CN110875901A - Information processing method and device and clothes processing device - Google Patents

Information processing method and device and clothes processing device Download PDF

Info

Publication number
CN110875901A
CN110875901A CN201811009804.2A CN201811009804A CN110875901A CN 110875901 A CN110875901 A CN 110875901A CN 201811009804 A CN201811009804 A CN 201811009804A CN 110875901 A CN110875901 A CN 110875901A
Authority
CN
China
Prior art keywords
information
server
processing device
instruction information
processing method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811009804.2A
Other languages
Chinese (zh)
Other versions
CN110875901B (en
Inventor
刘雪清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Little Swan Co Ltd
Original Assignee
Wuxi Little Swan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Little Swan Co Ltd filed Critical Wuxi Little Swan Co Ltd
Priority to CN201811009804.2A priority Critical patent/CN110875901B/en
Publication of CN110875901A publication Critical patent/CN110875901A/en
Application granted granted Critical
Publication of CN110875901B publication Critical patent/CN110875901B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an information processing method, an information processing device and a clothes processing device, wherein the method comprises the following steps: the server obtains instruction information to be sent to the clothes processing device from the mobile terminal, generates an encryption key according to a key generation rule negotiated with the clothes processing device in advance, encrypts the instruction information according to the encryption key to obtain first transmission information, and sends the first transmission information to the clothes processing device. Therefore, the instruction information to be sent to the clothes treatment device, which is acquired from the mobile terminal, is encrypted through the server, and the encrypted information is sent to the clothes treatment device, so that the safety of data transmission is ensured, and the probability of data leakage caused by deciphering of the clothes treatment device is reduced.

Description

Information processing method and device and clothes processing device
Technical Field
The present application relates to the field of home appliance technologies, and in particular, to an information processing method and apparatus, and a clothes processing apparatus.
Background
With the rapid development of mobile internet, intelligent household appliances are increasingly widely applied in daily life of people. At present, due to the rapid development of smart homes, more and more users control the operation of household appliances by operating on mobile devices, and meanwhile, the household appliances can also upload data to the mobile devices. However, in the process of data transmission between the mobile device and the home appliance, most of the transmitted data is plaintext, so that the security is low, and the data is easily decoded to cause data leakage.
Especially for self-service household appliances, once the data transmission information between the mobile device and the self-service household appliance is decoded, the user can directly use the equipment without paying, thereby causing huge property loss to a company managing the household appliance.
Disclosure of Invention
The present application is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, the application provides an information processing method and device, a clothes processing device, a server and a computer readable storage medium, so as to solve the technical problems that in the prior art, when data is transmitted between a mobile terminal and the clothes processing device, the transmitted data information is a plaintext in most of time, the security is low, and information leakage is easy to occur.
An embodiment of a first aspect of the present application provides an information processing method, including:
the server acquires instruction information to be sent to the clothes treatment device from the mobile terminal;
the server generates an encryption key according to a key generation rule negotiated with the clothes treatment device in advance;
the server encrypts the instruction information according to the encryption key to obtain first transmission information;
the server transmits the first transmission information to the laundry treating apparatus.
According to the information processing method, the server acquires the instruction information to be sent to the clothes processing device from the mobile terminal, the server generates the encryption key according to the key generation rule negotiated in advance by the clothes processing device, the server encrypts the instruction information according to the encryption key to obtain the first transmission information, and the server sends the first transmission information to the clothes processing device. Therefore, the instruction information to be sent to the clothes treatment device, which is acquired from the mobile terminal, is encrypted through the server, and the encrypted information is sent to the clothes treatment device, so that the safety of data transmission is ensured, and the probability of data leakage caused by deciphering of the clothes treatment device is reduced.
An embodiment of a second aspect of the present application provides another information processing method, including:
the clothes processing device receives first transmission information from a server, wherein the first transmission information comprises instruction information sent by a mobile terminal;
the clothing processing device generates a decryption key according to a key generation rule negotiated with the server in advance;
the clothing processing device decrypts the first transmission information by adopting the decryption key to obtain the instruction information;
the laundry treating apparatus operates according to the instruction information to generate feedback information.
According to the information processing method, the clothes processing device receives the first transmission information from the server, the clothes processing device generates the decryption key according to the key generation rule negotiated with the server in advance, the clothes processing device decrypts the first transmission information by adopting the decryption key to obtain the instruction information, and the clothes processing device operates according to the instruction information to generate the feedback information. Therefore, the clothes processing device receives the instruction information from the server, executes the instruction information, generates feedback information and uploads the feedback information to the server, and the safety of data transmission between the clothes processing device and the mobile terminal through the server is improved.
An embodiment of a third aspect of the present application provides an information processing apparatus, including:
the acquisition module is used for acquiring instruction information to be sent to the clothes treatment device from the mobile terminal;
a generation module for generating an encryption key by the server according to a key generation rule negotiated in advance with the laundry treatment device;
the encryption module is used for encrypting the instruction information according to the encryption key to obtain first transmission information;
a transmitting module for transmitting the first transmission information to the laundry treating apparatus.
According to the information processing device, the server acquires the instruction information to be sent to the clothes processing device from the mobile terminal, the server generates the encryption key according to the key generation rule negotiated with the clothes processing device in advance, the server encrypts the instruction information according to the encryption key to obtain the first transmission information, and the server sends the first transmission information to the clothes processing device. Therefore, the instruction information to be sent to the clothes treatment device, which is acquired from the mobile terminal, is encrypted through the server, and the encrypted information is sent to the clothes treatment device, so that the safety of data transmission is ensured, and the probability of data leakage caused by deciphering of the clothes treatment device is reduced.
An embodiment of a fourth aspect of the present application provides another information processing apparatus, including:
the receiving module is used for receiving transmission information from a server, wherein the first transmission information comprises instruction information sent by the mobile terminal;
a first generation module, which is used for generating a decryption key by the clothing processing device according to a key generation rule negotiated with the server in advance;
the decryption module is used for decrypting the first transmission information by adopting the decryption key to obtain the instruction information;
and the second generation module is used for operating according to the instruction information to generate feedback information.
According to the information processing device, the clothes processing device receives the transmission information from the server, generates the decryption key according to the key generation rule negotiated with the server in advance, decrypts the first transmission information by adopting the decryption key to obtain the instruction information, and operates according to the instruction information to generate the feedback information. Therefore, the clothes processing device receives the instruction information from the server, executes the instruction information, generates feedback information and uploads the feedback information to the server, and the safety of data transmission between the clothes processing device and the mobile terminal through the server is improved.
An embodiment of a fifth aspect of the present application provides a clothes treatment apparatus, comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, which when executed by the processor implements the information processing method as described in the embodiment of the second aspect.
An embodiment of a sixth aspect of the present application provides a server, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the information processing method as described in the embodiments of the first aspect when executing the program.
An embodiment of a seventh aspect of the present application proposes a computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the information processing method described in the embodiment of the first aspect described above, or the information processing method described in the embodiment of the second aspect.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 4 is an interaction diagram of an information processing method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another information processing apparatus according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
In the related art, a user may send a control command to the laundry treatment device through the mobile terminal to control the laundry treatment device to complete a washing process, and may also receive data information uploaded by the laundry treatment device. However, in the process of data transmission between the clothes treatment device and the mobile terminal, leakage of data information may occur, thereby resulting in leakage of user information. Especially, the self-service clothes treatment device can directly control the clothes treatment device to wash without payment once the data is cracked.
In view of the above problems, an embodiment of the present application provides an information processing method, in which a server obtains instruction information to be sent to a clothes processing device from a mobile terminal, the server generates an encryption key according to a key generation rule negotiated with the clothes processing device in advance, the server encrypts the instruction information according to the encryption key to obtain first transmission information, and the server finally sends the first transmission information to the clothes processing device.
An information processing method and apparatus of an embodiment of the present application are described below with reference to the drawings.
Fig. 1 is a schematic flowchart of an information processing method according to an embodiment of the present application.
As shown in fig. 1, the information processing method includes the steps of:
step 101, a server acquires instruction information to be sent to a clothes treatment device from a mobile terminal.
In the embodiment of the application, the mobile terminal may be a hardware device having various operating systems, touch screens and/or display screens, such as a mobile phone, a tablet computer, a personal digital assistant, and a wearable device.
The instruction information refers to data information to be sent by the mobile terminal and used for controlling the clothes treatment device.
Specifically, the mobile terminal first transmits instruction information to be transmitted to the laundry treating apparatus to the server, whereby the server can acquire the instruction information from the mobile terminal.
In step 102, the server generates an encryption key according to a key generation rule negotiated in advance with the laundry treatment apparatus.
The key is a parameter input in an algorithm for converting a plaintext into a ciphertext or converting a ciphertext into a plaintext. The keys include an encryption key and a decryption key. There are two commonly used key encryption techniques: symmetric encryption and asymmetric encryption, wherein symmetric encryption means that the same key is used for an encryption key and a decryption key; asymmetric key means that the encryption key and the decryption key use different keys. In the application, an asymmetric encryption mode can be adopted, namely private key decryption and public key encryption; symmetric encryption may also be used.
Because most of control instructions sent by the mobile terminal to the clothes treatment device are plaintext data and the safety is low, after the server acquires instruction information to be sent to the clothes treatment device from the mobile terminal, the instruction information is encrypted firstly to prevent information leakage. In the embodiment of the present application, the key used for encrypting the instruction information is generated by the server according to the key generation rule negotiated in advance with the laundry treating apparatus.
Specifically, the key generation rule negotiated in advance between the server and the laundry treating apparatus may be to generate an encryption key according to an item identification and a current time of the laundry treating apparatus. Wherein the item identifier of the laundry treating apparatus indicates a model of the laundry treating apparatus. The model of each clothes processing device is identified by a secret code, and is not unique to the model known by the outside. The current time is the time when the server acquires the instruction information to be sent to the clothes treatment device from the mobile terminal.
The key generation rule is pre-negotiated between an engineer at the server end and an engineer at the clothes treatment device end, and cannot be directly transmitted on the network. In a special situation, for example, when any one party has a disclosure or is decrypted, the key generation rule needs to be updated, and the encrypted key is usually encrypted by an asymmetric encryption algorithm and then transmitted to the other party through the network to prevent the disclosure.
Because the current time is changed from moment to moment, the encryption keys dynamically generated by the item identifier and the current time are different from each other, the safety of instruction information transmission is improved, and the decoding probability is reduced. The current time may be a current date of information transmission, or may also be a current time of information transmission, which is not specifically limited in this embodiment of the application.
As an example, when the current time at which the encryption key is generated is the current date of information transmission, the current date at which the server acquires the instruction information to be transmitted to the laundry treating device from the mobile terminal is 20180824, and the model of the laundry treating device is L52, the encryption key generated according to the key generation rule is 20180824L 52. If the current date is 20180826, the encryption key generated according to the encryption key generation rule is 20180826L 52.
It can be understood that, since the mobile terminal can control a plurality of clothes treatment devices at the same time, the server obtains the identification ID of the clothes treatment device from the mobile terminal, which is carried in the instruction information to be sent to the clothes treatment device, and determines to which clothes treatment device the instruction information is sent specifically based on the ID server. The server may query the item identifier of the laundry processing device to be transmitted according to the ID, and generate the encryption key according to a key generation rule negotiated in advance with the laundry processing device. Because the server has higher security level, the project identifier is stored in the server, so that the security reduction caused by the leakage of the project identifier can be effectively avoided.
And 103, encrypting the instruction information by the server according to the encryption key to obtain first transmission information.
It should be noted that, the encryption and decryption algorithm for the instruction information is also negotiated in advance by the server engineer and the clothes treating apparatus engineer, and the specific encryption algorithm is not limited in the embodiment of the present application, and is used as a possible encryption algorithm: the server engineer and the laundry processing apparatus engineer may negotiate to use an Advanced Encryption Standard (AES), that is, an AES encryption algorithm, and then encrypt instruction information to be sent to the laundry processing apparatus, which is acquired from the mobile terminal by the server, through the AES encryption algorithm and the encryption key.
In a possible implementation manner, the server inserts a first timestamp at a preset position of the instruction information, and then encrypts the text at the current time represented by the first timestamp and the instruction information. Because the first time stamp is changed all the time, the cryptographs expressed by the instruction information and the first transmission information obtained by encrypting the first time stamp by adopting the encryption algorithm and the encryption key are completely different and irregular, so that the difficulty of deciphering the cryptographs is increased.
The first transmission information is a ciphertext obtained by the server generating an encryption key according to the project identifier and the current time and encrypting the instruction information by adopting the encryption key and an encryption algorithm.
Step 104, the server sends the first transmission information to the clothes treatment device.
In the embodiment of the application, the server sends the first transmission information to the clothes treatment device so as to control the clothes treatment device. Because the first transmission information is the encrypted ciphertext, the safety of data transmission is improved.
According to the information processing method, the server acquires the instruction information to be sent to the clothes processing device from the mobile terminal, the server generates the encryption key according to the key generation rule negotiated with the clothes processing device in advance, the server encrypts the instruction information according to the encryption key to obtain the first transmission information, and the server sends the first transmission information to the clothes processing device. Therefore, the instruction information to be sent to the clothes treatment device, which is acquired from the mobile terminal, is encrypted through the server, and the encrypted information is sent to the clothes treatment device, so that the safety of data transmission is ensured, and the probability of data leakage caused by deciphering of the clothes treatment device is reduced.
As a possible implementation manner, on the basis of the embodiment described in fig. 1, referring to fig. 2, the information processing method described in the above embodiment may further include:
in step 201, the server acquires feedback information from the clothes treatment device, wherein the feedback information is generated by the clothes treatment device according to the first transmission information.
Specifically, after the server sends the first transmission information to the clothes treatment device, the clothes treatment device sends feedback information to the server after receiving the first transmission information, wherein the feedback information is generated by the clothes treatment device according to the first transmission information, an encryption key is also generated according to the item identifier and the current time, and the feedback information is encrypted by using the encryption key.
It should be noted that the encryption key of the feedback information is generated according to a key generation rule negotiated in advance by the server engineer and the laundry treatment device engineer, that is, according to the pre-stored item identifier and the current time.
Step 202, the server generates a decryption key according to the item identifier and the current time, and decrypts the feedback information by using the decryption key to obtain second transmission information.
In the embodiment of the application, the encryption key of the feedback information acquired by the server from the clothes treatment device is generated according to the prestored item identification and the current time. Therefore, the server also needs to generate a decryption key according to the item identifier and the current time, and then decrypts the feedback information by adopting the decryption key to obtain the second transmission information. The second transmission information refers to decrypted feedback information uploaded to the server by the clothes treatment device.
The server removes the second time stamp inserted by the laundry treating apparatus at the second transmission information preset position, step 203.
Specifically, the laundry processing apparatus generates an encryption key based on the item identifier and the current time to encrypt the feedback information, and adds a second time stamp, whereby the server removes the second time stamp inserted by the laundry processing apparatus at a preset position of the second transmission information after decrypting the feedback information to generate the second transmission information.
And step 204, the server sends the second transmission information to the mobile terminal.
In the embodiment of the application, the server sends the decrypted second transmission information to the mobile terminal, so that the clothes processing device reports the feedback information to the mobile terminal, mutual transmission of data between the mobile terminal and the clothes processing device is realized, and the safety of data transmission is ensured.
According to the information processing method, the server acquires feedback information from the clothes processing device, wherein the feedback information is generated by the clothes processing device according to the first transmission information, the server generates a decryption key according to the item identifier and the current time, the feedback information is decrypted by the decryption key to obtain second transmission information, the server removes a second timestamp inserted by the clothes processing device at a preset position of the second transmission information, and finally the server sends the second transmission information to the mobile terminal. Therefore, the feedback information of the clothes treatment device is decrypted by the server and is sent to the mobile terminal, and the safety of information transmission between the clothes treatment device and the mobile terminal is ensured.
In order to clearly illustrate the above embodiment, the present embodiment provides another information processing method, which may be specifically executed by a clothes processing apparatus, and fig. 3 is a flowchart illustrating another information processing method provided in the embodiment of the present application.
As shown in fig. 3, the information processing method may include the steps of:
in step 301, the laundry treating apparatus receives first transmission information from a server.
The first transmission information is a cipher text obtained by encrypting instruction information which is sent by the mobile terminal and used for controlling the operation of the clothes processing device according to the encryption key by the server. In the embodiment of the application, the server firstly obtains the instruction information from the mobile terminal, then encrypts the instruction information according to the prestored project identification and the encryption key generated at the current time to obtain the first transmission information, and finally sends the encrypted first transmission information to the clothes processing device, and correspondingly, the clothes processing device can receive the first transmission information from the server.
In step 302, the laundry treatment apparatus generates a decryption key according to a key generation rule negotiated with the server in advance.
In the embodiment of the application, after receiving the encrypted first transmission information, the clothes treatment device firstly generates a decryption key according to a key generation rule negotiated with the server in advance.
In one possible implementation manner, after receiving the encrypted first transmission information, the laundry processing device obtains the current time and the pre-stored item identifier, and generates the decryption key according to the current time and the pre-stored item identifier. Wherein the item identifier indicates a model of the laundry treating apparatus.
Step 303, the laundry processing apparatus decrypts the first transmission information by using the decryption key to obtain the instruction information.
Specifically, the clothes processing device decrypts the first transmission information by using the decryption key and a pre-negotiated decryption algorithm to obtain the instruction information sent by the mobile terminal, and then executes the instruction information.
In a possible implementation manner, after the clothing processing apparatus decrypts the first transmission information by using the decryption key, the first timestamp inserted by the server at the preset position of the instruction information needs to be removed, and then the corresponding instruction information can be obtained.
In step 304, the laundry treating apparatus operates according to the instruction information to generate feedback information.
The feedback information refers to information generated by the clothes processing device after running according to the instruction information and reported to the mobile terminal.
Further, the clothes processing device inserts a second time stamp at a preset position of the feedback information, further generates an encryption key according to a key generation rule negotiated in advance through the project identification and the current time, and encrypts the second time stamp and the feedback information by adopting the encryption key and an encryption algorithm. And then sending the encrypted feedback information to the server.
It should be noted that, because the time stamp is changed from moment to moment, the encrypted ciphertext is completely different, thereby greatly reducing the probability of deciphering the ciphertext and improving the security of data transmission between the clothes processing device and the mobile terminal through the server.
According to the information processing method, the clothes processing device receives the first transmission information from the server, the clothes processing device generates the decryption key according to the key generation rule negotiated with the server in advance, the clothes processing device decrypts the first transmission information by adopting the decryption key to obtain the instruction information, and the clothes processing device operates according to the instruction information to generate the feedback information. Therefore, the clothes processing device receives the instruction information from the server, executes the instruction information, generates feedback information and uploads the feedback information to the server, and the safety of data transmission between the clothes processing device and the mobile terminal through the server is improved.
For convenience of understanding, in a specific embodiment, the information processing method of the present application is described, and as shown in fig. 4, the specific implementation process is as follows:
in step 401, the mobile terminal transmits instruction information for controlling the laundry treating apparatus to the server.
Correspondingly, the server acquires the instruction information sent by the mobile terminal.
Optionally, the communication process between the mobile terminal and the server is ensured by https protocol, which is prior art and not described in detail herein.
In step 402, the server generates an encryption key according to a key generation rule negotiated in advance with the laundry treatment apparatus.
In step 403, the server encrypts the instruction information according to the encryption key to obtain the first transmission information.
In step 404, the server transmits the first transmission information to the laundry treating apparatus.
Specifically, the specific implementation process of the above steps 402 to 404 is as described in the steps 102 to 104 in the foregoing embodiment, and will not be described in detail here. Correspondingly, the clothes processing device receives the first transmission information sent by the server.
In step 405, the laundry treating apparatus generates a decryption key according to a key generation rule negotiated with the server in advance.
In step 406, the laundry treating device decrypts the first transmission information by using the decryption key to obtain the instruction information.
In step 407, the laundry treating apparatus performs corresponding control according to the instruction information.
In step 408, the laundry processing apparatus generates an encryption key according to a key generation rule negotiated with the server in advance.
In step 409, the laundry treating apparatus encrypts the feedback information according to the encryption key.
In step 410, the laundry treating apparatus transmits the encrypted feedback information to the server.
Specifically, the specific implementation process of steps 405 to 410 is as described in steps 302 to 304 in the foregoing embodiment, and will not be described in detail here.
Correspondingly, the server acquires the encrypted feedback information.
Step 411, the server generates a decryption key according to the item identifier and the current time, and decrypts the feedback information by using the decryption key to obtain the second transmission information.
In step 412, the server sends the second transmission information to the mobile terminal.
In the embodiment of the application, the instruction information acquired from the mobile terminal is encrypted through the server, the encrypted information is sent to the clothes treatment device, the feedback information sent by the clothes treatment device is decrypted, and the decrypted feedback information is sent to the mobile terminal, so that the safety of data transmission between the mobile terminal and the clothes treatment device is ensured, and the probability of data leakage caused by decoding the clothes treatment device is reduced.
In order to implement the above embodiments, the present application also proposes an information processing apparatus.
Fig. 5 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application.
As shown in fig. 5, the information processing apparatus 100 includes: an acquisition module 110, a query module 120, an encryption module 130, and a sending module 140.
The obtaining module 110 is configured to obtain instruction information to be sent to the laundry treating apparatus from the mobile terminal.
A generating module 120 for the server to generate an encryption key according to a key generation rule negotiated in advance with the laundry treating apparatus.
And the encryption module 130 is configured to encrypt the instruction information according to the encryption key to obtain the first transmission information.
A transmitting module 140 for transmitting the first transmission information to the laundry treating apparatus.
As a possible implementation manner, the generating module 120 may specifically further include:
an inquiry unit for inquiring the item identification of the clothes processing device by the server; wherein the item identifier indicates a model of the laundry treating apparatus.
And the generating unit is used for generating an encryption key by the server according to the item identifier and the current time.
As a possible implementation manner, the information processing apparatus may further include:
and the inserting module is used for inserting the first timestamp into the preset position of the instruction information by the server.
As another possible implementation manner, the information processing apparatus may further include:
and a second obtaining module, configured to obtain, by the server, feedback information from the laundry processing apparatus, where the feedback information is generated by the laundry processing apparatus according to the first transmission information.
And the decryption module is used for generating a decryption key by the server according to the item identifier and the current time, and decrypting the feedback information by adopting the decryption key to obtain second transmission information.
And the second sending module is used for sending second transmission information to the mobile terminal by the server.
As another possible implementation manner, the information processing apparatus may further include:
and a removing module for the server to remove the second timestamp inserted by the laundry treating device at the second transmission information preset position.
According to the information processing device, the server acquires the instruction information to be sent to the clothes processing device from the mobile terminal, the server generates the encryption key according to the key generation rule negotiated with the clothes processing device in advance, the server encrypts the instruction information according to the encryption key to obtain the first transmission information, and the server sends the first transmission information to the clothes processing device. Therefore, the instruction information to be sent to the clothes treatment device, which is acquired from the mobile terminal, is encrypted through the server, and the encrypted information is sent to the clothes treatment device, so that the safety of data transmission is ensured, and the probability of data leakage caused by deciphering of the clothes treatment device is reduced.
In order to implement the above embodiments, the present application also proposes another information processing apparatus.
Fig. 6 is a schematic structural diagram of another information processing apparatus according to an embodiment of the present application.
As shown in fig. 6, the information processing apparatus 200 includes: a receiving module 210, a first generating module 220, a decrypting module 230, and a second generating module 240.
The receiving module 210 is configured to receive transmission information from the server, where the first transmission information includes instruction information sent by the mobile terminal.
The first generation module 220 is used for the laundry treatment apparatus to generate a decryption key according to a key generation rule negotiated with the server in advance.
And the decryption module 230 is configured to decrypt the first transmission information by using the decryption key to obtain the instruction information.
And a second generating module 240, configured to operate according to the instruction information to generate the feedback information. As a possible implementation manner, the first generating module 220 may be further specifically configured to: the clothes processing device generates a decryption key according to the pre-stored item identification and the current time; wherein the item identifier indicates a model of the laundry treating apparatus.
As another possible implementation manner, the information processing apparatus may further include:
and the removing module is used for removing the first timestamp inserted by the server at the preset position of the instruction information in the clothes treatment.
And the encryption module is used for generating an encryption key by the clothes processing device according to the item identifier and the current time and encrypting the feedback information by adopting the encryption key.
And a transmitting module for the laundry treating apparatus to transmit the encrypted feedback information to the server.
And an inserting module for inserting the second timestamp into the preset position of the feedback information by the clothes treatment device.
According to the information processing device, the first transmission information is received from the server through the clothes processing device, the clothes processing device generates the decryption key according to the key generation rule negotiated with the server in advance, the clothes processing device decrypts the first transmission information through the decryption key to obtain the instruction information, and the clothes processing device operates according to the instruction information to generate the feedback information. Therefore, the clothes processing device receives the instruction information from the server, executes the instruction information, generates feedback information and uploads the feedback information to the server, and the safety of data transmission between the clothes processing device and the mobile terminal through the server is improved.
It should be noted that the foregoing explanation of the embodiment of the information processing method is also applicable to the information processing apparatus of this embodiment, and is not repeated here.
In order to achieve the above embodiments, the present application also proposes a laundry treating apparatus including: a memory, a processor and a computer program stored on the memory and executable on the processor, which when executing the program, implements the information processing method as described in the foregoing embodiments.
In order to implement the foregoing embodiment, the present application further provides a server, including: a memory, a processor and a computer program stored on the memory and executable on the processor, which when executing the program, implements the information processing method as described in the foregoing embodiments.
In order to implement the above embodiments, the present application also proposes a computer-readable storage medium on which a computer program is stored, characterized in that the program, when executed by a processor, implements the information processing method as described in the foregoing embodiments.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (15)

1. An information processing method, characterized by comprising the steps of:
the server acquires instruction information to be sent to the clothes treatment device from the mobile terminal;
the server generates an encryption key according to a key generation rule negotiated with the clothes treatment device in advance;
the server encrypts the instruction information according to the encryption key to obtain first transmission information;
the server transmits the first transmission information to the laundry treating apparatus.
2. The information processing method according to claim 1, wherein the server generates an encryption key according to a key generation rule negotiated in advance with the laundry processing device, including:
the server inquires item identification of the clothes processing device; wherein the item identification is used for indicating a model of the laundry treating apparatus;
and the server generates an encryption key according to the item identifier and the current time.
3. The information processing method according to claim 1 or 2, wherein before the encrypting the instruction information with the encryption key to obtain the first transmission information, the method further comprises:
and the server inserts a first timestamp at a preset position of the instruction information.
4. The information processing method according to claim 3, wherein after the server transmits the first transmission information to the laundry processing device, further comprising:
the server acquires feedback information from the laundry treating apparatus, wherein the feedback information is generated by the laundry treating apparatus according to the first transmission information;
the server generates a decryption key according to the project identification and the current time, and decrypts the feedback information by adopting the decryption key to obtain second transmission information;
and the server sends the second transmission information to the mobile terminal.
5. The information processing method according to claim 4, wherein before the server transmits the second transmission information to the mobile terminal, the method further comprises:
the server removes the second time stamp inserted by the laundry treating apparatus at the second transmission information preset position.
6. An information processing method, characterized by comprising the steps of:
the clothes processing device receives first transmission information from a server, wherein the first transmission information comprises instruction information sent by a mobile terminal;
the clothing processing device generates a decryption key according to a key generation rule negotiated with the server in advance;
the clothing processing device decrypts the first transmission information by adopting the decryption key to obtain the instruction information;
the laundry treating apparatus operates according to the instruction information to generate feedback information.
7. The information processing method according to claim 6, wherein the laundry processing device generates a decryption key according to a key generation rule negotiated in advance with the server, including:
the clothing processing device generates a decryption key according to the pre-stored item identification and the current time; wherein the item identifier indicates a model of the laundry treating apparatus.
8. The information processing method according to claim 6 or 7, wherein before the laundry processing device operates to generate the feedback information according to the instruction information, further comprising:
the laundry treating apparatus removes a first time stamp inserted by the server at the instruction information preset position.
9. The information processing method of claim 8, wherein after the laundry processing device operates according to the instruction information to generate feedback information, further comprising:
the clothes processing device generates an encryption key according to the item identifier and the current time, and encrypts the feedback information by adopting the encryption key;
the laundry treating apparatus transmits the encrypted feedback information to the server.
10. The information processing method according to claim 9, wherein before the laundry processing device transmits the encrypted feedback information to the server, further comprising:
the laundry treating apparatus inserts a second time stamp at a preset position of the feedback information.
11. An information processing apparatus characterized in that the apparatus comprises:
the acquisition module is used for acquiring instruction information to be sent to the clothes treatment device from the mobile terminal;
a generation module for generating an encryption key by the server according to a key generation rule negotiated in advance with the laundry treatment device;
the encryption module is used for encrypting the instruction information according to the encryption key to obtain first transmission information;
a transmitting module for transmitting the first transmission information to the laundry treating apparatus.
12. An information processing apparatus, applied to a laundry processing apparatus, the apparatus comprising:
the receiving module is used for receiving transmission information from a server, wherein the first transmission information comprises instruction information sent by the mobile terminal;
a first generation module, which is used for generating a decryption key by the clothing processing device according to a key generation rule negotiated with the server in advance;
the decryption module is used for decrypting the first transmission information by adopting the decryption key to obtain the instruction information;
and the second generation module is used for operating according to the instruction information to generate feedback information.
13. A laundry treating apparatus, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executing the program implements an information processing method as claimed in any of claims 6 to 10.
14. A server, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executing the program implements an information processing method as claimed in any of claims 1 to 5.
15. A computer-readable storage medium on which a computer program is stored, characterized in that the program, when executed by a processor, implements the information processing method according to any one of claims 1 to 5, or the information processing method according to any one of claims 6 to 10.
CN201811009804.2A 2018-08-31 2018-08-31 Information processing method and device and clothes processing device Active CN110875901B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811009804.2A CN110875901B (en) 2018-08-31 2018-08-31 Information processing method and device and clothes processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811009804.2A CN110875901B (en) 2018-08-31 2018-08-31 Information processing method and device and clothes processing device

Publications (2)

Publication Number Publication Date
CN110875901A true CN110875901A (en) 2020-03-10
CN110875901B CN110875901B (en) 2022-10-28

Family

ID=69715737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811009804.2A Active CN110875901B (en) 2018-08-31 2018-08-31 Information processing method and device and clothes processing device

Country Status (1)

Country Link
CN (1) CN110875901B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095920A (en) * 2020-07-29 2022-02-25 阿里巴巴集团控股有限公司 Communication method, system, apparatus, device and storage medium
CN115118523A (en) * 2022-08-22 2022-09-27 广州万协通信息技术有限公司 Security chip encryption processing method and device for adjusting encryption strategy by terminal equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android
CN104660702A (en) * 2015-03-04 2015-05-27 深圳市新联锋科技有限公司 Butt-joint method and system of third-party cloud server and private Internet of things cloud server
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
US20160226831A1 (en) * 2015-01-30 2016-08-04 Electronics And Telecommunications Research Institute Apparatus and method for protecting user data in cloud computing environment
CN106254327A (en) * 2016-07-28 2016-12-21 努比亚技术有限公司 Information processor and method
CN106850664A (en) * 2017-02-28 2017-06-13 重庆步航科技有限公司 Internet-of-things terminal method of controlling security and its system based on intelligent mobile terminal
CN108009440A (en) * 2017-11-23 2018-05-08 重庆金融资产交易所有限责任公司 Date storage method, querying method, device, storage medium and computer equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475664A (en) * 2013-09-18 2013-12-25 北京工业大学 Credible extraction method for digital evidence of Android
US20160226831A1 (en) * 2015-01-30 2016-08-04 Electronics And Telecommunications Research Institute Apparatus and method for protecting user data in cloud computing environment
CN104660702A (en) * 2015-03-04 2015-05-27 深圳市新联锋科技有限公司 Butt-joint method and system of third-party cloud server and private Internet of things cloud server
CN105827408A (en) * 2015-12-03 2016-08-03 中国航天系统工程有限公司 Timestamp technique-based industrial network security transmission method
CN106254327A (en) * 2016-07-28 2016-12-21 努比亚技术有限公司 Information processor and method
CN106850664A (en) * 2017-02-28 2017-06-13 重庆步航科技有限公司 Internet-of-things terminal method of controlling security and its system based on intelligent mobile terminal
CN108009440A (en) * 2017-11-23 2018-05-08 重庆金融资产交易所有限责任公司 Date storage method, querying method, device, storage medium and computer equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114095920A (en) * 2020-07-29 2022-02-25 阿里巴巴集团控股有限公司 Communication method, system, apparatus, device and storage medium
CN115118523A (en) * 2022-08-22 2022-09-27 广州万协通信息技术有限公司 Security chip encryption processing method and device for adjusting encryption strategy by terminal equipment
CN115118523B (en) * 2022-08-22 2022-11-08 广州万协通信息技术有限公司 Security chip encryption processing method and device for adjusting encryption strategy by terminal equipment

Also Published As

Publication number Publication date
CN110875901B (en) 2022-10-28

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
CN107395751B (en) Intelligent household appliance remote control system and method
CN106533662A (en) Methods and devices for transmitting network safety secret key
CN113114668B (en) Information transmission method, mobile terminal, storage medium and electronic equipment
CN111064572B (en) Data communication method and device
CN105024807A (en) Data processing method and system
CN105119891B (en) A kind of data interactive method, set-top box and server
CN110875901B (en) Information processing method and device and clothes processing device
KR20030097829A (en) Apparatus for providing security on a powerline-modem network
WO2016053184A1 (en) Key generation method and device
CN101931623B (en) Safety communication method suitable for remote control with limited capability at controlled end
CN111132148A (en) Method and device for configuring and accessing intelligent household electrical appliance network and storage medium
CN110505619B (en) Data transmission method in eSIM remote configuration
CN105681253B (en) Data encryption and transmission method, equipment, gateway in centralized network
CN107229874B (en) Method, device and server for realizing VR-Key
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
CN109361506B (en) Information processing method
CN110557591B (en) Network camera, video encryption transmission system and video encryption method
CN107733929B (en) Authentication method and authentication system
CA3052849A1 (en) Payment control method and device, electronic device, and storage medium
JP6491162B2 (en) Data transmission / reception method and sensing system
CN111885595B (en) Intelligent household appliance configuration networking method, device and system
CN105939193A (en) Authorization and encryption method for controlling blacklist setting of intelligent lock
CN108809632B (en) Quantum safety sleeving layer device and system
JP4974863B2 (en) File management system, file management method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant