CN110324213B - Data transmission method for smart home - Google Patents
Data transmission method for smart home Download PDFInfo
- Publication number
- CN110324213B CN110324213B CN201810277699.4A CN201810277699A CN110324213B CN 110324213 B CN110324213 B CN 110324213B CN 201810277699 A CN201810277699 A CN 201810277699A CN 110324213 B CN110324213 B CN 110324213B
- Authority
- CN
- China
- Prior art keywords
- intelligent
- user
- data
- encrypted
- field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000005540 biological transmission Effects 0.000 title claims abstract description 20
- 230000004044 response Effects 0.000 claims description 18
- 230000008569 process Effects 0.000 claims description 12
- 230000008901 benefit Effects 0.000 abstract description 4
- 230000002708 enhancing effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000009423 ventilation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/4185—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by the network communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/26—Pc applications
- G05B2219/2642—Domotique, domestic, home control, automation, smart house
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Landscapes
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Manufacturing & Machinery (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Selective Calling Equipment (AREA)
Abstract
The invention particularly relates to a data transmission method of an intelligent home, which is applied to data transmission of each intelligent device in the intelligent home and comprises the following steps: sequentially connecting all intelligent devices in sequence, and accessing the intelligent device positioned at the head end of the connection to an external network; the control command of the user is transmitted from the external network to the intelligent equipment at the head end of the connection and is sequentially forwarded to the next intelligent equipment until the control command is transmitted to the intelligent equipment at the tail end of the connection, and the corresponding intelligent equipment intercepts the corresponding field from the control command before forwarding each time. Compared with the prior art, the method and the device have the advantages that the intelligent devices are connected end to end, and the control commands corresponding to all the intelligent devices are matched, so that even if other people capture the control commands, the intelligent devices corresponding to the fields in the control commands are difficult to estimate, and the safety of data transmission is improved.
Description
Technical Field
The invention relates to the fields of social networks and information security, in particular to a data transmission method for smart home.
Background
The intelligent home is embodied in an internet of things manner under the influence of the internet. The intelligent home connects various devices (such as audio and video devices, lighting systems, curtain control, air conditioner control, security systems, digital cinema systems, audio and video servers, video cabinet systems, network home appliances and the like) in the home together through the Internet of things technology, and provides multiple functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environment monitoring, heating and ventilation control, infrared forwarding, programmable timing control and the like. Compared with the common home, the intelligent home has the traditional living function, integrates the functions of building, network communication, information household appliance and equipment automation, provides an all-around information interaction function, and even saves funds for various energy expenses.
Although intelligent house has above advantage, but not neglected, in case the total accuse equipment of thing networking is invaded, then the privacy of family is compared in traditional family and is invaded more easily, be difficult to ensure safety, firstly can pass through access control system, voice video system obtains the information of family's activity, and easily get into indoorly when the family is not, secondly spy family's habit of living through anti-theft alarm system's camera, thirdly causes the puzzlement to the family through mischief, for example the household electrical appliances that inexperienced and wonderful opened, the kitchen range is always not caught fire etc. on the spot.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a data transmission method for smart home, which can prevent others from obtaining control commands and reading useful information by enhancing the data security in data transmission.
In view of the above object, the present invention is achieved by: a data transmission method of an intelligent home is applied to data transmission of each intelligent device in the intelligent home, and comprises the following steps:
sequentially connecting all intelligent devices in sequence, and accessing the intelligent device positioned at the head end of the connection to an external network;
the control command of the user is transmitted from the external network to the intelligent equipment at the head end of the connection and is sequentially forwarded to the next intelligent equipment until the control command is transmitted to the intelligent equipment at the tail end of the connection, and the corresponding intelligent equipment intercepts the corresponding field from the control command before forwarding each time.
Compared with the prior art, the method and the device have the advantages that the intelligent devices are connected end to end, and the control commands corresponding to all the intelligent devices are matched, so that even if other people capture the control commands, the intelligent devices corresponding to the fields in the control commands are difficult to estimate, and the safety of data transmission is improved.
Further, different keys are stored on all the intelligent devices, the user has all the keys, and the process of generating the control command by the user is as follows:
s11, encrypting a field for controlling the intelligent equipment at the tail end of the connection through a corresponding key;
s12, adding the field for controlling the last intelligent device to the field encrypted in the last step, and encrypting the field through a corresponding key;
s13, repeat S12 until all fields are encrypted.
Further, all the intelligent devices respectively store different private keys, the user has all the public keys, and the process of the user generating the control command is as follows:
s21, encrypting the field for controlling the intelligent device at the connection end through a corresponding public key;
s22, adding the field for controlling the last intelligent device to the field encrypted in the last step, and encrypting the field through the corresponding public key;
s23, repeat S22 until all fields are encrypted.
And the asymmetric algorithm is adopted for layer-by-layer encryption and layer-by-layer decryption, so that the security is better compared with the symmetric algorithm.
Furthermore, when the intelligent device returns response data to the user, the intelligent device located at the tail end of the connection is sequentially sent to the last intelligent device until the response data is transmitted to the intelligent device located at the head end of the connection and finally sent to the user, and the corresponding intelligent device adds the data to the response data before sending each time. Thus, it is difficult for others to obtain real information from the corresponding data sent to the user, further enhancing the information security.
Further, different keys are stored on all the intelligent devices, the user has all the keys, and the process of generating the response data received by the end user is as follows:
s31, the intelligent device at the connection end encrypts the data by the corresponding key and sends the encrypted data to the previous intelligent device;
s32, adding the self data of the last intelligent device to the field encrypted in the last step, and encrypting the self data through a corresponding key;
and S33, repeating the step S32 until the self data of all the intelligent devices are encrypted.
Response data is encrypted layer by layer and decrypted layer by layer, and compared with a symmetric algorithm, the asymmetric algorithm has better safety.
Further, public keys of the user are respectively stored on all the intelligent devices, the user has a private key of the user, and the process of generating the response data received by the end user is as follows:
s41, the intelligent device at the connection end encrypts the data by the public key of the user and sends the encrypted data to the previous intelligent device;
s42, adding the data of the last intelligent device to the field encrypted in the last step, and encrypting the data through the public key of the user;
and S43, repeating the step S42 until the self data of all the intelligent devices are encrypted.
Response data is encrypted layer by layer and decrypted layer by layer, and compared with a symmetric algorithm, the asymmetric algorithm has better safety.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, the intelligent devices are connected end to end, and the control commands corresponding to all the intelligent devices are matched, so that even if other people intercept the control commands, the field of the control commands is difficult to estimate which intelligent device corresponds to, and the safety of data transmission is improved.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The present invention will be described in detail with reference to the following embodiments and drawings.
Example 1:
as shown in fig. 1, a data transmission method for smart home is applied to data transmission of each smart device in the smart home, and includes the following steps:
sequentially connecting all intelligent devices in sequence, and accessing the intelligent device positioned at the head end of the connection to an external network;
the control command of the user is transmitted from the external network to the intelligent equipment at the head end of the connection and is sequentially forwarded to the next intelligent equipment until the control command is transmitted to the intelligent equipment at the tail end of the connection, and the corresponding intelligent equipment intercepts the corresponding field from the control command before forwarding each time.
Compared with the prior art, the method and the device have the advantages that the intelligent devices are connected end to end, and the control commands corresponding to all the intelligent devices are matched, so that even if other people capture the control commands, the intelligent devices corresponding to the fields in the control commands are difficult to estimate, and the safety of data transmission is improved.
All intelligent devices respectively store different keys, a user has all the keys, and the process of generating a control command by the user is as follows:
s11, encrypting a field for controlling the intelligent equipment at the tail end of the connection through a corresponding key;
s12, adding the field for controlling the last intelligent device to the field encrypted in the last step, and encrypting the field through a corresponding key;
s13, repeat S12 until all fields are encrypted.
When the intelligent device returns response data to the user, the process of generating the response data received by the end user is as follows:
s31, the intelligent device at the connection end encrypts the data by the corresponding key and sends the encrypted data to the previous intelligent device;
s32, adding the self data of the last intelligent device to the field encrypted in the last step, and encrypting the self data through a corresponding key;
and S33, repeating the step S32 until the self data of all the intelligent devices are encrypted.
Response data is encrypted layer by layer and decrypted layer by layer, and compared with a symmetric algorithm, the asymmetric algorithm has better safety.
Example 2:
the difference between this embodiment and embodiment 2 is that different private keys are stored in all the intelligent devices, the user has all the public keys, and the process of generating the control command by the user is as follows:
s21, encrypting the field for controlling the intelligent device at the connection end through a corresponding public key;
s22, adding the field for controlling the last intelligent device to the field encrypted in the last step, and encrypting the field through the corresponding public key;
s23, repeat S22 until all fields are encrypted.
And the asymmetric algorithm is adopted for layer-by-layer encryption and layer-by-layer decryption, so that the security is better compared with the symmetric algorithm.
All the intelligent devices are respectively stored with public keys of users, the users own private keys, and the process of generating the response data received by the final user is as follows:
s41, the intelligent device at the connection end encrypts the data by the public key of the user and sends the encrypted data to the previous intelligent device;
s42, adding the data of the last intelligent device to the field encrypted in the last step, and encrypting the data through the public key of the user;
and S43, repeating the step S42 until the self data of all the intelligent devices are encrypted.
Response data is encrypted layer by layer and decrypted layer by layer, and compared with a symmetric algorithm, the asymmetric algorithm has better safety.
Claims (4)
1. A data transmission method for smart home is characterized by comprising the following steps:
sequentially connecting all intelligent devices in sequence, and accessing the intelligent device positioned at the head end of the connection to an external network;
the control command of a user is transmitted into the intelligent equipment at the head end of the connection from the external network and is sequentially forwarded to the next intelligent equipment until the control command is transmitted to the intelligent equipment at the tail end of the connection, and the corresponding intelligent equipment intercepts the corresponding field from the control command before forwarding each time;
all the intelligent devices respectively store different keys, and the user has all the keys, or all the intelligent devices respectively store different private keys, and the user has all the public keys;
when different keys are stored on all the intelligent devices respectively and the user has all the keys, the process of generating the control command by the user is as follows:
s11, encrypting a field for controlling the intelligent equipment at the tail end of the connection through a corresponding key;
s12, adding the field for controlling the last intelligent device to the field encrypted in the last step, and encrypting the field through a corresponding key;
repeating S12 until all fields are encrypted;
when different private keys are stored in all the intelligent devices respectively, the user has all the public keys, and the process of generating the control command by the user is as follows:
s21, encrypting the field for controlling the intelligent device at the connection end through a corresponding public key;
s22, adding the field for controlling the last intelligent device to the field encrypted in the last step, and encrypting the field through the corresponding public key;
s23, repeat S22 until all fields are encrypted.
2. The data transmission method for smart homes according to claim 1, wherein when the smart devices return response data to the user, the response data are sequentially sent to the last smart device from the smart device located at the tail end of the connection until the response data are transmitted to the smart device located at the head end of the connection and finally sent to the user, and before each transmission, the corresponding smart device adds the data to the response data.
3. The data transmission method for smart home according to claim 2, wherein different keys are stored in all smart devices, the user has all keys, and the process of generating the response data received by the end user is as follows:
s31, the intelligent device at the connection end encrypts the data by the corresponding key and sends the encrypted data to the previous intelligent device;
s32, adding the self data of the last intelligent device to the field encrypted in the last step, and encrypting the self data through a corresponding key;
and S33, repeating the step S32 until the self data of all the intelligent devices are encrypted.
4. The data transmission method for smart home according to claim 2, wherein public keys of the users are stored in all the smart devices, the users own private keys, and the process of generating the response data received by the end user is as follows:
s41, the intelligent device at the connection end encrypts the data by the public key of the user and sends the encrypted data to the previous intelligent device;
s42, adding the data of the last intelligent device to the field encrypted in the last step, and encrypting the data through the public key of the user;
and S43, repeating the step S42 until the self data of all the intelligent devices are encrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810277699.4A CN110324213B (en) | 2018-03-31 | 2018-03-31 | Data transmission method for smart home |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810277699.4A CN110324213B (en) | 2018-03-31 | 2018-03-31 | Data transmission method for smart home |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110324213A CN110324213A (en) | 2019-10-11 |
CN110324213B true CN110324213B (en) | 2021-04-09 |
Family
ID=68111831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810277699.4A Active CN110324213B (en) | 2018-03-31 | 2018-03-31 | Data transmission method for smart home |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110324213B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112054947A (en) * | 2020-08-31 | 2020-12-08 | 海信(山东)空调有限公司 | Method for controlling indoor environment electric appliance, indoor environment electric appliance and remote control terminal |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101039173A (en) * | 2007-04-29 | 2007-09-19 | 山东大学 | Apparatus and method for realizing synchronization between Ethernet chain-like network nodes |
CN102510339A (en) * | 2011-11-23 | 2012-06-20 | 济南凌康数控技术有限公司 | Ethernet networked connection device and system for realizing non-networked servo |
CN202285409U (en) * | 2010-09-16 | 2012-06-27 | 北京中科联众科技股份有限公司 | Intelligent household control system |
CN102662383A (en) * | 2012-05-29 | 2012-09-12 | 张二浩 | Cascade-extendable chain control system, chain control module and realizing method |
CN102934400A (en) * | 2010-06-09 | 2013-02-13 | 日本电气株式会社 | Communication system, logic channel control device, control device, communication method and program |
CN103529804A (en) * | 2013-10-25 | 2014-01-22 | 深圳市汇川控制技术有限公司 | Distributed control system based on EtherCAT bus |
CN104125125A (en) * | 2014-08-06 | 2014-10-29 | 桂林电子科技大学 | Intelligent housing system and control method |
CN104168625A (en) * | 2014-08-20 | 2014-11-26 | 普联技术有限公司 | Intelligent device, method for connecting intelligent device to wireless routing device, and wireless routing device |
CN107040474A (en) * | 2016-02-03 | 2017-08-11 | 中兴通讯股份有限公司 | Data packet sending method, method of reseptance, dispensing device and reception device |
CN107077429A (en) * | 2015-03-20 | 2017-08-18 | 华为技术有限公司 | Method for reading data, equipment and system |
CN107094138A (en) * | 2017-04-11 | 2017-08-25 | 郑州信大捷安信息技术股份有限公司 | A kind of smart home safe communication system and communication means |
CN206517417U (en) * | 2017-03-08 | 2017-09-22 | 中机华信诚电力工程有限公司 | A kind of photovoltaic plant area optical fiber structure of use looped network formula jumper connection connection |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101573328B1 (en) * | 2008-04-21 | 2015-12-01 | 삼성전자주식회사 | Home network control apparatus and method to obtain encrypted control information |
US10429869B2 (en) * | 2011-02-16 | 2019-10-01 | Kortek Industries Pty Ltd | Wireless power, light and automation control |
CN103123799A (en) * | 2011-11-18 | 2013-05-29 | 鸿富锦精密工业(深圳)有限公司 | Rate indication circuit, rigid disk backboard and electronic device |
-
2018
- 2018-03-31 CN CN201810277699.4A patent/CN110324213B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101039173A (en) * | 2007-04-29 | 2007-09-19 | 山东大学 | Apparatus and method for realizing synchronization between Ethernet chain-like network nodes |
CN102934400A (en) * | 2010-06-09 | 2013-02-13 | 日本电气株式会社 | Communication system, logic channel control device, control device, communication method and program |
CN202285409U (en) * | 2010-09-16 | 2012-06-27 | 北京中科联众科技股份有限公司 | Intelligent household control system |
CN102510339A (en) * | 2011-11-23 | 2012-06-20 | 济南凌康数控技术有限公司 | Ethernet networked connection device and system for realizing non-networked servo |
CN102662383A (en) * | 2012-05-29 | 2012-09-12 | 张二浩 | Cascade-extendable chain control system, chain control module and realizing method |
CN103529804A (en) * | 2013-10-25 | 2014-01-22 | 深圳市汇川控制技术有限公司 | Distributed control system based on EtherCAT bus |
CN104125125A (en) * | 2014-08-06 | 2014-10-29 | 桂林电子科技大学 | Intelligent housing system and control method |
CN104168625A (en) * | 2014-08-20 | 2014-11-26 | 普联技术有限公司 | Intelligent device, method for connecting intelligent device to wireless routing device, and wireless routing device |
CN107077429A (en) * | 2015-03-20 | 2017-08-18 | 华为技术有限公司 | Method for reading data, equipment and system |
CN107040474A (en) * | 2016-02-03 | 2017-08-11 | 中兴通讯股份有限公司 | Data packet sending method, method of reseptance, dispensing device and reception device |
CN206517417U (en) * | 2017-03-08 | 2017-09-22 | 中机华信诚电力工程有限公司 | A kind of photovoltaic plant area optical fiber structure of use looped network formula jumper connection connection |
CN107094138A (en) * | 2017-04-11 | 2017-08-25 | 郑州信大捷安信息技术股份有限公司 | A kind of smart home safe communication system and communication means |
Also Published As
Publication number | Publication date |
---|---|
CN110324213A (en) | 2019-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104813685B (en) | The subscription informing mechanism of synchronization for distributions | |
US10601604B2 (en) | Data processing systems and methods for smart hub devices | |
US9600726B2 (en) | Receiving link approval from remote server to provision remote electronic device associated with user account | |
CN105009131B (en) | Promote the multilayer authentication method communicated between intelligent home equipment and server based on cloud | |
Mundt et al. | Security in building automation systems-a first analysis | |
CN109445300B (en) | Intelligent home control method and intelligent home system | |
CN106453427A (en) | Smart home center control server | |
WO2016178015A1 (en) | Monitoring and automation systems, and related methods | |
Wendzel et al. | Cyber security of smart buildings | |
Meyer et al. | A threat-model for building and home automation | |
US10621838B2 (en) | External video clip distribution with metadata from a smart-home environment | |
CN111177695A (en) | Intelligent household equipment access control method based on block chain | |
CN104898629A (en) | Intelligent household control end and control method | |
CN106534189A (en) | Bi-directional interactive center control server | |
CN104754422A (en) | Control method for realizing smart home equipments based on STB (Set Top Box) | |
CN111131204A (en) | Information security transmission method and system | |
CN109188926A (en) | A kind of method and apparatus controlling smart home | |
CN110768842A (en) | Intelligent home communication safety management and control method, system and storage medium | |
CN111123723A (en) | Grouping interaction method, electronic device and storage medium | |
CN110324213B (en) | Data transmission method for smart home | |
CN109587908A (en) | The end intelligent aromatherapy lamp iOS control method | |
CN106657048A (en) | Improved smart home center control server | |
CN106936841B (en) | Safety protecting method and system in smart home | |
CN110324139B (en) | Data broadcasting method for smart home | |
CN110519227B (en) | Intelligent household data tamper-proofing method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |