CN109547303A - Control method and relevant device - Google Patents

Control method and relevant device Download PDF

Info

Publication number
CN109547303A
CN109547303A CN201811390756.6A CN201811390756A CN109547303A CN 109547303 A CN109547303 A CN 109547303A CN 201811390756 A CN201811390756 A CN 201811390756A CN 109547303 A CN109547303 A CN 109547303A
Authority
CN
China
Prior art keywords
equipment end
factor
control terminal
transmission
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811390756.6A
Other languages
Chinese (zh)
Other versions
CN109547303B (en
Inventor
靳松
胡庆格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huada Zhibao Electronic System Co Ltd
Original Assignee
Beijing Huada Zhibao Electronic System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huada Zhibao Electronic System Co Ltd filed Critical Beijing Huada Zhibao Electronic System Co Ltd
Priority to CN201811390756.6A priority Critical patent/CN109547303B/en
Publication of CN109547303A publication Critical patent/CN109547303A/en
Application granted granted Critical
Publication of CN109547303B publication Critical patent/CN109547303B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Automation & Control Theory (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of control method, comprising: when receiving control instruction, sends director data transmission request to equipment end, triggers the equipment end and carry out authentication to the control terminal;When authentication of the control terminal by the equipment end, the first transmission key is determined, director data to be transmitted is encrypted;It will be transmitted to the equipment end by the described instruction data of encryption, so that execution is corresponding with described instruction data to control operation after the equipment end obtains described instruction data;By applying method of the invention, equipment end improves safety of the data in transmission process by the authentication to control terminal;By the transmission key of determine instruction data encrypting and decrypting in transmission, director data is encrypted in transmission, is realized safety of the data in transmission, be ensure that the confidentiality of data transmission.

Description

Control method and relevant device
Technical field
The present invention relates to data information security fields, more particularly to a kind of control method and relevant device.
Background technique
With the fast development of science and technology, smart machine applies the every aspect in we live, and can pass through Long-range internet connection is also or local area network is connected with the bluetooth near field, NFC, by the plaintext transmission of data, realizes remote Process control smart machine, realizes smart home life, keeps our life more convenient.
Inventor pass through the prior art the study found that digital information during transmission be easy stolen by criminal, Safety is low, therefore needs to encrypt the data of transmission, protects the data information to be transmitted, improves the peace of data information Quan Xing.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of control method, can digital information transmission process The middle safety for improving digital information, reduces a possibility that information is stolen, the safety of improve data transfer.
The present invention also provides a kind of control devices, to guarantee the realization and application of the above method in practice.
A kind of control method, comprising:
When receiving control instruction, director data transmission instruction is sent to equipment end, triggers the equipment end to described Control terminal carries out authentication;
When authentication of the control terminal by the equipment end, the first channel calculation factor is determined;
According to the first channel calculation factor, the first transmission key carried out data transmission with the equipment end is generated;
The first channel calculation factor is encrypted using first transmission key, generates encrypted cipher text;
The encrypted cipher text is sent to the equipment end, is solved with triggering the equipment end to the encrypted cipher text It is close, the first channel calculation factor is obtained, and the first channel calculation factor and pre-generated second channel are calculated The factor is compared;
When the first channel calculation factor and the second channel, which calculate the factor, compares consistent, passed using described first Defeated key encrypts director data to be transmitted;
It will be transmitted to the equipment end by the described instruction data of encryption, so that the equipment end obtains described instruction number According to rear, execution control operation corresponding with described instruction data.
In above-mentioned method, optionally, the triggering equipment end carries out authentication to the control terminal, comprising:
It triggers the equipment end and sends identification strings and random string to the control terminal;
When receiving the identification strings, preset certification root key is called to carry out the identification strings Disperse operation, obtains the first authentication key;
The random string is encrypted according to first authentication key, obtains certification ciphertext;
The certification ciphertext is sent to the equipment end, so that the certification ciphertext is decrypted in the equipment end, The random string for including in the certification ciphertext is obtained, and authenticates the random string for including in ciphertext by described and is sent to The random string of the control terminal is matched, and when matching consistent, passes through the authentication to the control terminal.
In above-mentioned method, optionally, the first channel calculation of determination factor, comprising:
According to preset channel root key, operation is carried out to the identification strings, obtains the first channel meter Calculate the factor.
In above-mentioned method, optionally, the first transmission key that the generation carries out data transmission with the equipment end, packet It includes:
Obtain the single channel encryption factor;
According to the first channel calculation factor, cryptographic calculation is carried out to the single channel encryption factor, obtains described first Transmission key.
In above-mentioned method, optionally, the encrypted cipher text is decrypted in the triggering equipment end, described in acquisition The first channel calculation factor, comprising:
It triggers the equipment end and calls the second pre-generated transmission key, the encrypted cipher text is decrypted, obtain The first channel calculation factor, second transmission key are the equipment end according to the second channel calculating factor, meter Calculate the transmission key obtained.
A kind of control device is applied to control terminal, comprising:
Trigger unit, for sending director data transmission to equipment end and requesting, described in triggering when receiving control instruction Equipment end carries out authentication to the control terminal;
Determination unit, for determining the first channel calculation when authentication of the control terminal by the equipment end The factor;
Generation unit, for what is carried out data transmission according to the first channel calculation factor, generation with the equipment end First transmission key;
First encryption unit, for being encrypted using first transmission key to the first channel calculation factor, Generate encrypted cipher text;
Transmission unit is added for the encrypted cipher text to be sent to the equipment end with triggering the equipment end to described Ciphertext is decrypted, and obtains the first channel calculation factor, and by the first channel calculation factor and pre-generated Second channel calculates the factor and is compared;
Second encryption unit, for calculating the factor when the first channel calculation factor and the second channel and comparing unanimously When, using first transmission key, director data to be transmitted is encrypted;
First control unit, for the described instruction data for passing through encryption to be transmitted to the equipment end, so that described set After standby end obtains described instruction data, control operation corresponding with described instruction data is executed.
A kind of control method is applied to equipment end, comprising:
When receiving the director data by encryption of control terminal transmission, according to preset second transmission key pair The director data by encryption is decrypted, and obtains described instruction data;
The equipment end is controlled according to described instruction data.
Above-mentioned method, optionally, second transmission key preset process, comprising:
The factor is calculated using preset second channel, the single channel encryption factor for including in the equipment end is added Close operation obtains second transmission key.
A kind of control unit is applied to equipment end, comprising:
Decryption unit, for when receive control terminal transmission by encryption director data when, according to preset The director data by encryption is decrypted in second transmission key, obtains described instruction data;
Second control unit, for controlling according to described instruction data the equipment end.
A kind of control system, comprising:
Control terminal and equipment end;
Wherein:
The control terminal, for executing the above-mentioned control method applied to control terminal;
The equipment end, for executing the above-mentioned control method applied to equipment end.
Compared with prior art, the present invention includes the following advantages:
In method provided in an embodiment of the present invention, comprising: when receiving control instruction, send director data to equipment end Transmission request triggers the equipment end and carries out authentication to the control terminal;When the control terminal passes through the equipment end When authentication, the first transmission key is determined, the ciphertext according to the encryption of the first transmission key is sent to the equipment end, with touching Sending out equipment end described is decrypted the encrypted cipher text, and by applying method of the invention, equipment end passes through to control terminal body Part certification, and when control terminal has been determined to transmission data command encrypted, equipment end to the data command of encryption into The transmission key of row decryption, to improve the safety for transmitting data command between both-end, the confidentiality of data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of control method flow chart provided by the invention;
Fig. 2 is a kind of another flow chart of control method provided by the invention;
Fig. 3 is a kind of another flow chart of control method provided by the invention;
Fig. 4 is a kind of another flow chart of control method provided by the invention;
Fig. 5 is a kind of another flow chart of control method provided by the invention;
Fig. 6 is a kind of structural schematic diagram of control device provided by the invention;
Fig. 7 is a kind of another structural schematic diagram of control device provided by the invention;
Fig. 8 is a kind of structural schematic diagram of control system provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In this application, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship on border perhaps sequence the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, from And to include the process, method, article or equipments of a series of elements not only to include those elements, but also including not bright The other element really listed, or further include for elements inherent to such a process, method, article, or device.Do not having In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that include the element process, There is also other identical elements in method, article or equipment.
The present invention can be used in numerous general or specialized network equipment environment or configuration.Such as: personal computer, server Computer, internet device, intelligent door lock, intelligent air condition, electronic product including any of the above device or intelligence etc..
The embodiment of the invention provides a kind of control method, this method can be applied in a variety of smart electronics products, Its executing subject can be the server or smart electronics product main body of smart electronics product, such as personal computer, put down Plate computer, smart phone etc., the flow chart of the method is as shown in Figure 1, specifically include:
S101: when receiving control instruction, director data transmission instruction is sent to equipment end, triggers the equipment end pair The control terminal carries out authentication;
In method provided in an embodiment of the present invention, when control terminal receives the control instruction that user operates equipment end When, control terminal sends the data transfer request of control instruction to equipment end, thus triggers the equipment end to the control terminal Authentication process;
It should be noted that the control terminal and equipment end can be the smart machine end with wireless connecting function, than Such as control terminal and equipment end can be carried out the connection of internet, local area network, bluetooth or NFC wireless network, can pass through Electronic channel carries out data transmission and receives, and control terminal can be smart phone, tablet computer etc., and equipment end can be can be into The air-conditioning of row bluetooth connection or internet connection, refrigerator, intelligent door lock etc..
S102: when authentication of the control terminal by the equipment end, the first channel calculation factor is determined;
In method provided in an embodiment of the present invention, when authentication of the control terminal by the equipment end, control End sends acquisition instruction to equipment end, and equipment end sends identification strings, control when receiving the acquisition instruction, to control terminal End processed carries out operation when receiving the identification strings, to the identification strings, obtains the first channel calculation factor.This In the method that inventive embodiments provide, the identification strings can be the device id of the equipment end.
S103: according to the first channel calculation factor, the first transmission carried out data transmission with the equipment end is generated Key;
In method provided in an embodiment of the present invention, control terminal obtains the single channel encryption factor, and according to the first channel meter The factor is calculated, operation is carried out to the single channel encryption factor of acquisition, it is close to obtain the carry out data transmission with the equipment end first transmission Key, first transmission key is for encrypting described instruction data, to guarantee the safety of data transmission.
In method provided in an embodiment of the present invention, the single channel encryption factor can be obtained from equipment end, the channel The random number that encryption factor can generate for equipment end is also possible to generation that control terminal is made an appointment with equipment end, synchronous Data.
S104: encrypting the first channel calculation factor using first transmission key, generates encrypted cipher text;
S105: being sent to the equipment end for the encrypted cipher text, with trigger the equipment end to the encrypted cipher text into Row decryption, obtains the first channel calculation factor, and by the first channel calculation factor and pre-generated second channel The factor is calculated to be compared;
In method provided in an embodiment of the present invention, the control terminal is sent to the equipment end to the first channel calculation factor The encrypted cipher text for carrying out encryption generation, triggers the control terminal and operation is decrypted to the encrypted cipher text, when equipment end is to institute It states encrypted cipher text to be decrypted, obtains the first channel calculation because of the period of the day from 11 p.m. to 1 a.m, equipment end is by the first channel calculation factor and in advance The second channel of generation calculates the factor and is compared, when the alignment is identical, it is determined that control terminal to director data to be transmitted into The key of row encryption;The pre-generated second channel calculates the factor, is that the equipment end is raw according to preset mode At.
S106: when the first channel calculation factor and the second channel, which calculate the factor, compares consistent, using described First transmission key encrypts director data to be transmitted;
In method provided in an embodiment of the present invention, when the first channel calculation factor that equipment end is decrypted with preset It is compared in the second channel factor of equipment end, when the two is consistent, the control terminal applies first transmission key, right Director data to be transmitted is encrypted, to realize the confidentiality of data;It should be noted that when equipment end decrypt the When the one channel calculation factor and the second channel calculating factor compare consistent, to control terminal feedback ratio to consistent information;Thus really The key that control terminal encrypts director data to be transmitted, i.e. the first transmission key are determined.
S107: will be transmitted to the equipment end by the described instruction data of encryption, so that described in equipment end acquisition After director data, control operation corresponding with described instruction data is executed;
In method provided in an embodiment of the present invention, the encrypted director data of the control terminal is sent to the equipment end, It is decrypted after equipment end receives the encrypted instruction, to obtain described instruction data, according to described instruction data Execute corresponding instruction control operation.
In method provided in an embodiment of the present invention, when receiving control instruction, transmission director data is sent to equipment end Request triggers the equipment end and carries out authentication to control terminal;When the control terminal passes through the authentication of the equipment end When, the control terminal sends the director data by encryption to the equipment end, and the equipment end is decrypted, and foundation Obtained director data executes corresponding instruction control operation;In providing method of the embodiment of the present invention, by equipment end to control The authentication at end improves safety of the data in transmission, when director data is transmitted, it is determined that director data exists The key encrypted when transmission, data are encrypted, and ensure that the confidentiality of data, method provided in an embodiment of the present invention It is one-time pad, effectively prevents Replay Attack, improves the safety of data.
In method provided in an embodiment of the present invention, the equipment end needs to carry out authentication to the control terminal, to keep away Exempt from equipment end to be attacked by criminal, cause damages, the authentication process to control terminal is as shown in Fig. 2, detailed process is as follows It is shown:
S201: the equipment end is triggered to the control terminal and sends identification strings and random string;
In method provided in an embodiment of the present invention, when needing to carry out authentication to the control terminal, the control terminal The instruction for obtaining identification strings and random string is sent to the equipment end;The equipment end receives acquisition instruction, to The control terminal feedback indicator character string and random string, the identification strings can be the unique identifying number of equipment end, It is also possible to the coordinates datas such as sequence number SN;It should be noted that the unique identifying number of the equipment end is that equipment end is producing When be previously written unique, unduplicated identification number character string;The random string is 8 bytes that equipment end generates at random Random string, generate random string be also possible to 16 bytes, 32 bytes etc., it is not limited to 8 bytes it is random Character string;It should be noted that can be sent simultaneously when equipment end sends identification strings and random string to control terminal, It can also successively send.
It should be noted that equipment end is sent in this step identification strings and random string can be encrypted transmission , such as using control terminal is transferred to after control terminal public key encryption, this ensure that identification strings, random string transmit Safety.
S202: when receiving the identification strings, call preset certification root key to the mark character String carries out dispersion operation, obtains the first authentication key;
In method provided in an embodiment of the present invention, when receiving the identification strings of the equipment end feedback, the control End processed calls preset certification root key to carry out dispersion operation to the identification strings, obtains the first authentication key;
It should be noted that the preset certification root key is the symmetric key of 16 bytes, root key pair is authenticated Unique identification number carries out dispersion operation, obtains unique authentication key, the authentication key of each equipment end is all different;Recognize Card key is used to authenticate external accessed node, such as the identity of certification control terminal.
S203: encrypting the random string according to first authentication key, obtains certification ciphertext;
In method provided in an embodiment of the present invention, when the certification root key carries out dispersion fortune to the identification strings It calculates, after obtaining the first authentication key, carries out cryptographic calculation according to random string of first authentication key to acquisition, obtain To certification ciphertext.
S204: the certification ciphertext is sent to the equipment end, so that the equipment end carries out the certification ciphertext Decryption, obtain it is described certification ciphertext in include random string, and by it is described certification ciphertext in include random string with The random string for being sent to the control terminal is matched, and when matching consistent, passes through the authentication to the control terminal;
In method provided in an embodiment of the present invention, when the equipment end receives the certification ciphertext of control terminal transmission, use Operation is decrypted to the certification ciphertext in the authentication key for being set in advance in equipment end, obtains the identification strings, works as institute State random string it is consistent with the random string of the equipment end when, then the identity of the control terminal is legal, i.e. control terminal Authentication passes through.
It should be noted that when equipment end sent to control terminal be the unique identifying number for being previously written equipment end when, if Standby termination receives the certification ciphertext encrypted by control terminal, equipment end use the authentication key of the production system write-in in production into Row decryption oprerations;The authentication key, which is production system, carries out dispersion fortune to the unique identifying number of equipment end using certification root key It calculates, obtains corresponding authentication key;
It should be noted that be set in advance in equipment end authentication key be equipment end in process of production, by certification root Its unique identification number of key pair carries out dispersion operation, obtains unique authentication key, and unique authentication key is write Enter in equipment end, the equipment end can be intelligent door lock, intelligent air condition or intelligent water heater etc..
In method provided in an embodiment of the present invention, when sending director data to equipment end, equipment end is first to control terminal Identity is authenticated, and a possibility that equipment end is attacked by criminal is reduced, and improves the safety of data transmission;? After the certification that control terminal passes through equipment end, control terminal is also required to authenticate equipment end, avoids data transmission from occurring with this Mistake, the safety and correctness of improve data transfer, the encrypting and decrypting mathematical algorithm used in this embodiment can be state Border general-purpose algorithm 3DES, the close SM4 algorithm of state and equivalent symmetric key algorithm.
In method provided in an embodiment of the present invention, after the authentication that the equipment end passes through control terminal, control terminal The single channel encryption factor is called to carry out operation, in order to obtain the first channel calculation factor, details are provided below:
Obtain the single channel encryption factor;
According to the first channel calculation factor, cryptographic calculation is carried out to the single channel encryption factor, obtains described first Transmission key;
In method provided in an embodiment of the present invention, control terminal uses the first channel calculation by obtaining the single channel encryption factor The single channel encryption factor described in factor pair carries out cryptographic calculation, to obtain the first transmission key;The single channel encryption factor is not only The random number that only can be equipment end generation is also possible to the random number of control terminal itself generation;Also or control terminal and equipment The data generated that end is made an appointment, synchronous, such as the count value that synchronous time factor, coincidence counter generate;The control End processed is obtaining single channel encryption because of the period of the day from 11 p.m. to 1 a.m, can be by calling itself middleware, and centre obtains the laggard of the single channel encryption factor Row follow-up process.
In method provided in an embodiment of the present invention, when control terminal passes through the authentication of equipment end, it is thus necessary to determine that data The transmission key of transmission, the detailed process is as shown in figure 3, concrete operations described in Fig. 3 can be by the centre in control terminal Part carries out operation processing, and particular content is as follows:
S301: the single channel encryption factor for calling the identification strings of the equipment end and the equipment end to generate;
In method provided in an embodiment of the present invention, the identification strings that the equipment end is sent are to mark involved in Fig. 2 Know character string, the identification strings are that equipment end is sent to control terminal when authenticating to the identity of control terminal;Optionally, This programme can also re-request the identification strings for obtaining equipment end after the authentication that control terminal passes through equipment end; Optionally, this programme also can be used when the identity of equipment end certification control terminal, the identification strings that Xiang Suoshu control terminal is sent; The identification strings are the unique identifying numbers of equipment end, are also possible to the coordinates datas such as sequence number SN, are equal to equipment end ID number;
The single channel encryption factor that the equipment end generates is one group of random number that equipment end generates, when the control terminal is to control When end processed sends acquisition instruction, the equipment end generates one group of random number, and optionally, the random number is 16 bytes.
It is not only limited to random number when single channel encryption factor practical application, is also possible to control terminal and equipment end appoints in advance Fixed, the synchronous data generated, such as the count value that synchronous time factor, coincidence counter generate, with equipment end generate with The mode of machine number is compared, and the process that the random number of generation is transferred to control terminal by equipment end is eliminated.
S302: carrying out operation to the identification strings according to preset channel root key, obtains first letter Road calculates the factor;
In method provided in an embodiment of the present invention, mark of the channel root key to acquisition for being set in advance in control terminal is used Character string carries out dispersion operation using decentralized algorithm, obtains the first channel calculation factor;It should be noted that the channel root is close Key is that have in control terminal, i.e., pre-set;Channel root key is the symmetric key of 16 bytes.
S303: operation is carried out according to the single channel encryption factor described in the first channel calculation factor pair, obtains described first Transmission key;
In method provided in an embodiment of the present invention, by using the first channel calculation factor be to the single channel encryption because Son carries out operation using Encryption Algorithm, obtains the first transmission key, and the single channel encryption factor is the random number that equipment end generates; The Encryption Algorithm can be international calculation 3DES, the close SM4 algorithm of state and equivalent symmetric key algorithm;
In method provided in an embodiment of the present invention, control terminal sends acquisition instruction to equipment end, and equipment end response instructs, to The equipment end feeds back the random number of 16 bytes, random number, that is, single channel encryption factor of 16 byte;Such as smart phone with Intelligent door lock, now need to authenticate the identity of intelligent door lock, smart phone to intelligent door lock send obtain channel calculation The instruction of the factor is to intelligent door lock, and after intelligent door lock receives instruction, response instruction sends one group of single channel encryption to smart phone The factor;Optionally, the byte number of this group of single channel encryption factor can be 8 bytes, 16 bytes etc., it is provided in an embodiment of the present invention In method, Preferable scheme is that equipment end sends the random number of 16 bytes of itself generation;
It should be noted that random string described in the random number and Fig. 2 of the single channel encryption factor herein is not etc. Together, random number herein be when the identity of control terminal is by the certification of equipment end, what equipment end generated at random again, herein Random number generates transmission key for carrying out operation;And the random string in Fig. 2 is when needing to authenticate the identity of control terminal It generates, the random string is for authenticating the identity of control terminal.
When practical application, the single channel encryption factor is not only limited to random number, is also possible to control terminal and equipment end is preparatory Agreement, the synchronous data generated, such as the count value that synchronous time factor, coincidence counter generate.
S304: encrypting the first channel calculation factor using first transmission key, generates encrypted cipher text, It is sent to the equipment end, the equipment end is triggered and the encrypted cipher text is decrypted;
In method provided in an embodiment of the present invention, equipment end is using the first transmission key generated to the first channel meter It calculates the factor to be encrypted, encrypted cipher text is sent to equipment end, triggering equipment end uses the second pre-generated transmission key pair The ciphertext is decrypted, by the first channel calculation factor that decryption obtains and the second channel factor for being set in advance in equipment end It is compared, compares unanimously, then establish secure transmission tunnel between control terminal and equipment end;Control terminal is transmitted using described first Key pair needs the director data transmitted to be encrypted, and is sent to equipment end, the equipment end is using the second transmission key to institute The director data for stating encryption is decrypted, and the director data obtained according to decryption executes corresponding control operation;
It should be noted that calculating the factor to the first channel calculation factor and second channel when control section receives equipment end When comparing consistent message, thereby determine that control terminal to the encryption key of director data to be transmitted, i.e. the first transmission key; Equipment end is also determined to the decruption key of the director data of encryption, i.e. the second transmission key;Director data is carried out when determining When the key of encryption and decryption, control terminal passes through the authentication to equipment end.
It should be noted that second transmission key of equipment end is according to the second channel meter for being set in advance in equipment end The factor is calculated, what cryptographic calculation obtained is carried out to the single channel encryption factor;The second channel for being set in advance in equipment end, which calculates the factor, is During production, production system carries out dispersion operation using unique identifying number of the channel root key to equipment end and obtains equipment end It arrives, then in write device end;The channel root key has three groups of different differences of key according to safe and secret rule Key, it is corresponding to generate three groups of different channel calculation factors.
In method provided in an embodiment of the present invention, dispersed by the identification strings to equipment end using decentralized algorithm Operation obtains the first channel calculation factor;Operation is carried out using Encryption Algorithm to the single channel encryption factor using the first channel factors, The first transmission key is obtained, the first transmission key encrypts the first channel factors, is sent to equipment end, triggers equipment end Decryption process, the ciphertext is decrypted when pre-set second transmission key can be used in equipment end, will be decrypted To the first channel calculation factor calculate the factor with the second channel for being set in advance in equipment end and be compared, compare consistent then the One transmission key is the key encrypted when transmitting director data, and the second transmission key is equipment end in the finger for receiving encryption Enable key when data for decrypting;
It is worth noting that in the present invention the second transmission key also can be used as equipment end to control terminal transmit director data when The key encrypted.
In method provided in an embodiment of the present invention, further includes: when equipment end sends director data to control terminal, using institute The director data that the second transmission key sends the equipment end is stated to encrypt.
In method provided in an embodiment of the present invention, secure transmission tunnel is established in control terminal and equipment end, carries out data biography When defeated, the second transmission key that the first transmission key and equipment end that control terminal generates generate is identical traffic key;Control terminal The director data for needing to be transmitted to equipment end can be encrypted using the first transmission key, equipment end is receiving the warp When crossing the director data of encryption, the director data by encryption is decrypted using the second transmission key.The present invention is real In the method for applying example offer, when equipment end needs to transmit data to control terminal, equipment end can be close by second transmission The data that key transmits needs encrypt, with the safety for the data for ensuring to transmit to control terminal.
By applying method of the invention, safety of the data in transmission ensure that, by the instruction number to be transmitted According to being encrypted, confidentiality of the director data in transmission ensure that, and then improve safety of the data in transmission process.
In method provided in an embodiment of the present invention, it is applied to equipment end;When equipment end receives control terminal by encryption It needs that operation is decrypted when director data, equipment end is decrypted, the control process executed instruction is as shown in figure 4, tool Body is as described below:
S401: when receiving the director data by encryption of control terminal transmission, according to preset second transmission Director data described in key pair by encryption is decrypted, and obtains described instruction data;
In method provided in an embodiment of the present invention, when equipment end receives the director data by encryption of control terminal transmission When, the decryption process in equipment end is triggered, equipment end is decrypted using preset second transmission key, described to set in advance The second fixed transmission key is that equipment end uses the pre-set second channel factor pair single channel encryption factor to use Encryption Algorithm It is calculated, equipment end is decrypted the director data of encryption according to the second transmission key;The single channel encryption because Son is the single channel encryption factor that equipment end generates, that is, is sent to the single channel encryption factor of control terminal.
S402: the equipment end is controlled according to described instruction data;
In method provided in an embodiment of the present invention, solved by using director data of second transmission key to encryption It is close, director data is obtained, executes corresponding control operation according to director data.
In method provided in an embodiment of the present invention, using method provided by the invention, recognized by the identity to both sides Card improves safety of the data when sending, avoids attack of the data by criminal, transmitted in director data When, director data is encrypted using by the transmission key confirmed, encipherment protection further has been carried out to director data, into One step prevents the leakage of director data, the safety of improve data transfer.
In method provided in an embodiment of the present invention, when the equipment end receives the instruction by encryption of control terminal transmission When data, encrypted director data is decrypted using preset second transmission key;Its decrypting process is as described below:
The factor is calculated using preset second channel, the single channel encryption factor for including in the equipment end is added Close operation obtains second transmission key;
In method provided in an embodiment of the present invention, equipment end calculates the factor by using preset second channel, right The single channel encryption factor that the equipment end generates carries out cryptographic calculation, obtains second transmission key;The single channel encryption because Son is one group of random number that equipment end itself generates, and the single channel encryption factor is sent to control terminal, in order to control terminal Generate the first transmission key;The equipment end using second channel calculate factor pair be sent to the single channel encryption factor of control terminal into Row cryptographic calculation obtains the second transmission key, and the director data by encryption is decrypted by using the second transmission key, Described instruction data are obtained, and according to described instruction data, execute corresponding control operation.
In method provided in an embodiment of the present invention, carried out by the channel calculation factor by encryption for sending control terminal Decryption determines that the decruption key to encrypted instruction data, the director data for avoiding transmission are intercepted or are cracked, improve The safety of data transmission, ensure that the safety of data transmission;In method provided in an embodiment of the present invention, in order to further Illustrate method provided by the invention, carries out more detailed discussion in the examples below.
In a kind of control method provided in an embodiment of the present invention, it is applied to a kind of control system, the control system includes Control terminal and transmitting terminal send data transfer request to equipment end, trigger the equipment when control terminal receives control instruction End authenticates the identity of control terminal, by obtaining the identification strings and random string that equipment end is sent, using preparatory The operation process of setting is generated authentication key, encrypts random string using authentication key, be sent to equipment end, into And the decryption process to certification ciphertext of equipment end is triggered, detailed process is as follows for certification;
The control terminal sends acquisition instruction to equipment end, and acquisition instruction is to obtain identification strings and random string Instruction sends instruction transmission request to equipment end in control terminal and contains the acquisition identification strings instruction, and the present invention is implemented In the method that example provides, preferred scheme is that random string is 8 bytes;Equipment end receives acquisition instruction, and response obtains It instructs to equipment end and returns to identification strings and random string;When control terminal receives identification strings, the identifier word Symbol string is to be set in advance in the coordinates datas such as unique identifying number or the sequence number SN of equipment end, with pre-set certification root Unique identifying number described in key pair is calculated, and the first authentication key is obtained, according to the first authentication key to random string into Row cryptographic calculation, obtains ciphertext data D1, and certification ciphertext will be sent to equipment end by control terminal;Equipment end use is set in advance in Ciphertext data D1 is decrypted in the authentication key of equipment end, obtains authentication data D2, equipment end decryption is obtained with Machine character string is compared with the random string for being sent to the control terminal, compares consistent then identity of the equipment end to control terminal Certification passes through;
Optionally, when equipment end receives acquisition instruction, equipment end response instruction sends mark character to control terminal String, control terminal use preset certification root key, carry out dispersion operation to the identification strings of acquisition, it is close to obtain the first certification root Key;The equipment end sends random string to control terminal again, control terminal using generation first authentication key to obtain with Machine character string carries out cryptographic calculation, and the certification ciphertext of encryption is sent to equipment end by the certification ciphertext encrypted;In order to set Standby end is decrypted using pre-set authentication key, and equipment end compares the random string and be sent to control that decryption obtains Whether the random string at end is consistent, if unanimously, the identity of control terminal passes through certification;It should be noted that equipment end is rung The control instruction for answering control terminal to send, when equipment end sends identification strings and random string to control terminal, the two can be same When send;It can also successively send, there is no successive point when successively sending.
The authentication key for being set in advance in equipment end is equipment end in production, and the certification root key in production system is to setting The unique identifying number at standby end carries out dispersion operation, forms authentication key corresponding with each identification number, and by the authentication key It is written in corresponding equipment end, the authentication key of each equipment end is different.
After the certification that the identity of the control terminal passes through equipment end, it is thus necessary to determine that adding for transmission director data Close transmission key, and to the counterpart keys that the director data of encryption is decrypted;Control terminal obtains the unique of equipment end transmission Identification strings carry out dispersion operation to the unique identification character string according to pre-set channel root key, obtain first The channel calculation factor;Cryptographic calculation is carried out using the first channel calculation factor pair single channel encryption factor, obtains the first transmission key; The first channel calculation factor is encrypted using the first transmission key, is sent to equipment end, equipment end is according to pre- Mr. At the second transmission key be decrypted, by the obtained channel calculation factor and the single channel encryption factor for being set in advance in equipment end Be compared, if comparing consistent, it is determined that director data carry out encryption with encrypted director data is decrypted it is close Key;
When the authentication of equipment end passes through, control terminal encrypts director data using the first transmission key, hair It send to the equipment end, the equipment end is decrypted using the second transmission key, and execution obtains corresponding director data.
Specific flow chart is as shown in figure 5, specific content is as follows:
Control terminal sends acquisition instruction to equipment end, and the acquisition instruction is " 008400010 ", and equipment end response, which obtains, to be referred to It enables, Xiang Suoshu control terminal feedback channel encryption factor, it is preferred that in method provided in an embodiment of the present invention, the single channel encryption The factor is the random number for 16 bytes that equipment end generates at random;It optionally, can be to control when equipment end responds acquisition instruction End sends the single channel encryption factor and identification strings, and the two can send simultaneously when sending, can also successively send;It can also only send The single channel encryption factor.
When equipment end only sends single channel encryption because of the period of the day from 11 p.m. to 1 a.m to control terminal, control terminal uses pre-set channel root key pair The identification strings of equipment end originally obtained carry out dispersion operation, obtain the first channel calculation factor, it is described it is original The identification strings of equipment end through obtaining are in the identity of equipment end certification control terminal, to the mark character of control terminal transmission Number;The channel root key is the symmetric key of 16 bytes;The first channel calculation factor pair single channel encryption factor, which uses, to be added Close algorithm carries out operation, obtains the first transmission key, is added using the first transmission key to the first channel calculation factor It is close, it is sent to equipment end;
When equipment end sends the single channel encryption factor and identification strings to control terminal, control terminal uses pre-set letter Road root key carries out dispersion operation to the identification strings of the equipment end of acquisition, obtains the first channel calculation factor, the channel Root key is the symmetric key of 16 bytes;The first channel calculation factor pair single channel encryption factor is transported using Encryption Algorithm It calculates, obtains the first transmission key, the channel calculation factor is encrypted using the first transmission key, is sent to equipment end;
Equipment end carries out the first channel calculation factor by encryption using the second pre-generated transmission key Decryption, when the first channel calculation factor that decryption obtains is consistent with the pre-set second channel calculating factor, it is determined that biography The key that defeated instruction is encrypted and the key that the transmission instruction by encryption is decrypted;
The second pre-generated transmission key is that equipment end is believed using pre-set second channel calculating factor pair Road encryption factor carries out what cryptographic calculation obtained, and it is equipment end in production that the pre-set second channel, which calculates the factor, Production system carries out dispersion operation by using unique identifying number of the channel root key to equipment end, obtains unique second channel The factor is calculated, and is written into equipment end;The channel calculation factor of each equipment end is different;
For equipment end to control terminal feedback ratio pair as a result, if certification passes through, current control terminal uses the first transmission key Director data is encrypted, sends it to current equipment end, current equipment end is using the second transmission key to encryption Director data be decrypted, operation is instructed according to obtained instruction execution accordingly;
Preferably, when control terminal determines the first transmission key, when equipment end determines the second transmission key, after equipment end It is continuous when carrying out data transmission to control terminal, the second transmission key can be used, the data of required transmission are encrypted, sends out It send to control terminal;The control terminal is decrypted the data of encryption using the second transmission key determined.
Such as intelligent door lock receives the director data by encryption of mobile phone remote transmission, intelligent door lock is passed by second Director data of the defeated key pair by encryption is decrypted, and the director data decrypted is the password for opening intelligent door lock, then Intelligent door lock executes corresponding instruction and controls after encrypted director data is decrypted, i.e. opening door lock;It can also be Intelligent air condition sends the director data of encryption receiving mobile phone, and described instruction data are to open air-conditioning ten minutes later, and temperature is set It sets at 24 degrees Celsius;After the encrypted instruction for receiving mobile phone remote transmission operation is decrypted, and very in intelligent air condition Air-conditioning is opened after clock, by temperature setting at 24 degrees Celsius;
After the data transfer ends between control terminal and equipment end, i.e. the channel of control terminal and receiving end transmission data After interruption, when control terminal sends director data again to equipment end, the identity needs of both sides re-start certification, transmit Key is also required to re-start determination, realizes one-time pad.
Using method provided in an embodiment of the present invention, it is mutually authenticated by identity between both sides, ensure that data are passing Safety when defeated ensure that confidentiality of the director data in transmission by encrypting to the director data to be transmitted, into And safety of the data in transmission process is improved, and after the channel interruption of control terminal and data terminal transmission data, control When end needs to transmit equipment end again control instruction, need again bipartite identity authenticate, again really Determine transmission key, a possibility that carrying out Replay Attack success by criminal is reduced with this.
It is corresponding with Fig. 1, correspond to control terminal, the embodiment of the invention also provides a kind of control devices, are applied to control End, structural schematic diagram is as shown in fig. 6, specifically include:
Trigger unit 601, for sending director data transmission request, triggering to equipment end when receiving control instruction The equipment end carries out authentication to the control terminal;
Determination unit 602, for determining the first channel meter when authentication of the control terminal by the equipment end Calculate the factor;
Generation unit 603, for according to the first channel calculation factor, generation to carry out data transmission with the equipment end The first transmission key;
First encryption unit 604, for adding using first transmission key to the first channel calculation factor It is close, generate encrypted cipher text;
Transmission unit 605, for the encrypted cipher text to be sent to the equipment end, to trigger the equipment end to described Encrypted cipher text is decrypted, and obtains the first channel calculation factor, and by the first channel calculation factor and pre-generate Second channel calculate the factor be compared;
Second encryption unit 606, for being compared when the first channel calculation factor calculates the factor with the second channel When consistent, using first transmission key, director data to be transmitted is encrypted;
First control unit 607, for the described instruction data for passing through encryption to be transmitted to the equipment end, so that described After equipment end obtains described instruction data, control operation corresponding with described instruction data is executed.
It is corresponding with Fig. 4, correspond to equipment end, the embodiment of the invention also provides a kind of control device, applied to setting Standby end, structural schematic diagram is as shown in fig. 7, specifically include:
Decryption unit 701, for when receiving the director data by encryption of control terminal transmission, foundation to be preset The second transmission key to it is described by encryption director data be decrypted, obtain described instruction data;
Second control unit 702, for controlling according to described instruction data the equipment end.
In method provided in an embodiment of the present invention, equipment end authenticates the identity of control terminal, realizes in instruction number According to the certification when being transmitted to equipment end to external equipment identities, to improve safety of the data in transmission, control The key that determine instruction data in end processed are encrypted when being transmitted, equipment end are determined to the director data after encryption The key being decrypted;In this way, confidentiality of the data in transmission is improved.By applying method of the invention, pass through Authentication of the equipment end to control terminal, ensure that data transmission when safety, by the director data to be transmitted into Row encryption ensure that confidentiality of the director data in transmission, and then improve safety of the data in transmission process.
The embodiment of the invention also provides a kind of control system, structural schematic diagram is as shown in figure 8, specifically include control terminal 801 and equipment end 802;
The control terminal 801 is performed the following operation with equipment end 802:
When receiving control instruction, director data transmission request is sent to equipment end, triggers the equipment end to described Control terminal carries out authentication;When authentication of the control terminal by the equipment end, determine the first channel calculation because Son;According to the first channel calculation factor, the first transmission key carried out data transmission with the equipment end is generated;Using institute It states the first transmission key to encrypt the first channel calculation factor, generates encrypted cipher text;The encrypted cipher text is sent It to the equipment end, is decrypted with triggering the equipment end to the encrypted cipher text, obtains the first channel calculation factor, And the first channel calculation factor is calculated into the factor with pre-generated second channel and is compared;When the first channel meter When the calculation factor and the second channel calculating factor compare consistent, using first transmission key, to instruction number to be transmitted According to being encrypted;It will be transmitted to the equipment end by the described instruction data of encryption, so that the equipment end obtains the finger After enabling data, control operation corresponding with described instruction data is executed.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, same and similar part cross-reference between each embodiment. For type of device, since it is basically similar to the method embodiment, so being described relatively simple, related place is referring to side The part of method embodiment illustrates.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system or For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct The unit of separate part description may or may not be physically separated, component shown as a unit can be or Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill Personnel can understand and implement without creative efforts.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of control method, which is characterized in that the method is applied to control terminal, comprising:
When receiving control instruction, director data transmission request is sent to equipment end, triggers the equipment end to the control End carries out authentication;
When authentication of the control terminal by the equipment end, the first channel calculation factor is determined;
According to the first channel calculation factor, the first transmission key carried out data transmission with the equipment end is generated;
The first channel calculation factor is encrypted using first transmission key, generates encrypted cipher text;
The encrypted cipher text is sent to the equipment end, is decrypted, is obtained with triggering the equipment end to the encrypted cipher text The first channel calculation factor, and by the first channel calculation factor and pre-generated second channel calculate the factor into Row compares;
It is close using first transmission when the first channel calculation factor and the second channel, which calculate the factor, compares consistent Key encrypts director data to be transmitted;
It will be transmitted to the equipment end by the described instruction data of encryption, so that the equipment end obtains described instruction data Afterwards, control operation corresponding with described instruction data is executed.
2. the method according to claim 1, wherein the triggering equipment end carries out body to the control terminal Part certification, comprising:
It triggers the equipment end and sends identification strings and random string to the control terminal;
When receiving the identification strings, preset certification root key is called to disperse the identification strings Operation obtains the first authentication key;
The random string is encrypted according to first authentication key, obtains certification ciphertext;
The certification ciphertext is sent to the equipment end, so that the certification ciphertext is decrypted in the equipment end, is obtained The random string for including in the certification ciphertext, and by the random string for including in the certification ciphertext and be sent to described The random string of control terminal is matched, and when matching consistent, passes through the authentication to the control terminal.
3. according to the method described in claim 2, it is characterized in that, the determination the first channel calculation factor, comprising:
According to preset channel root key, operation is carried out to the identification strings, obtain first channel calculation because Son.
4. method according to claim 1 or 3, which is characterized in that the generation carries out data transmission with the equipment end The first transmission key, comprising:
Obtain the single channel encryption factor;
According to the first channel calculation factor, cryptographic calculation is carried out to the single channel encryption factor, obtains first transmission Key.
5. the method according to claim 1, wherein the triggering equipment end carries out the encrypted cipher text Decryption obtains the first channel calculation factor, comprising:
It triggers the equipment end and calls the second pre-generated transmission key, the encrypted cipher text is decrypted, described in acquisition The first channel calculation factor, second transmission key are the equipment end according to the second channel calculating factor, and calculating obtains The transmission key obtained.
6. a kind of control device is applied to control terminal, comprising:
Trigger unit, for sending director data transmission request to equipment end, triggering the equipment when receiving control instruction End carries out authentication to the control terminal;
Determination unit, for determining the first channel calculation factor when authentication of the control terminal by the equipment end;
Generation unit, for generating first carried out data transmission with the equipment end according to the first channel calculation factor Transmission key;
First encryption unit is generated for encrypting using first transmission key to the first channel calculation factor Encrypted cipher text;
Transmission unit, it is close to the encryption to trigger the equipment end for the encrypted cipher text to be sent to the equipment end Text is decrypted, and obtains the first channel calculation factor, and by the first channel calculation factor and pre-generated second The channel calculation factor is compared;
Second encryption unit, for when the first channel calculation factor and the second channel calculate the factor and compare consistent, Using first transmission key, director data to be transmitted is encrypted;
First control unit, for the described instruction data for passing through encryption to be transmitted to the equipment end, so that the equipment end After obtaining described instruction data, control operation corresponding with described instruction data is executed.
7. a kind of control method, which is characterized in that be applied to equipment end, comprising:
When receiving the director data by encryption of control terminal transmission, according to preset second transmission key to described It is decrypted by the director data of encryption, obtains described instruction data;
The equipment end is controlled according to described instruction data.
8. the method according to the description of claim 7 is characterized in that second transmission key presets process, comprising:
The factor is calculated using preset second channel, cryptographic calculation is carried out to the single channel encryption factor in the equipment end, Obtain second transmission key.
9. a kind of control device, which is characterized in that be applied to equipment end, comprising:
Decryption unit, for when receive control terminal transmission by encryption director data when, according to preset second The director data by encryption is decrypted in transmission key, obtains described instruction data;
Second control unit, for controlling according to described instruction data the equipment end.
10. a kind of control system characterized by comprising
Control terminal and equipment end;
Wherein:
The control terminal, for control method described in 1~5 any one of perform claim;
The equipment end requires control method described in 7 or 8 any one for perform claim.
CN201811390756.6A 2018-11-21 2018-11-21 Control method and related equipment Active CN109547303B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811390756.6A CN109547303B (en) 2018-11-21 2018-11-21 Control method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811390756.6A CN109547303B (en) 2018-11-21 2018-11-21 Control method and related equipment

Publications (2)

Publication Number Publication Date
CN109547303A true CN109547303A (en) 2019-03-29
CN109547303B CN109547303B (en) 2021-06-25

Family

ID=65848806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811390756.6A Active CN109547303B (en) 2018-11-21 2018-11-21 Control method and related equipment

Country Status (1)

Country Link
CN (1) CN109547303B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110366183A (en) * 2019-08-02 2019-10-22 中国工商银行股份有限公司 Short message safety protecting method and device
CN112751872A (en) * 2020-12-30 2021-05-04 Tcl空调器(中山)有限公司 Control method and control authority request method of air conditioner, air conditioner and communication module
CN115065522A (en) * 2022-06-09 2022-09-16 北谷电子有限公司 Security authentication method, vehicle-mounted controller, remote communication terminal, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102421096A (en) * 2011-12-22 2012-04-18 厦门雅迅网络股份有限公司 Method for safely transmitting data based on wireless network
CN104993981A (en) * 2015-05-14 2015-10-21 小米科技有限责任公司 Method and apparatus for controlling access of device
CN106658488A (en) * 2016-09-30 2017-05-10 海尔优家智能科技(北京)有限公司 Intelligent household electric appliance, method and apparatus for safely accessing the intelligent household electric appliance
CN106790156A (en) * 2016-12-29 2017-05-31 海尔优家智能科技(北京)有限公司 A kind of smart machine binding method and device
US9853977B1 (en) * 2015-01-26 2017-12-26 Winklevoss Ip, Llc System, method, and program product for processing secure transactions within a cloud computing system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102421096A (en) * 2011-12-22 2012-04-18 厦门雅迅网络股份有限公司 Method for safely transmitting data based on wireless network
US9853977B1 (en) * 2015-01-26 2017-12-26 Winklevoss Ip, Llc System, method, and program product for processing secure transactions within a cloud computing system
CN104993981A (en) * 2015-05-14 2015-10-21 小米科技有限责任公司 Method and apparatus for controlling access of device
CN106658488A (en) * 2016-09-30 2017-05-10 海尔优家智能科技(北京)有限公司 Intelligent household electric appliance, method and apparatus for safely accessing the intelligent household electric appliance
CN106790156A (en) * 2016-12-29 2017-05-31 海尔优家智能科技(北京)有限公司 A kind of smart machine binding method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110366183A (en) * 2019-08-02 2019-10-22 中国工商银行股份有限公司 Short message safety protecting method and device
CN112751872A (en) * 2020-12-30 2021-05-04 Tcl空调器(中山)有限公司 Control method and control authority request method of air conditioner, air conditioner and communication module
CN112751872B (en) * 2020-12-30 2023-05-23 Tcl空调器(中山)有限公司 Control method of air conditioner, control authority request method, air conditioner and communication module
CN115065522A (en) * 2022-06-09 2022-09-16 北谷电子有限公司 Security authentication method, vehicle-mounted controller, remote communication terminal, and storage medium

Also Published As

Publication number Publication date
CN109547303B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US11070364B2 (en) Secure communication method and smart lock system based thereof
CN106130982B (en) Intelligent household appliance remote control method based on PKI system
CN109618334B (en) Control method and related equipment
CN106034028B (en) A kind of terminal device authentication method, apparatus and system
CN105553951A (en) Data transmission method and data transmission device
CN105162599B (en) A kind of data transmission system and its transmission method
CN108881304A (en) A kind of pair of internet of things equipment carries out the method and system of safety management
CN109410406A (en) A kind of authorization method, device and system
Saxena et al. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication
CN110198295A (en) Safety certifying method and device and storage medium
CN109951513B (en) Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card
CN108809633B (en) Identity authentication method, device and system
CN107682152B (en) Group key negotiation method based on symmetric cipher
EP3000216B1 (en) Secured data channel authentication implying a shared secret
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN105162808A (en) Safety login method based on domestic cryptographic algorithm
Sethia et al. NFC secure element-based mutual authentication and attestation for IoT access
CN108509787A (en) A kind of program authentication method
CN109547303A (en) Control method and relevant device
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN110519052A (en) Data interactive method and device based on Internet of Things operating system
CN106792700A (en) The method for building up and system of a kind of secure communication environment of wearable device
CN113411187A (en) Identity authentication method and system, storage medium and processor
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN109922022A (en) Internet of Things communication means, platform, terminal and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant