CN107566336A - The encryption method in order and device of internet-of-things terminal data - Google Patents
The encryption method in order and device of internet-of-things terminal data Download PDFInfo
- Publication number
- CN107566336A CN107566336A CN201710615793.1A CN201710615793A CN107566336A CN 107566336 A CN107566336 A CN 107566336A CN 201710615793 A CN201710615793 A CN 201710615793A CN 107566336 A CN107566336 A CN 107566336A
- Authority
- CN
- China
- Prior art keywords
- internet
- things terminal
- ciphering unit
- packet
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
This application discloses a kind of encryption method in order of internet-of-things terminal data and device, methods described to comprise the following steps:The internet-of-things terminal obtains the packet for needing to send;The first ciphering unit that the internet-of-things terminal extraction last time encryption uses, the internet-of-things terminal select next ciphering unit i.e. the second ciphering unit of first ciphering unit in order;The internet-of-things terminal calls second ciphering unit that the packet is encrypted;The internet-of-things terminal sends the data after encryption and current time to network side equipment.Technical scheme provided by the invention has the advantages of safe, user experience is high.
Description
Technical field
The application is related to the communications field, more particularly to the encryption method in order and device of a kind of internet-of-things terminal data.
Background technology
Internet of Things is the important component of generation information technology, and the important development stage in " informationization " epoch.
Its English name is:“Internet of things(IoT)”.As its name suggests, Internet of Things is exactly the connected internet of thing thing.This
There is two layers of meaning:First, the core of Internet of Things and basis are still internet, it is extension and extension on Internet basic
Network;Second, its user terminal extends and extend between any article and article, enter row information and exchange and communicate, that is,
Thing thing mutually ceases.Internet of Things is widely used in network by the cognition technology that communicates such as Intellisense, identification technology and general fit calculation
In fusion, also therefore it is referred to as the third wave that world information industry develops after computer, internet.Internet of Things is mutual
The application extension of networking, rather than Internet of Things is network, Internet of Things is business and application.Therefore, application innovation is thing
The core of networking development, the innovation 2.0 using Consumer's Experience as core are the souls of Internet of Things development.
What Internet of Things solved is the data exchange between interconnection and thing thing between thing thing, and existing Internet of Things is being networked
When be based on Internet of Things access point (English:Access point, AP) access internet, have under existing Internet of Things AP multiple
Internet-of-things terminal, data of the Internet of Things AP (i.e. network side equipment) between internet-of-things terminal are not through encryption, so
Easily there is divulging a secret for internet of things equipment, cause privacy of user leaking data, user experience is not high.
The content of the invention
The application provides a kind of encryption method in order of internet-of-things terminal data.The safety of Internet of Things data can be improved
Property, improve Consumer's Experience.
First aspect, there is provided a kind of encryption method in order of internet-of-things terminal data, methods described comprise the following steps:
The internet-of-things terminal obtains the packet for needing to send;
The first ciphering unit that the internet-of-things terminal extraction last time encryption uses, the internet-of-things terminal select in order
Second ciphering unit, second ciphering unit is sequentially comes after first ciphering unit and order and described first
The adjacent ciphering unit of ciphering unit;
The internet-of-things terminal calls second ciphering unit that the packet is encrypted;
The internet-of-things terminal sends the data after encryption to network side equipment.
Optionally, methods described may be used also before the internet-of-things terminal sends the packet after encryption to gateway
With including:
Such as the second ciphering unit fails to the packet encryption, then calls the spare cryptographic list of the second ciphering unit
Member is to the packet encryption.
Optionally, the internet-of-things terminal calls second ciphering unit that the packet is encrypted specifically
Including:
The internet-of-things terminal detection and the signal intensity of the mesh network equipment, are determined secret according to the signal intensity
Key, the packet is encrypted using the second ciphering unit using the key.
Optionally, it is described to determine that key is specific according to the signal intensity, including:
The internet-of-things terminal obtains the grade of signal intensity, and the mapping relations according to grade and key inquire the letter
Key corresponding to the grade of number intensity.
Optionally, it is described to determine that key is specific according to the signal intensity, including:
Internet-of-things terminal obtains signal strength values, and the result that intensity level input preset algorithm is calculated is as secret
Key.
Optionally, it is described to determine key according to the signal intensity, including:
Internet-of-things terminal obtains signal strength values, by the medium education (English of internet-of-things terminal:Media Access
Control, MAC) address conversion is that the absolute value of the intensity level is obtained plus the decimal number and be defined as into decimal number
Key.
Second aspect, there is provided a kind of terminal device of network of things, described device include:
Acquiring unit, for obtaining the packet for needing to send;
Processing unit, the first ciphering unit used for extracting last time encryption, the internet-of-things terminal select in order
Second ciphering unit, second ciphering unit is sequentially comes after first ciphering unit and order and described first
The adjacent ciphering unit of ciphering unit;Call second ciphering unit that the packet is encrypted;
Transmitting element, for the data after encryption to be sent to network side equipment.
Optionally, the processing unit is specific, the packet encryption is failed for such as the second ciphering unit, then
The spare cryptographic unit of the second ciphering unit is called to the packet encryption.
Optionally, the processing unit is specific, for detecting the signal intensity with the mesh network equipment, according to the letter
Number intensity determines key, and the packet is encrypted using the second ciphering unit using the key.
Optionally, the processing unit is specific, and for obtaining the grade of signal intensity, the mapping according to grade and key is closed
System inquires key corresponding to the grade of the signal intensity.
Optionally, the processing unit, specifically for obtaining signal strength values, the intensity level is inputted into preset algorithm meter
Obtained result is as key.
The third aspect, there is provided a kind of computer-readable storage medium, wherein, the computer-readable storage medium can have program stored therein, should
The part of the encryption method in order for any internet-of-things terminal data recorded when program performs including above-mentioned first aspect
Or Overall Steps.
Fourth aspect, there is provided a kind of internet-of-things terminal equipment, the internet-of-things terminal equipment include:One or more processing
Device, memory, bus system, transceiver and one or more programs, the processor, the memory and the transceiver
It is connected by the bus system;Wherein one or more of programs are stored in the memory, one or more journeys
Sequence includes instruction, and instruct makes internet-of-things terminal perform above-mentioned first aspect and first aspect whole when being performed by internet-of-things terminal
Any one in the method provided may be provided.
After the internet-of-things terminal of technical scheme provided by the invention obtains the packet for needing to send, internet-of-things terminal extraction
The first ciphering unit that last time encryption uses, the internet-of-things terminal select next encryption of first ciphering unit in order
Unit is the second ciphering unit, and data are encrypted by the ciphering unit, and for Internet of Things, encryption is arranged on Internet of Things
In network termination, data can be encrypted for this mode, protect the privacy of user, improve the experience of user.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme of the embodiment of the present application, required use in being described below to embodiment
Accompanying drawing be briefly described, it should be apparent that, drawings in the following description are some embodiments of the present application, for this area
For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of network architecture schematic diagram;
Fig. 2 is the transfer process figure that a kind of internet-of-things terminal sends packet to network side (by taking repeater as an example);
Fig. 3 is the flow chart of the encryption method in order of internet-of-things terminal data
Fig. 4 is the technology schematic diagram of a scenario that the embodiment of the application one provides;
Fig. 5 is the mapping relations schematic diagram of the offer of the embodiment of the application one;
Fig. 6 is the flow signal of the encryption method in order for the internet-of-things terminal data that another embodiment of the application provides
Figure;
Fig. 7 is a kind of structural representation for terminal device of network of things that the application provides;
Fig. 8 is a kind of hardware architecture diagram for internet-of-things terminal that the application provides.
Embodiment
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although operations are described as the processing of order by flow chart, therein to be permitted
Multioperation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be rearranged.When it
The processing can be terminated when operation is completed, it is also possible to the additional step being not included in accompanying drawing.The processing
It can correspond to method, function, code, subroutine, subprogram etc..
Alleged within a context " computer equipment ", also referred to as " computer ", referring to can be by running preset program or referring to
Order performs the intelligent electronic device of the predetermined process process such as numerical computations and/or logical calculated, its can include processor with
Memory, the survival that is prestored in memory by computing device are instructed to perform predetermined process process, or by ASIC,
The hardware such as FPGA, DSP perform predetermined process process, or are realized by said two devices combination.Computer equipment includes but unlimited
In server, PC, notebook computer, tablet personal computer, smart mobile phone etc..
Method (some of them are illustrated by flow) discussed hereafter can be by hardware, software, firmware, centre
Part, microcode, hardware description language or its any combination are implemented.Implement when with software, firmware, middleware or microcode
When, to implement the program code of necessary task or code segment can be stored in machine or computer-readable medium and (for example deposit
Storage media) in.(one or more) processor can implement necessary task.
Concrete structure and function detail disclosed herein are only representational, and are for describing showing for the present invention
The purpose of example property embodiment.But the present invention can be implemented by many alternative forms, and it is not interpreted as
It is limited only by the embodiments set forth herein.
Although it should be appreciated that may have been used term " first ", " second " etc. herein to describe unit,
But these units should not be limited by these terms.It is used for the purpose of using these terms by a unit and another unit
Make a distinction.For example, in the case of the scope without departing substantially from exemplary embodiment, it is single that first module can be referred to as second
Member, and similarly second unit can be referred to as first module.Term "and/or" used herein above include one of them or
Any and all combination of more listed associated items.
Term used herein above is not intended to limit exemplary embodiment just for the sake of description specific embodiment.Unless
Context clearly refers else, otherwise singulative used herein above "one", " one " also attempt to include plural number.Should also
When understanding, term " comprising " and/or "comprising" used herein above provide stated feature, integer, step, operation,
The presence of unit and/or component, and do not preclude the presence or addition of other one or more features, integer, step, operation, unit,
Component and/or its combination.
It should further be mentioned that in some replaces realization modes, the function/action being previously mentioned can be according to different from attached
The order indicated in figure occurs.For example, depending on involved function/action, the two width figures shown in succession actually may be used
Substantially simultaneously to perform or can perform in a reverse order sometimes.The present invention is made below in conjunction with the accompanying drawings further
It is described in detail.
A kind of according to an aspect of the invention, there is provided data transmission method for uplink of Internet of Things.Wherein, this method is applied
In internet of things as shown in Figure 1, as shown in figure 1, the internet of things includes:Internet-of-things terminal 10, Internet of Things access point AP20,
Gateway and repeater 40, above-mentioned internet-of-things terminal can have the different forms of expression, such as the thing according to different situations
Networked terminals are specifically as follows:The equipment such as mobile phone, tablet personal computer, computer, certain its can also be included with network savvy
Other equipment, such as intelligent television, intelligent air condition, the terminal device of intelligent kettle or some Internet of Things, above-mentioned internet-of-things terminal
10 are wirelessly connected with repeater 40, and repeater 40 is connected with AP, and its mode connected can be wireless mode, also may be used
Think restricted manner, above-mentioned wireless mode includes but is not limited to:The modes such as bluetooth, WIFI, above-mentioned gateway are specifically as follows, mobile
The equipment such as base station, mobile-relay station, interchanger.It is example in a wired fashion in Fig. 1, represents for convenience, here only with one
Solid line represents.
Above-mentioned gateway 30 can be a PC (English according to the size of Internet of Things:Personal computer,
PC), certainly in actual applications or multiple pc, server or server farm, the specific embodiment of the invention is not
Limit to the specific manifestation form of above-mentioned gateway 30.
Above-mentioned repeater 40 can be plurality of devices according to different scenes, such as mobile phone, intelligent watch etc. equipment.
Refering to Fig. 2, Fig. 2 is the transfer process figure that the data of Internet of Things are sent, wherein, network side equipment using repeater as
Example, as shown in Fig. 2 the flow includes:
Step S201, internet-of-things terminal 10 wirelessly sends the packet for needing to send to relay station 40;
Step S202, relay station forwards the packet to Internet of Things access point;
Step S203, Internet of Things access point transmits packet to gateway.
By above-mentioned Fig. 1 and Fig. 2 expression, in the actual transmissions of packet, if internet-of-things terminal and repeater it
Between divulge a secret, then for transmission packet due to it is no pass through corresponding encryption, so easilying lead to data
Leakage, easily there is safety issue.
Refering to Fig. 3, Fig. 3 is a kind of encryption method in order of internet-of-things terminal data provided by the invention, and this method exists
Realized under network architecture as shown in Figure 4, as shown in figure 4, multiple internet-of-things terminals can be connected under a repeater 40, in this
Can be to open the mobile phone of focus, the PC that wireless connection is provided, forwarding unit etc., this method such as Fig. 3 institutes after implement body
Show, comprise the following steps:
Step S301, internet-of-things terminal obtains packet to be sent;
Internet-of-things terminal in above-mentioned steps S301 is specifically as follows:The equipment such as mobile phone, tablet personal computer, computer, certainly
It can also include the other equipment with network savvy, such as intelligent television, intelligent air condition, intelligent kettle, intelligent lamp, intelligence
The smart machine of switch or some Internet of Things.
Step S302, the first ciphering unit that Internet of Things extraction last time encryption uses, the internet-of-things terminal select in order
Selecting next ciphering unit i.e. the second ciphering unit of first ciphering unit, (i.e. described internet-of-things terminal selects second in order
Ciphering unit, second ciphering unit are sequentially to come first ciphering unit afterwards and sequentially encrypted with described first
The adjacent ciphering unit of unit).
The each producer of type of internet-of-things terminal in above-mentioned steps S302 can be configured according to situation voluntarily, example
Such as, the internet-of-things terminal can specifically include:Intelligent electric lamp, intelligent television, intelligent cleaning equipment, intelligent sleep equipment, intelligence
Monitoring device etc., its form showed can be varied, such as intelligent electric lamp, the intelligent electric lamp includes but unlimited
In:The equipment such as intelligent desk lamp, intelligent ceiling lamp, intelligent wall lamp, such as intelligent television, it can be Samsung board intelligence
TV, it can also be Sharp's board intelligent television certainly, such as intelligent cleaning equipment, it can be, intelligent floor-sweeping
Robot, it can also include the equipment such as intellective dust collector, intelligent garbage processor certainly, such as come for intelligent sleep equipment
Say, it can be:The equipment such as intelligent mattress, intelligent sofa, such as intelligent monitoring device or, it can be, intelligent blood
Pressure meter, intelligent thermometer etc., the present invention is not limited the concrete form and quantity or species of above-mentioned internet-of-things terminal.
Ciphering unit in above-mentioned steps can be as shown in Figure 5.
Ciphering unit in above-mentioned steps S302 is specifically as follows the hardware ciphering unit for being arranged on internet-of-things terminal, and it is wrapped
The AES set containing factory pre-sets, certainly in actual applications, above-mentioned ciphering unit can also be that configuration is whole in Internet of Things
Software encryption unit in end, the present invention are not intended to limit the specific manifestation form of above-mentioned ciphering unit.
Above-mentioned AES includes but is not limited to:Triple DEA block encryption (English:riple Data
Encryption Algorithm, 3DES), Message Digest 5 (English:Message Digest Algorithm, MD5) or
The AESs such as RSA (Rivest, Shamir, Adleman), the present invention do not limit to specific AES.Such as 3DES is
The common name of triple DEA block encryptions.It is the equal of using des encryption algorithm three times to each data block.Due to meter
The enhancing of calculation machine operational capability, the key length of master DES passwords become easily by Brute Force;3DES is to be designed to carry
For a kind of relatively simple method, the i.e. attack by increasing DES key length to avoid similar.
Step S303, internet-of-things terminal calls second ciphering unit that the packet is encrypted;
Above-mentioned steps S303 implementation method is specifically as follows:
For example, the second ciphering unit is 3DES encryption unit, then internet-of-things terminal calls 3DES encryption unit to packet
Carry out 3DES encryption processing.Such as second ciphering unit be RAS ciphering units, then internet-of-things terminal call RAS ciphering units pair
Packet carries out RAS encryptions.Such as second ciphering unit be md5 encryption unit, then internet-of-things terminal call md5 encryption list
Member carries out md5 encryption processing to packet.
The concrete mode of above-mentioned encryption may refer to 3DES, RSA and MD5 associated description, repeat no more here.
Above-mentioned steps S303 implementation method is specifically as follows:
Internet-of-things terminal calls the second ciphering unit that the packet is encrypted, and such as encrypts successfully, carries out follow-up
Step S304, such as encrypts unsuccessful, then calls the spare cryptographic unit of the second ciphering unit that the packet is encrypted,
The packet header extended field of the packet after encryption will be added to using spare cryptographic unit marks.
Step S304, internet-of-things terminal sends the data after encryption to network side equipment.
Above-mentioned steps S304 implementation method can be:
The mode that internet-of-things terminal sends packet to internet-of-things terminal in above-mentioned steps S304 can be by wirelessly connecting
The mode connect sends packet, and the wireless mode includes but is not limited to:Bluetooth, Wireless Fidelity (English:Wireless
Fidelity, WIFI) or the wireless mode such as Zigbee, wherein, above-mentioned WIFI needs the standard in accordance with IEEE802.11b.
It should be noted that Internet of Things and internet-of-things terminal here be only just for wireless internet of things terminal, because
For for Internet of Things, the number of devices that it is accessed is numerous, for internet-of-things terminal, if by wired connection, it is first
The access quantity of first internet-of-things terminal can limit, and for family, with wired connection, for domestic consumer's
It can not imagine for wiring, this wired cost is also very high in addition, so the middle Internet of Things in technical scheme
Connection between network termination and internet-of-things terminal only limits wireless connection.
According to the method provided such as Fig. 3, after internet-of-things terminal obtains the packet for needing to send, internet-of-things terminal is by suitable
It is the second ciphering unit that sequence, which selects the latter ciphering unit of ciphering unit used above, passes through the second ciphering unit logarithm
According to being encrypted, for Internet of Things, without being configured to encryption, all encryptions are set in Internet of Things network side equipment
In network termination, so it has safe, the experience of user is improved.
Refering to Fig. 6, Fig. 6 is a kind of encryption method in order of internet-of-things terminal data provided by the invention, and this method exists
Realized under network architecture as shown in Figure 4, as shown in figure 4, multiple internet-of-things terminals can be connected under an Internet of Things repeater,
The Internet of Things repeater is specifically as follows the equipment such as the mobile phone for opening focus, the PC for providing wireless connection, and this method is such as
Shown in Fig. 6, comprise the following steps:
Step S601, internet-of-things terminal obtains the packet for needing to send;
Internet-of-things terminal in above-mentioned steps S601 is specifically as follows:The equipment such as mobile phone, tablet personal computer, computer, certainly
It can also include the other equipment with network savvy, such as intelligent television, intelligent air condition, intelligent kettle, intelligent lamp, intelligence
The smart machine of switch or some Internet of Things.
Step S602, the first ciphering unit that internet-of-things terminal extraction last time encryption uses, the internet-of-things terminal is by suitable
Sequence selects the second ciphering unit, and second ciphering unit is sequentially comes after first ciphering unit and sequentially and institute
State the adjacent ciphering unit of the first ciphering unit;Call second ciphering unit that the packet is encrypted.
The each producer of type of internet-of-things terminal in above-mentioned steps S602 can be configured according to situation voluntarily, example
Such as, the internet-of-things terminal can specifically include:Intelligent electric lamp, intelligent television, intelligent cleaning equipment, intelligent sleep equipment, intelligence
Monitoring device etc., its form showed can be varied, such as intelligent electric lamp, the intelligent electric lamp includes but unlimited
In:The equipment such as intelligent desk lamp, intelligent ceiling lamp, intelligent wall lamp, such as intelligent television, it can be Samsung board intelligence
TV, it can also be Sharp's board intelligent television certainly, such as intelligent cleaning equipment, it can be, intelligent floor-sweeping
Robot, it can also include the equipment such as intellective dust collector, intelligent garbage processor certainly, such as come for intelligent sleep equipment
Say, it can be:The equipment such as intelligent mattress, intelligent sofa, such as intelligent monitoring device or, it can be, intelligent blood
Pressure meter, intelligent thermometer etc., the present invention is not limited the concrete form and quantity or species of above-mentioned internet-of-things terminal.
Period in above-mentioned steps with ciphering unit mapping table as shown in figure 5, above-mentioned mapping can be to map one by one, when
Can also be so the modes such as one-to-many mapping.
Ciphering unit in above-mentioned steps S602 is specifically as follows the hardware ciphering unit for being arranged on Internet of Things repeater, its
The AES set comprising factory pre-sets, certainly in actual applications, above-mentioned ciphering unit can also be configuration in Internet of Things
Software encryption unit in repeater, the present invention are not intended to limit the specific manifestation form of above-mentioned ciphering unit.
Above-mentioned AES includes but is not limited to:Triple DEA block encryption (English:riple Data
Encryption Algorithm, 3DES), Message Digest 5 (English:Message Digest Algorithm, MD5) or
The AESs such as RSA (Rivest, Shamir, Adleman), the present invention do not limit to specific AES.Such as 3DES is
The common name of triple DEA block encryptions.It is the equal of using des encryption algorithm three times to each data block.Due to meter
The enhancing of calculation machine operational capability, the key length of master DES passwords become easily by Brute Force;3DES is to be designed to carry
For a kind of relatively simple method, the i.e. attack by increasing DES key length to avoid similar.
Step S603, internet-of-things terminal detection and the signal intensity of the mesh network equipment, it is true according to the signal intensity
Determine key, the packet is encrypted using the second ciphering unit using the key;
Optionally, it is described to determine that key is specific according to the signal intensity, including:
The internet-of-things terminal obtains the grade of signal intensity, and the mapping relations according to grade and key inquire the letter
Key corresponding to the grade of number intensity.Specifically for example, the corresponding key 1 of signal strength scale 1,5 corresponding key of signal strength scale
5。
Optionally, it is described to determine that key is specific according to the signal intensity, including:
Internet-of-things terminal obtains signal strength values, and the result that intensity level input preset algorithm is calculated is as secret
Key.Above-mentioned preset algorithm includes but is not limited to:Key=LSB 16bit SHA-256 (intensity level binary number | | MAC).Wherein
LSB represents to take least significant bit (LSB).
Optionally, it is described to determine key according to the signal intensity, including:
Internet-of-things terminal obtains signal strength values, the MAC Address of internet-of-things terminal is converted into decimal number, by the intensity
The absolute value of value adds that the decimal number obtains and is defined as key.
Above-mentioned steps S603 implementation method is specifically as follows:
For example, the second ciphering unit is 3DES encryption unit, then internet-of-things terminal calls 3DES encryption unit to packet
Carry out 3DES encryption processing.Such as second ciphering unit be RAS ciphering units, then internet-of-things terminal call RAS ciphering units pair
Packet carries out RAS encryptions.Such as second ciphering unit be md5 encryption unit, then internet-of-things terminal call md5 encryption list
Member carries out md5 encryption processing to packet.
The concrete mode of above-mentioned encryption may refer to 3DES, RSA and MD5 associated description, repeat no more here.
Above-mentioned steps S603 implementation method is specifically as follows:
Internet-of-things terminal calls the second ciphering unit that the packet is encrypted, and such as encrypts successfully, carries out follow-up
Step S304, such as encrypts unsuccessful, then calls the spare cryptographic unit of the second ciphering unit that the packet is encrypted,
The packet header extended field of the packet after encryption will be added to using spare cryptographic unit marks.
Step S604, the packet after encryption is carried to send to Internet of Things in the load of frame and connect by internet-of-things terminal
Access point.
Above-mentioned steps S604 implementation method can be:
Internet-of-things terminal sends packet to Internet of Things repeater (one kind of network side equipment) in above-mentioned steps S604
Mode can be that packet is sent by way of wireless connection, and the wireless mode includes but is not limited to:Bluetooth, Wireless Fidelity
(English:Wireless Fidelity, WIFI) or the wireless mode such as Zigbee, wherein, above-mentioned WIFI needs to observe
IEEE802.11b standard.
It should be noted that Internet of Things and internet-of-things terminal here be only just for wireless internet of things terminal, because
For for Internet of Things, the number of devices that it is accessed is numerous, for internet-of-things terminal, if by wired connection, it is first
The access quantity of first internet-of-things terminal can limit, and for family, with wired connection, for domestic consumer's
It can not imagine for wiring, this wired cost is also very high in addition, so the middle Internet of Things in technical scheme
Connection between network termination and Internet of Things repeater only limits wireless connection.
The technical solution adopted by the present invention has the advantages of safe.
Optionally, the above method can also include before step S604:
The internet-of-things terminal calls the second ciphering unit encryption unsuccessful, and the internet-of-things terminal calling second adds
The packet is encrypted the spare cryptographic unit of close unit, will be added to encryption using spare cryptographic unit marks
The packet header extended field of packet after processing.
Refering to Fig. 7, Fig. 7 is a kind of terminal device of network of things 700, above-mentioned terminal device of network of things 700 be specifically as follows as
Internet-of-things terminal shown in Fig. 3 or Fig. 6, technical term and definition in above-mentioned terminal device of network of things may refer to such as Fig. 3
Or the definition shown in Fig. 6, described device include:
Acquiring unit 701, for obtaining the packet for needing to send;
Processing unit 702, the first ciphering unit used for extracting last time encryption, select the second encryption single in order
Member, second ciphering unit is sequentially comes after first ciphering unit and order and the first ciphering unit phase
Adjacent ciphering unit;Call second ciphering unit that the packet is encrypted;
Transmitting element 703, for the data after encryption and current time to be sent to network side equipment.
Optionally, processing unit 702 is specific, the packet encryption is failed for such as the second ciphering unit, then
The spare cryptographic unit of the second ciphering unit is called to the packet encryption.
Optionally, processing unit 702 is specific, for detecting the signal intensity with the mesh network equipment, according to the letter
Number intensity determines key, and the packet is encrypted using the second ciphering unit using the key.
Optionally, the processing unit is specific, and for obtaining the grade of signal intensity, the mapping according to grade and key is closed
System inquires key corresponding to the grade of the signal intensity.
Optionally, the processing unit, specifically for obtaining signal strength values, the intensity level is inputted into preset algorithm meter
Obtained result is as key.
The present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can have program stored therein, the journey
Sequence perform when including above-mentioned first aspect record any internet-of-things terminal data encryption method in order part or
Overall Steps.
Refering to Fig. 8, Fig. 8 is a kind of internet-of-things terminal 800 provided by the invention, and the internet-of-things terminal can be to be deployed in mutually
A node in networked system, internet system can also include:Internet of Things repeater, Internet of Things access point, Internet of Things are whole
End and gateway, the internet-of-things terminal 800 include but is not limited to:The equipment such as computer, server, as shown in figure 8, the Internet of Things is whole
End 800 includes:Processor 801, memory 802, transceiver 803 and bus 804.Transceiver 803 be used for external equipment (such as
Other equipment in interacted system, include but is not limited to:Repeater, equipment of the core network etc.) between transceiving data.Internet-of-things terminal
The quantity of processor 801 in 800 can be one or more.In some embodiments of the present application, processor 801, memory
802 can be connected with transceiver 803 by bus system or other modes.The implication for the term being related on the present embodiment and act
Example, may be referred to embodiment corresponding to Fig. 3 or Fig. 6, here is omitted.
Wherein, can be with store program codes in memory 802.Processor 801 is used to call the journey stored in memory 802
Sequence code, for performing following operation:
Transceiver 803, for obtaining the packet for needing to send;
Processor 801, the first ciphering unit used for extracting last time encryption, selects the second ciphering unit in order,
Second ciphering unit is afterwards and sequentially adjacent with first ciphering unit sequentially to come first ciphering unit
Ciphering unit;Call second ciphering unit that the packet is encrypted.
Transceiver 803, it is additionally operable to carry the packet after encryption and the current time and is sent out in the load of frame
Deliver to Internet of Things access point.
Optionally, processor 801, transceiver 803, can be also used for performing the step as in Fig. 3 or as shown in Figure 6 embodiments
Rapid and step refinement scheme and alternative.
It should be noted that processor 801 here can be a treatment element or multiple treatment elements
It is referred to as.For example, the treatment element can be central processing unit (Central Processing Unit, CPU) or spy
Determine integrated circuit (Application Specific Integrated Circuit, ASIC), or be arranged to implement this
Apply for one or more integrated circuits of embodiment, such as:One or more microprocessors (digital singnal
Processor, DSP), or, one or more field programmable gate array (Field Programmable Gate Array,
FPGA)。
Memory 803 can be the general designation of a storage device or multiple memory elements, and for storing and can hold
Parameter, data etc. required for line program code or the operation of application program running gear.And memory 903 can include random storage
Device (RAM), nonvolatile memory (non-volatile memory), such as magnetic disk storage, flash memory can also be included
(Flash) etc..
Bus 804 can be that industry standard architecture (Industry Standard Architecture, ISA) is total
Line, external equipment interconnection (Peripheral Component, PCI) bus or extended industry-standard architecture (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, control
Bus processed etc..For ease of representing, only represented in Fig. 8 with a thick line, it is not intended that an only bus or a type of
Bus.
The user equipment can also include input/output unit, be connected to bus 804, to pass through bus and processor 801
Connected etc. other parts.The input/output unit can provide an inputting interface for operating personnel, so that operating personnel pass through this
Inputting interface selects item of deploying to ensure effective monitoring and control of illegal activities, and can also be other interfaces, can pass through the external miscellaneous equipment of the interface.
It should be noted that for foregoing each embodiment of the method, in order to be briefly described, therefore it is all expressed as to a system
The combination of actions of row, but those skilled in the art should know, the application is not limited by described sequence of movement, because
For according to the application, certain some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should
Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily this Shen
Please be necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiment
Part, may refer to the associated description of other embodiment.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English
Text:Random Access Memory, referred to as:RAM), disk or CD etc..
The content download method and relevant device that are there is provided above the embodiment of the present application, system are described in detail,
Specific case used herein is set forth to the principle and embodiment of the application, and the explanation of above example is simply used
Understand the present processes and its core concept in help;Meanwhile for those of ordinary skill in the art, according to the application's
Thought, there will be changes in specific embodiments and applications, in summary, this specification content should not be construed as
Limitation to the application.
Claims (10)
1. a kind of encryption method in order of internet-of-things terminal data, it is characterised in that methods described comprises the following steps:
The internet-of-things terminal obtains the packet for needing to send;
The first ciphering unit that the internet-of-things terminal extraction last time encryption uses, the internet-of-things terminal select second in order
Ciphering unit, second ciphering unit are sequentially to come first ciphering unit afterwards and sequentially encrypted with described first
The adjacent ciphering unit of unit;
The internet-of-things terminal calls second ciphering unit that the packet is encrypted;
The internet-of-things terminal sends the data after encryption to network side equipment.
2. according to the method for claim 1, it is characterised in that methods described is after the internet-of-things terminal is by encryption
Packet send to can also include before gateway:
Such as the second ciphering unit fails to the packet encryption, then calls the spare cryptographic unit pair of the second ciphering unit
The packet encryption.
3. according to the method for claim 1, it is characterised in that the internet-of-things terminal calls second ciphering unit pair
The packet, which is encrypted, to be specifically included:
The internet-of-things terminal detection and the signal intensity of the mesh network equipment, determine key according to the signal intensity, adopt
The packet is encrypted using the second ciphering unit with the key.
4. according to the method for claim 3, it is characterised in that described to determine that key is specific according to the signal intensity, bag
Include:
The internet-of-things terminal obtains the grade of signal intensity, and it is strong that the mapping relations according to grade and key inquire the signal
Key corresponding to the grade of degree.
5. according to the method for claim 3, it is characterised in that described to determine that key is specific according to the signal intensity, bag
Include:
Internet-of-things terminal obtains signal strength values, and the result that intensity level input preset algorithm is calculated is as key.
6. a kind of terminal device of network of things, it is characterised in that described device includes:
Acquiring unit, for obtaining the packet for needing to send;
Processing unit, the first ciphering unit used for extracting last time encryption, selects the second ciphering unit in order, and described the
Two ciphering units are sequentially to come the encryption that after first ciphering unit and order is adjacent with first ciphering unit
Unit;Call second ciphering unit that the packet is encrypted;
Transmitting element, for the data after encryption to be sent to network side equipment.
7. device according to claim 6, it is characterised in that the processing unit is specific, for such as the second ciphering unit
The packet encryption is failed, then call the spare cryptographic unit of the second ciphering unit to the packet encryption at
Reason.
8. device according to claim 6, it is characterised in that the processing unit is specific, for detecting and the network
The signal intensity of net equipment, key is determined according to the signal intensity, using the key using the second ciphering unit to described
Packet is encrypted.
9. device according to claim 8, it is characterised in that the processing unit is specific, for obtaining signal intensity
Grade, according to grade key corresponding with the grade that the mapping relations of key inquire the signal intensity.
A kind of 10. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange,
Wherein, the computer program causes computer to perform the method as described in claim any one of 1-5.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710615793.1A CN107566336A (en) | 2017-07-26 | 2017-07-26 | The encryption method in order and device of internet-of-things terminal data |
PCT/CN2017/100812 WO2019019282A1 (en) | 2017-07-26 | 2017-09-07 | Method for internet of things terminal to sequentially encrypt data, and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710615793.1A CN107566336A (en) | 2017-07-26 | 2017-07-26 | The encryption method in order and device of internet-of-things terminal data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107566336A true CN107566336A (en) | 2018-01-09 |
Family
ID=60973862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710615793.1A Pending CN107566336A (en) | 2017-07-26 | 2017-07-26 | The encryption method in order and device of internet-of-things terminal data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107566336A (en) |
WO (1) | WO2019019282A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112543452A (en) * | 2020-11-23 | 2021-03-23 | 广州技象科技有限公司 | Data skip transmission selection method and device based on signal transmission safety management |
CN113992427A (en) * | 2020-12-23 | 2022-01-28 | 技象科技(浙江)有限公司 | Data encryption sending method and device based on adjacent nodes |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113890766B (en) * | 2021-11-08 | 2024-04-09 | 南方电网数字电网科技(广东)有限公司 | Power equipment authentication method, device, server and system based on Internet of things and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102244861A (en) * | 2011-08-14 | 2011-11-16 | 北京理工大学 | Method for generating symmetric keys based on random state of wireless channel |
US20160044001A1 (en) * | 2014-08-11 | 2016-02-11 | Intel Corporation | Network-enabled device provisioning |
CN106250770A (en) * | 2015-06-03 | 2016-12-21 | 三星电子株式会社 | For to the electronic equipment of content-encrypt and method |
CN106899562A (en) * | 2016-04-21 | 2017-06-27 | 中国移动通信有限公司研究院 | The secure algorithm negotiation method of Internet of Things, network element and internet-of-things terminal |
CN106961449A (en) * | 2017-05-24 | 2017-07-18 | 重庆和贯科技有限公司 | Internet of things data transmission method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101459510B (en) * | 2007-12-14 | 2012-06-27 | 成都市华为赛门铁克科技有限公司 | Implementation method and device for real-time transmission data encryption algorithm |
CN104052742A (en) * | 2014-06-11 | 2014-09-17 | 上海康煦智能科技有限公司 | Internet of things communication protocol capable of being encrypted dynamically |
CN104935433B (en) * | 2015-03-13 | 2018-11-16 | 天地融科技股份有限公司 | Method, communication device and the communication system of key jump in a kind of communication process |
-
2017
- 2017-07-26 CN CN201710615793.1A patent/CN107566336A/en active Pending
- 2017-09-07 WO PCT/CN2017/100812 patent/WO2019019282A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102244861A (en) * | 2011-08-14 | 2011-11-16 | 北京理工大学 | Method for generating symmetric keys based on random state of wireless channel |
US20160044001A1 (en) * | 2014-08-11 | 2016-02-11 | Intel Corporation | Network-enabled device provisioning |
CN106250770A (en) * | 2015-06-03 | 2016-12-21 | 三星电子株式会社 | For to the electronic equipment of content-encrypt and method |
CN106899562A (en) * | 2016-04-21 | 2017-06-27 | 中国移动通信有限公司研究院 | The secure algorithm negotiation method of Internet of Things, network element and internet-of-things terminal |
CN106961449A (en) * | 2017-05-24 | 2017-07-18 | 重庆和贯科技有限公司 | Internet of things data transmission method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112543452A (en) * | 2020-11-23 | 2021-03-23 | 广州技象科技有限公司 | Data skip transmission selection method and device based on signal transmission safety management |
CN112543452B (en) * | 2020-11-23 | 2023-06-27 | 广州技象科技有限公司 | Data skip selection method and device based on signal transmission safety management |
CN113992427A (en) * | 2020-12-23 | 2022-01-28 | 技象科技(浙江)有限公司 | Data encryption sending method and device based on adjacent nodes |
CN113992427B (en) * | 2020-12-23 | 2023-08-25 | 技象科技(南京)有限公司 | Data encryption sending method and device based on adjacent nodes |
Also Published As
Publication number | Publication date |
---|---|
WO2019019282A1 (en) | 2019-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103873692B (en) | Method, device and system for resource sharing | |
CN107113162B (en) | The system and method for multivalue packing scheme for homomorphic cryptography | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
CN104702665A (en) | Information sharing method and information sharing device | |
CN107566336A (en) | The encryption method in order and device of internet-of-things terminal data | |
CN107547516A (en) | The encryption method at times and device of internet-of-things terminal data | |
CN104700003B (en) | A kind of file shell adding and hulling method, apparatus and system | |
CN105306677A (en) | Method, apparatus and system for controlling intelligent device | |
CN105978929A (en) | Method and system for data interaction between different mobile terminal platforms and back-end server | |
CN107484214A (en) | Internet of Things access point frequency point selecting method and device | |
CN107770087A (en) | Router switching method and device of the Internet of Things based on connection quantity | |
CN107370735A (en) | The encryption method at times and device of a kind of Internet of Things REPEATER DATA | |
CN107483203A (en) | Internet of Things access point receives the encryption method at times and device of data | |
CN108718302A (en) | A kind of synchronous method of Message Record, device and equipment | |
CN113452649B (en) | Secure multiparty computing method, device, system and storage medium | |
CN107493267A (en) | A kind of random encrypting method and device of internet-of-things terminal data | |
CN106597873A (en) | Method, device and system for carrying out remote maintenance of automation equipment | |
CN104821982A (en) | Data recovery method | |
WO2018053895A1 (en) | Type-based uplink data encryption control method and device for internet-of-things access point | |
CN107483202A (en) | A kind of selection encryption method and device based on Internet of Things repeater | |
CN107302538A (en) | Internet of Things AP receives the subset encryption method and device of data | |
CN107483201A (en) | A kind of selection encryption method and device based on Internet of Things access point | |
CN107360566A (en) | Upstream data control extension method and device of the internet-of-things terminal based on type | |
CN105227411A (en) | The method of test interface, network agent and system | |
CN107493571A (en) | Upstream data control extension method and device of the Internet of Things repeater based on type |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |
|
RJ01 | Rejection of invention patent application after publication |