CN110289956A - A kind of cloud speaker updates the method and system of configuration - Google Patents
A kind of cloud speaker updates the method and system of configuration Download PDFInfo
- Publication number
- CN110289956A CN110289956A CN201910569589.XA CN201910569589A CN110289956A CN 110289956 A CN110289956 A CN 110289956A CN 201910569589 A CN201910569589 A CN 201910569589A CN 110289956 A CN110289956 A CN 110289956A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- cloud
- configuration file
- cloud speaker
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides the method and system that a kind of cloud speaker updates configuration, the request for obtaining configuration file is sent to Cloud Server by cloud speaker, Cloud Server obtains corresponding configuration file according to the cloud speaker mark in request, and configuration file is encrypted, it is handed down to cloud speaker, the configuration file for obtaining plaintext, and more new configuration file are decrypted by the configuration file of the key pair encryption generated for cloud speaker.The functions such as the customized switching on and shutting down signal language of cloud speaker may be implemented in the above manner, customer experience is relatively good, is subjected to and customized degree is relatively high.
Description
Technical field
The present invention relates to Internet technical field, in particular to a kind of cloud speaker updates the method and system of configuration.
Background technique
With the fast development of electronic information technologies, the use of cloud speaker is also become increasingly prevalent, for example, trade company is receiving
By cloud speaker voice broadcast payment result when payment, the scenes such as parking fee collective system also carry out voice broadcast using cloud speaker;So
And the cloud speaker on the market just built-in connection type of equipment and server-side when equipment is dispatched from the factory at present, long connection heartbeat
Time, switching on and shutting down voice prompting language and advertising slogan etc. can not be accomplished to broadcast for different clients with customized content
The content of the personalized customization such as different switching on and shutting down signal languages, also can not to the connection type between cloud speaker and Cloud Server into
Row change, there are user's property of can customize, compatibility, user experience are poor.
Summary of the invention
The present invention provides the method and system that a kind of cloud speaker updates configuration, solve above-mentioned technical problem.
The method that a kind of cloud speaker provided by the invention updates configuration, this method comprises:
S1, cloud speaker receive the initialization data that the tool of production imports, and obtain the cloud speaker mark in initialization data, raw
At random number, random number and cloud speaker mark are carried out that first key is calculated by preset algorithm;
In the present embodiment, cloud speaker generates random number specifically: it is random that cloud speaker calls random number generation function to generate
Number;
Optionally, cloud speaker to random number and cloud speaker mark carries out that first key is calculated by preset algorithm, has
Body are as follows: cloud speaker to random number and cloud speaker mark splices, obtain splicing data, by hash algorithm to splicing data into
Row operation obtains the first cryptographic Hash, using the first cryptographic Hash as first key.
S2, cloud speaker identify tissue according to cloud speaker and generate connection request data, send connection request number to Cloud Server
According to;
In the present embodiment, after cloud speaker sends connection request data to Cloud Server further include: cloud speaker is according to default
Time judges whether to receive the data of Cloud Server return, prompts to wait time-out if being not received by.
S3, Cloud Server are identified according to connection request data acquisition cloud speaker, are judged in database with the presence or absence of identical
Cloud speaker mark, then generates challenge code if it exists, generates connection response data according to challenge code and is sent to cloud speaker;
In the present embodiment, Cloud Server judges to identify in database with the presence or absence of identical cloud speaker, if it does not exist then
Cloud Server generates the response data comprising connection failure answer code, and response data is sent to cloud speaker.
Challenge code, random number and cloud speaker mark are carried out group according to connection response data acquisition challenge code by S4, cloud speaker
Conjunction obtains the first data splitting, obtains manufacturer's key in initialization data, is carried out according to the first data splitting of manufacturer's key pair
Signature obtains the first signed data, generates verify data according to the first signed data and the first data splitting, and by verify data
It is sent to Cloud Server;
S5, cloud service obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data, pass through manufacturer's certificate pair
The first signed data in verify data carries out sign test, stores verify data if sign test success, generates auth response data hair
Give cloud speaker;
In the present embodiment, Cloud Server generates auth response data and is sent to after cloud speaker, further includes: Cloud Server
The verify data of storage is parsed, the first data splitting is obtained, by preset algorithm to the random number and cloud in the first data splitting
Speaker mark carries out that the second key is calculated;
Optionally, by preset algorithm in the first data splitting random number and cloud speaker mark be calculated the
Two keys, specifically: Cloud Server splices random number and cloud speaker mark, obtains splicing data, passes through hash algorithm
Operation is carried out to splicing data, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
S6, cloud speaker receive the auth response data that Cloud Server is sent, and parse and obtain key agreement result;
S7, cloud speaker generate the request data for obtaining configuration file, and the request data that will acquire configuration file is sent to
Cloud Server;
S8, Cloud Server obtain corresponding configuration file according to the request data for obtaining configuration file, pass through the second key
The configuration file of acquisition is encrypted, and returns to encrypted configuration file to cloud speaker;Second key is by the cloud
Server is obtained according to the verify data of storage;
In the present embodiment, the request data for obtaining configuration file includes cloud speaker mark;
Corresponding configuration file is obtained according to the request data for obtaining configuration file, specifically: Cloud Server is in database
In find the corresponding list of configuration file, according to cloud speaker mark corresponding configuration file is found in corresponding lists.
Optionally, Cloud Server is encrypted by the configuration file that the second key pair obtains, specifically: Cloud Server root
The verify data that storage is obtained according to the request data for obtaining configuration file generates the second key according to verify data, passes through second
The configuration file that key pair obtains is encrypted;
Preferably, the request data for obtaining configuration file includes cloud speaker mark;Cloud Server is literary according to configuration is obtained
The request data of part obtains the verify data of storage specifically: Cloud Server identifies the verifying number for obtaining storage according to cloud speaker
According to.
S9, cloud speaker are decrypted the encryption configuration file received by first key, obtain clear text configuration files
And update configuration.
The present invention provides the systems that a kind of cloud speaker updates configuration, which includes: cloud speaker and Cloud Server;
Wherein, cloud speaker include: the first receiving module, first obtain module, the first generation module, the first computing module,
First sending module, composite module, signature blocks, deciphering module and update module;
First receiving module, for receiving the initialization data of tool of production importing;
First obtains module, for obtaining the mark of the cloud speaker in the initialization data that the first receiving module receives;
First generation module, for generating random number;
Optionally, when the first generation module calls random number generation function to generate for being specifically used for when generating random number
Random number.
First computing module, for obtaining module to the random number and first that the first generation module generates by preset algorithm
The cloud speaker mark of acquisition carries out that first key is calculated;
Optionally, the first computing module obtains splicing number specifically for splicing to random number and cloud speaker mark
According to, by hash algorithm to splicing data carry out operation, the first cryptographic Hash is obtained, using the first cryptographic Hash as first key.
First generation module is also used to obtain the cloud speaker mark tissue generation connection request number that module obtains according to first
According to;
First sending module, the connection request data for generating the first generation module are sent to Cloud Server;
First receiving module is also used to receive the connection response data of Cloud Server transmission;
First obtains module, the connection response data acquisition challenge code for being also used to receive according to the first receiving module;
Composite module, for being combined challenge code, random number and cloud speaker mark to obtain the first data splitting;
First obtains module, is also used to obtain manufacturer's key in the initialization data that the first receiving module receives;
Signature blocks, the first data splitting of manufacturer's key pair for being obtained according to the first acquisition module are signed to obtain
First signed data;
First generation module, the first signed data for being also used to be signed according to signature blocks and the first data splitting are raw
At verify data;
First sending module is also used to the verify data that the first generation module generates being sent to Cloud Server;
Optionally, after connection request data are sent to Cloud Server by the first sending module, cloud speaker further includes first
Judgment module and cue module;
First judgment module, for judging whether to receive the data of Cloud Server return according to preset time;
Cue module, for the prompt waiting time-out when first judgment module judgement is not received by data.
First receiving module is also used to receive the auth response data of Cloud Server transmission;
First obtains module, is also used to parse the auth response data that the first receiving module receives, and obtains key agreement
As a result;
First generation module is also used to generate the request data for obtaining configuration file;
First sending module is also used to the request data for the acquisition configuration file that the first generation module generates being sent to cloud
Server;
First receiving module is also used to receive the encryption configuration file of Cloud Server transmission;
Deciphering module, the first key for being calculated by the first computing module is to the encryption configuration file received
It is decrypted, obtains clear text configuration files;
Update module, the clear text configuration files for being decrypted according to deciphering module update configuration.
Wherein, Cloud Server includes: the second acquisition module, the second judgment module, the second generation module, the second transmission mould
Block, sign test module, the second receiving module and encrypting module;
Second receiving module, for receiving the connection request data of cloud speaker transmission;
Second obtains module, for being identified according to connection request data acquisition cloud speaker;
Second judgment module identifies in database with the presence or absence of identical cloud speaker for judging;
Optionally, when the second judgment module judges that second generates mould there is no when identical cloud speaker mark in database
Block is also used to generate the response data comprising connection failure answer code;Second sending module is also used to response data being sent to cloud
Speaker.
Second generation module, for giving birth to when the second judgment module judges to identify in database there are identical cloud speaker
At challenge code, connection response data are generated according to challenge code;
Second sending module gives cloud speaker for sending connection response data;
Second receiving module is also used to receive the verify data of cloud speaker transmission;
Second obtains module, is also used to obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data;
Sign test module, for carrying out sign test to the first signed data in verify data by manufacturer's certificate;
Second generation module is also used to store verify data when the success of sign test module sign test, generates auth response data;
Second sending module is also used to send auth response data and gives cloud speaker;
Second receiving module is also used to receive the request data of the acquisition configuration file of cloud speaker transmission;
Second obtains module, is also used to obtain corresponding configuration file according to the request data for obtaining configuration file;
Optionally, the request data for obtaining configuration file includes cloud speaker mark;
When second, which obtains module, is used to obtain corresponding configuration file according to the request data for obtaining configuration file, second
It obtains module to be specifically used for finding the corresponding list of configuration file in the database, be looked in corresponding lists according to cloud speaker mark
To corresponding configuration file.
Encrypting module, the configuration file for being obtained by the second key pair are encrypted;Wherein, the second key is by described
Cloud Server is obtained according to the verify data of storage;
Optionally, encrypting module includes acquiring unit, generation unit and encryption unit;
Acquiring unit, for obtaining the verify data of storage according to the request data for obtaining configuration file;
Generation unit, for generating the second key according to verify data;
Encryption unit, the configuration file for being obtained by the second key pair are encrypted.
Preferably, the request data for obtaining configuration file includes cloud speaker mark;
Acquiring unit obtains the verify data of storage specifically for identifying according to cloud speaker.
Second sending module, the configuration file for being also used to send encryption give cloud speaker.
In the present embodiment, after the second generation module is used to generate auth response data, Cloud Server further include: parsing
Module and the second computing module;
Parsing module, for parsing the verify data of storage;
Second obtains module, is also used to obtain the first data splitting in verify data;
Second computing module, for passing through preset algorithm to the random number and the mark progress of cloud speaker in the first data splitting
The second key is calculated.
Optionally, the second computing module is specifically used for, and splices to random number and cloud speaker mark, obtains splicing number
According to, by hash algorithm to splicing data carry out operation, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
Beneficial effects of the present invention: the present invention provides the method and system that a kind of cloud speaker updates configuration, pass through cloud sound
Case sends the request for obtaining configuration file to Cloud Server, and Cloud Server is obtained according to the cloud speaker mark in request matches accordingly
File is set, and configuration file is encrypted, is handed down to cloud speaker, cloud speaker passes through the configuration of the key pair encryption generated
The configuration file for obtaining plaintext, and more new configuration file is decrypted in file.Cloud speaker may be implemented in the above manner to make by oneself
The functions such as adopted switching on and shutting down signal language, customer experience is relatively good, is subjected to and customized degree is relatively high.
Detailed description of the invention
Fig. 1 is the method flow diagram that a kind of cloud speaker that the embodiment of the present invention one provides updates configuration;
Fig. 2 is the method flow diagram that a kind of cloud speaker provided by Embodiment 2 of the present invention updates configuration;
Fig. 3 is the system block diagram that a kind of cloud speaker that the embodiment of the present invention three provides updates configuration.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Embodiment one
A kind of method for present embodiments providing cloud speaker update configuration, this method are suitable for by Cloud Server, production work
The system of tool and cloud speaker composition, as shown in Figure 1, this method specifically includes:
S1, cloud speaker receive the initialization data that the tool of production imports, and obtain the cloud speaker mark in initialization data, raw
At random number, random number and cloud speaker mark are carried out that first key is calculated by preset algorithm;
In the present embodiment, cloud speaker generates random number specifically: it is random that cloud speaker calls random number generation function to generate
Number;
Optionally, cloud speaker to random number and cloud speaker mark carries out that first key is calculated by preset algorithm, has
Body are as follows: cloud speaker to random number and cloud speaker mark splices, obtain splicing data, by hash algorithm to splicing data into
Row operation obtains the first cryptographic Hash, using the first cryptographic Hash as first key.
S2, cloud speaker identify tissue according to cloud speaker and generate connection request data, send connection request number to Cloud Server
According to;
In the present embodiment, after cloud speaker sends connection request data to Cloud Server further include: cloud speaker is according to default
Time judges whether to receive the data of Cloud Server return, prompts to wait time-out if being not received by.
S3, Cloud Server are identified according to connection request data acquisition cloud speaker, are judged in database with the presence or absence of identical
Cloud speaker mark, then generates challenge code if it exists, generates connection response data according to challenge code and is sent to cloud speaker;
In the present embodiment, Cloud Server judges to identify in database with the presence or absence of identical cloud speaker, if it does not exist then
Cloud Server generates the response data comprising connection failure answer code, and response data is sent to cloud speaker.
Challenge code, random number and cloud speaker mark are carried out group according to connection response data acquisition challenge code by S4, cloud speaker
Conjunction obtains the first data splitting, obtains manufacturer's key in initialization data, is carried out according to the first data splitting of manufacturer's key pair
Signature obtains the first signed data, generates verify data according to the first signed data and the first data splitting, and by verify data
It is sent to Cloud Server;
S5, cloud service obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data, pass through manufacturer's certificate pair
The first signed data in verify data carries out sign test, stores verify data if sign test success, generates auth response data hair
Give cloud speaker;
In the present embodiment, Cloud Server generates auth response data and is sent to after cloud speaker, further includes: Cloud Server
The verify data of storage is parsed, the first data splitting is obtained, by preset algorithm to the random number and cloud in the first data splitting
Speaker mark carries out that the second key is calculated;
Optionally, by preset algorithm in the first data splitting random number and cloud speaker mark be calculated the
Two keys, specifically: Cloud Server splices random number and cloud speaker mark, obtains splicing data, passes through hash algorithm
Operation is carried out to splicing data, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
S6, cloud speaker receive the auth response data that Cloud Server is sent, and parse and obtain key agreement result;
S7, cloud speaker generate the request data for obtaining configuration file, and the request data that will acquire configuration file is sent to
Cloud Server;
S8, Cloud Server obtain corresponding configuration file according to the request data for obtaining configuration file, pass through the second key
The configuration file of acquisition is encrypted, and returns to encrypted configuration file to cloud speaker;
In the present embodiment, the second key is obtained by Cloud Server according to the verify data of storage;
The request data for obtaining configuration file includes cloud speaker mark;
Corresponding configuration file is obtained according to the request data for obtaining configuration file, specifically: Cloud Server is in database
In find the corresponding list of configuration file, according to cloud speaker mark corresponding configuration file is found in corresponding lists.
Optionally, Cloud Server is encrypted by the configuration file that the second key pair obtains, specifically: Cloud Server root
The verify data that storage is obtained according to the request data for obtaining configuration file generates the second key according to verify data, passes through second
The configuration file that key pair obtains is encrypted;
Preferably, the request data for obtaining configuration file includes cloud speaker mark;Cloud Server is literary according to configuration is obtained
The request data of part obtains the verify data of storage specifically: Cloud Server identifies the verifying number for obtaining storage according to cloud speaker
According to.
S9, cloud speaker are decrypted the encryption configuration file received by first key, obtain clear text configuration files
And update configuration.
Embodiment two
A kind of method for present embodiments providing cloud speaker update configuration, this method are suitable for by Cloud Server, production work
The system of tool and cloud speaker composition, as shown in Fig. 2, this method specifically includes:
Step 101, cloud speaker receive the initialization data that the tool of production imports;
In the present embodiment, initialization data includes: manufacturer's key, device identification, device identification specifically: equipment sequence
Number, device model, device version number;
For example, manufacturer's key: 3E9BAFB427351C6A180FD4CE578C950A2969D30119E11F78B98B86
EBF0EBBA47B29FC0699EF1A726C62D346DF1C73D4623C2AD1C686AE25F6908647C0EECF79A;
Equipment Serial Number: test_dev_qyy_0001;
Device model: A20;
Device version number: 10.
Step 102, cloud speaker obtain the cloud speaker mark for including in initialization data, random number are generated, by imputing in advance
Method to random number and cloud speaker mark carries out that first key is calculated;
In the present embodiment, cloud speaker generates random number specifically: it is random that cloud speaker calls random number generation function to generate
Number;
In the present embodiment, random number and cloud speaker mark are carried out first key is calculated by preset algorithm specific
Are as follows: cloud speaker splices random number and cloud speaker mark, obtains splicing data, is carried out by hash algorithm to splicing data
Operation obtains the first cryptographic Hash, using the first cryptographic Hash as first key;
Optionally, cloud speaker obtains the cloud speaker mark for including in initialization data specifically: sequence number, version number and type
Number, by preset algorithm random number, cloud speaker sequence number, version number and model carry out that first key is calculated;
It carries out first key is calculated by preset algorithm random number, cloud speaker sequence number, version number and model specific
Are as follows: cloud speaker splices random number, cloud speaker sequence number, version number and model, obtains splicing data, passes through hash algorithm
Operation is carried out to splicing data, the first cryptographic Hash is obtained, using the first cryptographic Hash as first key;
Preferably, preset algorithm is specially sha256.
Step 103, cloud speaker identify tissue according to cloud speaker and generate connection request data, send connection to Cloud Server and ask
Seek data;
In the present embodiment, after cloud speaker sends connection request data to Cloud Server further include: cloud speaker is according to default
Time judges whether to receive the data of Cloud Server return, prompts to wait time-out if being not received by;
For example, preset time is 1 minute.
Step 104, Cloud Server receive connection request data, obtain cloud speaker mark;
Step 105, Cloud Server judge to identify identical mark with the presence or absence of with the cloud speaker of acquisition in database, if depositing
It is then calling function to generate challenge code, connection response data is generated according to challenge code, connection response data are returned into cloud speaker, if
There is no then terminate;
In the present embodiment, Cloud Server calls function to generate challenge code, specifically: Cloud Server calls random generation letter
Number generates challenge code;
For example, challenge code are as follows: 560025790dc54b9fb9b2b34946e7c990;
The response data generated according to challenge code are as follows: and " result ": 0, " challenge ": " 560025790dc54b9f
b9b2b34946e7c990","step":1};
In the present embodiment, on the other hand, if Cloud Server judges that there is no identify with the cloud speaker of acquisition in database
Identical sequence number, further includes: Cloud Server generates the response data comprising connection failure answer code, and response data is sent to
Cloud speaker;
For example, connection failure answer code are as follows: 1;
Response data comprising connection failure answer code are as follows: and " result ": 1, " step ": 1 }.
Step 106, cloud speaker identify challenge code, random number and cloud speaker according to connection response data acquisition challenge code
It is combined to obtain the first data splitting, manufacturer's key in initialization data is obtained, according to the first number of combinations of manufacturer's key pair
According to being signed to obtain the first signed data;
In the present embodiment, cloud speaker mark is specially sequence number, model and version, and cloud speaker is by challenge code, random number
It is combined to obtain the first data with cloud speaker mark specifically: cloud speaker is by challenge code, random number, sequence number, model and version
This number is combined to obtain the first data splitting, is signed to obtain the first number of signature by the first data splitting of manufacturer's key pair
According to;
On the other hand, cloud speaker receives response data, resolution response data, if parsing obtains connection failure answer code,
Pass through voice broadcast connection failure;
For example, the first data splitting are as follows: 560025790dc54b9fb9b2b34946e7c9905682395648539851
68325465325685test_dev_qyy_0001A2010;
First signed data are as follows: 4t0F1qsZzJV7AThAbsCviUQiMcI=.
Step 107, cloud speaker generate verify data according to the first data splitting and the first signed data, and by verify data
It is sent to Cloud Server;
For example, verify data are as follows: 4t0F1qsZzJV7AThAbsCviUQiMcI=560025790dc54b9fb9b2b34
946e7c990568239564853985168325465325685test_dev_qyy_0001A2010MIICYDCCAgagAwI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。
Step 108, Cloud Server obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data, pass through manufacturer
Certificate carries out sign test to the first signed data, stores verify data if sign test success;
Step 109, Cloud Server generation include the auth response data of key agreement result, return to cloud speaker;
In the present embodiment, Cloud Server generates auth response data and is sent to after cloud speaker, further includes: Cloud Server
The verify data of storage is parsed, the first data splitting is obtained, by preset algorithm to the random number and cloud in the first data splitting
Speaker mark carries out that the second key is calculated;
Optionally, by preset algorithm in the first data splitting random number and cloud speaker mark be calculated the
Two keys, specifically: Cloud Server splices random number and cloud speaker mark, obtains splicing data, passes through hash algorithm
Operation is carried out to splicing data, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
Step 110, cloud speaker receive auth response data, parse data and obtain key agreement result;
Step 111, cloud speaker generate the request data for obtaining configuration file, and will acquire the request data hair of configuration file
Give Cloud Server;
It in the present embodiment, include cloud speaker mark in the request data for the acquisition configuration file that cloud speaker generates;
Step 112, Cloud Server obtain corresponding configuration file according to the request data for obtaining configuration file;
In the present embodiment, Cloud Server obtains configuration file specifically: Cloud Server finds respective column in the database
Table finds corresponding configuration file according to the cloud speaker mark in the request data for obtaining configuration file in corresponding lists.
Step 113, Cloud Server are encrypted by the configuration file that the second key pair obtains, and are returned and added to cloud speaker
Configuration file after close;
Wherein, the second key is obtained by Cloud Server according to the verify data of storage;
Step 114, cloud speaker are decrypted the encryption configuration file received by first key, obtain configuring in plain text
File simultaneously updates configuration.
In the present embodiment, Cloud Server is encrypted by the configuration file that the second key pair obtains specifically: cloud clothes
Device be engaged according to the verify data for the request data acquisition storage for obtaining configuration file, the second key is generated according to verify data, is led to
The configuration file for crossing the acquisition of the second key pair is encrypted;
Specifically, the request data for obtaining configuration file includes cloud speaker mark;
The Cloud Server obtains the verify data of storage according to the request data for obtaining configuration file specifically: the cloud
Server identifies the verify data for obtaining storage according to cloud speaker;
Optionally, the second key is generated according to verify data specifically: the first data splitting is obtained according to verify data, is obtained
Random number, the cloud speaker mark in the first data splitting are taken, random number, cloud speaker mark calculate according to preset algorithm
To the second key;
Preferably, Cloud Server to random number, cloud speaker mark carries out that the second key tool is calculated according to preset algorithm
Body are as follows: Cloud Server splices random number and cloud speaker mark, obtains splicing data, by hash algorithm to splicing data
Operation is carried out, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key;
On the other hand, cloud speaker mark specifically includes: cloud speaker sequence number, version number and model;
By preset algorithm to random number, cloud speaker mark carry out that the second key is calculated specifically: cloud speaker to
Machine number, cloud speaker sequence number, version number and model are spliced, obtain splicing data, by hash algorithm to splicing data into
Row operation obtains the second cryptographic Hash, using the second cryptographic Hash as the second key;
Preferably, preset algorithm is specially sha256.
Embodiment three
The system that a kind of cloud speaker updates configuration, which includes cloud speaker 100 and Cloud Server 200;
Wherein, cloud speaker includes: that the first receiving module 101, first obtains module 102, the first generation module 103, first
Computing module 104, the first sending module 105, composite module 106, signature blocks 107, deciphering module 108 and update module 109;
First receiving module 101, for receiving the initialization data of tool of production importing;
First obtains module 102, for obtaining the cloud speaker mark in the initialization data that the first receiving module 101 receives
Know;
First generation module 103, for generating random number;
Optionally, when the first generation module 103 calls random number generation function raw for being specifically used for when generating random number
At random number.
First computing module 104, for being obtained by preset algorithm to the random number and first that the first generation module 103 generates
The cloud speaker mark that modulus block 102 obtains carries out that first key is calculated;
Optionally, the first computing module 104 is spliced specifically for splicing to random number and cloud speaker mark
Data carry out operation to splicing data by hash algorithm, the first cryptographic Hash are obtained, using the first cryptographic Hash as first key.
First generation module 103 is also used to obtain the cloud speaker mark tissue generation connection that module 102 obtains according to first
Request data;
First sending module 105, the connection request data for generating the first generation module 103 are sent to cloud service
Device;
First receiving module 101 is also used to receive the connection response data of Cloud Server transmission;
First obtains module 102, is also used to the connection response data acquisition challenge received according to the first receiving module 101
Code;
Composite module 106, for being combined challenge code, random number and cloud speaker mark to obtain the first data splitting;
First obtains module 102, and the manufacturer for being also used to obtain in the initialization data that the first receiving module 101 receives is close
Key;
Signature blocks 107, the first data splitting of manufacturer's key pair for being obtained according to the first acquisition module 102 are signed
Name obtains the first signed data;
First generation module 103 is also used to sign according to signature blocks 107 the first obtained signed data and the first combination
Data generate verify data;
First sending module 105 is also used to the verify data that the first generation module 103 generates being sent to Cloud Server;
Optionally, after connection request data are sent to Cloud Server by the first sending module 105, cloud speaker further includes
One judgment module and cue module;
First judgment module, for judging whether to receive the data of Cloud Server return according to preset time;
Cue module, for the prompt waiting time-out when first judgment module judgement is not received by data.
First receiving module 101 is also used to receive the auth response data of Cloud Server transmission;
First obtains module 102, is also used to parse the auth response data that the first receiving module 101 receives, and obtains close
Key negotiation result;
First generation module 103 is also used to generate the request data for obtaining configuration file;
First sending module 105, the request data hair for the acquisition configuration file for being also used to generate the first generation module 103
Give Cloud Server;
First receiving module 101 is also used to receive the encryption configuration file of Cloud Server transmission;
Deciphering module 108, the first key for being calculated by the first computing module 104 match the encryption received
It sets file to be decrypted, obtains clear text configuration files;
Update module 109 updates configuration for decrypting obtained clear text configuration files according to deciphering module 108.
Wherein, Cloud Server includes: the second acquisition module 201, the second judgment module 202, the second generation module 203,
Two sending modules 204, sign test module 205, the second receiving module 206 and encrypting module 207;
Second receiving module 206, for receiving the connection request data of cloud speaker transmission;
Second obtains module 201, for being identified according to connection request data acquisition cloud speaker;
Second judgment module 202 identifies in database with the presence or absence of identical cloud speaker for judging;
Optionally, when the second judgment module 202 judges that second generates there is no when identical cloud speaker mark in database
Module 203 is also used to generate the response data comprising connection failure answer code;Second sending module 204 is also used to response data
It is sent to cloud speaker.
Second generation module 203, for judging that there are identical cloud speaker marks in database when the second judgment module 202
When, challenge code is generated, connection response data are generated according to challenge code;
Second sending module 204 gives cloud speaker for sending connection response data;
Second receiving module 206 is also used to receive the verify data of cloud speaker transmission;
Second obtains module 201, is also used to obtain corresponding manufacturer's certificate according to the cloud speaker mark in verify data;
Sign test module 205, for carrying out sign test to the first signed data in verify data by manufacturer's certificate;
Second generation module 203 is also used to store verify data when the success of 205 sign test of sign test module, generates verifying and ring
Answer data;
Second sending module 204 is also used to send auth response data and gives cloud speaker;
Second receiving module 206 is also used to receive the request data of the acquisition configuration file of cloud speaker transmission;
Second obtains module 201, is also used to obtain corresponding configuration file according to the request data for obtaining configuration file;
Optionally, the request data for obtaining configuration file includes cloud speaker mark;
When second, which obtains module 201, is used to obtain corresponding configuration file according to the request data for obtaining configuration file,
Second acquisition module 201 is specifically used for finding the corresponding list of configuration file in the database, is identified according to cloud speaker in correspondence
Corresponding configuration file is found in list.
Encrypting module 207, the configuration file for being obtained by the second key pair are encrypted;Wherein, the second key by
Cloud Server is obtained according to the verify data of storage;
Optionally, encrypting module 207 includes acquiring unit, generation unit and encryption unit;
Acquiring unit, for obtaining the verify data of storage according to the request data for obtaining configuration file;
Generation unit, for generating the second key according to verify data;
Encryption unit, the configuration file for being obtained by the second key pair are encrypted.
Preferably, the request data for obtaining configuration file includes cloud speaker mark;
Acquiring unit obtains the verify data of storage specifically for identifying according to cloud speaker.
Second sending module 204, the configuration file for being also used to send encryption give cloud speaker.
In the present embodiment, after the second generation module 203 is used to generate auth response data, Cloud Server further include:
Parsing module and the second computing module;
Parsing module, for parsing the verify data of storage;
Second obtains module 201, is also used to obtain the first data splitting in verify data;
Second computing module, for passing through preset algorithm to the random number and the mark progress of cloud speaker in the first data splitting
The second key is calculated.
Optionally, the second computing module is specifically used for, and splices to random number and cloud speaker mark, obtains splicing number
According to, by hash algorithm to splicing data carry out operation, the second cryptographic Hash is obtained, using the second cryptographic Hash as the second key.
The present invention provides the method and system that a kind of cloud speaker updates configuration, are obtained by cloud speaker to Cloud Server transmission
The request of configuration file is taken, Cloud Server obtains corresponding configuration file according to the cloud speaker mark in request, and to configuration text
Part is encrypted, and is handed down to cloud speaker, and acquisition is decrypted by the configuration file of the key pair encryption generated in cloud speaker
The configuration file of plaintext, and more new configuration file.The function such as the customized switching on and shutting down signal language of cloud speaker are realized in the above manner
Can, customer experience is relatively good, is subjected to and customized degree is relatively high.The present invention is by using Cloud Server and cloud speaker two sides
Key is independently generated, encrypted transmission is carried out according to the response data that the key pair of generation returns, so as to avoid arranging key biography
The problem of leakage is easy during defeated, improves the safety of arranging key, to improve what data in communication process were transmitted
Safety.
Claims (20)
1. a kind of method that cloud speaker updates configuration, which is characterized in that the described method includes:
Cloud speaker receives the initialization data that the tool of production imports, and obtains the cloud speaker mark in the initialization data, generates
Random number to the random number and cloud speaker mark carries out that first key is calculated by preset algorithm;
The cloud speaker identifies tissue according to the cloud speaker and generates connection request data, sends the connection to Cloud Server and asks
Seek data;
The Cloud Server is identified according to the connection request data acquisition cloud speaker, is judged in database with the presence or absence of identical
Cloud speaker mark, then generates challenge code if it exists, generates connection response data according to challenge code and is sent to the cloud speaker;
The cloud speaker is according to the connection response data acquisition challenge code, by the challenge code, the random number and the cloud
Speaker mark is combined to obtain the first data splitting, manufacturer's key in initialization data is obtained, according to key pair institute, manufacturer
It states the first data splitting to be signed to obtain the first signed data, according to first signed data and first data splitting
Verify data is generated, and the verify data is sent to the Cloud Server;
The Cloud Server obtains corresponding manufacturer's certificate according to the cloud speaker mark in the verify data, passes through manufacturer's certificate
Sign test is carried out to the first signed data in the verify data, the verify data is stored if sign test success, generates verifying
Response data is sent to the cloud speaker;
The cloud speaker receives the auth response data that the Cloud Server is sent, and parses and obtains key agreement result;
The cloud speaker generates the request data for obtaining configuration file, and the request data for obtaining configuration file is sent to
The Cloud Server;
The Cloud Server obtains corresponding configuration file according to the request data for obtaining configuration file, passes through the second key
The configuration file of acquisition is encrypted, and returns to encrypted configuration file to the cloud speaker;Second key is by institute
Cloud Server is stated to be obtained according to the verify data of storage;
The cloud speaker is decrypted the encryption configuration file received by the first key, obtains clear text configuration files
And update configuration.
2. the method according to claim 1, wherein the generation random number specifically: cloud speaker calls random
Number generating function generates random number.
3. the method according to claim 1, wherein it is described by preset algorithm to the random number and the cloud
Speaker mark carry out that first key is calculated, specifically: the cloud speaker to the random number and the cloud speaker identify into
Row splicing obtains splicing data, carries out operation to the splicing data by hash algorithm, obtains the first cryptographic Hash, will be described
First cryptographic Hash is as first key.
4. the method according to claim 1, wherein the Cloud Server passes through the configuration that the second key pair obtains
File is encrypted, specifically:
The Cloud Server obtains the verify data of storage according to the request data for obtaining configuration file, according to the verify data
The second key is generated, is encrypted by the configuration file that second key pair obtains.
5. according to the method described in claim 4, it is characterized in that, the request data for obtaining configuration file includes described
Cloud speaker mark;
The Cloud Server obtains the verify data of storage according to the request data for obtaining configuration file specifically: the cloud service
Device identifies the verify data for obtaining storage according to the cloud speaker.
6. the method according to claim 1, wherein the request data for obtaining configuration file includes described
Cloud speaker mark;
It is described that corresponding configuration file is obtained according to the request data for obtaining configuration file, specifically: the Cloud Server is in number
According to the corresponding list of configuration file is found in library, corresponding configuration text is found in corresponding lists according to cloud speaker mark
Part.
7. the method according to claim 1, wherein the Cloud Server, which generates auth response data, is sent to institute
After stating cloud speaker, further includes: the verify data of the Cloud Server parsing storage obtains the first data splitting, by default
Algorithm in first data splitting random number and cloud speaker mark carry out that the second key is calculated.
8. the method according to the description of claim 7 is characterized in that it is described by preset algorithm in first data splitting
Random number and cloud speaker mark carry out that the second key is calculated, specifically: the Cloud Server is to first number of combinations
Random number and cloud speaker mark in are spliced, and are obtained splicing data, are carried out by hash algorithm to the splicing data
Operation obtains the second cryptographic Hash, using second cryptographic Hash as the second key.
9. the method according to claim 1, wherein the cloud speaker sends connection request data to Cloud Server
Afterwards further include: the cloud speaker judges whether to receive the data of the Cloud Server return according to preset time, if not connecing
It receives, prompts to wait time-out.
10. the method according to claim 1, wherein whether there is identical cloud sound in the judgement database
Case mark, then the Cloud Server generates the response data comprising connection failure answer code if it does not exist, by the response data
It is sent to the cloud speaker.
11. the system that a kind of cloud speaker updates configuration, which is characterized in that the system comprises cloud speaker and Cloud Servers;
The cloud speaker includes: the first receiving module, the first acquisition module, the first generation module, the first computing module, the first hair
Send module, composite module, signature blocks, deciphering module and update module;
First receiving module, for receiving the initialization data of tool of production importing;
Described first obtains module, for obtaining the cloud speaker mark in the initialization data that first receiving module receives
Know;
First generation module, for generating random number;
First computing module, the random number and described first for being generated by preset algorithm to first generation module
The cloud speaker mark that module obtains is obtained to carry out that first key is calculated;
First generation module, the cloud speaker mark tissue for being also used to be obtained according to the first acquisition module, which generates connection, asks
Seek data;
First sending module, the connection request data for generating first generation module are sent to the cloud service
Device;
First receiving module is also used to receive the connection response data that the Cloud Server is sent;
Described first obtains module, is also used to the connection response data acquisition challenge received according to first receiving module
Code;
The composite module, for being combined the challenge code, the random number and the cloud speaker mark to obtain first
Data splitting;
Described first obtains module, and the manufacturer for being also used to obtain in the initialization data that first receiving module receives is close
Key;
The signature blocks combine to obtain for the composite module according to manufacturer's key pair of the first acquisition module acquisition
The first data splitting signed to obtain the first signed data;
First generation module is also used to the first signed data and the combination die signed according to the signature blocks
The first data splitting that block combines generates verify data;
First sending module is also used to the verify data that first generation module generates being sent to the cloud service
Device;
First receiving module is also used to receive the auth response data that the Cloud Server is sent;
Described first obtains module, is also used to parse the auth response data that first receiving module receives, and obtains key
Negotiation result;
First generation module is also used to generate the request data for obtaining configuration file;
The request data of first sending module, the acquisition configuration file for being also used to generate first generation module is sent
To the Cloud Server;
First receiving module is also used to receive the encrypted configuration file that the Cloud Server is sent;
The deciphering module, the first key for being calculated by the first computing module is to the encryption configuration file received
It is decrypted, obtains clear text configuration files;
The update module, the clear text configuration files for being decrypted according to the deciphering module update configuration.
The Cloud Server includes: the second acquisition module, judgment module, the second generation module, the second sending module, sign test mould
Block, the second receiving module and encrypting module;
Second receiving module, the connection request data sent for receiving the cloud speaker;
Described second obtains module, for being identified according to the connection request data acquisition cloud speaker;
Second judgment module identifies in database with the presence or absence of identical cloud speaker for judging;
Second generation module, for judging that there are identical cloud speaker marks in database when second judgment module
When, challenge code is generated, connection response data are generated according to challenge code;
Second sending module, for sending connection response data to the cloud speaker;
Second receiving module is also used to receive the verify data that the cloud speaker is sent;
Described second obtains module, is also used to obtain corresponding manufacturer's certificate according to the cloud speaker mark in the verify data;
The sign test module, for carrying out sign test to the first signed data in the verify data by manufacturer's certificate;
Second generation module is also used to store the verify data when sign test module sign test success, generates verifying
Response data;
Second sending module is also used to send auth response data to the cloud speaker;
Second receiving module is also used to receive the request data for the acquisition configuration file that the cloud speaker is sent;
Described second obtains module, is also used to obtain corresponding configuration file according to the request data for obtaining configuration file;
The encrypting module, the configuration file for being obtained by the second key pair are encrypted;Second key is by described
Cloud Server is obtained according to the verify data of storage;
Second sending module is also used to send encrypted configuration file to the cloud speaker.
12. system according to claim 11, which is characterized in that when first generation module is for generating random number
When, it is specifically used for that random number generation function is called to generate random number.
13. system according to claim 11, which is characterized in that first computing module, be specifically used for it is described with
Machine number and cloud speaker mark are spliced, and splicing data are obtained, and carry out operation to the splicing data by hash algorithm,
The first cryptographic Hash is obtained, using first cryptographic Hash as first key.
14. system according to claim 11, which is characterized in that the encrypting module includes acquiring unit, generation unit
And encryption unit;
The acquiring unit, for obtaining the verify data of storage according to the request data for obtaining configuration file;
The generation unit, for generating the second key according to the verify data;
The encryption unit, the configuration file for being obtained by second key pair are encrypted.
15. system according to claim 14, which is characterized in that the request data for obtaining configuration file includes institute
State cloud speaker mark;
The acquiring unit obtains the verify data of storage specifically for identifying according to the cloud speaker.
16. system according to claim 11, which is characterized in that the request data for obtaining configuration file includes institute
State cloud speaker mark;
When described second, which obtains module, is used to obtain corresponding configuration file according to the request data for obtaining configuration file,
The second acquisition module is specifically used for finding the corresponding list of configuration file in the database, is existed according to cloud speaker mark
Corresponding configuration file is found in corresponding lists.
17. system according to claim 11, which is characterized in that when second generation module is for generating auth response
After data, the Cloud Server further include: parsing module and the second computing module;
The parsing module, for parsing the verify data of storage;
Described second obtains module, is also used to obtain the first data splitting in the verify data;
Second computing module, for passing through preset algorithm to the random number and cloud speaker mark in first data splitting
It carries out that the second key is calculated.
18. system according to claim 17, which is characterized in that second computing module is specifically used for, to it is described with
Machine number and cloud speaker mark are spliced, and splicing data are obtained, and carry out operation to the splicing data by hash algorithm,
The second cryptographic Hash is obtained, using second cryptographic Hash as the second key.
19. system according to claim 11, which is characterized in that when first sending module is by the connection request number
After being sent to the Cloud Server, the cloud speaker further includes first judgment module and cue module;
The first judgment module, for judging whether to receive the data that the Cloud Server returns according to preset time;
The cue module, for the prompt waiting time-out when first judgment module judgement is not received by data.
