CN107483202A - A kind of selection encryption method and device based on Internet of Things repeater - Google Patents
A kind of selection encryption method and device based on Internet of Things repeater Download PDFInfo
- Publication number
- CN107483202A CN107483202A CN201710598683.9A CN201710598683A CN107483202A CN 107483202 A CN107483202 A CN 107483202A CN 201710598683 A CN201710598683 A CN 201710598683A CN 107483202 A CN107483202 A CN 107483202A
- Authority
- CN
- China
- Prior art keywords
- internet
- packet
- things
- encryption
- repeater
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Abstract
This application discloses a kind of selection encryption method and device based on Internet of Things repeater, methods described comprises the following steps:The Internet of Things repeater receives the packet that internet-of-things terminal is sent;The Internet of Things repeater receives the first ciphering unit that the user that user is inputted by Man Machine Interface selects;The Internet of Things repeater calls first ciphering unit that the packet is encrypted;The Internet of Things repeater sends the packet after encryption to Internet of Things access point.Technical scheme provided by the invention has the advantages of safe, user experience is high.
Description
Technical field
The application is related to the communications field, more particularly to a kind of selection encryption method and device based on Internet of Things repeater.
Background technology
Internet of Things is the important component of generation information technology, and the important development stage in " informationization " epoch.
Its English name is:“Internet of things(IoT)”.As its name suggests, Internet of Things is exactly the connected internet of thing thing.This
There is two layers of meaning:First, the core of Internet of Things and basis are still internet, it is extension and extension on Internet basic
Network;Second, its user terminal extends and extend between any article and article, enter row information and exchange and communicate, that is,
Thing thing mutually ceases.Internet of Things is widely used in network by the cognition technology that communicates such as Intellisense, identification technology and general fit calculation
In fusion, also therefore it is referred to as the third wave that world information industry develops after computer, internet.Internet of Things is mutual
The application extension of networking, rather than Internet of Things is network, Internet of Things is business and application.Therefore, application innovation is thing
The core of networking development, the innovation 2.0 using Consumer's Experience as core are the souls of Internet of Things development.
What Internet of Things solved is the data exchange between interconnection and thing thing between thing thing, and existing Internet of Things is being networked
When be based on Internet of Things repeater (English:Access point, AP) access internet, existing Internet of Things repeater receives
To after the data of internet-of-things terminal, the data of internet-of-things terminal can not be carried out to separate encryption, so existing safety
Property is not high.
The content of the invention
The application provides a kind of selection encryption method based on Internet of Things repeater.The safety of Internet of Things data can be improved
Property, improve Consumer's Experience.
First aspect, there is provided a kind of selection encryption method based on Internet of Things repeater, methods described comprise the following steps:
The Internet of Things repeater receives the packet that internet-of-things terminal is sent;
The Internet of Things repeater receives the first ciphering unit that the user that user is inputted by Man Machine Interface selects;
The Internet of Things repeater calls first ciphering unit that the packet is encrypted;
The Internet of Things repeater calls first ciphering unit that the packet is encrypted;
The Internet of Things repeater sends the packet after encryption to Internet of Things access point.
Optionally, methods described is gone back before the Internet of Things repeater sends the packet after encryption to gateway
It can include:
Such as the first ciphering unit fails to the packet encryption, then calls the spare cryptographic list of the first ciphering unit
Member is to the packet encryption.
Optionally, the Internet of Things access point calls first ciphering unit that tool is encrypted to the packet
Body includes:
The Internet of Things repeater obtains the signal modulation mode that the internet-of-things terminal sends packet, according to the letter
Number modulation system determines key, calls first ciphering unit that work is encrypted using packet described in the secret key pair
Make the period.
Optionally, it is described to determine that key specifically includes according to the modulation system:
Parse the packet and obtain the signal modulation mode of the packet, from the mapping of the modulation system and key
Key working hour corresponding to the signal modulation mode is inquired in table.
Optionally, it is described to determine that key specifically includes according to the modulation system:As described in packet obtains as described in parsing
The signal modulation mode of packet is QPSK QPSK, then obtains the phase bit number in the QPSK with energy, will
The value that the phase bit number sorts to obtain in order is as the key.
Second aspect, there is provided a kind of selection encryption device based on Internet of Things repeater, described device include:
Receiving unit, for receiving the packet of internet-of-things terminal transmission;
Processing unit, the first ciphering unit selected for receiving the user that user is inputted by Man Machine Interface;Adjust
The packet is encrypted with first ciphering unit;
Transmitting element, for the packet after encryption to be sent to Internet of Things access point.
Optionally, the processing unit, it is additionally operable to the first ciphering unit such as and the packet encryption is failed, then adjust
With the spare cryptographic unit of the first ciphering unit to the packet encryption.
Optionally, the processing unit is specific, and the signal modulation side of packet is sent for obtaining the internet-of-things terminal
Formula, key is determined according to the signal modulation mode, calls first ciphering unit to use packet described in the secret key pair
Working hour is encrypted.
