CN109976166A - A kind of smart home connection management system - Google Patents
A kind of smart home connection management system Download PDFInfo
- Publication number
- CN109976166A CN109976166A CN201711439726.5A CN201711439726A CN109976166A CN 109976166 A CN109976166 A CN 109976166A CN 201711439726 A CN201711439726 A CN 201711439726A CN 109976166 A CN109976166 A CN 109976166A
- Authority
- CN
- China
- Prior art keywords
- central server
- smart home
- client
- server
- management system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM] characterised by the network communication
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/26—Pc applications
- G05B2219/2642—Domotique, domestic, home control, automation, smart house
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Abstract
The invention discloses a kind of smart home connection management systems, the system includes the central server, certificate server and client of smart home, three is communicated with each other by internet, client remotely connects the central server by internet, and controls smart home device by the central server.
Description
[technical field]
The invention belongs to field of intelligent control more particularly to a kind of smart home connection management systems.
[background technique]
In recent years, the concept of wired home initially enters people's lives, and so-called wired home refers to house to be flat
Platform, it is using comprehensive wiring technology, network communication technology, security precautions technology, automatic control technology, audio and video technology that household is raw
Related facility living is integrated, constructs the management system of efficient housing facilities and family's schedule affairs, promotes house security, just
Benefit, comfort, artistry, and realize the living environment of environmental protection and energy saving.
Existing smart home usually has a central server, and user connects central server using client remote
And through each equipment in central server control smart home, therefore, how to make client secure, reliably connects and be somebody's turn to do
Central server is just at an important problem.
[summary of the invention]
In order to solve existing technical problem, the invention proposes a kind of smart home connection management systems.
The technical solution adopted by the invention is as follows:
A kind of smart home connection management system, the system include the central server of smart home, certificate server and
Client, three are communicated with each other by internet, and client remotely connects the central server by internet, and passes through institute
State central server control smart home device;Wherein, the client and the central server establish the process packet of connection
It includes:
(1) user registers in the certificate server;
(2) central server is based on the registration information and authenticates oneself to certificate server, and sends relevant connection
Information;
(3) client is based on the registration information and authenticates oneself to certificate server, and obtains the link information,
The central server is connected according to the link information.
Further, it is connected between each smart home device and the central server by home Intranet.
Further, the home Intranet is WIFI network.
Further, Internet exportation of the central server as entire smart home.
Further, the client is smart phone.
What the present invention was realized has the technical effect that client is allowed safely and reliably to connect smart home central service
Device.
[Detailed description of the invention]
Described herein the drawings are intended to provide a further understanding of the invention, constitutes part of this application, but
It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is system construction drawing of the invention.
[specific embodiment]
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and says
It is bright to be only used to explain the present invention, but it is not intended as inappropriate limitation of the present invention.
Referring to attached drawing 1, it illustrates system construction drawing of the invention, which includes certificate server, central server
And client, it can be in communication with each other by internet between this three.It include multiple smart home devices, institute in smart home
It states and is connected between each smart home device and the central server by home Intranet, such as WIFI network etc..It is described
Central server is connected to internet, the Internet exportation as entire smart home.Client (such as intelligence can be used in user
Energy mobile phone) it is remotely connected by internet and the central server, house is accessed and controlled so as to pass through central server
In each smart machine.
The present invention is of interest, is exactly the network address how client remotely determines central server on the internet,
And secure connection is established with the central server.Detailed description are as follows:
(1) it is registered first by user in certificate server, registration information includes the identifier ID of the central server,
An and initial key Key.The registration information is respectively stored in the certificate server, central server and client,
To be used for subsequent use.
Specifically, the certificate server can be built by the manufacturer of central server, which is connected to
Internet, and there is fixed internet domain name or network address, the internet domain name or network address to be stored in advance in institute
It states in central server and client, so that central server and client be facilitated to be directly connected to the certificate server.
The identifier ID of the central server can be a global unique encodings, be used to the unique identification central service
Device.The initial key Key is a biggish random number, and length is determined according to the demand of subsequent Encryption Algorithm, e.g.
One 128 random numbers.
(2) after the central server is connected to internet, a communication key K is generated at random, and assemble one
Message package M0It is sent to the certificate server, in which:
M0={ ID, EKey(K, ID, Date) }
EKey() is the asymmetric encryption function encrypted using key Key, be may be used herein any in this field
A kind of well known symmetric encipherment algorithm, such as aes algorithm.Date is current date.
It should be noted that central server monitors the network address (such as IP address) of itself at any time, once itself
Network address changes, which just needs to re-execute an above-mentioned steps (2), that is, random generation again
New communication key, and assemble and send new address notification information packet.
(3) certificate server obtains the network address of the central server of connection, and to the message package M0It carries out
Parsing, obtains ID and E thereinKey(K, ID, Date).
It is connected to the network since central server transmission packet is necessarily required to establish with certificate server, then the authentication service
Device can directly acquire the network address of central server by the network connection.
(4) certificate server obtains corresponding registration information according to the ID that parsing obtains, and obtains corresponding initial
Key Key, using initial key Key to EKey(K, ID, Date) is decrypted, and checks ID and the parsing that decryption obtains
Whether obtained ID is identical, if it is not the same, then message package M0It is illegal, directly ignore message package M0;If identical,
Obtain the triple (K, ID, Date) that decryption obtains.
As previously mentioned, registration information is stored in certificate server after user's registration, typically, certificate server can
To use a customer data base to save all registration informations, then its can by the unique identifier ID in registration information,
Corresponding initial key is retrieved in the database.
(5) whether the triple that the certificate server judges that decryption obtains has existed in the database, if it does,
Then ignore message package M0, if it does not exist, then the triple is stored in the database, while saving the central service
The network address of device.
The communication key K is a random number, all should be each time it is different, along with the limit of ID and date
System, the probability for identical triple really occur is extremely small, so if triple has existed in the database, then can recognize
For this message package M0It had previously received, it is illegal that current message package, which is likely to the Replay Attack of hacker,
's.
Above-mentioned steps (2)-(5) are actually the mistake that central server authenticates oneself based on registration information to certificate server
Journey, certificate server obtain the network address and communication key of central server after certification.
(6) when client needs to obtain the network address of central server, a message package M is assembled1, it may be assumed that
M1={ ID, EKey(ID, Salt, Date1)}
Wherein, Salt is a random number, for playing the role of random disturbances, avoids being played out attack.Date1It is to work as
The preceding date.
(7) client is by the message package M1It is sent to the certificate server, the certificate server is to M1It carries out
Parsing, obtains ID and E thereinKey(ID, Salt, Date1)。
(8) certificate server obtains corresponding registration information according to the ID that parsing obtains, and obtains corresponding initial
Key Key, using initial key Key to EKey(ID, Salt, Date1) be decrypted, check the ID and parsing M that decryption obtains1
Whether obtained ID is identical, if it is not the same, then message package M1It is illegal, ignore message package M1, end processing, if phase
Together, then triple (ID, Salt, Date that decryption obtains are obtained1)。
(9) certificate server judges triple (ID, Salt, Date1) whether have existed in the database, if
In the presence of then ignoring message package M1, end processing;If it does not exist, then by the triple (ID, Salt, Date1) it is stored in number
According in library, continue subsequent step.
Similar with above-mentioned steps (5), step (9) is also for the Replay Attack for preventing hacker.Above-mentioned steps (6)-(9) are real
It is the process that client authenticates oneself based on registration information to certificate server on border.
(10) certificate server assembles a message package M2Return to the client, it may be assumed that M2=EKey(IP, ID,
K), wherein IP be the central server network address.
(11) client is using initial key Key to M2It is decrypted, obtains IP, ID and K.
(12) client judge the obtained ID of decryption whether be the central server to be connected ID, if not
It is then to ignore message package M2, if so, it may be considered that IP is the network address of the central server of required connection, from
And client is based on the IP and central server is established and is connected to the network, and is added using communication key K and the central server
Close communication.In this way, client just establishes secure connection with central server.
After this, client can store IP and K, and when needing to connect central server every time, all using first should
IP and K are attached, but when certain primary discovery can not connect central server using the IP and K, illustrate that the center takes
The network address of business device may have occurred variation, then client repeats step 6-12, to obtain new IP and K.
The above description is only a preferred embodiment of the present invention, thus it is all according to the configuration described in the scope of the patent application of the present invention,
The equivalent change or modification that feature and principle are done, is included in the scope of the patent application of the present invention.
Claims (5)
1. a kind of smart home connection management system, which is characterized in that the system includes the central server of smart home, certification
Server and client side, three are communicated with each other by internet, and client remotely connects the central server by internet,
And smart home device is controlled by the central server;Wherein, the client and the central server establish connection
Process include:
(1) user registers in the certificate server;
(2) central server is based on the registration information and authenticates oneself to certificate server, and sends relevance linkage information;
(3) client is based on the registration information and authenticates oneself to certificate server, and obtains the link information, according to
The link information connects the central server.
2. smart home connection management system according to claim 1, which is characterized in that each smart home device and should
It is connected between central server by home Intranet.
3. smart home connection management system according to claim 2, which is characterized in that the home Intranet is
WIFI network.
4. smart home connection management system according to claim 3, which is characterized in that the central server is as whole
The Internet exportation of a smart home.
5. smart home connection management system according to claim 4, which is characterized in that the client is intelligent hand
Machine.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711439726.5A CN109976166A (en) | 2017-12-27 | 2017-12-27 | A kind of smart home connection management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711439726.5A CN109976166A (en) | 2017-12-27 | 2017-12-27 | A kind of smart home connection management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109976166A true CN109976166A (en) | 2019-07-05 |
Family
ID=67072334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711439726.5A Pending CN109976166A (en) | 2017-12-27 | 2017-12-27 | A kind of smart home connection management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109976166A (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101102241A (en) * | 2007-05-14 | 2008-01-09 | 吴平 | Digital home remote control technology |
CN102355390A (en) * | 2011-08-16 | 2012-02-15 | 中国科学院电工研究所 | Intelligent home system |
CN102594823A (en) * | 2012-02-20 | 2012-07-18 | 南京邮电大学 | Trusted system for remote secure access of intelligent home |
CN103825939A (en) * | 2014-01-28 | 2014-05-28 | 郑春阳 | Household appliance networking control system |
CN104852843A (en) * | 2015-05-18 | 2015-08-19 | 广西大学 | Remote home control system based on WeChat public platform |
CN104991454A (en) * | 2015-05-21 | 2015-10-21 | 广西梧州市网讯电子科技有限公司 | Internet of Things safety remote control system based on WeChat |
CN105093948A (en) * | 2015-07-13 | 2015-11-25 | 小米科技有限责任公司 | Intelligent device control method, terminal, and server |
CN105487391A (en) * | 2015-11-23 | 2016-04-13 | 王丽华 | Intelligent household remote control system based on Internet of Things |
CN105681360A (en) * | 2016-04-01 | 2016-06-15 | 北京奇虎科技有限公司 | Smart home communication method and device |
KR20160075188A (en) * | 2014-12-19 | 2016-06-29 | 삼성전자주식회사 | Method and Device for controlling electronic device |
CN105959299A (en) * | 2016-03-23 | 2016-09-21 | 四川长虹电器股份有限公司 | Method for issuing safety certificate and safety certificate server |
CN106325078A (en) * | 2015-06-15 | 2017-01-11 | 思普尔黄石物联科技有限公司 | Smart household safety control system based on Internet of Things technology |
KR20170112361A (en) * | 2016-03-31 | 2017-10-12 | 엘에스산전 주식회사 | Smart home network systembased on internet of things |
KR101789264B1 (en) * | 2016-07-25 | 2017-10-26 | 주식회사 나우소프트 | Authentication system of IoT devices and Method using the same |
-
2017
- 2017-12-27 CN CN201711439726.5A patent/CN109976166A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101102241A (en) * | 2007-05-14 | 2008-01-09 | 吴平 | Digital home remote control technology |
CN102355390A (en) * | 2011-08-16 | 2012-02-15 | 中国科学院电工研究所 | Intelligent home system |
CN102594823A (en) * | 2012-02-20 | 2012-07-18 | 南京邮电大学 | Trusted system for remote secure access of intelligent home |
CN103825939A (en) * | 2014-01-28 | 2014-05-28 | 郑春阳 | Household appliance networking control system |
KR20160075188A (en) * | 2014-12-19 | 2016-06-29 | 삼성전자주식회사 | Method and Device for controlling electronic device |
CN104852843A (en) * | 2015-05-18 | 2015-08-19 | 广西大学 | Remote home control system based on WeChat public platform |
CN104991454A (en) * | 2015-05-21 | 2015-10-21 | 广西梧州市网讯电子科技有限公司 | Internet of Things safety remote control system based on WeChat |
CN106325078A (en) * | 2015-06-15 | 2017-01-11 | 思普尔黄石物联科技有限公司 | Smart household safety control system based on Internet of Things technology |
CN105093948A (en) * | 2015-07-13 | 2015-11-25 | 小米科技有限责任公司 | Intelligent device control method, terminal, and server |
CN105487391A (en) * | 2015-11-23 | 2016-04-13 | 王丽华 | Intelligent household remote control system based on Internet of Things |
CN105959299A (en) * | 2016-03-23 | 2016-09-21 | 四川长虹电器股份有限公司 | Method for issuing safety certificate and safety certificate server |
KR20170112361A (en) * | 2016-03-31 | 2017-10-12 | 엘에스산전 주식회사 | Smart home network systembased on internet of things |
CN105681360A (en) * | 2016-04-01 | 2016-06-15 | 北京奇虎科技有限公司 | Smart home communication method and device |
KR101789264B1 (en) * | 2016-07-25 | 2017-10-26 | 주식회사 나우소프트 | Authentication system of IoT devices and Method using the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10838705B2 (en) | System and method for service-initiated internet of things (IoT) device updates | |
CN107683601B (en) | Relay services for the communication between controller and attachment | |
US20210037370A1 (en) | Apparatus and method for registering and associating internet of things (iot) devices with anonymous iot device accounts | |
CN105009131B (en) | Promote the multilayer authentication method communicated between intelligent home equipment and server based on cloud | |
CN104813685B (en) | The subscription informing mechanism of synchronization for distributions | |
US7840688B2 (en) | Information processing device, server client system, method, and computer program | |
US10873634B2 (en) | Apparatus and method for temporarily loaning internet of things (IOT) devices | |
US10924920B2 (en) | System and method for internet of things (IoT) device validation | |
US20060174037A1 (en) | Identifying a computer device | |
US20070294753A1 (en) | Adaptor or ic card for encrypted communication on network | |
US20140038556A1 (en) | Mobility Device Security | |
KR20190013867A (en) | System and method for establishing a secure communication channel with an Internet (IoT) device | |
US20190118767A1 (en) | Wireless key system and method | |
WO2020005418A1 (en) | Secure shipment receive apparatus with delegation-chain | |
KR20180094985A (en) | Systems and Methods for Provisioning Security Objects Internet (IoT) Devices | |
CN108111303A (en) | A kind of secure connection method of intelligent home gateway | |
US20110013775A1 (en) | System and method of mobile content sharing and delivery in an integrated network environment | |
US10645580B2 (en) | Binding an authenticated user with a wireless device | |
CN103051448A (en) | Authentication method, device and system for pairing code of business terminal attached to home gateway | |
CN104247485A (en) | Network application function authorisation in a generic bootstrapping architecture | |
CN111586105A (en) | Automatic network distribution method for intelligent equipment and intelligent equipment | |
JP6466382B2 (en) | Method and apparatus for sending keys | |
CN108667800A (en) | A kind of authentication method and device of access rights | |
US20090150979A1 (en) | Network system, network method, and terminal and program therefor | |
JP2006508415A (en) | Method and system for distributing data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |
|
RJ01 | Rejection of invention patent application after publication |