Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method and related equipment

A control method and device-side technology, applied in the field of data and information security, can solve the problems of low security and easy theft of digital information by criminals

Active Publication Date: 2019-04-12
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found through prior art research that digital information is easily stolen by criminals during the transmission process and has low security. Therefore, it is urgent to encrypt the transmitted data to protect the data information to be transmitted and improve the security of the data information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method and related equipment
  • Control method and related equipment
  • Control method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057]In this application, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any relationship between these entities or operations. any actual relationship or order, the terms "comprises," "comprises," or any other variation thereof are intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus that inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a control method. The control method comprises the steps that when a control end receives a control instruction, the control end sends an instruction data transmission request to an equipment end, and the equipment end is triggered to conduct identity authentication on the control end; when the control end passes identity authentication of the equipment end, the control endauthenticates the identity of the equipment end, and when identity authentication of the equipment end succeeds, a transmission key for achieving data transmission with the equipment is determined, and instruction data is encrypted according to the transmission key; and the equipment conducts decryption according to the transmission key, and a corresponding control operation is executed accordingto the instruction data obtained through decryption. By applying the control method, when the control end conducts instruction data transmission with the equipment end, the identities of the two parties are both authenticated, and after the identities pass authentication, the instruction data needing to be transmitted is encrypted, transmitted and decrypted according to the determined transmissionkey; and accordingly, the security of data information transmission is improved.

Description

technical field [0001] The invention relates to the field of data information security, in particular to a control method and related equipment. Background technique [0002] With the rapid development of science and technology, smart devices are used in all aspects of our lives. Remote control of smart devices can be achieved through remote Internet connections or local area network and near-field Bluetooth and NFC connections, through data transmission in plain text. , Realizing smart home life and making our life more convenient. [0003] The inventor found through prior art research that digital information is easy to be stolen by criminals during the transmission process, and the security is low. Therefore, it is urgent to encrypt the transmitted data to protect the data information to be transmitted and improve the security of the data information. Contents of the invention [0004] The technical problem to be solved by the present invention is to provide a control ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/32H04L9/08H04L9/06H04W12/03H04W12/0431
CPCH04L9/06H04L9/0869H04L9/3247H04W12/02H04W12/04H04W12/06
Inventor 靳松
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products