20. system according to claim 11, which is characterized in that when second judgment module judges not deposit in database
In identical cloud speaker mark, second generation module is also used to generate the response data comprising connection failure answer code;
Second sending module is also used to for the response data to be sent to the cloud speaker.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910569589.XA CN110289956B (en) | 2019-06-27 | 2019-06-27 | Method and system for updating configuration of cloud sound box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910569589.XA CN110289956B (en) | 2019-06-27 | 2019-06-27 | Method and system for updating configuration of cloud sound box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110289956A true CN110289956A (en) | 2019-09-27 |
CN110289956B CN110289956B (en) | 2021-12-28 |
Family
ID=68019958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910569589.XA Active CN110289956B (en) | 2019-06-27 | 2019-06-27 | Method and system for updating configuration of cloud sound box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110289956B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111027955A (en) * | 2019-10-24 | 2020-04-17 | 艾体威尔电子技术(北京)有限公司 | Cloud horn service platform and use method thereof |
CN111193787A (en) * | 2019-12-24 | 2020-05-22 | 国铁吉讯科技有限公司 | Synchronization method and device |
CN112134966A (en) * | 2020-11-26 | 2020-12-25 | 飞天诚信科技股份有限公司 | Cloud sound box broadcast voice configuration method and system |
WO2023103425A1 (en) * | 2021-12-10 | 2023-06-15 | 青岛海尔科技有限公司 | Communicative connection method, system, and apparatus, storage medium, and processor |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1957356A (en) * | 2004-12-13 | 2007-05-02 | 松下电器产业株式会社 | Unauthorized deice detection device, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method |
CN106130733A (en) * | 2016-06-23 | 2016-11-16 | 北京海泰方圆科技股份有限公司 | More newly configured methods, devices and systems |
CN106850209A (en) * | 2017-02-28 | 2017-06-13 | 苏州福瑞思信息科技有限公司 | A kind of identity identifying method and device |
US20180096063A1 (en) * | 2015-06-19 | 2018-04-05 | Alibaba Group Holding Limited | Audio file acquisition and update notification sending method, device, and system |
CN108809645A (en) * | 2018-07-24 | 2018-11-13 | 南方电网科学研究院有限责任公司 | The method, apparatus and electrical power distribution automatization system of key agreement |
CN109005028A (en) * | 2018-11-02 | 2018-12-14 | 美的集团股份有限公司 | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system |
CN109040149A (en) * | 2018-11-02 | 2018-12-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system |
CN109302412A (en) * | 2018-11-06 | 2019-02-01 | 晋商博创(北京)科技有限公司 | VoIP communication processing method, terminal, server and storage medium based on CPK |
-
2019
- 2019-06-27 CN CN201910569589.XA patent/CN110289956B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1957356A (en) * | 2004-12-13 | 2007-05-02 | 松下电器产业株式会社 | Unauthorized deice detection device, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method |
US20180096063A1 (en) * | 2015-06-19 | 2018-04-05 | Alibaba Group Holding Limited | Audio file acquisition and update notification sending method, device, and system |
CN106130733A (en) * | 2016-06-23 | 2016-11-16 | 北京海泰方圆科技股份有限公司 | More newly configured methods, devices and systems |
CN106850209A (en) * | 2017-02-28 | 2017-06-13 | 苏州福瑞思信息科技有限公司 | A kind of identity identifying method and device |
CN108809645A (en) * | 2018-07-24 | 2018-11-13 | 南方电网科学研究院有限责任公司 | The method, apparatus and electrical power distribution automatization system of key agreement |
CN109005028A (en) * | 2018-11-02 | 2018-12-14 | 美的集团股份有限公司 | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system |
CN109040149A (en) * | 2018-11-02 | 2018-12-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system |
CN109302412A (en) * | 2018-11-06 | 2019-02-01 | 晋商博创(北京)科技有限公司 | VoIP communication processing method, terminal, server and storage medium based on CPK |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111027955A (en) * | 2019-10-24 | 2020-04-17 | 艾体威尔电子技术(北京)有限公司 | Cloud horn service platform and use method thereof |
CN111193787A (en) * | 2019-12-24 | 2020-05-22 | 国铁吉讯科技有限公司 | Synchronization method and device |
CN111193787B (en) * | 2019-12-24 | 2022-11-25 | 国铁吉讯科技有限公司 | Synchronization method and device |
CN112134966A (en) * | 2020-11-26 | 2020-12-25 | 飞天诚信科技股份有限公司 | Cloud sound box broadcast voice configuration method and system |
WO2023103425A1 (en) * | 2021-12-10 | 2023-06-15 | 青岛海尔科技有限公司 | Communicative connection method, system, and apparatus, storage medium, and processor |
Also Published As
Publication number | Publication date |
---|---|
CN110289956B (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110289956A (en) | A kind of cloud speaker updates the method and system of configuration | |
CN105516104B (en) | A kind of auth method and system of the dynamic password based on TEE | |
CN108092776A (en) | A kind of authentication server and authentication token | |
CN101414909B (en) | System, method and mobile communication terminal for verifying network application user identification | |
US8433914B1 (en) | Multi-channel transaction signing | |
CN112953970B (en) | Identity authentication method and identity authentication system | |
CN104038486B (en) | System and method for realizing user login identification based on identification type codes | |
CN111131416B (en) | Service providing method and device, storage medium and electronic device | |
CN104836784B (en) | A kind of information processing method, client and server | |
CN111079103A (en) | Identity authentication method and equipment | |
CN110399713A (en) | A kind of method and relevant apparatus of authentification of message | |
CA2518032A1 (en) | Methods and software program product for mutual authentication in a communications network | |
CN102571357B (en) | Signature realization method and signature realization device | |
CN114465803B (en) | Object authorization method, device, system and storage medium | |
JP2001177513A (en) | Authenticating method in communication system, center equipment, and recording medium with authentication program recorded thereon | |
TWI786039B (en) | Offline payment method, terminal equipment, backstage payment device and offline payment system | |
CN106712959A (en) | Implementation method and system of communication safety | |
CN109670289A (en) | A kind of method and system identifying background server legitimacy | |
CN108737412A (en) | A kind of method and terminal for realizing request of data | |
CN109471723B (en) | Method and system for verifying processing result of task | |
CN111464295A (en) | Bank card making method and device | |
CN110223131A (en) | Depressurized system and the method for booking tickets and user terminal apparatus and computer program product | |
CN202978979U (en) | Password security keypad device and password security pad system | |
US11934568B2 (en) | Cable security | |
CN112685699B (en) | Software registration method and device and software registration code generation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |