CN110289956A - A kind of cloud speaker updates the method and system of configuration - Google Patents

A kind of cloud speaker updates the method and system of configuration Download PDF

Info

Publication number
CN110289956A
CN110289956A CN201910569589.XA CN201910569589A CN110289956A CN 110289956 A CN110289956 A CN 110289956A CN 201910569589 A CN201910569589 A CN 201910569589A CN 110289956 A CN110289956 A CN 110289956A
Authority
CN
China
Prior art keywords
data
module
cloud
configuration file
cloud speaker
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910569589.XA
Other languages
Chinese (zh)
Other versions
CN110289956B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201910569589.XA priority Critical patent/CN110289956B/en
Publication of CN110289956A publication Critical patent/CN110289956A/en
Application granted granted Critical
Publication of CN110289956B publication Critical patent/CN110289956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides the method and system that a kind of cloud speaker updates configuration, the request for obtaining configuration file is sent to Cloud Server by cloud speaker, Cloud Server obtains corresponding configuration file according to the cloud speaker mark in request, and configuration file is encrypted, it is handed down to cloud speaker, the configuration file for obtaining plaintext, and more new configuration file are decrypted by the configuration file of the key pair encryption generated for cloud speaker.The functions such as the customized switching on and shutting down signal language of cloud speaker may be implemented in the above manner, customer experience is relatively good, is subjected to and customized degree is relatively high.

Description

A kind of cloud speaker updates the method and system of configuration
Technical field
The present invention relates to Internet technical field, in particular to a kind of cloud speaker updates the method and system of configuration.
Background technique
With the fast development of electronic information technologies, the use of cloud speaker is also become increasingly prevalent, for example, trade company is receiving By cloud speaker voice broadcast payment result when payment, the scenes such as parking fee collective system also carry out voice broadcast using cloud speaker;So And the cloud speaker on the market just built-in connection type of equipment and server-side when equipment is dispatched from the factory at present, long connection heartbeat Time, switching on and shutting down voice prompting language and advertising slogan etc. can not be accomplished to broadcast for different clients with customized content The content of the personalized customization such as different switching on and shutting down signal languages, also can not to the connection type between cloud speaker and Cloud Server into Row change, there are user's property of can customize, compatibility, user experience are poor.
Summary of the invention
The present invention provides the method and system that a kind of cloud speaker updates configuration, solve above-mentioned technical problem.
The method that a kind of cloud speaker provided by the invention updates configuration, this method comprises:
S1, cloud speaker receive the initialization data that the tool of production imports, and obtain the cloud speaker mark in initialization data, raw At random number, random number and cloud speaker mark are carried out that first key is calculated by preset algorithm;
In the present embodiment, cloud speaker generates random number specifically: it is random that cloud speaker calls random number generation function to generate Number;
Optionally, cloud speaker to random number and cloud speaker mark carries out that first key is calculated by preset algorithm, has Body are as follows: cloud speaker to random number and cloud speaker mark splices, obtain splicing data, by hash algorithm to splicing data into Row operation obtains the first cryptographic Hash, using the first cryptographic Hash as first key.
S2, cloud speaker identify tissue according to cloud speaker and generate connection request data, send connection request number to Cloud Server According to;
In the present embodiment, after cloud speaker sends connection request data to Cloud Server further include: cloud speaker is according to default Time judges whether to receive the data of Cloud Server return, prompts to wait time-out if being not received by.
S3, Cloud Server are identified according to connection request data acquisition cloud speaker, are judged in database with the presence or absence of identical Cloud speaker mark, then generates challenge code if it exists, generates connection response data according to challenge code and is sent to cloud speaker;
In the present embodiment, Cloud Server judges to identify in database with the presence or absence of identical cloud speaker, if it does not exist then Cloud Server generates the response data comprising connection failure answer code, and response data is sent to cloud speaker.
Challenge code, random number and cloud speaker mark are carried out group according to connection response data acquisition challenge code by S4, cloud speaker Conjunction obtains the first data splitting, obtains manufacturer's key in initialization data, is carried out according to the first data splitting of manufacturer's key pair Signature obtains the first signed data, generates verify data according to the first signed data and the first data splitting, and by verify data It is sent to Cloud Server;
S5, cloud service obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data, pass through manufacturer's certificate pair The first signed data in verify data carries out sign test, stores verify data if sign test success, generates auth response data hair Give cloud speaker;
In the present embodiment, Cloud Server generates auth response data and is sent to after cloud speaker, further includes: Cloud Server The verify data of storage is parsed, the first data splitting is obtained, by preset algorithm to the random number and cloud in the first data splitting Speaker mark carries out that the second key is calculated;
Optionally, by preset algorithm in the first data splitting random number and cloud speaker mark be calculated the Two keys, specifically: Cloud Server splices random number and cloud speaker mark, obtains splicing data, passes through hash algorithm Operation is carried out to splicing data, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
S6, cloud speaker receive the auth response data that Cloud Server is sent, and parse and obtain key agreement result;
S7, cloud speaker generate the request data for obtaining configuration file, and the request data that will acquire configuration file is sent to Cloud Server;
S8, Cloud Server obtain corresponding configuration file according to the request data for obtaining configuration file, pass through the second key The configuration file of acquisition is encrypted, and returns to encrypted configuration file to cloud speaker;Second key is by the cloud Server is obtained according to the verify data of storage;
In the present embodiment, the request data for obtaining configuration file includes cloud speaker mark;
Corresponding configuration file is obtained according to the request data for obtaining configuration file, specifically: Cloud Server is in database In find the corresponding list of configuration file, according to cloud speaker mark corresponding configuration file is found in corresponding lists.
Optionally, Cloud Server is encrypted by the configuration file that the second key pair obtains, specifically: Cloud Server root The verify data that storage is obtained according to the request data for obtaining configuration file generates the second key according to verify data, passes through second The configuration file that key pair obtains is encrypted;
Preferably, the request data for obtaining configuration file includes cloud speaker mark;Cloud Server is literary according to configuration is obtained The request data of part obtains the verify data of storage specifically: Cloud Server identifies the verifying number for obtaining storage according to cloud speaker According to.
S9, cloud speaker are decrypted the encryption configuration file received by first key, obtain clear text configuration files And update configuration.
The present invention provides the systems that a kind of cloud speaker updates configuration, which includes: cloud speaker and Cloud Server;
Wherein, cloud speaker include: the first receiving module, first obtain module, the first generation module, the first computing module, First sending module, composite module, signature blocks, deciphering module and update module;
First receiving module, for receiving the initialization data of tool of production importing;
First obtains module, for obtaining the mark of the cloud speaker in the initialization data that the first receiving module receives;
First generation module, for generating random number;
Optionally, when the first generation module calls random number generation function to generate for being specifically used for when generating random number Random number.
First computing module, for obtaining module to the random number and first that the first generation module generates by preset algorithm The cloud speaker mark of acquisition carries out that first key is calculated;
Optionally, the first computing module obtains splicing number specifically for splicing to random number and cloud speaker mark According to, by hash algorithm to splicing data carry out operation, the first cryptographic Hash is obtained, using the first cryptographic Hash as first key.
First generation module is also used to obtain the cloud speaker mark tissue generation connection request number that module obtains according to first According to;
First sending module, the connection request data for generating the first generation module are sent to Cloud Server;
First receiving module is also used to receive the connection response data of Cloud Server transmission;
First obtains module, the connection response data acquisition challenge code for being also used to receive according to the first receiving module;
Composite module, for being combined challenge code, random number and cloud speaker mark to obtain the first data splitting;
First obtains module, is also used to obtain manufacturer's key in the initialization data that the first receiving module receives;
Signature blocks, the first data splitting of manufacturer's key pair for being obtained according to the first acquisition module are signed to obtain First signed data;
First generation module, the first signed data for being also used to be signed according to signature blocks and the first data splitting are raw At verify data;
First sending module is also used to the verify data that the first generation module generates being sent to Cloud Server;
Optionally, after connection request data are sent to Cloud Server by the first sending module, cloud speaker further includes first Judgment module and cue module;
First judgment module, for judging whether to receive the data of Cloud Server return according to preset time;
Cue module, for the prompt waiting time-out when first judgment module judgement is not received by data.
First receiving module is also used to receive the auth response data of Cloud Server transmission;
First obtains module, is also used to parse the auth response data that the first receiving module receives, and obtains key agreement As a result;
First generation module is also used to generate the request data for obtaining configuration file;
First sending module is also used to the request data for the acquisition configuration file that the first generation module generates being sent to cloud Server;
First receiving module is also used to receive the encryption configuration file of Cloud Server transmission;
Deciphering module, the first key for being calculated by the first computing module is to the encryption configuration file received It is decrypted, obtains clear text configuration files;
Update module, the clear text configuration files for being decrypted according to deciphering module update configuration.
Wherein, Cloud Server includes: the second acquisition module, the second judgment module, the second generation module, the second transmission mould Block, sign test module, the second receiving module and encrypting module;
Second receiving module, for receiving the connection request data of cloud speaker transmission;
Second obtains module, for being identified according to connection request data acquisition cloud speaker;
Second judgment module identifies in database with the presence or absence of identical cloud speaker for judging;
Optionally, when the second judgment module judges that second generates mould there is no when identical cloud speaker mark in database Block is also used to generate the response data comprising connection failure answer code;Second sending module is also used to response data being sent to cloud Speaker.
Second generation module, for giving birth to when the second judgment module judges to identify in database there are identical cloud speaker At challenge code, connection response data are generated according to challenge code;
Second sending module gives cloud speaker for sending connection response data;
Second receiving module is also used to receive the verify data of cloud speaker transmission;
Second obtains module, is also used to obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data;
Sign test module, for carrying out sign test to the first signed data in verify data by manufacturer's certificate;
Second generation module is also used to store verify data when the success of sign test module sign test, generates auth response data;
Second sending module is also used to send auth response data and gives cloud speaker;
Second receiving module is also used to receive the request data of the acquisition configuration file of cloud speaker transmission;
Second obtains module, is also used to obtain corresponding configuration file according to the request data for obtaining configuration file;
Optionally, the request data for obtaining configuration file includes cloud speaker mark;
When second, which obtains module, is used to obtain corresponding configuration file according to the request data for obtaining configuration file, second It obtains module to be specifically used for finding the corresponding list of configuration file in the database, be looked in corresponding lists according to cloud speaker mark To corresponding configuration file.
Encrypting module, the configuration file for being obtained by the second key pair are encrypted;Wherein, the second key is by described Cloud Server is obtained according to the verify data of storage;
Optionally, encrypting module includes acquiring unit, generation unit and encryption unit;
Acquiring unit, for obtaining the verify data of storage according to the request data for obtaining configuration file;
Generation unit, for generating the second key according to verify data;
Encryption unit, the configuration file for being obtained by the second key pair are encrypted.
Preferably, the request data for obtaining configuration file includes cloud speaker mark;
Acquiring unit obtains the verify data of storage specifically for identifying according to cloud speaker.
Second sending module, the configuration file for being also used to send encryption give cloud speaker.
In the present embodiment, after the second generation module is used to generate auth response data, Cloud Server further include: parsing Module and the second computing module;
Parsing module, for parsing the verify data of storage;
Second obtains module, is also used to obtain the first data splitting in verify data;
Second computing module, for passing through preset algorithm to the random number and the mark progress of cloud speaker in the first data splitting The second key is calculated.
Optionally, the second computing module is specifically used for, and splices to random number and cloud speaker mark, obtains splicing number According to, by hash algorithm to splicing data carry out operation, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
Beneficial effects of the present invention: the present invention provides the method and system that a kind of cloud speaker updates configuration, pass through cloud sound Case sends the request for obtaining configuration file to Cloud Server, and Cloud Server is obtained according to the cloud speaker mark in request matches accordingly File is set, and configuration file is encrypted, is handed down to cloud speaker, cloud speaker passes through the configuration of the key pair encryption generated The configuration file for obtaining plaintext, and more new configuration file is decrypted in file.Cloud speaker may be implemented in the above manner to make by oneself The functions such as adopted switching on and shutting down signal language, customer experience is relatively good, is subjected to and customized degree is relatively high.
Detailed description of the invention
Fig. 1 is the method flow diagram that a kind of cloud speaker that the embodiment of the present invention one provides updates configuration;
Fig. 2 is the method flow diagram that a kind of cloud speaker provided by Embodiment 2 of the present invention updates configuration;
Fig. 3 is the system block diagram that a kind of cloud speaker that the embodiment of the present invention three provides updates configuration.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Embodiment one
A kind of method for present embodiments providing cloud speaker update configuration, this method are suitable for by Cloud Server, production work The system of tool and cloud speaker composition, as shown in Figure 1, this method specifically includes:
S1, cloud speaker receive the initialization data that the tool of production imports, and obtain the cloud speaker mark in initialization data, raw At random number, random number and cloud speaker mark are carried out that first key is calculated by preset algorithm;
In the present embodiment, cloud speaker generates random number specifically: it is random that cloud speaker calls random number generation function to generate Number;
Optionally, cloud speaker to random number and cloud speaker mark carries out that first key is calculated by preset algorithm, has Body are as follows: cloud speaker to random number and cloud speaker mark splices, obtain splicing data, by hash algorithm to splicing data into Row operation obtains the first cryptographic Hash, using the first cryptographic Hash as first key.
S2, cloud speaker identify tissue according to cloud speaker and generate connection request data, send connection request number to Cloud Server According to;
In the present embodiment, after cloud speaker sends connection request data to Cloud Server further include: cloud speaker is according to default Time judges whether to receive the data of Cloud Server return, prompts to wait time-out if being not received by.
S3, Cloud Server are identified according to connection request data acquisition cloud speaker, are judged in database with the presence or absence of identical Cloud speaker mark, then generates challenge code if it exists, generates connection response data according to challenge code and is sent to cloud speaker;
In the present embodiment, Cloud Server judges to identify in database with the presence or absence of identical cloud speaker, if it does not exist then Cloud Server generates the response data comprising connection failure answer code, and response data is sent to cloud speaker.
Challenge code, random number and cloud speaker mark are carried out group according to connection response data acquisition challenge code by S4, cloud speaker Conjunction obtains the first data splitting, obtains manufacturer's key in initialization data, is carried out according to the first data splitting of manufacturer's key pair Signature obtains the first signed data, generates verify data according to the first signed data and the first data splitting, and by verify data It is sent to Cloud Server;
S5, cloud service obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data, pass through manufacturer's certificate pair The first signed data in verify data carries out sign test, stores verify data if sign test success, generates auth response data hair Give cloud speaker;
In the present embodiment, Cloud Server generates auth response data and is sent to after cloud speaker, further includes: Cloud Server The verify data of storage is parsed, the first data splitting is obtained, by preset algorithm to the random number and cloud in the first data splitting Speaker mark carries out that the second key is calculated;
Optionally, by preset algorithm in the first data splitting random number and cloud speaker mark be calculated the Two keys, specifically: Cloud Server splices random number and cloud speaker mark, obtains splicing data, passes through hash algorithm Operation is carried out to splicing data, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
S6, cloud speaker receive the auth response data that Cloud Server is sent, and parse and obtain key agreement result;
S7, cloud speaker generate the request data for obtaining configuration file, and the request data that will acquire configuration file is sent to Cloud Server;
S8, Cloud Server obtain corresponding configuration file according to the request data for obtaining configuration file, pass through the second key The configuration file of acquisition is encrypted, and returns to encrypted configuration file to cloud speaker;
In the present embodiment, the second key is obtained by Cloud Server according to the verify data of storage;
The request data for obtaining configuration file includes cloud speaker mark;
Corresponding configuration file is obtained according to the request data for obtaining configuration file, specifically: Cloud Server is in database In find the corresponding list of configuration file, according to cloud speaker mark corresponding configuration file is found in corresponding lists.
Optionally, Cloud Server is encrypted by the configuration file that the second key pair obtains, specifically: Cloud Server root The verify data that storage is obtained according to the request data for obtaining configuration file generates the second key according to verify data, passes through second The configuration file that key pair obtains is encrypted;
Preferably, the request data for obtaining configuration file includes cloud speaker mark;Cloud Server is literary according to configuration is obtained The request data of part obtains the verify data of storage specifically: Cloud Server identifies the verifying number for obtaining storage according to cloud speaker According to.
S9, cloud speaker are decrypted the encryption configuration file received by first key, obtain clear text configuration files And update configuration.
Embodiment two
A kind of method for present embodiments providing cloud speaker update configuration, this method are suitable for by Cloud Server, production work The system of tool and cloud speaker composition, as shown in Fig. 2, this method specifically includes:
Step 101, cloud speaker receive the initialization data that the tool of production imports;
In the present embodiment, initialization data includes: manufacturer's key, device identification, device identification specifically: equipment sequence Number, device model, device version number;
For example, manufacturer's key: 3E9BAFB427351C6A180FD4CE578C950A2969D30119E11F78B98B86 EBF0EBBA47B29FC0699EF1A726C62D346DF1C73D4623C2AD1C686AE25F6908647C0EECF79A;
Equipment Serial Number: test_dev_qyy_0001;
Device model: A20;
Device version number: 10.
Step 102, cloud speaker obtain the cloud speaker mark for including in initialization data, random number are generated, by imputing in advance Method to random number and cloud speaker mark carries out that first key is calculated;
In the present embodiment, cloud speaker generates random number specifically: it is random that cloud speaker calls random number generation function to generate Number;
In the present embodiment, random number and cloud speaker mark are carried out first key is calculated by preset algorithm specific Are as follows: cloud speaker splices random number and cloud speaker mark, obtains splicing data, is carried out by hash algorithm to splicing data Operation obtains the first cryptographic Hash, using the first cryptographic Hash as first key;
Optionally, cloud speaker obtains the cloud speaker mark for including in initialization data specifically: sequence number, version number and type Number, by preset algorithm random number, cloud speaker sequence number, version number and model carry out that first key is calculated;
It carries out first key is calculated by preset algorithm random number, cloud speaker sequence number, version number and model specific Are as follows: cloud speaker splices random number, cloud speaker sequence number, version number and model, obtains splicing data, passes through hash algorithm Operation is carried out to splicing data, the first cryptographic Hash is obtained, using the first cryptographic Hash as first key;
Preferably, preset algorithm is specially sha256.
Step 103, cloud speaker identify tissue according to cloud speaker and generate connection request data, send connection to Cloud Server and ask Seek data;
In the present embodiment, after cloud speaker sends connection request data to Cloud Server further include: cloud speaker is according to default Time judges whether to receive the data of Cloud Server return, prompts to wait time-out if being not received by;
For example, preset time is 1 minute.
Step 104, Cloud Server receive connection request data, obtain cloud speaker mark;
Step 105, Cloud Server judge to identify identical mark with the presence or absence of with the cloud speaker of acquisition in database, if depositing It is then calling function to generate challenge code, connection response data is generated according to challenge code, connection response data are returned into cloud speaker, if There is no then terminate;
In the present embodiment, Cloud Server calls function to generate challenge code, specifically: Cloud Server calls random generation letter Number generates challenge code;
For example, challenge code are as follows: 560025790dc54b9fb9b2b34946e7c990;
The response data generated according to challenge code are as follows: and " result ": 0, " challenge ": " 560025790dc54b9f b9b2b34946e7c990","step":1};
