CN114615094A - Storage method and device based on Internet of things and security chip - Google Patents

Storage method and device based on Internet of things and security chip Download PDF

Info

Publication number
CN114615094A
CN114615094A CN202210508715.2A CN202210508715A CN114615094A CN 114615094 A CN114615094 A CN 114615094A CN 202210508715 A CN202210508715 A CN 202210508715A CN 114615094 A CN114615094 A CN 114615094A
Authority
CN
China
Prior art keywords
data
internet
node
things
security chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210508715.2A
Other languages
Chinese (zh)
Other versions
CN114615094B (en
Inventor
江向东
徐凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongshan Sanxun Electronics Co ltd
Original Assignee
Fenglian Intelligent Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fenglian Intelligent Shenzhen Co ltd filed Critical Fenglian Intelligent Shenzhen Co ltd
Priority to CN202210508715.2A priority Critical patent/CN114615094B/en
Publication of CN114615094A publication Critical patent/CN114615094A/en
Application granted granted Critical
Publication of CN114615094B publication Critical patent/CN114615094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]

Abstract

The invention relates to the technical field of Internet of things and security chips, and discloses a storage method and a storage device based on the Internet of things and the security chip, wherein the storage method and the storage device comprise the following steps: constructing a self-organizing network model of the networking equipment, and calculating to obtain an optimal data transmission path between the equipment node and the cloud server; data uploading personnel utilize the Internet of things equipment to execute data uploading operation, and the security chip generates an encryption key of the uploaded data; after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key; storing the ciphertext data into a cloud data storage model of the Merkle tree; and extracting ciphertext data required by the user from the Merkle tree cloud data storage model for decryption. The method of the invention ensures the absolute control right of the user to the data based on the encryption and decryption mode of the security chip, realizes the determination of the optimal data transmission path with low delay in the Internet of things, and improves the transmission efficiency of the data in the Internet of things.

Description

Storage method and device based on Internet of things and security chip
Technical Field
The invention relates to the technical field of Internet of things and security chips, in particular to a storage method and device based on the Internet of things and the security chip.
Background
The internet of things is that various information sensors are used for acquiring any object or process needing monitoring, connection and interaction in real time, acquiring various required information such as sound, light, heat, chemistry, biology, position and the like, and the ubiquitous connection of objects and people is realized through various possible network accesses, so that the intelligent perception of the objects and the process is realized. The internet of things is an information bearer based on the internet, a traditional telecommunication network and the like, and all common physical objects which can be independently addressed can form an interconnected network. With the popularization and development of the internet of things and cloud computing, on one hand, more and more files are stored in a cloud server, so that a user loses the absolute control right of data, and the data security is difficult to guarantee. On the other hand, due to the limitation of the transmission bandwidth of the internet of things, the efficiency of data transmission and storage is low.
Disclosure of Invention
In view of the above, the invention provides a storage method based on the internet of things and a security chip, and aims to (1) realize the determination of a low-delay optimal data transmission path between any internet of things equipment node and a cloud server based on the internet of things, improve the transmission efficiency of data in the internet of things, and further improve the storage capacity of data at the cloud server within a limited time; (2) the storage structure encryption and the uploading data encryption of the Internet of things equipment are realized by using a graph encryption algorithm, and ciphertext data are stored to a cloud server side in a Merkle tree form, so that the cloud server side is prevented from checking and processing original data, and the absolute control right of a user on the data is ensured based on an encryption and decryption mode of a security chip.
The storage method based on the Internet of things and the security chip provided by the invention comprises the following steps:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
s2: the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data;
s3: the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
s5: storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
s6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user. As a further improvement of the method:
optionally, the constructing a self-organizing network model of networked devices in the step S1 includes:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 53143DEST_PATH_IMAGE001
Figure 235862DEST_PATH_IMAGE002
Figure 546758DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 473126DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 553077DEST_PATH_IMAGE005
is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,
Figure 906698DEST_PATH_IMAGE006
if, if
Figure 704890DEST_PATH_IMAGE007
Representing nodes
Figure 169369DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 103827DEST_PATH_IMAGE009
Figure 628349DEST_PATH_IMAGE010
Node point
Figure 648258DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 916428DEST_PATH_IMAGE009
In the embodiment of the invention, the Internet of things equipment comprises intelligent wearing equipment such as an intelligent old man wearing device, an intelligent pet wearing device, an intelligent adult watch and an intelligent child watch, intelligent household equipment such as an intelligent air purifier platform, a floor sweeping robot, an intelligent extension socket and an intelligent kitchen and toilet, wherein communication links exist among the intelligent wearing equipment, the intelligent household equipment and a cloud server end, and mutual communication can be realized under the condition that the network communication quality is normal.
Optionally, the step S1 of calculating the low-delay optimal data transmission path between any device node in the ad hoc network model of the internet of things device and the cloud server, includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 705393DEST_PATH_IMAGE008
To cloud server
Figure 669325DEST_PATH_IMAGE004
Is optimized by the transmission path
Figure 176530DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 982812DEST_PATH_IMAGE012
Wherein
Figure 891862DEST_PATH_IMAGE013
Is a node
Figure 758187DEST_PATH_IMAGE008
The next-hop path node of (2),
Figure 752688DEST_PATH_IMAGE014
is a node
Figure 97081DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 126217DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 429023DEST_PATH_IMAGE011
The format of (A) is:
Figure 645240DEST_PATH_IMAGE016
Figure 58904DEST_PATH_IMAGE017
Figure 676967DEST_PATH_IMAGE018
wherein:
Figure 150674DEST_PATH_IMAGE019
is a node
Figure 854188DEST_PATH_IMAGE008
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 805963DEST_PATH_IMAGE008
Figure 544112DEST_PATH_IMAGE020
Is a node
Figure 188720DEST_PATH_IMAGE008
Delay of a path link between the mth hop path node and the m-1 hop path node;
Figure 379530DEST_PATH_IMAGE021
the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
Figure 134996DEST_PATH_IMAGE022
is a node
Figure 462073DEST_PATH_IMAGE008
The size of data received by the mth hop path node,
Figure 277582DEST_PATH_IMAGE023
the efficiency of forwarding data for it;
the transmission path optimization objective function
Figure 955688DEST_PATH_IMAGE011
The constraint conditions of (1) are:
Figure 511915DEST_PATH_IMAGE024
Figure 959077DEST_PATH_IMAGE025
wherein:
Figure 679909DEST_PATH_IMAGE026
representing nodes
Figure 845311DEST_PATH_IMAGE008
The m-1 hop path node and the m hop path node can normally communicate;
Figure 942580DEST_PATH_IMAGE027
representing nodes
Figure 509827DEST_PATH_IMAGE008
The Mth hop path node and the cloud server can normally communicate;
by connecting with a node
Figure 401560DEST_PATH_IMAGE008
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 54258DEST_PATH_IMAGE028
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 955218DEST_PATH_IMAGE029
For nodes in the optimal data transmission path
Figure 111393DEST_PATH_IMAGE008
To (1) a
Figure 439606DEST_PATH_IMAGE030
And (4) jumping path nodes.
Optionally, in the step S2, after the identity authentication of the data uploading person passes, the data uploading person performs an operation of uploading data by using the internet of things device, and the secure chip generates an encryption key of the uploaded data, including:
the data uploading personnel utilizes the Internet of things equipment to perform identity authentication, after a user name and a password are input into the Internet of things equipment, input information is transmitted into the security chip to perform identity authentication, and after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment and randomly generates a unique encryption key
Figure 314021DEST_PATH_IMAGE031
The data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the data format uploaded by the data uploading personnel is as follows:
Figure 18672DEST_PATH_IMAGE032
wherein:
Figure 294933DEST_PATH_IMAGE033
the method comprises the step of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment and selecting Internet of things equipment data informationThe method comprises the following steps of (1) uploading data information of the Internet of things equipment in an inter-range and in a corresponding time range;
Figure 794047DEST_PATH_IMAGE034
for the data collection of the internet of things uploaded by the data uploading personnel,
Figure 155758DEST_PATH_IMAGE035
is the ID of the equipment of the Internet of things,
Figure 132941DEST_PATH_IMAGE036
uploading data corresponding to the Internet of things equipment;
in the embodiment of the invention, the security chip is built in the cloud server, and the transmission path of the input information is a low-delay optimal data transmission path between the Internet of things equipment worn by data uploading personnel and the cloud server.
Optionally, in the step S3, transmitting the data uploaded by the data uploading staff according to a low-latency optimal data transmission path between the internet of things device node and the cloud server, where the transmitting includes:
the data uploaded by the data uploading personnel are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and a cloud server side, the cloud server side receives the data uploaded by the data uploading personnel, and each hop node in the low-delay optimal data transmission path is used for transmitting the received data
Figure 529288DEST_PATH_IMAGE033
Verification is carried out by
Figure 933724DEST_PATH_IMAGE033
And subtracting the binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, the verification is successful.
Optionally, the form of the uploaded data includes:
the data form received by the cloud server side is as follows:
Figure 48311DEST_PATH_IMAGE037
wherein:
Figure 563606DEST_PATH_IMAGE038
for the equipment of the internet of things
Figure 82967DEST_PATH_IMAGE039
Uploading data;
the Internet of things equipment set corresponding to the uploaded data is as follows:
Figure 658305DEST_PATH_IMAGE040
optionally, in the step S4, the secure chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, including:
encryption key generated from a secure chip
Figure 260188DEST_PATH_IMAGE031
The security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded data
Figure 579174DEST_PATH_IMAGE040
Conversion into an adjacency matrix Q
Figure 950112DEST_PATH_IMAGE041
Line of
Figure 696351DEST_PATH_IMAGE042
The column values are additionally assigned
Figure 254372DEST_PATH_IMAGE043
If additional value is assigned
Figure 642628DEST_PATH_IMAGE043
The result is odd, then the first in the adjacent matrix
Figure 868073DEST_PATH_IMAGE041
Line of
Figure 785213DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 361688DEST_PATH_IMAGE044
wherein:
Figure 22476DEST_PATH_IMAGE045
for the values in the adjacency matrix, r is the result of the additional assignments,
Figure 102428DEST_PATH_IMAGE046
is composed of
Figure 456049DEST_PATH_IMAGE045
The value of the left-hand neighbor is,
Figure 988661DEST_PATH_IMAGE047
is composed of
Figure 718720DEST_PATH_IMAGE045
The value of the right-hand neighbor is,
Figure 653178DEST_PATH_IMAGE048
is composed of
Figure 177700DEST_PATH_IMAGE045
The value of the upper neighbor is,
Figure 463188DEST_PATH_IMAGE049
is composed of
Figure 465779DEST_PATH_IMAGE045
Lower adjacent toThe value of the sum;
Figure 520323DEST_PATH_IMAGE050
is composed of
Figure 215746DEST_PATH_IMAGE045
The encryption result of (1);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 731740DEST_PATH_IMAGE051
wherein:
Figure 538022DEST_PATH_IMAGE052
is composed of
Figure 712651DEST_PATH_IMAGE039
The encryption result in the adjacency matrix;
2) for received data sets
Figure 313397DEST_PATH_IMAGE053
Any data in (1)
Figure 573477DEST_PATH_IMAGE038
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 917871DEST_PATH_IMAGE054
wherein:
Figure 947007DEST_PATH_IMAGE055
as data
Figure 718654DEST_PATH_IMAGE038
The number of z-th bits in (b),
Figure 466030DEST_PATH_IMAGE056
bit-wise corresponding encryption results;
Figure 614114DEST_PATH_IMAGE057
is the z-th digit of the encryption key;
if z is 1, then pair
Figure 232177DEST_PATH_IMAGE058
To perform boundary-crossing processing, i.e.
Figure 705884DEST_PATH_IMAGE059
Wherein
Figure 674977DEST_PATH_IMAGE060
As data
Figure 361173DEST_PATH_IMAGE038
If z is
Figure 364901DEST_PATH_IMAGE060
Then, then
Figure 478351DEST_PATH_IMAGE061
The encryption set of the data received by the cloud server is as follows:
Figure 934740DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data.
Optionally, in the step S5, the storing the ciphertext data in the improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, includes:
the data sets uploaded by one-bit data uploading personnel at the same time
Figure 424627DEST_PATH_IMAGE053
The corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) integrating the encryption result of the Internet of things equipment with the encryption result of the corresponding data:
Figure 282862DEST_PATH_IMAGE063
wherein:
Figure 832792DEST_PATH_IMAGE052
is composed of
Figure 776477DEST_PATH_IMAGE039
As a result of the encryption of (a),
Figure 807406DEST_PATH_IMAGE064
is composed of
Figure 254568DEST_PATH_IMAGE039
Uploading data;
c is the ciphertext data after integration;
2) computing
Figure 240978DEST_PATH_IMAGE065
The hash value of (1), will be hash
Figure 406380DEST_PATH_IMAGE066
As root node of Merkle tree;
3) for any non-leaf node in the Merkle tree
Figure 503649DEST_PATH_IMAGE067
Its value is a non-leaf node
Figure 805318DEST_PATH_IMAGE067
Splicing of child nodes, wherein the value of a leaf node is the encryption result of a single Internet of things deviceA user value and a corresponding upload data ciphertext; when adding the Internet of things equipment
Figure 962629DEST_PATH_IMAGE039
When the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
Optionally, in the step S6, the step S includes that the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, including:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
In order to solve the above problem, the present invention further provides a storage device based on the internet of things and a security chip, wherein the storage device includes:
the Internet of things equipment self-organization module is used for constructing an Internet of things equipment self-organization network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server end in the self-organization network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the Internet of things equipment node and the cloud server end;
the data encryption module is used for generating an encryption key of the uploaded data by the security chip, and encrypting the uploaded data by the security chip by utilizing an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
and the data storage module is used for storing the ciphertext data into the improved Merkle tree cloud data storage model and storing corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key and can return encrypted storage parameters of data required by a user, and the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameters and decrypts the ciphertext data to obtain the decrypted data required by the user.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the storage method based on the Internet of things and the security chip.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, which stores at least one instruction, where the at least one instruction is executed by a processor in an electronic device to implement the storage method based on the internet of things and a security chip.
Compared with the prior art, the invention provides a storage method based on the Internet of things and a security chip, and the technology has the following advantages:
firstly, the scheme provides the determination of the low-delay optimal data transmission path between any Internet of things equipment node and a cloud server side, and is based on an Internet of things equipment construction and networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 615328DEST_PATH_IMAGE001
Figure 250708DEST_PATH_IMAGE002
Figure 672462DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 735096DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 875091DEST_PATH_IMAGE005
is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,
Figure 579741DEST_PATH_IMAGE006
if, if
Figure 856002DEST_PATH_IMAGE007
Representing nodes
Figure 89537DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 716828DEST_PATH_IMAGE009
Figure 694011DEST_PATH_IMAGE010
Node point
Figure 90357DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 494794DEST_PATH_IMAGE009
(ii) a Determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 609380DEST_PATH_IMAGE008
To cloud server
Figure 390254DEST_PATH_IMAGE004
Transmission path optimization objective ofFunction(s)
Figure 641107DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 213515DEST_PATH_IMAGE012
Wherein
Figure 815398DEST_PATH_IMAGE013
Is a node
Figure 134384DEST_PATH_IMAGE008
The next-hop path node of (2),
Figure 505322DEST_PATH_IMAGE014
is a node
Figure 251562DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 75161DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 197838DEST_PATH_IMAGE011
The format of (A) is:
Figure 423283DEST_PATH_IMAGE016
Figure 340423DEST_PATH_IMAGE017
Figure 916898DEST_PATH_IMAGE018
wherein:
Figure 577687DEST_PATH_IMAGE068
is a node
Figure 657638DEST_PATH_IMAGE069
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 11259DEST_PATH_IMAGE069
Figure 809451DEST_PATH_IMAGE070
Is a node
Figure 8351DEST_PATH_IMAGE069
Delay of a path link between the mth hop path node and the m-1 hop path node;
Figure 208388DEST_PATH_IMAGE071
the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained; c is the set maximum retransmission times of the data of all path nodes;
Figure 732910DEST_PATH_IMAGE072
is a node
Figure 752819DEST_PATH_IMAGE069
The size of data received by the mth hop path node,
Figure 20989DEST_PATH_IMAGE073
the efficiency of forwarding data for it; the transmission path optimization objective function
Figure 75533DEST_PATH_IMAGE074
The constraint conditions of (1) are:
Figure 505377DEST_PATH_IMAGE024
Figure 281091DEST_PATH_IMAGE025
wherein:
Figure 87373DEST_PATH_IMAGE024
representing nodes
Figure 996423DEST_PATH_IMAGE069
The m-1 hop path node and the m hop path node can normally communicate;
Figure 862748DEST_PATH_IMAGE025
representing nodes
Figure 857249DEST_PATH_IMAGE069
The Mth hop path node and the cloud server can normally communicate; by connecting with a node
Figure 467221DEST_PATH_IMAGE069
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 496357DEST_PATH_IMAGE075
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 268004DEST_PATH_IMAGE076
For nodes in the optimal data transmission path
Figure 15380DEST_PATH_IMAGE069
To (1) a
Figure 429044DEST_PATH_IMAGE077
And (4) jumping path nodes. Compared with the traditional Internet of things communication scheme, the scheme adopts a multi-hop data transmission method, selects the adjacent Internet of things equipment with the minimum time delay as a next hop node, and transmits the next hop node through multi-hopThe data are transmitted to the cloud server from the initial Internet of things equipment, so that the problems that the Internet of things equipment is far away from the cloud server and the transmission efficiency is low due to poor network are solved, the storage capacity of the data in a limited time is improved, and the data storage efficiency is improved.
Meanwhile, the scheme provides a data encryption and decryption method based on a security chip, and the data encryption and decryption method is based on an encryption key generated by the security chip
Figure 47107DEST_PATH_IMAGE031
The security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows: 1) converting the Internet of things equipment set corresponding to the uploaded data into an adjacency matrix Q for the first in the adjacency matrix
Figure 255235DEST_PATH_IMAGE041
Line for mobile communication terminal
Figure 958749DEST_PATH_IMAGE042
The column values are additionally assigned
Figure 176103DEST_PATH_IMAGE043
If additional value is assigned
Figure 648673DEST_PATH_IMAGE043
The result is odd, then the first in the adjacent matrix
Figure 293281DEST_PATH_IMAGE041
Line for mobile communication terminal
Figure 484091DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 239557DEST_PATH_IMAGE044
wherein:
Figure 832213DEST_PATH_IMAGE078
for values in the adjacency matrix, r is the result of the additional assignments,
Figure 647722DEST_PATH_IMAGE079
is composed of
Figure 60249DEST_PATH_IMAGE078
The value of the left-hand neighbor is,
Figure 628195DEST_PATH_IMAGE080
is composed of
Figure 75357DEST_PATH_IMAGE078
The value of the right-hand neighbor is,
Figure 61767DEST_PATH_IMAGE081
is composed of
Figure 227170DEST_PATH_IMAGE078
The value of the upper neighbor is,
Figure 324439DEST_PATH_IMAGE082
is composed of
Figure 891686DEST_PATH_IMAGE078
The value of the lower neighbor;
Figure 783419DEST_PATH_IMAGE083
is composed of
Figure 436117DEST_PATH_IMAGE078
The encryption result of (1); then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 71498DEST_PATH_IMAGE051
wherein:
Figure 758831DEST_PATH_IMAGE084
is composed of
Figure 821465DEST_PATH_IMAGE085
The encryption result in the adjacency matrix; 2) for received data sets
Figure 961459DEST_PATH_IMAGE037
Any data in (1)
Figure 134952DEST_PATH_IMAGE086
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 676791DEST_PATH_IMAGE054
wherein:
Figure 175906DEST_PATH_IMAGE087
as data
Figure 537617DEST_PATH_IMAGE086
The number of z-th bits in (b),
Figure 780380DEST_PATH_IMAGE088
bit corresponding encryption results;
Figure 176726DEST_PATH_IMAGE089
is the z-th digit of the encryption key; if z is 1, then pair
Figure 846742DEST_PATH_IMAGE090
To perform boundary-crossing processing, i.e.
Figure 430170DEST_PATH_IMAGE091
In which
Figure 211044DEST_PATH_IMAGE092
As data
Figure 730406DEST_PATH_IMAGE086
If z is
Figure 305743DEST_PATH_IMAGE092
Then, then
Figure 642047DEST_PATH_IMAGE093
The encryption set of the data received by the cloud server is as follows:
Figure 961033DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data. The method comprises the steps that ciphertext data are stored in an improved Merkle tree cloud data storage model, corresponding encrypted storage parameter information is stored in a security chip, the encrypted storage parameter information comprises a data source, a storage position and an encryption key, a user inputs a user name and a password at a terminal, the input information is transmitted to the security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain the storage position of the data required by the user and the encryption key, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal. Compared with the traditional scheme, the scheme is based on the security chip to encrypt and decrypt the data of the Internet of things device, ciphertext data are stored to the cloud server in a Merkle tree form, the cloud server is prevented from viewing and processing original data, meanwhile, the height and the width of the Merkle tree can be adjusted automatically, the data storage of various scenes can be adapted, and the absolute control right of a user on the data is guaranteed through the encryption and decryption mode based on the security chip.
Drawings
Fig. 1 is a schematic flow chart of a storage method based on the internet of things and a security chip according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of one step of the embodiment of FIG. 1;
FIG. 3 is a schematic flow chart of another step of the embodiment of FIG. 1;
fig. 4 is a functional block diagram of a storage device based on the internet of things and a security chip according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device implementing a storage method based on the internet of things and a security chip according to an embodiment of the present invention.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The embodiment of the application provides a storage method based on the Internet of things and a security chip. The execution subject of the storage method based on the internet of things and the security chip includes, but is not limited to, at least one of electronic devices such as a server and a terminal that can be configured to execute the method provided by the embodiments of the present application. In other words, the storage method based on the internet of things and the security chip may be executed by software or hardware installed in the terminal device or the server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Example 1:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server.
The constructing of the self-organizing network model of the networked device in the step S1 includes:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 331971DEST_PATH_IMAGE001
Figure 343789DEST_PATH_IMAGE002
Figure 167389DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 24487DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 515511DEST_PATH_IMAGE005
is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,
Figure 432651DEST_PATH_IMAGE006
if, if
Figure 743547DEST_PATH_IMAGE007
Representing nodes
Figure 404335DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 749866DEST_PATH_IMAGE009
Figure 837908DEST_PATH_IMAGE010
Node point
Figure 636099DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 100579DEST_PATH_IMAGE009
It should be explained that, under the condition that the network is normal, any two nodes in the ad hoc network model of the internet of things device can communicate with each other, but under the condition that the network environment is poor, the nodes may not communicate with each other.
In the embodiment of the invention, the Internet of things equipment comprises intelligent wearing equipment such as intelligent old people wearing equipment, intelligent pets wearing equipment, intelligent adult watches, intelligent child watches and the like, an intelligent air purifier platform, a floor sweeping robot, an intelligent extension socket, intelligent kitchen and toilet equipment and the like, wherein communication links exist among the intelligent wearing equipment, the intelligent household equipment and a cloud server end, and mutual communication can be realized under the condition that the network communication quality is normal.
The step S1 of calculating the low-delay optimal data transmission path between any device node in the self-organizing network model of the device of the internet of things and the cloud server, includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 300616DEST_PATH_IMAGE008
To cloud server
Figure 559559DEST_PATH_IMAGE004
Is optimized by the transmission path
Figure 579468DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 113217DEST_PATH_IMAGE012
In which
Figure 902182DEST_PATH_IMAGE013
Is a node
Figure 597605DEST_PATH_IMAGE008
The next-hop path node of (2),
Figure 101880DEST_PATH_IMAGE014
is a node
Figure 173741DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 817212DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 949116DEST_PATH_IMAGE011
The format of (A) is:
Figure 678038DEST_PATH_IMAGE016
Figure 553590DEST_PATH_IMAGE017
Figure 51567DEST_PATH_IMAGE018
wherein:
Figure 88794DEST_PATH_IMAGE019
is a node
Figure 570591DEST_PATH_IMAGE008
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 718675DEST_PATH_IMAGE008
Figure 602318DEST_PATH_IMAGE020
Is a node
Figure 810445DEST_PATH_IMAGE008
Delay of a path link between the mth hop path node and the m-1 hop path node;
Figure 779538DEST_PATH_IMAGE021
the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
Figure 731313DEST_PATH_IMAGE022
is a node
Figure 469462DEST_PATH_IMAGE008
The size of data received by the mth hop path node,
Figure 848491DEST_PATH_IMAGE023
the efficiency of forwarding data for it;
the transmission path optimization objective function
Figure 304880DEST_PATH_IMAGE011
The constraint conditions of (1) are:
Figure 794767DEST_PATH_IMAGE024
Figure 653002DEST_PATH_IMAGE025
wherein:
Figure 937353DEST_PATH_IMAGE026
representing nodes
Figure 881038DEST_PATH_IMAGE008
The m-1 hop path node and the m hop path node can normally communicate;
Figure 174616DEST_PATH_IMAGE027
representing nodes
Figure 890287DEST_PATH_IMAGE008
The Mth hop path node and the cloud server can normally communicate;
by connecting with a node
Figure 611118DEST_PATH_IMAGE008
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 776520DEST_PATH_IMAGE028
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 873789DEST_PATH_IMAGE029
For nodes in the optimal data transmission path
Figure 441037DEST_PATH_IMAGE008
To (1) a
Figure 598349DEST_PATH_IMAGE030
And (4) jumping path nodes.
S2: the data uploading personnel input the user name and the password to the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data.
In the step S2, after the identity authentication of the data uploading person passes, the data uploading person performs the operation of uploading data by using the internet of things device, and the security chip generates an encryption key of the uploaded data, including:
the data uploading personnel use the internet of things equipment to perform identity authentication, and in detail, referring to fig. 2, the identity authentication process of the data uploading personnel is as follows:
s21, after a data uploading person inputs a user name and a password in the Internet of things equipment, the input information is transmitted to the security chip for identity authentication;
s22, after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment, and a unique encryption key is randomly generated;
s23, the data uploading personnel use the Internet of things equipment to execute data uploading operation;
the data format uploaded by the data uploading personnel is as follows:
Figure 985468DEST_PATH_IMAGE032
wherein:
Figure 886428DEST_PATH_IMAGE033
the method comprises the steps of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
Figure 308182DEST_PATH_IMAGE034
for the data collection of the internet of things uploaded by the data uploading personnel,
Figure 370816DEST_PATH_IMAGE035
is the ID of the equipment of the Internet of things,
Figure 41968DEST_PATH_IMAGE036
uploading data corresponding to the Internet of things equipment;
in the embodiment of the invention, the security chip is built in the cloud server, and the transmission path of the input information is a low-delay optimal data transmission path between the Internet of things equipment worn by data uploading personnel and the cloud server;
it should be explained that, the data uploading personnel use the intelligent wearable device in the internet of things device to perform identity authentication and select the uploaded data, and the uploaded data is the user use data from the internet of things device.
S3: and transmitting the uploaded data according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server.
In detail, referring to fig. 3, transmitting data uploaded by a data uploading person according to a low-latency optimal data transmission path between an internet of things device node and a cloud server includes:
s31, transmitting the data uploaded by the data uploading personnel according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s32 method for receiving data by each hop node in low-delay optimal data transmission path
Figure 481040DEST_PATH_IMAGE033
Verification is carried out by
Figure 757301DEST_PATH_IMAGE033
Subtracting a binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, successfully verifying;
and S33, the cloud server receives the data uploaded by the data uploading personnel.
S4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data.
In the step S4, the secure chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, including:
encryption key generated from a secure chip
Figure 787573DEST_PATH_IMAGE031
The security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded data
Figure 680443DEST_PATH_IMAGE040
ConversionFor the adjacency matrix Q, for the second in the adjacency matrix
Figure 657626DEST_PATH_IMAGE041
Line of
Figure 53973DEST_PATH_IMAGE042
The column values are additionally assigned
Figure 467198DEST_PATH_IMAGE043
If additional value is assigned
Figure 581785DEST_PATH_IMAGE043
The result is odd, then the first in the adjacent matrix
Figure 362659DEST_PATH_IMAGE041
Line of
Figure 613512DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 188850DEST_PATH_IMAGE044
wherein:
Figure 790732DEST_PATH_IMAGE045
for values in the adjacency matrix, r is the result of the additional assignments,
Figure 109718DEST_PATH_IMAGE046
is composed of
Figure 74132DEST_PATH_IMAGE045
The value of the left-hand neighbor is,
Figure 85950DEST_PATH_IMAGE047
is composed of
Figure 175129DEST_PATH_IMAGE045
The value of the right-hand neighbor is,
Figure 32227DEST_PATH_IMAGE048
is composed of
Figure 257672DEST_PATH_IMAGE045
The value of the upper neighbor is,
Figure 440391DEST_PATH_IMAGE049
is composed of
Figure 751287DEST_PATH_IMAGE045
The value of the lower neighbor;
Figure 412075DEST_PATH_IMAGE050
is composed of
Figure 757606DEST_PATH_IMAGE045
The encryption result of (1);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 845648DEST_PATH_IMAGE051
wherein:
Figure 646769DEST_PATH_IMAGE052
is composed of
Figure 376828DEST_PATH_IMAGE039
The encryption result in the adjacency matrix;
2) for received data sets
Figure 311286DEST_PATH_IMAGE053
Any data in (1)
Figure 835808DEST_PATH_IMAGE038
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 855717DEST_PATH_IMAGE054
wherein:
Figure 123887DEST_PATH_IMAGE055
as data
Figure 912851DEST_PATH_IMAGE038
The number of z-th bits in (b),
Figure 873854DEST_PATH_IMAGE056
bit-wise corresponding encryption results;
Figure 646638DEST_PATH_IMAGE057
is the z-th digit of the encryption key;
if z is 1, then pair
Figure 187341DEST_PATH_IMAGE058
To perform boundary-crossing processing, i.e.
Figure 627549DEST_PATH_IMAGE059
Wherein
Figure 493874DEST_PATH_IMAGE060
As data
Figure 488375DEST_PATH_IMAGE038
If z is
Figure 98348DEST_PATH_IMAGE060
Then, then
Figure 861905DEST_PATH_IMAGE061
The encryption set of the data received by the cloud server is as follows:
Figure 164710DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data.
S5: and storing the ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key.
In the step S5, the ciphertext data is stored in the improved Merkle tree cloud data storage model, and the corresponding encrypted storage parameter information is stored in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and includes:
the data sets uploaded by one-bit data uploading personnel at the same time
Figure 380928DEST_PATH_IMAGE053
The corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) the encryption result of the Internet of things equipment and the encryption result of the corresponding data are integrated:
Figure 794591DEST_PATH_IMAGE063
wherein:
Figure 412655DEST_PATH_IMAGE052
is composed of
Figure 883432DEST_PATH_IMAGE039
As a result of the encryption of (a),
Figure 586945DEST_PATH_IMAGE064
is composed of
Figure 538721DEST_PATH_IMAGE039
Uploading data;
c is the ciphertext data after integration;
2) computing
Figure 276870DEST_PATH_IMAGE065
The hash value of (1), will be hash
Figure 921478DEST_PATH_IMAGE066
As root node of Merkle tree;
3) for any non-leaf node in the Merkle tree
Figure 112288DEST_PATH_IMAGE067
Its value is a non-leaf node
Figure 867754DEST_PATH_IMAGE067
Splicing the child nodes, wherein the leaf node value is a hash value of an encryption result of a single internet of things device and a corresponding uploaded data ciphertext; when adding the Internet of things equipment
Figure 460409DEST_PATH_IMAGE039
When the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
It should be explained that the values of the non-leaf nodes in the Merkle tree are hash values of the encryption results of the multiple internet of things devices, and each leaf node corresponds to one internet of things device and ciphertext data of uploaded data.
S6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
In the step S6, the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, including:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
Example 2:
fig. 4 is a functional block diagram of a storage device based on the internet of things and a security chip according to an embodiment of the present invention, which can implement the storage method in embodiment 1.
The storage device 100 based on the internet of things and the security chip can be installed in electronic equipment. According to the realized functions, the storage device based on the internet of things and the security chip may include an internet of things device self-organizing module 101, a data encryption module 102 and a data storage module 103. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
The internet of things equipment self-organizing module 101 is used for constructing an internet of things equipment self-organizing network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server side in the self-organizing network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the internet of things equipment node and the cloud server side;
the data encryption module 102, wherein the security chip generates an encryption key of the uploaded data, and according to the generated encryption key, the security chip encrypts the uploaded data by using an improved graph encryption algorithm to obtain encrypted ciphertext data;
the data storage module 103 is configured to store ciphertext data in the improved Merkle tree cloud data storage model, and store corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and may return an encrypted storage parameter of data required by the user, and the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data to obtain the decrypted data required by the user.
In detail, when the modules in the storage device 100 based on the internet of things and the security chip in the embodiment of the present invention are used, the same technical means as the storage method based on the internet of things and the security chip described in fig. 1 above are adopted, and the same technical effects can be produced, which is not described herein again.
Example 3:
fig. 5 is a schematic structural diagram of an electronic device for implementing a storage method based on an internet of things and a security chip according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11 and a bus, and may further comprise a computer program, such as a data storage program 12, stored in the memory 11 and executable on the processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as codes of the data storage program 12, but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by operating or executing programs or modules (data storage programs and the like) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
Fig. 5 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 5 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The data storage program 12 stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 10, may implement:
constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data;
the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
Specifically, the specific implementation method of the processor 10 for the instruction may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 5, which is not repeated herein.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A storage method based on the Internet of things and a security chip is characterized by comprising the following steps:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
s2: the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data;
s3: the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
s5: storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
s6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
2. The internet of things and security chip based storage method of claim 1, wherein the constructing of the ad hoc network model of networking devices in the step S1 comprises:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 739878DEST_PATH_IMAGE001
Figure 638564DEST_PATH_IMAGE002
Figure 473664DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 483209DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 720155DEST_PATH_IMAGE005
is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,
Figure 789742DEST_PATH_IMAGE006
if, if
Figure 846560DEST_PATH_IMAGE007
Representing nodes
Figure 659795DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 626614DEST_PATH_IMAGE009
Figure 257316DEST_PATH_IMAGE010
Node point
Figure 676796DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 152776DEST_PATH_IMAGE009
3. The internet of things and security chip-based storage method according to claim 2, wherein the step S1 of obtaining the low-latency optimal data transmission path between any device node and the cloud server in the internet of things device ad hoc network model by calculation includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 239681DEST_PATH_IMAGE008
To cloud server
Figure 651071DEST_PATH_IMAGE004
Is optimized by the transmission path
Figure 682481DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 837518DEST_PATH_IMAGE012
Wherein
Figure 903563DEST_PATH_IMAGE013
Is a node
Figure 485855DEST_PATH_IMAGE008
The next-hop path node of (2),
Figure 145506DEST_PATH_IMAGE014
is a node
Figure 957430DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 487768DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 631174DEST_PATH_IMAGE011
The format of (A) is:
Figure 512542DEST_PATH_IMAGE016
Figure 134016DEST_PATH_IMAGE017
Figure 50020DEST_PATH_IMAGE018
wherein:
Figure 708534DEST_PATH_IMAGE019
is a node
Figure 201832DEST_PATH_IMAGE008
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 502364DEST_PATH_IMAGE008
Figure 397507DEST_PATH_IMAGE020
Is a node
Figure 492502DEST_PATH_IMAGE008
Delay of a path link between the mth hop path node and the m-1 hop path node;
Figure 348463DEST_PATH_IMAGE021
the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
Figure 577319DEST_PATH_IMAGE022
is a node
Figure 936756DEST_PATH_IMAGE008
The size of data received by the mth hop path node,
Figure 327286DEST_PATH_IMAGE023
the efficiency of forwarding data for it;
the transmission path optimization objective function
Figure 404964DEST_PATH_IMAGE011
The constraint conditions of (1) are:
Figure 312877DEST_PATH_IMAGE024
Figure 917033DEST_PATH_IMAGE025
wherein:
Figure 353831DEST_PATH_IMAGE026
representing nodes
Figure 309017DEST_PATH_IMAGE008
The m-1 hop path node and the m hop path node can normally communicate;
Figure 489463DEST_PATH_IMAGE027
representing nodes
Figure 948126DEST_PATH_IMAGE008
The Mth hop path node and the cloud server can normally communicate;
by connecting with a node
Figure 821404DEST_PATH_IMAGE008
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 873674DEST_PATH_IMAGE028
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 716865DEST_PATH_IMAGE029
For nodes in the optimal data transmission path
Figure 436559DEST_PATH_IMAGE008
To (1) a
Figure 339793DEST_PATH_IMAGE030
And (4) jumping path nodes.
4. The internet of things and security chip based storage method of claim 1, wherein in the step S2, after the identity authentication of the data uploading person is passed, the data uploading person performs data uploading operation by using an internet of things device, and the security chip generates an encryption key of the uploaded data, including:
the data uploading personnel utilizes the Internet of things equipment to perform identity authentication, after a user name and a password are input into the Internet of things equipment, input information is transmitted into the security chip to perform identity authentication, and after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment and randomly generates a unique encryption key
Figure 879359DEST_PATH_IMAGE031
The data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the data format uploaded by the data uploading personnel is as follows:
Figure 667186DEST_PATH_IMAGE032
wherein:
Figure 100442DEST_PATH_IMAGE033
the method comprises the steps of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
Figure 315523DEST_PATH_IMAGE034
for the data collection of the internet of things uploaded by the data uploading personnel,
Figure 201439DEST_PATH_IMAGE035
is the ID of the equipment of the Internet of things,
Figure 527378DEST_PATH_IMAGE036
the data is uploaded to the corresponding internet of things equipment.
5. The internet of things and security chip-based storage method according to claim 3 or 4, wherein the step S3 of transmitting the data uploaded by the data uploading personnel according to the low-delay optimal data transmission path between the internet of things device node and the cloud server side includes:
the data uploaded by the data uploading personnel are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and a cloud server side, the cloud server side receives the data uploaded by the data uploading personnel, and each hop node in the low-delay optimal data transmission path is used for transmitting the received data
Figure 956085DEST_PATH_IMAGE033
Verification is carried out by
Figure 201122DEST_PATH_IMAGE033
And subtracting the binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, the verification is successful.
6. The internet of things and security chip based storage method of claim 1, wherein the form of the uploaded data comprises:
the data form received by the cloud server side is as follows:
Figure 980859DEST_PATH_IMAGE037
wherein:
Figure 969544DEST_PATH_IMAGE038
for the equipment of the internet of things
Figure 987178DEST_PATH_IMAGE039
Uploading data;
the Internet of things equipment set corresponding to the uploaded data is as follows:
Figure 809641DEST_PATH_IMAGE040
7. the internet of things and security chip based storage method of claim 1, wherein the step S4 is that the security chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, and comprises:
encryption key generated from a secure chip
Figure 676009DEST_PATH_IMAGE031
The security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded data
Figure 343750DEST_PATH_IMAGE040
Conversion into an adjacency matrix Q
Figure 606105DEST_PATH_IMAGE041
Line of
Figure 333889DEST_PATH_IMAGE042
The column values are additionally assigned
Figure 822639DEST_PATH_IMAGE043
If additional value is assigned
Figure 153126DEST_PATH_IMAGE043
The result is odd, then the first in the adjacent matrix
Figure 410932DEST_PATH_IMAGE041
Line of
Figure 434252DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 879140DEST_PATH_IMAGE044
wherein:
Figure 154263DEST_PATH_IMAGE045
for values in the adjacency matrix, r is the result of the additional assignments,
Figure 391210DEST_PATH_IMAGE046
is composed of
Figure 460797DEST_PATH_IMAGE045
The value of the left-hand neighbor is,
Figure 783194DEST_PATH_IMAGE047
is composed of
Figure 330850DEST_PATH_IMAGE045
The value of the right-hand neighbor is,
Figure 563248DEST_PATH_IMAGE048
is composed of
Figure 662791DEST_PATH_IMAGE045
The value of the upper neighbor is,
Figure 613430DEST_PATH_IMAGE049
is composed of
Figure 89410DEST_PATH_IMAGE045
The value of the lower neighbor;
Figure 910736DEST_PATH_IMAGE050
is composed of
Figure 587705DEST_PATH_IMAGE045
The encryption result of (2);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 619115DEST_PATH_IMAGE051
wherein:
Figure 508573DEST_PATH_IMAGE052
is composed of
Figure 840198DEST_PATH_IMAGE039
The encryption result in the adjacency matrix;
2) for received data sets
Figure 156909DEST_PATH_IMAGE053
Any data in (1)
Figure 675615DEST_PATH_IMAGE038
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 634344DEST_PATH_IMAGE054
wherein:
Figure 430262DEST_PATH_IMAGE055
as data
Figure 308088DEST_PATH_IMAGE038
The number of z-th bits in (b),
Figure 455036DEST_PATH_IMAGE056
bit corresponding encryption results;
Figure 810930DEST_PATH_IMAGE057
is the z-th digit of the encryption key;
if z is 1, then pair
Figure 726934DEST_PATH_IMAGE058
To perform boundary-crossing processing, i.e.
Figure 651028DEST_PATH_IMAGE059
Wherein
Figure 144326DEST_PATH_IMAGE060
As data
Figure 444857DEST_PATH_IMAGE038
If z is
Figure 74422DEST_PATH_IMAGE060
Then, then
Figure 169417DEST_PATH_IMAGE061
The encryption set of the data received by the cloud server is as follows:
Figure 290956DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data.
8. The internet of things and security chip based storage method of claim 7, wherein in the step S5, the ciphertext data is stored in the improved Merkle tree cloud data storage model, and the corresponding encrypted storage parameter information is stored in the security chip, wherein the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and the method includes:
the data sets uploaded by one-bit data uploading personnel at the same time
Figure 988654DEST_PATH_IMAGE053
The corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) integrating the encryption result of the Internet of things equipment with the encryption result of the corresponding data:
Figure 879250DEST_PATH_IMAGE063
wherein:
Figure 287358DEST_PATH_IMAGE052
is composed of
Figure 365035DEST_PATH_IMAGE039
As a result of the encryption of (a),
Figure 272948DEST_PATH_IMAGE064
is composed of
Figure 877105DEST_PATH_IMAGE039
Uploading data;
c is the ciphertext data after integration;
2) computing
Figure 579482DEST_PATH_IMAGE065
The hash value of (1), will be hash
Figure 269089DEST_PATH_IMAGE066
As root node of Merkle tree;
3) for any non-leaf node in the Merkle tree
Figure 449535DEST_PATH_IMAGE067
Its value is a non-leaf node
Figure 49143DEST_PATH_IMAGE067
Splicing the sub-nodes, wherein the leaf node value is the hash value of the encryption result of the single internet of things device and the corresponding upload data ciphertext; when adding the Internet of things equipment
Figure 781476DEST_PATH_IMAGE039
When the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
9. The internet of things and security chip based storage method of claim 1, wherein in the step S6, the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, and the method includes:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
10. A storage device based on the Internet of things and a security chip is characterized in that the device comprises:
the Internet of things equipment self-organization module is used for constructing an Internet of things equipment self-organization network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server end in the self-organization network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the Internet of things equipment node and the cloud server end;
the data encryption module is used for generating an encryption key of the uploaded data by the security chip, and encrypting the uploaded data by the security chip by utilizing an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
the data storage module is used for storing ciphertext data into the improved Merkle tree cloud data storage model and storing corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key and can return encrypted storage parameters of data required by a user, the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameters and decrypts the ciphertext data to obtain decrypted data required by the user, and therefore the storage method based on the Internet of things and the security chip is achieved according to claim 1.
CN202210508715.2A 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip Active CN114615094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210508715.2A CN114615094B (en) 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210508715.2A CN114615094B (en) 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip

Publications (2)

Publication Number Publication Date
CN114615094A true CN114615094A (en) 2022-06-10
CN114615094B CN114615094B (en) 2022-09-30

Family

ID=81870344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210508715.2A Active CN114615094B (en) 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip

Country Status (1)

Country Link
CN (1) CN114615094B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115378591A (en) * 2022-07-18 2022-11-22 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion
CN116112483A (en) * 2023-02-17 2023-05-12 重庆大学 Multidimensional optimized ROS2 intelligent communication method
CN116739389A (en) * 2023-08-14 2023-09-12 广东创能科技股份有限公司 Smart city management method and system based on cloud computing
CN116915501A (en) * 2023-09-06 2023-10-20 深圳市潼芯传感科技有限公司 Internet of things information security management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100076A (en) * 2015-07-03 2015-11-25 浪潮电子信息产业股份有限公司 Cloud data security system based on USB Key
CN105721308A (en) * 2016-02-24 2016-06-29 陕西师范大学 Routing method and system of multi-hop cognitive radio network based on average delay estimation
CN107330337A (en) * 2017-07-19 2017-11-07 腾讯科技(深圳)有限公司 Date storage method, device, relevant device and the cloud system of mixed cloud
CN110545285A (en) * 2019-09-17 2019-12-06 北京方研矩行科技有限公司 Internet of things terminal security authentication method based on security chip
CN112565205A (en) * 2020-11-19 2021-03-26 湖南大学 Credible authentication and measurement method, server, terminal and readable storage medium
WO2021203797A1 (en) * 2020-04-07 2021-10-14 南京邮电大学 Alliance chain-based method for storing vehicle maintenance and servicing data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100076A (en) * 2015-07-03 2015-11-25 浪潮电子信息产业股份有限公司 Cloud data security system based on USB Key
CN105721308A (en) * 2016-02-24 2016-06-29 陕西师范大学 Routing method and system of multi-hop cognitive radio network based on average delay estimation
CN107330337A (en) * 2017-07-19 2017-11-07 腾讯科技(深圳)有限公司 Date storage method, device, relevant device and the cloud system of mixed cloud
CN110545285A (en) * 2019-09-17 2019-12-06 北京方研矩行科技有限公司 Internet of things terminal security authentication method based on security chip
WO2021203797A1 (en) * 2020-04-07 2021-10-14 南京邮电大学 Alliance chain-based method for storing vehicle maintenance and servicing data
CN112565205A (en) * 2020-11-19 2021-03-26 湖南大学 Credible authentication and measurement method, server, terminal and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘国荣等: "云端协同的智能终端数据加密技术", 《电信科学》 *
喻潇等: "基于USBKEY的网络存储用户数据保护的研究与实现", 《网络与信息安全学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115378591A (en) * 2022-07-18 2022-11-22 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion
CN115378591B (en) * 2022-07-18 2023-04-07 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion
CN116112483A (en) * 2023-02-17 2023-05-12 重庆大学 Multidimensional optimized ROS2 intelligent communication method
CN116112483B (en) * 2023-02-17 2024-02-20 重庆大学 Multidimensional optimized ROS2 intelligent communication method
CN116739389A (en) * 2023-08-14 2023-09-12 广东创能科技股份有限公司 Smart city management method and system based on cloud computing
CN116915501A (en) * 2023-09-06 2023-10-20 深圳市潼芯传感科技有限公司 Internet of things information security management method and system
CN116915501B (en) * 2023-09-06 2023-12-19 深圳市潼芯传感科技有限公司 Internet of things information security management method and system

Also Published As

Publication number Publication date
CN114615094B (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN114615094B (en) Storage method and device based on Internet of things and security chip
CN110135986B (en) Method for realizing searchable encrypted file data based on blockchain intelligent contract
CN105653315B (en) A kind of node operating system method for down loading based on block chain technology
CN109698822A (en) Combination learning method and system based on publicly-owned block chain and encryption neural network
CN105580309A (en) Key agreement device and method
CN109542883A (en) A kind of information duplicate checking method based on block chain
CN106464490A (en) Device for determining a shared key
CN107004068A (en) The safe transmission of genomic data
CN110601815B (en) Block chain data processing method and equipment
JP2016526851A (en) System for sharing encryption keys
CN108092766A (en) A kind of cipher text searching method for verifying authority and its system
US20190288848A1 (en) Cryptographic hash generation system
WO2018070932A1 (en) System and method for querying an encrypted database for documents satisfying an expressive keyword access structure
CN115941206A (en) Carbon emission data uplink method based on block chain technology
CN107196919A (en) A kind of method and apparatus of matched data
CN105027492A (en) Network device configured to derive a shared key
CN115378658B (en) Park communication data transmission method based on Internet of things cloud edge collaboration
Pham et al. Enhanced security of IoT data sharing management by smart contracts and blockchain
CN112948083A (en) Data processing method and device and electronic equipment
Hsiao et al. Utilizing blockchain technology to improve WSN security for sensor data transmission
Merino et al. A modular IoT hardware platform for distributed and secured extreme edge computing
CN115860768B (en) Source tracing method and device based on blockchain and electronic equipment thereof
Alqarni et al. Authenticated wireless links between a drone and sensors using a blockchain: Case of smart farming
CN116469501A (en) Electronic medical record sharing method, system, equipment and storage medium based on blockchain
CN107947931A (en) A kind of method and system of key agreement, bluetooth equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221009

Address after: 528463 Yagang Industrial Zone, Sanxiang Township, Zhongshan City, Guangdong Province

Patentee after: ZHONGSHAN SANXUN ELECTRONICS Co.,Ltd.

Address before: 518000 no.14-5, espresso software building, Haitian 2nd Road, high tech park, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: FENGLIAN INTELLIGENT (SHENZHEN) CO.,LTD.