CN109698749B - Offline continuous washing machine using method based on Internet of things - Google Patents

Offline continuous washing machine using method based on Internet of things Download PDF

Info

Publication number
CN109698749B
CN109698749B CN201710998956.9A CN201710998956A CN109698749B CN 109698749 B CN109698749 B CN 109698749B CN 201710998956 A CN201710998956 A CN 201710998956A CN 109698749 B CN109698749 B CN 109698749B
Authority
CN
China
Prior art keywords
password
matrix
movement
route
washing machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710998956.9A
Other languages
Chinese (zh)
Other versions
CN109698749A (en
Inventor
邓洋洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Muyang Technology (Shanghai) Co., Ltd.
Original Assignee
Muyang Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Muyang Technology Shanghai Co ltd filed Critical Muyang Technology Shanghai Co ltd
Priority to CN201710998956.9A priority Critical patent/CN109698749B/en
Publication of CN109698749A publication Critical patent/CN109698749A/en
Application granted granted Critical
Publication of CN109698749B publication Critical patent/CN109698749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • DTEXTILES; PAPER
    • D06TREATMENT OF TEXTILES OR THE LIKE; LAUNDERING; FLEXIBLE MATERIALS NOT OTHERWISE PROVIDED FOR
    • D06FLAUNDERING, DRYING, IRONING, PRESSING OR FOLDING TEXTILE ARTICLES
    • D06F33/00Control of operations performed in washing machines or washer-dryers 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Textile Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method for continuously using a washing machine in a dropped connection mode based on the Internet of things.A password module is added on an Internet of things module on the washing machine, the Internet of things module is mutually connected with a control system of the washing machine and directly powered by a power supply, an offline password is generated by using a password matrix, and the offline password is continuously changed; the invention aims to provide a method for controlling the starting and closing of a washing machine under the condition of disconnection, which mainly researches the generation mechanism of an offline password so as to facilitate the identification of the washing machine and control the on-off of the washing machine.

Description

Offline continuous washing machine using method based on Internet of things
Technical Field
The invention belongs to the field of washing machine control, and particularly relates to a method for continuously using a washing machine in a dropped state based on the Internet of things.
Background
In recent years, the development and application of the technology of the internet of things are greatly regarded by the nation, the technology of the internet of things becomes an important component of the development of 'twelve five' planning of a new generation of information technology industry, and in 11 months in 2011, the development planning of the 'twelve five' of the internet of things is formulated and released by the department of industry and informatization. The above sea world exposition provides visitors with opportunities for learning and experiencing the technology of the internet of things in a close range for various large-scale exhibitions represented by the sea world exposition, and people find that the technology of the internet of things is not only applied to public fields and platforms such as industrial production and public management, but also applied to daily life of people, such as health detection, smart home and the like. And what most attracts visitors' attention in the relevant show of the internet of things is the home appliance of the internet of things: "haier" U-home Internet of things family, "little swan" Internet of things washing machine and "american" full set of Internet of things household appliances.
Disclosure of Invention
In view of the above, the present invention provides a method for continuously using a washing machine based on internet of things to solve or partially solve the above problems;
in order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: a method for continuously using a washing machine in a dropped state based on the Internet of things comprises the following steps:
a code module is added on an internet of things module on the washing machine, the internet of things module is mutually communicated with a control system of the washing machine and directly powered by a power supply;
the password module comprises a virtual password authentication function, a user installs an internet of things client on a mobile phone, obtains a starting authority at the internet of things client through the mobile phone and is distributed with an offline password, the offline password has a time limit d, the d is a positive rational number, and the offline password is valid within the time limit d when the unit is hour; the length of the offline password is c, and c is a positive integer;
the user's mobile phone and washing machine are both assigned an identity ID, the user's mobile phone identity is
Figure 733177DEST_PATH_IMAGE001
The identity of the washing machine is
Figure 468921DEST_PATH_IMAGE002
The cipher matrix is
Figure 291384DEST_PATH_IMAGE003
I denotes the number of iterations, a cryptographic matrix
Figure 496100DEST_PATH_IMAGE003
Is a p-order matrix, p is a large prime number, a cipher matrix
Figure 695000DEST_PATH_IMAGE003
The elements in (1) are integers from 0 to 9, and lower case letters from a to Z, upper case letters from A to Z, in which the route is selected
Figure 816409DEST_PATH_IMAGE004
Line of course
Figure 481876DEST_PATH_IMAGE004
From the starting point
Figure 236206DEST_PATH_IMAGE005
Starting, moving up, down, left and right arbitrarily, and forming the movement, the movement is represented by a displacement mark, the displacement mark is represented by an op, and the op comprises
Figure 685467DEST_PATH_IMAGE006
Figure 880957DEST_PATH_IMAGE007
Figure 45222DEST_PATH_IMAGE008
Figure 473798DEST_PATH_IMAGE009
The four types of the code matrix are respectively expressed as moving units moving upwards, downwards, leftwards and rightwards, the moving units are expressed as the displacement distances of the code matrix from one element to the adjacent elements, and the displacement distances are expressed as the changes of the serial numbers of rows and columns among the elements of the code matrix; the displacement mark passes through c elements and reaches the end point
Figure 14501DEST_PATH_IMAGE010
I.e. the composition of the route is
Figure 392392DEST_PATH_IMAGE011
The composition of the route from the starting point to the end point sequentially forms an offline password; v represents a cryptographic matrix
Figure 196400DEST_PATH_IMAGE003
Wherein j isAny positive integer representing the jth element on the way, and the array a representing the element represented by the array a in the cipher matrix
Figure 659743DEST_PATH_IMAGE003
In the above-mentioned position(s),
Figure 925508DEST_PATH_IMAGE012
output starting point
Figure 157906DEST_PATH_IMAGE005
In a cryptographic matrix
Figure 867236DEST_PATH_IMAGE003
The position in (1) is indicated as the serial number of the row and column therein,
Figure 4825DEST_PATH_IMAGE013
output destination
Figure 887331DEST_PATH_IMAGE010
In a cryptographic matrix
Figure 177498DEST_PATH_IMAGE003
Is given by the ordinal number of the row, column therein, and, correspondingly,
Figure 120046DEST_PATH_IMAGE014
output element
Figure 10510DEST_PATH_IMAGE011
In a cryptographic matrix
Figure 696707DEST_PATH_IMAGE003
The position in (1) is expressed as the serial number of the row and the column in the (B), and after an offline password is distributed to the mobile phone of a user, the password matrix
Figure 575801DEST_PATH_IMAGE003
Performing an iteration, i = i +1, of the post-iteration cipher matrix
Figure 689250DEST_PATH_IMAGE003
Become into
Figure 801432DEST_PATH_IMAGE015
I.e. shifting the elements of the cipher matrix, the positions of the shifted elements of the cipher matrix being p-polynomials
Figure 25740DEST_PATH_IMAGE016
mod p is calculated, coefficients
Figure 290499DEST_PATH_IMAGE017
Figure 309271DEST_PATH_IMAGE018
…, b is calculated by the position of the element in the cipher matrix before shifting, and the calculation is also a continuously iterative process, and the iterative formula is b = c
Figure 721797DEST_PATH_IMAGE019
+
Figure 936747DEST_PATH_IMAGE020
Figure 118329DEST_PATH_IMAGE019
Figure 511265DEST_PATH_IMAGE021
Expressed as the serial number of the row and the column in the cipher matrix, and the second iteration is b1=(c
Figure 145508DEST_PATH_IMAGE019
+
Figure 898570DEST_PATH_IMAGE020
) mod p, cumulative iteration bi=((c
Figure 200238DEST_PATH_IMAGE019
+
Figure 764074DEST_PATH_IMAGE020
)mod p)…, pThe shifted position is respectively used as the serial numbers of rows and columns on the password matrix after shifting by calculating x and y of the polynomial; when all elements in the password matrix are shifted, the obtained shifted password matrix is an iterated password matrix;
determining the trend of the displacement mark, namely determining the motion of the movement, respectively using four coordinate sets to represent the direction of the movement, respectively representing the direction in the displacement mark
Figure 885614DEST_PATH_IMAGE006
Figure 448226DEST_PATH_IMAGE007
Figure 604401DEST_PATH_IMAGE008
Figure 339138DEST_PATH_IMAGE009
Four, namely, represent moving a unit of movement up, down, left, right; the four coordinate sets comprise a coordinate set representing upward movement by one movement unit, a coordinate set representing downward movement by one movement unit, a coordinate set representing leftward movement by one movement unit, and a coordinate set representing rightward movement by one movement unit; the coordinate set records the route
Figure 947974DEST_PATH_IMAGE004
The course of movement of, the route
Figure 42838DEST_PATH_IMAGE004
Using the sequence S [ j ] for shifting]Is shown, wherein j is shown on the route
Figure 53519DEST_PATH_IMAGE004
Upper position, S represents a route
Figure 959159DEST_PATH_IMAGE004
By a shift of (S) the sequence Sj]Consisting of displacement marks representing movement on the cipher matrix, using the series Sj on the set of coordinates]When it is on the way
Figure 55291DEST_PATH_IMAGE004
At Sj]When upward is a unit of movement, Sj is moved upward on a coordinate set of the unit of movement]Recording; while the route is
Figure 953845DEST_PATH_IMAGE004
At Sj]When the upper is moved downwards by one moving unit, S [ j ] is moved downwards by one moving unit on the coordinate set]Recording; while the route is
Figure 819033DEST_PATH_IMAGE004
At Sj]When the upper is moved to the left by one movement unit, S [ j ] is moved to the left by one movement unit in the coordinate set]Recording; while the route is
Figure 895573DEST_PATH_IMAGE004
At Sj]When moving one unit of movement to the right, S [ j ] is set on the coordinate set moving one unit of movement to the right]Recording;
after the iterative password matrix is generated, a new route is immediately generated on the iterative password matrix, and then new offline passwords are generated, wherein each new offline password is valid within the time d;
after all elements in the four coordinate groups in the password matrix are shifted, the four coordinate groups are recorded by using the four temporary coordinate groups, a new route is generated by the iterated password matrix, a new offline password is generated through the new route, the movement of the new route is recorded by using the four coordinate groups, the elements in the four coordinate groups are compared with the elements in the temporary coordinate groups, when three continuous elements in the four coordinate groups are equal to each other, the elements in the four coordinate groups and the new route are emptied, and the route is continuously generated on the iterated password matrix;
the method comprises the steps that a virtual password keyboard is arranged on an Internet of things client, an offline password is input on the virtual password keyboard and is sent to a password module to be directly verified by using a virtual password verification function, a temporary communication channel is established between a mobile phone of a user and a washing machine through verification, required data are transmitted in the temporary communication channel, the required data comprise a washing machine starting command and a washing machine closing command, the temporary communication channel is established each time, the washing machine operates the washing machine according to the required data after receiving the required data, and the temporary communication channel is cancelled;
the beneficial results of the invention are as follows: the invention provides a method for continuously using a washing machine in a dropped state based on the Internet of things, aiming at providing a method for controlling the starting and the closing of the washing machine under the condition of dropped state, mainly researching the generation mechanism of an offline password so as to facilitate the identification of the washing machine and control the switch of the washing machine;
in view of the situation that the coverage of the telecommunication, communication and mobile signals is not complete, the signals may be off-line in places with poor signals, but the current method mainly adopts card swiping starting, so that the outstanding problems of inconvenient use, weak remote control force and the like exist, and the invention can effectively avoid the problems.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example 1: the method comprises the steps that a virtual password keyboard is arranged on an Internet of things client, an offline password is input on the virtual password keyboard and is sent to a password module to be directly verified by using a virtual password verification function, a temporary communication channel is established between a mobile phone of a user and a washing machine through verification, required data are transmitted in the temporary communication channel, the required data comprise a washing machine starting command and a washing machine closing command, the temporary communication channel is established each time, the washing machine operates the washing machine according to the required data after receiving the required data, and the temporary communication channel is cancelled;
when the temporary communication channel is transmitted, an authentication mechanism is established between the mobile phone of the user and the washing machine, and the specific mechanism is as follows:
the specific mechanism is based on an identity-based encryption model:
the traditional public key cryptosystem has the problems that a public key is disordered, random and unidentifiable based on identity cryptography introduction. In 1984, Adi Shamir proposed Identity-Based Cryptography IBC (Identity-Based Cryptography). However, until 2001, the Identity-Based Encryption IBE (Identity-Based Encryption) scheme was not designed by the american cryptologists Boneh and Franklin. The identity-based encryption scheme is designed by bilinear mapping Weil pairing on an elliptic curve. The aim of the identity-based cryptographic algorithm is to realize that two communication parties do not need to exchange a public key and a private key and do not need to store a key directory, so that the safety of information exchange between the two communication parties can be ensured, and the two communication parties can verify the signatures of each other;
the basic idea of the identity-based cryptosystem is to bind the identity information of the user with a public key, that is, the identity information of the user is used as the public key of the user, which simplifies the problem that a Certificate Authority (CA) manages a public key certificate of the user in the traditional public key infrastructure. A trusted PKG (private key generator) in an identity-based cryptosystem, which is responsible for generating private keys for users in the system based on their identity information;
the encryption scheme based on the identity is composed of a Setup algorithm, an Extract algorithm, an Encrypt algorithm and a Decrypt algorithm;
setup: a security parameter k is entered which can return the system parameter params and the system master key. This system parameter includes a description of M (a limited plaintext space) and C (a limited ciphertext space). The system parameters are public, but the master key is kept in the PKG (private key generator);
extract: taking the master key and any one ID E { 01 } as input, and returning a private key d corresponding to the user ID;
encrypt: using params, ID and M belonging to M as input, and returning a ciphertext C belonging to C;
decrypt: and returning the plaintext M to the M by taking the ciphertext C to the C, the params and the private key d as input. These random algorithms must satisfy the consistency constraint of the criteria, that is, when the Extract algorithm generates the private key d, ∀ M ∈ M: the plaintext information, namely Decrypt (params, c, d) = m, can be obtained from the ciphertext information c (c = Encrypt (params, ID, m)) according to a decryption algorithm;
example 2: since The birth of The word "Internet of Things (The Internet of Things)" in 1999, The concept of Internet of Things has been continuously developed and expanded. The concept of the internet of things originally comes from the field of radio frequency identification, and the concept is considered to be that articles are attached with electronic tags, and then the identification, the positioning and the monitoring of the articles are realized through an information network formed by a radio frequency identification technology and a communication technology. However, with the development of technology, the application of the internet of things breaks through the narrow definition quickly. At present, the definition of the internet of things has a plurality of different versions, and a unified terminology standard is not provided. In the present study, the seventh framework of the european union is adopted in relation to the definition in the white paper of the internet of things: the Internet of Things (IOT) is a global infrastructure network that links physical objects to virtual objects through development and communication capabilities of information data acquisition. The basic network comprises the Internet and extension and expansion thereof, and has an object identification function, a sensor, a laser scanner, a communication connection function and the like as the basis for providing independent combined services and applications. In a technical aspect, the internet of things is a super network which is established on the basis of the internet and can share information in real time and cover all objects in the society through technologies such as RFID, EPC global and wireless sensor networks. Therefore, the Internet of things can be found to have the functions of highly autonomous data acquisition, network connection, information exchange and cooperative work;
global basic network: it refers to a network structure similar to the internet, which allows data to be transmitted from one computer to another computer through the network, and data packets need to be transmitted through the routing means;
solid articles: refers to any living and non-living independent entity and thing, and naturally, home appliances are also included, and these entities have unique identities. Relative virtual object refers to the relation that the physical object and the real object are represented and represented in the existing medium;
object recognition: identification mainly involves the concrete method to the recognition of the object, rely on the data storage device, such as electronic label or two-dimentional bar code of RFID, etc., or according to the characteristic of the object itself;
a sensor: a device capable of sensing and measuring a physical or biological environment, etc., and giving a corresponding value according to the sensing and measuring result. The Internet of things mainly utilizes RFID reading equipment to obtain a required numerical value;
information conversion: the activity of function conversion is that information is transmitted from a transmitting source to a destination of application service of the Internet of things or other places, and the information is contained in the information;
independent federated services and applications: the participants reach the agreement, develop related services and applications by using the same exclusive framework protocol, and can autonomously determine the service content and the application property and how to manage within the range of protocol constraint;
three-in-one network: the telecommunication network, the television network and the internet are mutually fused, so that an operator can realize the sharing of network resources in the management of information communication. The network resource can be used as an information resource of the Internet of things, avoids low-level repeated construction, is the basis of the development of the Internet of things, and is produced in the market demand background;
generally, the internet of things is divided into three layers, namely a sensing layer, a network layer and an application layer, according to the equipment, connection and management of the internet of things;
the perception layer is positioned at the bottom layer and is responsible for perceiving data, and the perception layer is the basis of the development and application of the Internet of things. The middle layer is a network layer, which is usually based on the internet and a mobile communication network and is mainly responsible for data transmission. The application layer is positioned at the top layer of the Internet of things, analyzes the acquired sensing data, provides various services for users and plays a role in processing and decision making of the intelligent processing platform;
the beneficial results of the invention are as follows: the invention provides a method for continuously using a washing machine in a dropped state based on the Internet of things, aiming at providing a method for controlling the starting and the closing of the washing machine under the condition of dropped state, mainly researching the generation mechanism of an offline password so as to facilitate the identification of the washing machine and control the switch of the washing machine;
in view of the situation that the coverage of the current telecommunication, communication and mobile signals is not complete, the signals may be off-line in places with poor signals, but the current method mainly adopts card swiping starting, so that the outstanding problems of inconvenient use, weak remote control force and the like exist, and the invention can effectively avoid the problem;
it is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element;
the above description is only for the preferred embodiment of the present invention, and should not be used to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.

Claims (1)

1. A method for continuously using a washing machine in a dropped state based on the Internet of things is characterized by comprising the following steps:
the washing machine is provided with an Internet of things module, a password module is added on the Internet of things module, the Internet of things module and a control system of the washing machine are mutually interacted, and power is directly supplied by a power supply;
the password module comprises a virtual password authentication function, a user installs an internet of things client on a mobile phone, obtains a starting authority at the internet of things client through the mobile phone and is allocated with an offline password, the offline password has a time limit d, the d is a positive rational number, and the unit is hour, and the offline password is valid within the time limit d; the offline password consists of positive integers, the length of the offline password is c, and the c is a positive integer;
the mobile phone and the washing machine of the user are both assigned with an identity ID, and the identity of the mobile phone of the user is IDsThe identity of the washing machine is IDxSetting the cipher matrix as ViI represents the number of iterations of the cryptographic matrix, the cryptographic matrix ViIs a p-order matrix, and p is a large prime number; the cipher matrix ViContains an integer from 0 to 9 and the lower case letters a to Z, the upper case letters A to Z, in which the route L is selectediSaid route LiStarting from the starting point v1a[1]Starting, arbitrarily moving upwards, downwards, leftwards and rightwards to form a movement action, and representing the movement action by using displacement identifiers, wherein the displacement identifiers are represented by op, and the op comprises four types of →, ←, ↓and ↓, and represents a movement unit moving upwards, downwards, leftwards and rightwards respectively, the movement unit is represented by a displacement distance of the password matrix moving from one element to an adjacent element, and the displacement distance is specifically represented by the change of row and column serial numbers among the elements of the password matrix; the displacement mark passes through c elements and reaches an end point vca[c](ii) a The composition of the route is denoted vja[j]The elements of the route from the starting point to the end point form the offline password in sequence; v represents the cryptographic matrix ViJ is any positive integer and represents the jth element on the way, and the array a represents the element represented by the array in the cipher matrix ViPosition of a [1 ]]Output starting point v1a[1]At the said cipher matrix ViIs represented by the row number, column number, a [ c ] therein]Output end point vca[c]At the said cipher matrix ViIs represented by the row number, column number therein, and, correspondingly, a [ j ]]Output element vja[j]At the said cipher matrix ViPosition(s) in (1), expressed as row number, column number therein; after the offline password is distributed to the mobile phone of the user, the password matrix ViPerforming iteration, i is i +1, and the cipher matrix V is obtained after iterationiBecomes Vi+1I.e. shifting the elements of the cipher matrix at the positions of the polynomial y ═ bixi+bi-1xi-1+ … + b mod p is calculated, coefficient bi,bi-1…, b is calculated by the position of the element in the cipher matrix before shifting, and the calculation is a continuous iterative process, and one iteration is b-ck1+k2,k1、k2Representing the row number and the column number in the password matrix before the elements in the password matrix are shifted, k is an integer, and the quadratic iteration formula is b1=(ck1+k2)mod p,b2=((ck1+k2) mod p) mod p, …, cumulative iteration bi=(((ck1+k2) mod p) …) mod p, the shifted positions of the elements in the cipher matrix are respectively used as the row number and the column number of the shifted cipher matrix by calculating x and y of the polynomial; shifting all elements in the password matrix by using polynomial calculation to calculate the shifted positions, and when all elements in the password matrix are shifted, taking the obtained shifted password matrix as the password matrix after iteration;
the object linkage module determines the trend of the displacement identifier, namely determines the movement of the movement, respectively uses four coordinate sets to represent the direction of the movement, and respectively represents four types →, ←, ±, ↓, and ↓, namely represents one unit of movement moving upwards, downwards, leftwards and rightwards; the four coordinate sets include a coordinate set representing an upward movement by one movement unit, a coordinate set representing a downward movement by one movement unit, a coordinate set representing a leftward movement by one movement unit, and a coordinate set representing a rightward movement by one movement unitA coordinate set of a mobile unit; said set of coordinates records said route LiSaid route LiUsing the sequence S [ j ] for shifting]Represents, wherein S represents the route LiThe series Sj]Is composed of said displacement marks, representing the movement on said cryptographic matrix, using the sequence Sj on said set of coordinates]When said route L isiAt Sj]When upward is a unit of movement, S [ j ] is moved upward on the coordinate set of the unit of movement]Recording; when the route L isiAt Sj]When the upper is moved downwards by one movement unit, S [ j ] is moved downwards on the coordinate set of one movement unit]Recording; when the route L isiAt Sj]When the upper is moved to the left by one movement unit, S [ j ] is moved to the left by one movement unit on the coordinate set]Recording; when the route L isiAt Sj]Up is to move one unit of movement to the right, S [ j ] is moved on the coordinate set of one unit of movement to the right]Recording; l represents a route;
after the iterated password matrix is generated, a new route is immediately generated on the iterated password matrix, and then new offline passwords are generated, wherein each new offline password is valid within time d;
after all elements in the four coordinate sets in the password matrix are shifted, recording the contents in the four coordinate sets by using four temporary coordinate sets, generating a new route by the password matrix after iteration, generating the new offline password through the new route, further recording the movement of the new route by using the four coordinate sets, comparing the elements in the four coordinate sets with the elements in the temporary coordinate sets, when continuous three elements in the four coordinate sets are equal, emptying the elements in the four coordinate sets and the new route, iterating the password matrix again, and then continuously generating the route on the password matrix after iteration;
the method comprises the steps that a virtual password keyboard is arranged on the Internet of things client, the offline password is input on the virtual password keyboard and is sent to a password module to be compared with the password generated on a password matrix so as to carry out direct verification, a temporary communication channel is established between a mobile phone of a user and the washing machine through verification, required data are transmitted in the temporary communication channel, the required data comprise a washing machine starting command and a washing machine closing command, the temporary communication channel needs to be established in each verification, and after the washing machine receives the required data, the washing machine is operated according to the required data and the temporary communication channel is cancelled.
CN201710998956.9A 2017-10-24 2017-10-24 Offline continuous washing machine using method based on Internet of things Active CN109698749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710998956.9A CN109698749B (en) 2017-10-24 2017-10-24 Offline continuous washing machine using method based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710998956.9A CN109698749B (en) 2017-10-24 2017-10-24 Offline continuous washing machine using method based on Internet of things

Publications (2)

Publication Number Publication Date
CN109698749A CN109698749A (en) 2019-04-30
CN109698749B true CN109698749B (en) 2021-12-21

Family

ID=66226348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710998956.9A Active CN109698749B (en) 2017-10-24 2017-10-24 Offline continuous washing machine using method based on Internet of things

Country Status (1)

Country Link
CN (1) CN109698749B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1961525A (en) * 2003-05-02 2007-05-09 吉瑞泰克有限公司 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
CN101651546A (en) * 2009-09-11 2010-02-17 福建天晴在线互动科技有限公司 Method for off-line generation of dynamic password and debarkation authentication and synchronization of server
US7971234B1 (en) * 2006-09-15 2011-06-28 Netapp, Inc. Method and apparatus for offline cryptographic key establishment
CN106850367A (en) * 2017-03-02 2017-06-13 福州恰同学信息科技有限公司 High in the clouds controls the method and its system of washing machine
CN107026734A (en) * 2016-01-29 2017-08-08 李明 A kind of method and system that Password Management is carried out using certification lasting effectiveness
CN107239708A (en) * 2017-04-24 2017-10-10 广东工业大学 It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160036786A1 (en) * 2014-08-02 2016-02-04 Hardik Prakash GANDHI System and method facilitating enhanced inter-object and human-object interactivity using networked electronic devices
US10111070B2 (en) * 2015-07-03 2018-10-23 Afero, Inc. Embedded internet of things (IOT) hub slot for an appliance and associated systems and methods

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1961525A (en) * 2003-05-02 2007-05-09 吉瑞泰克有限公司 Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
US7971234B1 (en) * 2006-09-15 2011-06-28 Netapp, Inc. Method and apparatus for offline cryptographic key establishment
CN101651546A (en) * 2009-09-11 2010-02-17 福建天晴在线互动科技有限公司 Method for off-line generation of dynamic password and debarkation authentication and synchronization of server
CN107026734A (en) * 2016-01-29 2017-08-08 李明 A kind of method and system that Password Management is carried out using certification lasting effectiveness
CN106850367A (en) * 2017-03-02 2017-06-13 福州恰同学信息科技有限公司 High in the clouds controls the method and its system of washing machine
CN107239708A (en) * 2017-04-24 2017-10-10 广东工业大学 It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"实现常规洗衣机的远程云智能控制";周德建;《科技与企业》;20130222;全文 *
"物联网中基于ZigBee协议的安全算法研究";张亚琳;《中国优秀硕士学位论文全文数据库 信息科技辑》;20130115;全文 *
Jonathan Charity Talwana ; Huang Jian Hua."Smart World of Internet of Things (IoT) and Its Security Concerns".《2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)》.2017, *
Praveen Kumar ; Umesh Chandra Pati."IoT based monitoring and control of appliances for smart home".《2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)》.2017, *
张伟 ; 陆孝嵩 ; 徐刚 ; 苏忠诚."一种物联网智能洗衣机控制系统".《2016年中国家用电器技术大会论文集》.2016, *

Also Published As

Publication number Publication date
CN109698749A (en) 2019-04-30

Similar Documents

Publication Publication Date Title
Yang et al. Cloud based data sharing with fine-grained proxy re-encryption
Yao et al. A lightweight attribute-based encryption scheme for the Internet of Things
Yang et al. Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data
CN105577383B (en) The management of cryptographic key
CN103004129B (en) Encryption device, decryption device, encryption method, decryption method, program, and recording medium
CN102263636B (en) Stream cipher key control method for fusing neural network with chaotic mappings
NL2013520B1 (en) Public-key encryption system.
CN101453332A (en) Signature schemes using bilinear mappings
CN110807206A (en) College certificate storage management system based on block chain and attribute password
CN103873236A (en) Searchable encryption method and equipment thereof
CN103348624A (en) Signature processing system, key generation device, signature device, verification device, signature processing method and signature processing program
Sicari et al. Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware
CN102449632A (en) A method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
CN107086912A (en) Ciphertext conversion method, decryption method and system in a kind of heterogeneous storage system
CN108880803A (en) A kind of method and system signed using digital signature to block chain affairs
La Manna et al. SEA-BREW: A scalable attribute-based encryption revocable scheme for low-bitrate IoT wireless networks
Lin et al. A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles
Meng et al. Residual-adaptive key provisioning in quantum-key-distribution enhanced internet of things (q-iot)
CN109698749B (en) Offline continuous washing machine using method based on Internet of things
CN104144057B (en) A kind of CP ABE methods for generating secure decryption key
CN100546243C (en) Data sharing method, request processing method and device
Elhabob et al. A heterogeneous systems public key encryption with equality test in smart city
Wu et al. Attribute-based data access control scheme with secure revocation in fog computing for smart grid
CN109561067A (en) Strategy renewing new method and system based on CP-ABE
Koshiba et al. New assumptions on isogenous pairing groups with applications to attribute-based encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190726

Address after: 201605 No. 398 Xinlu Road, Xinbang Town, Songjiang District, Shanghai

Applicant after: Muyang Technology (Shanghai) Co., Ltd.

Address before: Room 3602, Building 3, 350 Xianxia Road, Changning District, Shanghai, 2006

Applicant before: Washing washing Intelligent Technology (Shanghai) Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant