CN103248637A - Method for guaranteeing continuity and integrity of data on Internet of Things processing layer - Google Patents

Method for guaranteeing continuity and integrity of data on Internet of Things processing layer Download PDF

Info

Publication number
CN103248637A
CN103248637A CN2012100245692A CN201210024569A CN103248637A CN 103248637 A CN103248637 A CN 103248637A CN 2012100245692 A CN2012100245692 A CN 2012100245692A CN 201210024569 A CN201210024569 A CN 201210024569A CN 103248637 A CN103248637 A CN 103248637A
Authority
CN
China
Prior art keywords
data
internet
terminal
things
processing layer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100245692A
Other languages
Chinese (zh)
Inventor
李增胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XI'AN WEISHENG IOT TECHNOLOGY Co Ltd
Original Assignee
XI'AN WEISHENG IOT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XI'AN WEISHENG IOT TECHNOLOGY Co Ltd filed Critical XI'AN WEISHENG IOT TECHNOLOGY Co Ltd
Priority to CN2012100245692A priority Critical patent/CN103248637A/en
Publication of CN103248637A publication Critical patent/CN103248637A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method for guaranteeing continuity and integrity of data on an Internet of Things processing layer and belongs to the information security field of electronic information. Starting from the aspect of guaranteeing continuity and integrity of data on an Internet of Things processing layer, the method utilizes the continuous monitoring data changes to achieve uninterrupted extraction of variation, as well as data encryption by adopting encryption measures, the variation and the data are transmitted to a protection system to be saved, and all variation nodes are recorded and stored. When the Internet of Things processing layer fails to work and requires recovery, a data field to which any node points is extracted from the protection system, data are decrypted and then transmitted back to a damaged data field, and meanwhile, data in the damaged data field are rearranged to recover original business operation. Therefore, the continuity and the integrity of data on the Internet of Things processing layer are guaranteed and the service continuity of an Internet of Things working module is guaranteed.

Description

A kind of method that ensures Internet of Things processing layer data continuity and integrality
One, affiliated technical field
The electronic information class information security field
Two, background technology
Guarantee Internet of Things information security is mainly started with from three levels; sensing layer, transport layer, one are processing layers; the data volume of processing layer is the hugest; security requirement to data is also the highest; but be faced with information safety protection mechanism shortcoming, mode of operation uncertain, the problems such as standardization that need the industry acquiescence still at present; therefore the existing technology that can solve the Internet of Things information security also all is to grope, and does not still have mature technology.
Three, summary of the invention
1, goal of the invention
The present invention starts with from ensureing Internet of Things processing layer data continuity and integrality aspect; utilize and continue the monitor data variation; to variable quantity uninterrupted extract and by cryptographic means with data encryption; be transferred to the protection system storage; each is changed node all recorded preservation; go wrong when need recovering normal in Internet of Things processing layer data; can from protection system, extract arbitrary node data field pointed; the data field of destruction will be transferred back to after the data deciphering; should distinguish data simultaneously heavily manages; make it recover original business operation, guaranteed continuity and the integrality of data thus, ensured professional continuity.
2, technical solution
Technical solution of the present invention:
One, system architecture is the network architecture, terminal and service end (service end is preserved the data of coming self terminal) that key technology point is handled in the partner networking data;
Two, in network, monitor each terminal handler to the operation of data by forms of broadcasting multithreading, uninterrupted in real time, and information is formed the ciphertext sequence according to certain rule compositor feed back to protection system and handle, protection system reads sign, address, data variation amount and the record (preservation) of each terminal from ciphertext;
Three, protection system receives the instruction of the extraction data of each terminal transmission, comprises terminal address in the instruction, and information such as terminal data node demand send to terminal after resolving instruction and reading the corresponding data decoding, finish recovery operation.
3, technique effect
For the data security sexual demand of processing terminal in the Internet of Things, need reliable authentication, high strength confidentiality and integrity usually.Sometimes need to ciphertext inquire about, data mining, safety calculating, secure cloud calculating etc. in many ways.Need to the controllability of ciphertext and restorability (how anti-lost and lose after what if).
The invention success of this technology, realized the demand substantially:
At first, data are stored by cipher mode, and server is to encrypt operation, has realized the demand of reliability and high strength confidentiality; Data in real time is handled in real time and is preserved, and has ensured the integrality of data.The data time number of nodes is many, inquiry density height, and data terminal can be transferred in real time, recovers at any time.
This technology and products thereof can be widely used in the Internet of Things user, and product also can be applicable to military fields such as modern national defense, information war, has great social significance.
Four, description of drawings
See Figure of description for details.
Accompanying drawing is the structural representation of data flow of the present invention and data processing work stream.
Five, embodiment
4 layer of structure of Internet of Things are sensing layer, transport layer, processing layer, application layer, the work that processing layer is being born the data storage and read, and data volume is the hugest, and is also important, ensures that the safety of this link is the most important.
This technology just is deployed in processing layer, and processing layer in fact is in the bottom of whole Internet of Things data structure, and more near bottom, complexity is more high, but performance is more good.
As shown in drawings, in actual applications, during transfer of data, specific implementation is through following transmission course, at front end, application program thinks that by interface kernel protocol stack sends data, these data are the instruction bag of real data, set up both sides and connect, after connection is set up, the rear end response is also accepted front end, obtains monitoring power.This moment, grasped the initiative rear end, obtains packet by sending instruction to leading portion, leaves the memory block after the analyzing and processing in, sends the instruction of fetching data up to front end, is sent to front end by network channel again after the dissection process, finishes whole flow chart of data processing.
Use " MagicBox desktop data backup expert " software of this technical research, successful Application is implemented, and this Account Dept is deployed in the local area network (LAN), and all the terminal computer data in the local area network (LAN) are monitored and backup protection in real time.

Claims (5)

1. method that ensures Internet of Things processing layer data continuity and integrality, it is characterized in that: the program that the partner networking data is handled is made up of front end, intelligent data analysis engine, intelligent data processing engine and rear end, operates in terminal and the service end (service end is preserved the data of coming self terminal) of Internet of Things equipment.
2. front end as claimed in claim 1, it is characterized in that: front end belongs to servo service, in the operation of internet-of-things terminal equipment, is used for setting up and the communicating to connect of service end.During communication, intercept and capture the network request of server end in real time, set up buffering area and constitute Buffer Pool, be used for depositing application data.
3. intelligent data analysis engine as claimed in claim 1; it is characterized in that: will feed back to protection system according to certain rule compositor composition ciphertext sequence from the information that front end obtains and handle, protection system reads sign, address, data variation amount and the record (preservation) of each terminal from ciphertext.
4. intelligent data processing engine as claimed in claim 1; it is characterized in that: protection system receives the instruction of the extraction data of each terminal transmission; comprise terminal address in the instruction; information such as terminal data node demand; send to terminal after resolving instruction and reading the corresponding data decoding, finish recovery operation.
5. the rear end described in claim 1 is characterized in that: monitor each terminal handler to the operation of data by forms of broadcasting multithreading in network, uninterruptedly finish data in real time and obtain and send.
CN2012100245692A 2012-02-03 2012-02-03 Method for guaranteeing continuity and integrity of data on Internet of Things processing layer Pending CN103248637A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100245692A CN103248637A (en) 2012-02-03 2012-02-03 Method for guaranteeing continuity and integrity of data on Internet of Things processing layer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100245692A CN103248637A (en) 2012-02-03 2012-02-03 Method for guaranteeing continuity and integrity of data on Internet of Things processing layer

Publications (1)

Publication Number Publication Date
CN103248637A true CN103248637A (en) 2013-08-14

Family

ID=48927859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100245692A Pending CN103248637A (en) 2012-02-03 2012-02-03 Method for guaranteeing continuity and integrity of data on Internet of Things processing layer

Country Status (1)

Country Link
CN (1) CN103248637A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085693A (en) * 2017-05-17 2017-08-22 成都麟成科技有限公司 A kind of data preventing decryption method in big data environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738242A (en) * 2004-08-20 2006-02-22 中兴通讯股份有限公司 Device and method for data safety share between isomerous system
US20070174325A1 (en) * 2006-01-24 2007-07-26 International Business Machines Corporation Method and system for building a database from backup data images
CN101183325A (en) * 2007-12-07 2008-05-21 中国科学院计算技术研究所 High available storage server system and data protection method thereof
CN202049476U (en) * 2011-03-15 2011-11-23 上海华响信息技术有限公司 Microcomputer real-time data protection system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1738242A (en) * 2004-08-20 2006-02-22 中兴通讯股份有限公司 Device and method for data safety share between isomerous system
US20070174325A1 (en) * 2006-01-24 2007-07-26 International Business Machines Corporation Method and system for building a database from backup data images
CN101183325A (en) * 2007-12-07 2008-05-21 中国科学院计算技术研究所 High available storage server system and data protection method thereof
CN202049476U (en) * 2011-03-15 2011-11-23 上海华响信息技术有限公司 Microcomputer real-time data protection system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107085693A (en) * 2017-05-17 2017-08-22 成都麟成科技有限公司 A kind of data preventing decryption method in big data environment

Similar Documents

Publication Publication Date Title
US11263352B2 (en) Security plugin for a system-on-a-chip platform
CN103530201A (en) Safety data repetition removing method and system applicable to backup system
US20170091463A1 (en) Secure Audit Logging
CN107295069A (en) Data back up method, device, storage medium and server
CN107171811B (en) Lightweight RFID security authentication method based on Present algorithm
US20210281550A1 (en) Binding data to a network in the presence of an entity
CN106603561A (en) Block level encryption method in cloud storage and multi-granularity deduplication method
WO2022179304A1 (en) Secure communication method, apparatus, and system for dc interconnection
WO2016028027A1 (en) Private data management system and method therefor
Chang et al. Effective distributed service architecture for ubiquitous video surveillance
US20180083778A1 (en) Binding data to a network in the presence of an entity with revocation capabilities
Blazy et al. An efficient protocol for UAS security
CN105262668A (en) Firewall configuration for cloud computing network
CN107659579A (en) Deposit card method, equipment and related deposit system in a kind of scene
CN104079578A (en) Evidence-taking data hidden transmission method and system
JP2016184917A (en) Monitoring system and reproduction device
CN104660584B (en) Analysis of Trojan Virus technology based on network session
CN103248637A (en) Method for guaranteeing continuity and integrity of data on Internet of Things processing layer
US11019042B1 (en) Data assisted key switching in hybrid cryptography
CN116232700A (en) Login authentication method, login authentication device, computer equipment and storage medium
CN113852544B (en) Security gateway based on LoraWan and blockchain
CN114745454A (en) Boundary protection device, system, method, computer equipment and storage medium
CN200941631Y (en) Net one-way protocal separator
CN105227562A (en) The key business data transmission mediation device of identity-based checking and using method thereof
CN109905213A (en) Data safe transmission method and node device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130814

WD01 Invention patent application deemed withdrawn after publication