CN110191086A - Intelligentized Furniture remote security control method, device, computer equipment and storage medium - Google Patents
Intelligentized Furniture remote security control method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110191086A CN110191086A CN201910299860.2A CN201910299860A CN110191086A CN 110191086 A CN110191086 A CN 110191086A CN 201910299860 A CN201910299860 A CN 201910299860A CN 110191086 A CN110191086 A CN 110191086A
- Authority
- CN
- China
- Prior art keywords
- intelligentized furniture
- control
- data
- client
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 103
- 230000005540 biological transmission Effects 0.000 claims abstract description 26
- 238000004590 computer program Methods 0.000 claims description 20
- 230000015654 memory Effects 0.000 claims description 18
- 238000012795 verification Methods 0.000 claims description 9
- 238000012790 confirmation Methods 0.000 claims description 7
- 235000013399 edible fruits Nutrition 0.000 claims description 5
- 238000001514 detection method Methods 0.000 claims description 4
- 238000012546 transfer Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000004378 air conditioning Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003058 natural language processing Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 210000001747 pupil Anatomy 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/2816—Controlling appliance services of a home automation network by calling their functionalities
- H04L12/282—Controlling appliance services of a home automation network by calling their functionalities based on user interaction within the home
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Abstract
The embodiment of the present application provides a kind of intelligentized Furniture remote security control method, device, computer equipment and storage medium, is related to technical field of data security.The described method includes: obtaining the control encryption data in control request if receiving the control request of intelligentized Furniture client transmission;The default private key of saved first is utilized to be decrypted control encryption data, to obtain the control information in control request;Parsing control information obtains control instruction;Control instruction is utilized into the default private key encryption of saved second, to obtain instruction encryption data, and it is sent to the intelligentized Furniture for having corresponding relation with the intelligentized Furniture client, so that intelligentized Furniture obtains control instruction according to the saved second default public key decryptions, and intelligentized Furniture is controlled according to control instruction.The embodiment of the present application can be during remotely control intelligentized Furniture, and the safety of improve data transfer improves the experience of user.
Description
Technical field
This application involves technical field of data security more particularly to a kind of intelligentized Furniture remote security control method, device,
Computer equipment and storage medium.
Background technique
The control of intelligentized Furniture at present can all be related to remotely controlling.Long-range control is substantially Telnet and sends control
Information processed, Lai Shixian remote control home have equipment.Due to being remotely to control, there is very big hidden danger in safety.
Summary of the invention
The embodiment of the present application provides a kind of intelligentized Furniture remote security control method, device, computer equipment and storage and is situated between
Matter, can be during remotely control intelligentized Furniture, the safety of improve data transfer.
In a first aspect, the embodiment of the present application provides a kind of intelligentized Furniture remote security control method, it is applied to intelligent family
The server end of tool, this method comprises:
If receiving the control request of intelligentized Furniture client transmission, the control obtained in the control request encrypts number
According to the control encryption data is will to control the first default public key that the control use of information in request is saved encrypt
It arrives;The default private key of saved first is utilized to be decrypted the control encryption data, to obtain in the control request
Control information, wherein the first default public key and the first default private key are a pair of of code keys;Parse the control information
Obtain control instruction;The control instruction is utilized into the default private key encryption of saved second, to obtain instruction encryption data;It will
Described instruction encryption data is sent to the intelligentized Furniture for having corresponding relation with the intelligentized Furniture client, so that intelligentized Furniture root
According to the saved second default public key decryptions described instruction encryption data to obtain control instruction, and intelligence is controlled according to control instruction
It can furniture, wherein the second default public key and the second default private key are a pair of of code key.
Second aspect, another embodiment of the application provide a kind of intelligentized Furniture remote security control method, are applied to intelligence
The client of energy furniture, this method comprises:
If the server end of successful log intelligentized Furniture, the control use of information for controlling intelligentized Furniture is saved first
Default public key is encrypted to obtain control encryption data;Control request is sent to the server end of intelligentized Furniture, so that institute
It states server end and the control encryption data controlled in request is decrypted according to the saved first default private key, to be controlled
Information, and parse the control information and obtain control instruction, utilize the default private key of saved second to add the control instruction
It is close, to obtain instruction encryption data, and instruction encryption data is sent to intelligentized Furniture, so that intelligentized Furniture is according to being saved
The second default public key decryptions described instruction encryption data to obtain control instruction, and intelligentized Furniture is controlled according to control instruction,
Wherein, the described first default public key and the first default private key are a pair of of code keys, the second default public key and described second
Default private key is a pair of of code key;The encrypted result data that the server end returns are received, the encrypted result data are described
Server end by control result using the data after the first default private key encryption, the control result be the server end according to
The result encryption data that the intelligentized Furniture received returns, is decrypted, the result adds using the second default private key
Ciphertext data is that the intelligentized Furniture obtains the control result of intelligentized Furniture using the second default public key encryption;By the encryption
Result data is using the first default public key decryptions to obtain control result.
The third aspect, the embodiment of the present application provide a kind of intelligentized Furniture long-distance safety controller, and the intelligentized Furniture is remote
Journey safety control includes for executing the corresponding unit of method described in above-mentioned first aspect or for executing above-mentioned
The corresponding unit of method described in two aspects.
Fourth aspect, the embodiment of the present application provide a kind of intelligentized Furniture telesecurity control system, and the intelligentized Furniture is remote
Journey safety control system include the server end of intelligentized Furniture and the client of at least one intelligentized Furniture and with the intelligence
The client of energy furniture has the intelligentized Furniture of corresponding relation, wherein the server end of the intelligentized Furniture includes for executing such as
The unit of above-mentioned first aspect the method, the client of the intelligentized Furniture include for executing as described in above-mentioned second aspect
The unit of method.
5th aspect, the embodiment of the present application provide a kind of computer equipment, and the computer equipment includes memory, with
And the processor being connected with the memory;
The memory is for storing computer program, and the processor is for running the calculating stored in the memory
Machine program, to execute method described in above-mentioned first aspect or to execute method described in above-mentioned second aspect.
6th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, when the computer program is executed by processor, realizes method described in above-mentioned first aspect,
Or realize method described in above-mentioned second aspect.
The embodiment of the present application passes through between the client and intelligentized Furniture by the server of intelligentized Furniture and intelligentized Furniture
The data encryption transmitted is transmitted, so can be during remotely control intelligentized Furniture, the safety of improve data transfer
Property, improve the experience of user.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the timing signal of the register method in intelligentized Furniture remote security control method provided by the embodiments of the present application
Figure;
Fig. 2 is the login method timing signal in intelligentized Furniture remote security control method provided by the embodiments of the present application
Figure;
Fig. 3 is the control method timing signal in intelligentized Furniture remote security control method provided by the embodiments of the present application
Figure;
Fig. 4 is the schematic block diagram of intelligentized Furniture telesecurity control system provided by the embodiments of the present application;
Fig. 5 is the schematic block diagram of computer equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen
Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall in the protection scope of this application.
Fig. 1 to Fig. 3 is please referred to, in figs. 1 to 3, the server of client 100, intelligentized Furniture including intelligentized Furniture
200, intelligentized Furniture 300.Wherein, the client of intelligentized Furniture and intelligentized Furniture have corresponding matching relationship.The client of intelligentized Furniture
End 100 includes the terminal that can be used for remotely controlling intelligentized Furniture, such as mobile phone terminal, PAD, intelligent wearable device terminal are set
It is standby.Intelligentized Furniture 30 can be any intelligentized Furniture, such as intelligent curtain, intelligent air condition.The client of intelligentized Furniture
100, the server 200 of intelligentized Furniture, intelligentized Furniture 300 constitute intelligentized Furniture telesecurity control system.The embodiment of the present application
The client 100 and intelligentized Furniture 300 of middle intelligentized Furniture only one, it is possible to understand that ground, in other embodiments, intelligentized Furniture
Client and intelligentized Furniture can also have more.In other embodiments, the server end of intelligentized Furniture can also have more
It is multiple.
Fig. 1 is the timing signal of the register method of intelligentized Furniture remote security control method provided by the embodiments of the present application
Figure.As shown in Figure 1, this approach includes the following steps S111-S113, S121-S126, S131.Wherein, step S111-S113 is transported
Row is in the client of intelligentized Furniture, and step S121-S126 runs on the server end of intelligentized Furniture, and step S131 runs on intelligence
Furniture end.It should be noted that the timing diagram of the register method is only an example, to understand register method for convenience
Process can also include the steps that more in other embodiments.It is described individually below according to the angle of different executing subjects
The register method.
S111 sends registration request to the server end of intelligentized Furniture, includes identification data in the registration request
With the identification information of intelligentized Furniture so that the server end determines whether the registration request leads to according to the identification information
Cross verifying.
Intelligentized Furniture client sends registration request, the received server-side of intelligentized Furniture to the server end of intelligentized Furniture
The registration request.It include identification data in the registration request, which includes physical characteristic data.Certainly,
The identification data can also include one of electronic passwords, log-in password or combination.Wherein, physical characteristic data can
To include fingerprint, pupil, shape of face, sound medium one kind or combination.By taking fingerprint as an example, intelligence is acquired by fingerprint acquisition device
The fingerprint of user corresponding to furniture client.It further include the identification information of intelligentized Furniture in the registration request, wherein intelligentized Furniture
Identification information include at least intelligentized Furniture device number, device model etc., can unique identification intelligentized Furniture information.
For the information of registration request by verifying, the identification information including intelligentized Furniture passes through verifying.In the clothes of intelligentized Furniture
It is engaged in the database of device that the identification information of intelligentized Furniture can be saved.Such as verify the device number of the intelligentized Furniture, device model is
It is no to be matched with the device number saved in database, device model, if it does, then determining the identification information of intelligentized Furniture by testing
Card;If mismatching, it is determined that the identification information of intelligentized Furniture is unverified, as the identification information of intelligentized Furniture fills in mistake
Deng the information of such registration request is also unverified.If by verifying, it means that succeeding in registration;If unverified,
Mean registration failure.In one embodiment, identification data includes voice messaging.
S112 receives the message to succeed in registration that the server end is sent.It is to be appreciated that can also receive server end
The message of the registration failure of transmission.
S113 receives the first default public key that the server end is sent, which is the server end
It after succeeding in registration, is generated using rivest, shamir, adelman, the first default private of the first default public key and server end
Key is a pair of of code key.
Wherein, rivest, shamir, adelman can generate a pair of of code key, i.e. public key and private key in use, using public key plus
It is close, it could be decrypted using private key.Asymmetric arithmetic such as RSA Algorithm.Such as in RSA Algorithm, secret key pair is generated in the following manner:
Randomly choose two unequal prime number p and q;Calculate the product n of p and q;Calculate the Euler's function φ (n) of n;Random selection one
A integer e, condition is 1 < e < φ (n), and e and φ (n) is relatively prime;E is calculated for the mould antielement d of φ (n);N and e are packaged into
Public key, n and d are packaged into private key.
S121 receives the registration request of the client, obtains identification data and intelligence in the registration request
The identification information of furniture, wherein the identification data includes physical characteristic data.
S122 determines whether the registration request passes through verifying according to the identification information of the intelligentized Furniture.
S123, if the registration request, by verifying, determination is succeeded in registration, and saves the client and intelligentized Furniture
Corresponding relation and the identification data.It should be understood that determining that registration is lost if the registration request is unverified
It loses.
S124, Xiang Suoshu client send the message to succeed in registration.It is to be appreciated that server can also lose determining registration
After losing, Xiang Suoshu client sends the message of registration failure.
S125, if intelligentized Furniture client registers success, using rivest, shamir, adelman generate the first default public key and
First default private key, the second default public key and the second default private key.
Wherein, the first default public key and the first default private key are a pair of of code key, the second default public key and the second default private key
It is a pair of of code key.
Generated second default public key is sent to smart home by S126, and the generated first default public key is sent
To the client.
S131, intelligentized Furniture receive the second default public key that the server end is sent.
In one embodiment, it if the client registers success of intelligentized Furniture, is generated using rivest, shamir, adelman a pair of secret
Key, a pair of code key include default public key and default private key, and default public key is respectively issued to the client of intelligentized Furniture, intelligentized Furniture
End.Default private key is stored in the server end.It can be appreciated that the first default public key and the second default public key are identical, first
Default private key and the second default private key are identical.
The embodiment is the register method embodiment in intelligentized Furniture remote security control method.When registering completion, intelligence
Can the server end of furniture can generate two pairs of code keys, including the first default public key and the first default private key, the second default public key and
Second default private key.And the generated first default public key is sent to intelligentized Furniture client, the second default public key is sent
To intelligentized Furniture.In this way, server public key generated can be preserved in intelligentized Furniture client and intelligentized Furniture, in intelligence
The server end of furniture includes accordingly private key.
Fig. 2 is the timing signal of the login method of intelligentized Furniture remote security control method provided by the embodiments of the present application
Figure.As shown in Fig. 2, this approach includes the following steps S211-S214, S221-S225.Wherein, step S211-S214 runs on intelligence
The client of energy furniture, step S221-S225 run on the server end of intelligentized Furniture.It should be noted that the login method
Timing diagram be only an example, to understand the process of login method for convenience, in other embodiments, can also include
More steps.The login method is described according to the angle of different executing subjects individually below.
S211 will log in required identification data, be encrypted using the saved first default public key, to obtain
Log in encryption data.
When such as using RAS Encryption Algorithm, when being encrypted using public key, calculated using following encryption formula (formula 1)
Ciphertext c;When being decrypted using private key, plaintext m is decrypted out using following decryption formula (formula 2).
me≡ c (mod n) formula 1
cd≡ m (mod n) formula 2
Wherein, encrypting the m in formula is in plain text, to correspond to ascii value or unicode value etc., and c is encrypted ciphertext,
Include n and e in public key, includes n and d in private key.
As in this step, required identification data will be logged in and be converted to ascii value, as in plain text, utilizes calculating
N and e out, and encryption formula calculate and log in encryption data.When decryption logs in encryption data, the n calculated is utilized
And d, and encrypt formula and calculate in plain text, then plaintext is obtained against ascii code table and logs in required identification data.
It should be noted that the process of encryption and decryption hereinafter is also such.
S212, Xiang Suoshu server end send log on request, so that the server end is pre- according to first saved
If private key is decrypted in the log on request and logs in encryption data, to obtain identification data, and identification data is judged
Whether matched with the identification data saved when registration and is determined whether to log in success according to matching result, wherein the
One default public key and the first default private key are a pair of of code keys.
Intelligentized Furniture client sends log on request, the received server-side of intelligentized Furniture to the server end of intelligentized Furniture
The log on request.It wherein, include logging in encryption data in log on request, it is by the identity in log on request that this, which logs in encryption data,
It identifies data, the default public key encryption of saved first is utilized to obtain.Since the first default private key is in the service of intelligentized Furniture
Device end, thus the received server-side of only intelligentized Furniture encryption data is logged in this after can just be carried out with the first default private key
Decryption, and other terminals are received after this logs in encryption data and can not be decrypted.
If identification data is matched with the identification data that is saved when registration, it is determined that success is logged in, if not
Match, it is determined that log in failure.
S213 logs in result data described in reception, wherein the result data that logs in is that the server end is stepped on described
What Lu Chenggong or the information for logging in failure were obtained by the first default private key encryption, wherein if identification data and registration
When the identification data matching that is saved, it is determined that success is logged in, if the identity that is saved when identification data and registration
Identify that data mismatch, it is determined that log in failure.
S214 logs in result data for described, is decrypted using the first default public key, to obtain logging in successfully or wait
To failure news.
S221 receives the log on request of the client, obtains in the log on request and logs in encryption data, wherein
The encryption data that logs in is that intelligentized Furniture client will log in required identification data, utilizes the first default public key encryption
It obtains.
The encryption data that logs in is utilized default private key to be decrypted, to obtain the body in the log on request by S222
Part identification data.
S223 judges the identification data saved when the identification data and the client registers that decryption obtains
Whether match.
S224, the identification data saved when if decrypting obtained identification data and the client registers
Match, it is determined that log in success, the identification saved when if decrypting obtained identification data and the client registers
Data mismatch, it is determined that log in failure.
S225, by the information for logging in successfully or logging in failure by the first default private key encryption to obtain logging in knot
Fruit data.
The result data that logs in is sent to the client by S226, so that the client is according to the first default public affairs
Key come decrypt it is described log in result data, to obtain logging in successfully or log in failure news.
The embodiment is the login method embodiment in intelligentized Furniture remote security control method.Intelligentized Furniture client
It logs in and has used the double-deck verifying.First layer verifying is encrypted using public key and private key, so guarantees that data are being transmitted across
Safety in journey.Second layer verifying, is verified using identification data, since identification data includes human body spy
Data are levied, and physical characteristic data has uniqueness.In this way, the double-deck verifying improves the safety of information.
Fig. 3 is the timing signal of the control method of intelligentized Furniture remote security control method provided by the embodiments of the present application
Figure.As shown in Fig. 2, this approach includes the following steps S311-S315, S321-S329, S331-S335.Wherein, step S311-
S315 runs on the client of intelligentized Furniture, and step S321-S329 runs on the server end of intelligentized Furniture, step S331-
S335 runs on intelligentized Furniture end.It should be noted that the timing diagram of the control method is only an example, with for convenience
Understand the process of control method, in other embodiments, can also include the steps that more others that either pass through control stream
Journey completes control.The control method is described according to the angle of different executing subjects individually below.
S311 is saved the control use of information for controlling intelligentized Furniture if the server end of successful log intelligentized Furniture
The first default public key encrypted with obtain control encryption data.
S312, Xiang Suoshu server end send control request, so that the server end is pre- according to first saved
If private key decrypts the control encryption data in the control request, to obtain control information, and parses the control information and obtain
The control instruction is utilized the default private key encryption of saved second by control instruction, to obtain instruction encryption data, and will be referred to
Encryption data is enabled to be sent to intelligentized Furniture, so that intelligentized Furniture adds according to the saved second default public key decryptions described instruction
Ciphertext data controls intelligentized Furniture according to control instruction to obtain control instruction, wherein the first default public key and described the
One default private key is a pair of of code key, and the second default public key and the second default private key are a pair of of code keys.
S313 receives the encrypted result data that the server end is sent, and the encrypted result data are the servers
By control result using the data after the first default private key encryption, the control result is the server end according to receiving at end
Intelligentized Furniture return result encryption data, be decrypted using the second default private key, the result encryption data
It is that the intelligentized Furniture obtains the control result of intelligentized Furniture using the second default public key encryption.
S314, by the encrypted result data using the first default public key decryptions to obtain the control result of intelligentized Furniture.
S315 shows the control result of the intelligentized Furniture.
S321, receives the control request that intelligentized Furniture client is sent, and the control obtained in the control request encrypts number
According to, wherein the control encryption data is will to control the control use of information in request is saved first default public key to carry out
What encryption obtained.
Wherein, control information includes a variety of, and control information, the character string triggered such as speech-controlled information, button controls letter
Breath etc..As speech-controlled information means that the control information is generating by way of voice.
Intelligentized Furniture client sends control request, the received server-side of intelligentized Furniture to the server end of intelligentized Furniture
Control request, to obtain the control encryption data in control request.
The control encryption data is utilized the default private key of saved first to be decrypted, to obtain the control by S322
Control information in system request.
S323 parses the control information and obtains control instruction.
It is encrypted using public key by information is controlled, and is decrypted using private key, ensure that control information is being transmitted across
Safety in journey.
The control instruction is utilized the default private key encryption of saved second by S324, to obtain instruction encryption data.
Described instruction encryption data is sent to the intelligent family for having corresponding relation with the intelligentized Furniture client by S325
Tool so that intelligentized Furniture according to the saved second default public key decryptions described instruction encryption data to obtain control instruction, and
Intelligentized Furniture is controlled according to control instruction.
S326 receives the result encryption data that intelligentized Furniture returns, wherein the result encryption data is by smart home
The data that are obtained using the second default public key encryption of control result.
The result encryption data is decrypted S327 using the described second default private key, to obtain the intelligent family
The control result of tool.
S328 is encrypted the control result of the intelligentized Furniture, using the first default private key to obtain encrypted result
Data.
Encrypted result data are sent to the client by S329, so that the client of the smart home passes through the
Encrypted result data described in one default public key decryptions, and show the control result of the intelligentized Furniture after decryption.
S331 receives the instruction encryption data that the server end is sent, wherein described instruction encryption data is the clothes
Business device end is encrypted the control instruction of the client of intelligentized Furniture using the saved second default private key.
S332, using the described second default public key decryptions described instruction encryption data to obtain control instruction.
S333 controls the intelligentized Furniture according to the control instruction.
S334 is encrypted the control result for controlling the intelligentized Furniture, using the described second default public key to obtain
As a result encryption data.
S335, by the result encryption data be sent to the server end so that the server-side utilize second
Default private key decrypts the result encryption data to obtain the control result of intelligentized Furniture, and by the control knot of the intelligentized Furniture
Fruit is encrypted to obtain encrypted result data using the first default private key, and decrypted result data is sent to the client
End, so that the client decrypts the encrypted result data to obtain the control result of intelligentized Furniture.
In one embodiment, if control information is speech-controlled information.The method for running on the server end of intelligentized Furniture
It is further comprising the steps of:
A extracts the feature in speech-controlled information, and the feature in the feature of extraction and the voice messaging prestored is carried out
Matching.If the feature extracted and the characteristic matching success in the voice messaging prestored, execute the parsing control information and obtain
The step of to control instruction.
If successful match, then it is assumed that send the language saved when user corresponding to the client of speech-controlled information and registration
User corresponding to sound message is same user, is my voice.If matching unsuccessful, then it is assumed that send voice control and disappear
User corresponding to the speech message that user corresponding to the client of breath and when registration save is not same user, then existing
Following two situation: one, it is me, but I causes voice to there is difference due to flu etc.;Two, illegal user.
If it is the first situation, then can further be verified, if it is second situation, it is considered that be illegal user,
Illegal user not can be carried out long-range control.
B generates identifying code if the feature extracted and the non-successful match of feature in the voice messaging that prestores, and to described
Client sends identifying code generated.Wherein, identifying code can be sent by way of short message.
Whether C, detection receive the identifying code confirmation message that the smart home client returns within effective verification time.
Wherein, the identifying code confirmation message of return includes the correct identifying code returned, can also be other identifying code verification informations.
If receiving the identifying code confirmation message that the smart home client returns within effective verification time, execute described in the parsing
The step of control information obtains control instruction.
If receiving the correct identifying code of intelligentized Furniture client return within verifying effective time, then it is assumed that be me
Operation, and due to other reasons such as catch a cold and cause the voice control message of transmission from the speech message that prestores there are different.
It is returned if not receiving the identifying code of intelligentized Furniture client return within verifying effective time or receiving intelligentized Furniture client
Return identifying code but identifying code mistake, it is considered that being illegal user.
If non-successful match, and it is true not receive the identifying code that the smart home client returns within effective verification time
Recognize information, it is considered that being illegal user, Xiang Suoshu client returns to control failure news.
Above step A, B, C verify speech-controlled information, and mismatch if verified in speech-controlled information
In the case where, it further verifies whether the operation for me, the safety of data transmission is improved, to further increase user's
Experience.
In one embodiment, if control information is speech-controlled information, step S323 parses the control information and obtains
Control instruction, comprising: by speech recognition algorithm to obtain text corresponding to speech-controlled information;Utilize natural language processing
Method segments obtained text, to obtain keyword;Control instruction is generated according to keyword.Wherein, the basis
Keyword generates control instruction, comprising: obtains preset intelligentized Furniture code and control routine;According to preset intelligentized Furniture generation
The keyword is generated the control instruction including intelligentized Furniture code and control routine by code and control routine.The pass such as obtained
Key word is " air-conditioning " "ON", then the corresponding control instruction that generates and turn on the aircondition.Obtain preset intelligentized Furniture code and control
Code processed searches intelligentized Furniture code corresponding to air-conditioning and opens corresponding control routine, the intelligence as corresponding to " air-conditioning "
Furniture code is 32011, control routine corresponding to "ON" is 01 etc..The control instruction includes intelligentized Furniture code, control
Code etc., that is, the control instruction ultimately produced include 32011 and 01 etc..
In one embodiment, if control information is character string control information, step S323 parses the control information and obtains
To control instruction, comprising: segmented obtained text using natural language processing method, to obtain keyword;According to
Keyword generates control instruction.
In one embodiment, step S333 controls the intelligentized Furniture according to the control instruction, comprising: parsing control
Whether intelligentized Furniture code and control routine in system instruction, the intelligentized Furniture code for judging that parsing obtains are pre- with intelligentized Furniture
Whether the intelligentized Furniture code deposited is consistent, if unanimously, being controlled according to the control routine that parsing obtains intelligentized Furniture.
The embodiment is the control method embodiment in intelligentized Furniture remote security control method.Intelligent family is controlled long-range
Transmitted information is all encrypted using public key or private key during tool, and is accordingly decrypted.So, it is ensured that remote
The safety of transmitted information during process control intelligentized Furniture.
It is logged in above method embodiment using physical characteristic data, and control can be sent by voice and disappeared
It ceases, after identification data and control message of the received server-side of intelligentized Furniture into log on request, will do it verifying, mention
The high safety of long-range control.Moreover, after the failure of voice control information authentication, it is further by way of short message verification code
The feasibility remotely controlled is improved, user experience is improved.In addition, the server end in intelligentized Furniture generates default public key and pre-
If private key, and after the success of intelligentized Furniture client registers, intelligentized Furniture client and intelligentized Furniture are sent by default public key,
So during intelligentized Furniture client, intelligentized Furniture server, intelligentized Furniture mutual data transmission, can all it use default
Public key or default private key are encrypted, and the safety of data transmission is further ensured.
The step of the client of intelligentized Furniture is run on since embodiment of the figure 1 above into Fig. 3 has all respectively illustrated
Suddenly, the step of running on the server end of intelligentized Furniture, and the step of running on intelligentized Furniture, can also be with by Fig. 1 to Fig. 3
It is evident which step runs on the client of intelligentized Furniture, which step runs on the server end of intelligentized Furniture,
And which step runs on intelligentized Furniture end.Simultaneously again due to length limitation, will no longer individually in the application
Description runs on a kind of process of intelligentized Furniture remote security control method of the client of intelligentized Furniture, and individually description is run on
A kind of process of intelligentized Furniture remote security control method of the server end of intelligentized Furniture, and run on intelligentized Furniture end
A kind of process of intelligentized Furniture remote security control method.But it is understood that ground, runs on the one of the client of intelligentized Furniture
Plant a kind of intelligentized Furniture telesecurity control of intelligentized Furniture remote security control method, the server end for running on intelligentized Furniture
Method, a kind of intelligentized Furniture remote security control method for running on intelligentized Furniture end can individually exist.
Fig. 4 is the schematic block diagram of intelligentized Furniture telesecurity control system provided by the embodiments of the present application.The system 100
Client and intelligentized Furniture including the server end of intelligentized Furniture and at least one intelligentized Furniture.Wherein, intelligentized Furniture
Server end includes the intelligentized Furniture long-distance safety controller for being present in the server end of intelligentized Furniture, the client of intelligentized Furniture
End includes the intelligentized Furniture long-distance safety controller for being present in the client of intelligentized Furniture, and intelligentized Furniture end includes being present in institute
State the intelligentized Furniture long-distance safety controller at intelligentized Furniture end.In the embodiment, it is present in the server end of intelligentized Furniture
Intelligentized Furniture long-distance safety controller, be present in intelligentized Furniture client intelligentized Furniture long-distance safety controller, with
And being present in the intelligentized Furniture long-distance safety controller at intelligentized Furniture end includes for executing above-mentioned intelligentized Furniture telesecurity
Unit corresponding to the control method of control method.As shown in figure 4, the intelligentized Furniture for being present in the client of intelligentized Furniture is long-range
Safety control 110 includes control DEU data encryption unit 111, control data transmission unit 112, the first result receiving unit
113, the first result decryption unit 114 and the first unit 115 as the result is shown.It is present in the intelligence of the server of destination application
Energy furniture long-distance safety controller 120 includes control data receiving unit 121, control data decryption unit 122, instruction determination
Unit 123, instruction encryption unit 124, instruction sending unit 125, the second result receiving unit 126, the second result decryption unit
127, the first result encryption unit 128 and the first result transmission unit 129.The intelligentized Furniture for being present in intelligentized Furniture end is long-range
Safety control 130 includes instruction receiving unit 131, instruction decryption unit 132, control unit 133, the second result encryption list
Member 134 and the second result transmission unit 135.
Intelligentized Furniture will be controlled if the server end for successful log intelligentized Furniture by controlling DEU data encryption unit 111
The first default public key that control use of information is saved is encrypted to obtain control encryption data.
Data transmission unit member 112 is controlled, for sending control request to the server end, so that the server
The control encryption data in the control request is decrypted at end according to the saved first default private key, to obtain control information, and
It parses the control information and obtains control instruction, the control instruction is utilized into the default private key encryption of saved second, with
It is sent to intelligentized Furniture to instruction encryption data, and by instruction encryption data, so that intelligentized Furniture is according to second saved
Default public key decryptions described instruction encryption data controls intelligentized Furniture according to control instruction to obtain control instruction, wherein institute
Stating the first default public key and the first default private key is a pair of of code key, the second default public key and the second default private key
It is a pair of of code key.
First result receiving unit 113, the encrypted result data sent for receiving the server end, the encryption knot
Fruit data are that control result is utilized the data after the first default private key encryption by the server end, and the control result is described
The result encryption data that server end is returned according to the intelligentized Furniture received, is decrypted to obtain using the second default private key
, the result encryption data is that the intelligentized Furniture obtains the control result of intelligentized Furniture using the second default public key encryption
's.
First result decryption unit 114, for by the encrypted result data using the first default public key decryptions to obtain
The control result of intelligentized Furniture.
First unit 115 as the result is shown, for showing the control result of the intelligentized Furniture.
Control data receiving unit 121 obtains the control for receiving the control request of intelligentized Furniture client transmission
Control encryption data in request, wherein the control encryption data is to be saved the control use of information in control request
The first default public key encrypted.
Control data decryption unit 122, for by the control encryption data utilize the default private key of saved first into
Row decryption, to obtain the control information in the control request.
Instruction-determining unit 123 obtains control instruction for parsing the control information.
Encryption unit 124 is instructed, for the control instruction to be utilized the default private key encryption of saved second, to obtain
Instruct encryption data.
Instruction sending unit 125 has phase with the intelligentized Furniture client for being sent to described instruction encryption data
The intelligentized Furniture that should be related to, so that intelligentized Furniture is according to the saved second default public key decryptions described instruction encryption data to obtain
Intelligentized Furniture is controlled to control instruction, and according to control instruction.
Second result receiving unit 126, for receiving the result encryption data of intelligentized Furniture return, wherein the result
Encryption data is the data for obtaining the control result of smart home using the second default public key encryption.
Second result decryption unit 127, for solving the result encryption data using the described second default private key
It is close, to obtain the control result of the intelligentized Furniture.
First result encryption unit 128, for carrying out the control result of the intelligentized Furniture using the first default private key
Encryption, to obtain encrypted result data.
First result transmission unit 129, for encrypted result data to be sent to the client, so that the intelligence
The client of household shows the control of the intelligentized Furniture after decryption by encrypted result data described in the first default public key decryptions
As a result.
Instruction receiving unit 131, the instruction encryption data sent for receiving the server end, wherein described instruction
Encryption data be the server end by the control instruction of the client of intelligentized Furniture utilize the default private key of saved second into
Row encryption obtains.
Instruction decryption unit 132, for using the described second default public key decryptions described instruction encryption data to be controlled
System instruction.
Control unit 133, for controlling the intelligentized Furniture according to the control instruction.
Second result encryption unit 134, for presetting the control result for controlling the intelligentized Furniture using described second
Public key is encrypted, to obtain result encryption data.
Second result transmission unit 135, for by the result encryption data be sent to the server end so that
The server-side using the second default private key decrypts the result encryption data to obtain the control result of intelligentized Furniture, and by institute
The control result for stating intelligentized Furniture is encrypted using the first default private key to obtain encrypted result data, and by decrypted result number
According to the client is sent to, so that the client decrypts the encrypted result data to obtain the control knot of intelligentized Furniture
Fruit.
In one embodiment, the intelligentized Furniture long-distance safety controller 120 for being present in the server of intelligentized Furniture also wraps
It includes and extracts matching unit, identifying code generation unit, verifying detection unit.Wherein, matching unit is extracted, for extracting voice control
Feature in information, and the feature of extraction is matched with the feature in the voice messaging prestored.If the feature extracted and pre-
Characteristic matching success in the voice messaging deposited, triggering command determination unit 123, to be controlled for parsing the control information
System instruction.Identifying code generation unit, if the feature for extraction and the non-successful match of feature in the voice messaging that prestores, generate
Identifying code, and identifying code generated is sent to the client.Detection unit is verified, for detecting within effective verification time
Whether identifying code confirmation message that the smart home client return is received.If receiving the intelligence within effective verification time
The identifying code confirmation message that household client returns, triggering command determination unit 123.
In one embodiment, correspond to Fig. 2, be present in the intelligentized Furniture telesecurity control dress of client's device of intelligentized Furniture
Setting 110 further includes logging in DEU data encryption unit, logging in data transmission unit, log in result receiving unit and log in result decryption
Unit.Wherein,
DEU data encryption unit is logged in, for required identification data will to be logged in, utilizes the default public affairs of saved first
Key is encrypted, to obtain logging in encryption data.
Data transmission unit is logged in, for sending log on request to the server end, so that the server end root
It is decrypted in the log on request according to the saved first default private key and logs in encryption data, to obtain identification data, and
Judge whether identification data matches with the identification data saved when registration and determine whether according to matching result
Log in success, wherein the first default public key and the first default private key are a pair of of code keys.
Result receiving unit is logged in, described logs in result data for receiving, wherein the result data that logs in is described
Server end obtains the information for logging in successfully or logging in failure by the first default private key encryption, wherein if body
Part identification data are matched with the identification data saved when registration, it is determined that success are logged in, if identification data and note
The identification data saved when volume mismatches, it is determined that logs in failure.
Result decryption unit is logged in, for logging in result data for described, is decrypted using the first default public key, with
To log in successfully or wait failure news.
In one embodiment, correspond to Fig. 2, be present in the intelligentized Furniture telesecurity control of the server device of intelligentized Furniture
Device 120 further includes logging in data receipt unit, logging in data decryption unit, log in data matching unit, log in matching determination
Unit logs in result encryption unit and logs in result receiving unit.Wherein,
Data receipt unit is logged in, for receiving the log on request of the client, obtains stepping in the log on request
Land encryption data, wherein the encryption data that logs in is that intelligentized Furniture client will log in required identification data, is utilized
What the first default public key encryption obtained.
Data decryption unit is logged in, for utilizing default private key to be decrypted the encryption data that logs in, to obtain
State the identification data in log on request.
Data matching unit is logged in, decrypts obtained identification data and the client registers Shi Suobao for judging
Whether the identification data deposited matches.
Matching determination unit is logged in, if being saved when for decrypting obtained identification data with the client registers
Identification data matching, it is determined that success is logged in, if when the obtained identification data of decryption and the client registers
The identification data saved mismatches, it is determined that logs in failure.
Result encryption unit is logged in, for the information for logging in successfully or logging in failure to be passed through the first default private key
Encryption is to obtain logging in result data.
Result receiving unit is logged in, for the result data that logs in be sent to the client, so that the client
End logs in result data described in decrypting according to the first default public key, to obtain logging in successfully or log in failure news.
In one embodiment, correspond to Fig. 1, be present in the intelligentized Furniture telesecurity control dress of client's device of intelligentized Furniture
Setting 110 further includes registration transmission unit, registering result receiving unit and the first public key receiving unit.Wherein,
Transmission unit is registered, for sending registration request to the server end of intelligentized Furniture, includes in the registration request
The identification information of identification data and intelligentized Furniture, so that the server end determines the note according to the identification information
Whether volume request passes through verifying.
Registering result receiving unit, the message to succeed in registration sent for receiving the server end.It is to be appreciated that
Also the message of the registration failure of server end transmission can be received.
First public key receiving unit, the first default public key sent for receiving the server end, the first default public affairs
Key is the server end after succeeding in registration, and is generated using rivest, shamir, adelman, the first default public key and service
The default private key of the first of device end is a pair of of code key.
In one embodiment, correspond to Fig. 1, be present in the intelligentized Furniture telesecurity control of the server device of intelligentized Furniture
Device 120 further includes registration receiving unit, registration authentication unit, registration verifying determination unit, registering result transmission unit, code key
Generation unit and public key transmission unit.Wherein,
Receiving unit is registered, for receiving the registration request of the client, the identity obtained in the registration request is known
The identification information of other data and intelligentized Furniture, wherein the identification data includes physical characteristic data.
Authentication unit is registered, is tested for determining whether the registration request passes through according to the identification information of the intelligentized Furniture
Card.
Registration verifying determination unit, if determination is succeeded in registration, and saves the visitor for the registration request by verifying
The corresponding relation and the identification data of family end and intelligentized Furniture.It should be understood that if the registration request does not pass through
Verifying, determines registration failure.
Registering result transmission unit, for sending the message to succeed in registration to the client.It is to be appreciated that server
Also can be after determining registration failure, Xiang Suoshu client sends the message of registration failure.
Code key generation unit, if the client registers success for intelligentized Furniture, generates the using rivest, shamir, adelman
One default public key and the first default private key, the second default public key and the second default private key.
Public key transmission unit, for the generated second default public key to be sent to smart home, by generated first
Default public key is sent to the client.
In one embodiment, correspond to Fig. 1, be present in the intelligentized Furniture telesecurity control of the server device of intelligentized Furniture
Device 130 further includes the second public key receiving unit.Wherein,
Second public key receiving unit, the second default public key sent for receiving the server end.
It should be noted that being present in the intelligentized Furniture long-distance safety controller of the client of intelligentized Furniture above, depositing
Be the intelligentized Furniture long-distance safety controller of the server end of intelligentized Furniture, the intelligentized Furniture that is present in intelligentized Furniture end it is remote
Journey safety control can be individually present.The component part of each unit module is corresponded to when due to being individually present and in intelligence
Component part in furniture telesecurity control system is identical, therefore is not describing respectively.
It should be noted that it is apparent to those skilled in the art that, the tool of above-mentioned apparatus and each unit
Body realizes process, can be no longer superfluous herein with reference to the corresponding description in preceding method embodiment, for convenience of description and succinctly
It states.
Above-mentioned apparatus can be implemented as a kind of form of computer program, and computer program can be in meter as shown in Figure 5
It calculates and is run on machine equipment.
Fig. 5 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.The visitor of the device intelligence furniture
Family end, such as mobile phone, PAD equipment.The equipment 200 includes processor 202, memory and the net connected by system bus 201
Network interface 203, wherein memory may include non-volatile memory medium 204 and built-in storage 205.
The non-volatile memory medium 204 can storage program area 2041 and computer program 2042.This is non-volatile to deposit
, it can be achieved that the visitor of intelligentized Furniture described above when the computer program 2042 stored in storage media is executed by processor 202
The intelligentized Furniture remote security control method at family end.The processor 202 supports whole equipment for providing calculating and control ability
200 operation.The built-in storage 205 provides environment for the operation of the computer program in non-volatile memory medium, the calculating
When machine program is executed by processor 202, processor 202 may make to execute the intelligent family of the client of intelligentized Furniture described above
Has remote security control method.The network interface 203 is for carrying out network communication.It will be understood by those skilled in the art that in figure
The structure shown, only the block diagram of part-structure relevant to the present invention program, does not constitute and is applied to the present invention program
The restriction of equipment thereon, specific equipment may include more certain than more or fewer components as shown in the figure, or combination
Component, or with different component layouts.
Wherein, the processor 202 is described above to realize for running computer program stored in memory
Run on any embodiment of the intelligentized Furniture remote security control method of the client of intelligentized Furniture.
Another embodiment of the present invention additionally provides a kind of schematic block diagram of computer equipment.In the present embodiment, described
Equipment is the server of intelligentized Furniture.Fig. 5 specifically is please referred to, which includes identical as computer equipment shown in Fig. 5
Structure.The difference of the computer equipment and computer equipment shown in Fig. 5 is that non-volatile memories are situated between in the computer equipment
, it can be achieved that the server for running on intelligentized Furniture described above when the computer program that matter is stored is executed by processor 202
Any embodiment of the intelligentized Furniture remote security control method at end.
Another embodiment of the present invention additionally provides a kind of schematic block diagram of computer equipment.In the present embodiment, described
Equipment is intelligentized Furniture end.Fig. 5 specifically is please referred to, which includes structure identical with computer equipment shown in Fig. 5.
The difference of the computer equipment and computer equipment shown in Fig. 5 is that non-volatile memory medium is deposited in the computer equipment
, it can be achieved that the intelligentized Furniture for running on intelligentized Furniture end described above is remote when the computer program of storage is executed by processor 202
Any embodiment of journey method of controlling security.
It should be appreciated that in the embodiment of the present application, alleged processor 202 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (application program lication Specific Integrated
Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other can
Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor
Or the processor is also possible to any conventional processor etc..
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process,
It is that relevant hardware can be instructed to complete by computer program.The computer program can be stored in a storage medium,
The storage medium can be computer readable storage medium.The computer program is by the processing of at least one of the computer system
Device executes, to realize the process step of the embodiment of the above method.
Therefore, present invention also provides a kind of storage mediums.The storage medium can be computer readable storage medium, should
Computer readable storage medium includes non-volatile computer readable storage medium storing program for executing.The storage medium is stored with computer program,
The computer program when being executed by a processor, realizes that the intelligentized Furniture of the client for running on intelligentized Furniture described above is remote
Any embodiment of journey method of controlling security.
A kind of storage medium is additionally provided in another embodiment of the application.The storage medium can be deposited to be computer-readable
Storage media, the computer readable storage medium include non-volatile computer readable storage medium storing program for executing.The storage medium is stored with meter
Calculation machine program, the computer program is when being executed by a processor, it can be achieved that the server for running on intelligentized Furniture described above
Any embodiment of the intelligentized Furniture remote security control method at end.
A kind of storage medium is additionally provided in another embodiment of the application.The storage medium can be deposited to be computer-readable
Storage media, the computer readable storage medium include non-volatile computer readable storage medium storing program for executing.The storage medium is stored with meter
Calculation machine program, the computer program is when being executed by a processor, it can be achieved that the intelligence for running on intelligentized Furniture end described above
Any embodiment of furniture remote security control method.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), magnetic disk
Or the various computer readable storage mediums that can store program code such as CD.
In several embodiments provided herein, it should be understood that disclosed device, device and method, it can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, the division of the unit,
Only a kind of logical function partition, there may be another division manner in actual implementation.Those skilled in the art can be with
It is well understood, for convenience of description and succinctly, the specific work process of the device of foregoing description, equipment and unit can
With with reference to the corresponding process in preceding method embodiment, details are not described herein.The above, the only specific embodiment party of the application
Formula, but the protection scope of the application is not limited thereto, and anyone skilled in the art discloses in the application
In technical scope, various equivalent modifications or substitutions can be readily occurred in, these modifications or substitutions should all cover the guarantor in the application
Within the scope of shield.Therefore, the protection scope of the application should be subject to the protection scope in claims.
Claims (10)
1. a kind of intelligentized Furniture remote security control method, the server end applied to intelligentized Furniture, which is characterized in that the side
Method includes:
If receiving the control request of intelligentized Furniture client transmission, the control encryption data in the control request, institute are obtained
Stating control encryption data is that will control the first default public key that the control use of information in request is saved to be encrypted;
The default private key of saved first is utilized to be decrypted the control encryption data, to obtain in the control request
Control information, wherein the first default public key and the first default private key are a pair of of code keys;
It parses the control information and obtains control instruction;
The control instruction is utilized into the default private key encryption of saved second, to obtain instruction encryption data;
Described instruction encryption data is sent to the intelligentized Furniture for having corresponding relation with the intelligentized Furniture client, so that intelligence
Furniture according to the saved second default public key decryptions described instruction encryption data to obtain control instruction, and according to control instruction
Control intelligentized Furniture, wherein the second default public key and the second default private key are a pair of of code key.
2. the method according to claim 1, wherein if the control information is speech-controlled information, described
It parses before the control information obtains control instruction, the method also includes:
The feature in the speech-controlled information is extracted, and the feature in extracted feature and the speech message prestored is carried out
Matching;
If the non-successful match of feature in extracted feature and the speech message prestored, identifying code is generated, and to the intelligence
Household client sends identifying code generated;
Whether detection receives the identifying code confirmation message that the smart home client returns within effective verification time;
If the identifying code confirmation message that the smart home client returns is received within effective verification time, if being extracted
Feature and the characteristic matching success in the speech message that prestores, execute the parsing control information and obtain control instruction
Step.
3. the method according to claim 1, wherein the method also includes:
The result encryption data that intelligentized Furniture returns is received, the result encryption data is to utilize the control result of smart home
The data that second default public key encryption obtains;
The result encryption data is decrypted using the second default private key, to obtain the control result;
The control result is encrypted by the first default private key to obtain encrypted result data, and by encrypted result data
And it is sent to the client of the intelligentized Furniture, so that the client of the smart home is solved by the first default public key
Close and display control result.
4. if the method according to claim 1, wherein in the control for receiving the transmission of intelligentized Furniture client
Before system request, the method also includes:
If receiving the log on request of intelligentized Furniture client, obtain in the log on request and log in encryption data, wherein institute
Stating and logging in encryption data is that intelligentized Furniture client will log in required identification data, is obtained using the first default public key encryption
It arrives;
It logs in encryption data by described and is decrypted using the first default private key, to obtain the identification in the log on request
Data;
The identification data saved when identification data and the intelligentized Furniture client registers that judgement decryption obtains
Whether match;
The identification data saved when if decrypting obtained identification data and the intelligentized Furniture client registers
Match, it is determined that log in success, and log in successful information by being sent to the intelligence after the first default private key encryption for described
Furniture client, so that the intelligentized Furniture client is decrypted according to the first default public key to obtain logging in successful message.
5. if the method according to claim 1, wherein in the control for receiving the transmission of intelligentized Furniture client
Before system request, the method also includes:
If receiving the registration request of intelligentized Furniture client, the identification data in the registration request and intelligent family are obtained
The identification information of tool, wherein the identification data includes physical characteristic data;
Determine whether the registration request passes through verifying according to the identification information of the intelligentized Furniture;
If the registration request is by verifying, determination is succeeded in registration, and it is corresponding to intelligentized Furniture to save intelligentized Furniture client
Relationship and the identification data;
The first default public key and the default private of the first default private key, the second default public key and second are generated using rivest, shamir, adelman
Key;
Generated first default public key is sent to the client of intelligentized Furniture, the generated second default public key is sent to
Intelligentized Furniture.
6. a kind of intelligentized Furniture remote security control method, the client applied to intelligentized Furniture, which is characterized in that the method
Include:
If the server end of successful log intelligentized Furniture, first that the control use of information for controlling intelligentized Furniture is saved is preset
Public key is encrypted to obtain control encryption data;
Control request is sent to the server end of intelligentized Furniture, so that the server end is according to the default private of first saved
Key decrypts the control encryption data in the control request, to obtain control information, and parses the control information and is controlled
Instruction, utilizes the default private key encryption of saved second for the control instruction, to obtain instruction encryption data, and instruction is added
Ciphertext data is sent to intelligentized Furniture, so that intelligentized Furniture encrypts number according to the saved second default public key decryptions described instruction
Control instruction is obtained accordingly, and intelligentized Furniture is controlled according to control instruction, wherein the first default public key and described first is in advance
If private key is a pair of of code key, the second default public key and the second default private key are a pair of of code keys;
The encrypted result data that the server end returns are received, the encrypted result data are that the server end ties control
Fruit utilizes the data after the first default private key encryption, and the control result is the server end according to the intelligentized Furniture received
The result encryption data of return is decrypted using the second default private key, and the result encryption data is the intelligence
Furniture obtains the control result of intelligentized Furniture using the second default public key encryption;
By the encrypted result data using the first default public key decryptions to obtain control result.
7. a kind of intelligentized Furniture long-distance safety controller, which is characterized in that the intelligentized Furniture long-distance safety controller packet
The unit for executing any one of such as claim 1-5 the method is included, or including for executing side as claimed in claim 6
The unit of method.
8. a kind of intelligentized Furniture telesecurity control system, which is characterized in that the intelligentized Furniture telesecurity control system packet
It includes the server end of intelligentized Furniture and the client of at least one intelligentized Furniture and has with the client of the intelligentized Furniture
The intelligentized Furniture of corresponding relation, wherein the server end of the intelligentized Furniture includes for executing such as any one of claim 1-5
The unit of the method, the client of the intelligentized Furniture include the unit for executing method as claimed in claim 6.
9. a kind of computer equipment, which is characterized in that the computer equipment includes memory, and is connected with the memory
Processor;
The memory is for storing computer program;The processor is for running the computer journey stored in the memory
Sequence to execute the method according to claim 1 to 5, or executes method as claimed in claim 6.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence when the computer program is executed by processor, realizes the method according to claim 1 to 5, or realize such as
Method of claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910299860.2A CN110191086A (en) | 2019-04-15 | 2019-04-15 | Intelligentized Furniture remote security control method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910299860.2A CN110191086A (en) | 2019-04-15 | 2019-04-15 | Intelligentized Furniture remote security control method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110191086A true CN110191086A (en) | 2019-08-30 |
Family
ID=67714519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910299860.2A Pending CN110191086A (en) | 2019-04-15 | 2019-04-15 | Intelligentized Furniture remote security control method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110191086A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110647410A (en) * | 2019-09-25 | 2020-01-03 | 广州河东科技有限公司 | Inter-process data transmission method and device, electronic equipment and storage medium |
CN111654503A (en) * | 2020-06-08 | 2020-09-11 | 工业和信息化部网络安全产业发展中心(工业和信息化部信息中心) | Remote control method, device, equipment and storage medium |
EP3809660A1 (en) * | 2019-10-16 | 2021-04-21 | Roche Diabetes Care GmbH | Method for operating a medical system, medical system, and security module |
CN112987581A (en) * | 2019-12-16 | 2021-06-18 | 华为技术有限公司 | Control method for intelligent household equipment, medium and terminal thereof |
CN113014579A (en) * | 2021-02-24 | 2021-06-22 | 珠海格力电器股份有限公司 | Control instruction transmission method, system, server and storage medium |
CN113194015A (en) * | 2021-04-29 | 2021-07-30 | 洪璐 | Internet of things intelligent household equipment safety control method and system |
CN113542081A (en) * | 2021-09-16 | 2021-10-22 | 深圳市万睿智能科技有限公司 | Safe intelligent household control method and system |
CN113612775A (en) * | 2021-08-04 | 2021-11-05 | 西安思安云创科技有限公司 | 4C remote control safety protection method, device and system based on Internet of things equipment |
CN113885502A (en) * | 2021-10-09 | 2022-01-04 | 北京云迹科技有限公司 | Robot control method, control device and computer medium |
CN113961073A (en) * | 2021-10-20 | 2022-01-21 | 深圳市嘉中电子有限公司 | Intelligent visual interaction device and method |
CN114595437A (en) * | 2022-05-09 | 2022-06-07 | 荣耀终端有限公司 | Access control method, electronic device, and computer-readable storage medium |
CN114662082A (en) * | 2022-02-25 | 2022-06-24 | 荣耀终端有限公司 | Access control method of electronic device, readable medium and electronic device |
CN114726521A (en) * | 2022-04-14 | 2022-07-08 | 广东好太太智能家居有限公司 | Intelligent lock temporary password generation method and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163228A (en) * | 2007-10-24 | 2008-04-16 | 中国电信股份有限公司 | Video data encrypted system and method for network video monitoring |
CN102263776A (en) * | 2010-05-26 | 2011-11-30 | 魏星 | Intelligent household remote control system and intelligent household server |
CN104580191A (en) * | 2014-12-31 | 2015-04-29 | 深圳市兰丁科技有限公司 | Offline control method and system for smart home |
CN106952377A (en) * | 2017-04-07 | 2017-07-14 | 深圳广田智能科技有限公司 | The method and system of smart home door lock are opened by mobile fingerprint |
CN107786337A (en) * | 2016-08-26 | 2018-03-09 | 中兴通讯股份有限公司 | The encryption and decryption control method of intelligent domestic system, device, home equipment |
CN109412910A (en) * | 2018-11-20 | 2019-03-01 | 三星电子(中国)研发中心 | The method and apparatus for controlling smart home device |
-
2019
- 2019-04-15 CN CN201910299860.2A patent/CN110191086A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101163228A (en) * | 2007-10-24 | 2008-04-16 | 中国电信股份有限公司 | Video data encrypted system and method for network video monitoring |
CN102263776A (en) * | 2010-05-26 | 2011-11-30 | 魏星 | Intelligent household remote control system and intelligent household server |
CN104580191A (en) * | 2014-12-31 | 2015-04-29 | 深圳市兰丁科技有限公司 | Offline control method and system for smart home |
CN107786337A (en) * | 2016-08-26 | 2018-03-09 | 中兴通讯股份有限公司 | The encryption and decryption control method of intelligent domestic system, device, home equipment |
CN106952377A (en) * | 2017-04-07 | 2017-07-14 | 深圳广田智能科技有限公司 | The method and system of smart home door lock are opened by mobile fingerprint |
CN109412910A (en) * | 2018-11-20 | 2019-03-01 | 三星电子(中国)研发中心 | The method and apparatus for controlling smart home device |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110647410A (en) * | 2019-09-25 | 2020-01-03 | 广州河东科技有限公司 | Inter-process data transmission method and device, electronic equipment and storage medium |
EP3809660A1 (en) * | 2019-10-16 | 2021-04-21 | Roche Diabetes Care GmbH | Method for operating a medical system, medical system, and security module |
WO2021074221A1 (en) * | 2019-10-16 | 2021-04-22 | F. Hoffmann-La Roche Ag | Method for operating a medical system, medical system, and security module |
CN112987581A (en) * | 2019-12-16 | 2021-06-18 | 华为技术有限公司 | Control method for intelligent household equipment, medium and terminal thereof |
CN111654503A (en) * | 2020-06-08 | 2020-09-11 | 工业和信息化部网络安全产业发展中心(工业和信息化部信息中心) | Remote control method, device, equipment and storage medium |
CN113014579A (en) * | 2021-02-24 | 2021-06-22 | 珠海格力电器股份有限公司 | Control instruction transmission method, system, server and storage medium |
CN113194015A (en) * | 2021-04-29 | 2021-07-30 | 洪璐 | Internet of things intelligent household equipment safety control method and system |
CN113612775A (en) * | 2021-08-04 | 2021-11-05 | 西安思安云创科技有限公司 | 4C remote control safety protection method, device and system based on Internet of things equipment |
CN113542081A (en) * | 2021-09-16 | 2021-10-22 | 深圳市万睿智能科技有限公司 | Safe intelligent household control method and system |
CN113885502A (en) * | 2021-10-09 | 2022-01-04 | 北京云迹科技有限公司 | Robot control method, control device and computer medium |
CN113961073A (en) * | 2021-10-20 | 2022-01-21 | 深圳市嘉中电子有限公司 | Intelligent visual interaction device and method |
CN114662082A (en) * | 2022-02-25 | 2022-06-24 | 荣耀终端有限公司 | Access control method of electronic device, readable medium and electronic device |
CN114662082B (en) * | 2022-02-25 | 2023-06-06 | 荣耀终端有限公司 | Access control method of electronic device, readable medium and electronic device |
CN114726521A (en) * | 2022-04-14 | 2022-07-08 | 广东好太太智能家居有限公司 | Intelligent lock temporary password generation method and electronic equipment |
CN114595437A (en) * | 2022-05-09 | 2022-06-07 | 荣耀终端有限公司 | Access control method, electronic device, and computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110191086A (en) | Intelligentized Furniture remote security control method, device, computer equipment and storage medium | |
CN106789047B (en) | A kind of block chain identification system | |
TWI749061B (en) | Blockchain identity system | |
US9736147B1 (en) | Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD) | |
CN102026195B (en) | One-time password (OTP) based mobile terminal identity authentication method and system | |
US9641521B2 (en) | Systems and methods for network connected authentication | |
CN104219228B (en) | A kind of user's registration, user identification method and system | |
EP3346660B1 (en) | Authentication information update method and device | |
CN111615105B (en) | Information providing and acquiring method, device and terminal | |
CN104836784B (en) | A kind of information processing method, client and server | |
CN106603234A (en) | Method, device and system for device identity authentication | |
US20110047377A1 (en) | Secure digital communications via biometric key generation | |
CN110059458A (en) | A kind of user password encryption and authentication method, apparatus and system | |
CN111435913A (en) | Identity authentication method and device for terminal of Internet of things and storage medium | |
CN107484032A (en) | Prevent the verification method and device brushed | |
CN113556321A (en) | Password authentication method, system, electronic device and storage medium | |
WO2016083618A1 (en) | A method and device for authentication | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
CN110941809A (en) | File encryption and decryption method and device, fingerprint password device and readable storage medium | |
TWI786039B (en) | Offline payment method, terminal equipment, backstage payment device and offline payment system | |
US9455973B1 (en) | Secure storage and retrieval of data in a database with multiple data classes and multiple data identifiers | |
CN109409109A (en) | Data processing method, device, processor and server in network service | |
EP3361691B1 (en) | Method and device for verifying validity of identity of entity | |
US11483166B2 (en) | Methods and devices for enrolling and authenticating a user with a service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190830 |