Nothing Special   »   [go: up one dir, main page]

CN112187714A - Device control method, device and computer readable medium - Google Patents

Device control method, device and computer readable medium Download PDF

Info

Publication number
CN112187714A
CN112187714A CN202010862341.5A CN202010862341A CN112187714A CN 112187714 A CN112187714 A CN 112187714A CN 202010862341 A CN202010862341 A CN 202010862341A CN 112187714 A CN112187714 A CN 112187714A
Authority
CN
China
Prior art keywords
data
data packet
identification information
matching
matching result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010862341.5A
Other languages
Chinese (zh)
Inventor
张家琪
王颖
王沅召
周晓泽
葛春光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202010862341.5A priority Critical patent/CN112187714A/en
Publication of CN112187714A publication Critical patent/CN112187714A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/06Notations for structuring of protocol data, e.g. abstract syntax notation one [ASN.1]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to a device control method, a device and a computer readable medium. The method comprises the following steps: extracting first identification information carried in a data packet, wherein the data packet is sent to a device to be controlled; matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result; and in the case that the matching result indicates that the data packet is abnormal, discarding the data packet. According to the scheme, the check mark is added to the data and the control instruction sent to the intelligent household equipment, the intelligent household equipment compares the check mark with the mark stored in the intelligent household equipment when receiving the data and the control instruction, if the comparison result is consistent, the data and the control instruction can be determined not to be tampered, and otherwise, the data packet is discarded. The problem of intelligent household equipment have malicious instruction controlgear in the use is solved.

Description

Device control method, device and computer readable medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a device control method, apparatus, device, and computer readable medium.
Background
With the continuous development of an integration technology, a communication technology and a network environment, an intelligent home network plays a very important role in a user family, more and more users select intelligent equipment to enrich the technological sense and the convenience sense of the own family, but the information security problem of the intelligent home is always puzzled to the users, and particularly in the network transmission process, when data is packaged and analyzed through each layer of structure, the possibility of being attacked and tampered exists.
At present, in the related art, the information security in the data transmission process is increased by encrypting data, but lawless persons can still crack the encrypted data through illegal technical means, so the information security in the data transmission process still cannot be guaranteed.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The application provides a device control method, a device, equipment and a computer readable medium, which are used for solving the technical problem that malicious instructions control the equipment.
In a first aspect, the present application provides an apparatus control method, including: extracting first identification information carried in a data packet, wherein the data packet is sent to a device to be controlled; matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result; and in the case that the matching result indicates that the data packet is abnormal, discarding the data packet.
Optionally, the data packet is an encrypted data packet, and extracting the first identification information carried in the data packet includes: decrypting the encrypted data packet to obtain decrypted data; determining a target position in the decrypted data according to a preset field position; in the case where data exists at the target position, the data at the target position is used as the first identification information.
Optionally, matching the first identification information with second identification information in the device to be controlled, and obtaining a matching result includes: extracting a first digital identification code in the first identification information and a second digital identification code in the second identification information; and comparing the first digital identification code with the second digital identification code to obtain a matching result.
Optionally, in a case that the matching result indicates that the packet is abnormal, discarding the packet includes: and under the condition that the first digital identification code is not the same as the second digital identification code, discarding the data packet.
Optionally, matching the first identification information with second identification information in the device to be controlled, and obtaining a matching result includes: extracting the verification data carried in the first identification information; calculating a first hash value of the check data by using a hash function; and comparing the first hash value with a second hash value in the second identification information to obtain a matching result.
Optionally, in a case that the matching result indicates that the packet is abnormal, discarding the packet includes: in the event that the first hash value and the second hash value are not the same, the packet is discarded.
Optionally, in a case that the matching result indicates that the data packet is abnormal, the method further includes: storing data information in the data packet; extracting a third identifier carried in the data information; and sending the data information to the target module matched with the third identifier so that the target module can process the data information.
Optionally, in a case that the data information is a device control instruction, the method further includes: and sending the equipment control instruction to a message queue so that the target module can acquire and execute the equipment control instruction from the message queue.
In a second aspect, the present application provides an apparatus control device, comprising: the identification extraction module is used for extracting first identification information carried in a data packet, and the data packet is sent to the equipment to be controlled; the identification matching module is used for matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result; and the control module is used for discarding the data packet under the condition that the matching result indicates that the data packet is abnormal.
In a third aspect, the present application provides a computer device, comprising a memory and a processor, wherein the memory stores a computer program operable on the processor, and the processor implements the steps of any one of the above methods when executing the computer program.
In a fourth aspect, the present application also provides a computer readable medium having non-volatile program code executable by a processor, the program code causing the processor to perform any of the methods of the first aspect.
Compared with the related art, the technical scheme provided by the embodiment of the application has the following advantages:
the technical scheme includes that first identification information carried in a data packet is extracted, and the data packet is sent to a device to be controlled; matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result; and in the case that the matching result indicates that the data packet is abnormal, discarding the data packet. According to the scheme, the check mark is added to the data and the control instruction sent to the intelligent household equipment, the intelligent household equipment compares the check mark with the mark stored in the intelligent household equipment when receiving the data and the control instruction, if the comparison result is consistent, the data and the control instruction can be determined not to be tampered, and otherwise, the data packet is discarded. The problem of intelligent household equipment have malicious instruction controlgear in the use is solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the technical solutions in the embodiments or related technologies of the present application, the drawings needed to be used in the description of the embodiments or related technologies will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without any creative effort.
Fig. 1 is a schematic diagram of a hardware environment of an alternative device control method according to an embodiment of the present application;
fig. 2 is a flowchart of an alternative apparatus control method provided in an embodiment of the present application;
fig. 3 is a block diagram of an alternative device control apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In the related art, the information security in the data transmission process is increased by encrypting data, but lawless persons can still crack the encrypted data by illegal technical means, so the information security in the data transmission process still cannot be guaranteed.
To solve the problems mentioned in the background, according to an aspect of embodiments of the present application, an embodiment of an apparatus control method is provided.
Alternatively, in the embodiment of the present application, the device control method described above may be applied to a hardware environment formed by the terminal 101 and the server 103 as shown in fig. 1. As shown in fig. 1, a server 103 is connected to a terminal 101 through a network, which may be used to provide services for the terminal or a client installed on the terminal, and a database 105 may be provided on the server or separately from the server, and is used to provide data storage services for the server 103, and the network includes but is not limited to: a wide area network, a metropolitan area network, or a local area network, and the terminal 101 includes, but is not limited to, a smart home device, and the like.
A device control method in the embodiment of the present application may be executed by the terminal 101, as shown in fig. 2, the method may include the following steps:
step S202, first identification information carried in a data packet is extracted, and the data packet is sent to the equipment to be controlled.
In this embodiment of the application, for example, the smart home device needs to receive data, a control instruction, and the like sent by a user, a server, and the like in an operation process of the smart home device, and the first identification information may be added to the data and the control instruction by the device of the user or the server before sending the data and the control instruction to the smart home device, or may be added by a program installed in the user device.
In the embodiment of the application, in the process of transmitting the data packet from the user and the server to the smart home device, the data packet needs to be issued by an application layer, passes through a presentation layer, a session layer, a transmission layer, a network layer, a data link layer and a physical layer, and finally reaches the smart home device. Data is encapsulated when passing through the structure of each layer, for example, the application layer encapsulates the data through an http protocol and the like, and a request header is added; the expression layer converts the data into a compatible transmission format; the application establishes and maintains the session in the session layer, and the session can be synchronized; adding a transmission header in a transmission layer to form a data packet; and when passing through a network layer, link communication is established with the intelligent household equipment through an ip protocol. In the network layer, communication can be established with the intelligent household equipment in a WiFi module, a narrowband Internet of things module, a zigbee module and other modes.
And step S204, matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result.
In this embodiment of the application, the second identification information stored in the smart home device may be information recorded in a fixed storage location by a manufacturer before the smart home device leaves a factory, such as an identifier of the manufacturer, a serial number of the smart home device, or other identification information set by the manufacturer in a user-defined manner, or may be special information specified by a user or a worker after the smart home device is put into use, and the special information needs to be stored in the smart home device, a server communicating with the smart home device, and a related application program controlling the smart home device before sending the operation data and the control instruction.
The first identification information may be corresponding to the second identification information, or may not be corresponding to the second identification information, for example, the specific content of the first identification information and the second identification information may be both a manufacturer identifier and an equipment number, or the specific content of the second identification information may be a manufacturer identifier, the first identification information is information carrying interference data, the interference data needs to be removed by the smart home equipment in a certain manner, and the finally obtained information is matched with the manufacturer identifier, or the first identification information may also be encrypted data, and the smart home equipment needs to match the obtained data with the manufacturer identifier in a specific decryption manner.
In step S206, if the matching result indicates that the packet is abnormal, the packet is discarded.
In the embodiment of the application, the first identification information is fused into the transmitted data, and the first identification information is completely matched with the second identification information in the intelligent household equipment before the data is sent. Under the condition of normal data transmission, the intelligent home equipment can receive an original data packet, and the first identification information extracted from the data packet is also matched with the second identification information. If data is illegally tampered or dropped during transmission in a network, a data packet received by the intelligent furniture device is not an original data packet sent by a server or a user, the structure and the data content of the data packet are changed, the first identification information originally placed at a specific position can be moved to other positions or even lost, under the condition, the intelligent home device cannot find the first identification information or the data content in the found first identification information is changed and is not matched with the second identification information, namely, the intelligent home device can be invaded, attacked and the information security is seriously threatened, and the data packet needs to be discarded immediately.
According to the scheme, the check mark is added to the data and the control instruction sent to the intelligent household equipment, the intelligent household equipment compares the check mark with the mark stored in the intelligent household equipment when receiving the data and the control instruction, if the comparison result is consistent, the data and the control instruction can be determined not to be tampered, and otherwise, the data packet is discarded. The problem of intelligent household equipment have malicious instruction controlgear in the use is solved.
Optionally, the data packet is an encrypted data packet, and extracting the first identification information carried in the data packet includes: decrypting the encrypted data packet to obtain decrypted data; determining a target position in the decrypted data according to a preset field position; in the case where data exists at the target position, the data at the target position is used as the first identification information.
In the embodiment of the application, the data packet transmitted between the server and the intelligent household equipment through the network can be an encrypted data packet, and the data packet is encrypted to protect the transmitted data to a certain degree. The encrypted data may be encrypted by a public key and correspondingly the decrypted data may be decrypted by a private key. Or other encryption and decryption modes such as SHA256 and the like.
In this embodiment of the application, the first identifier may be a verification identifier set in the data and the control instruction to be sent by the device or the server of the user according to a "convention" manner with the smart home device before sending the data and the control instruction to the smart home device, where the "convention" manner may be that the smart home device sets a specific field at a specific position in a data packet as an identifier bit before leaving a factory, and places the data in the identifier bit as the first identifier information. The method can also be used for determining an identification position for placing the identification information by the server in a specific time period in the using process of the intelligent household equipment, and sending the information to the intelligent household equipment in a safe mode so that the intelligent household equipment can determine the first identification information according to the preset identification position when receiving the data packet sent by the server.
Optionally, matching the first identification information with the second identification information in the device to be controlled to obtain a matching result may include the following steps: extracting a first digital identification code in the first identification information and a second digital identification code in the second identification information; and comparing the first digital identification code with the second digital identification code to obtain a matching result.
Accordingly, when the matching result indicates that the data packet is abnormal, the data packet is discarded, that is, the data packet is discarded when the first digital identification code and the second digital identification code are not the same.
In the embodiment of the application, the digital identification code can be used for rapidly and efficiently matching the first identification information and the second identification information, and the intelligent home equipment can be efficiently operated on the basis of avoiding the equipment from being invaded and attacked in the intelligent home equipment with higher real-time requirement.
Optionally, matching the first identification information with the second identification information in the device to be controlled to obtain a matching result may further include the following steps: extracting the verification data carried in the first identification information; calculating a first hash value of the check data by using a hash function; and comparing the first hash value with a second hash value in the second identification information to obtain a matching result.
Accordingly, in the case that the matching result indicates that the data packet is abnormal, the discarding of the data packet is to discard the data packet in the case that the first hash value and the second hash value are not identical.
In the embodiment of the application, the manufacturer identifier is taken as an example for explanation, and a hash value of the manufacturer identifier may be calculated in advance by using a hash function, and the hash value is stored in the smart home device. The manufacturer identification is added to the specific identification position when the user and the server send data and control instructions, once the data are tampered and the package is dropped in the data transmission process, the intelligent household equipment receives the data package, the hash value obtained by calculating the hash value of the data extracted from the identification position through the hash function is different from the hash value of the manufacturer identification, the data can be determined to be tampered or the package is dropped in the data transmission, and the data package can be discarded in order to ensure that the intelligent household equipment is not attacked. The information containing the manufacturer identification can be stored in the intelligent household equipment, when new data is received, the hash value of the manufacturer identification is calculated, the hash value is compared with the verification information in the received data, if the comparison result is different, the received data is abnormal and can not be used continuously, and the data packet can be discarded.
Optionally, in the case that the matching result indicates that the data packet is normal, the method further includes: storing data information in the data packet; extracting a third identifier carried in the data information; and sending the data information to the target module matched with the third identifier so that the target module can process the data information.
Optionally, in a case that the data information is a device control instruction, the method further includes: and sending the equipment control instruction to a message queue so that the target module can acquire and execute the equipment control instruction from the message queue.
In the embodiment of the application, if the data packet is determined to be an original data packet sent by a user or a server, the data packet can be continuously processed, and if the data packet is sent as a control instruction, the control instruction can be executed.
Optionally, in the case that the data packet is tampered or dropped, alarm information may be sent to the user, the server and related staff to reduce property loss.
The technical scheme includes that first identification information carried in a data packet is extracted, and the data packet is sent to a device to be controlled; matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result; and in the case that the matching result indicates that the data packet is abnormal, discarding the data packet. According to the scheme, the check mark is added to the data and the control instruction sent to the intelligent household equipment, the intelligent household equipment compares the check mark with the mark stored in the intelligent household equipment when receiving the data and the control instruction, if the comparison result is consistent, the data and the control instruction can be determined not to be tampered, and otherwise, the data packet is discarded. The problem of intelligent household equipment have malicious instruction controlgear in the use is solved.
According to still another aspect of an embodiment of the present application, as shown in fig. 3, there is provided an apparatus control device including: the identifier extracting module 301 is configured to extract first identifier information carried in a data packet, where the data packet is sent to a device to be controlled; the identifier matching module 303 is configured to match the first identifier information with second identifier information in the device to be controlled, so as to obtain a matching result; and a control module 305, configured to discard the data packet if the matching result indicates that the data packet is abnormal.
It should be noted that the identifier extracting module 301 in this embodiment may be configured to execute step S202 in this embodiment, the identifier matching module 303 in this embodiment may be configured to execute step S204 in this embodiment, and the control module 305 in this embodiment may be configured to execute step S206 in this embodiment.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may operate in a hardware environment as shown in fig. 1, and may be implemented by software or hardware.
Optionally, the data packet is an encrypted data packet, and the identifier extraction module is further configured to: decrypting the encrypted data packet to obtain decrypted data; determining a target position in the decrypted data according to a preset field position; in the case where data exists at the target position, the data at the target position is used as the first identification information.
Optionally, the identity matching module is further configured to: extracting a first digital identification code in the first identification information and a second digital identification code in the second identification information; and comparing the first digital identification code with the second digital identification code to obtain a matching result.
Optionally, the control module is further configured to: and under the condition that the first digital identification code is not the same as the second digital identification code, discarding the data packet.
Optionally, the identity matching module is further configured to: extracting the verification data carried in the first identification information; calculating a first hash value of the check data by using a hash function; and comparing the first hash value with a second hash value in the second identification information to obtain a matching result.
Optionally, the control module is further configured to: in the event that the first hash value and the second hash value are not the same, the packet is discarded.
Optionally, the control module is further configured to: storing data information in the data packet; extracting a third identifier carried in the data information; and sending the data information to the target module matched with the third identifier so that the target module can process the data information.
Optionally, the control module is further configured to: and sending the equipment control instruction to a message queue so that the target module can acquire and execute the equipment control instruction from the message queue.
There is also provided, in accordance with yet another aspect of the embodiments of the present application, a computer device, including a memory and a processor, the memory having stored therein a computer program executable on the processor, the processor implementing the steps when executing the computer program.
The memory and the processor in the computer device communicate with each other through a communication bus and a communication interface. The communication bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
There is also provided, in accordance with yet another aspect of an embodiment of the present application, a computer-readable medium having non-volatile program code executable by a processor.
Optionally, in an embodiment of the present application, a computer readable medium is configured to store program code for the processor to perform the following steps:
extracting first identification information carried in a data packet, wherein the data packet is sent to a device to be controlled;
matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result;
and in the case that the matching result indicates that the data packet is abnormal, discarding the data packet.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
When the embodiments of the present application are specifically implemented, reference may be made to the above embodiments, and corresponding technical effects are achieved.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units performing the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk. It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is merely exemplary of the present application and is presented to enable those skilled in the art to understand and practice the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (11)

1. An apparatus control method characterized by comprising:
extracting first identification information carried in a data packet, wherein the data packet is sent to a device to be controlled;
matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result;
and discarding the data packet if the matching result indicates that the data packet is abnormal.
2. The method according to claim 1, wherein the data packet is an encrypted data packet, and extracting the first identification information carried in the data packet comprises:
decrypting the encrypted data packet to obtain decrypted data;
determining a target position in the decrypted data according to a preset field position;
and taking the data of the target position as the first identification information when the data exists in the target position.
3. The method according to claim 1, wherein matching the first identification information with second identification information in the device to be controlled to obtain a matching result comprises:
extracting a first digital identification code in the first identification information and a second digital identification code in the second identification information;
and comparing the first digital identification code with the second digital identification code to obtain the matching result.
4. The method of claim 3, wherein in the event that the match result indicates that the packet is abnormal, discarding the packet comprises:
and under the condition that the first digital identification code is not the same as the second digital identification code, discarding the data packet.
5. The method according to claim 1, wherein matching the first identification information with second identification information in the device to be controlled to obtain a matching result comprises:
extracting the verification data carried in the first identification information;
calculating a first hash value of the check data by using a hash function;
and comparing the first hash value with a second hash value in the second identification information to obtain the matching result.
6. The method of claim 5, wherein in the event that the match result indicates that the packet is abnormal, discarding the packet comprises:
discarding the data packet if the first hash value and the second hash value are not the same.
7. The method according to any one of claims 1 to 6, wherein in case that the matching result indicates that the data packet is normal, the method further comprises:
storing the data information in the data packet;
extracting a third identifier carried in the data information;
and sending the data information to a target module matched with the third identifier so that the target module can process the data information.
8. The method according to claim 7, wherein in the case that the data information is a device control instruction, the method further comprises:
and sending the equipment control instruction to a message queue so that the target module can acquire and execute the equipment control instruction from the message queue.
9. An apparatus control device, characterized by comprising:
the identification extraction module is used for extracting first identification information carried in a data packet, wherein the data packet is sent to the equipment to be controlled;
the identification matching module is used for matching the first identification information with second identification information in the equipment to be controlled to obtain a matching result;
and the control module is used for discarding the data packet under the condition that the matching result indicates that the data packet is abnormal.
10. A computer device comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1 to 8 when executing the computer program.
11. A computer-readable medium having non-volatile program code executable by a processor, wherein the program code causes the processor to perform the method of any of claims 1 to 8.
CN202010862341.5A 2020-08-25 2020-08-25 Device control method, device and computer readable medium Pending CN112187714A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010862341.5A CN112187714A (en) 2020-08-25 2020-08-25 Device control method, device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010862341.5A CN112187714A (en) 2020-08-25 2020-08-25 Device control method, device and computer readable medium

Publications (1)

Publication Number Publication Date
CN112187714A true CN112187714A (en) 2021-01-05

Family

ID=73924376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010862341.5A Pending CN112187714A (en) 2020-08-25 2020-08-25 Device control method, device and computer readable medium

Country Status (1)

Country Link
CN (1) CN112187714A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691496A (en) * 2021-07-13 2021-11-23 孟令明 Network security protection method with higher security for Internet of things equipment
CN113701832A (en) * 2021-08-28 2021-11-26 上海光华仪表有限公司 Control method and system of high-voltage union electromagnetic flowmeter
CN113777935A (en) * 2021-08-16 2021-12-10 珠海格力电器股份有限公司 Control method and device of intelligent equipment and computer readable storage medium
CN115296776A (en) * 2022-08-03 2022-11-04 宁波方太厨具有限公司 Communication data checking processing method, system, equipment and medium
CN115457755A (en) * 2022-09-07 2022-12-09 宁波公牛生活电器有限公司 Code matching method, device, equipment, readable storage medium and program product

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104570746A (en) * 2014-11-24 2015-04-29 青岛歌尔声学科技有限公司 Intelligent home furnishing control system and method, and intelligent home furnishing
WO2017016034A1 (en) * 2015-07-30 2017-02-02 宇龙计算机通信科技(深圳)有限公司 Device control method based on user information identification and mobile terminal
US20180006840A1 (en) * 2015-12-31 2018-01-04 Goertek Inc. Wearable device and controlling method thereof, and system for controlling smart home
CN108259460A (en) * 2017-11-24 2018-07-06 新华三信息安全技术有限公司 Apparatus control method and device
CN109683715A (en) * 2018-12-29 2019-04-26 北京诺亦腾科技有限公司 A kind of VR apparatus control method, device and computer readable storage medium
CN110708164A (en) * 2019-09-25 2020-01-17 青岛海尔科技有限公司 Control method and device for Internet of things equipment, storage medium and electronic device
CN111198822A (en) * 2020-01-10 2020-05-26 珠海格力电器股份有限公司 Equipment debugging method and device and debugging terminal
CN111510425A (en) * 2020-03-06 2020-08-07 珠海格力电器股份有限公司 Intelligent household equipment management method, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104570746A (en) * 2014-11-24 2015-04-29 青岛歌尔声学科技有限公司 Intelligent home furnishing control system and method, and intelligent home furnishing
WO2017016034A1 (en) * 2015-07-30 2017-02-02 宇龙计算机通信科技(深圳)有限公司 Device control method based on user information identification and mobile terminal
US20180006840A1 (en) * 2015-12-31 2018-01-04 Goertek Inc. Wearable device and controlling method thereof, and system for controlling smart home
CN108259460A (en) * 2017-11-24 2018-07-06 新华三信息安全技术有限公司 Apparatus control method and device
CN109683715A (en) * 2018-12-29 2019-04-26 北京诺亦腾科技有限公司 A kind of VR apparatus control method, device and computer readable storage medium
CN110708164A (en) * 2019-09-25 2020-01-17 青岛海尔科技有限公司 Control method and device for Internet of things equipment, storage medium and electronic device
CN111198822A (en) * 2020-01-10 2020-05-26 珠海格力电器股份有限公司 Equipment debugging method and device and debugging terminal
CN111510425A (en) * 2020-03-06 2020-08-07 珠海格力电器股份有限公司 Intelligent household equipment management method, device, equipment and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113691496A (en) * 2021-07-13 2021-11-23 孟令明 Network security protection method with higher security for Internet of things equipment
CN113777935A (en) * 2021-08-16 2021-12-10 珠海格力电器股份有限公司 Control method and device of intelligent equipment and computer readable storage medium
CN113777935B (en) * 2021-08-16 2023-10-03 珠海格力电器股份有限公司 Control method and device of intelligent equipment and computer readable storage medium
CN113701832A (en) * 2021-08-28 2021-11-26 上海光华仪表有限公司 Control method and system of high-voltage union electromagnetic flowmeter
CN115296776A (en) * 2022-08-03 2022-11-04 宁波方太厨具有限公司 Communication data checking processing method, system, equipment and medium
CN115457755A (en) * 2022-09-07 2022-12-09 宁波公牛生活电器有限公司 Code matching method, device, equipment, readable storage medium and program product

Similar Documents

Publication Publication Date Title
CN112187714A (en) Device control method, device and computer readable medium
CN103189872B (en) Safety in networked environment and the effectively method and apparatus of Content Selection
CN103595721B (en) Network disk file secure sharing method, sharing means and shared system
US20160277933A1 (en) Secure Data Communication system between IoT smart devices and a Network gateway under Internet of Thing environment
EP3346660B1 (en) Authentication information update method and device
JP2020519208A (en) Secure communication method and smart lock system based on the method
US11323883B2 (en) Pattern driven selective sensor authentication for internet of things
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
US20210328799A1 (en) Automated authentication of a new network element
WO2017113789A1 (en) Electronic device remote repair method, device, repaired device, and system
WO2017066995A1 (en) Method and device for preventing unauthorized access to server
TWI820064B (en) Securing digital data transmission in a communication network
KR101677249B1 (en) Security Apparatus and Method for Controlling Internet of Things Device Using User Token
CN105812338B (en) A data access control method and network management device
JP7191999B2 (en) Mini-program package transmission method, apparatus, electronics computer readable medium and computer program product
CN107094079B (en) Method, device and equipment for opening terminal function
CN111885595B (en) Intelligent household appliance configuration networking method, device and system
CN116545648A (en) Verification information sending method and system, storage medium and electronic device
CN104239028B (en) Information processing equipment, information processing method and program
CN110826076B (en) Data processing method, device, equipment and system
CN114745115A (en) Information transmission method and device, computer equipment and storage medium
KR20140122540A (en) Wireless network system and user terminal connection processing method of wireless network system
EP3316547A1 (en) Parameter based data access on a security information sharing platform
US11818109B1 (en) Secure synchronization of data
CN113726720B (en) Internet of things equipment communication method, equipment, server and communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105