CN111415506B - Safety encryption method of multimedia control system and multimedia terminal - Google Patents

Safety encryption method of multimedia control system and multimedia terminal Download PDF

Info

Publication number
CN111415506B
CN111415506B CN202010349521.3A CN202010349521A CN111415506B CN 111415506 B CN111415506 B CN 111415506B CN 202010349521 A CN202010349521 A CN 202010349521A CN 111415506 B CN111415506 B CN 111415506B
Authority
CN
China
Prior art keywords
multimedia
secret code
terminal
control terminal
generation rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010349521.3A
Other languages
Chinese (zh)
Other versions
CN111415506A (en
Inventor
李科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Xinchao Media Group Co Ltd
Original Assignee
Chengdu Xinchao Media Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Xinchao Media Group Co Ltd filed Critical Chengdu Xinchao Media Group Co Ltd
Priority to CN202010349521.3A priority Critical patent/CN111415506B/en
Publication of CN111415506A publication Critical patent/CN111415506A/en
Application granted granted Critical
Publication of CN111415506B publication Critical patent/CN111415506B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C19/00Electric signal transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C23/00Non-electrical signal transmission systems, e.g. optical systems
    • G08C23/04Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance

Abstract

The invention relates to the technical field of multimedia encryption communication, and discloses a safe encryption method of a multimedia control system and a multimedia terminal, when the multimedia control terminal and the multimedia terminal carry out operation communication, the invention can firstly verify whether an identification mark of the multimedia control terminal is legal or not, after the password is legal, the password generation rule and the corresponding password and the password calculation mode can be obtained, and secondly, the password generation rule obtained each time is not fixed and is randomly issued by the server, therefore, the generation rule of the cipher, the cipher and the randomness of each generation of the cipher calculation mode are ensured, the problem that the cipher is easy to crack due to the fixed cipher in the traditional remote control is avoided, and finally, the multimedia terminal also can check the encryption value fed back by the multimedia control terminal, and the function execution request sent by the multimedia control terminal can be executed only when the check is passed. Through the design, the safety of operation communication between the multimedia control terminal and the multimedia terminal is greatly improved.

Description

Safety encryption method of multimedia control system and multimedia terminal
Technical Field
The invention relates to the technical field of multimedia encryption communication, in particular to a secure encryption method of a multimedia control system and a multimedia terminal.
Background
With the rapid development of offline media, offline multimedia terminals gradually enter people's daily life, and with the popularization of the internet, more and more offline multimedia terminals are accessed to an internet platform for information distribution, so that a series of online functions such as remote control are realized. The use of the internet brings high efficiency and high convenience to the off-line multimedia terminal, and provides a mode for the network to invade the background, so that lawbreakers can easily invade the background through the networked multimedia terminal.
The conventional multimedia terminal is generally maintained, operated and checked by infrared remote control, but the infrared remote control belongs to plain code control, and a plurality of conventional universal remote controllers and mobile phones with infrared remote control functions can be simply copied by learning and other modes, so that the multimedia terminal is controlled, and the safety performance is low; therefore, the existing multimedia terminal mostly adopts a fixed encryption remote control mode to realize information interaction between the remote controller and the multimedia terminal, the fixed encryption remote control is generally encrypted by a mode that the remote controller generates a random number and a fixed password combination, although the mode has certain encryption safety performance, because the generated password is fixed, the risk of being cracked by high probability still exists after the password is learned for many times, and once the password is leaked, the threat to other multimedia terminals under the whole platform can be caused. Therefore, how to improve the encryption of the communication between the multimedia terminal and the infrared remote control under the line becomes a problem to be solved urgently.
Disclosure of Invention
In order to solve the problems of no encryption or simple encryption mode and poor safety caused by relatively fixed ciphers in the existing communication technology between the infrared remote control and the multimedia terminal, the invention aims to provide a safe encryption method of a multimedia control system, the multimedia terminal and multimedia equipment, which can refresh the cipher generation rule and the ciphers in time and improve the encryption safety.
In a first aspect, the present invention provides a secure encryption method for a multimedia control system, including:
the method comprises the steps that a multimedia control terminal sends a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal;
the multimedia terminal receives the function execution request sent by the multimedia control terminal, judges whether the identification mark is legal or not, and sends a password generation rule application request to a server if the identification mark is legal, so that the server generates a password generation rule according to the password generation rule application request;
the multimedia terminal receives the cipher code generation rule fed back by the server, generates a cipher code and a cipher code calculation mode according to the cipher code generation rule, and sends the cipher code and the cipher code calculation mode to the multimedia control terminal;
the multimedia control terminal receives the secret code and the secret code calculation mode sent by the multimedia terminal, and calculates to obtain an encrypted value according to the secret code and the secret code calculation mode;
the multimedia control terminal sends the encrypted value to the multimedia terminal;
and the multimedia terminal receives the encrypted value sent by the multimedia control terminal, verifies the encrypted value and the identification mark, and executes the function execution request after the verification is passed.
Based on the invention, when the multimedia control terminal communicates with the multimedia terminal, whether the multimedia control terminal is legal or not can be judged according to the identification mark, and only after the multimedia control terminal is legal, the multimedia terminal can apply to the server to issue the password generation rule. The step can carry out equipment verification and prevent an illegal multimedia control terminal from joining communication; meanwhile, after receiving the password generation rule request, the server randomly issues a password generation rule to the multimedia terminal, so that the multimedia terminal generates a password and a password calculation mode according to the issued password generation rule, the step realizes the randomness of the generation of the password and the password calculation mode, and avoids the problem of easy cracking caused by the fixation of the password; in addition, the multimedia control terminal can generate an encrypted value according to the secret code and a secret code calculation mode and feed the encrypted value back to the multimedia terminal, the multimedia terminal can verify the encrypted value and the identification mark finally, and the multimedia terminal can execute the function request sent by the multimedia control terminal only after the verification is passed.
In one possible design, after the multimedia control terminal sends the function execution request to the multimedia terminal, the method further includes:
if the secret code and the secret code calculation mode fed back by the multimedia terminal are not received within a first preset time length, performing abnormal alarm;
and if the secret code and the secret code calculation mode fed back by the multimedia terminal are not received after a second preset time length, automatically recovering to the initial state, wherein the second preset time length is longer than the first preset time length.
Based on the invention content, the operation of automatically recovering to the initial state and the reminding of the multimedia control terminal receiving abnormity can be realized by presetting the password and the receiving duration of the password calculation mode. Firstly, if the password and the password calculation mode are not received within a first preset time, it is indicated that the multimedia control terminal is abnormal in reception, and an abnormal alarm can be sent to prompt a user of abnormal reception (for example, a light, sound or sound-light alarm mode is used for prompting), so that the user can conveniently process the abnormal reception in time. And when the first preset time length is exceeded and the password calculation mode are not received after the second preset time length, the multimedia control terminal gives up the operation, returns to the initial state and waits for the next operation of the user.
In one possible design, the multimedia terminal verifies the identification mark and the encrypted value;
performing a first-order check and a second-order check on the identification mark and the encrypted value; wherein the content of the first and second substances,
the first-order verification comprises:
calculating to obtain a check encryption value according to the secret code and the secret code calculation mode;
verifying the encrypted value according to the verified encrypted value;
the second-order verification comprises:
judging whether the identification mark is legal or not;
wherein the function execution request is executed when both the first order check and the second order check pass.
The content discloses a specific process of verification, which comprises a first-order and a second-order verification, wherein the first-order verification is an inverse verification process of an encrypted value, namely, the multimedia terminal calculates by using a secret code and a secret code calculation mode to obtain a verified encrypted value, and the first-order verification can be passed only when the verified encrypted value is equal to the encrypted value; meanwhile, whether the multimedia control terminal is legal or not needs to be judged again according to the identification mark, and the second-order verification can be passed only when the multimedia control terminal is legal. Through the design, the communication safety of the multimedia terminal and the multimedia control terminal can be further improved.
In a possible design, the multimedia control terminal calculates an encrypted value according to the secret code and the secret code calculation method, and further includes:
the multimedia control terminal receives the secret code and the secret code calculation mode sent by the multimedia terminal, generates a random number, and calculates according to the secret code, the random number and the secret code calculation mode to obtain the encrypted value;
the multimedia control terminal sends the encrypted value and the random number to the multimedia terminal;
the multimedia terminal receives the random number and the encrypted value sent by the multimedia control terminal, verifies the random number and the encrypted value, and executes the function execution request after the verification is passed;
wherein, the multimedia terminal checks the identification mark and the random number, and comprises:
performing a first-order check and a second-order check on the identification mark and the encrypted value; wherein the content of the first and second substances,
the first-order verification comprises:
calculating to obtain a check encryption value according to the secret code, the random number and the secret code calculation mode;
verifying the encrypted value according to the verified encrypted value;
the second-order verification comprises:
judging whether the identification mark is legal or not;
wherein the function execution request is executed when both the first order check and the second order check pass.
Based on the invention content, the multimedia control terminal generates a random number after receiving the secret code and the secret code generation rule, and participates the random number in the calculation of the encrypted value. Through the design, the security of the encrypted value can be further improved, and the risk of being cracked is reduced.
In one possible design, after the multimedia terminal sends a cipher generation rule application request to the server, the method further includes:
if the password generation rule is not received within the preset time length, generating the password and the password calculation mode by using the password generation rule with the shortest time to the password generation rule; or
And if the password generation rule is not received within the preset time, randomly selecting a password generation rule from a password generation rule base to generate the password and the password calculation mode.
Based on the above disclosure, the multimedia terminal can adopt the above two modes to quickly acquire the password and the password calculation mode when the server does not timely feed back the password generation rule, and perform subsequent steps to ensure the timeliness of encrypted communication.
In a second aspect, the present invention provides a multimedia terminal, including a rule generating unit, a verifying unit, an executing unit, a judging unit, a first sending unit and a first receiving unit;
the first receiving unit is configured to receive a function execution request sent by a multimedia control terminal, where the function execution request includes an identifier of the multimedia control terminal;
the judging unit is used for judging whether the identification mark is legal or not;
the first sending unit is used for sending a password generation rule application request to a server after the judging unit judges that the identification mark is legal, so that the server generates a password generation rule according to the password generation rule application request;
the first receiving unit is further configured to receive the cipher generation rule fed back from the server;
the rule generating unit is used for generating a secret code and a secret code calculation mode according to the secret code generating rule;
the first sending unit is further configured to send the secret code and the secret code calculation mode to the multimedia control terminal, so that the multimedia control terminal generates an encrypted value according to the secret code and the secret code calculation mode;
the first receiving unit is further configured to receive the encrypted value sent by the multimedia control terminal;
the verification unit is used for verifying the identification mark and the encrypted value;
and the execution unit is used for executing the function execution request after the verification of the verification unit is passed.
In a possible design, the first receiving unit is further configured to receive a random number sent by the multimedia control terminal.
In a possible design, the rule generating unit is further configured to generate the secret code and the secret code calculation mode by using the secret code generation rule with the shortest time to the current secret code generation rule when the secret code generation rule is not received within a preset time; or
And randomly selecting one cipher generation rule from a cipher generation rule base to generate the cipher and the cipher calculation mode.
In a third aspect, the present invention provides a multimedia control terminal, which includes an encryption value generating unit, a second transmitting unit and a second receiving unit;
the second sending unit is used for sending a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal;
the second receiving unit is configured to receive a secret code and a secret code calculation manner sent by the multimedia terminal, where the secret code and the secret code calculation manner are obtained by requesting a server after the multimedia terminal receives the function execution request;
the encrypted value generating unit is used for calculating to obtain an encrypted value according to the secret code and the secret code calculation mode;
the second sending unit is further configured to send the encrypted value to the multimedia terminal, so that the multimedia terminal verifies the encrypted value.
In one possible design, the multimedia control terminal further includes a random number generation unit;
the random number generating unit is used for generating a random number after receiving the secret code sent by the multimedia terminal and the secret code calculation mode;
wherein the content of the first and second substances,
the encrypted value generating unit is further used for calculating to obtain the encrypted value according to the secret code, the random number and the secret code calculation mode;
the second sending unit is further configured to send the encrypted value and the random number to the multimedia terminal, so that the multimedia terminal verifies the encrypted value.
In one possible design, the multimedia control terminal further comprises an abnormality alarm unit and a reset unit;
the abnormity alarm unit is used for alarming abnormity when the second receiving unit does not receive the secret code and the secret code calculation mode fed back by the multimedia terminal within a first preset time length;
and the resetting unit is used for automatically recovering the initial state of the password and the password calculation mode fed back by the multimedia terminal after the second preset time length is not received by the second receiving unit, wherein the second preset time length is longer than the first preset time length.
In a fourth aspect, the present invention provides a multimedia device, comprising a memory, a processor and a transceiver, which are communicatively connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for sending and receiving messages, and the processor is used for reading the computer program and executing the secure encryption method of the multimedia control system according to any one of the first aspect.
In a fifth aspect, the present invention provides a computer-readable storage medium having stored thereon instructions which, when run on a computer, perform the secure encryption method of the multimedia control system according to any one of the first aspects.
In a sixth aspect, the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the secure encryption method of the multimedia control system according to any of the above aspects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a security encryption method of a multimedia control system according to a first embodiment of the present invention.
Fig. 2 is a flow chart illustrating a security encryption method of a second multimedia control system according to the present invention.
Fig. 3 is a schematic structural diagram of a multimedia control terminal provided by the present invention.
Fig. 4 is a schematic structural diagram of a multimedia terminal provided by the present invention.
Fig. 5 is a schematic structural diagram of a multimedia device provided by the present invention.
Fig. 6 is a schematic structural diagram of a multimedia encryption system provided by the present invention.
Detailed Description
The invention is further described with reference to the following figures and specific embodiments. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. Specific structural and functional details disclosed herein are merely illustrative of example embodiments of the invention. This invention may, however, be embodied in many alternate forms and should not be construed as limited to the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that, for the term "and/or" as may appear herein, it is merely an associative relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, B exists alone, and A and B exist at the same time; for the term "/and" as may appear herein, which describes another associative object relationship, it means that two relationships may exist, e.g., a/and B, may mean: a exists independently, and A and B exist independently; in addition, for the character "/" that may appear herein, it generally means that the former and latter associated objects are in an "or" relationship.
It will be understood that when an element is referred to herein as being "connected," "connected," or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Conversely, if a unit is referred to herein as being "directly connected" or "directly coupled" to another unit, it is intended that no intervening units are present. In addition, other words used to describe the relationship between elements should be interpreted in a similar manner (e.g., "between … …" versus "directly between … …", "adjacent" versus "directly adjacent", etc.).
It is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, numbers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
It should be understood that specific details are provided in the following description to facilitate a thorough understanding of example embodiments. However, it will be understood by those of ordinary skill in the art that the example embodiments may be practiced without these specific details. For example, systems may be shown in block diagrams in order not to obscure the examples in unnecessary detail. In other instances, well-known processes, structures and techniques may be shown without unnecessary detail in order to avoid obscuring example embodiments.
Examples
As shown in fig. 1, the secure encryption method of the multimedia control system according to the first aspect of the present embodiment is suitable for being executed at a multimedia control end, a multimedia terminal, and a server side, and may include, but is not limited to, the following steps S101 to S106.
S101, the multimedia control terminal sends a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal.
Step S101 is a process in which the multimedia control terminal sends an operation request to the multimedia terminal, that is, the multimedia control terminal sends a function execution request to the multimedia terminal, in this embodiment, in order to verify whether the multimedia control terminal is legal, the function execution request sent by the multimedia control terminal further includes its own identification mark, so that the multimedia terminal can verify the validity of the identification mark, thereby preventing an unauthorized terminal from being added to the operation communication.
In this embodiment, the identification flag of the multimedia control terminal may be, but is not limited to: unique identification id (identity document) of the multimedia control terminal.
In this embodiment, the function execution request sent by the multimedia control terminal may be, but is not limited to: the function execution request is generated by direct operation of a user on the multimedia control terminal, for example, the user directly uses a function key on the multimedia control terminal to perform function operation (for example, pressing a menu function key, a networking function key, switching the function key, entering a background server and the like), that is, a function execution request corresponding to the key function is generated every time the function key is pressed.
In this embodiment, the example multimedia control terminal may be, but is not limited to: infrared remote controller, bluetooth remote controller, wired remote controller.
After receiving the function execution request, the multimedia terminal may proceed to step S102.
And S102, the multimedia terminal receives the function execution request sent by the multimedia control terminal, judges whether the identification mark is legal or not, and sends a password generation rule application request to a server if the identification mark is legal, so that the server generates a password generation rule according to the password generation rule application request.
The step S102 is a process of performing validity verification on the multimedia control terminal after the multimedia terminal receives the function execution request, the multimedia terminal verifies the identification mark and determines whether the identification mark is valid, and only after the identification mark is verified to be valid, the multimedia terminal applies to the server to send the cipher generation rule to the server. In this embodiment, if the identification mark of the multimedia control terminal is determined to be illegal, the multimedia control terminal directly ends the operation. Through the design, the equipment identification of the multimedia control terminal can be realized, the illegal multimedia control terminal is prevented from being added into communication, and the server is prevented from being invaded through the multimedia terminal.
In this embodiment, the criteria for the multimedia terminal to verify the validity of the identification mark are as follows: and judging whether the identification mark is in the identification mark library. For example, if the identifier is the unique identifier I D of the multimedia controlling terminal, the identifier library contains the unique identifiers I D of all multimedia controlling terminals under the multimedia controlling terminal.
In this embodiment, the obtaining of the example identifier library may include, but is not limited to, the following manners: (1) the identification mark is stored in the multimedia terminal, and after the multimedia terminal receives the identification mark, the identification mark is directly checked from a local identification mark library of the multimedia terminal, and whether the identification mark sent by the multimedia control terminal is in the library or not is judged; (2) if the identification mark is stored in the server, the identification mark library is obtained from the server after the multimedia terminal receives the identification mark of the multimedia control terminal.
And S103, the multimedia terminal receives the cipher code generation rule fed back by the server, generates a cipher code and a cipher code calculation mode according to the cipher code generation rule, and sends the cipher code and the cipher code calculation mode to the multimedia control terminal.
Step S103 is a process in which the multimedia terminal generates a corresponding password and a password calculation manner according to the password generation rule issued by the server, and since the password generation rule issued by the server is not fixed, the password generation rule received by the multimedia terminal is random each time the multimedia control terminal sends a function execution request (i.e., each time a new operation is performed), i.e., the password and the password calculation manner generated by the multimedia terminal each time are random and not fixed. Through the design, the generation rule of the cipher, the cipher and the randomness generated by the cipher calculation mode are ensured, the problem that the cipher is easy to crack due to the fact that the cipher is fixed in the traditional remote control is solved, and the encryption safety is greatly improved.
In this embodiment, the example server is provided with a secret code generation rule base, and all secret code generation rules are stored in the example server. After receiving the request for the cipher code generation rule, the server randomly reads a cipher code generation rule from the cipher code generation rule base and feeds the cipher code generation rule back to the multimedia terminal.
Here, it is explained that: each cipher generation rule has its own corresponding cipher and cipher calculation method, and in this embodiment, examples of the cipher generation rule may include, but are not limited to:
(1) digital cipher generation rules: the ciphers are 12-bit random numbers and are calculated as a random combination of "+, -, ×, ÷ values.
(2) An alphabet type cipher generation rule, wherein a corresponding cipher is a binary number string of ASC I corresponding to a randomly generated 2-bit alphabet, the last 8 bits of the binary number string are taken, and if the number of the bits is less than 8, 0 is supplemented in the front; the secret code is calculated in the form of! A random combination of (logical not), & (logical and), ii (logical or).
For example, the multimedia terminal receives the alphabet type secret code generation rule, the generated secret code is { A, B }, and the binary number string of ASC i corresponding to the alphabet A, B is { 01000001, 01000010 }, and the calculation method of the generation may be, but is not limited to: { &, II }.
In order to prevent the multimedia terminal from not receiving the password generation rule within the preset duration and causing communication delay, in this embodiment, the following two ways are provided for acquiring the password and the password generation way, so as to ensure the timeliness of encrypted communication, which are respectively as follows:
the first mode is as follows:
and generating the secret code and the secret code calculation mode by utilizing the secret code generation rule with the shortest time to the secret code generation rule at the time.
In the process of data communication between the multimedia terminal and the server, there are communication records, that is, each time the server sends the password generation rule to the multimedia terminal, the server records the password generation rule in the server, so the first mode is to use a mode of directly reading the communication records between the multimedia terminal and the server to realize the acquisition of the password and the password calculation mode.
In this embodiment, for example, in the communication record with the server, the obtained record is: the secret code generation rule with the shortest time interval to the current secret code generation rule is obtained, and the secret code corresponding to the secret code generation rule and the secret code calculation mode are further obtained. For example, the secret code generation rule that the server last sent to the multimedia terminal is: and if the digital cipher code generation rule is adopted, the cipher code and the cipher code calculation mode corresponding to the digital cipher code generation rule are acquired by the multimedia terminal.
Of course, in this embodiment, the read record may be only the secret code generation rule that has the shortest time to the secret code generation rule of this time, and may be any one of all secret code generation rules issued in the server communication record.
The second mode is as follows:
and randomly selecting one cipher generation rule from a cipher generation rule base to generate the cipher and the cipher calculation mode.
The second way is to store a secret code generation rule base containing all secret code generation rules directly on the multimedia terminal or the server. If the password generation rule base is stored in the multimedia terminal, the multimedia terminal can directly read the password generation rule base in the local password generation rule base when the multimedia terminal cannot receive the password generation rule in the preset time length; if the password generation rule base is stored in the server, and the multimedia terminal does not receive the password generation rule within the preset time, the multimedia terminal can directly establish communication connection with the server, read any password generation rule in the password generation rule base, and obtain the password corresponding to the password generation rule and the password calculation mode.
Through the two modes, the multimedia terminal can acquire the password generation rule in time, generate the password and the password calculation mode, and send the password and the password calculation mode to the multimedia control terminal to perform subsequent steps, so that the timeliness of encrypted communication between the multimedia control terminal and the multimedia terminal is ensured.
In this embodiment, the preset duration may be, but is not limited to: 150ms, 200ms or 250 ms.
After generating the secret code and the secret code calculation mode, the multimedia terminal issues the secret code and the secret code calculation mode to the multimedia control terminal, and provides a data basis for generating the encrypted value, namely, step S104 is performed.
And S104, the multimedia control terminal receives the secret code and the secret code calculation mode sent by the multimedia terminal, and calculates to obtain an encrypted value according to the secret code and the secret code calculation mode.
The step S104 is an encryption process, that is, the multimedia control terminal encrypts the password and the password calculation method sent by the multimedia terminal after receiving the password and the password calculation method, where the encryption process is as follows: and substituting the secret code into a secret code calculation mode for calculation to generate an encrypted value.
For example, if the secret code received by the multimedia control terminal is the letter D, F, the corresponding ASC i binary number string is {01000100, 01000110}, and the received secret code is calculated as follows: { & &! Then, the calculation formula of the encryption value is: "01000100 & & 01000110".
After the multimedia control terminal obtains the encrypted value according to the secret code and the secret code calculation mode, the encrypted value is fed back to the multimedia terminal, so that the multimedia terminal can conveniently perform encryption verification, namely step S105 and step S106 are performed.
And S105, the multimedia control terminal sends the encrypted value to the multimedia terminal.
And S106, the multimedia terminal receives the encrypted value sent by the multimedia control terminal, verifies the identification mark and the encrypted value, and executes the function execution request after the verification is passed.
The step S106 is a process of performing encryption verification, and when the multimedia control terminal feeds back the encrypted value to the multimedia terminal, the multimedia terminal verifies the encrypted value and the identification flag, and finally, the multimedia terminal determines whether to execute the function execution request sent by the multimedia control terminal according to a verification result.
In this embodiment, the verification of the identification flag and the encrypted value includes a first-order verification and a second-order verification.
The first-order verification comprises:
and calculating to obtain a check encryption value according to the secret code and the secret code calculation mode.
And verifying the encrypted value according to the verified encrypted value.
The principle of the first-order check is as follows: and then judging whether the check encryption value is equal to the encryption value sent by the multimedia control terminal, if so, indicating that the first-order check is passed, otherwise, indicating that the first-order check is not passed, and failing to check.
In this embodiment, the secret code calculation method and the secret code are directly obtained from the multimedia terminal, that is, the secret code and the secret code calculation method obtained in step S103 are not sent to the multimedia terminal by the multimedia control terminal.
For example, if the secret code sent by the multimedia terminal to the multimedia control terminal is the letter D, F, the corresponding ASC i binary string is {01000100, 01000110}, and the secret code generated by the multimedia terminal is calculated as follows: { & &! And then, the calculation formula for checking the encryption value is: and 01000100 and 01000110, and finally judging whether the verification encryption value is equal to the encryption value or not, so that the first-order verification can be verified.
The second-order verification comprises:
and judging whether the identification mark is legal or not.
After receiving the encrypted value, the multimedia terminal may further perform validity check on the identification flag of the multimedia control terminal again, where the check flag is consistent with that in step S102, which is not described herein again.
Through the design, the information sent by the multimedia control terminal can be verified twice by using the first-order and second-order verification, so that the encryption security of the communication between the multimedia control terminal and the multimedia terminal is greatly improved.
The multimedia terminal executes the function execution request sent by the multimedia control terminal only when the first-order verification and the second-order verification both pass successfully; otherwise, the multimedia terminal ends the operation, returns to the initial state, and waits for the next operation.
In this embodiment, after the multimedia control terminal sends a function execution request to the multimedia terminal, the following steps S101a to S101b are further included in order to remind the user that the multimedia control terminal receives an exception and to reset the multimedia control terminal.
And S101a, if the cipher and the cipher calculation mode fed back by the multimedia terminal are not received within a first preset time, performing abnormal alarm.
Step S101a is to remind the user that the multimedia control terminal is abnormal in reception, and the secret code calculation method fed back from the multimedia terminal are not received within the first preset time period, so that the user can timely re-send the secret code and the secret code calculation method (for example, re-press the function button).
In this embodiment, for example, the first preset time period may be, but is not limited to, 2.5s, 3s, or 3.2s, and meanwhile, the exception alarm may be, but is not limited to: generating light, sound or acousto-optic prompts. For example: emitting red light flickering or red light constant brightness on the multimedia control terminal; the audible alert may be, but is not limited to, a continuous beep, a continuous drip, etc. on the multimedia control terminal; the acousto-optic cues may be, but are not limited to: and emitting red light flickering on the multimedia control terminal, and carrying out continuous dripping.
And S101b, if the cipher and the cipher calculation mode fed back by the multimedia terminal are not received after a second preset time length, automatically recovering to the initial state, wherein the second preset time length is longer than the first preset time length.
In step S101b, the multimedia control terminal abandons the current operation and performs a reset process. For example: if the multimedia control terminal exceeds the first preset time (such as 3.2s) and does not receive the password and the password calculation mode after the second preset time (such as 2.5 minutes, 3 minutes, 3.5 minutes and the like), the multimedia control terminal automatically abandons the operation, resets the operation, converts the operation into an initial state and waits for the next operation of the user.
In this embodiment, after the multimedia control terminal is reset, the multimedia control terminal may send a light, sound or sound-light prompt different from the abnormal reception. If the received abnormity is a red light flashing prompt, the reset can be prompted by the yellow light and the normal brightness.
Therefore, through the security encryption method of the multimedia control system described in detail in the steps S101 to S106, when the multimedia control terminal and the multimedia terminal perform operation communication, three-step verification can be performed, firstly, whether the identification mark of the multimedia control terminal is legal or not is verified, and after the identification mark is legal, the cipher generation rule and the corresponding cipher and the cipher calculation mode thereof can be obtained, secondly, because the cipher generation rule obtained each time is unfixed and randomly issued by the server, the randomness of the cipher generation rule, the cipher and the cipher calculation mode generated each time is ensured, the problem that the traditional remote control is easy to crack due to the fact that the cipher is fixed is avoided, finally, the multimedia terminal also performs verification on the encryption value fed back by the multimedia control terminal, the encryption result is comprehensively judged through two independent verifications in the verification, and only when the two verifications are passed, the function execution request transmitted from the multimedia control terminal can be executed. Through the design, the safety of operation communication between the multimedia control terminal and the multimedia terminal is greatly improved.
In one possible design, as shown in fig. 2, a second aspect of the present embodiment provides another secure encryption method for a multimedia control system, which is different from the encryption method provided by the first aspect in that: after receiving the secret code and the secret code generation rule sent by the multimedia terminal, the multimedia control terminal generates a random number and brings the random number into the operation of the encrypted value, and the whole process is shown as steps S201 to S206.
S201, the multimedia control terminal sends a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal.
S202, the multimedia terminal receives the function execution request sent by the multimedia control terminal, judges whether the identification mark is legal or not, and sends a password generation rule application request to a server if the identification mark is legal, so that the server generates a password generation rule according to the password generation rule application request.
And S203, the multimedia terminal receives the secret code generation rule fed back by the server, generates a secret code and a secret code calculation mode according to the secret code generation rule, and sends the secret code and the secret code calculation mode to the multimedia control terminal.
And S204, the multimedia control terminal receives the secret code and the secret code calculation mode sent by the multimedia terminal, generates a random number, and calculates to obtain an encrypted value according to the secret code, the secret code calculation mode and the random number.
S205, the multimedia control terminal sends the encrypted value and the random number to the multimedia terminal.
S206, the multimedia terminal receives the encrypted value and the random number sent by the multimedia control terminal, verifies the encrypted value and the identification mark, and executes the function execution request after the verification is passed.
In the second aspect of this embodiment, the processes, principles and achieved technical effects of the steps S201 to S203 are the same as those of the steps S101 to S103 in the first aspect, and are not repeated herein.
In the second aspect of this embodiment, after receiving the secret code and the secret code generation rule, the multimedia control terminal generates a random number first, and substitutes the random number and the secret code into the secret code calculation method to obtain the encrypted value, i.e. step S204. Through the design, compared with the encryption method provided by the first aspect, the encryption security is further improved, and the risk of the encrypted value being cracked is reduced.
For example, if the secret code received by the multimedia control terminal is the letter D, F, the corresponding ASC i binary number string is {01000100, 01000110}, and the received secret code is calculated as follows: { & &! }; the random number generated by the multimedia control terminal is 156 (converted to binary 10011010), and the formula for calculating the cryptographic value is: "01000100 & & 01000110! 10011010". The cryptographic value can be obtained by the above formula.
In the second aspect of this embodiment, the first-order check is changed to:
and calculating to obtain a check encryption value according to the secret code, the random number and the secret code calculation mode.
And verifying the encrypted value according to the verified encrypted value.
The check-secret value in the second aspect of this embodiment differs from the check-secret value in the first aspect described above in that: the random number is also substituted into the cipher calculation mode for calculation.
For example, if the secret code sent by the multimedia terminal to the multimedia control terminal is the letter D, F, the corresponding ASC i binary string is {01000100, 01000110}, and the secret code generated by the multimedia terminal is calculated as follows: { & &! }; the random number uploaded by the multimedia control terminal is 156 (due to the binary number string issued by the multimedia terminal, the uploaded random number should also be converted into binary, 156 is converted into binary 10011010), and then the calculation formula for checking the encryption value is: "01000100 & & 01000110! 10011010 ", and finally, judging whether the verification secret value is equal to the secret value, thereby completing the verification.
The second-order verification in the second aspect of this embodiment is the same as the second-order verification provided in the first aspect, and the method is not repeated herein.
Compared with the encryption method provided by the first aspect, the encryption method provided by the second aspect of the embodiment can further improve the encryption security. Of course, the encryption methods provided by the first aspect and the second aspect in this embodiment belong to a parallel relationship, and even if the secure encryption method of the multimedia control system provided by the first aspect or the second aspect is used, the security of the operation communication between the multimedia control terminal and the multimedia terminal can be improved.
In a possible design, as shown in fig. 3, a third aspect of the present embodiment provides a hardware apparatus for implementing the multimedia control terminal in the first aspect of the present embodiment or the second aspect of the present embodiment, and includes an encryption value generating unit, a second transmitting unit, and a second receiving unit.
The second sending unit is configured to send a function execution request to the multimedia terminal, where the function execution request includes an identifier of the multimedia control terminal.
And the second receiving unit is used for receiving the password and the password calculation mode sent by the multimedia terminal, wherein the password and the password calculation mode are obtained by requesting a server after the multimedia terminal receives the function execution request.
And the encrypted value generating unit is used for calculating to obtain an encrypted value according to the secret code and the secret code calculation mode.
The second sending unit is further configured to send the encrypted value to the multimedia terminal, so that the multimedia terminal verifies the encrypted value.
In one possible design, the multimedia control terminal provided in the third aspect of this embodiment further includes a random number generation unit.
And the random number generating unit is used for generating a random number after receiving the secret code and the secret code calculation mode sent by the multimedia terminal.
Wherein the content of the first and second substances,
the encrypted value generating unit is further configured to calculate the encrypted value according to the secret code, the random number, and the secret code calculation method.
The second sending unit is further configured to send the encrypted value and the random number to the multimedia terminal, so that the multimedia terminal verifies the encrypted value.
When the multimedia control terminal generates the random number, the encrypted value generating unit substitutes the random number into the calculation to generate the encrypted value, and the specific working process of the encrypted value can be referred to in the second aspect of the embodiment.
In one possible design, the multimedia control terminal further comprises an abnormality alarming unit and a resetting unit.
And the abnormity alarm unit is used for alarming abnormity when the second receiving unit does not receive the secret code fed back by the multimedia terminal and the secret code calculation mode within a first preset time length.
And the resetting unit is used for automatically recovering the initial state of the password and the password calculation mode fed back by the multimedia terminal after the second preset time length is not received by the second receiving unit, wherein the second preset time length is longer than the first preset time length.
For the working process, the working details, and the technical effects of the foregoing device provided in the third aspect of this embodiment, reference may be made to the communication method and the communication process of the multimedia control terminal in the first aspect of this embodiment or the second aspect of this embodiment, which are not described herein again.
In a possible design, as shown in fig. 4, a fourth aspect of this embodiment provides a hardware apparatus for implementing the multimedia terminal in the first aspect of this embodiment or the second aspect of this embodiment, and includes a rule generating unit, a verifying unit, an executing unit, a determining unit, a first sending unit, and a first receiving unit.
The first receiving unit is configured to receive a function execution request sent by a multimedia control terminal, where the function execution request includes an identifier of the multimedia control terminal.
And the judging unit is used for judging whether the identification mark is legal or not.
The first sending unit is used for sending a password generation rule application request to a server after the judging unit judges that the identification mark is legal, so that the server generates a password generation rule according to the password generation rule application request.
The first receiving unit is further configured to receive the cipher generation rule fed back from the server.
And the rule generating unit is used for generating the cipher and the cipher calculating mode according to the cipher generating rule.
The first sending unit is further configured to send the secret code and the secret code calculation mode to the multimedia control terminal, so that the multimedia control terminal generates an encrypted value according to the secret code and the secret code calculation mode.
The first receiving unit is further configured to receive the encrypted value sent by the multimedia control terminal.
And the verification unit is used for verifying the identification mark and the encrypted value.
And the execution unit is used for executing the function execution request after the verification of the verification unit is passed.
In a possible design of the multimedia terminal provided in the fourth aspect of this embodiment, the first receiving unit is further configured to receive a random number sent by the multimedia control terminal.
When the multimedia terminal receives the random number and the encrypted value, please refer to the second aspect of this embodiment for a specific working process.
In a possible design, the rule generating unit is further configured to generate the secret code and the secret code calculation manner by using the secret code generation rule with the shortest time distance from the current secret code generation rule or randomly select one secret code generation rule from a secret code generation rule library to generate the secret code and the secret code calculation manner when the secret code generation rule is not received within a preset time.
For a working process, working details, and technical effects of the hardware device provided in the fourth aspect of this embodiment, reference may be made to the communication method and process of the multimedia terminal in the first aspect of the embodiment or the second aspect of the embodiment, which are not described herein again.
In one possible design, as shown in fig. 5, a fifth aspect of this embodiment provides a multimedia device for performing the secure encryption method of the multimedia control system according to the first aspect of the embodiment or the second aspect of the embodiment, and the multimedia device includes a memory, a processor, and a transceiver, which are communicatively connected in sequence, where the memory is used for storing a computer program, the transceiver is used for transceiving a message, and the processor is used for reading the computer program and performing the secure encryption method of the multimedia control system according to the first aspect of the embodiment or the second aspect of the embodiment.
By way of specific example, the Memory may include, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Flash Memory (Flash Memory), a first-in-first-out Memory (FIFO), a first-in-last-out Memory (FILO), and/or the like; the processor may not be limited to the use of a microprocessor model number STM32F105 family; the transceiver may be, but is not limited to, a WiFi (wireless fidelity) wireless transceiver, a bluetooth wireless transceiver, a General Packet Radio Service (GPRS) wireless transceiver, and/or a ZigBee protocol (ZigBee) wireless transceiver, etc. In addition, the multimedia terminal may include, but is not limited to, a power module, a display screen, and other necessary components.
In one possible design, as shown in fig. 6, a sixth aspect of this embodiment further provides a multimedia encryption system, where the multimedia encryption system includes the multimedia control terminal, the multimedia terminal, and the server in the first aspect of this embodiment or the second aspect of this embodiment.
The multimedia control terminal is used for sending a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal.
And the multimedia terminal is in communication connection with the multimedia control terminal and is used for judging whether the identification mark is legal or not after receiving the function execution request and sending a password generation rule application request to the server after judging that the identification mark is legal.
And the server is in communication connection with the multimedia terminal and is used for generating the password generation rule after receiving the password generation rule application request and sending the password generation rule to the multimedia terminal.
And the multimedia terminal is also used for generating a secret code and a secret code calculation mode after receiving the secret code generation rule and sending the secret code and the secret code calculation mode to the multimedia control terminal.
And the multimedia control terminal is also used for generating an encrypted value after receiving the secret code and the secret code calculation mode and sending the encrypted value to the multimedia terminal.
And the multimedia terminal is also used for verifying the identification mark and the encrypted value after receiving the encrypted value, and executing the function execution request after the verification is passed.
For a working process, working details, and technical effects of the master device provided in the sixth aspect of this embodiment, reference may be made to the first aspect of the embodiment or the second aspect of the embodiment, which are not described herein again.
In a possible design, a seventh aspect of the present embodiment provides a computer-readable storage medium storing instructions that include the secure encryption method of the multimedia control system according to the first aspect of the embodiment or the second aspect of the embodiment, that is, the computer-readable storage medium stores instructions that, when executed on a computer, perform the secure encryption method of the multimedia control system according to the first aspect of the embodiment or the second aspect of the embodiment. The computer-readable storage medium refers to a carrier for storing data, and may include, but is not limited to, floppy disks, optical disks, hard disks, flash memories, flash disks and/or Memory sticks (Memory sticks), etc., and the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
For a working process, working details, and technical effects of the computer-readable storage medium provided in this embodiment, reference may be made to the first aspect of the embodiment or the second aspect of the embodiment, which are not described herein again.
In one possible design, the present invention provides a computer program product comprising instructions that, when executed on a computer, cause the computer to perform the secure encryption method of the multimedia control system according to the first aspect of the embodiment or the second aspect of the embodiment, wherein the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable apparatus.
The embodiments described above are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device to perform the methods described in the embodiments or some portions of the embodiments.
The invention is not limited to the above alternative embodiments, and any other various forms of products can be obtained by anyone in the light of the present invention, but any changes in shape or structure thereof, which fall within the scope of the present invention as defined in the claims, fall within the scope of the present invention.

Claims (6)

1. A secure encryption method for a multimedia control system, comprising:
the method comprises the steps that a multimedia control terminal sends a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal;
the multimedia terminal receives a function execution request sent by the multimedia control terminal;
the multimedia terminal judges whether the identification mark is legal or not, and if so, sends a password generation rule application request to a server so that the server generates a password generation rule according to the password generation rule application request;
the multimedia terminal generates a secret code and a secret code calculation mode according to the secret code generation rule fed back by the server;
the multimedia terminal sends the secret code and the secret code calculation mode to the multimedia control terminal;
the multimedia control terminal receives the cipher and the cipher calculation mode sent by the multimedia terminal;
the multimedia control terminal calculates to obtain an encrypted value according to the secret code and the secret code calculation mode;
the multimedia control terminal sends the encrypted value to the multimedia terminal;
the multimedia terminal receives the encrypted value sent by the multimedia control terminal, verifies the identification mark and the encrypted value, and executes the function execution request after the verification is passed;
the multimedia terminal verifying the identification mark and the encrypted value comprises the following steps:
the multimedia terminal performs first-order verification and second-order verification on the identification mark and the encrypted value; wherein the first order check comprises:
calculating to obtain a check encryption value according to the secret code and the secret code calculation mode;
verifying the encrypted value according to the verified encrypted value;
the second-order verification comprises:
judging whether the identification mark is legal or not;
wherein the function execution request is executed when both the first order check and the second order check pass;
calculating to obtain a check encryption value according to the secret code and the secret code calculation mode, wherein the calculation comprises the following steps:
receiving a random number sent by the multimedia control terminal, wherein the random number is generated when the multimedia control terminal receives the secret code sent by the multimedia terminal and the secret code calculation mode;
and calculating to obtain the check encryption value according to the secret code, the random number and the secret code calculation mode.
2. The method of claim 1, wherein after sending a cipher generation rule application request to a server, the method further comprises:
if the password generation rule is not received within the preset time length, generating the password and the password calculation mode by using the password generation rule with the shortest time to the password generation rule; or
And if the password generation rule is not received within the preset time, randomly selecting a password generation rule from a password generation rule base to generate the password and the password calculation mode.
3. The method of claim 1, wherein after sending the function execution request to the multimedia terminal, the method further comprises:
if the secret code and the secret code calculation mode fed back by the multimedia terminal are not received within a first preset time length, performing abnormal alarm;
and if the secret code and the secret code calculation mode fed back by the multimedia terminal are not received after a second preset time length, automatically recovering to the initial state, wherein the second preset time length is longer than the first preset time length.
4. A multimedia encryption system, comprising: the multimedia control terminal comprises an encryption value generating unit, a second transmitting unit and a second receiving unit;
the first receiving unit is configured to receive a function execution request sent by a multimedia control terminal, where the function execution request includes an identifier of the multimedia control terminal;
the judging unit is used for judging whether the identification mark is legal or not;
the first sending unit is used for sending a password generation rule application request to a server after the judging unit judges that the identification mark is legal, so that the server generates a password generation rule according to the password generation rule application request;
the first receiving unit is further configured to receive the cipher generation rule fed back from the server;
the rule generating unit is used for generating a secret code and a secret code calculation mode according to the secret code generating rule;
the first sending unit is further configured to send the secret code and the secret code calculation mode to the multimedia control terminal, so that the multimedia control terminal generates an encrypted value according to the secret code and the secret code calculation mode;
the first receiving unit is further configured to receive the encrypted value sent by the multimedia control terminal;
the verification unit is used for verifying the identification mark and the encrypted value;
the execution unit is used for executing the function execution request after the verification of the verification unit is passed;
the second sending unit is used for sending a function execution request to the multimedia terminal, wherein the function execution request comprises an identification mark of the multimedia control terminal;
the second receiving unit is configured to receive a secret code and a secret code calculation manner sent by the multimedia terminal, where the secret code and the secret code calculation manner are obtained by requesting a server after the multimedia terminal receives the function execution request;
the encrypted value generating unit is used for calculating to obtain an encrypted value according to the secret code and the secret code calculation mode;
the second sending unit is further configured to send the encrypted value to the multimedia terminal, so that the multimedia terminal verifies the encrypted value.
5. A multimedia device, characterized by: the system comprises a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for transmitting and receiving messages, and the processor is used for reading the computer program and executing the security encryption method of the multimedia control system according to any one of claims 1 to 3.
6. A computer-readable storage medium characterized by: the computer-readable storage medium has stored thereon instructions that, when executed on a computer, perform a secure encryption method for a multimedia control system according to any one of claims 1 to 3.
CN202010349521.3A 2020-04-28 2020-04-28 Safety encryption method of multimedia control system and multimedia terminal Active CN111415506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010349521.3A CN111415506B (en) 2020-04-28 2020-04-28 Safety encryption method of multimedia control system and multimedia terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010349521.3A CN111415506B (en) 2020-04-28 2020-04-28 Safety encryption method of multimedia control system and multimedia terminal

Publications (2)

Publication Number Publication Date
CN111415506A CN111415506A (en) 2020-07-14
CN111415506B true CN111415506B (en) 2022-03-18

Family

ID=71492156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010349521.3A Active CN111415506B (en) 2020-04-28 2020-04-28 Safety encryption method of multimedia control system and multimedia terminal

Country Status (1)

Country Link
CN (1) CN111415506B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910652B (en) * 2021-01-18 2022-11-08 湖南海格力士智能科技有限公司 Remote controller identification method and remote controller identification device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282088A (en) * 2014-05-28 2016-01-27 腾讯科技(深圳)有限公司 Method and system for controlling verification server and method and system for controlling verification
CN109858235A (en) * 2019-02-13 2019-06-07 广东小天才科技有限公司 A kind of portable device and its private mark acquisition methods and device

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036853B (en) * 2011-09-30 2016-01-27 中国移动通信集团公司 Business datum sending method and device, method for processing business and device
CN103986570A (en) * 2014-04-10 2014-08-13 深圳清华大学研究院 Safe data transmission method of smart instrument system
CN104980445B (en) * 2015-07-02 2019-04-30 郑州悉知信息科技股份有限公司 A kind of authentication method, apparatus and system
CN105357003B (en) * 2015-11-19 2018-10-16 广东小天才科技有限公司 A kind of method and device of encryption data
CN205230333U (en) * 2015-11-23 2016-05-11 黄旭 Secret key encryption infrared remote control device
CN108243176B (en) * 2016-12-27 2020-08-11 腾讯科技(深圳)有限公司 Data transmission method and device
CN108809914A (en) * 2017-05-05 2018-11-13 国民技术股份有限公司 Access control method, device, terminal and Internet of Things house system
CN107947924A (en) * 2017-12-04 2018-04-20 深圳绿米联创科技有限公司 Intelligent domestic system and information ciphering method and device, terminal
CN108173720B (en) * 2017-12-07 2020-09-04 无锡小净共享网络科技有限公司 Control method and system of household appliance and household appliance system
GB2569950A (en) * 2017-12-30 2019-07-10 Information Requests Ltd Encrypted data access
CN109147307A (en) * 2018-09-07 2019-01-04 横店集团得邦照明股份有限公司 A kind of encryption method of infrared remote-controlled signal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282088A (en) * 2014-05-28 2016-01-27 腾讯科技(深圳)有限公司 Method and system for controlling verification server and method and system for controlling verification
CN109858235A (en) * 2019-02-13 2019-06-07 广东小天才科技有限公司 A kind of portable device and its private mark acquisition methods and device

Also Published As

Publication number Publication date
CN111415506A (en) 2020-07-14

Similar Documents

Publication Publication Date Title
CN107483419B (en) Method, device and system for authenticating access terminal by server, server and computer readable storage medium
CN109246053A (en) A kind of data communications method, device, equipment and storage medium
CN108376211B (en) Software authorization management method, server and system
CN103281340A (en) Method, system, client-side, releasing server and cloud server for two-dimension code verification
CN109474916A (en) A kind of device authentication method, apparatus and machine readable media
CN107995148B (en) File tamper-proofing method, system, terminal and trusted cloud platform
WO2015111456A1 (en) Communication system, beacon device, communication method, and electronic apparatus
CN104080059A (en) Method, device and system of implementing short message sending and receiving
CN111415506B (en) Safety encryption method of multimedia control system and multimedia terminal
CN105792095A (en) Secret key negotiation method and system for MTC (Machine Type Communication) packet communication and network entity
CN108632037B (en) Public key processing method and device of public key infrastructure
CN106712959B (en) method and system for realizing communication security
CN114205377A (en) Internet of things equipment binding method and device, storage medium and program product
CN103592927A (en) Method for binding product server and service function through license
CN116419217B (en) OTA data upgrading method, system, equipment and storage medium
CN110618989B (en) Information processing method, information processing device and related products
CN110034922B (en) Request processing method, processing device, request verification method and verification device
CN110505013A (en) Control method, system, electronic equipment and storage medium without screen equipment distribution
CN114297597B (en) Account management method, system, equipment and computer readable storage medium
CN113347069B (en) Network distribution method and device for household electrical appliance, household electrical appliance and server
CN103051447A (en) Method for user security management of important system
CN115225329A (en) File verification data generation method and device, electronic equipment and readable storage medium
CN114254342A (en) Communication connection method, system, device, storage medium and processor
CN112804339A (en) Processing system for timing push message and control method thereof
US8082444B1 (en) System and method for adding new network devices to an existing network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant