Nothing Special   »   [go: up one dir, main page]

CN114124403B - Method, device and system for realizing remote control of equipment - Google Patents

Method, device and system for realizing remote control of equipment Download PDF

Info

Publication number
CN114124403B
CN114124403B CN202111325454.2A CN202111325454A CN114124403B CN 114124403 B CN114124403 B CN 114124403B CN 202111325454 A CN202111325454 A CN 202111325454A CN 114124403 B CN114124403 B CN 114124403B
Authority
CN
China
Prior art keywords
digital certificate
control
remote control
instruction
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111325454.2A
Other languages
Chinese (zh)
Other versions
CN114124403A (en
Inventor
张学智
赵婧博
郑然�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111325454.2A priority Critical patent/CN114124403B/en
Publication of CN114124403A publication Critical patent/CN114124403A/en
Application granted granted Critical
Publication of CN114124403B publication Critical patent/CN114124403B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The disclosure discloses a method, a device and a system for realizing remote control of equipment, and relates to the field of control. The method comprises the following steps: receiving a digital certificate sent by a CA, wherein the digital certificate comprises an instruction set which is authorized to control equipment; and sending the control instruction and the digital certificate applied for execution to the equipment security module, so that after the equipment security module verifies the digital certificate, extracting an instruction set in the digital certificate, and if the control instruction is matched with the instruction set, sending the control instruction to the equipment. The method and the device can improve the safety of remote control of the equipment.

Description

Method, device and system for realizing remote control of equipment
Technical Field
The present disclosure relates to the field of control, and in particular, to a method, an apparatus, and a system for implementing remote control of a device.
Background
When the equipment such as a vehicle, a robot and the like is controlled remotely based on the mobile communication technology such as 5G and the like, a safety authentication mechanism is added between the operator and the equipment because the operator and the equipment are in different regions so as to ensure that only the operator with legal authority can control the equipment, thereby avoiding various safety production risks caused by unauthorized operation.
Disclosure of Invention
The technical problem to be solved by the present disclosure is to provide a method, an apparatus and a system for implementing remote control of a device, which can improve the security of remote control of the device.
According to an aspect of the present disclosure, a method for implementing remote control of a device is provided, including: receiving a digital certificate sent by a Certificate Authority (CA), wherein the digital certificate comprises an instruction set which is authorized to control equipment; and sending the control instruction and the digital certificate applied for execution to the equipment security module, so that after the equipment security module verifies the digital certificate, extracting an instruction set in the digital certificate, and if the control instruction is matched with the instruction set, sending the control instruction to the equipment.
In some embodiments, the method for implementing remote control of a device further includes: signing the control instruction to obtain a signature value; and sending the control instruction, the signature value and the digital certificate to the device security module to enable the device security module to verify the signature value and the digital certificate.
In some embodiments, the method for implementing remote control of a device further includes: and sending application information comprising the public key and the instruction set to the CA so that the CA can generate a digital certificate after auditing the application information.
In some embodiments, if the control instruction does not match the instruction set, the control instruction is discarded by the device security module.
In some embodiments, the instruction set is located in an extension field of the digital certificate.
According to another aspect of the present disclosure, there is also provided an apparatus for implementing remote control of a device, including: a receiving unit configured to receive a digital certificate sent by a certificate authority CA, wherein the digital certificate includes an instruction set authorized to control the device; and the sending unit is configured to send the control instruction and the digital certificate to the equipment security module, so that after the equipment security module verifies the digital certificate, the instruction set in the digital certificate is extracted, and if the control instruction is matched with the instruction set, the control instruction is sent to the equipment.
In some embodiments, the apparatus for implementing remote control of a device further includes: the signature unit is configured to sign the control instruction applied for execution to obtain a signature value, wherein the sending unit is further configured to send the control instruction, the signature value and the digital certificate to the device security module so that the device security module verifies the signature value and the digital certificate.
In some embodiments, the sending unit is further configured to send the application information including the public key and the instruction set to the CA, such that the CA generates the digital certificate after auditing the application information.
According to another aspect of the present disclosure, there is also provided an apparatus for implementing remote control of a device, including: a memory; and a processor coupled to the memory, the processor configured to perform a method of implementing a remote control of the device as described above based on instructions stored in the memory.
According to another aspect of the present disclosure, there is also provided a system for implementing remote control of a device, including: the device for realizing the remote control of the equipment; the certificate issuing mechanism CA is configured to generate a digital certificate after auditing an instruction set sent by a device for realizing the remote control of the equipment and send the digital certificate to the device for realizing the remote control of the equipment; and the equipment security module is configured to extract an instruction set in the digital certificate after verifying the digital certificate, and if the control instruction is matched with the instruction set, the control instruction is sent to the equipment.
According to another aspect of the disclosure, there is also provided a non-transitory computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described method of implementing a remote control of a device.
In the embodiment of the disclosure, the remote control instruction set with the authority of the operator is written into the digital certificate, after the legitimacy of the digital certificate is verified, the legitimacy of the remote control instruction can be ensured by comparing the field data in the digital certificate with the remote control instruction, and the safety of the remote control of the equipment is improved.
Other features of the present disclosure and its advantages will become apparent from the following detailed description of exemplary embodiments of the disclosure, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The disclosure may be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings in which:
fig. 1 is a flow diagram of some embodiments of a method of implementing remote control of a device of the present disclosure.
Fig. 2 is a flow chart of other embodiments of a method of implementing remote control of a device of the present disclosure.
Fig. 3 is a schematic structural diagram of some embodiments of an apparatus of the present disclosure that implements remote control of a device.
Fig. 4 is a schematic structural view of other embodiments of an apparatus for implementing remote control of a device according to the present disclosure.
Fig. 5 is a schematic structural view of other embodiments of an apparatus for implementing remote control of a device according to the present disclosure.
Fig. 6 is a schematic structural diagram of some embodiments of a system implementing remote control of a device of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless it is specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective parts shown in the drawings are not drawn in actual scale for convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but should be considered part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
For the purposes of promoting an understanding of the principles and advantages of the disclosure, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same.
Fig. 1 is a flow diagram of some embodiments of a method of implementing remote control of a device of the present disclosure. This embodiment is performed by means for realizing a remote control of the device, for example an operator SE (Security Element).
In step 110, a digital certificate sent by a CA (Certification Authority, certificate authority) is received, wherein the digital certificate includes a set of instructions that are authorized to control a device.
In some embodiments, the operator security module sends application information including the public key and the instruction set to the CA, which, after auditing the application information, generates the digital certificate.
In some embodiments, the instruction set is located in an extension field of the digital certificate.
In step 120, the control instruction and the digital certificate applied for execution are sent to the device security module, so that after the device security module verifies the digital certificate, the instruction set in the digital certificate is extracted, and if the control instruction is matched with the instruction set, the control instruction is sent to the device.
In some embodiments, an operator security module signs a control instruction, obtains a signature value, and sends the control instruction, the signature value, and a digital certificate to a device security module, wherein the device security module is a security module with public/asymmetric cryptographic operation capabilities. After the device security module verifies the signature value and the digital certificate, the instruction set in the digital certificate is extracted. The signature value is information that uniquely identifies this operator, with legal effectiveness.
In the embodiment, the remote control instruction set with the authority of the operator is written into the digital certificate, after the legitimacy of the digital certificate is verified, the legitimacy of the remote control instruction can be ensured by comparing the field data in the digital certificate with the remote control instruction, and the safety of the remote control of the equipment is improved.
Fig. 2 is a flow chart of other embodiments of a method of implementing remote control of a device of the present disclosure.
At step 210, the operator security module internally generates a public key and a private key.
The private key is stored in the operator security module and the public key is disclosed to the outside. The public key is also referred to as an asymmetric key, and the encryption algorithm of the asymmetric key is, for example, RSA. With one of the keys being encrypted, only the other key can be decrypted.
At step 220, the operator security module sends application information containing the public key and the instruction set to the CA.
In some embodiments, the instruction set is an instruction set that is authorized to be executed.
The CA is the trust foundation of PKI (Public Key Infrastructure ), which manages the entire life cycle of the public key, its roles include: issuing the certificate, specifying the validity period of the certificate, and by issuing a CRL (CERTIFICATE REVOCATION LIST ), ensures that the certificate can be revoked if necessary.
After the ca reviews the application information, a digital certificate is generated at step 230.
In some embodiments, the CA performs a variety of audits on the application information, including off-line. For example, the application is reviewed and audited at the CA's system interface, and the application party is contacted for verification by mail, telephone, etc. if necessary, or the corporation is required to provide certification materials such as corporation seal.
In generating the digital certificate, the information is digitally signed, for example, with the name of the applicant, a public key, an instruction set, and a CA private key, etc., to generate the digital certificate, wherein the instruction set is populated into an extension field of the digital certificate. Taking the digital certificate of the X509 specification as an example, the extension field of the digital certificate is a sequence set, and may internally include a plurality of data sequence fields representing different meanings, such as key usage (the value may be used only as a digital signature or only as encryption, or may be used as a signature or may be used as encryption, etc.), a certificate policy, etc., where the digital certificate user may also add a custom field to the extension field of the digital certificate, that is, fill the instruction set into the extension field.
In step 240, the CA sends the digital certificate to the operator security module. The operator security module stores the digital certificate.
In step 250, the operator security module signs the control instruction to be sent, generating a signature value.
In some embodiments, the hash value of the control instruction is cryptographically computed using a private key within the operator security module to obtain the signature value. When verifying the signature value, the public key is utilized to decrypt the signature value, and the decrypted data is compared with the hash value of the control instruction to verify the validity of the signature value.
In step 260, the operator security module sends the control instructions, the signature, and the digital certificate to the device security module.
In some embodiments, the device security module is, for example, a security chip preset in the device or an external security module connected to the device in a USB connection manner, such as a U-shield commonly used in digital banking, and the device may invoke the security capability of the security module through the interface.
In step 270, the device security module verifies the signature value and the digital certificate, and after verification, extracts the instruction set from the digital certificate.
In some embodiments, the device security module verifies a priori whether the validity period of the digital certificate has elapsed, and then obtains a certificate revocation list from the CA center to verify whether the digital certificate has been revoked. For example, the device security module typically presets a root certificate of the CA center, and the validity of the digital certificate can be verified by a CA center public key within the root certificate. If the digital certificate is legitimate, the digital signature may be verified using operator public key information within the digital certificate.
In step 280, the device security module determines whether the control instruction matches the instruction set, if so, then step 290 is performed, otherwise, step 2100 is performed.
In step 290, the device security module sends a control instruction to the device.
In step 2100, the device security module discards the control instruction.
In the above embodiment, the remote control instruction set with authority of the operator is written into the digital certificate, the non-counterfeitability and traceability of the remote control instruction are ensured through the digital signature technology, and the legitimacy of the remote control instruction is ensured through the comparison and verification of the legitimacy of the digital certificate and the extended field data in the digital certificate and the remote control instruction, so that the safety production risk is reduced.
Fig. 3 is a schematic structural diagram of some embodiments of an apparatus of the present disclosure that implements remote control of a device. The device is, for example, an operator safety module, comprising a receiving unit 310 and a transmitting unit 320.
The receiving unit 310 is configured to receive a digital certificate sent by a CA, wherein the digital certificate includes an instruction set authorized to control a device.
In some embodiments, the instruction set is located in an extension field of the digital certificate.
The transmitting unit 320 is configured to transmit the control instruction and the digital certificate to the device security module, so that the device security module extracts an instruction set in the digital certificate after verifying the digital certificate, and if the control instruction matches the instruction set, transmits the control instruction to the device.
In some embodiments, the sending unit 320 is further configured to send the application information including the public key and the instruction set to the CA, so that the CA generates the digital certificate after auditing the application information.
In the above embodiment, the instruction set authorized to control the device is written into the digital certificate, and after verifying the digital certificate, if the remote control instruction is matched with the instruction set, the control instruction is sent to the device, so that the security of device control is improved.
Fig. 4 is a schematic structural view of other embodiments of an apparatus for implementing remote control of a device according to the present disclosure. The apparatus further comprises a signing unit 410.
The signing unit 410 is configured to sign the control instruction applied for execution, resulting in a signature value, wherein the sending unit 320 is further configured to send the control instruction, the signature value and the digital certificate to the device security module. After the signature value and the digital certificate are verified by the equipment security module, judging whether the control instruction is matched with the instruction set, if so, sending the control instruction to the equipment, otherwise, discarding the control instruction.
In the embodiment, the non-counterfeitability and traceability of the remote control instruction are ensured through the digital signature technology, and the legitimacy of the control instruction can be ensured through verifying the legitimacy of the digital certificate and comparing the instruction set in the control instruction and the digital certificate, so that the safety of equipment control is improved.
Fig. 5 is a schematic structural view of other embodiments of an apparatus for implementing remote control of a device according to the present disclosure. The apparatus 500 includes a memory 510 and a processor 520. Wherein: memory 510 may be a magnetic disk, flash memory, or any other non-volatile storage medium. The memory is used for storing instructions in the embodiments corresponding to fig. 1 and 2. Processor 520 is coupled to memory 510 and may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller. The processor 520 is configured to execute instructions stored in the memory.
In some embodiments, processor 520 is coupled to memory 510 by BUS 530. The apparatus 500 may also be connected to an external storage system 550 via a storage interface 540 for invoking external data, and may also be connected to a network or another computer system (not shown) via a network interface 560. And will not be described in detail herein.
In this embodiment, the data instruction is stored in the memory, and then the processor processes the instruction, so that the safety risk of equipment control can be reduced.
Fig. 6 is a schematic structural diagram of some embodiments of a system implementing remote control of a device of the present disclosure. The system includes means 610 for enabling remote control of the device, a CA 620 and a device security module 630. The device 610 for implementing remote control of a device in the drawings, which is described in detail in the above embodiments, is exemplified by an operator safety module, and will not be further described herein.
The CA 620 is configured to generate a digital certificate after auditing an instruction set transmitted from the apparatus 610 for implementing remote control of a device, and transmit the digital certificate to the apparatus 610 for implementing remote control of a device.
In some embodiments, CA 620 fills in the instruction set into an extension field of the digital certificate.
The device security module 630 is configured to extract an instruction set from the digital certificate after verifying the digital certificate, and if the control instruction matches the instruction set, send the control instruction to the device.
In some embodiments, the device security module 630 is configured to extract the instruction set from the digital certificate after the digital certificate and the signature value, send the control instruction to the device if the control instruction matches the instruction set, and discard the control instruction if the control instruction does not match the instruction set.
The system for realizing the remote control of the equipment can ensure the legality of the instruction for controlling the equipment and reduce the safety risk of the remote control of the equipment.
In other embodiments, a computer readable storage medium has stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of the corresponding embodiments of fig. 1, 2. It will be apparent to those skilled in the art that embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. In order to avoid obscuring the concepts of the present disclosure, some details known in the art are not described. How to implement the solutions disclosed herein will be fully apparent to those skilled in the art from the above description.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (9)

1. A method of implementing remote control of a device, comprising:
transmitting application information comprising a public key and an instruction set which is authorized to control equipment to a Certificate Authority (CA), so that the CA can generate a digital certificate after auditing the application information, wherein the digital certificate comprises the instruction set which is authorized to control the equipment;
Receiving a digital certificate sent by the CA; and
And sending a control instruction applied to be executed and the digital certificate to an equipment security module, so that after the equipment security module verifies the digital certificate, extracting an instruction set in the digital certificate, and if the control instruction is matched with the instruction set, sending the control instruction to the equipment.
2. The method of implementing remote control of a device of claim 1, further comprising:
Signing the control instruction to obtain a signature value; and
And sending the control instruction, the signature value and the digital certificate to the equipment security module so that the equipment security module verifies the signature value and the digital certificate.
3. The method for realizing remote control of a device according to claim 1 or 2, wherein,
If the control instruction does not match the instruction set, the control instruction is discarded by the device security module.
4. The method for realizing remote control of a device according to claim 1 or 2, wherein,
The instruction set is located in an extension field of the digital certificate.
5. An apparatus for implementing remote control of a device, comprising:
A sending unit configured to send application information including a public key and an instruction set authorized to control the device to a certificate authority CA, so that the CA generates a digital certificate after auditing the application information, wherein the digital certificate includes the instruction set authorized to control the device;
a receiving unit configured to receive a digital certificate transmitted by the CA, wherein,
The sending unit is further configured to send the control instruction and the digital certificate to a device security module, so that after the device security module verifies the digital certificate, an instruction set in the digital certificate is extracted, and if the control instruction is matched with the instruction set, the control instruction is sent to the device.
6. The apparatus for implementing remote control of a device of claim 5, further comprising:
A signature unit configured to sign the control instruction executed by the application to obtain a signature value, wherein,
The transmitting unit is further configured to transmit the control instruction, the signature value, and the digital certificate to a device security module to cause the device security module to verify the signature value and the digital certificate.
7. An apparatus for implementing remote control of a device, comprising:
A memory; and
A processor coupled to the memory, the processor configured to perform the method of implementing device remote control of any of claims 1 to 4 based on instructions stored in the memory.
8. A system for implementing remote control of a device, comprising:
apparatus for implementing remote control of a device according to any one of claims 5 to 7;
the certificate issuing mechanism CA is configured to generate a digital certificate after auditing an instruction set sent by the device for realizing the remote control of the equipment and send the digital certificate to the device for realizing the remote control of the equipment; and
And the equipment security module is configured to extract an instruction set in the digital certificate after verifying the digital certificate, and if the control instruction is matched with the instruction set, the control instruction is sent to equipment.
9. A non-transitory computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method of implementing remote control of a device of any of claims 1 to 4.
CN202111325454.2A 2021-11-10 2021-11-10 Method, device and system for realizing remote control of equipment Active CN114124403B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111325454.2A CN114124403B (en) 2021-11-10 2021-11-10 Method, device and system for realizing remote control of equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111325454.2A CN114124403B (en) 2021-11-10 2021-11-10 Method, device and system for realizing remote control of equipment

Publications (2)

Publication Number Publication Date
CN114124403A CN114124403A (en) 2022-03-01
CN114124403B true CN114124403B (en) 2024-09-06

Family

ID=80377926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111325454.2A Active CN114124403B (en) 2021-11-10 2021-11-10 Method, device and system for realizing remote control of equipment

Country Status (1)

Country Link
CN (1) CN114124403B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115577331B (en) * 2022-12-08 2023-03-17 成都不烦智能科技有限责任公司 Interaction control method, device, system and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105451201A (en) * 2014-09-29 2016-03-30 展讯通信(天津)有限公司 Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
CN109819049A (en) * 2019-02-28 2019-05-28 钛马信息网络技术有限公司 The method, system and device of long-range control vehicle

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9651944B2 (en) * 2015-03-22 2017-05-16 Microsoft Technology Licensing, Llc Unmanned aerial vehicle piloting authorization
US10523435B2 (en) * 2015-07-20 2019-12-31 Digicert, Inc. Mutable fields in digital certificates
CN109218263B (en) * 2017-07-04 2021-06-08 斑马智行网络(香港)有限公司 Control method and device
CN110011985A (en) * 2019-03-19 2019-07-12 阿里巴巴集团控股有限公司 For operating the method and system of internet of things equipment
CN111355786B (en) * 2020-02-20 2023-06-09 中科全维科技(苏州)有限公司 Internet of things equipment control method based on alliance block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105451201A (en) * 2014-09-29 2016-03-30 展讯通信(天津)有限公司 Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
CN109819049A (en) * 2019-02-28 2019-05-28 钛马信息网络技术有限公司 The method, system and device of long-range control vehicle

Also Published As

Publication number Publication date
CN114124403A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
US11323276B2 (en) Mutual authentication of confidential communication
CN101828357B (en) Credential provisioning method and device
KR101539448B1 (en) Secure key generation
US8130961B2 (en) Method and system for client-server mutual authentication using event-based OTP
CN102594558B (en) Anonymous digital certificate system and verification method of trustable computing environment
CN101145906B (en) Method and system for authenticating legality of receiving terminal in unidirectional network
US11283626B2 (en) Apparatus and methods for distributed certificate enrollment
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
US9253162B2 (en) Intelligent card secure communication method
CN107743067B (en) Method, system, terminal and storage medium for issuing digital certificate
CN102045333B (en) Method for generating safety message process key
EP3387576B1 (en) Apparatus and method for certificate enrollment
CN105790938A (en) System and method for generating safety unit key based on reliable execution environment
CN103138938A (en) SM2 certificate application method based on cryptographic service provider (CSP)
CN114697040B (en) Electronic signature method and system based on symmetric key
KR20140023799A (en) Method for guarantying the confidentiality and integrity of a data in controller area networks
Fuchs et al. HIP: HSM-based identities for plug-and-charge
CN114124403B (en) Method, device and system for realizing remote control of equipment
CN112364335B (en) Identification identity authentication method and device, electronic equipment and storage medium
KR20130100032A (en) Method for distributting smartphone application by using code-signing scheme
CN115022093B (en) Trusted CPU key calculation method and system based on multi-stage key
CN112929871A (en) OTA upgrade package acquisition method, electronic device and storage medium
CN118070316B (en) Offline authorization method, offline authorization system and storage medium based on security device
KR102474628B1 (en) Method for signcrytion using functional signature and computing device for executing the method
CN111641507A (en) Software communication system structure component registration management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant