CN110191086A - Intelligentized Furniture remote security control method, device, computer equipment and storage medium - Google Patents

Intelligentized Furniture remote security control method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110191086A
CN110191086A CN201910299860.2A CN201910299860A CN110191086A CN 110191086 A CN110191086 A CN 110191086A CN 201910299860 A CN201910299860 A CN 201910299860A CN 110191086 A CN110191086 A CN 110191086A
Authority
CN
China
Prior art keywords
intelligentized furniture
control
data
client
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910299860.2A
Other languages
Chinese (zh)
Inventor
赵超
魏冰山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910299860.2A priority Critical patent/CN110191086A/en
Publication of CN110191086A publication Critical patent/CN110191086A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • H04L12/282Controlling appliance services of a home automation network by calling their functionalities based on user interaction within the home
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

The embodiment of the present application provides a kind of intelligentized Furniture remote security control method, device, computer equipment and storage medium, is related to technical field of data security.The described method includes: obtaining the control encryption data in control request if receiving the control request of intelligentized Furniture client transmission;The default private key of saved first is utilized to be decrypted control encryption data, to obtain the control information in control request;Parsing control information obtains control instruction;Control instruction is utilized into the default private key encryption of saved second, to obtain instruction encryption data, and it is sent to the intelligentized Furniture for having corresponding relation with the intelligentized Furniture client, so that intelligentized Furniture obtains control instruction according to the saved second default public key decryptions, and intelligentized Furniture is controlled according to control instruction.The embodiment of the present application can be during remotely control intelligentized Furniture, and the safety of improve data transfer improves the experience of user.

Description

Intelligentized Furniture remote security control method, device, computer equipment and storage medium
Technical field
This application involves technical field of data security more particularly to a kind of intelligentized Furniture remote security control method, device, Computer equipment and storage medium.
Background technique
The control of intelligentized Furniture at present can all be related to remotely controlling.Long-range control is substantially Telnet and sends control Information processed, Lai Shixian remote control home have equipment.Due to being remotely to control, there is very big hidden danger in safety.
Summary of the invention
The embodiment of the present application provides a kind of intelligentized Furniture remote security control method, device, computer equipment and storage and is situated between Matter, can be during remotely control intelligentized Furniture, the safety of improve data transfer.
In a first aspect, the embodiment of the present application provides a kind of intelligentized Furniture remote security control method, it is applied to intelligent family The server end of tool, this method comprises:
If receiving the control request of intelligentized Furniture client transmission, the control obtained in the control request encrypts number According to the control encryption data is will to control the first default public key that the control use of information in request is saved encrypt It arrives;The default private key of saved first is utilized to be decrypted the control encryption data, to obtain in the control request Control information, wherein the first default public key and the first default private key are a pair of of code keys;Parse the control information Obtain control instruction;The control instruction is utilized into the default private key encryption of saved second, to obtain instruction encryption data;It will Described instruction encryption data is sent to the intelligentized Furniture for having corresponding relation with the intelligentized Furniture client, so that intelligentized Furniture root According to the saved second default public key decryptions described instruction encryption data to obtain control instruction, and intelligence is controlled according to control instruction It can furniture, wherein the second default public key and the second default private key are a pair of of code key.
Second aspect, another embodiment of the application provide a kind of intelligentized Furniture remote security control method, are applied to intelligence The client of energy furniture, this method comprises:
If the server end of successful log intelligentized Furniture, the control use of information for controlling intelligentized Furniture is saved first Default public key is encrypted to obtain control encryption data;Control request is sent to the server end of intelligentized Furniture, so that institute It states server end and the control encryption data controlled in request is decrypted according to the saved first default private key, to be controlled Information, and parse the control information and obtain control instruction, utilize the default private key of saved second to add the control instruction It is close, to obtain instruction encryption data, and instruction encryption data is sent to intelligentized Furniture, so that intelligentized Furniture is according to being saved The second default public key decryptions described instruction encryption data to obtain control instruction, and intelligentized Furniture is controlled according to control instruction, Wherein, the described first default public key and the first default private key are a pair of of code keys, the second default public key and described second Default private key is a pair of of code key;The encrypted result data that the server end returns are received, the encrypted result data are described Server end by control result using the data after the first default private key encryption, the control result be the server end according to The result encryption data that the intelligentized Furniture received returns, is decrypted, the result adds using the second default private key Ciphertext data is that the intelligentized Furniture obtains the control result of intelligentized Furniture using the second default public key encryption;By the encryption Result data is using the first default public key decryptions to obtain control result.
The third aspect, the embodiment of the present application provide a kind of intelligentized Furniture long-distance safety controller, and the intelligentized Furniture is remote Journey safety control includes for executing the corresponding unit of method described in above-mentioned first aspect or for executing above-mentioned The corresponding unit of method described in two aspects.
Fourth aspect, the embodiment of the present application provide a kind of intelligentized Furniture telesecurity control system, and the intelligentized Furniture is remote Journey safety control system include the server end of intelligentized Furniture and the client of at least one intelligentized Furniture and with the intelligence The client of energy furniture has the intelligentized Furniture of corresponding relation, wherein the server end of the intelligentized Furniture includes for executing such as The unit of above-mentioned first aspect the method, the client of the intelligentized Furniture include for executing as described in above-mentioned second aspect The unit of method.
5th aspect, the embodiment of the present application provide a kind of computer equipment, and the computer equipment includes memory, with And the processor being connected with the memory;
The memory is for storing computer program, and the processor is for running the calculating stored in the memory Machine program, to execute method described in above-mentioned first aspect or to execute method described in above-mentioned second aspect.
6th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, when the computer program is executed by processor, realizes method described in above-mentioned first aspect, Or realize method described in above-mentioned second aspect.
The embodiment of the present application passes through between the client and intelligentized Furniture by the server of intelligentized Furniture and intelligentized Furniture The data encryption transmitted is transmitted, so can be during remotely control intelligentized Furniture, the safety of improve data transfer Property, improve the experience of user.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the timing signal of the register method in intelligentized Furniture remote security control method provided by the embodiments of the present application Figure;
Fig. 2 is the login method timing signal in intelligentized Furniture remote security control method provided by the embodiments of the present application Figure;
Fig. 3 is the control method timing signal in intelligentized Furniture remote security control method provided by the embodiments of the present application Figure;
Fig. 4 is the schematic block diagram of intelligentized Furniture telesecurity control system provided by the embodiments of the present application;
Fig. 5 is the schematic block diagram of computer equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall in the protection scope of this application.
Fig. 1 to Fig. 3 is please referred to, in figs. 1 to 3, the server of client 100, intelligentized Furniture including intelligentized Furniture 200, intelligentized Furniture 300.Wherein, the client of intelligentized Furniture and intelligentized Furniture have corresponding matching relationship.The client of intelligentized Furniture End 100 includes the terminal that can be used for remotely controlling intelligentized Furniture, such as mobile phone terminal, PAD, intelligent wearable device terminal are set It is standby.Intelligentized Furniture 30 can be any intelligentized Furniture, such as intelligent curtain, intelligent air condition.The client of intelligentized Furniture 100, the server 200 of intelligentized Furniture, intelligentized Furniture 300 constitute intelligentized Furniture telesecurity control system.The embodiment of the present application The client 100 and intelligentized Furniture 300 of middle intelligentized Furniture only one, it is possible to understand that ground, in other embodiments, intelligentized Furniture Client and intelligentized Furniture can also have more.In other embodiments, the server end of intelligentized Furniture can also have more It is multiple.
Fig. 1 is the timing signal of the register method of intelligentized Furniture remote security control method provided by the embodiments of the present application Figure.As shown in Figure 1, this approach includes the following steps S111-S113, S121-S126, S131.Wherein, step S111-S113 is transported Row is in the client of intelligentized Furniture, and step S121-S126 runs on the server end of intelligentized Furniture, and step S131 runs on intelligence Furniture end.It should be noted that the timing diagram of the register method is only an example, to understand register method for convenience Process can also include the steps that more in other embodiments.It is described individually below according to the angle of different executing subjects The register method.
S111 sends registration request to the server end of intelligentized Furniture, includes identification data in the registration request With the identification information of intelligentized Furniture so that the server end determines whether the registration request leads to according to the identification information Cross verifying.
Intelligentized Furniture client sends registration request, the received server-side of intelligentized Furniture to the server end of intelligentized Furniture The registration request.It include identification data in the registration request, which includes physical characteristic data.Certainly, The identification data can also include one of electronic passwords, log-in password or combination.Wherein, physical characteristic data can To include fingerprint, pupil, shape of face, sound medium one kind or combination.By taking fingerprint as an example, intelligence is acquired by fingerprint acquisition device The fingerprint of user corresponding to furniture client.It further include the identification information of intelligentized Furniture in the registration request, wherein intelligentized Furniture Identification information include at least intelligentized Furniture device number, device model etc., can unique identification intelligentized Furniture information.
For the information of registration request by verifying, the identification information including intelligentized Furniture passes through verifying.In the clothes of intelligentized Furniture It is engaged in the database of device that the identification information of intelligentized Furniture can be saved.Such as verify the device number of the intelligentized Furniture, device model is It is no to be matched with the device number saved in database, device model, if it does, then determining the identification information of intelligentized Furniture by testing Card;If mismatching, it is determined that the identification information of intelligentized Furniture is unverified, as the identification information of intelligentized Furniture fills in mistake Deng the information of such registration request is also unverified.If by verifying, it means that succeeding in registration;If unverified, Mean registration failure.In one embodiment, identification data includes voice messaging.
S112 receives the message to succeed in registration that the server end is sent.It is to be appreciated that can also receive server end The message of the registration failure of transmission.
S113 receives the first default public key that the server end is sent, which is the server end It after succeeding in registration, is generated using rivest, shamir, adelman, the first default private of the first default public key and server end Key is a pair of of code key.
Wherein, rivest, shamir, adelman can generate a pair of of code key, i.e. public key and private key in use, using public key plus It is close, it could be decrypted using private key.Asymmetric arithmetic such as RSA Algorithm.Such as in RSA Algorithm, secret key pair is generated in the following manner: Randomly choose two unequal prime number p and q;Calculate the product n of p and q;Calculate the Euler's function φ (n) of n;Random selection one A integer e, condition is 1 < e < φ (n), and e and φ (n) is relatively prime;E is calculated for the mould antielement d of φ (n);N and e are packaged into Public key, n and d are packaged into private key.
S121 receives the registration request of the client, obtains identification data and intelligence in the registration request The identification information of furniture, wherein the identification data includes physical characteristic data.
S122 determines whether the registration request passes through verifying according to the identification information of the intelligentized Furniture.
S123, if the registration request, by verifying, determination is succeeded in registration, and saves the client and intelligentized Furniture Corresponding relation and the identification data.It should be understood that determining that registration is lost if the registration request is unverified It loses.
S124, Xiang Suoshu client send the message to succeed in registration.It is to be appreciated that server can also lose determining registration After losing, Xiang Suoshu client sends the message of registration failure.
S125, if intelligentized Furniture client registers success, using rivest, shamir, adelman generate the first default public key and First default private key, the second default public key and the second default private key.
Wherein, the first default public key and the first default private key are a pair of of code key, the second default public key and the second default private key It is a pair of of code key.
Generated second default public key is sent to smart home by S126, and the generated first default public key is sent To the client.
S131, intelligentized Furniture receive the second default public key that the server end is sent.
In one embodiment, it if the client registers success of intelligentized Furniture, is generated using rivest, shamir, adelman a pair of secret Key, a pair of code key include default public key and default private key, and default public key is respectively issued to the client of intelligentized Furniture, intelligentized Furniture End.Default private key is stored in the server end.It can be appreciated that the first default public key and the second default public key are identical, first Default private key and the second default private key are identical.
The embodiment is the register method embodiment in intelligentized Furniture remote security control method.When registering completion, intelligence Can the server end of furniture can generate two pairs of code keys, including the first default public key and the first default private key, the second default public key and Second default private key.And the generated first default public key is sent to intelligentized Furniture client, the second default public key is sent To intelligentized Furniture.In this way, server public key generated can be preserved in intelligentized Furniture client and intelligentized Furniture, in intelligence The server end of furniture includes accordingly private key.
Fig. 2 is the timing signal of the login method of intelligentized Furniture remote security control method provided by the embodiments of the present application Figure.As shown in Fig. 2, this approach includes the following steps S211-S214, S221-S225.Wherein, step S211-S214 runs on intelligence The client of energy furniture, step S221-S225 run on the server end of intelligentized Furniture.It should be noted that the login method Timing diagram be only an example, to understand the process of login method for convenience, in other embodiments, can also include More steps.The login method is described according to the angle of different executing subjects individually below.
S211 will log in required identification data, be encrypted using the saved first default public key, to obtain Log in encryption data.
When such as using RAS Encryption Algorithm, when being encrypted using public key, calculated using following encryption formula (formula 1) Ciphertext c;When being decrypted using private key, plaintext m is decrypted out using following decryption formula (formula 2).
me≡ c (mod n) formula 1
cd≡ m (mod n) formula 2
Wherein, encrypting the m in formula is in plain text, to correspond to ascii value or unicode value etc., and c is encrypted ciphertext, Include n and e in public key, includes n and d in private key.
As in this step, required identification data will be logged in and be converted to ascii value, as in plain text, utilizes calculating N and e out, and encryption formula calculate and log in encryption data.When decryption logs in encryption data, the n calculated is utilized And d, and encrypt formula and calculate in plain text, then plaintext is obtained against ascii code table and logs in required identification data. It should be noted that the process of encryption and decryption hereinafter is also such.
S212, Xiang Suoshu server end send log on request, so that the server end is pre- according to first saved If private key is decrypted in the log on request and logs in encryption data, to obtain identification data, and identification data is judged Whether matched with the identification data saved when registration and is determined whether to log in success according to matching result, wherein the One default public key and the first default private key are a pair of of code keys.
Intelligentized Furniture client sends log on request, the received server-side of intelligentized Furniture to the server end of intelligentized Furniture The log on request.It wherein, include logging in encryption data in log on request, it is by the identity in log on request that this, which logs in encryption data, It identifies data, the default public key encryption of saved first is utilized to obtain.Since the first default private key is in the service of intelligentized Furniture Device end, thus the received server-side of only intelligentized Furniture encryption data is logged in this after can just be carried out with the first default private key Decryption, and other terminals are received after this logs in encryption data and can not be decrypted.
If identification data is matched with the identification data that is saved when registration, it is determined that success is logged in, if not Match, it is determined that log in failure.
S213 logs in result data described in reception, wherein the result data that logs in is that the server end is stepped on described What Lu Chenggong or the information for logging in failure were obtained by the first default private key encryption, wherein if identification data and registration When the identification data matching that is saved, it is determined that success is logged in, if the identity that is saved when identification data and registration Identify that data mismatch, it is determined that log in failure.
S214 logs in result data for described, is decrypted using the first default public key, to obtain logging in successfully or wait To failure news.
S221 receives the log on request of the client, obtains in the log on request and logs in encryption data, wherein The encryption data that logs in is that intelligentized Furniture client will log in required identification data, utilizes the first default public key encryption It obtains.
The encryption data that logs in is utilized default private key to be decrypted, to obtain the body in the log on request by S222 Part identification data.
S223 judges the identification data saved when the identification data and the client registers that decryption obtains Whether match.
S224, the identification data saved when if decrypting obtained identification data and the client registers Match, it is determined that log in success, the identification saved when if decrypting obtained identification data and the client registers Data mismatch, it is determined that log in failure.
S225, by the information for logging in successfully or logging in failure by the first default private key encryption to obtain logging in knot Fruit data.
The result data that logs in is sent to the client by S226, so that the client is according to the first default public affairs Key come decrypt it is described log in result data, to obtain logging in successfully or log in failure news.
The embodiment is the login method embodiment in intelligentized Furniture remote security control method.Intelligentized Furniture client It logs in and has used the double-deck verifying.First layer verifying is encrypted using public key and private key, so guarantees that data are being transmitted across Safety in journey.Second layer verifying, is verified using identification data, since identification data includes human body spy Data are levied, and physical characteristic data has uniqueness.In this way, the double-deck verifying improves the safety of information.
Fig. 3 is the timing signal of the control method of intelligentized Furniture remote security control method provided by the embodiments of the present application Figure.As shown in Fig. 2, this approach includes the following steps S311-S315, S321-S329, S331-S335.Wherein, step S311- S315 runs on the client of intelligentized Furniture, and step S321-S329 runs on the server end of intelligentized Furniture, step S331- S335 runs on intelligentized Furniture end.It should be noted that the timing diagram of the control method is only an example, with for convenience Understand the process of control method, in other embodiments, can also include the steps that more others that either pass through control stream Journey completes control.The control method is described according to the angle of different executing subjects individually below.
S311 is saved the control use of information for controlling intelligentized Furniture if the server end of successful log intelligentized Furniture The first default public key encrypted with obtain control encryption data.
S312, Xiang Suoshu server end send control request, so that the server end is pre- according to first saved If private key decrypts the control encryption data in the control request, to obtain control information, and parses the control information and obtain The control instruction is utilized the default private key encryption of saved second by control instruction, to obtain instruction encryption data, and will be referred to Encryption data is enabled to be sent to intelligentized Furniture, so that intelligentized Furniture adds according to the saved second default public key decryptions described instruction Ciphertext data controls intelligentized Furniture according to control instruction to obtain control instruction, wherein the first default public key and described the One default private key is a pair of of code key, and the second default public key and the second default private key are a pair of of code keys.
S313 receives the encrypted result data that the server end is sent, and the encrypted result data are the servers By control result using the data after the first default private key encryption, the control result is the server end according to receiving at end Intelligentized Furniture return result encryption data, be decrypted using the second default private key, the result encryption data It is that the intelligentized Furniture obtains the control result of intelligentized Furniture using the second default public key encryption.
S314, by the encrypted result data using the first default public key decryptions to obtain the control result of intelligentized Furniture.
S315 shows the control result of the intelligentized Furniture.
S321, receives the control request that intelligentized Furniture client is sent, and the control obtained in the control request encrypts number According to, wherein the control encryption data is will to control the control use of information in request is saved first default public key to carry out What encryption obtained.
Wherein, control information includes a variety of, and control information, the character string triggered such as speech-controlled information, button controls letter Breath etc..As speech-controlled information means that the control information is generating by way of voice.
Intelligentized Furniture client sends control request, the received server-side of intelligentized Furniture to the server end of intelligentized Furniture Control request, to obtain the control encryption data in control request.
The control encryption data is utilized the default private key of saved first to be decrypted, to obtain the control by S322 Control information in system request.
S323 parses the control information and obtains control instruction.
It is encrypted using public key by information is controlled, and is decrypted using private key, ensure that control information is being transmitted across Safety in journey.
The control instruction is utilized the default private key encryption of saved second by S324, to obtain instruction encryption data.
Described instruction encryption data is sent to the intelligent family for having corresponding relation with the intelligentized Furniture client by S325 Tool so that intelligentized Furniture according to the saved second default public key decryptions described instruction encryption data to obtain control instruction, and Intelligentized Furniture is controlled according to control instruction.
S326 receives the result encryption data that intelligentized Furniture returns, wherein the result encryption data is by smart home The data that are obtained using the second default public key encryption of control result.
The result encryption data is decrypted S327 using the described second default private key, to obtain the intelligent family The control result of tool.
S328 is encrypted the control result of the intelligentized Furniture, using the first default private key to obtain encrypted result Data.
Encrypted result data are sent to the client by S329, so that the client of the smart home passes through the Encrypted result data described in one default public key decryptions, and show the control result of the intelligentized Furniture after decryption.
S331 receives the instruction encryption data that the server end is sent, wherein described instruction encryption data is the clothes Business device end is encrypted the control instruction of the client of intelligentized Furniture using the saved second default private key.
S332, using the described second default public key decryptions described instruction encryption data to obtain control instruction.
S333 controls the intelligentized Furniture according to the control instruction.
S334 is encrypted the control result for controlling the intelligentized Furniture, using the described second default public key to obtain As a result encryption data.
S335, by the result encryption data be sent to the server end so that the server-side utilize second Default private key decrypts the result encryption data to obtain the control result of intelligentized Furniture, and by the control knot of the intelligentized Furniture Fruit is encrypted to obtain encrypted result data using the first default private key, and decrypted result data is sent to the client End, so that the client decrypts the encrypted result data to obtain the control result of intelligentized Furniture.
In one embodiment, if control information is speech-controlled information.The method for running on the server end of intelligentized Furniture It is further comprising the steps of:
A extracts the feature in speech-controlled information, and the feature in the feature of extraction and the voice messaging prestored is carried out Matching.If the feature extracted and the characteristic matching success in the voice messaging prestored, execute the parsing control information and obtain The step of to control instruction.
If successful match, then it is assumed that send the language saved when user corresponding to the client of speech-controlled information and registration User corresponding to sound message is same user, is my voice.If matching unsuccessful, then it is assumed that send voice control and disappear User corresponding to the speech message that user corresponding to the client of breath and when registration save is not same user, then existing Following two situation: one, it is me, but I causes voice to there is difference due to flu etc.;Two, illegal user. If it is the first situation, then can further be verified, if it is second situation, it is considered that be illegal user, Illegal user not can be carried out long-range control.
B generates identifying code if the feature extracted and the non-successful match of feature in the voice messaging that prestores, and to described Client sends identifying code generated.Wherein, identifying code can be sent by way of short message.
Whether C, detection receive the identifying code confirmation message that the smart home client returns within effective verification time. Wherein, the identifying code confirmation message of return includes the correct identifying code returned, can also be other identifying code verification informations. If receiving the identifying code confirmation message that the smart home client returns within effective verification time, execute described in the parsing The step of control information obtains control instruction.
If receiving the correct identifying code of intelligentized Furniture client return within verifying effective time, then it is assumed that be me Operation, and due to other reasons such as catch a cold and cause the voice control message of transmission from the speech message that prestores there are different. It is returned if not receiving the identifying code of intelligentized Furniture client return within verifying effective time or receiving intelligentized Furniture client Return identifying code but identifying code mistake, it is considered that being illegal user.
If non-successful match, and it is true not receive the identifying code that the smart home client returns within effective verification time Recognize information, it is considered that being illegal user, Xiang Suoshu client returns to control failure news.
Above step A, B, C verify speech-controlled information, and mismatch if verified in speech-controlled information In the case where, it further verifies whether the operation for me, the safety of data transmission is improved, to further increase user's Experience.
In one embodiment, if control information is speech-controlled information, step S323 parses the control information and obtains Control instruction, comprising: by speech recognition algorithm to obtain text corresponding to speech-controlled information;Utilize natural language processing Method segments obtained text, to obtain keyword;Control instruction is generated according to keyword.Wherein, the basis Keyword generates control instruction, comprising: obtains preset intelligentized Furniture code and control routine;According to preset intelligentized Furniture generation The keyword is generated the control instruction including intelligentized Furniture code and control routine by code and control routine.The pass such as obtained Key word is " air-conditioning " "ON", then the corresponding control instruction that generates and turn on the aircondition.Obtain preset intelligentized Furniture code and control Code processed searches intelligentized Furniture code corresponding to air-conditioning and opens corresponding control routine, the intelligence as corresponding to " air-conditioning " Furniture code is 32011, control routine corresponding to "ON" is 01 etc..The control instruction includes intelligentized Furniture code, control Code etc., that is, the control instruction ultimately produced include 32011 and 01 etc..
In one embodiment, if control information is character string control information, step S323 parses the control information and obtains To control instruction, comprising: segmented obtained text using natural language processing method, to obtain keyword;According to Keyword generates control instruction.
In one embodiment, step S333 controls the intelligentized Furniture according to the control instruction, comprising: parsing control Whether intelligentized Furniture code and control routine in system instruction, the intelligentized Furniture code for judging that parsing obtains are pre- with intelligentized Furniture Whether the intelligentized Furniture code deposited is consistent, if unanimously, being controlled according to the control routine that parsing obtains intelligentized Furniture.
The embodiment is the control method embodiment in intelligentized Furniture remote security control method.Intelligent family is controlled long-range Transmitted information is all encrypted using public key or private key during tool, and is accordingly decrypted.So, it is ensured that remote The safety of transmitted information during process control intelligentized Furniture.
It is logged in above method embodiment using physical characteristic data, and control can be sent by voice and disappeared It ceases, after identification data and control message of the received server-side of intelligentized Furniture into log on request, will do it verifying, mention The high safety of long-range control.Moreover, after the failure of voice control information authentication, it is further by way of short message verification code The feasibility remotely controlled is improved, user experience is improved.In addition, the server end in intelligentized Furniture generates default public key and pre- If private key, and after the success of intelligentized Furniture client registers, intelligentized Furniture client and intelligentized Furniture are sent by default public key, So during intelligentized Furniture client, intelligentized Furniture server, intelligentized Furniture mutual data transmission, can all it use default Public key or default private key are encrypted, and the safety of data transmission is further ensured.
The step of the client of intelligentized Furniture is run on since embodiment of the figure 1 above into Fig. 3 has all respectively illustrated Suddenly, the step of running on the server end of intelligentized Furniture, and the step of running on intelligentized Furniture, can also be with by Fig. 1 to Fig. 3 It is evident which step runs on the client of intelligentized Furniture, which step runs on the server end of intelligentized Furniture, And which step runs on intelligentized Furniture end.Simultaneously again due to length limitation, will no longer individually in the application Description runs on a kind of process of intelligentized Furniture remote security control method of the client of intelligentized Furniture, and individually description is run on A kind of process of intelligentized Furniture remote security control method of the server end of intelligentized Furniture, and run on intelligentized Furniture end A kind of process of intelligentized Furniture remote security control method.But it is understood that ground, runs on the one of the client of intelligentized Furniture Plant a kind of intelligentized Furniture telesecurity control of intelligentized Furniture remote security control method, the server end for running on intelligentized Furniture Method, a kind of intelligentized Furniture remote security control method for running on intelligentized Furniture end can individually exist.
Fig. 4 is the schematic block diagram of intelligentized Furniture telesecurity control system provided by the embodiments of the present application.The system 100 Client and intelligentized Furniture including the server end of intelligentized Furniture and at least one intelligentized Furniture.Wherein, intelligentized Furniture Server end includes the intelligentized Furniture long-distance safety controller for being present in the server end of intelligentized Furniture, the client of intelligentized Furniture End includes the intelligentized Furniture long-distance safety controller for being present in the client of intelligentized Furniture, and intelligentized Furniture end includes being present in institute State the intelligentized Furniture long-distance safety controller at intelligentized Furniture end.In the embodiment, it is present in the server end of intelligentized Furniture Intelligentized Furniture long-distance safety controller, be present in intelligentized Furniture client intelligentized Furniture long-distance safety controller, with And being present in the intelligentized Furniture long-distance safety controller at intelligentized Furniture end includes for executing above-mentioned intelligentized Furniture telesecurity Unit corresponding to the control method of control method.As shown in figure 4, the intelligentized Furniture for being present in the client of intelligentized Furniture is long-range Safety control 110 includes control DEU data encryption unit 111, control data transmission unit 112, the first result receiving unit 113, the first result decryption unit 114 and the first unit 115 as the result is shown.It is present in the intelligence of the server of destination application Energy furniture long-distance safety controller 120 includes control data receiving unit 121, control data decryption unit 122, instruction determination Unit 123, instruction encryption unit 124, instruction sending unit 125, the second result receiving unit 126, the second result decryption unit 127, the first result encryption unit 128 and the first result transmission unit 129.The intelligentized Furniture for being present in intelligentized Furniture end is long-range Safety control 130 includes instruction receiving unit 131, instruction decryption unit 132, control unit 133, the second result encryption list Member 134 and the second result transmission unit 135.
Intelligentized Furniture will be controlled if the server end for successful log intelligentized Furniture by controlling DEU data encryption unit 111 The first default public key that control use of information is saved is encrypted to obtain control encryption data.
Data transmission unit member 112 is controlled, for sending control request to the server end, so that the server The control encryption data in the control request is decrypted at end according to the saved first default private key, to obtain control information, and It parses the control information and obtains control instruction, the control instruction is utilized into the default private key encryption of saved second, with It is sent to intelligentized Furniture to instruction encryption data, and by instruction encryption data, so that intelligentized Furniture is according to second saved Default public key decryptions described instruction encryption data controls intelligentized Furniture according to control instruction to obtain control instruction, wherein institute Stating the first default public key and the first default private key is a pair of of code key, the second default public key and the second default private key It is a pair of of code key.
First result receiving unit 113, the encrypted result data sent for receiving the server end, the encryption knot Fruit data are that control result is utilized the data after the first default private key encryption by the server end, and the control result is described The result encryption data that server end is returned according to the intelligentized Furniture received, is decrypted to obtain using the second default private key , the result encryption data is that the intelligentized Furniture obtains the control result of intelligentized Furniture using the second default public key encryption 's.
First result decryption unit 114, for by the encrypted result data using the first default public key decryptions to obtain The control result of intelligentized Furniture.
First unit 115 as the result is shown, for showing the control result of the intelligentized Furniture.
Control data receiving unit 121 obtains the control for receiving the control request of intelligentized Furniture client transmission Control encryption data in request, wherein the control encryption data is to be saved the control use of information in control request The first default public key encrypted.
Control data decryption unit 122, for by the control encryption data utilize the default private key of saved first into Row decryption, to obtain the control information in the control request.
Instruction-determining unit 123 obtains control instruction for parsing the control information.
Encryption unit 124 is instructed, for the control instruction to be utilized the default private key encryption of saved second, to obtain Instruct encryption data.
Instruction sending unit 125 has phase with the intelligentized Furniture client for being sent to described instruction encryption data The intelligentized Furniture that should be related to, so that intelligentized Furniture is according to the saved second default public key decryptions described instruction encryption data to obtain Intelligentized Furniture is controlled to control instruction, and according to control instruction.
Second result receiving unit 126, for receiving the result encryption data of intelligentized Furniture return, wherein the result Encryption data is the data for obtaining the control result of smart home using the second default public key encryption.
Second result decryption unit 127, for solving the result encryption data using the described second default private key It is close, to obtain the control result of the intelligentized Furniture.
First result encryption unit 128, for carrying out the control result of the intelligentized Furniture using the first default private key Encryption, to obtain encrypted result data.
First result transmission unit 129, for encrypted result data to be sent to the client, so that the intelligence The client of household shows the control of the intelligentized Furniture after decryption by encrypted result data described in the first default public key decryptions As a result.
Instruction receiving unit 131, the instruction encryption data sent for receiving the server end, wherein described instruction Encryption data be the server end by the control instruction of the client of intelligentized Furniture utilize the default private key of saved second into Row encryption obtains.
Instruction decryption unit 132, for using the described second default public key decryptions described instruction encryption data to be controlled System instruction.
Control unit 133, for controlling the intelligentized Furniture according to the control instruction.
Second result encryption unit 134, for presetting the control result for controlling the intelligentized Furniture using described second Public key is encrypted, to obtain result encryption data.
Second result transmission unit 135, for by the result encryption data be sent to the server end so that The server-side using the second default private key decrypts the result encryption data to obtain the control result of intelligentized Furniture, and by institute The control result for stating intelligentized Furniture is encrypted using the first default private key to obtain encrypted result data, and by decrypted result number According to the client is sent to, so that the client decrypts the encrypted result data to obtain the control knot of intelligentized Furniture Fruit.
In one embodiment, the intelligentized Furniture long-distance safety controller 120 for being present in the server of intelligentized Furniture also wraps It includes and extracts matching unit, identifying code generation unit, verifying detection unit.Wherein, matching unit is extracted, for extracting voice control Feature in information, and the feature of extraction is matched with the feature in the voice messaging prestored.If the feature extracted and pre- Characteristic matching success in the voice messaging deposited, triggering command determination unit 123, to be controlled for parsing the control information System instruction.Identifying code generation unit, if the feature for extraction and the non-successful match of feature in the voice messaging that prestores, generate Identifying code, and identifying code generated is sent to the client.Detection unit is verified, for detecting within effective verification time Whether identifying code confirmation message that the smart home client return is received.If receiving the intelligence within effective verification time The identifying code confirmation message that household client returns, triggering command determination unit 123.
In one embodiment, correspond to Fig. 2, be present in the intelligentized Furniture telesecurity control dress of client's device of intelligentized Furniture Setting 110 further includes logging in DEU data encryption unit, logging in data transmission unit, log in result receiving unit and log in result decryption Unit.Wherein,
DEU data encryption unit is logged in, for required identification data will to be logged in, utilizes the default public affairs of saved first Key is encrypted, to obtain logging in encryption data.
Data transmission unit is logged in, for sending log on request to the server end, so that the server end root It is decrypted in the log on request according to the saved first default private key and logs in encryption data, to obtain identification data, and Judge whether identification data matches with the identification data saved when registration and determine whether according to matching result Log in success, wherein the first default public key and the first default private key are a pair of of code keys.
Result receiving unit is logged in, described logs in result data for receiving, wherein the result data that logs in is described Server end obtains the information for logging in successfully or logging in failure by the first default private key encryption, wherein if body Part identification data are matched with the identification data saved when registration, it is determined that success are logged in, if identification data and note The identification data saved when volume mismatches, it is determined that logs in failure.
Result decryption unit is logged in, for logging in result data for described, is decrypted using the first default public key, with To log in successfully or wait failure news.
In one embodiment, correspond to Fig. 2, be present in the intelligentized Furniture telesecurity control of the server device of intelligentized Furniture Device 120 further includes logging in data receipt unit, logging in data decryption unit, log in data matching unit, log in matching determination Unit logs in result encryption unit and logs in result receiving unit.Wherein,
Data receipt unit is logged in, for receiving the log on request of the client, obtains stepping in the log on request Land encryption data, wherein the encryption data that logs in is that intelligentized Furniture client will log in required identification data, is utilized What the first default public key encryption obtained.
Data decryption unit is logged in, for utilizing default private key to be decrypted the encryption data that logs in, to obtain State the identification data in log on request.
Data matching unit is logged in, decrypts obtained identification data and the client registers Shi Suobao for judging Whether the identification data deposited matches.
Matching determination unit is logged in, if being saved when for decrypting obtained identification data with the client registers Identification data matching, it is determined that success is logged in, if when the obtained identification data of decryption and the client registers The identification data saved mismatches, it is determined that logs in failure.
Result encryption unit is logged in, for the information for logging in successfully or logging in failure to be passed through the first default private key Encryption is to obtain logging in result data.
Result receiving unit is logged in, for the result data that logs in be sent to the client, so that the client End logs in result data described in decrypting according to the first default public key, to obtain logging in successfully or log in failure news.
In one embodiment, correspond to Fig. 1, be present in the intelligentized Furniture telesecurity control dress of client's device of intelligentized Furniture Setting 110 further includes registration transmission unit, registering result receiving unit and the first public key receiving unit.Wherein,
Transmission unit is registered, for sending registration request to the server end of intelligentized Furniture, includes in the registration request The identification information of identification data and intelligentized Furniture, so that the server end determines the note according to the identification information Whether volume request passes through verifying.
Registering result receiving unit, the message to succeed in registration sent for receiving the server end.It is to be appreciated that Also the message of the registration failure of server end transmission can be received.
First public key receiving unit, the first default public key sent for receiving the server end, the first default public affairs Key is the server end after succeeding in registration, and is generated using rivest, shamir, adelman, the first default public key and service The default private key of the first of device end is a pair of of code key.
In one embodiment, correspond to Fig. 1, be present in the intelligentized Furniture telesecurity control of the server device of intelligentized Furniture Device 120 further includes registration receiving unit, registration authentication unit, registration verifying determination unit, registering result transmission unit, code key Generation unit and public key transmission unit.Wherein,
Receiving unit is registered, for receiving the registration request of the client, the identity obtained in the registration request is known The identification information of other data and intelligentized Furniture, wherein the identification data includes physical characteristic data.
Authentication unit is registered, is tested for determining whether the registration request passes through according to the identification information of the intelligentized Furniture Card.
Registration verifying determination unit, if determination is succeeded in registration, and saves the visitor for the registration request by verifying The corresponding relation and the identification data of family end and intelligentized Furniture.It should be understood that if the registration request does not pass through Verifying, determines registration failure.
Registering result transmission unit, for sending the message to succeed in registration to the client.It is to be appreciated that server Also can be after determining registration failure, Xiang Suoshu client sends the message of registration failure.
Code key generation unit, if the client registers success for intelligentized Furniture, generates the using rivest, shamir, adelman One default public key and the first default private key, the second default public key and the second default private key.
Public key transmission unit, for the generated second default public key to be sent to smart home, by generated first Default public key is sent to the client.
In one embodiment, correspond to Fig. 1, be present in the intelligentized Furniture telesecurity control of the server device of intelligentized Furniture Device 130 further includes the second public key receiving unit.Wherein,
Second public key receiving unit, the second default public key sent for receiving the server end.
It should be noted that being present in the intelligentized Furniture long-distance safety controller of the client of intelligentized Furniture above, depositing Be the intelligentized Furniture long-distance safety controller of the server end of intelligentized Furniture, the intelligentized Furniture that is present in intelligentized Furniture end it is remote Journey safety control can be individually present.The component part of each unit module is corresponded to when due to being individually present and in intelligence Component part in furniture telesecurity control system is identical, therefore is not describing respectively.
It should be noted that it is apparent to those skilled in the art that, the tool of above-mentioned apparatus and each unit Body realizes process, can be no longer superfluous herein with reference to the corresponding description in preceding method embodiment, for convenience of description and succinctly It states.
Above-mentioned apparatus can be implemented as a kind of form of computer program, and computer program can be in meter as shown in Figure 5 It calculates and is run on machine equipment.
Fig. 5 is a kind of schematic block diagram of computer equipment provided by the embodiments of the present application.The visitor of the device intelligence furniture Family end, such as mobile phone, PAD equipment.The equipment 200 includes processor 202, memory and the net connected by system bus 201 Network interface 203, wherein memory may include non-volatile memory medium 204 and built-in storage 205.
The non-volatile memory medium 204 can storage program area 2041 and computer program 2042.This is non-volatile to deposit , it can be achieved that the visitor of intelligentized Furniture described above when the computer program 2042 stored in storage media is executed by processor 202 The intelligentized Furniture remote security control method at family end.The processor 202 supports whole equipment for providing calculating and control ability 200 operation.The built-in storage 205 provides environment for the operation of the computer program in non-volatile memory medium, the calculating When machine program is executed by processor 202, processor 202 may make to execute the intelligent family of the client of intelligentized Furniture described above Has remote security control method.The network interface 203 is for carrying out network communication.It will be understood by those skilled in the art that in figure The structure shown, only the block diagram of part-structure relevant to the present invention program, does not constitute and is applied to the present invention program The restriction of equipment thereon, specific equipment may include more certain than more or fewer components as shown in the figure, or combination Component, or with different component layouts.
Wherein, the processor 202 is described above to realize for running computer program stored in memory Run on any embodiment of the intelligentized Furniture remote security control method of the client of intelligentized Furniture.
Another embodiment of the present invention additionally provides a kind of schematic block diagram of computer equipment.In the present embodiment, described Equipment is the server of intelligentized Furniture.Fig. 5 specifically is please referred to, which includes identical as computer equipment shown in Fig. 5 Structure.The difference of the computer equipment and computer equipment shown in Fig. 5 is that non-volatile memories are situated between in the computer equipment , it can be achieved that the server for running on intelligentized Furniture described above when the computer program that matter is stored is executed by processor 202 Any embodiment of the intelligentized Furniture remote security control method at end.
Another embodiment of the present invention additionally provides a kind of schematic block diagram of computer equipment.In the present embodiment, described Equipment is intelligentized Furniture end.Fig. 5 specifically is please referred to, which includes structure identical with computer equipment shown in Fig. 5. The difference of the computer equipment and computer equipment shown in Fig. 5 is that non-volatile memory medium is deposited in the computer equipment , it can be achieved that the intelligentized Furniture for running on intelligentized Furniture end described above is remote when the computer program of storage is executed by processor 202 Any embodiment of journey method of controlling security.
It should be appreciated that in the embodiment of the present application, alleged processor 202 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (application program lication Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other can Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor Or the processor is also possible to any conventional processor etc..
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process, It is that relevant hardware can be instructed to complete by computer program.The computer program can be stored in a storage medium, The storage medium can be computer readable storage medium.The computer program is by the processing of at least one of the computer system Device executes, to realize the process step of the embodiment of the above method.
Therefore, present invention also provides a kind of storage mediums.The storage medium can be computer readable storage medium, should Computer readable storage medium includes non-volatile computer readable storage medium storing program for executing.The storage medium is stored with computer program, The computer program when being executed by a processor, realizes that the intelligentized Furniture of the client for running on intelligentized Furniture described above is remote Any embodiment of journey method of controlling security.
A kind of storage medium is additionally provided in another embodiment of the application.The storage medium can be deposited to be computer-readable Storage media, the computer readable storage medium include non-volatile computer readable storage medium storing program for executing.The storage medium is stored with meter Calculation machine program, the computer program is when being executed by a processor, it can be achieved that the server for running on intelligentized Furniture described above Any embodiment of the intelligentized Furniture remote security control method at end.
A kind of storage medium is additionally provided in another embodiment of the application.The storage medium can be deposited to be computer-readable Storage media, the computer readable storage medium include non-volatile computer readable storage medium storing program for executing.The storage medium is stored with meter Calculation machine program, the computer program is when being executed by a processor, it can be achieved that the intelligence for running on intelligentized Furniture end described above Any embodiment of furniture remote security control method.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), magnetic disk Or the various computer readable storage mediums that can store program code such as CD.
In several embodiments provided herein, it should be understood that disclosed device, device and method, it can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation.Those skilled in the art can be with It is well understood, for convenience of description and succinctly, the specific work process of the device of foregoing description, equipment and unit can With with reference to the corresponding process in preceding method embodiment, details are not described herein.The above, the only specific embodiment party of the application Formula, but the protection scope of the application is not limited thereto, and anyone skilled in the art discloses in the application In technical scope, various equivalent modifications or substitutions can be readily occurred in, these modifications or substitutions should all cover the guarantor in the application Within the scope of shield.Therefore, the protection scope of the application should be subject to the protection scope in claims.

Claims (10)

1. a kind of intelligentized Furniture remote security control method, the server end applied to intelligentized Furniture, which is characterized in that the side Method includes:
If receiving the control request of intelligentized Furniture client transmission, the control encryption data in the control request, institute are obtained Stating control encryption data is that will control the first default public key that the control use of information in request is saved to be encrypted;
The default private key of saved first is utilized to be decrypted the control encryption data, to obtain in the control request Control information, wherein the first default public key and the first default private key are a pair of of code keys;
It parses the control information and obtains control instruction;
The control instruction is utilized into the default private key encryption of saved second, to obtain instruction encryption data;
Described instruction encryption data is sent to the intelligentized Furniture for having corresponding relation with the intelligentized Furniture client, so that intelligence Furniture according to the saved second default public key decryptions described instruction encryption data to obtain control instruction, and according to control instruction Control intelligentized Furniture, wherein the second default public key and the second default private key are a pair of of code key.
2. the method according to claim 1, wherein if the control information is speech-controlled information, described It parses before the control information obtains control instruction, the method also includes:
The feature in the speech-controlled information is extracted, and the feature in extracted feature and the speech message prestored is carried out Matching;
If the non-successful match of feature in extracted feature and the speech message prestored, identifying code is generated, and to the intelligence Household client sends identifying code generated;
Whether detection receives the identifying code confirmation message that the smart home client returns within effective verification time;
If the identifying code confirmation message that the smart home client returns is received within effective verification time, if being extracted Feature and the characteristic matching success in the speech message that prestores, execute the parsing control information and obtain control instruction Step.
3. the method according to claim 1, wherein the method also includes:
The result encryption data that intelligentized Furniture returns is received, the result encryption data is to utilize the control result of smart home The data that second default public key encryption obtains;
The result encryption data is decrypted using the second default private key, to obtain the control result;
The control result is encrypted by the first default private key to obtain encrypted result data, and by encrypted result data And it is sent to the client of the intelligentized Furniture, so that the client of the smart home is solved by the first default public key Close and display control result.
4. if the method according to claim 1, wherein in the control for receiving the transmission of intelligentized Furniture client Before system request, the method also includes:
If receiving the log on request of intelligentized Furniture client, obtain in the log on request and log in encryption data, wherein institute Stating and logging in encryption data is that intelligentized Furniture client will log in required identification data, is obtained using the first default public key encryption It arrives;
It logs in encryption data by described and is decrypted using the first default private key, to obtain the identification in the log on request Data;
The identification data saved when identification data and the intelligentized Furniture client registers that judgement decryption obtains Whether match;
The identification data saved when if decrypting obtained identification data and the intelligentized Furniture client registers Match, it is determined that log in success, and log in successful information by being sent to the intelligence after the first default private key encryption for described Furniture client, so that the intelligentized Furniture client is decrypted according to the first default public key to obtain logging in successful message.
5. if the method according to claim 1, wherein in the control for receiving the transmission of intelligentized Furniture client Before system request, the method also includes:
If receiving the registration request of intelligentized Furniture client, the identification data in the registration request and intelligent family are obtained The identification information of tool, wherein the identification data includes physical characteristic data;
Determine whether the registration request passes through verifying according to the identification information of the intelligentized Furniture;
If the registration request is by verifying, determination is succeeded in registration, and it is corresponding to intelligentized Furniture to save intelligentized Furniture client Relationship and the identification data;
The first default public key and the default private of the first default private key, the second default public key and second are generated using rivest, shamir, adelman Key;
Generated first default public key is sent to the client of intelligentized Furniture, the generated second default public key is sent to Intelligentized Furniture.
6. a kind of intelligentized Furniture remote security control method, the client applied to intelligentized Furniture, which is characterized in that the method Include:
If the server end of successful log intelligentized Furniture, first that the control use of information for controlling intelligentized Furniture is saved is preset Public key is encrypted to obtain control encryption data;
Control request is sent to the server end of intelligentized Furniture, so that the server end is according to the default private of first saved Key decrypts the control encryption data in the control request, to obtain control information, and parses the control information and is controlled Instruction, utilizes the default private key encryption of saved second for the control instruction, to obtain instruction encryption data, and instruction is added Ciphertext data is sent to intelligentized Furniture, so that intelligentized Furniture encrypts number according to the saved second default public key decryptions described instruction Control instruction is obtained accordingly, and intelligentized Furniture is controlled according to control instruction, wherein the first default public key and described first is in advance If private key is a pair of of code key, the second default public key and the second default private key are a pair of of code keys;
The encrypted result data that the server end returns are received, the encrypted result data are that the server end ties control Fruit utilizes the data after the first default private key encryption, and the control result is the server end according to the intelligentized Furniture received The result encryption data of return is decrypted using the second default private key, and the result encryption data is the intelligence Furniture obtains the control result of intelligentized Furniture using the second default public key encryption;
By the encrypted result data using the first default public key decryptions to obtain control result.
7. a kind of intelligentized Furniture long-distance safety controller, which is characterized in that the intelligentized Furniture long-distance safety controller packet The unit for executing any one of such as claim 1-5 the method is included, or including for executing side as claimed in claim 6 The unit of method.
8. a kind of intelligentized Furniture telesecurity control system, which is characterized in that the intelligentized Furniture telesecurity control system packet It includes the server end of intelligentized Furniture and the client of at least one intelligentized Furniture and has with the client of the intelligentized Furniture The intelligentized Furniture of corresponding relation, wherein the server end of the intelligentized Furniture includes for executing such as any one of claim 1-5 The unit of the method, the client of the intelligentized Furniture include the unit for executing method as claimed in claim 6.
9. a kind of computer equipment, which is characterized in that the computer equipment includes memory, and is connected with the memory Processor;
The memory is for storing computer program;The processor is for running the computer journey stored in the memory Sequence to execute the method according to claim 1 to 5, or executes method as claimed in claim 6.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence when the computer program is executed by processor, realizes the method according to claim 1 to 5, or realize such as Method of claim 6.
CN201910299860.2A 2019-04-15 2019-04-15 Intelligentized Furniture remote security control method, device, computer equipment and storage medium Pending CN110191086A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910299860.2A CN110191086A (en) 2019-04-15 2019-04-15 Intelligentized Furniture remote security control method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910299860.2A CN110191086A (en) 2019-04-15 2019-04-15 Intelligentized Furniture remote security control method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110191086A true CN110191086A (en) 2019-08-30

Family

ID=67714519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910299860.2A Pending CN110191086A (en) 2019-04-15 2019-04-15 Intelligentized Furniture remote security control method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110191086A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647410A (en) * 2019-09-25 2020-01-03 广州河东科技有限公司 Inter-process data transmission method and device, electronic equipment and storage medium
CN111654503A (en) * 2020-06-08 2020-09-11 工业和信息化部网络安全产业发展中心(工业和信息化部信息中心) Remote control method, device, equipment and storage medium
EP3809660A1 (en) * 2019-10-16 2021-04-21 Roche Diabetes Care GmbH Method for operating a medical system, medical system, and security module
CN112987581A (en) * 2019-12-16 2021-06-18 华为技术有限公司 Control method for intelligent household equipment, medium and terminal thereof
CN113014579A (en) * 2021-02-24 2021-06-22 珠海格力电器股份有限公司 Control instruction transmission method, system, server and storage medium
CN113194015A (en) * 2021-04-29 2021-07-30 洪璐 Internet of things intelligent household equipment safety control method and system
CN113542081A (en) * 2021-09-16 2021-10-22 深圳市万睿智能科技有限公司 Safe intelligent household control method and system
CN113612775A (en) * 2021-08-04 2021-11-05 西安思安云创科技有限公司 4C remote control safety protection method, device and system based on Internet of things equipment
CN113885502A (en) * 2021-10-09 2022-01-04 北京云迹科技有限公司 Robot control method, control device and computer medium
CN113961073A (en) * 2021-10-20 2022-01-21 深圳市嘉中电子有限公司 Intelligent visual interaction device and method
CN114595437A (en) * 2022-05-09 2022-06-07 荣耀终端有限公司 Access control method, electronic device, and computer-readable storage medium
CN114662082A (en) * 2022-02-25 2022-06-24 荣耀终端有限公司 Access control method of electronic device, readable medium and electronic device
CN114726521A (en) * 2022-04-14 2022-07-08 广东好太太智能家居有限公司 Intelligent lock temporary password generation method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163228A (en) * 2007-10-24 2008-04-16 中国电信股份有限公司 Video data encrypted system and method for network video monitoring
CN102263776A (en) * 2010-05-26 2011-11-30 魏星 Intelligent household remote control system and intelligent household server
CN104580191A (en) * 2014-12-31 2015-04-29 深圳市兰丁科技有限公司 Offline control method and system for smart home
CN106952377A (en) * 2017-04-07 2017-07-14 深圳广田智能科技有限公司 The method and system of smart home door lock are opened by mobile fingerprint
CN107786337A (en) * 2016-08-26 2018-03-09 中兴通讯股份有限公司 The encryption and decryption control method of intelligent domestic system, device, home equipment
CN109412910A (en) * 2018-11-20 2019-03-01 三星电子(中国)研发中心 The method and apparatus for controlling smart home device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163228A (en) * 2007-10-24 2008-04-16 中国电信股份有限公司 Video data encrypted system and method for network video monitoring
CN102263776A (en) * 2010-05-26 2011-11-30 魏星 Intelligent household remote control system and intelligent household server
CN104580191A (en) * 2014-12-31 2015-04-29 深圳市兰丁科技有限公司 Offline control method and system for smart home
CN107786337A (en) * 2016-08-26 2018-03-09 中兴通讯股份有限公司 The encryption and decryption control method of intelligent domestic system, device, home equipment
CN106952377A (en) * 2017-04-07 2017-07-14 深圳广田智能科技有限公司 The method and system of smart home door lock are opened by mobile fingerprint
CN109412910A (en) * 2018-11-20 2019-03-01 三星电子(中国)研发中心 The method and apparatus for controlling smart home device

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647410A (en) * 2019-09-25 2020-01-03 广州河东科技有限公司 Inter-process data transmission method and device, electronic equipment and storage medium
EP3809660A1 (en) * 2019-10-16 2021-04-21 Roche Diabetes Care GmbH Method for operating a medical system, medical system, and security module
WO2021074221A1 (en) * 2019-10-16 2021-04-22 F. Hoffmann-La Roche Ag Method for operating a medical system, medical system, and security module
CN112987581A (en) * 2019-12-16 2021-06-18 华为技术有限公司 Control method for intelligent household equipment, medium and terminal thereof
CN111654503A (en) * 2020-06-08 2020-09-11 工业和信息化部网络安全产业发展中心(工业和信息化部信息中心) Remote control method, device, equipment and storage medium
CN113014579A (en) * 2021-02-24 2021-06-22 珠海格力电器股份有限公司 Control instruction transmission method, system, server and storage medium
CN113194015A (en) * 2021-04-29 2021-07-30 洪璐 Internet of things intelligent household equipment safety control method and system
CN113612775A (en) * 2021-08-04 2021-11-05 西安思安云创科技有限公司 4C remote control safety protection method, device and system based on Internet of things equipment
CN113542081A (en) * 2021-09-16 2021-10-22 深圳市万睿智能科技有限公司 Safe intelligent household control method and system
CN113885502A (en) * 2021-10-09 2022-01-04 北京云迹科技有限公司 Robot control method, control device and computer medium
CN113961073A (en) * 2021-10-20 2022-01-21 深圳市嘉中电子有限公司 Intelligent visual interaction device and method
CN114662082A (en) * 2022-02-25 2022-06-24 荣耀终端有限公司 Access control method of electronic device, readable medium and electronic device
CN114662082B (en) * 2022-02-25 2023-06-06 荣耀终端有限公司 Access control method of electronic device, readable medium and electronic device
CN114726521A (en) * 2022-04-14 2022-07-08 广东好太太智能家居有限公司 Intelligent lock temporary password generation method and electronic equipment
CN114595437A (en) * 2022-05-09 2022-06-07 荣耀终端有限公司 Access control method, electronic device, and computer-readable storage medium

Similar Documents

Publication Publication Date Title
CN110191086A (en) Intelligentized Furniture remote security control method, device, computer equipment and storage medium
CN106789047B (en) A kind of block chain identification system
TWI749061B (en) Blockchain identity system
US9736147B1 (en) Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD)
CN102026195B (en) One-time password (OTP) based mobile terminal identity authentication method and system
US9641521B2 (en) Systems and methods for network connected authentication
CN104219228B (en) A kind of user&#39;s registration, user identification method and system
EP3346660B1 (en) Authentication information update method and device
CN111615105B (en) Information providing and acquiring method, device and terminal
CN104836784B (en) A kind of information processing method, client and server
CN106603234A (en) Method, device and system for device identity authentication
US20110047377A1 (en) Secure digital communications via biometric key generation
CN110059458A (en) A kind of user password encryption and authentication method, apparatus and system
CN111435913A (en) Identity authentication method and device for terminal of Internet of things and storage medium
CN107484032A (en) Prevent the verification method and device brushed
CN113556321A (en) Password authentication method, system, electronic device and storage medium
WO2016083618A1 (en) A method and device for authentication
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
CN110941809A (en) File encryption and decryption method and device, fingerprint password device and readable storage medium
TWI786039B (en) Offline payment method, terminal equipment, backstage payment device and offline payment system
US9455973B1 (en) Secure storage and retrieval of data in a database with multiple data classes and multiple data identifiers
CN109409109A (en) Data processing method, device, processor and server in network service
EP3361691B1 (en) Method and device for verifying validity of identity of entity
US11483166B2 (en) Methods and devices for enrolling and authenticating a user with a service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190830