CN113724482B - Radio frequency remote control method and device, storage medium and electronic equipment - Google Patents

Radio frequency remote control method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN113724482B
CN113724482B CN202110894664.7A CN202110894664A CN113724482B CN 113724482 B CN113724482 B CN 113724482B CN 202110894664 A CN202110894664 A CN 202110894664A CN 113724482 B CN113724482 B CN 113724482B
Authority
CN
China
Prior art keywords
receiver
transmitter
key
target
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110894664.7A
Other languages
Chinese (zh)
Other versions
CN113724482A (en
Inventor
杨如昆
曹阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN202110894664.7A priority Critical patent/CN113724482B/en
Publication of CN113724482A publication Critical patent/CN113724482A/en
Application granted granted Critical
Publication of CN113724482B publication Critical patent/CN113724482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The specification discloses a radio frequency remote control method, a radio frequency remote control device, a storage medium and electronic equipment. The method can be applied to the unmanned field, and the unmanned equipment is controlled in a radio frequency remote control mode. In the radio frequency remote control method provided by the specification, a negotiation platform is introduced, the negotiation platform stores the information of each authenticated transmitter, so that a receiver can be used as transfer equipment, the transmitter is verified through a negotiation center, and when the transmitter passes the verification, a target secret key for conversation with the receiver is generated for the transmitter and the receiver.

Description

Radio frequency remote control method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of communications, and in particular, to a radio frequency remote control method, a device, a storage medium, and an electronic apparatus.
Background
In the prior art, a control instruction can be sent to a device carrying a matched receiver through a remote control device, so that the effect of controlling the device is achieved. For example, a remote control of the car may instruct the car to unlock, open the door, etc. via control instructions.
However, the control command is usually sent in a plaintext form through a transmitter of the radio frequency signal, in this case, replay attack can be performed on the device according to the recorded control command, that is, the same control command is sent to the device again to perform attack, and still taking an automobile as an example, when the recorded control command is an unlocking command, the effect of stealing the automobile can be achieved through replay attack.
With the development of scientific technology, the radio frequency remote control mode is also applied to more fields, for example, the radio frequency remote control mode can be applied to brake control of unmanned driving equipment, and this also results in the need of higher safety of the radio frequency remote control.
Currently, before application, a receiver of a radio frequency signal may negotiate with a transmitter, and signal transmission is performed in an application process according to a negotiated key. However, since the receiver itself does not have the capability of identifying whether the transmitter is safe or not, any transmitter can obtain a key by negotiating with the receiver and control the device through the key, which obviously cannot guarantee the safe control of the device.
Therefore, how to ensure the transmission safety of signals between the transmitter and the receiver during the radio frequency remote control is a problem to be solved.
Disclosure of Invention
The present disclosure provides a radio frequency remote control method, a device, a storage medium and an electronic apparatus, so as to partially solve the above-mentioned problems in the prior art.
The technical scheme adopted in the specification is as follows:
the specification provides a radio frequency remote control method, which comprises the following steps:
responding to the received identification information and verification information of the transmitter forwarded by the receiver, and verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
generating a target key when the transmitter passes verification;
and sending the target secret key to a receiver so that the receiver stores the target secret key and forwards the target secret key to a transmitter, and controlling the target equipment with the receiver by the transmitter through a control instruction encrypted by the target secret key.
Optionally, before generating the target key, the method further comprises:
responding to the received identification information and verification information of the receiver sent by the receiver, and verifying the receiver according to the identification information of the receiver and the verification information of the receiver;
when the transmitter passes the verification, generating a target secret key, which specifically comprises the following steps:
when both the transmitter and the receiver verify, a target key is generated.
Optionally, the verification of the transmitter according to the identification information of the transmitter and the verification information of the transmitter specifically includes:
determining a first key which is stored in advance corresponding to the identification information according to the identification information of the transmitter;
decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored correspondingly to the identification information of the transmitter, and determining a comparison result;
and determining a verification result of the transmitter according to the comparison result.
Optionally, verifying the receiver according to the identification information of the receiver and the verification information of the receiver specifically includes:
determining a second key which is stored in advance corresponding to the identification information according to the identification information of the receiver;
decrypting the verification information of the receiver by using the second secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored corresponding to the identification information of the receiver, and determining a comparison result;
and determining a verification result of the receiver according to the comparison result.
Optionally, the target key is sent to a receiver, which specifically includes:
and sending the target secret key to a receiver, wherein the target secret key at least comprises ciphertext of the target secret key encrypted by the first secret key, so that the receiver forwards the ciphertext of the target secret key encrypted by the first secret key to a transmitter, and the transmitter obtains the plaintext of the decrypted target secret key according to the preset first secret key.
Optionally, the target key is sent to a receiver, which specifically includes:
determining a second key stored in correspondence with the identification information of the receiver;
determining a first ciphertext of the target key encrypted by the first key and a second ciphertext of the target key encrypted by the second key, and sending the first ciphertext and the second ciphertext to a receiver, so that the receiver stores the second ciphertext of the target key encrypted by the second key, and forwards the first ciphertext of the target key encrypted by the first key to a transmitter, so that the transmitter obtains a plaintext of the decrypted target key according to the preset first key, and the receiver obtains a plaintext of the decrypted target key according to the preset second key.
The specification provides a radio frequency remote control method, which comprises the following steps:
determining target equipment and generating a control instruction for the target equipment;
encrypting the control instruction according to the target secret key which is negotiated in advance through any one of the methods;
and transmitting the ciphertext of the control instruction to a receiver carried by the target equipment by adopting a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determining the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
The present specification provides a radio frequency remote control device comprising:
the verification module is used for responding to the received identification information and verification information of the transmitter forwarded by the receiver and verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
the generation module is used for generating a target secret key when the transmitter passes the verification;
and the sending module is used for sending the target secret key to the receiver so that the receiver stores the target secret key and forwards the target secret key to the transmitter, and the transmitter controls the target equipment carrying the receiver through a control instruction encrypted by the target secret key.
The present specification provides a radio frequency remote control device comprising:
the generation module is used for determining target equipment and generating a control instruction for the target equipment;
the encryption module is used for encrypting the control instruction according to a target secret key negotiated in advance;
and the sending module is used for sending the ciphertext of the control instruction to a receiver carried by the target equipment in a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
The present specification provides a computer readable storage medium storing a computer program which when executed by a processor implements the radio frequency remote control method described above.
The present specification provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the radio frequency remote control method described above when executing the program.
The above-mentioned at least one technical scheme that this specification adopted can reach following beneficial effect:
in the radio frequency remote control method provided by the specification, a negotiation platform is introduced, the negotiation platform stores the information of each authenticated transmitter, so that a receiver can be used as transfer equipment, the transmitter is verified through a negotiation center, and when the transmitter passes the verification, a target secret key for conversation with the receiver is generated for the transmitter and the receiver.
Drawings
The accompanying drawings, which are included to provide a further understanding of the specification, illustrate and explain the exemplary embodiments of the present specification and their description, are not intended to limit the specification unduly. In the drawings:
fig. 1 is a schematic flow chart of a radio frequency remote control method in the present specification;
fig. 2 is a schematic diagram of a radio frequency remote control device provided in the present specification;
FIG. 3 is a schematic diagram of another RF remote control provided herein;
fig. 4 is a schematic structural diagram of the electronic device provided in the present specification.
Detailed Description
In the above manner, any one of the transmitters may negotiate with the receiver and obtain the negotiated key to realize the range remote control of the target device on which the receiver is mounted, in addition, in order to improve the security, the transmitter may be preset with a corresponding first key, and the receiver may pre-store all the authenticated (i.e. secure) first keys of the transmitters, at this time, the receiver may use the first key to verify the transmitter according to the information transmitted by the transmitter, thereby realizing the negotiation with only the transmitter storing the same first key and obtaining the target key for interaction.
However, this means that the receiver needs to pre-store the first keys of all authenticated transmitters to negotiate with the secure transmitter, and when negotiating with the transmitter to be authenticated, the receiver cannot always negotiate the keys with the transmitter to be authenticated in time.
For the purposes of making the objects, technical solutions and advantages of the present specification more apparent, the technical solutions of the present specification will be clearly and completely described below with reference to specific embodiments of the present specification and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present specification. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
Based on the above-mentioned problems, in the radio frequency remote control method provided in the embodiments of the present disclosure, a negotiation platform is introduced, where the negotiation platform stores information of each authenticated transmitter, and can flexibly add and delete the stored information of each transmitter, for example, the information of each transmitter may be stored in a database, so that the transmitter may be authenticated by a negotiation center, and when the transmitter passes the authentication, a target secret key for session with the receiver is generated for the transmitter and the receiver.
The radio frequency remote control method provided by the embodiment of the specification can be applied to the unmanned field, and is used for the transmitter to transmit a control instruction to the receiver of the unmanned equipment so as to realize the control of the unmanned equipment.
The following describes in detail the technical solutions provided by the embodiments of the present specification with reference to the accompanying drawings.
Fig. 1 is a schematic diagram of a radio frequency remote control method according to an embodiment of the present disclosure.
The embodiment of the specification provides a radio frequency remote control system, which comprises a transmitter, a receiver and target equipment with the receiver.
The target device may be an unmanned device, such as an unmanned vehicle, an unmanned plane, or the like, and one of the unmanned devices implemented in the present description may be used in the field of logistics distribution, and may particularly be used in takeaway distribution.
Where the transmitter and the receiver are corresponding transmitting and receiving devices, the type of signal transmitted by the transmitter is the type of signal received by the receiver, for example, the signal transmitted by the transmitter may include near field communication (Near Field Communication, NFC), radio frequency identification (Radio Frequency Identification, RFID), radio frequency communication (Radio Frequency Communication, RF), and so on, which is not limited in this specification.
After the transmitter and the receiver negotiate the corresponding target secret key, the transmitter and the receiver can be considered as corresponding transmitting and receiving equipment pairs, and at this time, the transmitter can control the target equipment loaded with the receiver by sending a control instruction to the receiver. The embodiment of the present specification does not limit the kind of the target device, and may be an unmanned vehicle, an unmanned aerial vehicle, or the like, and only exemplary, the following portion of the present specification will be described by taking the target device as an example of the unmanned vehicle.
Depending on the type of target device being controlled, the transmitter may instruct the unmanned device to perform different types of actions via the control command, e.g., may control unlocking, braking, etc. of the unmanned vehicle, while when the target device is an unmanned aerial vehicle, the unmanned aerial vehicle fly height, etc. may be instructed via the control command, which is not limited in this specification.
As shown in fig. 1, the radio frequency remote control method provided in real time in the present specification is divided into a negotiation stage and a remote control stage.
In the negotiation stage, the negotiation platform negotiates the target key for encrypting the interaction in the remote control stage with the transmitter and the receiver, and in an embodiment of the present disclosure, the target key of the transmitter and the target key of the receiver may be the same key for symmetric encryption.
The device limited by the transmitter has a relatively simple structure, the transmitter is usually a single chip microcomputer, and the carried system is usually a real-time operating system (Real Time Operating System, RTOS), so that the transmitter generally only comprises radio frequency communication functions, cannot interact in modes such as a cellular network and an ethernet, and has relatively few computing resources, and therefore, the target secret key of the transmitter negotiated in the negotiation stage in the embodiment of the present disclosure is the same as the target secret key of the receiver.
In the remote control stage, the transmitter encrypts the control command according to the negotiated target secret key and transmits the control command to the target equipment loaded with the receiver so as to achieve the effect of safely transmitting the control command.
Specifically, after determining the target key, the target device may be controlled using the method shown in fig. 2.
S200: determining target equipment, generating a control instruction for the target equipment,
S204: and encrypting the control instruction according to the target secret key which is negotiated in advance by any one of the methods.
S206: and transmitting the ciphertext of the control instruction to a receiver carried by the target equipment by adopting a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determining the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
After the transmitter generates the control instruction to the target device, the control instruction can be encrypted by using the target key, and the encrypted control instruction is sent to the receiver, so that the receiver obtains the plaintext of the control instruction according to the target key stored by the receiver, thereby controlling the target device.
In an embodiment of the present disclosure, each transmitter may correspond to a plurality of receivers, each receiver may also correspond to a plurality of transmitters, and each corresponding target key may be different from each target key, and when the receiver receives a signal encrypted by a target key that is not stored in the receiver, the receiver may consider that the signal is not a negligible non-control instruction. In addition, when the receiver receives the unencrypted control instruction, the unencrypted control instruction can be considered to be sent by the untrusted transmitter, so that the unencrypted control instruction is ignored, and the security of the target device is ensured. After the receiver receives the control instruction, a corresponding acknowledgement signal may also be returned to the transmitter.
Fig. 1 shows a method for remote control of radio frequency in an embodiment of the present disclosure, where in a negotiation stage, a transmitter may generate its own identification information and verification information and send the generated identification information and verification information to a receiver, where the receiver forwards the identification information and verification information of the transmitter to a negotiation center, and the negotiation center verifies the transmitter according to the received identification information and verification information of the transmitter, and specifically, the negotiation center may store the identification information and the verification information of each transmitter, so that the negotiation center may determine the verification information corresponding to the identification information of the transmitter according to the identification information of the transmitter and compare the verification information with the verification information of the transmitter forwarded by the receiver to obtain a verification result of the transmitter.
In an embodiment of the present disclosure, the negotiation center may store three types of information correspondingly, including: identification information, a key, and verification information, such that the three types of information are stored for the same transmitter.
Fig. 3 is a schematic diagram of a radio frequency remote control method in a negotiation stage according to the present disclosure.
S300: and responding to the received identification information and the received verification information of the transmitter forwarded by the receiver, and verifying the transmitter according to the identification information of the transmitter and the verification information of the transmitter.
The transmitter may be preset with a first key, for example, the first key may be written on the transmitter in the production process of the transmitter, in this case, the verification information sent by the transmitter to the receiver may be ciphertext of the verification information encrypted by the first key, and of course, the ciphertext of the first verification information and the ciphertext of the first verification information may be forwarded to a plaintext of the negotiation center, which may further include identification information of the transmitter, so that the verification center determines the first key stored corresponding to the identification information according to the plaintext of the identification information of the transmitter, and decrypts the ciphertext of the received verification information of the transmitter according to the first key.
Specifically, the plaintext of the decrypted verification information of the transmitter can be compared with the pre-stored verification information corresponding to the identification information of the transmitter, a comparison result is determined, and whether the transmitter passes the verification is judged according to the identification result. If the comparison results are generally the same, the verification result of the transmitter can be considered to pass.
S302: when the transmitter checks, a target key is generated.
In an embodiment of the present disclosure, the generated target key may be a random number, which may be a fixed length, for example, may be 16 bits.
S304: and sending the target secret key to a receiver so that the receiver stores the target secret key and forwards the target secret key to a transmitter, and controlling the target equipment with the receiver by the transmitter through a control instruction encrypted by the target secret key.
The negotiating center may then send the generated target key to the receiver, which itself stores the target key, and forwards the target key to the transmitter.
In an embodiment of the present disclosure, in order to ensure security when the receiver sends the target key to the transmitter, the negotiation center may encrypt the target key with the first key after generating the target key, so that the receiver forwards the received target key encrypted with the first key to the transmitter. And the transmitter decrypts the received ciphertext of the target key by adopting the first key to obtain the plaintext of the target key.
In an embodiment of the present disclosure, the communication environment between the receiver and the negotiation center may be considered to be relatively safe, so that the target key sent by the negotiation center includes plaintext of the target key in addition to the target key encrypted by the first key for the receiver to forward to the transmitter, so that the receiver directly stores the plaintext of the target key.
The above is an embodiment of a radio frequency remote control method in this specification.
In the radio frequency remote control method provided in the foregoing embodiment, the verification information sent by the transmitter is encrypted by using the first key, and the negotiation center decrypts the ciphertext of the verification information of the transmitter according to the stored first key corresponding to the identification information of the transmitter to obtain the verification information, that is, the key determined in advance for the transmitter is the same as the key stored in advance in the negotiation center, and the encryption of the verification information is symmetric encryption.
In addition to requiring authentication of the transmitter, in another embodiment of the present disclosure, authentication of the receiver is required, and the target key is generated only when both the transmitter and the receiver pass the authentication.
Specifically, the receiver generates its own identification information and verification information, and sends the own identification information and verification information to the negotiation center, where the negotiation center may determine, by using any one of the above methods of verifying the transmitter, a verification result of the receiver according to the identification information and verification information of the receiver, and similar to the transmitter, the second key determined in advance for the receiver may be a second key corresponding to the identification information of the receiver stored in the negotiation center, but the key predetermined for the threshold of the receiver may also be a fourth key corresponding to the second key corresponding to the identification information of the receiver stored in the negotiation center, where the second key and the fourth key are asymmetrically encrypted.
In this case, after determining the target key, the negotiation center may encrypt the target key with the first key and the second key, respectively, and obtain a first ciphertext of the target key encrypted with the first key, and a second ciphertext of the target key encrypted with the second key, and send the first ciphertext and the second ciphertext to the receiver.
The receiver stores the second ciphertext and obtains the plaintext of the decrypted target key by using the second key or the fourth key stored in the receiver, and in addition, the receiver forwards the first ciphertext to the transmitter so that the transmitter obtains the plaintext of the decrypted target key according to the first key or the third key.
The above is an example of the negotiation phase provided for the embodiments of the present specification.
Because the negotiation platform stores the information of each authenticated transmitter and can flexibly add and delete the stored information of each transmitter, the information of each transmitter can be stored in a database form, so that the transmitter can be authenticated through a negotiation center, and when the transmitter passes authentication, a target key used for session with the receiver is generated for the transmitter and the receiver.
In addition, when the transmitter is lost, the negotiation platform may instruct the receiver to delete the target key corresponding to the transmitter to prevent the transmitter target device from being stolen.
The radio frequency remote control method provided for one or more embodiments of the present disclosure further provides a corresponding radio frequency remote control device based on the same concept, as shown in fig. 2 and fig. 3.
Fig. 2 is a schematic diagram of a radio frequency remote control method provided in the present specification, including:
a verification module 200, configured to respond to the received identification information and verification information of the transmitter forwarded by the receiver, and verify the transmitter according to the identification information of the transmitter and the verification information of the transmitter;
a generation module 202, configured to generate a target key when the transmitter passes the verification;
and the sending module 204 is configured to send the target key to a receiver, so that the receiver stores the target key and forwards the target key to the transmitter, so that the transmitter controls the target device on which the receiver is mounted through a control instruction encrypted by the target key.
Optionally, before generating the target key, the verification module 200 is further configured to, in response to the received identification information and verification information of the receiver sent by the receiver, verify the receiver according to the identification information of the receiver and the verification information of the receiver;
the verification module 200 is specifically configured to generate a target key when the transmitter and the receiver both pass verification.
Optionally, the verification module 200 is specifically configured to determine, according to the identification information of the transmitter, a first key stored in advance corresponding to the identification information; decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored correspondingly to the identification information of the transmitter, and determining a comparison result; and determining a verification result of the transmitter according to the comparison result.
Optionally, the verification module 200 is specifically configured to determine, according to the identification information of the receiver, a second key stored in advance corresponding to the identification information; decrypting the verification information of the receiver by using the second secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored corresponding to the identification information of the receiver, and determining a comparison result; and determining a verification result of the receiver according to the comparison result.
Optionally, the sending module 204 is specifically configured to send the target key to a receiver, where the target key at least includes ciphertext of the target key encrypted with the first key, so that the receiver forwards the ciphertext of the target key encrypted with the first key to the transmitter, so that the transmitter obtains plaintext of the decrypted target key according to the preset first key.
Optionally, the sending module 204 is specifically configured to determine a second key stored corresponding to the identification information of the receiver; determining a first ciphertext of the target key encrypted by the first key and a second ciphertext of the target key encrypted by the second key, and sending the first ciphertext and the second ciphertext to a receiver, so that the receiver stores the second ciphertext of the target key encrypted by the second key, and forwards the first ciphertext of the target key encrypted by the first key to a transmitter, so that the transmitter obtains a plaintext of the decrypted target key according to the preset first key, and the receiver obtains a plaintext of the decrypted target key according to the preset second key.
Fig. 3 is a schematic diagram of a radio frequency remote control method provided in the present specification, including:
the generating module 300 is configured to determine a target device, and generate a control instruction for the target device;
an encryption module 302, configured to encrypt the control instruction according to a target key negotiated in advance;
and the sending module 304 is configured to send the ciphertext of the control instruction to a receiver carried by the target device by using a radio frequency transmission manner, so that the receiver responds to the received ciphertext of the control instruction, and determines the plaintext of the control instruction according to the target secret key, so that the target device executes the operation indicated by the control instruction according to the control instruction.
The present specification also provides a computer readable storage medium storing a computer program operable to perform the radio frequency remote control method described above.
The present specification also provides a schematic structural diagram of the electronic device shown in fig. 4. At the hardware level, as shown in fig. 4, the electronic device includes a processor, an internal bus, a memory, and a nonvolatile memory, and may of course include hardware required by other services. The processor reads the corresponding computer program from the nonvolatile memory to the memory and then runs the computer program to realize the radio frequency remote control method.
Of course, other implementations, such as logic devices or combinations of hardware and software, are not excluded from the present description, that is, the execution subject of the following processing flows is not limited to each logic unit, but may be hardware or logic devices.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable Gate Array, FPGA)) is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present specification.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the present specification may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description can take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing is merely exemplary of the present disclosure and is not intended to limit the disclosure. Various modifications and alterations to this specification will become apparent to those skilled in the art. Any modifications, equivalent substitutions, improvements, or the like, which are within the spirit and principles of the present description, are intended to be included within the scope of the claims of the present description.

Claims (9)

1. A radio frequency remote control method, comprising:
determining a first key which is stored in advance corresponding to the identification information according to the identification information of the transmitter in response to the received identification information and verification information of the transmitter forwarded by the receiver;
decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored correspondingly to the identification information of the transmitter, and determining a comparison result;
determining a verification result of the transmitter according to the comparison result;
generating a target key when the transmitter passes verification;
and sending the target secret key to a receiver so that the receiver stores the target secret key and forwards the target secret key to a transmitter, and controlling the target equipment with the receiver by the transmitter through a control instruction encrypted by the target secret key.
2. The method of claim 1, wherein prior to generating the target key, the method further comprises:
responding to the received identification information and verification information of the receiver sent by the receiver, and verifying the receiver according to the identification information of the receiver and the verification information of the receiver;
when the transmitter passes the verification, generating a target secret key, which specifically comprises the following steps:
when both the transmitter and the receiver verify, a target key is generated.
3. The method of claim 2, wherein verifying the receiver based on the identification information of the receiver and the verification information of the receiver, specifically comprises:
determining a second key which is stored in advance corresponding to the identification information according to the identification information of the receiver;
decrypting the verification information of the receiver by using the second secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored corresponding to the identification information of the receiver, and determining a comparison result;
and determining a verification result of the receiver according to the comparison result.
4. The method of claim 1, wherein transmitting the target key to a receiver comprises:
and sending the target secret key to a receiver, wherein the target secret key at least comprises ciphertext of the target secret key encrypted by the first secret key, so that the receiver forwards the ciphertext of the target secret key encrypted by the first secret key to a transmitter, and the transmitter obtains the plaintext of the decrypted target secret key according to the preset first secret key.
5. The method of claim 4, wherein transmitting the target key to a receiver comprises:
determining a second key stored in correspondence with the identification information of the receiver;
determining a first ciphertext of the target key encrypted by the first key and a second ciphertext of the target key encrypted by the second key, and sending the first ciphertext and the second ciphertext to a receiver, so that the receiver stores the second ciphertext of the target key encrypted by the second key, and forwards the first ciphertext of the target key encrypted by the first key to a transmitter, so that the transmitter obtains a plaintext of the decrypted target key according to the preset first key, and the receiver obtains a plaintext of the decrypted target key according to the preset second key.
6. A radio frequency remote control method, comprising:
determining target equipment and generating a control instruction for the target equipment;
encrypting the control instruction according to a target key pre-negotiated by the method of any one of claims 1-5;
and transmitting the ciphertext of the control instruction to a receiver carried by the target equipment by adopting a radio frequency transmission mode, so that the receiver responds to the received ciphertext of the control instruction, and determining the plaintext of the control instruction according to the target secret key, so that the target equipment executes the operation indicated by the control instruction according to the control instruction.
7. A radio frequency remote control device, characterized in that the device comprises in particular:
the verification module is used for responding to the received identification information and verification information of the transmitter forwarded by the receiver, and determining a first key which is stored in advance corresponding to the identification information according to the identification information of the transmitter;
decrypting the verification information of the transmitter by using the first secret key, comparing the plaintext of the verification information obtained by decryption with the verification information stored correspondingly to the identification information of the transmitter, and determining a comparison result;
determining a verification result of the transmitter according to the comparison result;
the generation module is used for generating a target secret key when the transmitter passes the verification;
and the sending module is used for sending the target secret key to the receiver so that the receiver stores the target secret key and forwards the target secret key to the transmitter, and the transmitter controls the target equipment carrying the receiver through a control instruction encrypted by the target secret key.
8. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method of any of the preceding claims 1-6.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of the preceding claims 1-6 when executing the program.
CN202110894664.7A 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment Active CN113724482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110894664.7A CN113724482B (en) 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110894664.7A CN113724482B (en) 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN113724482A CN113724482A (en) 2021-11-30
CN113724482B true CN113724482B (en) 2023-05-30

Family

ID=78674913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110894664.7A Active CN113724482B (en) 2021-08-05 2021-08-05 Radio frequency remote control method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113724482B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114613117A (en) * 2022-03-16 2022-06-10 深圳数马电子技术有限公司 Remote control method for copying remote controller, copying remote controller and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105109672B (en) * 2015-08-17 2018-04-06 广州飞米电子科技有限公司 The method and apparatus that aircraft is controlled in flight control system
US10390221B2 (en) * 2016-07-25 2019-08-20 Ford Global Technologies, Llc Private vehicle-to-vehicle communication
CN106888206B (en) * 2017-02-13 2020-06-09 海信集团有限公司 Key exchange method, device and system
CN111406390A (en) * 2018-12-26 2020-07-10 深圳市大疆创新科技有限公司 Encrypted communication method, device, system and computer storage medium
WO2020151010A1 (en) * 2019-01-25 2020-07-30 深圳市大疆创新科技有限公司 Movable platform communication method, device and system, and storage medium
CN112448808B (en) * 2019-08-29 2024-09-20 斑马智行网络(香港)有限公司 Communication method, device, access point, server, system and storage medium
CN111147474B (en) * 2019-12-23 2022-09-13 深圳平安医疗健康科技服务有限公司 Data encryption transmission method and device, computer equipment and storage medium
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device

Also Published As

Publication number Publication date
CN113724482A (en) 2021-11-30

Similar Documents

Publication Publication Date Title
US8923514B2 (en) Apparatus and method for authentication for motor vehicles
CN108063756B (en) Key management method, device and equipment
CN107021065B (en) Use the device and method of user terminal control vehicle
US11245527B2 (en) Secure distribution networks
US11074575B2 (en) Method and apparatus for paying fare
CN109347629B (en) Secret key transmission method and system based on shared security application, storage medium and equipment
CN112906037A (en) Communication encryption system, method and device
CN111741028B (en) Service processing method, device, equipment and system
WO2015160438A1 (en) Connection authentication
CN113724482B (en) Radio frequency remote control method and device, storage medium and electronic equipment
CN104527576A (en) WIFI (Wireless Fidelity) type automobile starting control method and mobile terminal
CN109560933B (en) Authentication method and system based on digital certificate, storage medium and electronic equipment
CN113709696B (en) Vehicle remote control method and device, and key initialization method and device
CN114969784A (en) Model processing method, device and equipment
CN112585042B (en) Vehicle control method, communication device, and computer-readable storage medium
CN114553428B (en) Trusted verification system, trusted verification device, trusted verification storage medium and electronic equipment
US20160219053A1 (en) Intelligent terminal and interactive control system and interactive control method using same
CN116050847A (en) Data risk assessment method and device, storage medium and electronic equipment
EP4193284B1 (en) Electronic apparatus and controlling method thereof
CN114301606B (en) Unmanned equipment key management system, method, device, equipment and storage medium
CN113961931A (en) Adb tool using method and device and electronic equipment
CN114980083A (en) Secure communication method based on self-adaptive application and server
CN117956447B (en) Privacy information protection method, system and storage medium in Internet of vehicles
CN114638685B (en) Risk identification method, device and equipment
CN115967905A (en) Data transmission system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant