system
CN106533861A (en) * 2016-11-18 2017-03-22 郑州信大捷安信息技术股份有限公司 Security control system and authentication method of smart home Internet of Things
CN106856430A (en) * 2015-12-08 2017-06-16 北京奇虎科技有限公司 The long-range control method and device of smart home, system
CN107070754A (en) * 2016-12-30 2017-08-18 深圳智乐信息科技有限公司 A kind of method and system for automatically adjusting smart home
CN108205836A (en) * 2017-12-21 2018-06-26 广东汇泰龙科技有限公司 A kind of the smart home interlock method and system of the infrared human body sensing based on cloud lock

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9544636B2 (en) * 2014-07-07 2017-01-10 Google Inc. Method and system for editing event categories

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Two-way safety verification method and system based on portable device
CN104881014A (en) * 2015-05-29 2015-09-02 四川长虹电器股份有限公司 Control method and intelligent household control device
CN106856430A (en) * 2015-12-08 2017-06-16 北京奇虎科技有限公司 The long-range control method and device of smart home, system
CN106059869A (en) * 2016-07-26 2016-10-26 北京握奇智能科技有限公司 Internet of things smart home equipment safety control method and system
CN106533861A (en) * 2016-11-18 2017-03-22 郑州信大捷安信息技术股份有限公司 Security control system and authentication method of smart home Internet of Things
CN107070754A (en) * 2016-12-30 2017-08-18 深圳智乐信息科技有限公司 A kind of method and system for automatically adjusting smart home
CN108205836A (en) * 2017-12-21 2018-06-26 广东汇泰龙科技有限公司 A kind of the smart home interlock method and system of the infrared human body sensing based on cloud lock

Also Published As

Publication number Publication date
CN109039844A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN105959189B (en) Household appliance and its with the communication system and method for Cloud Server and terminal, terminal
CN102422552B (en) Arrangement for managing wireless communication between devices
De Luca et al. The use of NFC and Android technologies to enable a KNX-based smart home
CN102130802A (en) Internet of things home appliance management system and management method
US20140082702A1 (en) Systems and methods for controlling and communicating with connected devices
KR101878708B1 (en) Energy management system of smart electric home appliances using security-enhanced residential gateway device
CN105159121B (en) Household electrical appliance and its on-off control method and system and smart machine
CN105471974A (en) Intelligent equipment capable of realizing remote control, terminal equipment and method
KR101876183B1 (en) Security-enhanced residential gateway device based on internet of things
CN105763559B (en) A kind of intelligent home control system and method
KR101878710B1 (en) Smart home maintenance system using security-enhanced residential gateway device
CN108122316A (en) Door lock communication system and method based on safety chip
CN110224822A (en) A kind of cryptographic key negotiation method and system
Sowah et al. Design of a secure wireless home automation system with an open home automation bus (OpenHAB 2) framework
Adiono et al. Intelligent and secured software application for IoT based smart home
CN112769868A (en) Communication method, communication device, electronic device and storage medium
CN102611759A (en) Internet of things (IOT) household appliance management system and IOT household appliance management method
CN109309608B (en) Intelligent home Internet of things wide-area dynamic unlocking system
CN109358520B (en) Local dynamic unlocking system for smart home Internet of things
CN106936841B (en) Safety protecting method and system in smart home
WO2019218328A1 (en) Smart door lock wireless communication method, smart door lock, gateway, and communication device
CN109039844B (en) Intelligent household Internet of things closed-loop decryption system
CN109246147B (en) Intelligent home decryption system based on dynamic address table
CN107294822A (en) A kind of intelligent home control system and method
CN106066658B (en) Internet of things intelligent household temperature control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Huang Hongming

Inventor after: Lin Wozhan

Inventor after: Zhang Qiang

Inventor after: Liu Weiliang

Inventor before: Liu Weiliang

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20210628

Address after: 518000 1003, building 3b, hongrongyuan Shangjun phase II, Longping community, Dalang street, Longhua District, Shenzhen City, Guangdong Province

Applicant after: Bairunsheng Technology (Shenzhen) Co.,Ltd.

Address before: Xiamen liangjiajiang Furniture Co., Ltd

Applicant before: Liu Weiliang

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant