WO2019210571A1 - 一种智能音箱及其加密通讯方法 - Google Patents

一种智能音箱及其加密通讯方法 Download PDF

Info

Publication number
WO2019210571A1
WO2019210571A1 PCT/CN2018/094129 CN2018094129W WO2019210571A1 WO 2019210571 A1 WO2019210571 A1 WO 2019210571A1 CN 2018094129 W CN2018094129 W CN 2018094129W WO 2019210571 A1 WO2019210571 A1 WO 2019210571A1
Authority
WO
WIPO (PCT)
Prior art keywords
private key
barcode
dimensional code
module
smart speaker
Prior art date
Application number
PCT/CN2018/094129
Other languages
English (en)
French (fr)
Inventor
王声平
郑勇
Original Assignee
深圳市沃特沃德股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市沃特沃德股份有限公司 filed Critical 深圳市沃特沃德股份有限公司
Publication of WO2019210571A1 publication Critical patent/WO2019210571A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14131D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the invention relates to the technical field of sound boxes, in particular to a smart speaker and an encrypted communication method thereof.
  • Smart speaker is a product of speaker upgrade. It is a tool for home consumers to use the voice to access the Internet. For example, on-demand songs, online shopping, or weather forecasting, it can also control smart home devices, such as opening curtains and setting The temperature of the refrigerator, let the water heater heat up in advance.
  • the smart speaker has many functions, but its privacy is poor. Most of the user data of the smart speaker is sent to the cloud without any encryption, and it is easy for others to read the user data of the user.
  • the present invention provides a smart speaker and an encrypted communication method thereof, which generates a private key by scanning a barcode, and then encrypts the user data by using a private key, aiming at solving the user data of the existing smart speaker. It is a problem that no encryption is sent to the cloud, which makes it easy for others to read the user's user data.
  • a smart speaker encryption communication method comprising:
  • the method comprises:
  • Execute the selection instruction enter the encryption mode, and enable the scan code function.
  • the method includes:
  • the barcode is a one-dimensional code, identifying a black bar in the one-dimensional code to generate a first private key element;
  • the first private key element and the second private key element are arranged according to a black bar and a white bar arrangement order in the one-dimensional code.
  • the method includes:
  • each black strip in the one-dimensional code is identified, and a corresponding number of first private key elements are generated according to the width of each black strip.
  • the method includes:
  • each white strip in the one-dimensional code is identified, and a corresponding number of second private key elements are generated according to the width of each white strip.
  • the method includes:
  • the method comprises:
  • the scanning is turned on.
  • the method comprises:
  • the barcode After scanning the barcode, if the barcode is not recognized within a preset time, it is automatically turned off.
  • the invention also provides a smart speaker, the smart speaker comprising:
  • a private key generating module configured to generate a private key according to the barcode
  • An information encryption module configured to encrypt user data by using the private key
  • the first sending module is configured to send the encrypted user data to the cloud.
  • the smart speaker includes:
  • a receiving module configured to receive a selection instruction of an encryption mode
  • An execution module is configured to execute the selection instruction, enter an encryption mode, and enable a scan code function.
  • the private key generation module includes:
  • a first identification module configured to identify a black strip in the one-dimensional code
  • a second identification module configured to identify a white strip in the one-dimensional code
  • a first generating module configured to generate a first private key element according to the identified black bar
  • a second generating module configured to generate a second private key element according to the identified white bar
  • an arranging module configured to arrange the first private key element and the second private key element according to a black bar and a white bar arrangement order in the one-dimensional code.
  • the first identification module includes a first sub-identification module, configured to identify a width of each black strip in the one-dimensional code;
  • the first generation module includes a first sub-generation module, configured to generate a corresponding number of first private key elements according to different widths of the black stripes.
  • the second identification module includes a second sub-identification module, configured to identify a width of each white strip in the one-dimensional code
  • the second generation module includes a second sub-generation module, configured to generate a corresponding number of second private key elements according to different widths of the white stripes.
  • the smart speaker includes:
  • the private key sending module is configured to send the private key to a preset mobile terminal.
  • the smart speaker includes:
  • the module is turned on for turning on scanning when selecting to enter the encryption mode.
  • the smart speaker includes:
  • a shutdown module configured to automatically shut down the barcode after the barcode is scanned within a preset time after scanning the barcode
  • the invention has the beneficial effects that the private key is generated by scanning the barcode, and then the user data is encrypted by using the private key, and finally the user data is sent to the cloud, and the present invention can replace the private key at any time, and the randomness is high. It is not easy to crack. Most of the user data designed to solve the existing smart speakers are sent to the cloud without any encryption, which makes it easy for others to read the user's user data.
  • FIG. 1 is a flowchart of a smart speaker encryption communication method according to an embodiment of the present invention
  • FIG. 2 is a functional block diagram of a smart speaker according to an embodiment of the present invention.
  • an embodiment of the present invention provides a smart speaker encryption communication method, where the method includes the following steps:
  • Step S101 Scan the barcode.
  • the front end of the smart speaker scans the barcode.
  • the method includes:
  • the user can make a selection and choose whether to enter the encryption mode.
  • the scan is turned on, and when the user chooses not to enter the encryption mode, the scan is not turned on. If the user does not make a selection within the preset time, the encryption mode is entered by default.
  • the method before step S101, the method includes:
  • Execute the selection instruction enter the encryption mode, and enable the scan code function.
  • the selection command of the encryption mode is received, and then the selection instruction is executed, the encryption mode is entered, and the scan code function is turned on.
  • the barcode is a one-dimensional code or a two-dimensional code.
  • the barcode is a one-dimensional code
  • it is scanned using a lidar sensor or a camera.
  • the camera is used for scanning.
  • the one-dimensional code or the two-dimensional code is randomly generated by the mobile phone APP.
  • step S101 the method includes:
  • Step S102 Generate a private key according to the barcode.
  • the barcode After scanning the barcode, the barcode is identified and a private key is generated from the barcode.
  • step S102 the method includes:
  • the barcode is a one-dimensional code
  • the black bar in the one-dimensional code is identified, and the first private key element is generated
  • the first private key element and the second private key element are arranged according to the black bar and white bar arrangement order in the one-dimensional code.
  • the one-dimensional code is composed of a black bar and a white bar, and the black bar in the one-dimensional code is identified to generate the first private key element, and the white bar in the one-dimensional code is identified to generate the second private key element.
  • a private key element is different from the second private key element, and the private key is composed of the first private key element and the second private key element.
  • the one-dimensional code is black bar, white bar, black bar in order, black bar represents binary 0, white bar represents binary 1, and black bar in identifying one-dimensional code generates 0, and white bar in recognition of one-dimensional code generates 1
  • the black bar and the white bar are identified, the 0 and 1 are arranged in the order of the black bar and the white bar, and finally a set of data is 010.
  • the method includes:
  • each black strip in the one-dimensional code is identified, and a corresponding number of first private key elements are generated according to the width of each black strip.
  • the method includes:
  • each white strip in the one-dimensional code is identified, and a corresponding number of second private key elements are generated according to the width of each white strip.
  • the one-dimensional code is composed of a black bar and a white bar, and the black bar in the one-dimensional code is identified to generate the first private key element, and the white bar in the one-dimensional code is identified to generate the second private key element.
  • a private key element is different from the second private key element, and the private key is composed of the first private key element and the second private key element.
  • the width of each black bar in the one-dimensional code is identified, and the number of the first private key elements corresponding to the position of each black bar is different according to the width of each black bar. different. Specifically, the greater the width of the black bar, the greater the number of first private key elements.
  • the width of each white strip in the one-dimensional code is identified, and the number of generated second private key elements corresponding to the position of each white strip is different according to the width of each white strip. Specifically, the greater the width of the white bar, the greater the number of second private key elements.
  • the one-dimensional code is black bar, white bar, and black bar, wherein the width of the first black bar is 3L, the width of the second white bar is L, and the width of the third black bar is 2L, and the black bar represents binary.
  • the white bar represents a binary one
  • the black bar in the recognition one-dimensional code generates
  • the white bar in the recognition one-dimensional code generates 1
  • the black bar and the white bar are completed in the recognition
  • the black bar and the white bar are arranged in the order of 0. 1 is arranged to obtain a set of data of 010
  • the width of the black strip and the white strip is 3L
  • the number of binary 0 is 3
  • the width of the second strip is L.
  • the number of the third strip is 2L and the number of generated binary 0 is 2. For this, a set of data is finally obtained as 000100.
  • step S102 the method includes:
  • the generated private key is copied and sent to the preset mobile terminal.
  • the mobile terminal has a private key, and the content of the user data can be read using the private key in the mobile terminal.
  • a barcode is generated in the mobile terminal for scanning by the smart speaker, while the mobile terminal generates a private key based on the barcode.
  • the mobile terminal has the same private key generation rule as the smart speaker. For this reason, for the same barcode, the private key generated in the mobile terminal is the same as the private key generated in the smart speaker.
  • Step S103 Encrypt the user data by using the private key.
  • the user data is encrypted using the private key, and the encrypted user data requires a private key to open the content of the user data.
  • the private key encrypts the user data by encapsulating the user data and encrypting it.
  • the private key is not obtained, the user data is opened to provide a password, or the user data is garbled and cannot be read normally.
  • Step S104 Send the encrypted user data to the cloud.
  • the encrypted user data is sent to the cloud, and the user data in the cloud is encrypted because it needs to be opened by the private key.
  • the private key is generated by scanning the barcode, and then the user data is encrypted by using the private key, and finally the user data is sent to the cloud.
  • the method can replace the private key at any time, and the randomness is high and difficult to crack, aiming to solve Most of the user data of the existing smart speakers are sent to the cloud without any encryption, which causes the user's user data to be easily read by others.
  • an embodiment of the present invention further provides a smart speaker.
  • the smart speaker 1 includes a scanning module 11, a private key generating module 12, an information encryption module 13, and a first transmitting module 14.
  • the scanning module 11 is configured to scan a barcode.
  • the scanning module 11 is disposed at the front end of the smart speaker 1, and the front end of the smart speaker 1 scans the barcode.
  • the smart speaker 1 includes:
  • the module is turned on to enable scanning when it is selected to enter the encryption mode.
  • the user can make a selection and choose whether to enter the encryption mode.
  • the scan is turned on, and when the user chooses not to enter the encryption mode, the scan is not turned on. If the user does not make a selection within the preset time, the encryption mode is entered by default.
  • the smart speaker includes:
  • a receiving module configured to receive a selection instruction of an encryption mode
  • An execution module is configured to execute the selection instruction, enter an encryption mode, and enable a scan code function.
  • the barcode is a one-dimensional code or a two-dimensional code.
  • the scanning module 11 is a laser radar sensor or a camera, and is scanned by a laser radar sensor or a camera.
  • the scanning module 11 is a camera and is scanned by a camera.
  • the one-dimensional code or the two-dimensional code is randomly generated by the mobile phone APP.
  • the smart speaker 1 includes:
  • the shutdown module is used to automatically shut down the barcode after it has been scanned for a preset time.
  • the private key generating module 12 is configured to generate a private key according to the barcode.
  • the barcode After scanning the barcode, the barcode is identified and a private key is generated from the barcode.
  • the private key generation module 12 when the barcode is a one-dimensional code, the private key generation module 12 includes:
  • a first identification module configured to identify a black strip in the one-dimensional code
  • a second identification module configured to identify a white strip in the one-dimensional code
  • a first generating module configured to generate a first private key element according to the identified black bar
  • a second generating module configured to generate a second private key element according to the identified white bar
  • the arranging module is configured to arrange the first private key element and the second private key element according to the black bar and the white bar arrangement order in the one-dimensional code.
  • the one-dimensional code is composed of a black bar and a white bar, and the black bar in the one-dimensional code is identified to generate the first private key element, and the white bar in the one-dimensional code is identified to generate the second private key element.
  • a private key element is different from the second private key element, and the private key is composed of the first private key element and the second private key element.
  • the one-dimensional code is black bar, white bar, black bar in order, black bar represents binary 0, white bar represents binary 1, and black bar in identifying one-dimensional code generates 0, and white bar in recognition of one-dimensional code generates 1
  • the black bar and the white bar are identified, the 0 and 1 are arranged in the order of the black bar and the white bar, and finally a set of data is 010.
  • the first identification module includes a first sub-identification module, configured to identify a width of each black strip in the one-dimensional code;
  • the first generation module includes a first sub-generation module, configured to generate a corresponding number of first private key elements according to different widths of the black stripes.
  • the second identification module includes a second sub-identification module, configured to identify a width of each white strip in the one-dimensional code;
  • the second generation module includes a second sub-generation module, configured to generate a corresponding number of second private key elements according to different widths of the white stripes.
  • the one-dimensional code is composed of a black bar and a white bar, and the black bar in the one-dimensional code is identified to generate the first private key element, and the white bar in the one-dimensional code is identified to generate the second private key element.
  • a private key element is different from the second private key element, and the private key is composed of the first private key element and the second private key element.
  • the width of each black bar in the one-dimensional code is identified, and the number of the first private key elements corresponding to the position of each black bar is different according to the width of each black bar. different. Specifically, the greater the width of the black bar, the greater the number of first private key elements.
  • the width of each white strip in the one-dimensional code is identified, and the number of generated second private key elements corresponding to the position of each white strip is different according to the width of each white strip. Specifically, the greater the width of the white bar, the greater the number of second private key elements.
  • the one-dimensional code is black bar, white bar, and black bar, wherein the width of the first black bar is 3L, the width of the second white bar is L, and the width of the third black bar is 2L, and the black bar represents binary.
  • the white bar represents a binary one
  • the black bar in the recognition one-dimensional code generates
  • the white bar in the recognition one-dimensional code generates 1
  • the black bar and the white bar are completed in the recognition
  • the black bar and the white bar are arranged in the order of 0. 1 is arranged to obtain a set of data of 010
  • the width of the black strip and the white strip is 3L
  • the number of binary 0 is 3
  • the width of the second strip is L.
  • the number of the third strip is 2L and the number of generated binary 0 is 2. For this, a set of data is finally obtained as 000100.
  • the smart speaker 1 further includes:
  • the private key sending module is configured to send the private key to the preset mobile terminal.
  • the generated private key is copied and sent to the preset mobile terminal.
  • the mobile terminal has a private key, and the content of the user data can be read using the private key in the mobile terminal.
  • a barcode is generated in the mobile terminal for scanning by the smart speaker, while the mobile terminal generates a private key based on the barcode.
  • the mobile terminal has the same private key generation rule as the smart speaker. For this reason, for the same barcode, the private key generated in the mobile terminal is the same as the private key generated in the smart speaker.
  • the information encryption module 13 is configured to encrypt the user data by using the private key.
  • the user data is encrypted using the private key, and the encrypted user data requires a private key to open the content of the user data.
  • the first sending module 14 is configured to send the encrypted user data to the cloud.
  • the encrypted user data is sent to the cloud, and the user data in the cloud is encrypted because it needs to be opened by the private key.
  • the private key is generated by scanning the barcode, and then the user data is encrypted by using the private key, and finally the user data is sent to the cloud, and the smart speaker 1 can change the private key at any time, and the randomness is high and difficult to crack.
  • Most of the user data for solving the existing smart speaker is not sent to the cloud without any encryption, which causes the user's user data to be easily read by others.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephone Function (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

本发明涉及音箱技术领域,特别涉及一种智能音箱及其加密通讯方法。所述方法包括:扫描条形码;根据所述条形码生成私钥;使用所述私钥对用户数据进行加密;将加密后的用户数据发送至云端,旨在解决现有的智能音箱的用户数据大多数都是没有进行任何的加密发送到云端,导致容易被别人读取使用者的用户数据的问题。

Description

一种智能音箱及其加密通讯方法 技术领域
本发明涉及音箱技术领域,特别涉及一种智能音箱及其加密通讯方法。
背景技术
智能音箱,是一个音箱升级的产物,是家庭消费者用语音进行上网的一个工具,比如点播歌曲、上网购物,或是了解天气预报,它也可以对智能家居设备进行控制,比如打开窗帘、设置冰箱温度、提前让热水器升温等。
在现有的技术中,智能音箱的功能较多,但是其私密性较差,智能音箱的用户数据大多数都是没有进行任何的加密发送到云端,容易被别人读取使用者的用户数据。
技术问题
针对现有技术不足,本发明提出一种智能音箱及其加密通讯方法,通过扫描条形码生成私钥,再使用私钥对用户数据进行加密,旨在解决现有的智能音箱的用户数据大多数都是没有进行任何的加密发送到云端,导致容易被别人读取使用者的用户数据的问题。
技术解决方案
本发明提出的技术方案是:
一种智能音箱加密通讯方法,所述方法包括:
扫描条形码;
根据所述条形码生成私钥;
使用所述私钥对用户数据进行加密;
将加密后的用户数据发送至云端。
进一步地,在扫描条形码的步骤之前,所述方法包括:
接收加密模式的选择指令;
执行所述选择指令,进入加密模式,并开启扫码功能。
进一步地,在根据所述条形码生成私钥的步骤中,包括:
当所述条形码为一维码时,识别出所述一维码中黑条,生成第一私钥要素;
识别出所述一维码中白条,生成第二私钥要素;
根据所述一维码中的黑条和白条排列顺序对所述第一私钥要素和所述第二私钥要素进行排列。
进一步地,在识别出所述一维码中黑条,生成第一私钥要素的步骤中,包括:
识别出所述一维码中各黑条的宽度,根据各黑条的宽度不同,生成相应数量的第一私钥要素。
进一步地,在识别出所述一维码中白条,生成第二私钥要素的步骤中,包括:
识别出所述一维码中各白条的宽度,根据各白条的宽度不同,生成相应数量的第二私钥要素。
进一步地,在根据所述条形码生成私钥的步骤之后,所述方法包括:
将所述私钥发送给预设的移动终端。
进一步地,在扫描条形码的步骤之前,所述方法包括:
在开机时,选择是否进入加密模式;
当选择进入所述加密模式时,开启扫描。
进一步地,在扫描条形码的步骤之后,所述方法包括:
在扫描所述条形码之后,若在预设时间内识别不出所述条形码,则自动关机。
本发明还提供一种智能音箱,所述智能音箱包括:
扫描模块,用于扫描条形码;
私钥生成模块,用于根据所述条形码生成私钥;
信息加密模块,用于使用所述私钥对用户数据进行加密;
第一发送模块,用于将加密后的用户数据发送至云端。
进一步地,所述智能音箱包括:
接收模块,用于接收加密模式的选择指令;
执行模块,用于执行所述选择指令,进入加密模式,并开启扫码功能。
进一步地,当所述条形码为一维码时,所述私钥生成模块包括:
第一识别模块,用于识别出所述一维码中黑条;
第二识别模块,用于识别出所述一维码中白条;
第一生成模块,用于根据识别出的黑条生成第一私钥要素;
第二生成模块,用于根据识别出的白条生成第二私钥要素;
排列模块,用于根据所述一维码中的黑条和白条排列顺序对所述第一私钥要素和所述第二私钥要素进行排列。
进一步地,第一识别模块包括第一子识别模块,用于识别出所述一维码中各黑条的宽度;
第一生成模块包括第一子生成模块,用于根据各黑条的宽度不同,生成相应数量的第一私钥要素。
进一步地,第二识别模块包括第二子识别模块,用于识别出所述一维码中各白条的宽度;
第二生成模块包括第二子生成模块,用于根据各白条的宽度不同,生成相应数量的第二私钥要素。
进一步地,所述智能音箱包括:
私钥发送模块,用于将所述私钥发送给预设的移动终端。
进一步地,所述智能音箱包括:
选择模块,用于在开机时,选择是否进入加密模式;
开启模块,用于当选择进入所述加密模式时,开启扫描。
进一步地,所述智能音箱包括:
关机模块,用于在扫描所述条形码之后,若在预设时间内识别不出所述条形码,则自动关机
有益效果
根据上述的技术方案,本发明有益效果:通过扫描条形码生成私钥,之后使用私钥对用户数据进行加密,最后才将用户数据发送至云端,本发明可随时更换私钥,且随机性高,不易破解,旨在解决现有的智能音箱的用户数据大多数都是没有进行任何的加密发送到云端,导致容易被别人读取使用者的用户数据的问题。
附图说明
图1是应用本发明实施例提供的一种智能音箱加密通讯方法的流程图;
图2是应用本发明实施例提供的一种智能音箱的功能模块图。
本发明的最佳实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
如图1所示,本发明实施例提出一种智能音箱加密通讯方法,所述方法包括以下步骤:
步骤S101、扫描条形码。
在本实施例中,智能音箱前端对条形码进行扫描。
在步骤S101之前,所述方法包括:
在开机时,选择是否进入加密模式;
当选择进入加密模式时,开启扫描。
在开机的时候,供用户进行选择,选择是否进入加密模式。当用户选择进入加密模式时,开启扫描,当用户选择不进入加密模式时,不开启扫描。若在预设时间内,用户不进行选择,则默认进入加密模式。
在一些实施例中,在步骤S101之前,所述方法包括:
接收加密模式的选择指令;
执行所述选择指令,进入加密模式,并开启扫码功能。
接收到加密模式的选择指令,之后执行该选择指令,进入加密模式,并且开启扫码功能。
在本实施例中,条形码为一维码或者二维码。
当条形码为一维码时,采用激光雷达感应器或者摄像头进行扫描。
当条形码为二维码时,采用摄像头进行扫描。
在本实施例中,一维码或者二维码是由手机APP随机生成。
在步骤S101之后,所述方法包括:
在扫描条形码之后,若在预设时间内识别不出条形码,则自动关机。
步骤S102、根据条形码生成私钥。
在扫描条形码之后,识别出条形码,根据条形码生成私钥。
在本实施例中,在步骤S102中,包括:
当条形码为一维码时,识别出一维码中黑条,生成第一私钥要素;
识别出一维码中白条,生成第二私钥要素;
根据一维码中的黑条和白条排列顺序对第一私钥要素和第二私钥要素进行排列。
当条形码为一维码时,一维码由黑条和白条组成,识别出一维码中的黑条生成第一私钥要素,识别出一维码中的白条生成第二私钥要素,第一私钥要素与第二私钥要素不相同,私钥由第一私钥要素和第二私钥要素组成。在得到第一私钥要素和第二私钥要素之后,将第一私钥要素和第二私钥要素根据一维码中的黑条和白条排列顺序进行相对应的排列。例如,一维码依次为黑条、白条、黑条,黑条代表二进制的0,白条代表二进制的1,在识别一维码中的黑条生成0,在识别一维码中的白条生成1,在识别完成黑条和白条,再按照黑条和白条的排列顺序对0、1进行排列,最终得到一组数据为010。
在识别出所述一维码中黑条,生成第一私钥要素的步骤中,包括:
识别出所述一维码中各黑条的宽度,根据各黑条的宽度不同,生成相应数量的第一私钥要素。
在识别出所述一维码中白条,生成第二私钥要素的步骤中,包括:
识别出所述一维码中各白条的宽度,根据各白条的宽度不同,生成相应数量的第二私钥要素。
当条形码为一维码时,一维码由黑条和白条组成,识别出一维码中的黑条生成第一私钥要素,识别出一维码中的白条生成第二私钥要素,第一私钥要素与第二私钥要素不相同,私钥由第一私钥要素和第二私钥要素组成。在得到第一私钥要素和第二私钥要素之后,将第一私钥要素和第二私钥要素根据一维码中的黑条和白条排列顺序进行相对应的排列。
在完成排列第一私钥要素和第二私钥要素之后,识别一维码中各黑条的宽度,根据各黑条的宽度不同,各黑条所对应位置的第一私钥要素的生成数量不同。具体地,黑条宽度越大,第一私钥要素数量越多。
在完成排列第一私钥要素和第二私钥要素之后,识别一维码中各白条的宽度,根据各白条的宽度不同,各白条所对应位置的第二私钥要素的生成数量不同。具体地,白条宽度越大,第二私钥要素数量越多。例如,一维码依次为黑条、白条、黑条,其中第一条黑条的宽度为3L,第二条白条的宽度为L,第三条黑条的宽度为2L,黑条代表二进制的0,白条代表二进制的1,在识别一维码中的黑条生成0,在识别一维码中的白条生成1,在识别完成黑条和白条,再按照黑条和白条的排列顺序对0、1进行排列,得到一组数据为010,再根据黑条和白条的宽度,第一条黑条的宽度为3L生成二进制0的数量为3个,第二条白条的宽度为L生成二进制1的数量为1个,第三条黑条的宽度为2L生成二进制0的数量为2个,为此,最终得到一组数据为000100。
在本实施例中,在步骤S102之后,所述方法包括:
将私钥发送给预设的移动终端。
在智能音箱扫描条形码生成私钥之后,将生成的私钥复制一份发送给预设移动终端。
移动终端具有私钥,在移动终端中使用私钥可以读取用户数据的内容。
在一些实施例中,在移动终端中生成条形码供智能音箱进行扫描,同时,移动终端根据该条形码生成私钥。其中,移动终端具有与智能音箱相同的私钥生成规则,为此,对于同一个条形码,在移动终端中生成的私钥与在智能音箱中生成的私钥是相同的。
步骤S103、使用所述私钥对用户数据进行加密。
在获得私钥之后,使用私钥对用户数据进行加密,加密后的用户数据需要私钥才能打开用户数据的内容。
私钥对用户数据的加密方式是将用户数据进行封装,对其进行加密,在没有获取私钥时,打开用户数据后是提供要求输入密码,或者,打开用户数据后是乱码,不能正常阅读。
步骤S104、将加密后的用户数据发送至云端。
将加密后的用户数据发送至云端,在云端中的用户数据,由于是已被加密,所以需要私钥才能打开。
综上所述,通过扫描条形码生成私钥,之后使用私钥对用户数据进行加密,最后才将用户数据发送至云端,本方法可随时更换私钥,且随机性高,不易破解,旨在解决现有的智能音箱的用户数据大多数都是没有进行任何的加密发送到云端,导致容易被别人读取使用者的用户数据的问题。
如图2所示,本发明实施例还提出一种智能音箱,智能音箱1包括扫描模块11、私钥生成模块12、信息加密模块13和第一发送模块14。
扫描模块11,用于扫描条形码。
在本实施例中,扫描模块11设于智能音箱1前端,智能音箱1前端对条形码进行扫描。
智能音箱1包括:
选择模块,用于在开机时,选择是否进入加密模式;
开启模块,用于当选择进入加密模式时,开启扫描。
在开机的时候,供用户进行选择,选择是否进入加密模式。当用户选择进入加密模式时,开启扫描,当用户选择不进入加密模式时,不开启扫描。若在预设时间内,用户不进行选择,则默认进入加密模式。
在一些实施例中,所述智能音箱包括:
接收模块,用于接收加密模式的选择指令;
执行模块,用于执行所述选择指令,进入加密模式,并开启扫码功能。
在本实施例中,条形码为一维码或者二维码。
当条形码为一维码时,扫描模块11为激光雷达感应器或者摄像头,采用激光雷达感应器或者摄像头进行扫描。
当条形码为二维码时,扫描模块11为摄像头,采用摄像头进行扫描。
在本实施例中,一维码或者二维码是由手机APP随机生成。
智能音箱1包括:
关机模块,用于在扫描条形码之后,若在预设时间内识别不出条形码,则自动关机。
私钥生成模块12,用于根据条形码生成私钥。
在扫描条形码之后,识别出条形码,根据条形码生成私钥。
在本实施例中,当条形码为一维码时,私钥生成模块12包括:
第一识别模块,用于识别出一维码中黑条;
第二识别模块,用于识别出一维码中白条;
第一生成模块,用于根据识别出的黑条生成第一私钥要素;
第二生成模块,用于根据识别出的白条生成第二私钥要素;
排列模块,用于根据一维码中的黑条和白条排列顺序对第一私钥要素和第二私钥要素进行排列。
当条形码为一维码时,一维码由黑条和白条组成,识别出一维码中的黑条生成第一私钥要素,识别出一维码中的白条生成第二私钥要素,第一私钥要素与第二私钥要素不相同,私钥由第一私钥要素和第二私钥要素组成。在得到第一私钥要素和第二私钥要素之后,将第一私钥要素和第二私钥要素根据一维码中的黑条和白条排列顺序进行相对应的排列。例如,一维码依次为黑条、白条、黑条,黑条代表二进制的0,白条代表二进制的1,在识别一维码中的黑条生成0,在识别一维码中的白条生成1,在识别完成黑条和白条,再按照黑条和白条的排列顺序对0、1进行排列,最终得到一组数据为010。
第一识别模块包括第一子识别模块,用于识别出所述一维码中各黑条的宽度;
第一生成模块包括第一子生成模块,用于根据各黑条的宽度不同,生成相应数量的第一私钥要素。
第二识别模块包括第二子识别模块,用于识别出所述一维码中各白条的宽度;
第二生成模块包括第二子生成模块,用于根据各白条的宽度不同,生成相应数量的第二私钥要素。
当条形码为一维码时,一维码由黑条和白条组成,识别出一维码中的黑条生成第一私钥要素,识别出一维码中的白条生成第二私钥要素,第一私钥要素与第二私钥要素不相同,私钥由第一私钥要素和第二私钥要素组成。在得到第一私钥要素和第二私钥要素之后,将第一私钥要素和第二私钥要素根据一维码中的黑条和白条排列顺序进行相对应的排列。
在完成排列第一私钥要素和第二私钥要素之后,识别一维码中各黑条的宽度,根据各黑条的宽度不同,各黑条所对应位置的第一私钥要素的生成数量不同。具体地,黑条宽度越大,第一私钥要素数量越多。
在完成排列第一私钥要素和第二私钥要素之后,识别一维码中各白条的宽度,根据各白条的宽度不同,各白条所对应位置的第二私钥要素的生成数量不同。具体地,白条宽度越大,第二私钥要素数量越多。例如,一维码依次为黑条、白条、黑条,其中第一条黑条的宽度为3L,第二条白条的宽度为L,第三条黑条的宽度为2L,黑条代表二进制的0,白条代表二进制的1,在识别一维码中的黑条生成0,在识别一维码中的白条生成1,在识别完成黑条和白条,再按照黑条和白条的排列顺序对0、1进行排列,得到一组数据为010,再根据黑条和白条的宽度,第一条黑条的宽度为3L生成二进制0的数量为3个,第二条白条的宽度为L生成二进制1的数量为1个,第三条黑条的宽度为2L生成二进制0的数量为2个,为此,最终得到一组数据为000100。
在本实施例中,智能音箱1还包括:
私钥发送模块,用于将私钥发送给预设的移动终端。
在智能音箱扫描条形码生成私钥之后,将生成的私钥复制一份发送给预设移动终端。
移动终端具有私钥,在移动终端中使用私钥可以读取用户数据的内容。
在一些实施例中,在移动终端中生成条形码供智能音箱进行扫描,同时,移动终端根据该条形码生成私钥。其中,移动终端具有与智能音箱相同的私钥生成规则,为此,对于同一个条形码,在移动终端中生成的私钥与在智能音箱中生成的私钥是相同的。
信息加密模块13,用于使用所述私钥对用户数据进行加密。
在获得私钥之后,使用私钥对用户数据进行加密,加密后的用户数据需要私钥才能打开用户数据的内容。
第一发送模块14,用于将加密后的用户数据发送至云端。
将加密后的用户数据发送至云端,在云端中的用户数据,由于是已被加密,所以需要私钥才能打开。
综上所述,通过扫描条形码生成私钥,之后使用私钥对用户数据进行加密,最后才将用户数据发送至云端,智能音箱1可随时更换私钥,且随机性高,不易破解,旨在解决现有的智能音箱的用户数据大多数都是没有进行任何的加密发送到云端,导致容易被别人读取使用者的用户数据的问题。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (16)

  1. 一种智能音箱加密通讯方法,其特征在于,所述方法包括:
    扫描条形码;
    根据所述条形码生成私钥;
    使用所述私钥对用户数据进行加密;
    将加密后的用户数据发送至云端。
  2. 根据权利要求1所述的一种智能音箱加密通讯方法,其特征在于,在扫描条形码的步骤之前,所述方法包括:
    接收加密模式的选择指令;
    执行所述选择指令,进入加密模式,并开启扫码功能。
  3. 根据权利要求2所述的一种智能音箱加密通讯方法,其特征在于,在根据所述条形码生成私钥的步骤中,包括:
    当所述条形码为一维码时,识别出所述一维码中黑条,生成第一私钥要素;
    识别出所述一维码中白条,生成第二私钥要素;
    根据所述一维码中的黑条和白条排列顺序对所述第一私钥要素和所述第二私钥要素进行排列。
  4. 根据权利要求3所述的一种智能音箱加密通讯方法,其特征在于,在识别出所述一维码中黑条,生成第一私钥要素的步骤中,包括:
    识别出所述一维码中各黑条的宽度,根据各黑条的宽度不同,生成相应数量的第一私钥要素。
  5. 根据权利要求3所述的一种智能音箱加密通讯方法,其特征在于,在识别出所述一维码中白条,生成第二私钥要素的步骤中,包括:
    识别出所述一维码中各白条的宽度,根据各白条的宽度不同,生成相应数量的第二私钥要素。
  6. 根据权利要求1所述的一种智能音箱加密通讯方法,其特征在于,在根据所述条形码生成私钥的步骤之后,所述方法包括:
    将所述私钥发送给预设的移动终端。
  7. 根据权利要求1所述的一种智能音箱加密通讯方法,其特征在于,在扫描条形码的步骤之前,所述方法包括:
    在开机时,选择是否进入加密模式;
    当选择进入所述加密模式时,开启扫描。
  8. 根据权利要求1所述的一种智能音箱加密通讯方法,其特征在于,在扫描条形码的步骤之后,所述方法包括:
    在扫描所述条形码之后,若在预设时间内识别不出所述条形码,则自动关机。
  9. 一种智能音箱,其特征在于,所述智能音箱包括:
    扫描模块,用于扫描条形码;
    私钥生成模块,用于根据所述条形码生成私钥;
    信息加密模块,用于使用所述私钥对用户数据进行加密;
    第一发送模块,用于将加密后的用户数据发送至云端。
  10. 根据权利要求9所述的一种智能音箱,其特征在于,所述智能音箱包括:
    接收模块,用于接收加密模式的选择指令;
    执行模块,用于执行所述选择指令,进入加密模式,并开启扫码功能。
  11. 根据权利要求10所述的一种智能音箱,其特征在于,当所述条形码为一维码时,所述私钥生成模块包括:
    第一识别模块,用于识别出所述一维码中黑条;
    第二识别模块,用于识别出所述一维码中白条;
    第一生成模块,用于根据识别出的黑条生成第一私钥要素;
    第二生成模块,用于根据识别出的白条生成第二私钥要素;
    排列模块,用于根据所述一维码中的黑条和白条排列顺序对所述第一私钥要素和所述第二私钥要素进行排列。
  12. 根据权利要求11所述的一种智能音箱,其特征在于,第一识别模块包括第一子识别模块,用于识别出所述一维码中各黑条的宽度;
    第一生成模块包括第一子生成模块,用于根据各黑条的宽度不同,生成相应数量的第一私钥要素。
  13. 根据权利要求11所述的一种智能音箱,其特征在于,第二识别模块包括第二子识别模块,用于识别出所述一维码中各白条的宽度;
    第二生成模块包括第二子生成模块,用于根据各白条的宽度不同,生成相应数量的第二私钥要素。
  14. 根据权利要求9所述的一种智能音箱,其特征在于,所述智能音箱包括:
    私钥发送模块,用于将所述私钥发送给预设的移动终端。
  15. 根据权利要求9所述的一种智能音箱,其特征在于,所述智能音箱包括:
    选择模块,用于在开机时,选择是否进入加密模式;
    开启模块,用于当选择进入所述加密模式时,开启扫描。
  16. 根据权利要求9所述的一种智能音箱,其特征在于,所述智能音箱包括:
    关机模块,用于在扫描所述条形码之后,若在预设时间内识别不出所述条形码,则自动关机。
PCT/CN2018/094129 2018-05-03 2018-07-02 一种智能音箱及其加密通讯方法 WO2019210571A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810416521.3 2018-05-03
CN201810416521.3A CN108494553B (zh) 2018-05-03 2018-05-03 一种智能音箱及其加密通讯方法

Publications (1)

Publication Number Publication Date
WO2019210571A1 true WO2019210571A1 (zh) 2019-11-07

Family

ID=63354002

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/094129 WO2019210571A1 (zh) 2018-05-03 2018-07-02 一种智能音箱及其加密通讯方法

Country Status (2)

Country Link
CN (1) CN108494553B (zh)
WO (1) WO2019210571A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205451072U (zh) * 2016-02-26 2016-08-10 哈尔滨工业大学(威海) 一种用于计算机软件保护的智能算法加密装置
CN106685948A (zh) * 2016-12-24 2017-05-17 深圳市金立通信设备有限公司 一种数据处理方法、终端、通信设备及数据处理系统
CN107786398A (zh) * 2016-08-31 2018-03-09 阿里巴巴集团控股有限公司 数据交互方法和装置,及智能终端、操作系统、智能冰箱

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104602364B (zh) * 2014-12-31 2018-12-25 歌尔股份有限公司 无线设备连接无线接入点的方法及无线设备、智能终端
CN105070004A (zh) * 2015-07-15 2015-11-18 泰凌微电子(上海)有限公司 智能设备及其遥控系统和遥控配对方法
CN106850392B (zh) * 2015-12-04 2020-06-02 腾讯科技(深圳)有限公司 消息处理方法及装置、消息接收方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205451072U (zh) * 2016-02-26 2016-08-10 哈尔滨工业大学(威海) 一种用于计算机软件保护的智能算法加密装置
CN107786398A (zh) * 2016-08-31 2018-03-09 阿里巴巴集团控股有限公司 数据交互方法和装置,及智能终端、操作系统、智能冰箱
CN106685948A (zh) * 2016-12-24 2017-05-17 深圳市金立通信设备有限公司 一种数据处理方法、终端、通信设备及数据处理系统

Also Published As

Publication number Publication date
CN108494553A (zh) 2018-09-04
CN108494553B (zh) 2020-09-01

Similar Documents

Publication Publication Date Title
US10361857B2 (en) Electronic stamp system for security intensification, control method thereof, and non-transitory computer readable storage medium having computer program recorded thereon
Ling et al. Security vulnerabilities of internet of things: A case study of the smart plug system
JP6443196B2 (ja) 安全な通信のためのデバイス設定
KR101289530B1 (ko) 스마트폰의 관리하에서 스마트폰의 베어러 및 서버 독립 부모 제어를 위한 방법 및 장치
US9338164B1 (en) Two-way authentication using two-dimensional codes
KR101658501B1 (ko) 해시함수 기반의 전자서명 서비스 시스템 및 그 방법
CN110633805A (zh) 纵向联邦学习系统优化方法、装置、设备及可读存储介质
WO2016107333A1 (zh) 一种在线激活移动终端令牌的设备和系统的工作方法
US9979725B1 (en) Two-way authentication using two-dimensional codes
CN113055867A (zh) 终端辅助配网的方法和装置、电子设备
WO2016201811A1 (zh) 身份认证方法、装置及系统
WO2015180261A1 (zh) 智能家居的访问方法、控制中心设备及穿戴终端
KR20130106976A (ko) 보안 모바일 웹 클라이언트 및 웹 서버 시스템
US9166788B2 (en) Method and device for obtaining a security key
CN107182053B (zh) 一种用于连接隐藏无线接入点的方法与设备
KR102000244B1 (ko) 형태보존 암호화가 적용된 영지식증명 기반의 블록체인 시스템 및 그의 제어 방법
CN110719288A (zh) 云端服务访问的方法、云端服务器及终端
WO2021072761A1 (zh) 设备接入方法、装置、系统控制方法、电子设备及存储介质
GB2573563A (en) Methods and apparatus for authenticating devices
CN110932951B (zh) 一种智能家居控制方法和装置
WO2020073916A1 (zh) 一种存储设备的加密方法、装置及存储介质
WO2016146046A1 (zh) 数据访问方法及装置
WO2016061803A1 (zh) 一种m2m终端控制方法及相关设备
US20210096821A1 (en) Dynamic generation of device identifiers
CN107135074B (zh) 一种高级安全方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18917335

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18917335

Country of ref document: EP

Kind code of ref document: A1