CN110035069A - A kind of Internet of Things information safety protecting method - Google Patents

A kind of Internet of Things information safety protecting method Download PDF

Info

Publication number
CN110035069A
CN110035069A CN201910197334.5A CN201910197334A CN110035069A CN 110035069 A CN110035069 A CN 110035069A CN 201910197334 A CN201910197334 A CN 201910197334A CN 110035069 A CN110035069 A CN 110035069A
Authority
CN
China
Prior art keywords
data
encryption
segmentation
segment
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910197334.5A
Other languages
Chinese (zh)
Other versions
CN110035069B (en
Inventor
杨欢
张玉磊
刘鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanya Tal Investment Partnership LP
Original Assignee
Henan Gaotong Internet Of Things Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Gaotong Internet Of Things Co Ltd filed Critical Henan Gaotong Internet Of Things Co Ltd
Priority to CN201910197334.5A priority Critical patent/CN110035069B/en
Publication of CN110035069A publication Critical patent/CN110035069A/en
Application granted granted Critical
Publication of CN110035069B publication Critical patent/CN110035069B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

The present invention discloses a kind of Internet of Things information safety protecting method; include the following steps: that data sending terminal generates data and reads incoming end model, identification sequence number, encryption table and current time end to end; correspond to current time and encryption table end to end; and generate just encryption data; first encryption data is encrypted again by SCB2 algorithm, to obtain re-encrypting data.The Internet of Things information safety protecting method; by the utilization for encrypting table, current time and SCB2 algorithm end to end; further increase the safety of data; strengthen protection effect; it is sent after being segmented data by the way of segmentation; and every segment data is examined respectively and reporting an error respectively; without integrally being transmitted data again when to which error in data occurs; it improves work efficiency, records after the exploratory detection data issued by third party and malicious data is analyzed well in time with this.

Description

A kind of Internet of Things information safety protecting method
Technical field
The present invention relates to internet of things field, specially a kind of Internet of Things information safety protecting method.
Background technique
Internet of Things is the important component of generation information technology and the important development stage of information age, is cared for Name Si Yi, Internet of Things are exactly the connected internet of object object, and application innovation is the core of Internet of Things development, in the application of Internet of Things, It needs to carry out protection operation to the transmission of data using Internet of Things information safety protecting method.
Traditional Internet of Things information safety protecting method, Encryption Algorithm is too simple, and protecting effect is bad, if while data It then needs to carry out entirety to data in the presence of mistake to transmit again, working efficiency is low, and is difficult to well carry out malicious data Record and analysis, use while reducing working efficiency to user are made troubles.
Summary of the invention
(1) the technical issues of solving
In view of the deficiencies of the prior art, the present invention provides a kind of Internet of Things information safety protecting method, Internet of Things are solved Net information safety protecting method Encryption Algorithm is too simple, and protecting effect is bad, while mistake then needs logarithm to data if it exists It is transmitted again according to entirety is carried out, working efficiency is low, and is difficult to the problem of malicious data is recorded and analyzed well.
(2) technical solution
In order to achieve the above object, the present invention is achieved by the following technical programs: a kind of Internet of Things information safety protection Method, which comprises the steps of:
S1, data generate: data sending terminal generates data and reads incoming end model, identification sequence number, encryption table end to end And current time;
S2, data just encrypt: corresponding to current time and encryption table end to end, and generate just encryption data;
S3, data re-encrypt: first encryption data being encrypted again by SCB2 algorithm, to obtain re-encrypting number According to;
S4, data sectional: re-encrypting data is divided into three preceding segmentation, middle segmentation and rear segmentation segmentations;
S5, segmental machining prepare: reading segmentation table end to end, and randomly choose and be segmented a certain cell in table end to end, read Its corresponding final value, fragment header numerical value and segmentation mantissa value;
S6, segmental machining: preceding segment data, middle segment data and rear segment data are generated respectively;
S7, data transmission: preceding segment data, middle segment data and rear segment data are successively sent to receiving end;
S8, segmentation are examined: successively by the fragment header data of preceding segment data, middle segment data and rear segment data, segmentation Mantissa's evidence and final value take out simultaneously corresponding segments, and table checks whether correctly, step S9 to be carried out if correct, if incorrect send out end to end Transmit signal again out, data sending terminal receives transmit signal again after corresponding segmentation retransmitted according to corresponding segment serial number Data, data receiver re-start step S8 after receiving new corresponding segments data;
S9, algorithm decryption: after data obtained in step S8 are taken out corresponding segments, three segment datas are integrated and is led to Crossing the decryption of SCB2 algorithm becomes first encryption data;
S10, removal encryption head, encryption tail: by first encryption data, according to current time therein and encryption, table is tested end to end Whether card encryption head, encryption tail are correct, if correct take out transmission data, and control corresponding mechanism according to transmission data and are corresponded to Operation, if encryption head, encryption tail it is incorrect if be not responding to, and record be not responding to data and its receiving time.
Preferably, in S1, sheet format is as follows end to end for the encryption: row: the hour numerical value of current time;Column: when current Between minute numerical value;Cell: the numerical value of head and the numerical value of encryption tail are encrypted.
Preferably, in S2, the just encryption data format are as follows: encryption head+transmission data+encryption tail;Encrypt head format Are as follows: incoming end model+identification number+encryption head numerical value+current time;Encrypt tail format are as follows: incoming end model+identification number+ Encrypt mantissa value+current time.
Preferably, in S4, the length of the re-encrypting data is fixed value, therefore the length of three segmentations is to fix Value.
Preferably, in S5, table is as follows end to end for the segmentation: row: fragment header numerical value;Column: segmentation mantissa value;Unit Lattice: final value.
Preferably, in S6, the preceding segment data format are as follows: fragment header numerical value+preceding segmentation+segmentation mantissa value+final value+right Answer a section serial number;Middle segment data format are as follows: fragment header numerical value+middle segmentation+segmentation mantissa value+final value+corresponding segment serial number;After be segmented Data format are as follows: fragment header numerical value+rear segmentation+segmentation mantissa value+final value+corresponding segment serial number;Wherein corresponding segment serial number is used for Distinguish preceding segment data, the specific numbers of middle segment data and rear segment data.
Preferably, described to transmit signal format again in S8 are as follows: corresponding segment serial number+error code.
(3) beneficial effect
The present invention provides a kind of Internet of Things information safety protecting methods.Have it is following the utility model has the advantages that
The Internet of Things information safety protecting method, by encrypting the utilization of table, current time and SCB2 algorithm end to end, into One step increases the safety of data, strengthens protection effect, sends after being segmented data by the way of segmentation, and right Every segment data is examined respectively and reporting an error respectively, thus without integrally being transmitted data again when error in data occurs, It improves work efficiency, is recorded in time with this after the exploratory detection data issued by third party well to malicious data Being analyzed (since recorded data is examined by segmentation, can be very good to distinguish other signals and malice is believed Number).
Specific embodiment
Described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the present invention In embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
A kind of Internet of Things information safety protecting method, which comprises the steps of:
S1, data generate: data sending terminal generates data and reads incoming end model, identification sequence number, encryption table end to end (table is as follows end to end for encryption: row: the hour numerical value of current time with current time;Column: the minute numerical value of current time;Unit Lattice: the numerical value of head and the numerical value of encryption tail are encrypted), wherein incoming end model, the length of identification sequence number are three bytes (two 14) binary system ordered series of numbers, the hour numerical value of current time and the minute numerical value of current time are five bytes (40 Position) binary system ordered series of numbers;
S2, data just encrypt: corresponding to current time and encryption table end to end, and generate just encryption data (first encryption data lattice Formula are as follows: encryption head+transmission data+encryption tail;Encrypt head format are as follows: incoming end model+identification number+encryption head numerical value+current Time;Encrypt tail format are as follows: incoming end model+identification number+encryption mantissa value+current time), wherein encryption head and encryption tail It is the binary system ordered series of numbers of five bytes (40);
S3, data re-encrypt: first encryption data being encrypted again by SCB2 algorithm, to obtain re-encrypting number According to;
S4, data sectional: re-encrypting data is divided into preceding segmentation, three segmentations of middle segmentation and rear segmentation (re-encrypt number According to length be fixed value, therefore three segmentation length be fixed value);
S5, segmental machining prepare: reading segmentation table end to end, and randomly choose and be segmented a certain cell in table end to end, read (table is as follows end to end for segmentation: row: fragment header numerical value for its corresponding final value, fragment header numerical value and segmentation mantissa value;Column: segmentation tail Numerical value;Cell: final value), wherein final value is the binary system ordered series of numbers of three bytes (24);
S6, segmental machining: preceding segment data, middle segment data and rear segment data (preceding segment data format are generated respectively Are as follows: fragment header numerical value+preceding segmentation+segmentation mantissa value+final value+corresponding segment serial number;Middle segment data format are as follows: fragment header numerical value+ Middle segmentation+segmentation mantissa value+final value+corresponding segment serial number;Segment data format afterwards are as follows: fragment header numerical value+rear segmentation+segmentation mantissa Value+final value+corresponding segment serial number;Wherein corresponding segment serial number is for distinguishing preceding segment data, middle segment data and rear segment data Specific numbers), wherein fragment header numerical value, segmentation mantissa value and corresponding segment serial number be four bytes (32) two into Ordered series of numbers processed;
S7, data transmission: preceding segment data, middle segment data and rear segment data are successively sent to receiving end;
S8, segmentation are examined: successively by the fragment header data of preceding segment data, middle segment data and rear segment data, segmentation Mantissa's evidence and final value take out simultaneously corresponding segments, and table checks whether correctly, step S9 to be carried out if correct, if incorrect send out end to end Transmit signal again out, data sending terminal receives transmit signal again after corresponding segmentation retransmitted according to corresponding segment serial number Data, data receiver, which receives, to be re-started step S8 after new corresponding segments data and (transmits signal format again are as follows: corresponding segment Serial number+error code), wherein error code is the binary system ordered series of numbers of fixed three bytes (24);
S9, algorithm decryption: after data obtained in step S8 are taken out corresponding segments, three segment datas are integrated and is led to Crossing the decryption of SCB2 algorithm becomes first encryption data;
S10, removal encryption head, encryption tail: by first encryption data, according to current time therein and encryption, table is tested end to end Whether card encryption head, encryption tail are correct, if correct take out transmission data, and control corresponding mechanism according to transmission data and are corresponded to Operation, if encryption head, encryption tail it is incorrect if be not responding to, and record be not responding to data and its receiving time.
In conclusion the Internet of Things information safety protecting method, by encrypting table, current time and SCB2 algorithm end to end Utilization, further increase the safety of data, strengthen protection effect, after being segmented data by the way of segmentation It sends, and every segment data is examined respectively and reporting an error respectively, to be not necessarily to integrally carry out data when error in data occurs Again it transmits, improves work efficiency, recorded in time after the exploratory detection data issued by third party with this well Malicious data is analyzed (since recorded data is examined by segmentation, can be very good to distinguish other signals with And malicious signal).
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (7)

1. a kind of Internet of Things information safety protecting method, which comprises the steps of:
S1, data generate: data sending terminal generates data and reads incoming end model, identification sequence number, encrypts table end to end and work as The preceding time;
S2, data just encrypt: corresponding to current time and encryption table end to end, and generate just encryption data;
S3, data re-encrypt: first encryption data being encrypted again by SCB2 algorithm, to obtain re-encrypting data;
S4, data sectional: re-encrypting data is divided into three preceding segmentation, middle segmentation and rear segmentation segmentations;
S5, segmental machining prepare: reading segmentation table end to end, and randomly choose and be segmented a certain cell in table end to end, it is right to read its Final value, fragment header numerical value and the segmentation mantissa value answered;
S6, segmental machining: preceding segment data, middle segment data and rear segment data are generated respectively;
S7, data transmission: preceding segment data, middle segment data and rear segment data are successively sent to receiving end;
S8, segmentation are examined: successively by the fragment header data of preceding segment data, middle segment data and rear segment data, segmentation mantissa According to simultaneously corresponding segments are taken out with final value, table checks whether correctly, to carry out step S9 if correct end to end, if incorrect issue weight New transmission signal, data sending terminal receives transmit signal again after corresponding segments retransmitted according to corresponding segment serial number According to data receiver re-starts step S8 after receiving new corresponding segments data;
S9, algorithm decryption: after data obtained in step S8 are taken out corresponding segments, by three whole merga pass of segment data The decryption of SCB2 algorithm becomes first encryption data;
S10, remove encryption head, encryption tail: by first encryption data, according to current time therein and encryption, table verifying adds end to end Whether close head, encryption tail are correct, if correct take out transmission data, and control corresponding mechanism according to transmission data and carry out corresponding behaviour Make, is not responding to if encryption head, encryption tail are incorrect, and record and be not responding to data and its receiving time.
2. a kind of Internet of Things information safety protecting method according to claim 1, it is characterised in that: described to add in S1 Close sheet format end to end is as follows: row: the hour numerical value of current time;Column: the minute numerical value of current time;Cell: head is encrypted The numerical value of numerical value and encryption tail.
3. a kind of Internet of Things information safety protecting method according to claim 1, it is characterised in that: described first in S2 Encryption data format are as follows: encryption head+transmission data+encryption tail;Encrypt head format are as follows: incoming end model+identification number+encryption head Numerical value+current time;Encrypt tail format are as follows: incoming end model+identification number+encryption mantissa value+current time.
4. a kind of Internet of Things information safety protecting method according to claim 1, it is characterised in that: in S4, it is described again The length of encryption data is fixed value, therefore the length of three segmentations is fixed value.
5. a kind of Internet of Things information safety protecting method according to claim 1, it is characterised in that: in S5, described point Paragraph header tail table is as follows: row: fragment header numerical value;Column: segmentation mantissa value;Cell: final value.
6. a kind of Internet of Things information safety protecting method according to claim 1, it is characterised in that: in S6, before described Segment data format are as follows: fragment header numerical value+preceding segmentation+segmentation mantissa value+final value+corresponding segment serial number;Middle segment data format are as follows: Fragment header numerical value+middle segmentation+segmentation mantissa value+final value+corresponding segment serial number;Segment data format afterwards are as follows: fragment header numerical value+rear point Section+segmentation mantissa value+final value+corresponding segment serial number;Wherein corresponding segment serial number for distinguish preceding segment data, middle segment data and The specific numbers of segment data afterwards.
7. a kind of Internet of Things information safety protecting method according to claim 1, it is characterised in that: described heavy in S8 New transmission signal format are as follows: corresponding segment serial number+error code.
CN201910197334.5A 2019-03-15 2019-03-15 Internet of things information security protection method Expired - Fee Related CN110035069B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910197334.5A CN110035069B (en) 2019-03-15 2019-03-15 Internet of things information security protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910197334.5A CN110035069B (en) 2019-03-15 2019-03-15 Internet of things information security protection method

Publications (2)

Publication Number Publication Date
CN110035069A true CN110035069A (en) 2019-07-19
CN110035069B CN110035069B (en) 2021-08-27

Family

ID=67236047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910197334.5A Expired - Fee Related CN110035069B (en) 2019-03-15 2019-03-15 Internet of things information security protection method

Country Status (1)

Country Link
CN (1) CN110035069B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650150A (en) * 2019-10-10 2020-01-03 上海久誉软件系统有限公司 Computer wireless propagation neural network method based on 5G network
CN111614440A (en) * 2020-05-22 2020-09-01 陈杰 Data sending system and method adopting sectional type data structure
CN112888003A (en) * 2021-02-01 2021-06-01 安徽马钢张庄矿业有限责任公司 Mine equipment communication signal processing method based on 5G industrial internet

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0676876A1 (en) * 1994-04-05 1995-10-11 International Business Machines Corporation Encryption method and system
CN101345866A (en) * 2008-08-15 2009-01-14 四川长虹电器股份有限公司 Encryption and decryption method for static audio/video document
CN102752102A (en) * 2012-07-02 2012-10-24 珠海全志科技股份有限公司 Data package segmented encryption and transmission processing method and device
US20120331293A1 (en) * 2011-06-23 2012-12-27 Azuki Systems, Inc. Method and system for secure over-the-top live video delivery
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN106067878A (en) * 2016-05-31 2016-11-02 国网山东省电力公司寿光市供电公司 A kind of network data encryption transmission method
CN106452728A (en) * 2016-08-30 2017-02-22 上海卓易科技股份有限公司 Data encryption method
CN107135062A (en) * 2017-05-08 2017-09-05 桂林电子科技大学 A kind of encryption method of improved big file

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0676876A1 (en) * 1994-04-05 1995-10-11 International Business Machines Corporation Encryption method and system
CN101345866A (en) * 2008-08-15 2009-01-14 四川长虹电器股份有限公司 Encryption and decryption method for static audio/video document
US20120331293A1 (en) * 2011-06-23 2012-12-27 Azuki Systems, Inc. Method and system for secure over-the-top live video delivery
CN102752102A (en) * 2012-07-02 2012-10-24 珠海全志科技股份有限公司 Data package segmented encryption and transmission processing method and device
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN106067878A (en) * 2016-05-31 2016-11-02 国网山东省电力公司寿光市供电公司 A kind of network data encryption transmission method
CN106452728A (en) * 2016-08-30 2017-02-22 上海卓易科技股份有限公司 Data encryption method
CN107135062A (en) * 2017-05-08 2017-09-05 桂林电子科技大学 A kind of encryption method of improved big file

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650150A (en) * 2019-10-10 2020-01-03 上海久誉软件系统有限公司 Computer wireless propagation neural network method based on 5G network
CN111614440A (en) * 2020-05-22 2020-09-01 陈杰 Data sending system and method adopting sectional type data structure
CN111614440B (en) * 2020-05-22 2021-04-20 西安博达软件股份有限公司 Data sending system and method adopting sectional type data structure
CN112910606A (en) * 2020-05-22 2021-06-04 陈杰 Data sending system adopting sectional type data structure
CN112910606B (en) * 2020-05-22 2022-08-02 湖北省成套招标股份有限公司 Data sending system adopting sectional type data structure
CN112888003A (en) * 2021-02-01 2021-06-01 安徽马钢张庄矿业有限责任公司 Mine equipment communication signal processing method based on 5G industrial internet
CN112888003B (en) * 2021-02-01 2023-06-06 安徽马钢张庄矿业有限责任公司 Mine equipment communication signal processing method based on 5G industrial Internet

Also Published As

Publication number Publication date
CN110035069B (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN110035069A (en) A kind of Internet of Things information safety protecting method
CN106961430B (en) Physical isolation transmission method and physical isolation transmission device based on two-dimensional code
CN108200020B (en) Industrial big data safe transmission device and method
CN114285562B (en) Data encryption method and device
CN104753538B (en) Manchester encoded signals coding/decoding method and device
CN114253484B (en) Big data cloud storage server
CN108964870A (en) The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher
CN117640256B (en) Data encryption method, recommendation device and storage medium of wireless network card
CN115134138A (en) File synchronization method based on one-way optical gate
CN114338217A (en) Data encryption transmission method
CN112235101B (en) Coding method and device based on hybrid coding mechanism, decoding method and device
CN108881124B (en) Method, system, storage medium and device for realizing high-performance communication between modules
CN109784104A (en) SATA hard disc crypto module and its working method, system and its working method
CN206506558U (en) A kind of physical isolation transmitting device based on Quick Response Code
CN116566677B (en) Short message receiving and transmitting system of serial server
US20230308259A1 (en) Data transmission method, communication apparatus, and communication system
CN115208557A (en) Data encryption method and device, electronic equipment and computer storage medium
CN110278068B (en) LoRa communication encryption system based on chaos sequence
CN113225299A (en) Multi-path distributed power data transmission method and system based on two-dimensional code
CN110517045B (en) Block chain data processing method, device, equipment and storage medium
CN111897991B (en) Image annotation method and device
CN107395331A (en) A kind of power equipment communication data abnormal alarm system
CN108334469A (en) A kind of mthods, systems and devices of high-speed differential serial data transmission
CN112632583A (en) Internet of things integrated management system
CN102854543B (en) Standing body error positioning method and device for field seismic instrument

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Zhan Yue

Inventor after: Yang Huan

Inventor after: Zhang Yulei

Inventor after: Liu Pengfei

Inventor before: Yang Huan

Inventor before: Zhang Yulei

Inventor before: Liu Pengfei

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20210806

Address after: 572011 Yuya road Greenland Yuelan Bay phase III Central Park 8b701, Jiyang District, Sanya City, Hainan Province

Applicant after: Sanya tal investment partnership (L.P.)

Address before: 450000 building 3, No.57, science Avenue, development zone, high tech Industrial Park, Zhongyuan District, Zhengzhou City, Henan Province 2007

Applicant before: HENAN GT IOT Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210827

CF01 Termination of patent right due to non-payment of annual fee