A kind of data transmission method of smart homeTechnical field
The present invention relates to community networks and information security field, and in particular to a kind of data transmission method of smart home.
Background technique
Smart home is the embodiment of the instrumentation under the influence of internet.Smart home will be in family by technology of Internet of thingsVarious equipment (such as audio & video equipment, lighting system, curtain control, airconditioning control, security system, Digital Theater Systems, audio-visual clothesBusiness device, shadow cabinet system, network home appliance etc.) it connects together, home wiring control, Lighting control, remote control using telephone, indoor and outdoor are providedThe multiple functions such as remote control, burglar alarm, environmental monitoring, HVAC control, infrared forwarding and programmable Timer control and means.WithCommon household is compared, and smart home not only has traditional inhabitation function, has both building, network communication, information household appliances, equipment certainlyDynamicization provides comprehensive information exchange function, and even various energy expenditures save fund.
Although smart home has the above advantage, very important, once the total control equipment of Internet of Things is invaded, then familyThe privacy of people is easier to be invaded compared to traditional-family, it is difficult to safety is ensured, first is that can pass through access control system, voice and videoSystem obtain the movable information of household, and layman not when easily enter the room, second is that the camera shooting for passing through anti-theft alarm systemHead snooping household's living habit, third is that causing to perplex to household by mischief, such as the household appliance unexpectedly opened, furnaceStove always misfires.
Summary of the invention
In order to overcome the drawbacks of the prior art, the present invention provides a kind of data transmission method of smart home, by numberAccording to the safety for reinforcing data in transmission, avoids being obtained control command by other people and interpret useful information.
For foregoing invention purpose, the present invention solves in this way: a kind of data transmission method of smart home is answeredData for smart machine each in smart home are transmitted, and are included the following steps:
All smart machines are sequentially connected in order, positioned at the smart machine accessing external network of connection head end;
The control command of user is successively transmitted to next intelligence and sets from the incoming smart machine for being located at connection head end of outer netStandby, until passing to the smart machine for being located at connection end, every time before forwarding, corresponding smart machine intercepts phase from control commandThe field answered.
Compared with the prior art, the present invention is by connecting smart machine head and the tail, then is equipped with corresponding all smart machinesControl command, even if so that other people intercept and capture control command, it is also difficult to estimate field therein is which corresponding smart machine, improveThe safety of data transmission.
Further, there is different key on all smart machines respectively, user possesses whole keys, Yong HushengAt the process of control command are as follows:
S11, the field by control positioned at the smart machine of connection end are encrypted by corresponding key;
S12, the field for controlling a upper smart machine is added in the encrypted field of previous step, and passes through corresponding keyIt is encrypted;
S13, repeat S12, until all fields are all encrypted.
Further, there is different private key on all smart machines respectively, user possesses whole public keys, Yong HushengAt the process of control command are as follows:
S21, the field by control positioned at the smart machine of connection end are encrypted by corresponding public key;
S22, the field for controlling a upper smart machine is added in the encrypted field of previous step, and passes through corresponding public keyIt is encrypted;
S23, repeat S22, until all fields are all encrypted.
It is encrypted using asymmetric arithmetic and is decrypted layer by layer layer by layer, it is more preferable compared to safety for symmetry algorithm.
Further, when smart machine is to user's returning response data, since the smart machine for being located at connection end, according toIt is secondary to be sent to a smart machine, until passing to the smart machine for being located at connection head end, and user is finally issued, sent every timeBefore, data is added in response data by corresponding smart machine.So, other people are difficult from being sent to the corresponding of userThe true information obtained in data, further enhances information security.
Further, there is different key on all smart machines respectively, user possesses all keys, generates mostThe process for the response data that whole user receives are as follows:
S31, positioned at connection end smart machine by data by corresponding key encrypt after, be sent to an intelligence and setIt is standby;
S32, a upper smart machine data be added in the encrypted field of previous step, and by corresponding key intoRow encryption;
S33, repeat S32, until the data of all smart machines is all encrypted.
Response data is encrypted layer by layer and is decrypted layer by layer, and asymmetric arithmetic is more preferable compared to safety for symmetry algorithm.
Further, there is the public key of user on all smart machines respectively, user possesses the private key of its own, generates mostThe process for the response data that whole user receives are as follows:
S41, positioned at connection end smart machine by data by being sent to an intelligence and setting after the public key encryption of userIt is standby;
S42, a upper smart machine data be added in the encrypted field of previous step, and by the public key of user intoRow encryption;
S43, repeat S42, until the data of all smart machines is all encrypted.
Response data is encrypted layer by layer and is decrypted layer by layer, and asymmetric arithmetic is more preferable compared to safety for symmetry algorithm.
Compared with the prior art, the beneficial effects of the present invention are: the present invention by connecting smart machine head and the tail, then matchesWith the control command of all smart machines of correspondence, even if so that other people intercept and capture control command, it is also difficult to estimate that field therein isWhich corresponding smart machine, improves the safety of data transmission.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
The present invention is described in detail with attached drawing combined with specific embodiments below.
Embodiment 1:
A kind of data transmission method of smart home as shown in Figure 1, the data applied to smart machine each in smart home passIt is defeated, include the following steps:
All smart machines are sequentially connected in order, positioned at the smart machine accessing external network of connection head end;
The control command of user is successively transmitted to next intelligence and sets from the incoming smart machine for being located at connection head end of outer netStandby, until passing to the smart machine for being located at connection end, every time before forwarding, corresponding smart machine intercepts phase from control commandThe field answered.
Compared with the prior art, the present invention is by connecting smart machine head and the tail, then is equipped with corresponding all smart machinesControl command, even if so that other people intercept and capture control command, it is also difficult to estimate field therein is which corresponding smart machine, improveThe safety of data transmission.
: there is different key on all smart machines respectively, user possesses whole keys, and user generates control lifeThe process of order are as follows:
S11, the field by control positioned at the smart machine of connection end are encrypted by corresponding key;
S12, the field for controlling a upper smart machine is added in the encrypted field of previous step, and passes through corresponding keyIt is encrypted;
S13, repeat S12, until all fields are all encrypted.
When smart machine is to user's returning response data, the process for the response data that end user receives is generated are as follows:
S31, positioned at connection end smart machine by data by corresponding key encrypt after, be sent to an intelligence and setIt is standby;
S32, a upper smart machine data be added in the encrypted field of previous step, and by corresponding key intoRow encryption;
S33, repeat S32, until the data of all smart machines is all encrypted.
Response data is encrypted layer by layer and is decrypted layer by layer, and asymmetric arithmetic is more preferable compared to safety for symmetry algorithm.
Embodiment 2:
The present embodiment and embodiment 2 the difference is that, have different private key, Yong Huyong on all smart machines respectivelyThere is whole public keys, user generates the process of control command are as follows:
S21, the field by control positioned at the smart machine of connection end are encrypted by corresponding public key;
S22, the field for controlling a upper smart machine is added in the encrypted field of previous step, and passes through corresponding public keyIt is encrypted;
S23, repeat S22, until all fields are all encrypted.
It is encrypted using asymmetric arithmetic and is decrypted layer by layer layer by layer, it is more preferable compared to safety for symmetry algorithm.
There is the public key of user on all smart machines respectively, user possesses the private key of its own, generates end user and connectsThe process of the response data received are as follows:
S41, positioned at connection end smart machine by data by being sent to an intelligence and setting after the public key encryption of userIt is standby;
S42, a upper smart machine data be added in the encrypted field of previous step, and by the public key of user intoRow encryption;
S43, repeat S42, until the data of all smart machines is all encrypted.
Response data is encrypted layer by layer and is decrypted layer by layer, and asymmetric arithmetic is more preferable compared to safety for symmetry algorithm.