CN112671763A - Data synchronization method and device under networking environment and computer equipment - Google Patents

Data synchronization method and device under networking environment and computer equipment Download PDF

Info

Publication number
CN112671763A
CN112671763A CN202011540076.5A CN202011540076A CN112671763A CN 112671763 A CN112671763 A CN 112671763A CN 202011540076 A CN202011540076 A CN 202011540076A CN 112671763 A CN112671763 A CN 112671763A
Authority
CN
China
Prior art keywords
slave
equipment
slave equipment
key generation
target key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011540076.5A
Other languages
Chinese (zh)
Other versions
CN112671763B (en
Inventor
朱昊鹏
余昕
简春兵
龚凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingsignal Technology Co Ltd
Original Assignee
Kingsignal Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingsignal Technology Co Ltd filed Critical Kingsignal Technology Co Ltd
Priority to CN202011540076.5A priority Critical patent/CN112671763B/en
Publication of CN112671763A publication Critical patent/CN112671763A/en
Application granted granted Critical
Publication of CN112671763B publication Critical patent/CN112671763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application relates to a data synchronization method and device, computer equipment and a storage medium in a networking environment. The method comprises the following steps: receiving a registration request sent by a slave device; the registration request carries equipment information corresponding to the slave equipment; judging whether the slave equipment is legal or not according to the equipment information; if the slave equipment is legal, issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key; and if the slave equipment is illegal, returning a result of failed registration to the slave equipment. By adopting the method, the data synchronization safety can be ensured, and the data synchronization efficiency can be effectively improved.

Description

Data synchronization method and device under networking environment and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data synchronization method and apparatus, a computer device, and a storage medium in a networking environment.
Background
With the development of computer technology and the coming of the 5G era, the appearance of the Internet of things brings great convenience to modern life, and more users can intelligently sense, identify and manage various devices and use processes on line by using an Internet of things platform. In a current networking data synchronization mode, for example, a Mesh network, i.e., a wireless Mesh network, a technical model of "client and server" is usually adopted when Mesh networking data is synchronized, a Mesh master device operates at a server, and a Mesh slave device operates at a client, and is mainly used for synchronizing parameters of wifi.
However, in the current networking data synchronization mode, the process of transmitting data between devices is easily stolen and cracked, which easily causes the security of data synchronization in the networking environment to be poor, and the efficiency of data synchronization is also low.
Disclosure of Invention
In view of the above, it is desirable to provide a data synchronization method, an apparatus, a computer device, and a storage medium in a networking environment, which can improve data synchronization efficiency while ensuring data synchronization security.
A method of data synchronization in a networking environment, the method comprising:
receiving a registration request sent by a slave device; the registration request carries equipment information corresponding to the slave equipment;
judging whether the slave equipment is legal or not according to the equipment information;
if the slave equipment is legal, issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key;
and if the slave equipment is illegal, returning a result of failed registration to the slave equipment.
In one embodiment, the generation manner of the negotiated target key includes:
receiving a negotiation request of a key generation mode sent by slave equipment, wherein the negotiation request carries the key generation mode supported by the slave equipment;
selecting a target key generation mode from key generation modes supported by the slave equipment, and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment and the master equipment of communication to calculate the target key according to a Diffie-Hellman key exchange algorithm.
In one embodiment, the method further comprises:
when detecting the configuration change, detecting whether the local configuration data is the same as the data in the established linked list or not in a polling mode;
and if not, sending a changed configuration file to the slave equipment, wherein the changed configuration file is used for indicating the slave equipment to update corresponding configuration information.
In one embodiment, the determining, according to the device information, whether the slave device is legal includes:
searching a legal device list locally corresponding to the main device according to the device information;
if not, judging whether the equipment information meets the condition of preset legal equipment or not;
and if so, determining that the slave equipment is legal, and adding the slave equipment into a legal equipment list locally corresponding to the master equipment.
In one embodiment, the method further comprises:
and sending the equipment information to a user terminal to confirm whether the slave equipment is legal or not.
A data synchronization apparatus in a networking environment, the apparatus comprising:
the receiving module is used for receiving a registration request sent by slave equipment; the registration request carries equipment information corresponding to the slave equipment;
the judging module is used for judging whether the slave equipment is legal or not according to the equipment information;
the issuing module is used for issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment if the slave equipment is legal; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key;
and the return module is used for returning a registration failure result to the slave equipment if the slave equipment is illegal.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a registration request sent by a slave device; the registration request carries equipment information corresponding to the slave equipment;
judging whether the slave equipment is legal or not according to the equipment information;
if the slave equipment is legal, issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key;
and if the slave equipment is illegal, returning a result of failed registration to the slave equipment.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving a registration request sent by a slave device; the registration request carries equipment information corresponding to the slave equipment;
judging whether the slave equipment is legal or not according to the equipment information;
if the slave equipment is legal, issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key;
and if the slave equipment is illegal, returning a result of failed registration to the slave equipment.
A method of data encryption in a networking environment, the method comprising:
receiving a negotiation request of a key generation mode sent by slave equipment through a first port, wherein the negotiation request carries the key generation mode supported by the slave equipment;
selecting a target key generation mode from key generation modes supported by the slave equipment, and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment to generate a corresponding first public key and a corresponding first private key according to the target key generation mode;
generating a corresponding second public key and a second private key according to the target key generation mode;
receiving a first public key sent by the slave equipment through the first port;
calculating the first public key and the second private key stored locally according to the target key generation mode to obtain a target key;
sending the second public key to the slave device; the second public key is used for indicating the slave equipment to operate the second public key and the first private key stored in the slave equipment according to the target key generation mode to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
In one embodiment, before receiving, through the first port, a negotiation request of a key generation scheme sent from a device, the method further includes:
binding a first port of the main equipment with an IP address in advance to obtain a corresponding binding relationship; the binding relation is used for enabling each slave device to automatically acquire the IP address;
and the slave equipment acquires the IP address in a DHCP mode and establishes connection with the first port of the master equipment according to the IP address.
A data encryption apparatus in a networking environment, the apparatus comprising:
a receiving module, configured to receive, through a first port, a negotiation request of a key generation manner sent by a slave device, where the negotiation request carries a key generation manner supported by the slave device itself;
the selecting module is used for selecting a target key generation mode from key generation modes supported by the slave equipment and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment to generate a corresponding first public key and a corresponding first private key according to the target key generation mode;
the generating module is used for generating a corresponding second public key and a second private key according to the target key generating mode;
the receiving module is further configured to receive, through the first port, a first public key sent by the slave device;
the operation module is used for operating the first public key and the second private key stored locally according to the target key generation mode to obtain a target key;
a sending module, configured to send the second public key to the slave device; the second public key is used for indicating the slave equipment to operate the second public key and the first private key stored in the slave equipment according to the target key generation mode to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a negotiation request of a key generation mode sent by slave equipment through a first port, wherein the negotiation request carries the key generation mode supported by the slave equipment;
selecting a target key generation mode from key generation modes supported by the slave equipment, and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment to generate a corresponding first public key and a corresponding first private key according to the target key generation mode;
generating a corresponding second public key and a second private key according to the target key generation mode;
receiving a first public key sent by the slave equipment through the first port;
calculating the first public key and the second private key stored locally according to the target key generation mode to obtain a target key;
sending the second public key to the slave device; the second public key is used for indicating the slave equipment to operate the second public key and the first private key stored in the slave equipment according to the target key generation mode to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving a negotiation request of a key generation mode sent by slave equipment through a first port, wherein the negotiation request carries the key generation mode supported by the slave equipment;
selecting a target key generation mode from key generation modes supported by the slave equipment, and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment to generate a corresponding first public key and a corresponding first private key according to the target key generation mode;
generating a corresponding second public key and a second private key according to the target key generation mode;
receiving a first public key sent by the slave equipment through the first port;
calculating the first public key and the second private key stored locally according to the target key generation mode to obtain a target key;
sending the second public key to the slave device; the second public key is used for indicating the slave equipment to operate the second public key and the first private key stored in the slave equipment according to the target key generation mode to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
According to the data synchronization method, the data synchronization device, the computer equipment and the storage medium in the networking environment, the registration request sent by the slave equipment is received, and the registration request carries the equipment information corresponding to the slave equipment. And judging whether the slave equipment is legal or not according to the equipment information. And if the slave equipment is legal, issuing corresponding configuration information to the slave equipment, and creating a linked list corresponding to the slave equipment. The linked list is used for storing data reported by the slave device, and the configuration information is encrypted by using a negotiated target key. And if the slave equipment is illegal, returning a result of failed registration to the slave equipment. Therefore, the encryption and decryption of the related operations of data synchronization under the networking environment are realized through the target key negotiated in advance by the master device and the slave device, and the data synchronization efficiency can be effectively improved while the data synchronization safety is ensured.
The data encryption method, the data encryption device, the computer equipment and the storage medium in the networking environment receive a negotiation request of a key generation mode sent by the slave equipment through the first port, wherein the negotiation request carries the key generation mode supported by the slave equipment. The master device selects a target key generation mode from key generation modes supported by the slave device, and returns the target key generation mode to the slave device, wherein the target key generation mode is used for indicating the slave device to generate a corresponding first public key and a corresponding first private key according to the target key generation mode. And the master device generates a corresponding second public key and a second private key according to the target key generation mode, and receives the first public key sent by the slave device through the first port. And the master device calculates the first public key and the second private key stored locally according to the target key generation mode to obtain the target key. And the master device sends a second public key to the slave device, the second public key is used for indicating the slave device to operate the second public key and the first private key stored in the slave device according to the target key generation mode to obtain a target key, and the target key is used for encrypting and decrypting communication data between the master device and the slave device. Therefore, the target key is obtained by performing mixed operation on the public key and the locally stored private key, the encryption capability negotiation between the master device and the slave device is realized, and an optimal encryption mode can be provided for related operations during data synchronization for transmission.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a data synchronization method in a networking environment;
FIG. 2 is a flowchart illustrating a data synchronization method in a networking environment according to an embodiment;
FIG. 3 is a flowchart illustrating the steps of a negotiated target key generation method according to an embodiment;
FIG. 4 is a flow diagram that illustrates the steps performed when a configuration change is detected, in one embodiment;
FIG. 5 is a flowchart illustrating steps of determining whether a slave device is legal according to device information in an embodiment;
FIG. 6A is a flowchart illustrating a data encryption method in a networking environment, according to an embodiment;
FIG. 6B is a flow chart illustrating data synchronization in a Mesh-based networking environment, according to an embodiment;
FIG. 6C is a flowchart illustrating data synchronization software in a Mesh-based networking environment, according to an embodiment;
FIG. 7 is a block diagram of a data synchronization apparatus in a networking environment according to an embodiment;
FIG. 8 is a block diagram showing the construction of a data encryption apparatus in a networking environment according to an embodiment;
FIG. 9 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The data synchronization method in the networking environment provided by the application can be applied to the application environment shown in fig. 1. Wherein server 104 communicates with slave device 102 over a network. The server 104 receives a registration request sent by the slave device 102, where the registration request carries device information corresponding to the slave device 102. The server 104 determines whether the slave device 102 is legitimate based on the device information. If the slave device 102 is legal, the server 104 issues corresponding configuration information to the slave device 102, and creates a linked list corresponding to the slave device 102. The linked list is used to store data reported from the device 102, and the configuration information is encrypted by using a negotiated target key. If the slave device 102 is not legitimate, the server 104 returns a result of the registration failure to the slave device 102. The slave device 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a data synchronization method in a networking environment is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step 202, receiving a registration request sent by a slave device, where the registration request carries device information corresponding to the slave device.
The wireless Mesh network has evolved into an effective solution suitable for various wireless access networks such as a broadband home network, a community network, an enterprise network, a metropolitan area network and the like by virtue of multi-hop interconnection and Mesh topology characteristics. Data synchronization between Mesh devices can enable the MESH routing to be more intelligent, service perception is more flexible, and the Mesh devices have more flexible service perception capability and processing capability. Meanwhile, the intelligent wireless router can be used for conveniently connecting other wireless devices, the router serves as an intelligent home data inlet, unified networking can be conducted on the intelligent home, the data interfaces are combined with the cloud, and after the intelligent router has storage and computing capabilities, the home devices can be remotely controlled to work, so that the intelligent router is not only a network access device, but also a management device and a safety device.
Mesh networks, i.e. "wireless Mesh networks", are "multi-hop" (multi-hop) networks, Mesh being a wireless network technology. The wireless Mesh router forms an ad hoc network in a multi-hop interconnection mode, and provides WMN networking with higher reliability, wider service coverage and lower early investment cost. The WMN is a special form of the mobile Ad Hoc network, and is a high-capacity high-speed distributed network. The general architecture of WMN consists of three different types of radio network elements: gateway routers (routers with gateway/bridge functionality), Mesh routers (access points) and Mesh clients (mobile or otherwise). The Mesh client is connected to the wireless Mesh router in a wireless connection mode, and the wireless Mesh router forms a relatively stable forwarding network in a multi-hop interconnection mode. A common Mesh networking adopts a client/server technical model, a Mesh master device runs at a server side, and a Mesh slave device runs at a client side and is mainly used for synchronizing parameters of wifi.
Specifically, the master device running at the server may receive a registration request sent by the slave device, where the registration request carries device information corresponding to the slave device. The master device is a Mesh master device, the slave device is a Mesh slave device, the Mesh master device runs on a server side, and the Mesh slave device runs on a client side. The registration request means that the slave device registers its device information and its service information to the corresponding resource management device. The device information refers to identification information related to the device, such as a device model number, a serial number, and the like. The device information may include information such as the device model, the device manufacturer (e.g., Microsoft), the operating system and version (e.g., iOS 12.0.1), the device owner, the device name, the device serial number, and the IMEI. The master device in the Mesh-based networking environment is taken as an example for explanation. And the Mesh master device is started, opens a TCP2000 port and waits for external connection. The Mesh slave device is started, after the corresponding IP address is obtained through the WAN port, the Mesh slave device is connected with the TCP2000 port of the Mesh master device, the Mesh slave device initiates a registration request to the Mesh master device, meanwhile, the Mesh slave device sends the device information of the Mesh slave device to the Mesh master device, and the Mesh master device is requested to send the corresponding configuration information. When the Mesh master device receives the registration request and the device information sent by the Mesh slave device, the Mesh master device responds to the confirmation message corresponding to the Mesh slave device and indicates that the information sent by the slave device is received.
And step 204, judging whether the slave equipment is legal or not according to the equipment information.
After the master device receives the registration request sent by the slave device, the master device may determine whether the slave device is legal according to the device information of the slave device carried in the registration request. Whether the equipment is legal or not means whether the equipment information and the service information of the equipment conform to the configuration information set in the current resource management equipment or not, namely whether the identity of the equipment is verified or not is illegal. Specifically, after the Mesh master device, i.e., the Mesh master device, receives the registration request sent by the Mesh slave device, i.e., the Mesh slave device, the Mesh master device may respond to the confirmation message corresponding to the Mesh slave device, indicating that the information sent by the Mesh slave device has been received. Further, the mesh host and the mesh slave establish link keep-alive, start the link keep-alive and verify whether the master device and the slave device are on-line. That is, the master device first checks the physical link status corresponding to the slave device. If the physical link is normal, the mesh host checks whether the mesh slave is legal. The device information comprises information such as MAC information, a factory building mark and a product model, and the mesh host can judge whether the slave device is legal or not according to the preset configuration information and the information such as the MAC information, the factory building mark and the product model in the device information. In addition, the mesh host can also send the registration request to a third-party user terminal to confirm whether the mesh slave is legal or not, and the third-party user terminal judges whether to issue corresponding configuration information or not. And if the mesh host receives a message which is sent by the user terminal and confirms that the mesh slave is legal, the mesh host adds the mesh slave into a local legal list of the mesh host.
And step 206, if the slave equipment is legal, issuing corresponding configuration information to the slave equipment, and creating a linked list corresponding to the slave equipment. The linked list is used for storing data reported by the slave device, and the configuration information is encrypted by using a negotiated target key.
The master device may determine whether the slave device is legal according to the device information of the slave device carried in the registration request. And if the slave equipment is determined to be legal, the master equipment sends corresponding configuration information to the slave equipment and creates a linked list corresponding to the slave equipment. The linked list is used for storing data reported by the slave device, and the configuration information is encrypted by using a negotiated target key. Specifically, the mesh master can create and maintain a linked list for storing the data sent by the mesh slave, and after the master and the slave register successfully, the mesh master can store the data reported by the mesh slave in the corresponding linked list. The configuration information is used for indicating the slave device to update the corresponding configuration according to the configuration information, and the negotiated target key is that after the mesh slave device is connected with the TCP2000 port of the mesh host device, the mesh host device and the mesh slave device can perform a key negotiation process in advance through the TCP2000 port to obtain the negotiated target key.
And step 208, if the slave equipment is illegal, returning a result of failed registration to the slave equipment.
The master device may determine whether the slave device is legal according to the device information corresponding to the slave device carried in the registration request. And if the slave equipment is determined to be illegal, the master equipment returns a result of failed registration to the slave equipment. That is, when the mesh host determines that the slave device is illegal, the master device sends error information to the corresponding slave device, and prompts that the registration fails, that is, the slave device is an illegal user or an illegal device.
In this embodiment, by receiving a registration request sent by a slave device, the registration request carries device information corresponding to the slave device. And judging whether the slave equipment is legal or not according to the equipment information. And if the slave equipment is legal, issuing corresponding configuration information to the slave equipment, and creating a linked list corresponding to the slave equipment. The linked list is used for storing data reported by the slave device, and the configuration information is encrypted by using a negotiated target key. And if the slave equipment is illegal, returning a result of failed registration to the slave equipment. Therefore, the encryption and decryption of the related operations of data synchronization under the networking environment are realized through the target key negotiated in advance by the master device and the slave device, and the data synchronization efficiency can be effectively improved while the data synchronization safety is ensured.
In one embodiment, as shown in fig. 3, the step of generating the negotiated target key includes:
step 302, receiving a negotiation request of the key generation mode sent by the slave device, where the negotiation request carries the key generation mode supported by the slave device itself.
Step 304, selecting a target key generation mode from the key generation modes supported by the slave device, and returning the target key generation mode to the slave device. The target key generation mode is used for indicating the slave equipment and the master equipment of communication to calculate and obtain a target key according to a Diffie-Hellman key exchange algorithm.
And when the slave equipment is determined to be legal, the master equipment sends the corresponding configuration information to the corresponding slave equipment and creates a linked list corresponding to the slave equipment. Wherein the configuration information is encrypted using the negotiated target key. The master device may negotiate the generation of the target key with the slave device in advance. Specifically, the master device may receive a negotiation request of the key generation manner sent by the slave device, where the negotiation request carries the key generation manner supported by the slave device itself. The master device selects a target key generation mode from the key generation modes supported by the slave device, and returns the target key generation mode to the slave device. The target key generation mode is used for indicating the slave equipment and the master equipment of communication to calculate and obtain a target key according to a Diffie-Hellman key exchange algorithm. The Diffie-Hellman KEY Exchange Algorithm refers to a method of ensuring that a shared KEY securely traverses an insecure network, called the Diffie-Hellman KEY Exchange protocol/Algorithm (Diffie-Hellman KEY Exchange/agent Algorithm). The mechanism is ingenious in that two parties requiring secure communication can determine a symmetric key by the method, and then can encrypt and decrypt by the key. Therefore, the encryption capability negotiation between the master device and the slave device is realized, and a preferable encryption mode can be provided for the related operation during data synchronization for transmission.
In one embodiment, as shown in FIG. 4, the step when a configuration change is detected includes:
step 402, when detecting the configuration change, detecting whether the local configuration data is the same as the data in the created linked list in a polling manner.
And step 404, if the configuration information is not the same, sending the changed configuration file to the slave device, wherein the changed configuration file is used for indicating the slave device to update the corresponding configuration information.
The mesh host creates and maintains a linked list for storing the data sent by the mesh slave, and after the host and the slave are successfully registered, the mesh host stores the data reported by each mesh slave in the corresponding linked list. When the mesh host detects the configuration change, namely an administrator or a user terminal with the configuration change authority changes the configuration, the mesh host detects whether the local configuration data is the same as the data in the created linked list or not in a polling mode. And if not, the mesh host sends the changed configuration file to the corresponding slave equipment, wherein the changed configuration file is used for indicating the slave equipment to update the corresponding configuration information. For example, after the mesh master and the mesh slave 01 are successfully registered, when the mesh master detects a configuration change, that is, when an administrator or a user with a configuration change authority changes the configuration of the mesh slave 01, the mesh master detects whether local configuration data is the same as data in a created linked list of the mesh slave 01 in a polling manner. If the configuration information is not the same as the configuration information, the mesh master sends the changed configuration file to the corresponding mesh slave 01, so that the mesh slave 01 updates the corresponding configuration information. Therefore, the data synchronization security is ensured, and meanwhile, the resources consumed in data synchronization can be reduced. In addition, a json format is adopted during data exchange, machine analysis and generation are easy, network transmission efficiency can be effectively improved, expansibility of synchronous data is supported, new data nodes and services can be added, and new service scenes can be conveniently expanded.
In one embodiment, as shown in fig. 5, the step of determining whether the slave device is legal according to the device information includes:
step 502, according to the device information, searching in a legal device list locally corresponding to the main device.
In step 504, if the device information is not found, it is determined whether the device information meets the conditions of the preset legal device.
Step 506, if yes, determining that the slave device is legal, and adding the slave device into a legal device list locally corresponding to the master device.
After receiving the registration request sent by the slave device, the master device may determine whether the slave device is legal according to the device information corresponding to the slave device carried in the registration request. Specifically, the master device may search a legal device list locally corresponding to the master device according to the device information. If not, further judging whether the equipment information meets the conditions of the preset legal equipment. And if so, determining that the slave equipment is legal, and adding the slave equipment into a legal equipment list locally corresponding to the master equipment. For example, after the mesh host receives the registration request sent by the mesh slave 01, the mesh host may determine whether the mesh slave 01 is legal or not according to the device information corresponding to the mesh slave 01 carried in the registration request. Specifically, the mesh master can search in a legal device list locally corresponding to the mesh master according to the device information corresponding to the mesh slave 01. If the information is not found, whether the device information corresponding to the mesh slave 01 meets the conditions of the preset legal device needs to be further judged. The mesh host can judge whether the slave equipment is legal or not according to the MAC information, the plant identification, the product model and other information in the equipment information. And if so, determining that the mesh slave 01 is legal, and adding the mesh slave 01 into a legal device list locally corresponding to the master device. In addition, the mesh master can search in a legal device list locally corresponding to the mesh master according to the device information locally corresponding to the mesh slave 01, and if the device information locally corresponding to the mesh slave 01 is searched in the legal device list locally corresponding to the mesh master, the mesh slave 01 is determined to be legal, and the mesh slave 01 is added into the legal device list locally corresponding to the master device. Therefore, the encryption and decryption of related operations of data synchronization in the networking environment are realized through the target key negotiated in advance by the master device and the slave device, meanwhile, a state machine can be designed according to the networking and data synchronization process, and the program running efficiency is improved.
In one embodiment, the device information is sent to the user terminal to confirm whether the slave device is legitimate.
After receiving the registration request sent by the slave device, the master device may determine whether the slave device is legal according to the device information corresponding to the slave device carried in the registration request. The master device may also send the device information corresponding to the slave device carried in the registration request to the user terminal to confirm whether the slave device is legal. For example, the mesh host may send the registration request to the third-party user terminal to determine whether the mesh slave is legal, and the third-party user terminal determines whether to issue the corresponding configuration information. And if the mesh host receives a message which is sent by the user terminal and confirms that the mesh slave is legal, the mesh host adds the mesh slave into a local legal list of the mesh host. Therefore, the encryption and decryption of the related operations of data synchronization under the networking environment are realized through the target key negotiated in advance by the master device and the slave device, and the data synchronization efficiency can be effectively improved while the data synchronization safety is ensured.
In one embodiment, as shown in fig. 6A, a data encryption method in a networking environment is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step 602, receiving a negotiation request of a key generation manner sent by a slave device through a first port, where the negotiation request carries the key generation manner supported by the slave device itself.
And step 604, selecting a target key generation mode from key generation modes supported by the slave device, and returning the target key generation mode to the slave device, wherein the target key generation mode is used for instructing the slave device to generate a corresponding first public key and a corresponding first private key according to the target key generation mode.
And 606, generating a corresponding second public key and a second private key according to the target key generation mode.
Step 608, the first public key sent from the device is received through the first port.
And step 610, according to the target key generation mode, calculating the first public key and the second private key stored locally to obtain a target key.
Step 612, sending a second public key to the slave device, where the second public key is used to instruct the slave device to perform an operation on the second public key and the first private key stored in the slave device according to the target key generation mode, so as to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
The master device may receive, through a preset first port, a negotiation request of a key generation manner sent by the slave device, where the negotiation request carries a key generation manner supported by the slave device itself. The preset first port may be a TCP port. Further, the master device selects a target key generation method from key generation methods supported by the slave device itself, and returns the target key generation method to the slave device. The target key generation mode is used for indicating the slave device to generate a corresponding first public key and a corresponding first private key according to the target key generation mode, and the slave device sends the corresponding first public key generated according to the target key generation mode to the master device. Meanwhile, the master device may also generate a corresponding second public key and a second private key according to the negotiated target key generation manner. After the master device receives the first public key sent by the slave device through the first port, the master device may perform hybrid operation on the first public key and the second private key stored locally to obtain a corresponding target key. In addition, the master device also sends the second public key generated according to the negotiated target key generation method to the slave device, and after receiving the second public key sent by the master device, the slave device may perform a hybrid operation on the second public key and the first private key stored in the slave device according to the target key generation method to obtain the corresponding target key. The target key is used for encrypting and decrypting communication data between the master device and the slave device.
Specifically, as shown in fig. 6B, it is a flowchart of data synchronization in a Mesh networking environment. Fig. 6C is a flowchart of data synchronization software in a Mesh-based networking environment. And starting the Mesh master device, namely the Mesh host, opening a TCP2000 port and waiting for external connection. And the Mesh slave equipment, namely the Mesh slave machine is started up, acquires the IP address through the WAN port and is connected with the TCP2000 port of the Mesh host machine. Further, the mesh slave sends a request for a key generation mode negotiation to the mesh host, and sends a key generation mode (DH algorithm) supported by the mesh slave to the mesh host. After the mesh host receives the key generation mode set sent by the mesh slave, the mesh host selects a key generation mode (DH algorithm) also supported by the mesh host from the key generation mode set supported by the mesh slave, and responds the selected key generation mode (Diffie-Hellman key exchange algorithm) to the mesh slave, namely, the two parties complete the negotiation of the key generation modes. Further, the mesh slave side generates a first public key and a first private key by adopting a negotiated Diffie-Hellman key exchange algorithm, namely a DH algorithm, and sends the first public key of the mesh slave and the device information of the mesh slave to the mesh host. After the mesh host receives the first public key sent by the mesh slave through the TCP2000 port, the mesh host also generates a second public key and a second private key corresponding to the mesh host by adopting a negotiated DH algorithm, and returns the second public key to the mesh slave. And the mesh host calculates the first public key of the mesh slave and the second private key of the mesh host to obtain a corresponding shared key. And after receiving the second public key of the mesh host, the mesh slave side calculates the second public key of the mesh host and the first private key of the mesh slave to obtain a shared key, namely the negotiation process of the target key is finished. The mesh slave machine and the mesh host machine adopt the negotiated shared secret key to encrypt and decrypt communication data, and the encryption mode during message transmission is an AES mode. The AES, i.e., Advanced Encryption Standard (AES), also called Rijndael Encryption method, is a block Encryption Standard adopted by the federal government in the united states. Therefore, through a Diffie-Hellman key exchange algorithm, two parties needing communication determine a symmetric key by adopting a negotiated DH algorithm mode, and encrypt and decrypt by using the key, so that the shared key can be ensured to safely pass through an insecure network, the encryption capability negotiation between the master equipment and the slave equipment is realized, and an optimal encryption mode can be provided for related operations during data synchronization for transmission.
In an embodiment, before receiving, through the first port, a negotiation request of a key generation method sent by the slave device, the method further includes a step of binding the first port of the master device with the IP address, which specifically includes:
the first port of the master device is bound with the IP address in advance to obtain a corresponding binding relationship, and the binding relationship is used for enabling each slave device to automatically acquire the IP address.
The slave device acquires the IP address in a DHCP mode, and establishes connection with the first port of the master device according to the IP address.
Before the master device receives the negotiation request of the key generation mode sent by the slave device through the preset first port, the first port of the master device may be bound with the IP address in advance to obtain a corresponding binding relationship, and the binding relationship is used for enabling each slave device to automatically acquire the IP address. And each slave device acquires the IP address in a DHCP mode and establishes connection with the first port of the master device according to the IP address. The preset first port may be a TCP port. DHCP (Dynamic Host Configuration Protocol) is a network Protocol of a local area network, and means that a server controls a segment of IP address range, and a client can automatically obtain an IP address and a subnet mask allocated by the server when logging in the server. Specifically, the Mesh master device is started up, opens the TCP2000 port, and waits for external connection. And the Mesh slave device is started up, acquires the IP in a DHCP mode through a WAN port and is connected with a TCP2000 port of the Mesh host. Therefore, the encryption capability negotiation between the master device and the slave device is realized, and a preferable encryption mode can be provided for the related operation during data synchronization for transmission.
It should be understood that although the various steps in the flow charts of fig. 1-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-6 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 7, there is provided a data synchronization apparatus in a networking environment, including: a receiving module 702, a judging module 704, a sending module 706 and a returning module 708, wherein:
the receiving module 702 is configured to receive a registration request sent by a slave device, where the registration request carries device information corresponding to the slave device.
A judging module 704, configured to judge whether the slave device is legal according to the device information.
The issuing module 706 is configured to issue the corresponding configuration information to the slave device and create a linked list corresponding to the slave device if the slave device is legal. The linked list is used for storing data reported by the slave device, and the configuration information is encrypted by using a negotiated target key.
A returning module 708, configured to return a result of the failure to register to the slave device if the slave device is illegal.
In one embodiment, the apparatus further comprises: and selecting a module.
The receiving module is further configured to receive a negotiation request of the key generation manner sent by the slave device, where the negotiation request carries the key generation manner supported by the slave device itself. The selection module is used for selecting a target key generation mode from key generation modes supported by the slave equipment and returning the target key generation mode to the slave equipment. The target key generation mode is used for indicating the slave equipment and the master equipment of communication to calculate and obtain a target key according to a Diffie-Hellman key exchange algorithm.
In one embodiment, the apparatus further comprises: the device comprises a detection module and a sending module.
The detection module is used for detecting whether the local configuration data is the same as the data in the established linked list or not in a polling mode when the configuration change is detected. The sending module is used for sending the changed configuration file to the slave device if the configuration file is different from the slave device, wherein the changed configuration file is used for indicating the slave device to update the corresponding configuration information.
In one embodiment, the apparatus further comprises: the device comprises a searching module and a determining module.
The searching module is used for searching in a legal equipment list locally corresponding to the main equipment according to the equipment information; if not, judging whether the equipment information meets the conditions of the preset legal equipment. And the determining module is used for determining that the slave equipment is legal if the master equipment is in accordance with the legal equipment list, and adding the slave equipment into the local corresponding legal equipment list of the master equipment.
In one embodiment, the sending module is further configured to send the device information to the user terminal to confirm whether the slave device is legal.
In one embodiment, as shown in fig. 8, there is provided a data encryption apparatus in a networking environment, including: a receiving module 802, a selecting module 804, a generating module 806, an operating module 808, and a sending module 810, wherein:
a receiving module 802, configured to receive, through a first port, a negotiation request of a key generation manner sent by a slave device, where the negotiation request carries a key generation manner supported by the slave device itself.
The selecting module 804 is configured to select a target key generation manner from key generation manners supported by the slave device itself, and return the target key generation manner to the slave device, where the target key generation manner is used to instruct the slave device to generate a corresponding first public key and a corresponding first private key according to the target key generation manner.
The generating module 806 is configured to generate a corresponding second public key and a second private key according to the target key generation manner.
The receiving module 802 is further configured to receive the first public key sent from the device through the first port.
And the operation module 808 is configured to perform operation on the first public key and the locally stored second private key according to the target key generation manner to obtain the target key.
A sending module 810, configured to send the second public key to the slave device; the second public key is used for indicating the slave equipment to calculate the second public key and the first private key stored in the slave equipment according to the target key generation mode to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
In one embodiment, the apparatus further comprises: the device comprises a binding module and a connecting module.
The binding module is used for binding the first port of the master device with the IP address in advance to obtain a corresponding binding relationship, and the binding relationship is used for enabling each slave device to automatically obtain the IP address. The connection module is used for acquiring the IP address from the slave equipment in a DHCP mode and establishing connection with the first port of the master equipment according to the IP address.
For specific limitations of the data synchronization apparatus in the networking environment, reference may be made to the above limitations of the data synchronization method in the networking environment, and details are not described here again. The modules in the data synchronization device in the networking environment can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data synchronization data in a networking environment. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of data synchronization in a networking environment.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the steps of the above-described method embodiments being implemented when the computer program is executed by the processor.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of data synchronization in a networking environment, the method comprising:
receiving a registration request sent by a slave device; the registration request carries equipment information corresponding to the slave equipment;
judging whether the slave equipment is legal or not according to the equipment information;
if the slave equipment is legal, issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key;
and if the slave equipment is illegal, returning a result of failed registration to the slave equipment.
2. The method of claim 1, wherein the negotiated target key is generated by:
receiving a negotiation request of a key generation mode sent by slave equipment, wherein the negotiation request carries the key generation mode supported by the slave equipment;
selecting a target key generation mode from key generation modes supported by the slave equipment, and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment and the master equipment of communication to calculate the target key according to a Diffie-Hellman key exchange algorithm.
3. The method of claim 1, further comprising:
when detecting the configuration change, detecting whether the local configuration data is the same as the data in the established linked list or not in a polling mode;
and if not, sending a changed configuration file to the slave equipment, wherein the changed configuration file is used for indicating the slave equipment to update corresponding configuration information.
4. The method of claim 1, wherein the determining whether the slave device is legitimate according to the device information comprises:
searching a legal device list locally corresponding to the main device according to the device information;
if not, judging whether the equipment information meets the condition of preset legal equipment or not;
and if so, determining that the slave equipment is legal, and adding the slave equipment into a legal equipment list locally corresponding to the master equipment.
5. The method of claim 4, further comprising:
and sending the equipment information to a user terminal to confirm whether the slave equipment is legal or not.
6. A method of data encryption in a networking environment, the method comprising:
receiving a negotiation request of a key generation mode sent by slave equipment through a first port, wherein the negotiation request carries the key generation mode supported by the slave equipment;
selecting a target key generation mode from key generation modes supported by the slave equipment, and returning the target key generation mode to the slave equipment; the target key generation mode is used for indicating the slave equipment to generate a corresponding first public key and a corresponding first private key according to the target key generation mode;
generating a corresponding second public key and a second private key according to the target key generation mode;
receiving a first public key sent by the slave equipment through the first port;
calculating the first public key and the second private key stored locally according to the target key generation mode to obtain a target key;
sending the second public key to the slave device; the second public key is used for indicating the slave equipment to operate the second public key and the first private key stored in the slave equipment according to the target key generation mode to obtain a target key; the target key is used for encrypting and decrypting communication data between the master device and the slave device.
7. The method according to claim 6, wherein before receiving the negotiation request of the key generation manner sent from the device through the first port, the method further comprises:
binding a first port of the main equipment with an IP address in advance to obtain a corresponding binding relationship; the binding relation is used for enabling each slave device to automatically acquire the IP address;
and the slave equipment acquires the IP address in a DHCP mode and establishes connection with the first port of the master equipment according to the IP address.
8. A data synchronization apparatus in a networking environment, the apparatus comprising:
the receiving module is used for receiving a registration request sent by slave equipment; the registration request carries equipment information corresponding to the slave equipment;
the judging module is used for judging whether the slave equipment is legal or not according to the equipment information;
the issuing module is used for issuing corresponding configuration information to the slave equipment and creating a linked list corresponding to the slave equipment if the slave equipment is legal; the linked list is used for storing data reported by the slave device; the configuration information is encrypted by using a negotiated target key;
and the return module is used for returning a registration failure result to the slave equipment if the slave equipment is illegal.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202011540076.5A 2020-12-23 2020-12-23 Data synchronization method and device in networking environment, computer equipment and storage medium Active CN112671763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011540076.5A CN112671763B (en) 2020-12-23 2020-12-23 Data synchronization method and device in networking environment, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011540076.5A CN112671763B (en) 2020-12-23 2020-12-23 Data synchronization method and device in networking environment, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112671763A true CN112671763A (en) 2021-04-16
CN112671763B CN112671763B (en) 2022-08-30

Family

ID=75408853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011540076.5A Active CN112671763B (en) 2020-12-23 2020-12-23 Data synchronization method and device in networking environment, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112671763B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179507A (en) * 2021-06-30 2021-07-27 南京沁恒微电子股份有限公司 Bluetooth mesh-based self-distribution networking method and system without main equipment
CN114302433A (en) * 2021-12-28 2022-04-08 深圳市创维软件有限公司 Mesh networking method and device for multiple devices and readable storage medium
CN115174288A (en) * 2022-05-23 2022-10-11 深圳绿米联创科技有限公司 Local device linkage method and device, electronic device and storage medium
CN115174391A (en) * 2022-07-29 2022-10-11 天翼云科技有限公司 Method, device, equipment and medium for maintaining networking
CN116367159A (en) * 2023-05-31 2023-06-30 深圳市华曦达科技股份有限公司 Method and device for synchronizing information of WiFi anti-scratch network of master-slave equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110158411A1 (en) * 2009-12-29 2011-06-30 General Instrument Corporation Registering client devices with a registration server
CN106796633A (en) * 2016-12-23 2017-05-31 深圳前海达闼云端智能科技有限公司 Equipment authentication method, device, electronic equipment and slave unit
CN109548053A (en) * 2019-02-01 2019-03-29 深圳市共进电子股份有限公司 The method of networking equipment synchronous radio configuration
CN111814131A (en) * 2020-06-15 2020-10-23 北京天空卫士网络安全技术有限公司 Method and device for equipment registration and configuration management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110158411A1 (en) * 2009-12-29 2011-06-30 General Instrument Corporation Registering client devices with a registration server
CN106796633A (en) * 2016-12-23 2017-05-31 深圳前海达闼云端智能科技有限公司 Equipment authentication method, device, electronic equipment and slave unit
CN109548053A (en) * 2019-02-01 2019-03-29 深圳市共进电子股份有限公司 The method of networking equipment synchronous radio configuration
CN111814131A (en) * 2020-06-15 2020-10-23 北京天空卫士网络安全技术有限公司 Method and device for equipment registration and configuration management

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179507A (en) * 2021-06-30 2021-07-27 南京沁恒微电子股份有限公司 Bluetooth mesh-based self-distribution networking method and system without main equipment
CN113179507B (en) * 2021-06-30 2021-09-28 南京沁恒微电子股份有限公司 Bluetooth mesh-based self-distribution networking method and system without main equipment
CN114302433A (en) * 2021-12-28 2022-04-08 深圳市创维软件有限公司 Mesh networking method and device for multiple devices and readable storage medium
CN114302433B (en) * 2021-12-28 2023-09-01 深圳市创维软件有限公司 Mesh networking method for multiple devices, device and readable storage medium
CN115174288A (en) * 2022-05-23 2022-10-11 深圳绿米联创科技有限公司 Local device linkage method and device, electronic device and storage medium
CN115174288B (en) * 2022-05-23 2024-02-23 深圳绿米联创科技有限公司 Equipment local linkage method and device, electronic equipment and storage medium
CN115174391A (en) * 2022-07-29 2022-10-11 天翼云科技有限公司 Method, device, equipment and medium for maintaining networking
CN116367159A (en) * 2023-05-31 2023-06-30 深圳市华曦达科技股份有限公司 Method and device for synchronizing information of WiFi anti-scratch network of master-slave equipment

Also Published As

Publication number Publication date
CN112671763B (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN112671763B (en) Data synchronization method and device in networking environment, computer equipment and storage medium
CN107005569B (en) End-to-end service layer authentication
US8559633B2 (en) Method and device for generating local interface key
EP3432523B1 (en) Method and system for connecting a terminal to a virtual private network
JP4488719B2 (en) Fast authentication or re-authentication between layers for network communication
JP4777729B2 (en) Setting information distribution apparatus, method, program, and medium
EP3700124B1 (en) Security authentication method, configuration method, and related device
CN102883316B (en) Connection establishing method, terminal and access point
US8582476B2 (en) Communication relay device and communication relay method
US20130205025A1 (en) Optimized Virtual Private Network Routing Through Multiple Gateways
JP4902878B2 (en) Link management system
WO2009145733A1 (en) Authentication and key establishment in wireless sensor networks
US10250581B2 (en) Client, server, radius capability negotiation method and system between client and server
CN103179100A (en) Method and device for preventing the attack on a domain name system tunnel
WO2008098510A1 (en) Mehtod and apparatus for acquiring access controller information in wireless lan
EP3932044B1 (en) Automatic distribution of dynamic host configuration protocol (dhcp) keys via link layer discovery protocol (lldp)
KR20090002328A (en) Method for joining new device in wireless sensor network
CN116204914A (en) Trusted privacy computing method, device, equipment and storage medium
CN109150661A (en) A kind of method for discovering equipment and device
CN107295015B (en) Traffic signal machine communication method
CN113949730A (en) Communication method and device of equipment
CN113099443B (en) Equipment authentication method, device, equipment and system
CN113543128B (en) Method, apparatus and computer readable storage medium for secure synchronization between access devices
JP7142272B2 (en) Communication system, encryption key distribution method, management communication device, and communication device
CN113194471B (en) Wireless network access method, device and terminal based on block chain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 518051, 1st and 19th floors of Building 1, Jinxinnuo, No. 50 Baolong Second Road, Baolong Community, Baolong Street, Longgang District, Shenzhen City, Guangdong Province

Patentee after: KINGSIGNAL TECHNOLOGY Co.,Ltd.

Country or region after: China

Address before: 518051 26 / F, block B, building 10, Shenzhen Bay science and technology ecological park, No.10, Gaoxin South 9th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: KINGSIGNAL TECHNOLOGY Co.,Ltd.

Country or region before: China