Optionally, the working hour processing unit is specific, and the letter of the packet is obtained for parsing the packet
Number modulation system, the corresponding key of the signal modulation mode is inquired in the mapping table from the modulation system with key.
Optionally, the processing unit, be additionally operable to the packet as described in parsing obtain as described in packet signal modulation side
Formula is QPSK QPSK, then obtains the phase bit number in the QPSK with energy, the phase bit number is arranged in order
The value that sequence obtains is as the key.The third aspect, there is provided a kind of computer-readable storage medium, wherein, the computer-readable storage medium
It can have program stored therein, the selection encryption for any Internet of Things repeater recorded when the program performs including above-mentioned first aspect
The part or all of step of method.
Fourth aspect, there is provided a kind of relay equipment, the relay equipment include:One or more processors, storage
Device, bus system, transceiver and one or more programs, the processor, the memory and the transceiver pass through institute
Bus system is stated to be connected;Wherein one or more of programs are stored in the memory, and one or more programs include
Instruction, instruct makes repeater perform above-mentioned first aspect and first aspect when being performed by access point may all design offer
Any one in method.
The internet-of-things terminal of technical scheme provided by the invention is sent data packets to after AP, and AP is according to internet-of-things terminal
Sequence number select corresponding with internet-of-things terminal ciphering unit, data are encrypted by the ciphering unit, for Internet of Things
For net, for internet-of-things terminal without being configured to encryption, all encryptions are set can be effective in repeater, this mode
The cost of internet-of-things terminal is reduced, and for whole Internet of Things, it is numerous due to that can be connected below one repeater
Internet-of-things terminal, only repeater configurations can also be reduced with the overall cost of Internet of Things, in addition, for repeater its
The ability of calculating is typically better than internet-of-things terminal, then the delay to that can reduce data transmission during operation ciphering unit, reduces
The time delay of network, improve the experience of user.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme of the embodiment of the present application, required use in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the present application, for this area
For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the data routing method based on Internet of Things repeater;
Fig. 2 is the transfer process figure that a kind of internet-of-things terminal sends packet to Internet of Things repeater;
Fig. 3 is the flow chart of the selection encryption method based on Internet of Things repeater
Fig. 4 is the technology schematic diagram of a scenario that the embodiment of the application one provides;
Fig. 5 is the mapping relations schematic diagram of the offer of the embodiment of the application one;
Fig. 6 is the flow signal for the selection encryption method based on Internet of Things repeater that another embodiment of the application provides
Figure;
Fig. 7 is a kind of structural representation based on Internet of Things repeater devices that the application provides;
Fig. 8 is a kind of hardware architecture diagram for Internet of Things repeater that the application provides.
Embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although operations are described as the processing of order by flow chart, therein to be permitted
Multioperation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be rearranged.When it
The processing can be terminated when operation is completed, it is also possible to the additional step being not included in accompanying drawing.The processing
It can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", referring to can be by running preset program or referring to
Order performs the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with
Memory, the survival that is prestored in memory by computing device are instructed to perform predetermined process process, or by ASIC,
The hardware such as FPGA, DSP perform predetermined process process, or are realized by said two devices combination.Computer equipment includes but unlimited
In server, PC, notebook computer, tablet personal computer, smart mobile phone etc..
Method (some of them are illustrated by flow) discussed hereafter can be by hardware, software, firmware, centre
Part, microcode, hardware description language or its any combination are implemented.Implement when with software, firmware, middleware or microcode
When, to implement the program code of necessary task or code segment can be stored in machine or computer-readable medium and (for example deposit
Storage media) in.(one or more) processor can implement necessary task.
Concrete structure and function detail disclosed herein are only representational, and are for describing showing for the present invention
The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and it is not interpreted as
It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. herein to describe unit,
But these units should not be limited by these terms.It is used for the purpose of using these terms by a unit and another unit
Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second
Member, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or
Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, otherwise singulative used herein above "one", " one " also attempt to include plural number.Should also
When understanding, term " comprising " and/or "comprising" used herein above provide stated feature, integer, step, operation,
The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit,
Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be according to different from attached
The order indicated in figure occurs.For example, depending on involved function/action, the two width figures shown in succession actually may be used
Substantially simultaneously to perform or can perform in a reverse order sometimes.The present invention is made below in conjunction with the accompanying drawings further
It is described in detail.
A kind of according to an aspect of the invention, there is provided method for transmitting uplink data of Internet of Things repeater.Wherein, should
Method is applied in internet of things as shown in Figure 1, as shown in figure 1, the internet of things includes:Internet-of-things terminal 10, Internet of Things
Access point AP20, gateway 30 and internet-of-things terminal 40, above-mentioned internet-of-things terminal can have different according to different situations
The form of expression, such as the internet-of-things terminal are specifically as follows:The equipment such as mobile phone, tablet personal computer, computer, certain its can also wrap
Containing the other equipment with network savvy, such as intelligent television, intelligent air condition, the terminal of intelligent kettle or some Internet of Things are set
Standby, above-mentioned internet-of-things terminal 10 is wirelessly connected with internet-of-things terminal 40, and internet-of-things terminal 40 is connected with AP20, AP20
Internet is accessed by another way (connected modes i.e. different from wireless mode) and gateway 30, above-mentioned wireless mode includes
But it is not limited to:The modes such as bluetooth, WIFI, above-mentioned another way can be LTE or wired mode, and above-mentioned gateway specifically can be with
For the equipment such as mobile base station, mobile-relay station, interchanger.It is example in a wired fashion in Fig. 1, represents for convenience, here only
Represented with a solid line.
Above-mentioned gateway 30 can be a PC (English according to the size of Internet of Things:Personal computer,
PC), certainly in actual applications or multiple pc, server or server farm, the specific embodiment of the invention is not
Limit to the specific manifestation form of above-mentioned gateway 30.
Refering to Fig. 2, Fig. 2 is the transfer process figure of the data receiver of Internet of Things repeater, as shown in Fig. 2 the flow includes:
Step S201, internet-of-things terminal 10 wirelessly sends the packet for needing to send to Internet of Things repeater
40;
Step S202, Internet of Things repeater 40 sends data packets to AP20;
Step S203, the packet is transmitted to gateway 30 by AP20;
Step S204, gateway 30 transmits packet to internet.
By above-mentioned Fig. 1 and Fig. 2 expression, in the actual transmissions of packet, if AP20 and Internet of Things repeater 40
Between divulge a secret, then for transmission packet due to it is no pass through corresponding encryption, so easilying lead to count
According to leakage, easily there is safety issue.
Refering to Fig. 3, Fig. 3 is a kind of selection encryption method based on Internet of Things repeater provided by the invention, and this method exists
Realized under network architecture as shown in Figure 4, as shown in figure 4, can connect multiple internet-of-things terminals under an AP20, Internet of Things is whole
Multiple Internet of Things access terminals can be connected under end, the AP is specifically as follows the mobile phone for opening focus, for providing wireless connection
The equipment such as people's computer or router, this method is as shown in figure 3, comprise the following steps:
Step S301, internet-of-things terminal sends packet to Internet of Things repeater.
Internet-of-things terminal in above-mentioned steps S301 is specifically as follows:The equipment such as mobile phone, tablet personal computer, computer, certainly
It can also include the other equipment with network savvy, such as intelligent television, intelligent air condition, intelligent kettle, intelligent lamp, intelligence
The smart machine of switch or some Internet of Things.
The mode that internet-of-things terminal sends packet to Internet of Things repeater in above-mentioned steps S301 can be by wireless
The mode of connection sends packet, and the wireless mode includes but is not limited to:Bluetooth, Wireless Fidelity (English:Wireless
Fidelity, WIFI) or the wireless mode such as Zigbee, wherein, above-mentioned WIFI needs the standard in accordance with IEEE802.11b.
It should be noted that Internet of Things and internet-of-things terminal here be only just for wireless internet of things terminal, because
For for Internet of Things, the number of devices that it is accessed is numerous, for internet-of-things terminal, if by wired connection, it is first
The access quantity of first terminal can limit, and for family, with wired connection, the wiring for domestic consumer comes
Saying to imagine, this wired cost is also very high in addition, so the middle internet-of-things terminal in technical scheme
Connection between internet-of-things terminal only limits wireless connection.
Step S302, the first ciphering unit that the user that user is inputted by Man Machine Interface selects is received.
The each producer of type of internet-of-things terminal in above-mentioned steps S302 can be configured according to situation voluntarily, example
Such as, the internet-of-things terminal can specifically include:Intelligent electric lamp, intelligent television, intelligent cleaning equipment, intelligent sleep equipment, intelligence
Monitoring device etc., its form showed can be varied, such as intelligent electric lamp, the intelligent electric lamp includes but unlimited
In:The equipment such as intelligent desk lamp, intelligent ceiling lamp, intelligent wall lamp, such as intelligent television, it can be Samsung board intelligence
TV, it can also be Sharp's board intelligent television certainly, such as intelligent cleaning equipment, it can be, intelligent floor-sweeping
Robot, it can also include the equipment such as intellective dust collector, intelligent garbage processor certainly, such as come for intelligent sleep equipment
Say, it can be:The equipment such as intelligent mattress, intelligent sofa, such as intelligent monitoring device or, it can be, intelligent blood
Pressure meter, intelligent thermometer etc., the present invention is not limited the concrete form and quantity or species of above-mentioned internet-of-things terminal.
User in above-mentioned steps select with ciphering unit mapping table as shown in figure 5, above-mentioned mapping can to map one by one,
Can certainly be the modes such as one-to-many mapping.
Ciphering unit in above-mentioned steps S302 is specifically as follows the hardware ciphering unit for being arranged on Internet of Things repeater, its
The AES set comprising factory pre-sets, certainly in actual applications, above-mentioned ciphering unit can also be configuration in Internet of Things
Software encryption unit in repeater, the present invention are not intended to limit the specific manifestation form of above-mentioned ciphering unit.
Above-mentioned AES includes but is not limited to:Triple DEA block encryption (English:riple Data
Encryption Algorithm, 3DES), Message Digest 5 (English:Message Digest Algorithm, MD5) or
The AESs such as RSA (Rivest, Shamir, Adleman), the present invention do not limit to specific AES.Such as 3DES is
The common name of triple DEA block encryptions.It is the equal of using des encryption algorithm three times to each data block.Due to meter
The enhancing of calculation machine operational capability, the key length of master DES passwords become easily by Brute Force;3DES is to be designed to carry
For a kind of relatively simple method, the i.e. attack by increasing DES key length to avoid similar.Step S303, Internet of Things
Repeater calls the first ciphering unit that the packet is encrypted;
Above-mentioned steps S303 implementation method is specifically as follows:
For example, the first ciphering unit is 3DES encryption unit, then Internet of Things repeater calls 3DES encryption unit to data
Bag carries out 3DES encryption processing.Such as first ciphering unit be RAS ciphering units, then Internet of Things repeater calls RAS encryptions single
Member carries out RAS encryptions to packet.Such as first ciphering unit be md5 encryption unit, then Internet of Things repeater call MD5
Ciphering unit carries out md5 encryption processing to packet.
The concrete mode of above-mentioned encryption may refer to 3DES, RSA and MD5 associated description, repeat no more here.
Above-mentioned steps S303 implementation method is specifically as follows:
Internet of Things repeater calls the first ciphering unit that the packet is encrypted, and such as encrypts successfully, after progress
Continuous step S304, such as encrypts unsuccessful, then calls the spare cryptographic unit of the first ciphering unit that place is encrypted to the packet
Reason, the packet header extended field of the packet after encryption will be added to using spare cryptographic unit marks.
Step S304, Internet of Things repeater sends the packet after the encryption to Internet of Things access point.
Above-mentioned steps S304 implementation method can be:
The packet of encryption is sent to gateway by another way, for example, internet-of-things terminal by WIFI with
Internet of Things repeater connects, then Internet of Things repeater can send data packets to gateway by wired mode, certainly in reality
In the application of border, Internet of Things repeater can also pass through Long Term Evolution (English:Long Term Evolution, LTE) by encryption
Packet after reason is sent to gateway.Certain above-mentioned LTE or restricted manner and internet-of-things terminal pass through in WIFI and Internet of Things
After the mode that device connects just to for example, the present invention does not limit to the concrete mode of above-mentioned connection.
According to the method provided such as Fig. 3, sequence number selection and the Internet of Things of the Internet of Things repeater according to internet-of-things terminal are whole
Ciphering unit corresponding to end, data are encrypted by the ciphering unit, for Internet of Things, internet-of-things terminal is without right
Encryption is configured, and all encryptions are set can effectively reduce internet-of-things terminal in Internet of Things repeater, this mode
Cost, and for whole Internet of Things, it is whole due to numerous Internet of Things can be connected below one Internet of Things repeater
End, only Internet of Things repeater configurations can also be reduced with the overall cost of Internet of Things, in addition, for Internet of Things repeater
Its ability calculated is typically better than internet-of-things terminal, then the delay to that can reduce data transmission during operation ciphering unit, subtracts
The time delay of few network, improve the experience of user.
Refering to Fig. 6, Fig. 6 is a kind of selection encryption method based on Internet of Things repeater provided by the invention, and this method exists
Realized under network architecture as shown in Figure 4, as shown in figure 4, can connect multiple internet-of-things terminals under an AP20, Internet of Things is whole
Multiple Internet of Things access terminals can be connected under end, the AP is specifically as follows the mobile phone for opening focus, for providing wireless connection
The equipment such as people's computer or router, this method is as shown in fig. 6, comprise the following steps:
Step S601, internet-of-things terminal sends packet to Internet of Things repeater;
Internet-of-things terminal in above-mentioned steps S601 is specifically as follows:The equipment such as mobile phone, tablet personal computer, computer, certainly
It can also include the other equipment with network savvy, such as intelligent television, intelligent air condition, intelligent kettle, intelligent lamp, intelligence
The smart machine of switch or some Internet of Things.
The mode that internet-of-things terminal sends packet to Internet of Things repeater in above-mentioned steps S601 can be by wireless
The mode of connection sends packet, and the wireless mode includes but is not limited to:Bluetooth, Wireless Fidelity (English:Wireless
Fidelity, WIFI) or the wireless mode such as Zigbee, wherein, above-mentioned WIFI needs the standard in accordance with IEEE802.11b.
It should be noted that Internet of Things and internet-of-things terminal here be only just for wireless internet of things terminal, because
For for Internet of Things, the number of devices that it is accessed is numerous, for internet-of-things terminal, if by wired connection, it is first
The access quantity of first terminal can limit, and for family, with wired connection, the wiring for domestic consumer comes
Saying to imagine, this wired cost is also very high in addition, so the middle internet-of-things terminal in technical scheme
Connection between internet-of-things terminal only limits wireless connection.
Step S602, Internet of Things repeater receives the first encryption that the user that user is inputted by Man Machine Interface selects
Unit, Internet of Things repeater obtains the signal modulation mode that the internet-of-things terminal sends packet, according to the signal modulation
Mode determines key, calls first ciphering unit to be encrypted using packet described in the secret key pair.
The each producer of type of internet-of-things terminal in above-mentioned steps S602 can be configured according to situation voluntarily, example
Such as, the internet-of-things terminal can specifically include:Intelligent electric lamp, intelligent television, intelligent cleaning equipment, intelligent sleep equipment, intelligence
Monitoring device etc., its form showed can be varied, such as intelligent electric lamp, the intelligent electric lamp includes but unlimited
In:The equipment such as intelligent desk lamp, intelligent ceiling lamp, intelligent wall lamp, such as intelligent television, it can be Samsung board intelligence
TV, it can also be Sharp's board intelligent television certainly, such as intelligent cleaning equipment, it can be, intelligent floor-sweeping
Robot, it can also include the equipment such as intellective dust collector, intelligent garbage processor certainly, such as come for intelligent sleep equipment
Say, it can be:The equipment such as intelligent mattress, intelligent sofa, such as intelligent monitoring device or, it can be, intelligent blood
Pressure meter, intelligent thermometer etc., the present invention is not limited the concrete form and quantity or species of above-mentioned internet-of-things terminal.
Optionally, above-mentioned steps S602 implementation is specifically as follows:
Internet of Things repeater obtains the signal modulation mode that the internet-of-things terminal sends packet, from modulation system and key
Key corresponding to the signal modulation mode is inquired in mapping table, calls first ciphering unit using described in the secret key pair
Packet is encrypted.
Specific implementation is for example:Modulation system such as acquisition is binary phase shift keying (English:Binary Phase Shift
Keying, BPSK), then using the first key, the modulation system such as obtained is QPSK (Quadrature Phase
Shift Keying, QPSK), then using the second key.Here it is using the purpose of the modulation system of signal, because in
For device, the modulation system of its signal is constant, is that can obtain internet-of-things terminal signal so for follow-up equipment
The modulation system of transmission, so different keys can be selected by the difference of modulation system, so as to further improve peace
Quan Xing.
Optionally, above-mentioned steps S602 implementation method is specifically as follows:
The packet as described in parsing obtain as described in the signal modulation mode of packet be QPSK QPSK, then obtain
There is the phase bit number of energy, the value that the phase bit number is sorted to obtain in order is as the key in the QPSK.It is above-mentioned
Phase bit number with energy refer to QPSK subcarriers with energy, i.e., the subcarrier transmits numeral 1, its corresponding phase
Numbering is specifically as follows, the row number of its phase, such as first phase row number is 1, and second phase row number is the row of the 2, the 15th phase
Number it is 15, the difficulty that is decrypted of key increase key is obtained using this mode, further improves security.
Internet-of-things terminal in above-mentioned steps is with ciphering unit mapping table as shown in figure 5, above-mentioned mapping can be to reflect one by one
Penetrate, naturally it is also possible to for modes such as one-to-many mappings.
Ciphering unit in above-mentioned steps S602 is specifically as follows the hardware ciphering unit for being arranged on Internet of Things repeater, its
The AES set comprising factory pre-sets, certainly in actual applications, above-mentioned ciphering unit can also be configuration in Internet of Things
Software encryption unit in repeater, the present invention are not intended to limit the specific manifestation form of above-mentioned ciphering unit.
Above-mentioned AES includes but is not limited to:The AESs such as 3DES, MD5 or RSA, limitation is not specific by the present invention
AES.
Above-mentioned steps S602 implementation method is specifically as follows:
For example, the first ciphering unit is 3DES encryption unit, then Internet of Things repeater calls 3DES encryption unit to data
Bag carries out 3DES encryption processing.Such as first ciphering unit be RAS ciphering units, then Internet of Things repeater calls RAS encryptions single
Member carries out RAS encryptions to packet.Such as first ciphering unit be md5 encryption unit, then Internet of Things repeater call MD5
Ciphering unit carries out md5 encryption processing to packet.
The concrete mode of above-mentioned encryption may refer to 3DES, RSA and MD5 associated description, repeat no more here.
Above-mentioned steps S602 implementation method is specifically as follows:
Internet of Things access point calls the first ciphering unit that the packet is encrypted, and such as encrypts successfully, after progress
Continuous step, such as encrypts unsuccessful, then calls the spare cryptographic unit of the first ciphering unit that the packet is encrypted, will
It is added to the packet header extended field of the packet after encryption using spare cryptographic unit marks.
Step S603, Internet of Things repeater sends the packet after the encryption to Internet of Things access point.
Above-mentioned steps S603 implementation method can be:
The packet of encryption is sent to gateway by another way, for example, internet-of-things terminal by WIFI with
Internet of Things repeater connects, then Internet of Things repeater can send data packets to gateway by wired mode, certainly in reality
In the application of border, Internet of Things repeater can also pass through Long Term Evolution (English:Long Term Evolution, LTE) by encryption
Packet after reason is sent to gateway.Certain above-mentioned LTE or restricted manner and internet-of-things terminal pass through in WIFI and Internet of Things
After the mode that device connects just to for example, the present invention does not limit to the concrete mode of above-mentioned connection.
According to the method provided such as Fig. 6, Internet of Things repeater is corresponding with the internet-of-things terminal according to the selection of user couple
Ciphering unit, data are encrypted by the ciphering unit, for Internet of Things, internet-of-things terminal to encryption without carrying out
Configuration, all encryptions are set in Internet of Things repeater, and this mode can effectively reduce the cost of internet-of-things terminal, and
It is only right due to numerous internet-of-things terminals can be connected below one Internet of Things repeater for whole Internet of Things
Internet of Things repeater configurations can also reduce the overall cost of Internet of Things, in addition, its calculating for Internet of Things repeater
Ability is typically better than internet-of-things terminal, then the delay to that can reduce data transmission during operation ciphering unit, reduces network
Time delay, improve the experience of user.
Refering to Fig. 7, Fig. 7 is based on Internet of Things repeater devices 700 for one kind, and described device includes:
Receiving unit 701, for receiving the packet of internet-of-things terminal transmission;
Processing unit 702, the first ciphering unit selected for receiving the user that user is inputted by Man Machine Interface;
Call first ciphering unit that the packet is encrypted;
Transmitting element 703, for the packet after encryption to be sent to gateway.
Optionally, processing unit 702, it is additionally operable to the first ciphering unit such as and the packet encryption is failed, then adjust
With the spare cryptographic unit of the first ciphering unit to the packet encryption.
Optionally, processing unit 702 is specific, and the signal modulation side of packet is sent for obtaining the internet-of-things terminal
Formula, key is determined according to the signal modulation mode, calls first ciphering unit to use packet described in the secret key pair
It is encrypted.
Optionally, processing unit 702, the signal modulation side of the packet is obtained specifically for parsing the packet
Formula, the corresponding key of the signal modulation mode is inquired in the mapping table from the modulation system with key.
Optionally, processing unit 702, be additionally operable to the packet as described in parsing obtain as described in packet signal modulation mode
For QPSK QPSK, then the phase bit number in the QPSK with energy is obtained, the phase bit number is sorted in order
Obtained value also provides a kind of computer-readable storage medium as the key specific embodiment of the invention, wherein, the computer is deposited
Storage media can have program stored therein, and be received when the program performs including any Internet of Things repeater that above-mentioned first aspect is recorded
The part or all of step of the encryption method at times of data.
Refering to Fig. 8, Fig. 8 is a kind of Internet of Things repeater 800 provided by the invention, and the Internet of Things repeater can be deployment
A node in internet system, internet system can also include:Internet-of-things terminal, Internet of Things repeater, Internet of Things
Access point and gateway, the Internet of Things repeater 800 include but is not limited to:The equipment such as computer, server, as shown in figure 8, the thing
Networking repeater 800 includes:Processor 801, memory 802, transceiver 803 and bus 804.Transceiver 803 is used for and outside
Equipment (such as the other equipment in interacted system, include but is not limited to:Internet-of-things terminal, equipment of the core network etc.) between receive and dispatch number
According to.The quantity of processor 801 in Internet of Things repeater 800 can be one or more.In some embodiments of the present application, place
Reason device 801, memory 802 can be connected with transceiver 803 by bus system or other modes.The art being related on the present embodiment
The implication of language and citing, embodiment corresponding to Fig. 3 or Fig. 6 is may be referred to, here is omitted.
Wherein, can be with store program codes in memory 802.Processor 801 is used to call the journey stored in memory 802
Sequence code, for performing following operation:
Transceiver 803, for receiving the packet of internet-of-things terminal transmission;
Processor 801, the first ciphering unit selected for receiving the user that user is inputted by Man Machine Interface;Adjust
The packet is encrypted with first ciphering unit.
Transceiver 803, it is additionally operable to send the packet after encryption to gateway.
Optionally, processor 801, transceiver 803, can be also used for performing the step as in Fig. 3 or as shown in Figure 6 embodiments
Rapid and step refinement scheme and alternative.
It should be noted that processor 801 here can be a treatment element or multiple treatment elements
It is referred to as.For example, the treatment element can be central processing unit (Central Processing Unit, CPU) or spy
Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement this
Apply for one or more integrated circuits of embodiment, such as:One or more microprocessors (digital singnal
Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array,
FPGA)。
Memory 803 can be the general designation of a storage device or multiple memory elements, and for storing and can hold
Parameter, data etc. required for line program code or the operation of application program running gear.And memory 903 can include random storage
Device (RAM), nonvolatile memory (non-volatile memory), such as magnetic disk storage, flash memory can also be included
(Flash) etc..
Bus 804 can be that industry standard architecture (Industry Standard Architecture, ISA) is total
Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control
Bus processed etc..For ease of representing, only represented in Fig. 8 with a thick line, it is not intended that an only bus or a type of
Bus.
The user equipment can also include input/output unit, be connected to bus 804, to pass through bus and processor 801
Connected etc. other parts.The input/output unit can provide an inputting interface for operating personnel, so that operating personnel pass through this
Inputting interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external miscellaneous equipment of the interface.
It should be noted that for foregoing each embodiment of the method, in order to be briefly described, therefore it is all expressed as to a system
The combination of actions of row, but those skilled in the art should know, the application is not limited by described sequence of movement, because
For according to the application, certain some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should
Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily this Shen
Please be necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiment
Part, may refer to the associated description of other embodiment.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English
Text:Random Access Memory, referred to as:RAM), disk or CD etc..
The content download method and relevant device that are there is provided above the embodiment of the present application, system are described in detail,
Specific case used herein is set forth to the principle and embodiment of the application, and the explanation of above example is simply used
Understand the present processes and its core concept in help;Meanwhile for those of ordinary skill in the art, according to the application's
Thought, there will be changes in specific embodiments and applications, in summary, this specification content should not be construed as
Limitation to the application.
Claims (10)
1. a kind of selection encryption method based on Internet of Things repeater, it is characterised in that methods described comprises the following steps:
The Internet of Things repeater receives the packet that internet-of-things terminal is sent;
The Internet of Things repeater receives the first ciphering unit that the user that user is inputted by Man Machine Interface selects;
The Internet of Things repeater calls first ciphering unit to the packet and is encrypted;
The Internet of Things repeater sends the packet after encryption to Internet of Things access point.
2. according to the method for claim 1, it is characterised in that methods described is in the Internet of Things repeater by encryption
Packet afterwards can also include before sending to gateway:
Such as the first ciphering unit fails to the packet encryption, then calls the spare cryptographic unit pair of the first ciphering unit
The packet encryption.
3. according to the method for claim 1, it is characterised in that the Internet of Things repeater calls first ciphering unit
The packet is encrypted and specifically included:
The Internet of Things repeater obtains the signal modulation mode that the internet-of-things terminal sends packet, is adjusted according to the signal
Mode processed determines key, calls first ciphering unit to be encrypted using packet described in the secret key pair.
4. according to the method for claim 3, it is characterised in that described to determine that key is specific according to the modulation system, bag
Include:
Parse the packet and obtain the signal modulation mode of the packet, from the mapping table of the modulation system and key
Inquire key corresponding to the signal modulation mode.
5. according to the method for claim 3, it is characterised in that described to determine that key is specific according to the modulation system, bag
Include:
The packet as described in parsing obtain as described in the signal modulation mode of packet be QPSK QPSK, then obtain described in
There is the phase bit number of energy, the value that the phase bit number is sorted to obtain in order is as the key in QPSK.
6. a kind of selection encryption device based on Internet of Things repeater, it is characterised in that described device includes:
Receiving unit, for receiving the packet of internet-of-things terminal transmission;
Processing unit, the first ciphering unit selected for receiving the user that user is inputted by Man Machine Interface;Call institute
The first ciphering unit is stated the packet is encrypted;
Transmitting element, for the packet after encryption to be sent to Internet of Things access point.
7. device according to claim 6, it is characterised in that the processing unit, be additionally operable to such as the first ciphering unit pair
The packet encryption failure, then call the spare cryptographic unit of the first ciphering unit to the packet encryption.
8. device according to claim 6, it is characterised in that the processing unit is specific, for obtaining the Internet of Things
Terminal sends the signal modulation mode of packet, and key is determined according to the signal modulation mode, calls first encryption single
Working hour is encrypted using packet described in the secret key pair in member.
9. device according to claim 8, it is characterised in that the processing unit, specifically for parsing the packet
The signal modulation mode of the packet is obtained, the signal modulation is inquired from the mapping table of the modulation system and key
Key corresponding to mode.
A kind of 10. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange,
Wherein, the computer program causes computer to perform the method as described in claim any one of 1-5.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710598683.9A CN107483202A (en) | 2017-07-21 | 2017-07-21 | A kind of selection encryption method and device based on Internet of Things repeater |
PCT/CN2017/100754 WO2019015039A1 (en) | 2017-07-21 | 2017-09-06 | Internet of things repeater-based method and apparatus for selective encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710598683.9A CN107483202A (en) | 2017-07-21 | 2017-07-21 | A kind of selection encryption method and device based on Internet of Things repeater |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107483202A true CN107483202A (en) | 2017-12-15 |
Family
ID=60595340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710598683.9A Pending CN107483202A (en) | 2017-07-21 | 2017-07-21 | A kind of selection encryption method and device based on Internet of Things repeater |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107483202A (en) |
WO (1) | WO2019015039A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113014561A (en) * | 2021-02-18 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | Privacy protection method and device for DNS request message |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540960A (en) * | 2009-02-19 | 2009-09-23 | 周向进 | Method of free no-repeater mobile communication |
CN201869219U (en) * | 2010-10-13 | 2011-06-15 | 李畅 | Security control data acquisition device based on Internet-of-things technology |
CN102202296A (en) * | 2010-03-25 | 2011-09-28 | 巴比禄股份有限公司 | Wireless LAN relay device, wireless communication system and method for controlling wireless LAN relay device |
US20160337322A1 (en) * | 2015-05-12 | 2016-11-17 | Samsung Electronics Co., Ltd. | Semiconductor device for managing user data according to security level and method of operating the same |
CN106375390A (en) * | 2016-08-29 | 2017-02-01 | 北京爱接力科技发展有限公司 | Data transmission method, system and apparatus in internet of things |
CN106850797A (en) * | 2017-01-25 | 2017-06-13 | 江苏徐工信息技术股份有限公司 | A kind of communication network and communication means based on Internet of Things communication base station |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605330B (en) * | 2009-07-03 | 2012-11-28 | 中兴通讯股份有限公司 | Method and device for building wireless distribution system connection |
US9451462B2 (en) * | 2014-08-10 | 2016-09-20 | Belkin International Inc. | Setup of multiple IoT network devices |
CN106899562A (en) * | 2016-04-21 | 2017-06-27 | 中国移动通信有限公司研究院 | The secure algorithm negotiation method of Internet of Things, network element and internet-of-things terminal |
-
2017
- 2017-07-21 CN CN201710598683.9A patent/CN107483202A/en active Pending
- 2017-09-06 WO PCT/CN2017/100754 patent/WO2019015039A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540960A (en) * | 2009-02-19 | 2009-09-23 | 周向进 | Method of free no-repeater mobile communication |
CN102202296A (en) * | 2010-03-25 | 2011-09-28 | 巴比禄股份有限公司 | Wireless LAN relay device, wireless communication system and method for controlling wireless LAN relay device |
CN201869219U (en) * | 2010-10-13 | 2011-06-15 | 李畅 | Security control data acquisition device based on Internet-of-things technology |
US20160337322A1 (en) * | 2015-05-12 | 2016-11-17 | Samsung Electronics Co., Ltd. | Semiconductor device for managing user data according to security level and method of operating the same |
CN106375390A (en) * | 2016-08-29 | 2017-02-01 | 北京爱接力科技发展有限公司 | Data transmission method, system and apparatus in internet of things |
CN106850797A (en) * | 2017-01-25 | 2017-06-13 | 江苏徐工信息技术股份有限公司 | A kind of communication network and communication means based on Internet of Things communication base station |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113014561A (en) * | 2021-02-18 | 2021-06-22 | 支付宝(杭州)信息技术有限公司 | Privacy protection method and device for DNS request message |
CN113014561B (en) * | 2021-02-18 | 2022-09-06 | 支付宝(杭州)信息技术有限公司 | Privacy protection method and device for DNS request message |
Also Published As
Publication number | Publication date |
---|---|
WO2019015039A1 (en) | 2019-01-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Heydon et al. | Bluetooth low energy | |
CN103873692B (en) | Method, device and system for resource sharing | |
CN106712932A (en) | Secret key management method, device and system | |
WO2018098633A1 (en) | Data transmission method, data transmission apparatus, electronic device and computer program product | |
CN107786331A (en) | Data processing method, device, system and computer-readable recording medium | |
CN106845256A (en) | A kind of method and terminal of encryption and decryption data in the application | |
EP3293933A1 (en) | Communication content protection | |
CN107846715A (en) | Access point switching method and device of the Internet of Things based on transmission rate | |
CN107547516A (en) | The encryption method at times and device of internet-of-things terminal data | |
Chatzopoulos et al. | Offloading computations to mobile devices and cloudlets via an upgraded NFC communication protocol | |
CN107566336A (en) | The encryption method in order and device of internet-of-things terminal data | |
CN104620617A (en) | Methods and apparatus for authentication | |
CN107370735A (en) | The encryption method at times and device of a kind of Internet of Things REPEATER DATA | |
CN107846683A (en) | Upstream data control extension method and device of the Internet of Things access point based on type | |
CN104244171A (en) | Data transmission system and method on basis of NFC (near field communication) connection | |
CN107483203A (en) | Internet of Things access point receives the encryption method at times and device of data | |
CN107483202A (en) | A kind of selection encryption method and device based on Internet of Things repeater | |
Fraccaroli et al. | Engineering IoT Networks | |
CN107493571A (en) | Upstream data control extension method and device of the Internet of Things repeater based on type | |
CN107493267A (en) | A kind of random encrypting method and device of internet-of-things terminal data | |
CN107302538A (en) | Internet of Things AP receives the subset encryption method and device of data | |
CN107483201A (en) | A kind of selection encryption method and device based on Internet of Things access point | |
CN107360566A (en) | Upstream data control extension method and device of the internet-of-things terminal based on type | |
Winderickx | Energy-efficient and secure implementations for the IoT | |
JP2008131057A (en) | Device and method for generating encryption protocol, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171215 |