In the present embodiment, on the other hand, if Cloud Server judges that there is no identify with the cloud speaker of acquisition in database Identical sequence number, further includes: Cloud Server generates the response data comprising connection failure answer code, and response data is sent to Cloud speaker;
For example, connection failure answer code are as follows: 1;
Response data comprising connection failure answer code are as follows: and " result ": 1, " step ": 1 }.
Step 106, cloud speaker identify challenge code, random number and cloud speaker according to connection response data acquisition challenge code It is combined to obtain the first data splitting, manufacturer's key in initialization data is obtained, according to the first number of combinations of manufacturer's key pair According to being signed to obtain the first signed data;
In the present embodiment, cloud speaker mark is specially sequence number, model and version, and cloud speaker is by challenge code, random number It is combined to obtain the first data with cloud speaker mark specifically: cloud speaker is by challenge code, random number, sequence number, model and version This number is combined to obtain the first data splitting, is signed to obtain the first number of signature by the first data splitting of manufacturer's key pair According to;
On the other hand, cloud speaker receives response data, resolution response data, if parsing obtains connection failure answer code, Pass through voice broadcast connection failure;
For example, the first data splitting are as follows: 560025790dc54b9fb9b2b34946e7c9905682395648539851 68325465325685test_dev_qyy_0001A2010;
First signed data are as follows: 4t0F1qsZzJV7AThAbsCviUQiMcI=.
Step 107, cloud speaker generate verify data according to the first data splitting and the first signed data, and by verify data It is sent to Cloud Server;
For example, verify data are as follows: 4t0F1qsZzJV7AThAbsCviUQiMcI=560025790dc54b9fb9b2b34 946e7c990568239564853985168325465325685test_dev_qyy_0001A2010MIICYDCCAgagAwI BAgIBATAJBgcqhkjOPQQBMIGQMQswCQYDVQQGEwJDTjESMBAGA1UECAwJR3Vhbmdkb25nMREwDwY DVQQHDAhEb25nZ3VhbjEXMBUGA1UECgwOd3d3Lmh1YXdlaS5jb20xDDAKBgNVBAsMA1ImRDERMA8 GA1UEAwwIQWRtaW4gQ0ExIDAeBgkqhkiG9w0BCQEWEW1vYmlsZUBodWF3ZWkuY29tMB4XDTE1MTA xMDA3MTcwMloXDTI1MTAwNzA3MTcwMlowgZAxCzAJBgNVBAYTAkNOMRIwEAYDVQQIDAlHdWFuZ2R vbmcxETAPBgNVBAcMCERvbmdndWFuMRcwFQYDVQQKDA53d3cuaHVhd2VpLmNvbTEMMAoGA1UECww DUiZEMREwDwYDVQQDDAhBZG1pbiBDQTEgMB4GCSqGSIb3DQEJARYRbW9iaWxlQGh1YXdlaS5jb20 wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAARvbnQ4/XneT3DqkA3dyb2lTR1YgIv3Kk7qSMx6pCk 2zOvBwC8sIEoDrRUKIxKWaL5R7avC8v1pfMpwUPcl2Ukgo1AwTjAdBgNVHQ4EFgQU+/kX9/5AZQ2 WiS6sNzfD20woo7swHwYDVR0jBBgwFoAU+/kX9/5AZQ2WiS6sNzfD20woo7swDAYDVR0TBAUwAw EB/zAJBgcqhkjOPQQBA0kAMEYCIQC31QuRGGqwp4tnpDnGB5coEfBFkZ+8hbPFIdBIrbu1WQIhAI 6tZtLiQXApHis1GNYBcIfYOjjffRdgwKuonybsLwP7e84ce743e24e4df9baf2d04cf56b02a941 b0bf0bmdndWFuMRcwFQYD3ZWkuY29tMB4XDTE1MTAxMDA3MTcwMloXDTI1MTAwNzA3M。
Step 108, Cloud Server obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data, pass through manufacturer Certificate carries out sign test to the first signed data, stores verify data if sign test success;
Step 109, Cloud Server generation include the auth response data of key agreement result, return to cloud speaker;
In the present embodiment, Cloud Server generates auth response data and is sent to after cloud speaker, further includes: Cloud Server The verify data of storage is parsed, the first data splitting is obtained, by preset algorithm to the random number and cloud in the first data splitting Speaker mark carries out that the second key is calculated;
Optionally, by preset algorithm in the first data splitting random number and cloud speaker mark be calculated the Two keys, specifically: Cloud Server splices random number and cloud speaker mark, obtains splicing data, passes through hash algorithm Operation is carried out to splicing data, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
Step 110, cloud speaker receive auth response data, parse data and obtain key agreement result;
Step 111, cloud speaker generate the request data for obtaining configuration file, and will acquire the request data hair of configuration file Give Cloud Server;
It in the present embodiment, include cloud speaker mark in the request data for the acquisition configuration file that cloud speaker generates;
Step 112, Cloud Server obtain corresponding configuration file according to the request data for obtaining configuration file;
In the present embodiment, Cloud Server obtains configuration file specifically: Cloud Server finds respective column in the database Table finds corresponding configuration file according to the cloud speaker mark in the request data for obtaining configuration file in corresponding lists.
Step 113, Cloud Server are encrypted by the configuration file that the second key pair obtains, and are returned and added to cloud speaker Configuration file after close;
Wherein, the second key is obtained by Cloud Server according to the verify data of storage;
Step 114, cloud speaker are decrypted the encryption configuration file received by first key, obtain configuring in plain text File simultaneously updates configuration.
In the present embodiment, Cloud Server is encrypted by the configuration file that the second key pair obtains specifically: cloud clothes Device be engaged according to the verify data for the request data acquisition storage for obtaining configuration file, the second key is generated according to verify data, is led to The configuration file for crossing the acquisition of the second key pair is encrypted;
Specifically, the request data for obtaining configuration file includes cloud speaker mark;
The Cloud Server obtains the verify data of storage according to the request data for obtaining configuration file specifically: the cloud Server identifies the verify data for obtaining storage according to cloud speaker;
Optionally, the second key is generated according to verify data specifically: the first data splitting is obtained according to verify data, is obtained Random number, the cloud speaker mark in the first data splitting are taken, random number, cloud speaker mark calculate according to preset algorithm To the second key;
Preferably, Cloud Server to random number, cloud speaker mark carries out that the second key tool is calculated according to preset algorithm Body are as follows: Cloud Server splices random number and cloud speaker mark, obtains splicing data, by hash algorithm to splicing data Operation is carried out, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key;
On the other hand, cloud speaker mark specifically includes: cloud speaker sequence number, version number and model;
By preset algorithm to random number, cloud speaker mark carry out that the second key is calculated specifically: cloud speaker to Machine number, cloud speaker sequence number, version number and model are spliced, obtain splicing data, by hash algorithm to splicing data into Row operation obtains the second cryptographic Hash, using the second cryptographic Hash as the second key;
Preferably, preset algorithm is specially sha256.
Embodiment three
The system that a kind of cloud speaker updates configuration, which includes cloud speaker 100 and Cloud Server 200;
Wherein, cloud speaker includes: that the first receiving module 101, first obtains module 102, the first generation module 103, first Computing module 104, the first sending module 105, composite module 106, signature blocks 107, deciphering module 108 and update module 109;
First receiving module 101, for receiving the initialization data of tool of production importing;
First obtains module 102, for obtaining the cloud speaker mark in the initialization data that the first receiving module 101 receives Know;
First generation module 103, for generating random number;
Optionally, when the first generation module 103 calls random number generation function raw for being specifically used for when generating random number At random number.
First computing module 104, for being obtained by preset algorithm to the random number and first that the first generation module 103 generates The cloud speaker mark that modulus block 102 obtains carries out that first key is calculated;
Optionally, the first computing module 104 is spliced specifically for splicing to random number and cloud speaker mark Data carry out operation to splicing data by hash algorithm, the first cryptographic Hash are obtained, using the first cryptographic Hash as first key.
First generation module 103 is also used to obtain the cloud speaker mark tissue generation connection that module 102 obtains according to first Request data;
First sending module 105, the connection request data for generating the first generation module 103 are sent to cloud service Device;
First receiving module 101 is also used to receive the connection response data of Cloud Server transmission;
First obtains module 102, is also used to the connection response data acquisition challenge received according to the first receiving module 101 Code;
Composite module 106, for being combined challenge code, random number and cloud speaker mark to obtain the first data splitting;
First obtains module 102, and the manufacturer for being also used to obtain in the initialization data that the first receiving module 101 receives is close Key;
Signature blocks 107, the first data splitting of manufacturer's key pair for being obtained according to the first acquisition module 102 are signed Name obtains the first signed data;
First generation module 103 is also used to sign according to signature blocks 107 the first obtained signed data and the first combination Data generate verify data;
First sending module 105 is also used to the verify data that the first generation module 103 generates being sent to Cloud Server;
Optionally, after connection request data are sent to Cloud Server by the first sending module 105, cloud speaker further includes One judgment module and cue module;
First judgment module, for judging whether to receive the data of Cloud Server return according to preset time;
Cue module, for the prompt waiting time-out when first judgment module judgement is not received by data.
First receiving module 101 is also used to receive the auth response data of Cloud Server transmission;
First obtains module 102, is also used to parse the auth response data that the first receiving module 101 receives, and obtains close Key negotiation result;
First generation module 103 is also used to generate the request data for obtaining configuration file;
First sending module 105, the request data hair for the acquisition configuration file for being also used to generate the first generation module 103 Give Cloud Server;
First receiving module 101 is also used to receive the encryption configuration file of Cloud Server transmission;
Deciphering module 108, the first key for being calculated by the first computing module 104 match the encryption received It sets file to be decrypted, obtains clear text configuration files;
Update module 109 updates configuration for decrypting obtained clear text configuration files according to deciphering module 108.
Wherein, Cloud Server includes: the second acquisition module 201, the second judgment module 202, the second generation module 203, Two sending modules 204, sign test module 205, the second receiving module 206 and encrypting module 207;
Second receiving module 206, for receiving the connection request data of cloud speaker transmission;
Second obtains module 201, for being identified according to connection request data acquisition cloud speaker;
Second judgment module 202 identifies in database with the presence or absence of identical cloud speaker for judging;
Optionally, when the second judgment module 202 judges that second generates there is no when identical cloud speaker mark in database Module 203 is also used to generate the response data comprising connection failure answer code;Second sending module 204 is also used to response data It is sent to cloud speaker.
Second generation module 203, for judging that there are identical cloud speaker marks in database when the second judgment module 202 When, challenge code is generated, connection response data are generated according to challenge code;
Second sending module 204 gives cloud speaker for sending connection response data;
Second receiving module 206 is also used to receive the verify data of cloud speaker transmission;
Second obtains module 201, is also used to obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data;
Sign test module 205, for carrying out sign test to the first signed data in verify data by manufacturer's certificate;
Second generation module 203 is also used to store verify data when the success of 205 sign test of sign test module, generates verifying and ring Answer data;
Second sending module 204 is also used to send auth response data and gives cloud speaker;
Second receiving module 206 is also used to receive the request data of the acquisition configuration file of cloud speaker transmission;
Second obtains module 201, is also used to obtain corresponding configuration file according to the request data for obtaining configuration file;
Optionally, the request data for obtaining configuration file includes cloud speaker mark;
When second, which obtains module 201, is used to obtain corresponding configuration file according to the request data for obtaining configuration file, Second acquisition module 201 is specifically used for finding the corresponding list of configuration file in the database, is identified according to cloud speaker in correspondence Corresponding configuration file is found in list.
Encrypting module 207, the configuration file for being obtained by the second key pair are encrypted;Wherein, the second key by Cloud Server is obtained according to the verify data of storage;
Optionally, encrypting module 207 includes acquiring unit, generation unit and encryption unit;
Acquiring unit, for obtaining the verify data of storage according to the request data for obtaining configuration file;
Generation unit, for generating the second key according to verify data;
Encryption unit, the configuration file for being obtained by the second key pair are encrypted.
Preferably, the request data for obtaining configuration file includes cloud speaker mark;
Acquiring unit obtains the verify data of storage specifically for identifying according to cloud speaker.
Second sending module 204, the configuration file for being also used to send encryption give cloud speaker.
In the present embodiment, after the second generation module 203 is used to generate auth response data, Cloud Server further include: Parsing module and the second computing module;
Parsing module, for parsing the verify data of storage;
Second obtains module 201, is also used to obtain the first data splitting in verify data;
Second computing module, for passing through preset algorithm to the random number and the mark progress of cloud speaker in the first data splitting The second key is calculated.
Optionally, the second computing module is specifically used for, and splices to random number and cloud speaker mark, obtains splicing number According to, by hash algorithm to splicing data carry out operation, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
The present invention provides the method and system that a kind of cloud speaker updates configuration, are obtained by cloud speaker to Cloud Server transmission The request of configuration file is taken, Cloud Server obtains corresponding configuration file according to the cloud speaker mark in request, and to configuration text Part is encrypted, and is handed down to cloud speaker, and acquisition is decrypted by the configuration file of the key pair encryption generated in cloud speaker The configuration file of plaintext, and more new configuration file.The function such as the customized switching on and shutting down signal language of cloud speaker are realized in the above manner Can, customer experience is relatively good, is subjected to and customized degree is relatively high.The present invention is by using Cloud Server and cloud speaker two sides Key is independently generated, encrypted transmission is carried out according to the response data that the key pair of generation returns, so as to avoid arranging key biography The problem of leakage is easy during defeated, improves the safety of arranging key, to improve what data in communication process were transmitted Safety.

Claims (20)

1. a kind of method that cloud speaker updates configuration, which is characterized in that the described method includes:
Cloud speaker receives the initialization data that the tool of production imports, and obtains the cloud speaker mark in the initialization data, generates Random number to the random number and cloud speaker mark carries out that first key is calculated by preset algorithm;
The cloud speaker identifies tissue according to the cloud speaker and generates connection request data, sends the connection to Cloud Server and asks Seek data;
The Cloud Server is identified according to the connection request data acquisition cloud speaker, is judged in database with the presence or absence of identical Cloud speaker mark, then generates challenge code if it exists, generates connection response data according to challenge code and is sent to the cloud speaker;
The cloud speaker is according to the connection response data acquisition challenge code, by the challenge code, the random number and the cloud Speaker mark is combined to obtain the first data splitting, manufacturer's key in initialization data is obtained, according to key pair institute, manufacturer It states the first data splitting to be signed to obtain the first signed data, according to first signed data and first data splitting Verify data is generated, and the verify data is sent to the Cloud Server;
The Cloud Server obtains corresponding manufacturer's certificate according to the cloud speaker mark in the verify data, passes through manufacturer's certificate Sign test is carried out to the first signed data in the verify data, the verify data is stored if sign test success, generates verifying Response data is sent to the cloud speaker;
The cloud speaker receives the auth response data that the Cloud Server is sent, and parses and obtains key agreement result;
The cloud speaker generates the request data for obtaining configuration file, and the request data for obtaining configuration file is sent to The Cloud Server;
The Cloud Server obtains corresponding configuration file according to the request data for obtaining configuration file, passes through the second key The configuration file of acquisition is encrypted, and returns to encrypted configuration file to the cloud speaker;Second key is by institute Cloud Server is stated to be obtained according to the verify data of storage;
The cloud speaker is decrypted the encryption configuration file received by the first key, obtains clear text configuration files And update configuration.
2. the method according to claim 1, wherein the generation random number specifically: cloud speaker calls random Number generating function generates random number.
3. the method according to claim 1, wherein it is described by preset algorithm to the random number and the cloud Speaker mark carry out that first key is calculated, specifically: the cloud speaker to the random number and the cloud speaker identify into Row splicing obtains splicing data, carries out operation to the splicing data by hash algorithm, obtains the first cryptographic Hash, will be described First cryptographic Hash is as first key.
4. the method according to claim 1, wherein the Cloud Server passes through the configuration that the second key pair obtains File is encrypted, specifically:
The Cloud Server obtains the verify data of storage according to the request data for obtaining configuration file, according to the verify data The second key is generated, is encrypted by the configuration file that second key pair obtains.
5. according to the method described in claim 4, it is characterized in that, the request data for obtaining configuration file includes described Cloud speaker mark;
The Cloud Server obtains the verify data of storage according to the request data for obtaining configuration file specifically: the cloud service Device identifies the verify data for obtaining storage according to the cloud speaker.
6. the method according to claim 1, wherein the request data for obtaining configuration file includes described Cloud speaker mark;
It is described that corresponding configuration file is obtained according to the request data for obtaining configuration file, specifically: the Cloud Server is in number According to the corresponding list of configuration file is found in library, corresponding configuration text is found in corresponding lists according to cloud speaker mark Part.
7. the method according to claim 1, wherein the Cloud Server, which generates auth response data, is sent to institute After stating cloud speaker, further includes: the verify data of the Cloud Server parsing storage obtains the first data splitting, by default Algorithm in first data splitting random number and cloud speaker mark carry out that the second key is calculated.
8. the method according to the description of claim 7 is characterized in that it is described by preset algorithm in first data splitting Random number and cloud speaker mark carry out that the second key is calculated, specifically: the Cloud Server is to first number of combinations Random number and cloud speaker mark in are spliced, and are obtained splicing data, are carried out by hash algorithm to the splicing data Operation obtains the second cryptographic Hash, using second cryptographic Hash as the second key.
9. the method according to claim 1, wherein the cloud speaker sends connection request data to Cloud Server Afterwards further include: the cloud speaker judges whether to receive the data of the Cloud Server return according to preset time, if not connecing It receives, prompts to wait time-out.
10. the method according to claim 1, wherein whether there is identical cloud sound in the judgement database Case mark, then the Cloud Server generates the response data comprising connection failure answer code if it does not exist, by the response data It is sent to the cloud speaker.
11. the system that a kind of cloud speaker updates configuration, which is characterized in that the system comprises cloud speaker and Cloud Servers;
The cloud speaker includes: the first receiving module, the first acquisition module, the first generation module, the first computing module, the first hair Send module, composite module, signature blocks, deciphering module and update module;
First receiving module, for receiving the initialization data of tool of production importing;
Described first obtains module, for obtaining the cloud speaker mark in the initialization data that first receiving module receives Know;
First generation module, for generating random number;
First computing module, the random number and described first for being generated by preset algorithm to first generation module The cloud speaker mark that module obtains is obtained to carry out that first key is calculated;
First generation module, the cloud speaker mark tissue for being also used to be obtained according to the first acquisition module, which generates connection, asks Seek data;
First sending module, the connection request data for generating first generation module are sent to the cloud service Device;
First receiving module is also used to receive the connection response data that the Cloud Server is sent;
Described first obtains module, is also used to the connection response data acquisition challenge received according to first receiving module Code;
The composite module, for being combined the challenge code, the random number and the cloud speaker mark to obtain first Data splitting;
Described first obtains module, and the manufacturer for being also used to obtain in the initialization data that first receiving module receives is close Key;
The signature blocks combine to obtain for the composite module according to manufacturer's key pair of the first acquisition module acquisition The first data splitting signed to obtain the first signed data;
First generation module is also used to the first signed data and the combination die signed according to the signature blocks The first data splitting that block combines generates verify data;
First sending module is also used to the verify data that first generation module generates being sent to the cloud service Device;
First receiving module is also used to receive the auth response data that the Cloud Server is sent;
Described first obtains module, is also used to parse the auth response data that first receiving module receives, and obtains key Negotiation result;
First generation module is also used to generate the request data for obtaining configuration file;
The request data of first sending module, the acquisition configuration file for being also used to generate first generation module is sent To the Cloud Server;
First receiving module is also used to receive the encrypted configuration file that the Cloud Server is sent;
The deciphering module, the first key for being calculated by the first computing module is to the encryption configuration file received It is decrypted, obtains clear text configuration files;
The update module, the clear text configuration files for being decrypted according to the deciphering module update configuration.
The Cloud Server includes: the second acquisition module, judgment module, the second generation module, the second sending module, sign test mould Block, the second receiving module and encrypting module;
Second receiving module, the connection request data sent for receiving the cloud speaker;
Described second obtains module, for being identified according to the connection request data acquisition cloud speaker;
Second judgment module identifies in database with the presence or absence of identical cloud speaker for judging;
Second generation module, for judging that there are identical cloud speaker marks in database when second judgment module When, challenge code is generated, connection response data are generated according to challenge code;
Second sending module, for sending connection response data to the cloud speaker;
Second receiving module is also used to receive the verify data that the cloud speaker is sent;
Described second obtains module, is also used to obtain corresponding manufacturer's certificate according to the cloud speaker mark in the verify data;
The sign test module, for carrying out sign test to the first signed data in the verify data by manufacturer's certificate;
Second generation module is also used to store the verify data when sign test module sign test success, generates verifying Response data;
Second sending module is also used to send auth response data to the cloud speaker;
Second receiving module is also used to receive the request data for the acquisition configuration file that the cloud speaker is sent;
Described second obtains module, is also used to obtain corresponding configuration file according to the request data for obtaining configuration file;
The encrypting module, the configuration file for being obtained by the second key pair are encrypted;Second key is by described Cloud Server is obtained according to the verify data of storage;
Second sending module is also used to send encrypted configuration file to the cloud speaker.
12. system according to claim 11, which is characterized in that when first generation module is for generating random number When, it is specifically used for that random number generation function is called to generate random number.
13. system according to claim 11, which is characterized in that first computing module, be specifically used for it is described with Machine number and cloud speaker mark are spliced, and splicing data are obtained, and carry out operation to the splicing data by hash algorithm, The first cryptographic Hash is obtained, using first cryptographic Hash as first key.
14. system according to claim 11, which is characterized in that the encrypting module includes acquiring unit, generation unit And encryption unit;
The acquiring unit, for obtaining the verify data of storage according to the request data for obtaining configuration file;
The generation unit, for generating the second key according to the verify data;
The encryption unit, the configuration file for being obtained by second key pair are encrypted.
15. system according to claim 14, which is characterized in that the request data for obtaining configuration file includes institute State cloud speaker mark;
The acquiring unit obtains the verify data of storage specifically for identifying according to the cloud speaker.
16. system according to claim 11, which is characterized in that the request data for obtaining configuration file includes institute State cloud speaker mark;
When described second, which obtains module, is used to obtain corresponding configuration file according to the request data for obtaining configuration file, The second acquisition module is specifically used for finding the corresponding list of configuration file in the database, is existed according to cloud speaker mark Corresponding configuration file is found in corresponding lists.
17. system according to claim 11, which is characterized in that when second generation module is for generating auth response After data, the Cloud Server further include: parsing module and the second computing module;
The parsing module, for parsing the verify data of storage;
Described second obtains module, is also used to obtain the first data splitting in the verify data;
Second computing module, for passing through preset algorithm to the random number and cloud speaker mark in first data splitting It carries out that the second key is calculated.
18. system according to claim 17, which is characterized in that second computing module is specifically used for, to it is described with Machine number and cloud speaker mark are spliced, and splicing data are obtained, and carry out operation to the splicing data by hash algorithm, The second cryptographic Hash is obtained, using second cryptographic Hash as the second key.
19. system according to claim 11, which is characterized in that when first sending module is by the connection request number After being sent to the Cloud Server, the cloud speaker further includes first judgment module and cue module;
The first judgment module, for judging whether to receive the data that the Cloud Server returns according to preset time;
The cue module, for the prompt waiting time-out when first judgment module judgement is not received by data.
20. system according to claim 11, which is characterized in that when second judgment module judges not deposit in database In identical cloud speaker mark, second generation module is also used to generate the response data comprising connection failure answer code; Second sending module is also used to for the response data to be sent to the cloud speaker.
CN201910569589.XA 2019-06-27 2019-06-27 Method and system for updating configuration of cloud sound box Active CN110289956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910569589.XA CN110289956B (en) 2019-06-27 2019-06-27 Method and system for updating configuration of cloud sound box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910569589.XA CN110289956B (en) 2019-06-27 2019-06-27 Method and system for updating configuration of cloud sound box

Publications (2)

Publication Number Publication Date
CN110289956A true CN110289956A (en) 2019-09-27
CN110289956B CN110289956B (en) 2021-12-28

Family

ID=68019958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910569589.XA Active CN110289956B (en) 2019-06-27 2019-06-27 Method and system for updating configuration of cloud sound box

Country Status (1)

Country Link
CN (1) CN110289956B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027955A (en) * 2019-10-24 2020-04-17 艾体威尔电子技术(北京)有限公司 Cloud horn service platform and use method thereof
CN111193787A (en) * 2019-12-24 2020-05-22 国铁吉讯科技有限公司 Synchronization method and device
CN112134966A (en) * 2020-11-26 2020-12-25 飞天诚信科技股份有限公司 Cloud sound box broadcast voice configuration method and system
WO2023103425A1 (en) * 2021-12-10 2023-06-15 青岛海尔科技有限公司 Communicative connection method, system, and apparatus, storage medium, and processor

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1957356A (en) * 2004-12-13 2007-05-02 松下电器产业株式会社 Unauthorized deice detection device, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
CN106130733A (en) * 2016-06-23 2016-11-16 北京海泰方圆科技股份有限公司 More newly configured methods, devices and systems
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
US20180096063A1 (en) * 2015-06-19 2018-04-05 Alibaba Group Holding Limited Audio file acquisition and update notification sending method, device, and system
CN108809645A (en) * 2018-07-24 2018-11-13 南方电网科学研究院有限责任公司 The method, apparatus and electrical power distribution automatization system of key agreement
CN109005028A (en) * 2018-11-02 2018-12-14 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109040149A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1957356A (en) * 2004-12-13 2007-05-02 松下电器产业株式会社 Unauthorized deice detection device, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method
US20180096063A1 (en) * 2015-06-19 2018-04-05 Alibaba Group Holding Limited Audio file acquisition and update notification sending method, device, and system
CN106130733A (en) * 2016-06-23 2016-11-16 北京海泰方圆科技股份有限公司 More newly configured methods, devices and systems
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN108809645A (en) * 2018-07-24 2018-11-13 南方电网科学研究院有限责任公司 The method, apparatus and electrical power distribution automatization system of key agreement
CN109005028A (en) * 2018-11-02 2018-12-14 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109040149A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111027955A (en) * 2019-10-24 2020-04-17 艾体威尔电子技术(北京)有限公司 Cloud horn service platform and use method thereof
CN111193787A (en) * 2019-12-24 2020-05-22 国铁吉讯科技有限公司 Synchronization method and device
CN111193787B (en) * 2019-12-24 2022-11-25 国铁吉讯科技有限公司 Synchronization method and device
CN112134966A (en) * 2020-11-26 2020-12-25 飞天诚信科技股份有限公司 Cloud sound box broadcast voice configuration method and system
WO2023103425A1 (en) * 2021-12-10 2023-06-15 青岛海尔科技有限公司 Communicative connection method, system, and apparatus, storage medium, and processor

Also Published As

Publication number Publication date
CN110289956B (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN110289956A (en) A kind of cloud speaker updates the method and system of configuration
CN105516104B (en) A kind of auth method and system of the dynamic password based on TEE
CN108092776A (en) A kind of authentication server and authentication token
CN101414909B (en) System, method and mobile communication terminal for verifying network application user identification
US8433914B1 (en) Multi-channel transaction signing
CN112953970B (en) Identity authentication method and identity authentication system
CN104038486B (en) System and method for realizing user login identification based on identification type codes
CN111131416B (en) Service providing method and device, storage medium and electronic device
CN104836784B (en) A kind of information processing method, client and server
CN111079103A (en) Identity authentication method and equipment
CN110399713A (en) A kind of method and relevant apparatus of authentification of message
CA2518032A1 (en) Methods and software program product for mutual authentication in a communications network
CN102571357B (en) Signature realization method and signature realization device
CN114465803B (en) Object authorization method, device, system and storage medium
JP2001177513A (en) Authenticating method in communication system, center equipment, and recording medium with authentication program recorded thereon
TWI786039B (en) Offline payment method, terminal equipment, backstage payment device and offline payment system
CN106712959A (en) Implementation method and system of communication safety
CN109670289A (en) A kind of method and system identifying background server legitimacy
CN108737412A (en) A kind of method and terminal for realizing request of data
CN109471723B (en) Method and system for verifying processing result of task
CN111464295A (en) Bank card making method and device
CN110223131A (en) Depressurized system and the method for booking tickets and user terminal apparatus and computer program product
CN202978979U (en) Password security keypad device and password security pad system
US11934568B2 (en) Cable security
CN112685699B (en) Software registration method and device and software registration code generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant