이 애플리케이션의 일부 콘텐츠는 현재 사용할 수 없습니다.
이 상황이 계속되면 다음 주소로 문의하십시오피드백 및 연락
1. (WO2019062886) METHOD AND APPARATUS FOR TRANSMITTING COMMANDS
Document

Description

Title of Invention 0001   0002   0003   0004   0005   0006   0007   0008   0009   0010   0011   0012   0013   0014   0015   0016   0017   0018   0019   0020   0021   0022   0023   0024   0025   0026   0027   0028   0029   0030   0031   0032   0033   0034   0035   0036   0037   0038   0039   0040   0041   0042   0043   0044   0045   0046   0047   0048   0049   0050   0051   0052   0053   0054   0055   0056   0057   0058   0059   0060   0061   0062   0063   0064   0065   0066   0067   0068   0069   0070   0071   0072   0073   0074   0075   0076   0077   0078   0079   0080   0081   0082   0083   0084   0085   0086   0087   0088   0089   0090   0091   0092   0093   0094   0095   0096   0097   0098   0099   0100   0101   0102   0103   0104   0105   0106   0107   0108   0109   0110   0111   0112   0113   0114   0115   0116   0117   0118   0119   0120   0121   0122   0123   0124   0125   0126   0127   0128   0129   0130   0131   0132   0133   0134   0135   0136   0137   0138   0139   0140   0141   0142   0143   0144   0145   0146   0147   0148   0149   0150   0151   0152   0153   0154   0155   0156   0157   0158   0159  

Claims

1   2   3   4   5   6   7   8   9   10   11   12   13   14   15   16   17   18   19  

Drawings

1   2   3   4A   4B   4C   4D   5A   5B   5C   5D   6  

Description

Title of Invention : METHOD AND APPARATUS FOR TRANSMITTING COMMANDS

[0001]
CROSS-REFERENCE TO RELATED APPLICATION
[0002]
This application claims the priority to Chinese Patent Application No. 201710910377.4, entitled “METHOD, APPARATUS AND ELECTRONIC DEVICE FOR TRANSMITTING COMMANDS, ” filed on September 29, 2017, the entire content of which is incorporated herein by reference.

TECHNICAL FIELD

[0003]
The present disclosure relates to the field of information technology, and in particular, to a command transmission method, apparatus, and electronic device.

BACKGROUND

[0004]
With the continuous development of information technology, blockchain has been under rapid development as a new technology. Blockchain technology originated from the bitcoin technology that emerged in 2008 and is the underlying technology of Bitcoin. A blockchain refers to a chain of blocks generated by cryptographic methods. The block data in each block in the blockchain is associated with the block data in the previous block. In order to ensure the prompt generation of the blocks in the blockchain and the accuracy of the data in the block, mining nodes are generated in the data sharing system of the blockchain technology. A mining node refers to one or more mining machines, which are computers used to mine blockchain data. The mining nodes monitor the shared broadcast in the data sharing system using P2P (Peer to Peer) networks, confirm the shared broadcast, and generates a block containing the shared broadcast. When the above tasks are completed, the mining nodes can be used to earn a processing fee for accelerating the processing of shared broadcast and additional digital currency.
[0005]
In related art, a mining node is remotely controlled by the user on the control terminal. The user issues a control command to the mining node through the control terminal. When the mining node receives the control command, it executes the control command.
[0006]
Because the user remotely controls the mining node through the control terminal, a malicious user can also send a control command to the mining node through other control terminals. The mining node cannot confirm whether the received control command has been tampered with, in which case the mining node may be controlled by a malicious user. This can affect the mining node’s normal operations and reducing its processing efficiency.
[0007]
SUMMARY
[0008]
The present disclosure provides a command transmission method, apparatus, and electronic device to improve the mining node’s capacity to confirm whether the received control command is authentic.
[0009]
In embodiments of the present disclosure, a control terminal may be used to manage the transmission of the control command. The control terminal may be implemented as one or more computing apparatuses, each having a memory for storing executable instructions and a processor for communicating with the memory to execute the executable instructions. The control terminal may be connected to the blockchain network and communicate with one or more mining nodes.
[0010]
According to an aspect of certain embodiments of the present disclosure, a command transmission method is provided. The method includes: acquiring an encryption key according to a present time by the control terminal; encrypting the control command based on the encryption key to generate an encrypted control command by the control terminal; transmitting the encrypted control command to a mining node.
[0011]
In certain embodiments, acquiring the encryption key according to the present time includes: determining the present time when detecting that the user requests to send a control command; determining an initial encryption key according to the present time; and calculating, according to a first predetermined algorithm, the initial encryption key to generate the encryption key, where the first predetermined algorithm comprises at least a hash algorithm.
[0012]
In certain embodiments, before transmitting the encrypted control command to the mining node, the method further includes adding a time stamp to the encrypted control command by the control terminal. Correspondingly, transmitting the encrypted control command to the mining node includes transmitting the encrypted control command and the time stamp to the mining node.
[0013]
In certain embodiments, the method further includes triggering the computing device to decrypt the encrypted control command and execute the control command.
[0014]
In certain embodiments, the method further includes: receiving an invalidity notification returned by the mining node, where the invalidity notification is sent by the mining node after the decryption of the encrypted control command fails, and the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted; determining, according to the command identifier of the invalidity notification, a specified control command, where the specified control command is a control command carried in the encrypted control command that has failed to be decrypted; encrypting the specified control command to generate a specified encrypted control command; and transmitting the specified encrypted control command to the mining node to cause the mining node to decrypt the specified encrypted control command and execute the specified control command carried by the specified encrypted control command.
[0015]
According another aspect of certain embodiments of the present disclosure, a command transmission method is provided. The method is implemented on a mining node for obtaining a control command. The method comprises: when receiving the encrypted control command, acquiring a decryption key, where the encrypted control command carries a control command, and the encrypted control command is generated by the control terminal and transmitted to the mining node; decrypting the encrypted control command based on the decryption key; and acquiring and the control command and executing the control command when the encrypted control command is successfully decrypted based on the decryption key.
[0016]
In certain embodiments, when the encrypted control command is received, acquiring the decryption key includes: when receiving the encrypted control command, determining the receiving time of the encrypted control command; acquiring an initial decryption key according to the receiving time; and calculating, according to a second predetermined algorithm, the initial decryption key to generate the decryption key, where the second predetermined algorithm comprises at least a hash algorithm.
[0017]
In certain embodiments, the method further includes: when receiving the encrypted control command and the time stamp, determining an initial decryption key based on the time stamp; and calculating, according to a second predetermined algorithm, the initial decryption key to generate the decryption key, where the second predetermined algorithm comprises at least a hash algorithm.
[0018]
In certain embodiments, the method further includes: when the decryption of the encrypted control command fails based on the decryption key, determining a target period corresponding to the receiving time of receiving the encrypted control command; acquiring a specified decryption key corresponding to a period preceding to the target period; decrypting the encrypted control command based on the specified decryption key; executing the control command when the encrypted control command is successfully decrypted based on the specified decryption key; when the decryption of the encrypted control command fails using the specified decryption key, returning an invalidity notification to the control terminal, so that the control terminal sends the encrypted control command to the mining node again based on the received invalidity notification, where the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted.
[0019]
According to another aspect of certain embodiments of the present disclosure, an electronic device for transmitting a control command to a computing device is provided. The device comprises at least one processor and a memory communicably connected with the at least one processor for storing instructions executable by the at least one processor. The execution of the instructions by the at least one processor causes the at least one processor to: acquire an encryption key according to a present time; generate an encrypted control command by encrypting the control command using the encryption key; and transmit the encrypted control command to the computing device.
[0020]
In certain embodiments, execution of the instructions by the at least one processor causes the at least one processor further to: determine the present time when a request to send the control command is detected; determine an initial encryption key according to the present time; and generate the encryption key based on a first algorithm and the initial encryption key, wherein the first algorithm includes a hash algorithm.
[0021]
In certain embodiments, execution of the instructions by the at least one processor causes the at least one processor further to add a time stamp to the encrypted control command before transmitting the encrypted control command to the computing device.
[0022]
In certain embodiments, execution of the instructions by the at least one processor causes the at least one processor further to trigger the computing device to decrypt the encrypted control command and execute the control command.
[0023]
In certain embodiments, execution of the instructions by the at least one processor causes the at least one processor further to receive an invalidity notification from the computing device indicating that the computing device fails to decrypt the encrypted control command, wherein the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted; determine a specified control command according to the command identifier carried in the invalidity notification, wherein the specified control command is a control command carried in the encrypted control command that has failed to be decrypted; encrypt the specified control command to generate a specified encrypted control command; and transmit the specified encrypted control command to the computing device.
[0024]
Another aspect of the embodiments of the present disclosure provides an electronic device for obtaining a control command. The device comprises at least one processor and a memory communicably connected with the at least one processor for storing instructions executable by the at least one processor. Execution of the instructions by the at least one processor causes the at least one processor to: receive an encrypted control command by the computing device, wherein the encrypted control command is generated by a control terminal and carries a control command; acquire a decryption key by the computing device; acquire the control command by decrypting the encrypted control command using the decryption key; and execute the control command by the computing device when the encrypted control command is successfully decrypted.
[0025]
In certain embodiments, execution of the instructions by the at least one processor causes the at least one processor further to: determine a receiving time when the encrypted control command is received; acquire an initial decryption key according to the receiving time; and process the initial decryption key to generate the decryption key according to a second algorithm, wherein the second algorithm comprises a hash algorithm.
[0026]
In certain embodiments, execution of the instructions by the at least one processor causes the at least one processor further to: determine a target period corresponding to the receiving time when the encrypted control command fails to decrypt using the decryption key; determine a precedent period according to the target period; acquire a specified decryption key corresponding to the precedent period; decrypt the encrypted control command based on the specified decryption key; execute the control command when the decryption is successful; and return an invalidity notification to the control terminal, when the decryption fails, to inform the control terminal to send the encrypted control command again, wherein the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted.
[0027]
In certain embodiments, the encrypted control command further carries a time stamp, and acquiring a decryption key by the computing device comprises: determining an initial decryption key according to the time stamp carried in the encrypted control command; and generating the decryption key according to a second algorithm and the initial decryption key, wherein the second algorithm includes a hash algorithm.
[0028]
According to another aspect of certain embodiments of the present disclosure, a system for transmitting and executing a control command is provided. The system comprises a control terminal and a mining node. The control terminal comprises a first processor and a first memory. The first memory stores a first set of instructions for being executed by the first processor, and the first set of instructions perform a command encryption and transmission method, including: acquiring an encryption key according to a present time, generating an encrypted control command by encrypting the control command using the encryption key, and transmitting the encrypted control command to the minding node. The mining node comprises a second processor and a second memory. The second memory stores a second set of instructions for being executed by the second processor, and the second set of instructions perform a command decryption and execution method, comprising: receiving the encrypted control command, acquiring a decryption key, acquiring the control command by decrypting the encrypted control command using the decryption key, and when the encrypted control command is successfully decrypted, executing the control command.
[0029]
According to another aspect of certain embodiments of the present disclosure, a command transmission apparatus is provided. The apparatus is applied to a control terminal, and includes: a receiving module, configured to acquire an encryption key according to a present time; a generation module, configured to encrypt a control command based on the encryption key, to generate an encrypted control command; a transmission module, configured to transmit the encrypted control command to a mining node, to decrypt the encrypted control command by the mining node, and to execute the control command.
[0030]
In certain embodiments, the receiving module includes: a first determining submodule, configured to determine the present time when detecting that the user requests to send a control command; a second determining submodule, configured to determine an initial encryption key according to the present time; a generation submodule, configured to calculate, according to a first predetermined algorithm, the initial encryption key to generate the encryption key, where the first predetermined algorithm comprises at least a hash algorithm.
[0031]
In certain embodiments, the apparatus further includes a supplementing module, configured to add a time stamp to the encrypted control command. Correspondingly, the transmission module is further configured to transmit the encrypted control command and the time stamp to the mining node.
[0032]
In certain embodiments, the apparatus further includes: a receiving module, configured to receive an invalidity notification returned by the mining node, where the invalidity notification is sent by the mining node after decrypting the encrypted control command fails, and the invalidity notification carries a command identifier of encrypted control command that has failed to be decrypted; a determining module, configured to determine, according to the command identifier of the invalidity notification , a specified control command, where the specified control command is a control command carried in the encrypted control command that has failed to be decrypted; wherein the generation module is further configured to encrypt the specified control command to generate a specified encrypted control command; and the transmission module is further configured to transmit the specified encrypted control command to the mining node, so that the mining node decrypts the specified encrypted control command, and performs the specified control command carried by the specified encrypted control command.
[0033]
According to another aspect of certain embodiments of the present disclosure, a command transmission apparatus is provided. The apparatus is applied to a mining node, and includes: a receiving module, configured to acquire a decryption key when receiving the encrypted control command, where the encrypted control command carries a control command, and the encrypted control command is generated by the control terminal and transmitted to the mining node; a decryption module, configured to decrypt the encrypted control command based on the decryption key; an execution module, configured to obtain a control command to execute the control command when the encrypted control command is successfully decrypted based on the decryption key.
[0034]
In certain embodiments, the receiving module includes: a determining submodule, configured to determine, when the encrypted control command is received, a receiving time of receiving the encrypted control command; a receiving submodule, configured to acquire an initial decryption key according to the receiving time; and a generation submodule, configured to calculate, according to a second predetermined algorithm, the initial decryption key to generate the decryption key, where the second predetermined algorithm comprises at least a hash algorithm.
[0035]
In certain embodiments, the apparatus further includes: a first determining module, configured to determine an initial decryption key based on the time stamp when receiving the encrypted control command and a time stamp; and a generation module, configured to calculate, according to a second predetermined algorithm, the initial decryption key to generate the decryption key, where the second predetermined algorithm comprises at least a hash algorithm.
[0036]
In certain embodiments, the apparatus further includes: a second determining module, configured to determine, when the decryption of the encrypted control command is failed based on the decryption key, a target period corresponding to a receiving time of receiving the encrypted control command; wherein the acquiring module is further configured to acquire a specified decryption key corresponding to a period preceding to the target period, and decrypt the encrypted control command based on the specified decryption key; and the execution module is further configured to execute the control command when the encrypted control command is successfully decrypted based on the specified decryption key; a return module, configured to return an invalidity notification to the control terminal when the decryption of the encrypted control command fails based on the specified decryption key, so that the control terminal again sends an encrypted control command to the mining node according to the received invalidity notification that carries a command identifier of the encrypted control command that has failed to be decrypted.
[0037]
According to another aspect of the embodiments of the present disclosure, provided an electronic device comprising any of the command transmission apparatus of the above third aspect.
[0038]
According to another aspect of the embodiments of the present disclosure, an electronic device is provided. The device includes a memory for storing executable instructions and a processor for communicating with the memory to execute the executable instructions to perform the operations of any of the command transmission methods in the above first aspect.
[0039]
According to another aspect of the present disclosure, an electronic device is provided. The electronic device includes any of the command transmission apparatus in the foregoing aspect.
[0040]
According to another aspect of the embodiments of the present disclosure, an electronic device includes a memory for storing executable instructions and a processor for communicating with the memory to execute the executable instructions to perform the operations of any of the command transmission methods in the above second aspects.
[0041]
According to another aspect of the embodiments of the present disclosure, a control system is provided. The system includes the electronic device of the foregoing seventh aspect and the electronic device of the foregoing eighth aspect.
[0042]
The technical solutions provided by the embodiments of the present disclosure may comprise the following beneficial effects: obtaining an encryption key according to the present time, and encrypting the control command by using the encryption key, generating an encrypted control command, transmitting the encrypted control command to the mining node, and decrypting the encrypted control command by the mining node to execute the control command makes the encryption key change with time. In embodiments of the present disclosure a malicious user cannot easily decrypt the encrypted control command by using a fixed password. The mining node would not be easily controlled by the malicious user, which ensures the normal operations of the mining node. The processing efficiency of the mining node is improved.
[0043]
The above general description and the following detailed description are intended to be illustrative and not restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

[0044]
The present disclosure can be more clearly understood from the following drawings, in which:
[0045]
FIG. 1 is a flowchart of a command transmission method according to an exemplary embodiment;
[0046]
FIG. 2 is a flowchart of a command transmission method according to an exemplary embodiment;
[0047]
FIG. 3 is a flowchart of a command transmission method according to an exemplary embodiment;
[0048]
FIG. 4A is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0049]
FIG. 4B is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0050]
FIG. 4C is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0051]
FIG. 4D is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0052]
FIG. 5A is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0053]
FIG. 5B is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0054]
FIG. 5C is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0055]
FIG. 5D is a block diagram of a command transmission apparatus according to an exemplary embodiment;
[0056]
FIG. 6 is a block diagram of a command transmission apparatus according to an exemplary embodiment.
[0057]
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0058]
Exemplary embodiments will be described with reference to the accompanying drawings, in which the same numbers refer to the same or similar elements unless otherwise specified.
[0059]
Unless otherwise defined, all the technical and scientific terms used herein have the same or similar meanings as generally understood by one of ordinary skill in the art. As described herein, the terms used in the specification of the present disclosure are intended to describe example embodiments, instead of limiting the present disclosure. The term “and/or” used herein includes any suitable combination of one or more related items listed.
[0060]
It should also be understood that, for the convenience of description, the size of various parts shown are not drawn to scale in the present disclosure.
[0061]
In some cryptocurrency mining networks, a user may remotely send control commands to control a mining node through a control terminal. The present disclosure provides a command transmission method and apparatus to improve the mining node’s capacity to verify whether the received control command is authentic. Instead of sending the control command directly to the mining node for execution, the control terminal may receive the control command, acquire an encryption key according to the present time, encrypt the control command by using the encryption key, generate an encrypted control command, and transmit the encrypted control command to the mining node. The encrypted control command is decrypted, and the encryption key can change with time.
[0062]
The control terminal may be implemented as one or more computing apparatuses, each having a memory for storing executable instructions and a processor for communicating with the memory to execute the executable instructions. The control terminal may be connected to the blockchain network and communicate with one or more mining nodes. In some embodiments, the control terminal can be a server computer. In other embodiments, the control terminal may be an authorized user terminal.
[0063]
When the mining node receives the encrypted control command, mining node may acquire the decryption key. The mining node may decrypt the encrypted control command based on the decryption key. The decryption key is based on the time when the control command was sent. When the encrypted control command is successfully decrypted based on the decryption key, mining node obtains the control command and executes the control command.
[0064]
In certain embodiments, when a decryption fails at the mining node, the mining node may send an invalidity notification to the control terminal. The invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted. The control terminal may determine a specified control command based on the command identifier. Then the control terminal may encrypt the specified control command to generate a specified encrypted control command and transmit the specified encrypted control command to the mining node, so the mining node can decrypt the specified encrypted control command.
[0065]
FIG. 1 is a flowchart of a command transmission method according to an exemplary embodiment. As shown in FIG. 1, a control terminal executing the command transmission method including the following steps. In step 101, the control terminal may acquire an encryption key according to the present time. In step 102, the control terminal may encrypt the control command based on the encryption key to generate an encrypted control command. In step 103, the control terminal may transmit the encrypted control command to the mining node, the mining node may decrypt the encrypted control command, and execute the control command.
[0066]
In certain embodiments, the control terminal may acquire an encryption key according to the present time, encrypt the control command by using an encryption key, generate an encrypted control command, and transmit the encrypted control command to the mining node. The mining node may decrypt the encrypted control command and execute the control command. The encryption key can change with time. A malicious user cannot easily decrypt the encrypted control command by using a fixed password, and the mining node is not easily controlled by the malicious user, thereby ensuring the normal operation of mining machine and improving its processing efficiency.
[0067]
In certain embodiments, obtaining the encryption key according to the present time may include: determining a present time when detecting that the user requests to send a control command; determining an initial encryption key according to a present time; and calculating, according to the first predetermined algorithm, the initial encryption key to generate an encryption key. The first predetermined algorithm comprises at least a hash algorithm.
[0068]
In certain embodiments, before transmitting the encrypted control command to the mining node, the method may further include adding a time stamp to the encrypted control command. Correspondingly, transmitting the encrypted control command to the mining node includes transmitting the encrypted control command and time stamp to the mining node.
[0069]
In certain embodiments, the method may further include: receiving an invalidity notification returned by the mining node, where the invalidity notification is sent by the mining node after the encrypted control command fails to decrypt, and the invalidity notification carries the command identifier of the encrypted control command that has failed to be decrypted; determining, according to the command identifier of the invalidity notification , the specified control command, and the control command is a control command carried in the encrypted control command that has failed to be decrypted; encrypting the specified control command to generate a specified encrypted control command; and transmitting the specified encrypted control command to the mining node to cause the mining node to decrypt the specified encrypted control command and execute the specified control command carried by the specified encrypted control command.
[0070]
FIG. 2 is a flowchart of a command transmission method according to an exemplary embodiment. As shown in FIG. 2, the method is used to control a terminal mining node, and the method comprises the following steps.
[0071]
In step 201, when the mining node receives the encrypted control command, mining node may acquire the decryption key. The encrypted control command carries a control command and is generated by the control terminal and transmitted to the mining node.
[0072]
In step 202, the mining node may decrypt the encrypted control command based on the decryption key.
[0073]
In step 203, when the encrypted control command is successfully decrypted based on the decryption key, mining node may obtain a control command and execute the control command.
[0074]
In certain embodiments, when receiving the encrypted control command, the mining node may decrypt the encrypted control command by using the decryption key, obtain a control command, and execute the control command, so that the mining node only executes the control command that has been successfully decrypted. As a result, the mining node is not easily controlled by malicious users, ensuring the normal operation of the mining node and improving the processing efficiency of the mining node.
[0075]
In certain embodiments, when the encrypted control command is received, acquiring the decryption key may include: when receiving the encrypted control command, determining the receiving time of receiving the encrypted control command; obtaining an initial decryption key according to the receiving time; and based on a second predetermined algorithm, processing the initial decryption key to generate a decryption key. The second predetermined algorithm comprises at least a hash algorithm.
[0076]
In certain embodiments, the method may further include: when receiving the encrypted control command and the time stamp, determining an initial decryption key based on the time stamp; based on a second predetermined algorithm, processing the initial decryption key to generate a decryption key. The second predetermined algorithm comprises at least a hash algorithm.
[0077]
In certain embodiments, the method may further include: when the encrypted control command decryption fails based on the decryption key, determining a target period corresponding to the receiving time of receiving the encrypted control command; acquiring a specified decryption key corresponding to a period preceding the target period; decrypting the encrypted control command based on the specified decryption key; when the encrypted control command is successfully decrypted based on the specified decryption key, executing the control command; when the encrypted control command fails to decrypt based on the specified decryption key, returning an invalidity notification to the control terminal, so that the control terminal sends an encrypted control command to the mining node again according to the received invalidity notification, where the invalidity notification carries the command ID of the encrypted control command that has failed to be decrypted.
[0078]
All of the above optional technical solutions may be combined to form an optional embodiment of the present disclosure, and are not described herein again.
[0079]
FIG. 3 is a flowchart of a command transmission method according to an exemplary embodiment. As shown in FIG. 3, the method comprises the following steps.
[0080]
In step 301, when detecting that the user requests to send a control command, the control terminal may determine the present time, and determine an initial encryption key according to the present time.
[0081]
In embodiments of the present disclosure, the control terminal may be a user terminal such as a computer, a server, and is configured to send a control command to the mining node in the data sharing system, so that the mining node executes the control command. Since the mining node does not have a universal deployment standard, in order to address the difference between the mining machine hardware and the mining machine communication protocols from different manufacturers, the control terminals can be divided into active control terminals and passive control terminals. The active control terminal receives a control command from the user, and the active control terminal sends the control command to the passive control terminal. The passive control terminal shields different attributes of different mining nodes, and uniformly configures the command for the mining node of each manufacturer to determine the initial encryption key to encrypt the control command. As such, when receiving the encrypted control command, the mining node would be able to decrypt the control command regardless of the difference in the attributes of mining machines of different manufacturers.
[0082]
For mining nodes and control terminals in the same network, the time of the mining node may be consistent with the time of controlling the terminal, and therefore, the encryption key and the decryption key can be generated according to the time value. This ensures that the encryption key and the decryption key can change over time, and also ensures that the encryption key and the decryption key are symmetric keys, improving the security of the control command transmission, and reducing the failure rate of the mining node using the decryption key for decryption.
[0083]
In order for the initial encryption key determined by the control terminal to match the initial decryption key determined by the mining node after receiving the encrypted control command, a shared decryption key may be pre-set in the corresponding control terminal and the mining node. The shared decryption keys for the control nodes and the mining nodes are not the same for different users. Since the control terminal generates the initial encryption key according to the present time, and the time is continuously changed, the generated initial encryption key may be a one-time key, and the initial encryption key can be obtained by performing the following Equation 1:
[0084]
Truncate (HMAC-SHA-1 (K, C) ) , (Equation 1)
[0085]
In Equation 1, Truncate is an initial encryption key; K is a shared key of the control terminal; C is a time parameter, T is a present time, T 0 is a constant, usually 0, and X is a step constant, usually 30 seconds and can be set differently in certain cases. The value of X is not specifically limited in the present disclosure; HMC-SHA-1 is a keyed hash algorithm constructed from a SHA1 hash function and is used as the HMAC Truncate method.
[0086]
In the HMAC Truncate method, when the HMC-SHA-I algorithm is executed, a string of 20 bytes in length can be obtained, and the 4th bit of the last byte in the string is used as an offset. Four bytes are obtained starting at the offset position. An integer is formed by placing the upper bytes in the sequence at the lower storage address and lower bytes in the higher storage address, i.e., using the big-endian format. The initial encryption key is obtained as the last 6 bits of the integer, and thus the Truncate key is obtained.
[0087]
It should be noted that, in order to avoid that the scenario when each time the user requests the control terminal to send a control command to the mining node, an initial encryption key is generated, resulting in an excessive workload, identical predetermined time intervals can be configured for the control terminal and the mining node, so that only when the predetermined time interval is detected, the control terminal generates a new initial encryption key, and the mining node generates a new initial decryption key. For example, the predetermined time interval can be set to 5 minutes, so that the control terminal regenerates the initial encryption key every 5 minutes, and the mining node regenerates the initial decryption key every 5 minutes.
[0088]
In step 302, the control terminal may process the initial encryption key to generate an encryption key based on a first predetermined algorithm, and the first predetermined algorithm comprises at least a hash algorithm.
[0089]
Since the initial encryption key generated in step 301 is short and the generation process is fixed, the initial encryption key may be relatively easy to be cracked. In order to improve the security of the control command transmission, the control terminal may use a first predetermined algorithm to process the initial encryption key to obtain a long sequence key, use the long sequence key as an encryption key, and encrypt the control command using the long sequence key subsequently.
[0090]
Since the control terminal may correspond to the mining node, in order to ensure that the mining node can also generate a long sequence key as the decryption key, the same hash salt can be set for the corresponding control terminal and the mining node. The decryption key in the form of a long sequence key generated by the subsequent mining node is corresponding to the encryption key generated in this step, which improves the success rate of the mining node for decrypting the encrypted control command. The first predetermined algorithm may be a PBKDF2 algorithm, and the PBKDF2 algorithm applies a pseudo-random function, so that a long sequence key can be generated. When the first predetermined algorithm is the PBKDF2 algorithm, the long sequence key may be generated by using the following Equation 2:
[0091]
DK=PBKDF2 (Truncate, S, c, dkLen) (Equation 2)
[0092]
wherein DK is a long sequence key; Truncate is the initial encryption key; S is the hash salt; c is the number of iterations, usually a positive integer constant; and dkLen is the length of a long sequence key, which can usually be set by the user.
[0093]
It should be noted that, in order to simplify the transmission process of the control command, the content shown in step 302 may not be executed, and the control terminal may directly use the determined initial encryption key as an encryption key to encrypt the control command. In other words, after step 301 is completed, the control terminal directly executes step 303. The manner in which the encryption key is generated is not specifically limited to the specific embodiments of the present disclosure.
[0094]
In step 303, the control terminal encrypts the control command based on the encryption key, generates an encrypted control command, and transmits the encrypted control command to the mining node.
[0095]
In certain embodiments, the control command may be a miner restart command, a miner sleep command, a miner standby command, and so on. After the control terminal determines the encryption key, the control terminal may encrypt the control command using the encryption key, generate an encrypted control command, and transmit the encrypted control command to the mining node. Since there may be a one-to-one correspondence between the control terminal and the mining node, when the control terminal transmits the encrypted control command, the control terminal may directly transmit the encrypted control command to the corresponding mining node.
[0096]
In order to enable the mining node to more accurately determine the decryption key when receiving the encrypted control command and to avoid the failure of decrypting the encrypted control command, the control terminal may add a time stamp to the encrypted control command and transmit the encrypted control command and the time stamp to the mining node, so that the mining node may directly determine the encryption key corresponding to the time stamp, and decrypts the encrypted control command based on the encryption key.
[0097]
In step 304, when the mining node receives the encrypted control command, it determines the receiving time of the encrypted control command, and acquire the initial decryption key according to the receiving time.
[0098]
In certain embodiments, when the mining node receives the encrypted control command, since there is a corresponding relationship between the mining node and the control terminal, the mining node also pre-sets a co-existing key. In addition, the network of the mining node and the control terminal within the network have the same time, therefore, based on the receiving time and the co-existing key of the received encrypted control command, the mining node can generate an initial decryption key that is consistent with the initial encryption key. The mining node may generate the initial decryption key using Equation 1. The process is consistent with the steps shown in step 301, and details are not repeated herein. The manner in which the initial decryption key is generated is not specifically limited to the specific examples of these embodiments.
[0099]
It should be noted that, since the control terminal may add a time stamp to the encrypted control command when transmitting the encrypted control command, and the time stamp may directly determine the initial decryption key, the mining node receives the encrypted control command. If the time stamp is detected, the mining node may determine the initial decryption key directly based on the time stamp; if no time stamp is detected, the mining node may generate the initial decryption key using Equation 1.
[0100]
The mining node may set a time stamp-key list for storing a correspondence between a time stamp and an initial decryption key as shown in Table 1. The time stamp-key list may be updated on a daily basis. The unit updates and sets the initial decryption key corresponding to each time stamp for the day, so that after receiving the time stamp, the mining node can directly determine the initial decryption key according to the time stamp without further calculation, reducing the workload of the machine node.
[0101]
[Table 0001]
time stamp initial decryption key
1506415881 KH2J9-PC326
1506415886 TFP9Y-VCY3P
1506415891 236TW-X778T

[0102]
Table 1
[0103]
In step 305, the mining node may process the initial decryption key to generate a decryption key based on a second predetermined algorithm, and the second predetermined algorithm comprises at least a hash algorithm.
[0104]
In certain embodiments, the second predetermined algorithm may be the same hash algorithm as the first predetermined algorithm. The mining node may perform the operation on the initial decryption key based on the second predetermined algorithm, and the process of generating the decryption key is consistent with the process shown in the foregoing step 302, and the details are not described herein.
[0105]
It should be noted that, if the control terminal uses the initial encryption key when decrypting the control command, the mining node can directly use the initial decryption key to decrypt the encrypted control command, without using a second predetermined algorithm to operate on the initial decryption password.
[0106]
In step 306, the mining node may decrypt the encrypted control command based on the decryption key. When the decryption of the encrypted control command based on the decryption key is successful, the mining node may perform step 307 described at the following. When the decryption of the control command fails, the steps 308 and 309 as described in the following may be performed.
[0107]
In certain embodiments, when the mining node decrypts the encrypted control command based on the decryption key, when the encrypted control command is successfully decrypted, the control command may be acquired and executed, that is, step 307 is performed. The network where the control terminal and the mining node are located may cause a delay in receiving the encrypted control command by the mining node due to the signal difference, etc., This may cause the mining node to receive an incorrect decryption key at the receiving time according to the received encrypted control command, and fails to unlock the encrypted control command. In this scenario, the mining node needs to perform the following steps 308 and 309.
[0108]
It should be noted that if the mining node can successfully unlock the encrypted control command, the following steps 308 to 313 need not be performed. The acquired control command can be executed directly.
[0109]
In step 307, when the decryption of the encrypted control command based on the decryption key is successful, the mining node may acquire a control command and execute the command.
[0110]
In certain embodiments, when the mining node decrypts the encrypted control command successfully based on the decryption key, the mining node can acquire the control command and perform the corresponding operation according to the control command.
[0111]
In step 308, when the encrypted control command fails to decrypt based on the decryption key, the mining node may determine the target period corresponding to the receiving time of the received encrypted control command and acquire the specified decryption key corresponding to the period preceding to the target period.
[0112]
In certain embodiments, after the mining node fails to decrypt the encrypted control command based on the decryption key, in the scenario where there is a delay in the network, the decryption key corresponding to a preceding time may be used for the decryption attempt, that is, to use the specified decryption key to decrypt the encrypted control command. When the specified decryption key is acquired, the mining node may determine the target period corresponding to the receiving time, and determine the period preceding the target period. Then the mining node use the decryption key corresponding to the preceding period as the designated decryption key. It should be noted that if the predetermined time period is set on the mining node and the control terminal, and the encryption key and the decryption key are updated according to the predetermined time period, the mining node can directly obtain the decryption key of the preceding period as the designated decryption key. If the predetermined time interval is not set in the mining node and the control terminal, the decryption key generated when the encrypted control command is received last time may be queried, and the decryption key is used as the designated decryption key. In some embodiments, the mining node may determine the target period corresponding to the receiving time of the received encrypted control command and acquire the specified decryption key corresponding to an earlier period preceding to the target period (e.g., the second period before the target period, the third period before the target period, etc. ) .
[0113]
In step 309, the mining node may decrypt the encrypted control command based on the specified decryption key, and when the encrypted control command is successfully decrypted based on the specified decryption key, step 310 may be performed. When the encrypted control command fails to decrypt based on the specified decryption key, the following steps 311 to 313 may be performed.
[0114]
In certain embodiments, the mining node decrypts the encrypted control command based on the specified decryption key. When the decryption is successful, the mining node may acquire and execute the control command, that is, step 310 may be performed; If a decryption failure occurs, the mining node determines that the presently received encrypted control command is invalid, and needs to request the encrypted control command from the control terminal again, that is, steps 311 to 313 may be performed.
[0115]
In step 310, when the mining node successfully decrypts the encrypted control command based on the specified decryption key, it may execute the control command.
[0116]
In certain embodiments of the present disclosure, when the mining node successfully decrypts the encrypted control command based on the specified decryption key, the mining node may acquire the control command and perform the corresponding operation according to the control command.
[0117]
It should be noted that if the mining node successfully decrypts the encrypted control command based on the specified decryption key, it may indicate that the control command in the encrypted control command is valid, and the mining node may directly execute the acquired control command without performing the following steps 311 to 313.
[0118]
In step 311, when the mining node fails to decrypt the encrypted control command based on the specified decryption key, the mining node may return an invalidity notification to the control terminal.
[0119]
In certain embodiments, the invalidity notification may carry the command identifier of the encrypted control command that has failed to be decrypted. When the mining node fails to decrypt the encrypted control command based on the specified decryption key, the mining node may obtain the command identifier of the encrypted control command, generate an invalidity notification carrying the command identifier, and return the invalidity notification to the control terminal, so that the control terminal may determine the control command according to the command identifier in the invalidity notification, and replenish the mining node with the encrypted control command.
[0120]
In step 312, the control terminal may receive the invalidity notification returned by the mining node, determine a specified control command based on the command identifier of the invalidity notification, where the specified control command is the control command carried in the encrypted control command that has failed to be decrypted.
[0121]
In certain embodiments, after receiving the invalidity notification returned by the mining node, the control terminal may first extract the command identifier in the invalidity notification; next, according to the command identifier, determines the control command corresponding to the command identifier, and designates control commands as specified control commands.
[0122]
In step 313, the control terminal may encrypt the specified control command, generate a specified encrypted control command, and transmit the designated encrypted control command to the mining node.
[0123]
In certain embodiments, in order to ensure the security of the specified control command during the transmission process, after obtaining the specified control command, the control terminal may encrypt the specified control command, generate a specified encrypted control command, and specify the encryption control. The command is then transmitted to the mining node.
[0124]
It should be noted that, when the control terminal encrypts the control command, the control terminal may determine the encryption key according to the present time, and encrypt the specified control command using the encryption key. The process of determining the encryption key is the same as the process shown in the foregoing steps 301 to 302. The process of the control terminal encrypting the specified control command is the same as the process shown in the foregoing step 303, and details are not described herein. In some embodiments, the mining node can directly determine the decryption key after receiving the specified encrypted control command, and can also add a time stamp in the specified encrypted control command. The time stamp is not specifically limited.
[0125]
When the mining node receives the specified encrypted control command, step 304 to step 306 can be performed again, and the mining node decrypts the specified encryption command. When the specified encryption command is successfully decrypted, the foregoing step 307 is performed; When the decryption of the specified encryption command fails, the foregoing steps 308 to 311 are performed.
[0126]
In an example illustrating the command transmission method above, a user sends out a control command to add a transaction to a blockchain. Instead of sending the control command directly to the mining node for execution, the control terminal receives the control command, acquires an encryption key according to the present time, encrypts the control command by using the encryption key, generates an encrypted control command, and transmits the encrypted control command to the mining node, where the encrypted control command is decrypted, and the control command is executed. That is, in embodiments of the present disclosure, the encryption key can change with time. As a result, a malicious user cannot easily decrypt the encrypted control command by using a fixed password, and the mining node is not easily controlled by the malicious user, thereby ensuring the normal operation the mining machine and improving the processing efficiency of the mining node.
[0127]
Fig. 4A is a block diagram of a command transmission apparatus, according to an exemplary embodiment. Referring to FIG. 4A, the apparatus comprises an acquisition module 401, a generation module 402, and a transmission module 403.
[0128]
The acquisition module 401 is configured to acquire an encryption key according to a present time. The generation module 402 is configured to encrypt the control command based on the encryption key to generate an encrypted control command. The transmission module 403 is configured to transmit an encrypted control command to the mining node, decrypt the encrypted control command by the mining node, and execute the control command.
[0129]
In certain embodiments, the command transmission apparatus acquires an encryption key according to the present time, encrypts the control command by using an encryption key, generates an encrypted control command, and transmits the encrypted control command to the mining node. The encrypted control command is decrypted, and the control command is executed by the mining node, so that the encryption key can change with time. As a result, a malicious user cannot easily decrypt the encrypted control command by using a fixed password, and the mining node is not easily controlled by the malicious user, thereby ensuring the normal operation of the mining machine and improving the processing efficiency of the mining node.
[0130]
In certain embodiments, referring to FIG. 4B, the acquisition module 401 may include a first determining submodule 4011, a second determining submodule 4012, and a generation submodule 4013.
[0131]
The first determining submodule 4011 is configured to determine a present time when detecting that a user requests to send a control command. The second determining submodule 4012 is configured to determine an initial encryption key according to a present time. The generation submodule 4013 is configured to perform a mathematical operation on the initial encryption key to generate an encryption key according to the first predetermined algorithm, where the first predetermined algorithm comprises at least a hash algorithm.
[0132]
In certain embodiments, referring to FIG. 4C, the apparatus further comprises a supplementing module 404. The supplementing module 404 is configured to add a time stamp to the encrypted control command. Correspondingly, the transmission module 403 is further configured to transmit the encrypted control command and the time stamp to the mining node.
[0133]
In certain embodiments, referring to FIG. 4D, the apparatus further comprises a receiving module 405 and a determining module 406. The receiving module 405 is configured to receive an invalidity notification returned by the mining node, where the invalidity notification is sent by the mining node after the decryption of the encrypted control command fails, and the invalidity notification carries the command identifier of the encrypted control command that has failed to be decrypted; The determining module 406 is configured to determine, according to the command identifier of the invalidity notification, a specified control command, where the control command is a control command carried in the encrypted control command that has failed to be decrypted; The generation module 402 is further configured to encrypt the specified control command to generate a specified encrypted control command.
[0134]
The transmission module 403 is further configured to transmit the designated encrypted control command to the mining node, so that the mining node decrypts the specified encrypted control command, and executes the specified control command carried by the specified encrypted control command.
[0135]
FIG. 5A is a block diagram of a command transmission apparatus according to an exemplary embodiment. Referring to FIG. 5A, the apparatus comprises an acquisition module 501, a decryption module 502, and an execution module 503.
[0136]
The acquisition module 501 is configured to: when receiving the encrypted control command, acquire a decryption key, where the encrypted control command carries a control command, and the encrypted control command is generated by the control terminal and transmitted to the mining node; the decryption module 502 is configured to decrypt the encrypted control command based on the decryption key; The execution module 503 is configured to obtain a control command to execute the control command when the encrypted control command is successfully decrypted based on the decryption key.
[0137]
In certain embodiments, when receiving the encrypted control command, the mining node decrypts the encrypted control command by using the decryption key, obtains a control command, and executes the control command, so that the mining node only performs commands that have been successfully decrypted. As a result, the mining node is not easily controlled by malicious users, which ensures the normal operation of the mining node and improves the processing efficiency of the mining node.
[0138]
In certain embodiments, referring to FIG. 5B, the acquisition module 501 comprises a determining submodule 5011, an acquisition submodule 5012, and a generation submodule 5013. The determining submodule 5011 is configured to determine, when the encrypted control command is received, the receiving time of receiving the encrypted control command. The acquisition submodule 5012 is configured to acquire an initial decryption key according to the receiving time. The generation submodule 5013 is configured to calculate an initial decryption key based on a second predetermined algorithm to generate a decryption key, where the second predetermined algorithm comprises at least a hash algorithm.
[0139]
In certain embodiments, referring to FIG. 5C, the apparatus further comprises a first determining module 504 and a generation module 505. The first determining module 504 is configured to determine an initial decryption key based on the time stamp when receiving the encrypted control command and the time stamp. The generation module 505 is configured to perform a mathematical operation on the initial decryption key to generate a decryption key based on a second predetermined algorithm, where the second predetermined algorithm comprises at least a hash algorithm.
[0140]
In certain embodiments, the apparatus also comprises a second determining module 506 and a return module 507. The second determining module 506 is configured to determine, when the encrypted control command fails to decrypt based on the decryption key, a target period corresponding to the receiving time of receiving the encrypted control command.
[0141]
The acquisition module 501 is further configured to acquire a specified decryption key corresponding to a period preceding to of the target period, and decrypt the encrypted control command based on the specified decryption key.
[0142]
The execution module 503 is further configured to when the encrypted control command is successfully decrypted based on the specified decryption key and execute the control command.
[0143]
The return module 507 is configured to: when the encrypted control command fails to decrypt based on the specified decryption key, return an invalidity notification to the control terminal, so that the control terminal sends the encrypted control command to the mining node again according to the received invalidity notification. The invalidity notification carries the command identifier of the encrypted control command that has failed to be decrypted.
[0144]
Regarding the apparatus in the above embodiments, the specific manner in which the respective modules perform the operations has been described in detail in the embodiments related to the method, and will not be explained in detail herein.
[0145]
FIG. 6 is a block diagram of a command transmission apparatus 600 according to an exemplary embodiment. For example, apparatus 600 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and so on.
[0146]
Referring to FIG. 6, apparatus 600 may comprise one or more of the following components: processing assembly 602, memory 604, power component 606, multimedia assembly 608, audio assembly 610, I/O (input/output) interface 612, sensor assembly 614, and communication assembly 616.
[0147]
Processing assembly 602 typically controls the overall operations of device 600, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. Processing assembly 602 may comprise one or more processors 620 to execute instructions to perform all or part of the steps of the above-described methods. Moreover, processing assembly 602 can comprise one or more modules to facilitate interaction between component 602 and other components. For example, processing assembly 602 can comprise a multimedia module to facilitate interaction between multimedia assembly 608 and processing assembly 602.
[0148]
The memory 604 is configured to store various types of data to support operation at the device 600. Examples of such data comprise instructions for any application or method operating on device 600, contact data, phone book data, messages, pictures, videos, and the like. The memory 604 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as SRAM (Static Random-Access Memory) , EEPR0M (Electrically-Erasable Programmable Read-Only Memory) , EPR0M (Erasable Programmable Read Only Memory) , PROM (Programmable Read-Only Memory) , ROM (Read-Only Memory) , magnetic memory, flash memory, disk or optical disk.
[0149]
Power component 606 provides power to various components of device 600. Power component 606 can comprise a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 600.
[0150]
The multimedia assembly 608 may comprise a screen between the apparatus 600 and the user that provides an output interface. In some embodiments, the screen may comprise an LCD (Liquid Crystal Display) and a TP (Touch Panel) . If the screen comprises a touch panel, the screen can be implemented as a touch screen to receive input signals from the user. The touch panel comprises one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia assembly 608 comprises a front camera and/or a rear camera. When the apparatus 600 is in an operational mode, such as a video-recording mode, the front camera and/or the rear camera can receive external multimedia data. Each front and rear camera can be a fixed optical lens system or have focus and optical zoom capabilities.
[0151]
The audio assembly 610 is configured to output and/or input an audio signal. For example, the audio assembly 610 comprises a MIC (Microphone) that is configured to receive an external audio signal when the apparatus 600 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may be further stored in memory 604 or transmitted via communication assembly 616. In some embodiments, audio assembly 610 also comprises a speaker for outputting an audio signal.
[0152]
The I/O interface 612 provides an interface between the processing assembly 602 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
[0153]
Sensor assembly 614 comprises one or more sensors for providing a status assessment of various aspects of device 600. For example, the sensor assembly 614 can detect an on/off state of device 600, a relative positioning of the components, such as a display and a keypad of device 600. Sensor assembly 614 can also detect a change in position of apparatus 600 or apparatus 600 components, the presence or absence of contact by the user with the device 600, the orientation or acceleration/deceleration of the apparatus 600 and the temperature change of the device 600. Sensor assembly 614 may comprise a proximity sensor configured to detect the presence of nearby objects without any physical contact. Sensor assembly 614 may also comprise a light sensor, such as a CMOS (Complementary Metal Oxide Semiconductor) or CXD (Charge-coupled Device) image sensor for use in imaging applications. In some embodiments, the sensor assembly 614 may also comprise an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
[0154]
The communication assembly 616 is configured to facilitate wired or wireless communication between apparatus 600 and other devices. The apparatus 600 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication assembly 616 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication assembly 616 also comprises an NFC (Near Field Communication) module to facilitate short-range communication. For example, the NFC module can be based on RFID (Radio Frequency Identification) technology, IrDA (Infra-red Data Association) technology, UWB (Ultra Wideband) technology, BT (Bluetooth) technology and others.
[0155]
In an exemplary embodiment, the apparatus 600 may be configured by one or more ASICs (Application Specific Integrated Circuits) , DSP (Digital Signal Processor) , PLD (Programmable Logic Device) , FPGA (Field Programmable Gate Array) , controller, microcontroller, microprocessor or other electronic component implementation for executing the above commands Transmission method.
[0156]
In an exemplary embodiment, there is also provided a non-transitory computer readable storage medium comprising instructions, such as a storage device 604 including instructions. The instructions are executable by processor 620 of apparatus 600 to perform the foregoing method. For example, the non-transitory computer readable storage medium may be ROM, RAM (Random Access Memory) , CD-ROM (Compact Disc Read-Only Memory) , tape, floppy disks, and optical data storage devices, etc.
[0157]
A non-transitory computer-readable storage medium, when the instructions in the storage medium are executed by a processor of the command transmission apparatus, enables the command transmission apparatus to perform the foregoing command transmission method.
[0158]
In the several embodiments provided in the present disclosure, it should be understood that the disclosed device and method may be realized in other manners. The device embodiments described above are merely exemplary. All functional modules or units in the embodiments of the present disclosure may all be integrated into one processing unit, or each unit may be used as a single unit. Further, the functional modules or units may be implemented by computer executable program instructions stored in computer readable medium. When executed by one or more processors, the computer executable program instructions may implement the corresponding functions of each module or unit. Two or more units may be integrated into one. The above-integrated unit can either be implemented in the form of hardware, or in the form of hardware combined with software functional units.
[0159]
The description of the present disclosure has been presented for purposes of illustration and description. Many modifications and variations will be apparent to those skilled in the art. The embodiment was chosen and described in order to best explain the principles and embodiments of the disclosure. It will be understood by those skilled in the art that the features described in the respective embodiments and/or claims of the present disclosure can be combined in various ways, even if such combinations are not explicitly described in the present disclosure. In particular, without departing from the spirit and teaching of the present disclosure, the features described in the respective embodiments and/or claims can be combined in various ways. All of these combinations fall within the scope of the present disclosure.

Claims

[Claim 1]
A command transmission method, implemented on a control terminal for transmitting a control command to a computing device, comprising: acquiring, by the control terminal, an encryption key according to a present time; generating, by the control terminal, an encrypted control command by encrypting the control command using the encryption key; and transmitting the encrypted control command to the computing device.
[Claim 2]
The command transmission method according to Claim 1, further comprising: determining the present time when a request to send the control command is detected; determining an initial encryption key according to the present time; and generating the encryption key based on a first algorithm and the initial encryption key, wherein the first algorithm includes a hash algorithm.
[Claim 3]
The command transmission method according to Claim 1, further comprising: adding a time stamp to the encrypted control command before transmitting the encrypted control command to the computing device.
[Claim 4]
The method of Claim 1, further comprising: triggering the computing device to decrypt the encrypted control command and execute the control command.
[Claim 5]
The method of Claim 1, further comprising: receiving an invalidity notification from the computing device indicating that the computing device fails to decrypt the encrypted control command, wherein the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted; determining a specified control command according to the command identifier carried in the invalidity notification, wherein the specified control command is a control command carried in the encrypted control command that has failed to be decrypted; encrypting the specified control command to generate a specified encrypted control command; and transmitting the specified encrypted control command to the computing device.
[Claim 6]
A command transmission method, implemented on a computing device for obtaining a control command, comprising: receiving an encrypted control command by the computing device, wherein the encrypted control command is generated by a control terminal and carries a control command; acquiring a decryption key by the computing device; acquiring the control command by decrypting the encrypted control command using the decryption key; and executing the control command by the computing device when the encrypted control command is successfully decrypted.
[Claim 7]
The command transmission method according to Claim 6, wherein acquiring the decryption key comprises: determining a receiving time when the encrypted control command is received; acquiring an initial decryption key according to the receiving time; and processing the initial decryption key to generate the decryption key according to a second algorithm, wherein the second algorithm comprises a hash algorithm.
[Claim 8]
The command transmission method according to Claim 7, further comprising: determining a target period corresponding to the receiving time when the encrypted control command fails to decrypt using the decryption key; determining a precedent period according to the target period; acquiring a specified decryption key corresponding to the precedent period; decrypting the encrypted control command based on the specified decryption key; executing the control command when the decryption is successful; and returning an invalidity notification to the control terminal, when the decryption fails, to inform the control terminal to send the encrypted control command again, wherein the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted.
[Claim 9]
The command transmission method according to Claim 6, wherein the encrypted control command further carries a time stamp, and acquiring a decryption key by the computing device comprises: determining an initial decryption key according to the time stamp carried in the encrypted control command; and generating the decryption key according to a second algorithm and the initial decryption key, wherein the second algorithm includes a hash algorithm.
[Claim 10]
An electronic device for transmitting a control command to a computing device, comprising: at least one processor; and a memory communicably connected with the at least one processor for storing instructions executable by the at least one processor, wherein execution of the instructions by the at least one processor causes the at least one processor to: acquire an encryption key according to a present time; generate an encrypted control command by encrypting the control command using the encryption key; and transmit the encrypted control command to the computing device.
[Claim 11]
The electronic device according to Claim 10, wherein execution of the instructions by the at least one processor causes the at least one processor further to: determine the present time when a request to send the control command is detected; determine an initial encryption key according to the present time; and generate the encryption key based on a first algorithm and the initial encryption key, wherein the first algorithm includes a hash algorithm.
[Claim 12]
The electronic device according to Claim 10, wherein execution of the instructions by the at least one processor causes the at least one processor further to: add a time stamp to the encrypted control command before transmitting the encrypted control command to the computing device.
[Claim 13]
The electronic device according to Claim 10, wherein execution of the instructions by the at least one processor causes the at least one processor further to: trigger the computing device to decrypt the encrypted control command and execute the control command.
[Claim 14]
The electronic device according to Claim 10, wherein execution of the instructions by the at least one processor causes the at least one processor further to: receive an invalidity notification from the computing device indicating that the computing device fails to decrypt the encrypted control command, wherein the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted; determine a specified control command according to the command identifier carried in the invalidity notification, wherein the specified control command is a control command carried in the encrypted control command that has failed to be decrypted; encrypt the specified control command to generate a specified encrypted control command; and transmit the specified encrypted control command to the computing device.
[Claim 15]
An electronic device for obtaining a control command from a control terminal, comprising: at least one processor; and a memory communicably connected with the at least one processor for storing instructions executable by the at least one processor, wherein execution of the instructions by the at least one processor causes the at least one processor to: receive an encrypted control command by the computing device, wherein the encrypted control command is generated by a control terminal and carries a control command; acquire a decryption key by the computing device; acquire the control command by decrypting the encrypted control command using the decryption key; and execute the control command by the computing device when the encrypted control command is successfully decrypted.
[Claim 16]
The electronic device according to Claim 15, wherein execution of the instructions by the at least one processor causes the at least one processor further to: determine a receiving time when the encrypted control command is received; acquire an initial decryption key according to the receiving time; and process the initial decryption key to generate the decryption key according to a second algorithm, wherein the second algorithm comprises a hash algorithm.
[Claim 17]
The electronic device according to Claim 16, wherein execution of the instructions by the at least one processor causes the at least one processor further to: determine a target period corresponding to the receiving time when the encrypted control command fails to decrypt using the decryption key; determine a precedent period according to the target period; acquire a specified decryption key corresponding to the precedent period; decrypt the encrypted control command based on the specified decryption key; execute the control command when the decryption is successful; and return an invalidity notification to the control terminal, when the decryption fails, to inform the control terminal to send the encrypted control command again, wherein the invalidity notification carries a command identifier of the encrypted control command that has failed to be decrypted.
[Claim 18]
The electronic device according to Claim 15, wherein the encrypted control command further carries a time stamp, and acquiring a decryption key by the computing device comprises: determining an initial decryption key according to the time stamp carried in the encrypted control command; and generating the decryption key according to a second algorithm and the initial decryption key, wherein the second algorithm includes a hash algorithm.
[Claim 19]
A system for transmitting and executing a control command, comprising a control terminal according to any one of Claims 10-14 and a computing device according to any one of Claims 15-18.

Drawings

[ Fig. 1]  
[ Fig. 2]  
[ Fig. 3]  
[ Fig. 4A]  
[ Fig. 4B]  
[ Fig. 4C]  
[ Fig. 4D]  
[ Fig. 5A]  
[ Fig. 5B]  
[ Fig. 5C]  
[ Fig. 5D]  
[ Fig. 6]