CN114339737B - Wireless communication instruction encryption method and related equipment - Google Patents

Wireless communication instruction encryption method and related equipment Download PDF

Info

Publication number
CN114339737B
CN114339737B CN202111593850.3A CN202111593850A CN114339737B CN 114339737 B CN114339737 B CN 114339737B CN 202111593850 A CN202111593850 A CN 202111593850A CN 114339737 B CN114339737 B CN 114339737B
Authority
CN
China
Prior art keywords
target
instruction
encryption
parameter
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111593850.3A
Other languages
Chinese (zh)
Other versions
CN114339737A (en
Inventor
曾政军
舒雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuxiang Intelligent Shenzhen Co ltd
Original Assignee
Xuxiang Intelligent Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuxiang Intelligent Shenzhen Co ltd filed Critical Xuxiang Intelligent Shenzhen Co ltd
Priority to CN202111593850.3A priority Critical patent/CN114339737B/en
Publication of CN114339737A publication Critical patent/CN114339737A/en
Application granted granted Critical
Publication of CN114339737B publication Critical patent/CN114339737B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a wireless communication instruction encryption method and related equipment, which are applied to first Internet of things equipment, wherein the method comprises the following steps: establishing communication connection between first Internet of things equipment and second Internet of things equipment; obtaining a target wireless communication instruction sent to second internet equipment, wherein the target wireless communication instruction corresponds to an instruction generation moment; acquiring a target channel parameter at the moment of instruction generation; determining a target encryption parameter corresponding to the target channel parameter; encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction; and sending the first encryption instruction to the second internet of things device, wherein the first encryption instruction carries the instruction generation time. By adopting the embodiment of the application, the instruction can be encrypted to ensure the security of the instruction, and the communication security is improved.

Description

Wireless communication instruction encryption method and related equipment
Technical Field
The application relates to the technical field of communication, in particular to a wireless communication instruction encryption method and related equipment.
Background
With the rapid development of scientific technology, communication technology is also mature, and communication is also part of life of people. Although information security is also an important point of people, at present, only a command is simply sent, and whether the command is stolen by others is not concerned, so that the information security hidden trouble is large, and therefore, how to improve the command security is needed to be solved.
Disclosure of Invention
The embodiment of the application provides a wireless communication instruction encryption method and related equipment, which can encrypt a communication instruction, thereby improving communication safety.
A first aspect of an embodiment of the present application provides a wireless communication instruction encryption method, applied to a first internet of things device, where the method includes:
establishing communication connection between the first Internet of things equipment and second Internet of things equipment;
obtaining a target wireless communication instruction sent to the second internet equipment, wherein the target wireless communication instruction corresponds to an instruction generation moment;
acquiring a target channel parameter at the moment of instruction generation;
determining a target encryption parameter corresponding to the target channel parameter;
encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction;
and sending the first encryption instruction to the second internet of things device, wherein the first encryption instruction carries the instruction generation time.
A second aspect of the embodiments of the present application provides a wireless communication instruction encryption device, applied to a first internet of things device, the device includes: a communication unit, an acquisition unit, a determination unit and an encryption unit, wherein,
the communication unit is used for establishing communication connection between the first Internet of things equipment and the second Internet of things equipment;
the acquiring unit is configured to acquire a target wireless communication instruction sent to the second internet equipment, where the target wireless communication instruction corresponds to an instruction generation time; obtaining a target channel parameter at the instruction generation moment;
the determining unit is used for determining a target encryption parameter corresponding to the target channel parameter;
the encryption unit is used for encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction;
the communication unit is further configured to send the first encryption instruction to the second internet-of-things device, where the first encryption instruction carries the instruction generation time.
A third aspect of the embodiments of the present application provides an electronic device, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, and where the memory is configured to store a computer program, the computer program including program instructions, and the processor is configured to invoke the program instructions to execute the step instructions as in the first aspect of the embodiments of the present application.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform part or all of the steps as described in the first aspect of the embodiments of the present application.
A fifth aspect of the embodiments of the present application provides a computer program product, wherein the computer program product comprises a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps as described in the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
The implementation of the embodiment of the application has at least the following beneficial effects:
the wireless communication instruction encryption method is applied to first Internet of things equipment, communication connection between the first Internet of things equipment and second Internet of things equipment is established, a target wireless communication instruction sent to the second Internet of things equipment is obtained, the target wireless communication instruction corresponds to an instruction generation time, a target channel parameter at the instruction generation time is obtained, a target encryption parameter corresponding to the target channel parameter is determined, the target wireless communication instruction is encrypted according to the target encryption parameter, a first encryption instruction is obtained, the first encryption instruction is sent to the second Internet of things equipment, the first encryption instruction carries the instruction generation time, and therefore the instruction can be encrypted, so that the instruction safety is guaranteed, and the communication safety is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a wireless communication command encryption method according to an embodiment of the present application;
fig. 2 is a flow chart of a wireless communication command encryption method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a wireless communication command encryption device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application and in the above-described figures, are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly understand that the embodiments described herein may be combined with other embodiments.
The first internet of things device and the second internet of things device described in the embodiments of the present application may be electronic devices, where the electronic devices may include smart phones (such as Android mobile phones, iOS mobile phones, windows Phone mobile phones, etc.), meta-universe related devices (such as virtual reality/augmented reality devices), tablet computers, palm computers, vehicle-mounted devices (such as automobile data recorders), servers, notebook computers, mobile internet devices (MID, mobile Internet Devices), wearable devices (such as smart watches, bluetooth headphones), etc., which are merely examples, but not exhaustive, including but not limited to the electronic devices described above, the electronic devices may also be other smart home devices, and the smart home devices may be all devices capable of implementing smart home functions, which are not repeated herein.
The embodiments of the present application are described in detail below.
Referring to fig. 1, fig. 1 is a flow chart of a wireless communication command encryption method according to an embodiment of the present application. As shown in fig. 1, the wireless communication instruction encryption method applied to the first internet of things device includes the following steps:
101. and establishing communication connection between the first Internet of things device and the second Internet of things device.
The first internet of things device and the second internet of things device can be in wireless communication connection, and a communication mode between the first internet of things device and the second internet of things device can be at least one of the following: wireless fidelity (wireless fidelity, wifi) mode, bluetooth communication mode, mobile communication mode (2G, 3G, 4G, 5G), visible light communication mode, zigbee communication mode, and the like, without limitation.
In a specific implementation, a communication connection between the first internet of things device and the second internet of things device may be established, i.e. a communication link may be established between the first internet of things device and the second internet of things device. In this embodiment of the present application, the first internet of things device may perform channel detection on the communication link to obtain corresponding channel parameters, and record the channel parameters, for example, may perform channel detection according to a set time interval, and record the detected channel parameters. The set time interval may be preset or default, and the set time interval may be pre-agreed between the first internet of things device and the second internet of things device.
102. And obtaining a target wireless communication instruction sent to the second internet equipment, wherein the target wireless communication instruction corresponds to an instruction generation moment.
In a specific implementation, a target wireless communication instruction sent to the second internet device may be acquired, where the target wireless communication instruction corresponds to an instruction generation time, and the target wireless communication instruction may also carry other contents, for example, a specified type, an instruction content, a sending address, a receiving address, and the like, which are not limited herein.
103. And obtaining the target channel parameters at the moment of generating the instruction.
In a specific implementation, in an embodiment of the present application, the channel parameters may include at least one of the following: network bandwidth, network rate, network delay, packet loss rate, signal to noise ratio, etc., are not limited herein.
Specifically, the first internet of things device may perform channel parameter detection, and further may obtain a target channel parameter at the instruction generation time.
Optionally, in step 103, the obtaining the target channel parameter at the instruction generating time may include the following steps:
31. acquiring a reference channel parameter of a preset time period before the instruction generation moment;
32. sampling the reference channel parameters to obtain a plurality of sampling points, wherein each sampling point corresponds to one channel parameter;
33. generating a fitting function according to the plurality of sampling points, wherein the transverse axis of the fitting function is time, and the vertical axis is channel parameters;
34. and predicting a channel parameter of a preset time interval after the instruction generation time according to the fitting function, and taking the channel parameter as the target channel parameter.
In a specific implementation, the preset time period may be preset or default, for example, may be 1 minute, and for example, may also be 30 seconds. The preset time interval may also be preset or default, for example, the preset time interval may be 5 th to 7 th seconds after the instruction generation time.
Specifically, a reference channel parameter of a preset time period before the instruction generation time can be obtained, then the reference channel parameter is sampled according to a preset time interval, so as to obtain a plurality of sampling points, each sampling point corresponds to one channel parameter, wherein the preset time interval can be preset or default, and the sampling interval can be determined based on the duration of the preset time period. Each sampling point may correspond to not only one channel parameter, but also one time point. In this embodiment of the present application, a sampling manner of a channel parameter of the first device in the instruction encryption stage and a sampling manner of a channel parameter of the second device in the decryption stage may be predetermined to be the same.
Furthermore, a fitting function may be generated according to a plurality of sampling points, which may also be referred to as a fitting curve, where the horizontal axis of the fitting function is time, and the vertical axis is a channel parameter, and further, a channel parameter of a preset time interval after the instruction generation time may be predicted according to the fitting function, and the channel parameter may be used as a target channel parameter, where the preset time interval and the preset time interval may be pre-agreed between the first internet of things device and the second internet of things device.
Optionally, the method further comprises the following steps:
a1, acquiring a target equipment identifier of the second internet-of-things equipment;
a2, detecting whether the target equipment identifier belongs to a preset equipment identifier set;
a3, executing the step of acquiring the target channel parameters at the instruction generation moment when the target equipment identifier belongs to the preset equipment identifier set.
In this embodiment of the present application, the preset device identifier set may include at least one device identifier, and the device identifier may include at least one of the following: user name, cell phone number, MAC address, device model, etc., without limitation.
In a specific implementation, the target device identifier of the second internet device may be obtained, then whether the target device identifier belongs to a preset device identifier set is detected, when the target device identifier belongs to the preset device identifier set, the instruction is very important, encryption is needed to be performed on the instruction, and further, the step of obtaining the target channel parameter at the time of generating the instruction may be performed, so that the instruction security is ensured, otherwise, when the target device identifier does not belong to the preset device identifier set, the instruction importance is not high, or the instruction may not be encrypted.
Optionally, the method further comprises the following steps:
b1, acquiring instruction content of the target wireless communication instruction;
b2, extracting keywords from the instruction content to obtain target keywords;
and B3, executing the step of acquiring the target channel parameters at the instruction generation moment when the target keywords comprise preset keywords.
In this embodiment of the present application, the preset keyword may be preset or default.
Specifically, the instruction content of the target wireless communication instruction can be obtained, then the keyword extraction is performed on the instruction content to obtain a target keyword, when the target keyword comprises a preset keyword, the instruction carries sensitive or important information, the step of obtaining the target channel parameter at the instruction generation time is executed, so that the instruction is encrypted to ensure the instruction safety, otherwise, the instruction is not encrypted if the importance of the instruction is not so high.
104. And determining a target encryption parameter corresponding to the target channel parameter.
In a specific implementation, the encryption parameters may include: the encryption algorithm and the encryption control parameters, different encryption algorithms correspond to different encryption control parameters, and the encryption control parameters are used for adjusting the complexity of the encryption parameters. The encryption algorithm may include a symmetric encryption algorithm or an asymmetric encryption algorithm, for example, the encryption algorithm may include: the international data encryption algorithm, the random hash algorithm, and the like are not limited.
Optionally, the determining the target encryption parameter corresponding to the target channel parameter in step 104 may include the following steps:
41. determining an average channel parameter and a target fluctuation parameter of the target channel parameter;
42. determining a target encryption algorithm according to the average channel parameters;
43. determining a target encryption control parameter corresponding to the target encryption algorithm according to the target fluctuation parameter;
44. and taking the target encryption algorithm and the target encryption control parameter as the target encryption parameter.
In a specific implementation, an average channel parameter and a target fluctuation parameter of a target channel parameter can be determined, the average channel parameter can be an average value of a preset time interval, the target fluctuation parameter is a target mean square error corresponding to the preset time interval, the mean square error reflects channel stability, the channel stability is related to channel safety, for example, encryption complexity can be increased when the channel stability is unstable, encryption complexity can be properly reduced when the channel stability is stable, and further, the encryption difficulty can be dynamically regulated in combination with the channel safety, decryption difficulty is ensured, communication efficiency is improved, and instruction safety is also ensured.
Further, a target encryption algorithm corresponding to the average channel parameter may be determined according to a mapping relationship between a preset channel parameter and an encryption algorithm, each encryption algorithm may correspond to a mapping relationship between a preset fluctuation parameter and an encryption control parameter, further, a target encryption control parameter corresponding to the target fluctuation parameter may be determined based on the mapping relationship, and finally, the target encryption algorithm and the target encryption control parameter may be used as target encryption parameters.
105. And encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction.
In a specific implementation, the target wireless communication instruction can be encrypted according to the target encryption parameter to obtain a first encrypted instruction, so that the instruction security can be ensured.
105. And encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction.
In the embodiment of the application, the target wireless communication instruction can be encrypted according to the target encryption parameter by combining the attribute of the channel to obtain the first encryption instruction, so that on one hand, the instruction safety is improved, on the other hand, the dynamic instruction encryption is realized, and the cracking difficulty is increased.
106. And sending the first encryption instruction to the second internet of things device, wherein the first encryption instruction carries the instruction generation time.
In a specific implementation, a first encryption instruction may be sent to the second internet equipment, where the first encryption instruction carries the instruction generation time, the second internet equipment may obtain a corresponding target channel parameter by using the instruction generation time, and then determine a corresponding target encryption parameter according to the target channel parameter, and further, may decrypt the first encryption instruction to obtain a target wireless communication instruction without encryption, and then execute an operation corresponding to the target wireless communication instruction.
In a specific implementation, the second internet of things device may perform channel detection on a communication link between the first internet of things device and the second internet of things device, obtain corresponding channel parameters, and record the channel parameters, for example, may perform channel detection according to a set time interval, and record the detected channel parameters. The set time interval may be preset or default, and may be pre-agreed between the first internet of things device and the second internet of things device.
The first Internet of things device and the second Internet of things device have the same precision of a timer, and can realize a synchronous time counting function.
In a specific implementation, when the first internet of things device sends a first encryption instruction to the second internet of things device, channel parameters detected by the first internet of things device can be sent to the first internet of things device, then the second internet of things device can determine target channel parameters from the channel parameters based on a preset sampling mode (such as a preset time interval), instruction generation time and a fitting function generation mode, obtain corresponding target encryption parameters based on the target channel parameters, and finally realize decryption operation based on the target encryption parameters, so that instruction decryption can be realized, thereby ensuring instruction safety and improving communication safety. Even if the transmitted encrypted instruction is leaked, others cannot decrypt the encrypted instruction, so that the security of the instruction is ensured.
The wireless communication instruction encryption method is applied to first Internet of things equipment, communication connection between the first Internet of things equipment and second Internet of things equipment is established, a target wireless communication instruction sent to the second Internet of things equipment is obtained, the target wireless communication instruction corresponds to an instruction generation time, a target channel parameter at the instruction generation time is obtained, a target encryption parameter corresponding to the target channel parameter is determined, the target wireless communication instruction is encrypted according to the target encryption parameter, a first encryption instruction is obtained, the first encryption instruction is sent to the second Internet of things equipment, the first encryption instruction carries the instruction generation time, and therefore the instruction can be encrypted, so that the instruction safety is guaranteed, and the communication safety is improved.
Referring to fig. 2, fig. 2 is a flowchart of another wireless communication command encryption method according to an embodiment of the present application. As shown in fig. 2, the wireless communication instruction encryption method applied to the first internet of things device includes the following steps:
201. and establishing communication connection between the first Internet of things device and the second Internet of things device.
202. And obtaining a target wireless communication instruction sent to the second internet equipment, wherein the target wireless communication instruction corresponds to an instruction generation moment.
203. And obtaining the target equipment identifier of the second internet-of-things equipment.
204. And detecting whether the target equipment identifier belongs to a preset equipment identifier set.
205. And when the target equipment identifier belongs to the preset equipment identifier set, acquiring a target channel parameter at the instruction generation moment.
206. And determining a target encryption parameter corresponding to the target channel parameter.
207. And encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction.
208. And sending the first encryption instruction to the second internet of things device, wherein the first encryption instruction carries the instruction generation time.
The specific descriptions of the steps 201 to 208 may refer to the specific descriptions of the steps 101 to 106, and are not repeated here.
The wireless communication instruction encryption method is applied to first Internet of things equipment, communication connection between the first Internet of things equipment and second Internet of things equipment is established, a target wireless communication instruction sent to the second Internet of things equipment is obtained, the target wireless communication instruction corresponds to an instruction generation time, a target equipment identifier of the second Internet of things equipment is obtained, whether the target equipment identifier belongs to a preset equipment identifier set is detected, when the target equipment identifier belongs to the preset equipment identifier set, a target channel parameter at the instruction generation time is obtained, a target encryption parameter corresponding to the target channel parameter is determined, the target wireless communication instruction is encrypted according to the target encryption parameter, a first encryption instruction is obtained, the first encryption instruction is sent to the second Internet of things equipment, the first encryption instruction carries an instruction generation time, and therefore the instruction can be encrypted, the instruction safety is ensured, and the communication safety is improved.
In accordance with the foregoing embodiments, referring to fig. 3, fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present application, where the electronic device includes a processor, an input device, an output device, and a memory, and the processor, the input device, the output device, and the memory are connected to each other, where the memory is configured to store a computer program, the computer program includes program instructions, and the processor is configured to invoke the program instructions, and the program includes instructions for performing the following steps;
establishing communication connection between first Internet of things equipment and second Internet of things equipment;
obtaining a target wireless communication instruction sent to second internet equipment, wherein the target wireless communication instruction corresponds to an instruction generation moment;
acquiring a target channel parameter at the moment of instruction generation;
determining a target encryption parameter corresponding to the target channel parameter;
encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction;
and sending the first encryption instruction to the second internet of things device, wherein the first encryption instruction carries the instruction generation time.
Optionally, in the acquiring the target channel parameter at the instruction generating time, the program includes instructions for:
acquiring a reference channel parameter of a preset time period before the instruction generation moment;
sampling the reference channel parameters to obtain a plurality of sampling points, wherein each sampling point corresponds to one channel parameter;
generating a fitting function according to the plurality of sampling points, wherein the transverse axis of the fitting function is time, and the vertical axis is channel parameters;
and predicting a channel parameter of a preset time interval after the instruction generation time according to the fitting function, and taking the channel parameter as the target channel parameter.
Optionally, in the determining a target encryption parameter corresponding to the target channel parameter, the program includes instructions for:
determining an average channel parameter and a target fluctuation parameter of the target channel parameter;
determining a target encryption algorithm according to the average channel parameters;
determining a target encryption control parameter corresponding to the target encryption algorithm according to the target fluctuation parameter;
and taking the target encryption algorithm and the target encryption control parameter as the target encryption parameter.
Optionally, the above program further comprises instructions for performing the steps of:
acquiring a target equipment identifier of the second internet-of-things equipment;
detecting whether the target equipment identifier belongs to a preset equipment identifier set or not;
and executing the step of acquiring the target channel parameters at the instruction generation moment when the target equipment identifier belongs to the preset equipment identifier set.
Optionally, the above program further comprises instructions for performing the steps of:
acquiring instruction content of the target wireless communication instruction;
extracting keywords from the instruction content to obtain target keywords;
and executing the step of acquiring the target channel parameters at the instruction generation time when the target keywords comprise preset keywords.
The wireless communication instruction encryption method is applied to first Internet of things equipment, communication connection between the first Internet of things equipment and second Internet of things equipment is established, a target wireless communication instruction sent to the second Internet of things equipment is obtained, the target wireless communication instruction corresponds to an instruction generation time, a target channel parameter at the instruction generation time is obtained, a target encryption parameter corresponding to the target channel parameter is determined, the target wireless communication instruction is encrypted according to the target encryption parameter, a first encryption instruction is obtained, the first encryption instruction is sent to the second Internet of things equipment, the first encryption instruction carries the instruction generation time, and therefore the instruction can be encrypted, so that the instruction safety is guaranteed, and the communication safety is improved.
In accordance with the foregoing, referring to fig. 4, fig. 4 is a schematic structural diagram of a wireless communication command encryption device according to an embodiment of the present application. Wireless communication instruction encryption device is applied to first thing networking equipment, the device includes: a communication unit 401, an acquisition unit 402, a determination unit 403, and an encryption unit 404, wherein,
the communication unit 401 is configured to establish a communication connection between a first internet of things device and a second internet of things device;
the obtaining unit 402 is configured to obtain a target wireless communication instruction sent to the second internet device, where the target wireless communication instruction corresponds to an instruction generation time; obtaining a target channel parameter at the instruction generation moment;
the determining unit 403 is configured to determine a target encryption parameter corresponding to the target channel parameter;
the encryption unit 404 is configured to encrypt the target wireless communication instruction according to the target encryption parameter to obtain a first encrypted instruction;
the communication unit 401 is further configured to send the first encryption instruction to the second internet-enabled device, where the first encryption instruction carries the instruction generation time.
Optionally, in the aspect of acquiring the target channel parameter at the instruction generating time, the acquiring unit 402 is specifically configured to:
acquiring a reference channel parameter of a preset time period before the instruction generation moment;
sampling the reference channel parameters to obtain a plurality of sampling points, wherein each sampling point corresponds to one channel parameter;
generating a fitting function according to the plurality of sampling points, wherein the transverse axis of the fitting function is time, and the vertical axis is channel parameters;
and predicting a channel parameter of a preset time interval after the instruction generation time according to the fitting function, and taking the channel parameter as the target channel parameter.
Optionally, in the determining a target encryption parameter corresponding to the target channel parameter, the determining unit 403 is specifically configured to:
determining an average channel parameter and a target fluctuation parameter of the target channel parameter;
determining a target encryption algorithm according to the average channel parameters;
determining a target encryption control parameter corresponding to the target encryption algorithm according to the target fluctuation parameter;
and taking the target encryption algorithm and the target encryption control parameter as the target encryption parameter.
Optionally, the device is further specifically configured to:
acquiring a target equipment identifier of the second internet-of-things equipment;
detecting whether the target equipment identifier belongs to a preset equipment identifier set or not;
and executing the step of acquiring the target channel parameters at the instruction generation moment when the target equipment identifier belongs to the preset equipment identifier set.
Optionally, the device is further specifically configured to:
acquiring instruction content of the target wireless communication instruction;
extracting keywords from the instruction content to obtain target keywords;
and executing the step of acquiring the target channel parameters at the instruction generation time when the target keywords comprise preset keywords.
The wireless communication instruction encryption device is applied to first Internet of things equipment, communication connection between the first Internet of things equipment and second Internet of things equipment is established, a target wireless communication instruction sent to the second Internet of things equipment is obtained, the target wireless communication instruction corresponds to an instruction generation time, a target channel parameter at the instruction generation time is obtained, a target encryption parameter corresponding to the target channel parameter is determined, the target wireless communication instruction is encrypted according to the target encryption parameter, a first encryption instruction is obtained, the first encryption instruction is sent to the second Internet of things equipment, the first encryption instruction carries the instruction generation time, and therefore the instruction can be encrypted, so that the instruction safety is guaranteed, and the communication safety is improved.
The embodiment of the application also provides a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program makes a computer execute part or all of the steps of any one of the wireless communication instruction encryption methods described in the embodiment of the method.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer-readable storage medium storing a computer program that causes a computer to perform some or all of the steps of any one of the wireless communication instruction encryption methods described in the method embodiments above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required in the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present invention may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software program modules.
The integrated units, if implemented in the form of software program modules, may be stored in a computer-readable memory for sale or use as a stand-alone product. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a memory, including several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory includes: a U-disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-only memory, random access memory, magnetic or optical disk, etc.
The foregoing has outlined rather broadly the more detailed description of embodiments of the present application, wherein specific examples are provided herein to illustrate the principles and embodiments of the present application, the above examples being provided solely to assist in the understanding of the methods of the present application and the core ideas thereof; meanwhile, as those skilled in the art will have modifications in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (6)

1. A wireless communication instruction encryption method, which is applied to a first internet of things device, the method comprising:
establishing communication connection between the first Internet of things equipment and second Internet of things equipment;
obtaining a target wireless communication instruction sent to the second internet equipment, wherein the target wireless communication instruction corresponds to an instruction generation moment;
acquiring a target channel parameter at the moment of instruction generation;
determining a target encryption parameter corresponding to the target channel parameter;
encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction;
sending the first encryption instruction to the second internet of things device, wherein the first encryption instruction carries the instruction generation time;
the obtaining the target channel parameter at the instruction generating time includes:
acquiring a reference channel parameter of a preset time period before the instruction generation moment;
sampling the reference channel parameters to obtain a plurality of sampling points, wherein each sampling point corresponds to one channel parameter;
generating a fitting function according to the plurality of sampling points, wherein the transverse axis of the fitting function is time, and the vertical axis is channel parameters;
predicting a channel parameter of a preset time interval after the instruction generation time according to the fitting function, and taking the channel parameter as the target channel parameter;
wherein the determining a target encryption parameter corresponding to the target channel parameter includes:
determining an average channel parameter and a target fluctuation parameter of the target channel parameter;
determining a target encryption algorithm according to the average channel parameters;
determining a target encryption control parameter corresponding to the target encryption algorithm according to the target fluctuation parameter;
and taking the target encryption algorithm and the target encryption control parameter as the target encryption parameter.
2. The method according to claim 1, wherein the method further comprises:
acquiring a target equipment identifier of the second internet-of-things equipment;
detecting whether the target equipment identifier belongs to a preset equipment identifier set or not;
and executing the step of acquiring the target channel parameters at the instruction generation moment when the target equipment identifier belongs to the preset equipment identifier set.
3. The method according to claim 1, wherein the method further comprises:
acquiring instruction content of the target wireless communication instruction;
extracting keywords from the instruction content to obtain target keywords;
and executing the step of acquiring the target channel parameters at the instruction generation time when the target keywords comprise preset keywords.
4. A wireless communication instruction encryption device, characterized in that it is applied to a first internet of things device, the device comprising: a communication unit, an acquisition unit, a determination unit and an encryption unit, wherein,
the communication unit is used for establishing communication connection between the first Internet of things equipment and the second Internet of things equipment;
the acquiring unit is configured to acquire a target wireless communication instruction sent to the second internet equipment, where the target wireless communication instruction corresponds to an instruction generation time; obtaining a target channel parameter at the instruction generation moment;
the determining unit is used for determining a target encryption parameter corresponding to the target channel parameter;
the encryption unit is used for encrypting the target wireless communication instruction according to the target encryption parameter to obtain a first encryption instruction;
the communication unit is further configured to send the first encryption instruction to the second internet-connected device, where the first encryption instruction carries the instruction generation time;
wherein, in terms of the obtaining the target channel parameter at the instruction generating time, the obtaining unit is specifically configured to:
acquiring a reference channel parameter of a preset time period before the instruction generation moment;
sampling the reference channel parameters to obtain a plurality of sampling points, wherein each sampling point corresponds to one channel parameter;
generating a fitting function according to the plurality of sampling points, wherein the transverse axis of the fitting function is time, and the vertical axis is channel parameters;
predicting a channel parameter of a preset time interval after the instruction generation time according to the fitting function, and taking the channel parameter as the target channel parameter;
wherein, in the aspect of determining the target encryption parameter corresponding to the target channel parameter, the determining unit is specifically configured to:
determining an average channel parameter and a target fluctuation parameter of the target channel parameter;
determining a target encryption algorithm according to the average channel parameters;
determining a target encryption control parameter corresponding to the target encryption algorithm according to the target fluctuation parameter;
and taking the target encryption algorithm and the target encryption control parameter as the target encryption parameter.
5. An electronic device comprising a processor, an input device, an output device, and a memory, the processor, the input device, the output device, and the memory being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1-3.
6. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1-3.
CN202111593850.3A 2021-12-23 2021-12-23 Wireless communication instruction encryption method and related equipment Active CN114339737B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111593850.3A CN114339737B (en) 2021-12-23 2021-12-23 Wireless communication instruction encryption method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111593850.3A CN114339737B (en) 2021-12-23 2021-12-23 Wireless communication instruction encryption method and related equipment

Publications (2)

Publication Number Publication Date
CN114339737A CN114339737A (en) 2022-04-12
CN114339737B true CN114339737B (en) 2023-06-09

Family

ID=81012620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111593850.3A Active CN114339737B (en) 2021-12-23 2021-12-23 Wireless communication instruction encryption method and related equipment

Country Status (1)

Country Link
CN (1) CN114339737B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664850A (en) * 2022-12-13 2023-01-31 深圳市鑫宇鹏电子科技有限公司 Communication security level switching method and device, electronic equipment and storage medium
CN117991652A (en) * 2024-04-03 2024-05-07 深圳市矽昊智能科技有限公司 Control method, device, storage medium and device of intelligent household equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221525A (en) * 2021-02-26 2021-08-06 平安普惠企业管理有限公司 Data processing method and device, electronic equipment and storage medium
CN113359503A (en) * 2021-07-06 2021-09-07 金茂智慧科技(广州)有限公司 Equipment control method and related device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007036364A (en) * 2005-07-22 2007-02-08 Nec Corp Time device, encrypting device, decrypting device, and encrypting/decrypting system
CN108462695B (en) * 2018-02-02 2020-07-28 北京云知声信息技术有限公司 Method, device and system for safely transmitting data
CN111050417B (en) * 2019-12-27 2021-09-03 咻享智能(深圳)有限公司 Wireless Internet of things equipment control method and related device
CN111385043B (en) * 2019-12-31 2021-11-23 咻享智能(深圳)有限公司 Wireless internet of things channel management method and related device
CN113766495A (en) * 2020-05-30 2021-12-07 华为技术有限公司 Information protection method, system and communication device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221525A (en) * 2021-02-26 2021-08-06 平安普惠企业管理有限公司 Data processing method and device, electronic equipment and storage medium
CN113359503A (en) * 2021-07-06 2021-09-07 金茂智慧科技(广州)有限公司 Equipment control method and related device

Also Published As

Publication number Publication date
CN114339737A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
US11509485B2 (en) Identity authentication method and system, and computing device
CN114339737B (en) Wireless communication instruction encryption method and related equipment
CN108306877B (en) NODE JS-based user identity information verification method and device and storage medium
CN109150835B (en) Cloud data access method, device, equipment and computer readable storage medium
EP3337088B1 (en) Data encryption method, decryption method, apparatus, and system
EP3457656B1 (en) Identity verification method and system, and intelligent wearable device
CN111258602B (en) Information updating method and device
JP6693948B2 (en) Method and apparatus for data synchronization
US20240121604A1 (en) Dynamic key exchange for moving target
US20220394023A1 (en) Encryption for one-way data stream
CN113840266B (en) Bluetooth pairing method, device, system, electronic equipment and storage medium
US11051247B2 (en) Transmission/ reception device with wake-up radio resistant to attacks by denial of sleep
CN108768628B (en) Equipment end encryption method, device, system and gateway
CN112686358A (en) Data transmission method, NFC electronic tag, terminal device and storage medium
US20180159902A1 (en) Access to data on a remote device
CN105848145A (en) WIFI intelligent configuration method and device
CN110875897B (en) Data transmission method, device, server and storage medium
CN107872315B (en) Data processing method and intelligent terminal
CN105302486A (en) Virtual offline desktop block device storage synchronization method
CN113507482B (en) Data security transmission method, security transaction method, system, medium and equipment
CN113038192A (en) Video processing method and device, electronic equipment and storage medium
CN115866587A (en) Internet of things safety data processing method, device and system based on real-time dynamic transmission
CN106549924A (en) A kind of communication security protection methods, devices and systems
CN107172718B (en) Information processing method and electronic equipment
CN103457980A (en) Terminal device and data acquisition method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant