CN109698749B - Offline continuous washing machine using method based on Internet of things - Google Patents
Offline continuous washing machine using method based on Internet of things Download PDFInfo
- Publication number
- CN109698749B CN109698749B CN201710998956.9A CN201710998956A CN109698749B CN 109698749 B CN109698749 B CN 109698749B CN 201710998956 A CN201710998956 A CN 201710998956A CN 109698749 B CN109698749 B CN 109698749B
- Authority
- CN
- China
- Prior art keywords
- password
- matrix
- movement
- route
- washing machine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- D—TEXTILES; PAPER
- D06—TREATMENT OF TEXTILES OR THE LIKE; LAUNDERING; FLEXIBLE MATERIALS NOT OTHERWISE PROVIDED FOR
- D06F—LAUNDERING, DRYING, IRONING, PRESSING OR FOLDING TEXTILE ARTICLES
- D06F33/00—Control of operations performed in washing machines or washer-dryers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Textile Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method for continuously using a washing machine in a dropped connection mode based on the Internet of things.A password module is added on an Internet of things module on the washing machine, the Internet of things module is mutually connected with a control system of the washing machine and directly powered by a power supply, an offline password is generated by using a password matrix, and the offline password is continuously changed; the invention aims to provide a method for controlling the starting and closing of a washing machine under the condition of disconnection, which mainly researches the generation mechanism of an offline password so as to facilitate the identification of the washing machine and control the on-off of the washing machine.
Description
Technical Field
The invention belongs to the field of washing machine control, and particularly relates to a method for continuously using a washing machine in a dropped state based on the Internet of things.
Background
In recent years, the development and application of the technology of the internet of things are greatly regarded by the nation, the technology of the internet of things becomes an important component of the development of 'twelve five' planning of a new generation of information technology industry, and in 11 months in 2011, the development planning of the 'twelve five' of the internet of things is formulated and released by the department of industry and informatization. The above sea world exposition provides visitors with opportunities for learning and experiencing the technology of the internet of things in a close range for various large-scale exhibitions represented by the sea world exposition, and people find that the technology of the internet of things is not only applied to public fields and platforms such as industrial production and public management, but also applied to daily life of people, such as health detection, smart home and the like. And what most attracts visitors' attention in the relevant show of the internet of things is the home appliance of the internet of things: "haier" U-home Internet of things family, "little swan" Internet of things washing machine and "american" full set of Internet of things household appliances.
Disclosure of Invention
In view of the above, the present invention provides a method for continuously using a washing machine based on internet of things to solve or partially solve the above problems;
in order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: a method for continuously using a washing machine in a dropped state based on the Internet of things comprises the following steps:
a code module is added on an internet of things module on the washing machine, the internet of things module is mutually communicated with a control system of the washing machine and directly powered by a power supply;
the password module comprises a virtual password authentication function, a user installs an internet of things client on a mobile phone, obtains a starting authority at the internet of things client through the mobile phone and is distributed with an offline password, the offline password has a time limit d, the d is a positive rational number, and the offline password is valid within the time limit d when the unit is hour; the length of the offline password is c, and c is a positive integer;
the user's mobile phone and washing machine are both assigned an identity ID, the user's mobile phone identity isThe identity of the washing machine isThe cipher matrix isI denotes the number of iterations, a cryptographic matrixIs a p-order matrix, p is a large prime number, a cipher matrixThe elements in (1) are integers from 0 to 9, and lower case letters from a to Z, upper case letters from A to Z, in which the route is selectedLine of courseFrom the starting pointStarting, moving up, down, left and right arbitrarily, and forming the movement, the movement is represented by a displacement mark, the displacement mark is represented by an op, and the op comprises、、、The four types of the code matrix are respectively expressed as moving units moving upwards, downwards, leftwards and rightwards, the moving units are expressed as the displacement distances of the code matrix from one element to the adjacent elements, and the displacement distances are expressed as the changes of the serial numbers of rows and columns among the elements of the code matrix; the displacement mark passes through c elements and reaches the end pointI.e. the composition of the route isThe composition of the route from the starting point to the end point sequentially forms an offline password; v represents a cryptographic matrixWherein j isAny positive integer representing the jth element on the way, and the array a representing the element represented by the array a in the cipher matrixIn the above-mentioned position(s),output starting pointIn a cryptographic matrixThe position in (1) is indicated as the serial number of the row and column therein,output destinationIn a cryptographic matrixIs given by the ordinal number of the row, column therein, and, correspondingly,output elementIn a cryptographic matrixThe position in (1) is expressed as the serial number of the row and the column in the (B), and after an offline password is distributed to the mobile phone of a user, the password matrixPerforming an iteration, i = i +1, of the post-iteration cipher matrixBecome intoI.e. shifting the elements of the cipher matrix, the positions of the shifted elements of the cipher matrix being p-polynomialsmod p is calculated, coefficients,…, b is calculated by the position of the element in the cipher matrix before shifting, and the calculation is also a continuously iterative process, and the iterative formula is b = c+,、Expressed as the serial number of the row and the column in the cipher matrix, and the second iteration is b1=(c+) mod p, cumulative iteration bi=((c+)mod p)…, pThe shifted position is respectively used as the serial numbers of rows and columns on the password matrix after shifting by calculating x and y of the polynomial; when all elements in the password matrix are shifted, the obtained shifted password matrix is an iterated password matrix;
determining the trend of the displacement mark, namely determining the motion of the movement, respectively using four coordinate sets to represent the direction of the movement, respectively representing the direction in the displacement mark、、、Four, namely, represent moving a unit of movement up, down, left, right; the four coordinate sets comprise a coordinate set representing upward movement by one movement unit, a coordinate set representing downward movement by one movement unit, a coordinate set representing leftward movement by one movement unit, and a coordinate set representing rightward movement by one movement unit; the coordinate set records the routeThe course of movement of, the routeUsing the sequence S [ j ] for shifting]Is shown, wherein j is shown on the routeUpper position, S represents a routeBy a shift of (S) the sequence Sj]Consisting of displacement marks representing movement on the cipher matrix, using the series Sj on the set of coordinates]When it is on the wayAt Sj]When upward is a unit of movement, Sj is moved upward on a coordinate set of the unit of movement]Recording; while the route isAt Sj]When the upper is moved downwards by one moving unit, S [ j ] is moved downwards by one moving unit on the coordinate set]Recording; while the route isAt Sj]When the upper is moved to the left by one movement unit, S [ j ] is moved to the left by one movement unit in the coordinate set]Recording; while the route isAt Sj]When moving one unit of movement to the right, S [ j ] is set on the coordinate set moving one unit of movement to the right]Recording;
after the iterative password matrix is generated, a new route is immediately generated on the iterative password matrix, and then new offline passwords are generated, wherein each new offline password is valid within the time d;
after all elements in the four coordinate groups in the password matrix are shifted, the four coordinate groups are recorded by using the four temporary coordinate groups, a new route is generated by the iterated password matrix, a new offline password is generated through the new route, the movement of the new route is recorded by using the four coordinate groups, the elements in the four coordinate groups are compared with the elements in the temporary coordinate groups, when three continuous elements in the four coordinate groups are equal to each other, the elements in the four coordinate groups and the new route are emptied, and the route is continuously generated on the iterated password matrix;
the method comprises the steps that a virtual password keyboard is arranged on an Internet of things client, an offline password is input on the virtual password keyboard and is sent to a password module to be directly verified by using a virtual password verification function, a temporary communication channel is established between a mobile phone of a user and a washing machine through verification, required data are transmitted in the temporary communication channel, the required data comprise a washing machine starting command and a washing machine closing command, the temporary communication channel is established each time, the washing machine operates the washing machine according to the required data after receiving the required data, and the temporary communication channel is cancelled;
the beneficial results of the invention are as follows: the invention provides a method for continuously using a washing machine in a dropped state based on the Internet of things, aiming at providing a method for controlling the starting and the closing of the washing machine under the condition of dropped state, mainly researching the generation mechanism of an offline password so as to facilitate the identification of the washing machine and control the switch of the washing machine;
in view of the situation that the coverage of the telecommunication, communication and mobile signals is not complete, the signals may be off-line in places with poor signals, but the current method mainly adopts card swiping starting, so that the outstanding problems of inconvenient use, weak remote control force and the like exist, and the invention can effectively avoid the problems.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example 1: the method comprises the steps that a virtual password keyboard is arranged on an Internet of things client, an offline password is input on the virtual password keyboard and is sent to a password module to be directly verified by using a virtual password verification function, a temporary communication channel is established between a mobile phone of a user and a washing machine through verification, required data are transmitted in the temporary communication channel, the required data comprise a washing machine starting command and a washing machine closing command, the temporary communication channel is established each time, the washing machine operates the washing machine according to the required data after receiving the required data, and the temporary communication channel is cancelled;
when the temporary communication channel is transmitted, an authentication mechanism is established between the mobile phone of the user and the washing machine, and the specific mechanism is as follows:
the specific mechanism is based on an identity-based encryption model:
the traditional public key cryptosystem has the problems that a public key is disordered, random and unidentifiable based on identity cryptography introduction. In 1984, Adi Shamir proposed Identity-Based Cryptography IBC (Identity-Based Cryptography). However, until 2001, the Identity-Based Encryption IBE (Identity-Based Encryption) scheme was not designed by the american cryptologists Boneh and Franklin. The identity-based encryption scheme is designed by bilinear mapping Weil pairing on an elliptic curve. The aim of the identity-based cryptographic algorithm is to realize that two communication parties do not need to exchange a public key and a private key and do not need to store a key directory, so that the safety of information exchange between the two communication parties can be ensured, and the two communication parties can verify the signatures of each other;
the basic idea of the identity-based cryptosystem is to bind the identity information of the user with a public key, that is, the identity information of the user is used as the public key of the user, which simplifies the problem that a Certificate Authority (CA) manages a public key certificate of the user in the traditional public key infrastructure. A trusted PKG (private key generator) in an identity-based cryptosystem, which is responsible for generating private keys for users in the system based on their identity information;
the encryption scheme based on the identity is composed of a Setup algorithm, an Extract algorithm, an Encrypt algorithm and a Decrypt algorithm;
setup: a security parameter k is entered which can return the system parameter params and the system master key. This system parameter includes a description of M (a limited plaintext space) and C (a limited ciphertext space). The system parameters are public, but the master key is kept in the PKG (private key generator);
extract: taking the master key and any one ID E { 01 } as input, and returning a private key d corresponding to the user ID;
encrypt: using params, ID and M belonging to M as input, and returning a ciphertext C belonging to C;
decrypt: and returning the plaintext M to the M by taking the ciphertext C to the C, the params and the private key d as input. These random algorithms must satisfy the consistency constraint of the criteria, that is, when the Extract algorithm generates the private key d, ∀ M ∈ M: the plaintext information, namely Decrypt (params, c, d) = m, can be obtained from the ciphertext information c (c = Encrypt (params, ID, m)) according to a decryption algorithm;
example 2: since The birth of The word "Internet of Things (The Internet of Things)" in 1999, The concept of Internet of Things has been continuously developed and expanded. The concept of the internet of things originally comes from the field of radio frequency identification, and the concept is considered to be that articles are attached with electronic tags, and then the identification, the positioning and the monitoring of the articles are realized through an information network formed by a radio frequency identification technology and a communication technology. However, with the development of technology, the application of the internet of things breaks through the narrow definition quickly. At present, the definition of the internet of things has a plurality of different versions, and a unified terminology standard is not provided. In the present study, the seventh framework of the european union is adopted in relation to the definition in the white paper of the internet of things: the Internet of Things (IOT) is a global infrastructure network that links physical objects to virtual objects through development and communication capabilities of information data acquisition. The basic network comprises the Internet and extension and expansion thereof, and has an object identification function, a sensor, a laser scanner, a communication connection function and the like as the basis for providing independent combined services and applications. In a technical aspect, the internet of things is a super network which is established on the basis of the internet and can share information in real time and cover all objects in the society through technologies such as RFID, EPC global and wireless sensor networks. Therefore, the Internet of things can be found to have the functions of highly autonomous data acquisition, network connection, information exchange and cooperative work;
global basic network: it refers to a network structure similar to the internet, which allows data to be transmitted from one computer to another computer through the network, and data packets need to be transmitted through the routing means;
solid articles: refers to any living and non-living independent entity and thing, and naturally, home appliances are also included, and these entities have unique identities. Relative virtual object refers to the relation that the physical object and the real object are represented and represented in the existing medium;
object recognition: identification mainly involves the concrete method to the recognition of the object, rely on the data storage device, such as electronic label or two-dimentional bar code of RFID, etc., or according to the characteristic of the object itself;
a sensor: a device capable of sensing and measuring a physical or biological environment, etc., and giving a corresponding value according to the sensing and measuring result. The Internet of things mainly utilizes RFID reading equipment to obtain a required numerical value;
information conversion: the activity of function conversion is that information is transmitted from a transmitting source to a destination of application service of the Internet of things or other places, and the information is contained in the information;
independent federated services and applications: the participants reach the agreement, develop related services and applications by using the same exclusive framework protocol, and can autonomously determine the service content and the application property and how to manage within the range of protocol constraint;
three-in-one network: the telecommunication network, the television network and the internet are mutually fused, so that an operator can realize the sharing of network resources in the management of information communication. The network resource can be used as an information resource of the Internet of things, avoids low-level repeated construction, is the basis of the development of the Internet of things, and is produced in the market demand background;
generally, the internet of things is divided into three layers, namely a sensing layer, a network layer and an application layer, according to the equipment, connection and management of the internet of things;
the perception layer is positioned at the bottom layer and is responsible for perceiving data, and the perception layer is the basis of the development and application of the Internet of things. The middle layer is a network layer, which is usually based on the internet and a mobile communication network and is mainly responsible for data transmission. The application layer is positioned at the top layer of the Internet of things, analyzes the acquired sensing data, provides various services for users and plays a role in processing and decision making of the intelligent processing platform;
the beneficial results of the invention are as follows: the invention provides a method for continuously using a washing machine in a dropped state based on the Internet of things, aiming at providing a method for controlling the starting and the closing of the washing machine under the condition of dropped state, mainly researching the generation mechanism of an offline password so as to facilitate the identification of the washing machine and control the switch of the washing machine;
in view of the situation that the coverage of the current telecommunication, communication and mobile signals is not complete, the signals may be off-line in places with poor signals, but the current method mainly adopts card swiping starting, so that the outstanding problems of inconvenient use, weak remote control force and the like exist, and the invention can effectively avoid the problem;
it is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element;
the above description is only for the preferred embodiment of the present invention, and should not be used to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.
Claims (1)
1. A method for continuously using a washing machine in a dropped state based on the Internet of things is characterized by comprising the following steps:
the washing machine is provided with an Internet of things module, a password module is added on the Internet of things module, the Internet of things module and a control system of the washing machine are mutually interacted, and power is directly supplied by a power supply;
the password module comprises a virtual password authentication function, a user installs an internet of things client on a mobile phone, obtains a starting authority at the internet of things client through the mobile phone and is allocated with an offline password, the offline password has a time limit d, the d is a positive rational number, and the unit is hour, and the offline password is valid within the time limit d; the offline password consists of positive integers, the length of the offline password is c, and the c is a positive integer;
the mobile phone and the washing machine of the user are both assigned with an identity ID, and the identity of the mobile phone of the user is IDsThe identity of the washing machine is IDxSetting the cipher matrix as ViI represents the number of iterations of the cryptographic matrix, the cryptographic matrix ViIs a p-order matrix, and p is a large prime number; the cipher matrix ViContains an integer from 0 to 9 and the lower case letters a to Z, the upper case letters A to Z, in which the route L is selectediSaid route LiStarting from the starting point v1a[1]Starting, arbitrarily moving upwards, downwards, leftwards and rightwards to form a movement action, and representing the movement action by using displacement identifiers, wherein the displacement identifiers are represented by op, and the op comprises four types of →, ←, ↓and ↓, and represents a movement unit moving upwards, downwards, leftwards and rightwards respectively, the movement unit is represented by a displacement distance of the password matrix moving from one element to an adjacent element, and the displacement distance is specifically represented by the change of row and column serial numbers among the elements of the password matrix; the displacement mark passes through c elements and reaches an end point vca[c](ii) a The composition of the route is denoted vja[j]The elements of the route from the starting point to the end point form the offline password in sequence; v represents the cryptographic matrix ViJ is any positive integer and represents the jth element on the way, and the array a represents the element represented by the array in the cipher matrix ViPosition of a [1 ]]Output starting point v1a[1]At the said cipher matrix ViIs represented by the row number, column number, a [ c ] therein]Output end point vca[c]At the said cipher matrix ViIs represented by the row number, column number therein, and, correspondingly, a [ j ]]Output element vja[j]At the said cipher matrix ViPosition(s) in (1), expressed as row number, column number therein; after the offline password is distributed to the mobile phone of the user, the password matrix ViPerforming iteration, i is i +1, and the cipher matrix V is obtained after iterationiBecomes Vi+1I.e. shifting the elements of the cipher matrix at the positions of the polynomial y ═ bixi+bi-1xi-1+ … + b mod p is calculated, coefficient bi,bi-1…, b is calculated by the position of the element in the cipher matrix before shifting, and the calculation is a continuous iterative process, and one iteration is b-ck1+k2,k1、k2Representing the row number and the column number in the password matrix before the elements in the password matrix are shifted, k is an integer, and the quadratic iteration formula is b1=(ck1+k2)mod p,b2=((ck1+k2) mod p) mod p, …, cumulative iteration bi=(((ck1+k2) mod p) …) mod p, the shifted positions of the elements in the cipher matrix are respectively used as the row number and the column number of the shifted cipher matrix by calculating x and y of the polynomial; shifting all elements in the password matrix by using polynomial calculation to calculate the shifted positions, and when all elements in the password matrix are shifted, taking the obtained shifted password matrix as the password matrix after iteration;
the object linkage module determines the trend of the displacement identifier, namely determines the movement of the movement, respectively uses four coordinate sets to represent the direction of the movement, and respectively represents four types →, ←, ±, ↓, and ↓, namely represents one unit of movement moving upwards, downwards, leftwards and rightwards; the four coordinate sets include a coordinate set representing an upward movement by one movement unit, a coordinate set representing a downward movement by one movement unit, a coordinate set representing a leftward movement by one movement unit, and a coordinate set representing a rightward movement by one movement unitA coordinate set of a mobile unit; said set of coordinates records said route LiSaid route LiUsing the sequence S [ j ] for shifting]Represents, wherein S represents the route LiThe series Sj]Is composed of said displacement marks, representing the movement on said cryptographic matrix, using the sequence Sj on said set of coordinates]When said route L isiAt Sj]When upward is a unit of movement, S [ j ] is moved upward on the coordinate set of the unit of movement]Recording; when the route L isiAt Sj]When the upper is moved downwards by one movement unit, S [ j ] is moved downwards on the coordinate set of one movement unit]Recording; when the route L isiAt Sj]When the upper is moved to the left by one movement unit, S [ j ] is moved to the left by one movement unit on the coordinate set]Recording; when the route L isiAt Sj]Up is to move one unit of movement to the right, S [ j ] is moved on the coordinate set of one unit of movement to the right]Recording; l represents a route;
after the iterated password matrix is generated, a new route is immediately generated on the iterated password matrix, and then new offline passwords are generated, wherein each new offline password is valid within time d;
after all elements in the four coordinate sets in the password matrix are shifted, recording the contents in the four coordinate sets by using four temporary coordinate sets, generating a new route by the password matrix after iteration, generating the new offline password through the new route, further recording the movement of the new route by using the four coordinate sets, comparing the elements in the four coordinate sets with the elements in the temporary coordinate sets, when continuous three elements in the four coordinate sets are equal, emptying the elements in the four coordinate sets and the new route, iterating the password matrix again, and then continuously generating the route on the password matrix after iteration;
the method comprises the steps that a virtual password keyboard is arranged on the Internet of things client, the offline password is input on the virtual password keyboard and is sent to a password module to be compared with the password generated on a password matrix so as to carry out direct verification, a temporary communication channel is established between a mobile phone of a user and the washing machine through verification, required data are transmitted in the temporary communication channel, the required data comprise a washing machine starting command and a washing machine closing command, the temporary communication channel needs to be established in each verification, and after the washing machine receives the required data, the washing machine is operated according to the required data and the temporary communication channel is cancelled.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710998956.9A CN109698749B (en) | 2017-10-24 | 2017-10-24 | Offline continuous washing machine using method based on Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710998956.9A CN109698749B (en) | 2017-10-24 | 2017-10-24 | Offline continuous washing machine using method based on Internet of things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109698749A CN109698749A (en) | 2019-04-30 |
CN109698749B true CN109698749B (en) | 2021-12-21 |
Family
ID=66226348
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710998956.9A Active CN109698749B (en) | 2017-10-24 | 2017-10-24 | Offline continuous washing machine using method based on Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109698749B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1961525A (en) * | 2003-05-02 | 2007-05-09 | 吉瑞泰克有限公司 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN101651546A (en) * | 2009-09-11 | 2010-02-17 | 福建天晴在线互动科技有限公司 | Method for off-line generation of dynamic password and debarkation authentication and synchronization of server |
US7971234B1 (en) * | 2006-09-15 | 2011-06-28 | Netapp, Inc. | Method and apparatus for offline cryptographic key establishment |
CN106850367A (en) * | 2017-03-02 | 2017-06-13 | 福州恰同学信息科技有限公司 | High in the clouds controls the method and its system of washing machine |
CN107026734A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of method and system that Password Management is carried out using certification lasting effectiveness |
CN107239708A (en) * | 2017-04-24 | 2017-10-10 | 广东工业大学 | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160036786A1 (en) * | 2014-08-02 | 2016-02-04 | Hardik Prakash GANDHI | System and method facilitating enhanced inter-object and human-object interactivity using networked electronic devices |
US10111070B2 (en) * | 2015-07-03 | 2018-10-23 | Afero, Inc. | Embedded internet of things (IOT) hub slot for an appliance and associated systems and methods |
-
2017
- 2017-10-24 CN CN201710998956.9A patent/CN109698749B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1961525A (en) * | 2003-05-02 | 2007-05-09 | 吉瑞泰克有限公司 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
US7971234B1 (en) * | 2006-09-15 | 2011-06-28 | Netapp, Inc. | Method and apparatus for offline cryptographic key establishment |
CN101651546A (en) * | 2009-09-11 | 2010-02-17 | 福建天晴在线互动科技有限公司 | Method for off-line generation of dynamic password and debarkation authentication and synchronization of server |
CN107026734A (en) * | 2016-01-29 | 2017-08-08 | 李明 | A kind of method and system that Password Management is carried out using certification lasting effectiveness |
CN106850367A (en) * | 2017-03-02 | 2017-06-13 | 福州恰同学信息科技有限公司 | High in the clouds controls the method and its system of washing machine |
CN107239708A (en) * | 2017-04-24 | 2017-10-10 | 广东工业大学 | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos |
Non-Patent Citations (5)
Title |
---|
"实现常规洗衣机的远程云智能控制";周德建;《科技与企业》;20130222;全文 * |
"物联网中基于ZigBee协议的安全算法研究";张亚琳;《中国优秀硕士学位论文全文数据库 信息科技辑》;20130115;全文 * |
Jonathan Charity Talwana ; Huang Jian Hua."Smart World of Internet of Things (IoT) and Its Security Concerns".《2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)》.2017, * |
Praveen Kumar ; Umesh Chandra Pati."IoT based monitoring and control of appliances for smart home".《2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)》.2017, * |
张伟 ; 陆孝嵩 ; 徐刚 ; 苏忠诚."一种物联网智能洗衣机控制系统".《2016年中国家用电器技术大会论文集》.2016, * |
Also Published As
Publication number | Publication date |
---|---|
CN109698749A (en) | 2019-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang et al. | Cloud based data sharing with fine-grained proxy re-encryption | |
Yao et al. | A lightweight attribute-based encryption scheme for the Internet of Things | |
Yang et al. | Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data | |
CN105577383B (en) | The management of cryptographic key | |
CN103004129B (en) | Encryption device, decryption device, encryption method, decryption method, program, and recording medium | |
CN102263636B (en) | Stream cipher key control method for fusing neural network with chaotic mappings | |
NL2013520B1 (en) | Public-key encryption system. | |
CN101453332A (en) | Signature schemes using bilinear mappings | |
CN110807206A (en) | College certificate storage management system based on block chain and attribute password | |
CN103873236A (en) | Searchable encryption method and equipment thereof | |
CN103348624A (en) | Signature processing system, key generation device, signature device, verification device, signature processing method and signature processing program | |
Sicari et al. | Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware | |
CN102449632A (en) | A method of efficient secure function evaluation using resettable tamper-resistant hardware tokens | |
CN107086912A (en) | Ciphertext conversion method, decryption method and system in a kind of heterogeneous storage system | |
CN108880803A (en) | A kind of method and system signed using digital signature to block chain affairs | |
La Manna et al. | SEA-BREW: A scalable attribute-based encryption revocable scheme for low-bitrate IoT wireless networks | |
Lin et al. | A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles | |
Meng et al. | Residual-adaptive key provisioning in quantum-key-distribution enhanced internet of things (q-iot) | |
CN109698749B (en) | Offline continuous washing machine using method based on Internet of things | |
CN104144057B (en) | A kind of CP ABE methods for generating secure decryption key | |
CN100546243C (en) | Data sharing method, request processing method and device | |
Elhabob et al. | A heterogeneous systems public key encryption with equality test in smart city | |
Wu et al. | Attribute-based data access control scheme with secure revocation in fog computing for smart grid | |
CN109561067A (en) | Strategy renewing new method and system based on CP-ABE | |
Koshiba et al. | New assumptions on isogenous pairing groups with applications to attribute-based encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190726 Address after: 201605 No. 398 Xinlu Road, Xinbang Town, Songjiang District, Shanghai Applicant after: Muyang Technology (Shanghai) Co., Ltd. Address before: Room 3602, Building 3, 350 Xianxia Road, Changning District, Shanghai, 2006 Applicant before: Washing washing Intelligent Technology (Shanghai) Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |