CN111556494A - Internet of things pairing method and device, base station and storage medium - Google Patents

Internet of things pairing method and device, base station and storage medium Download PDF

Info

Publication number
CN111556494A
CN111556494A CN202010469667.1A CN202010469667A CN111556494A CN 111556494 A CN111556494 A CN 111556494A CN 202010469667 A CN202010469667 A CN 202010469667A CN 111556494 A CN111556494 A CN 111556494A
Authority
CN
China
Prior art keywords
key
vibration
base station
vibration data
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010469667.1A
Other languages
Chinese (zh)
Inventor
郭振格
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI SAIRUI TECHNOLOGY CO LTD
Original Assignee
WUXI SAIRUI TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI SAIRUI TECHNOLOGY CO LTD filed Critical WUXI SAIRUI TECHNOLOGY CO LTD
Priority to CN202010469667.1A priority Critical patent/CN111556494A/en
Publication of CN111556494A publication Critical patent/CN111556494A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a pairing method, a pairing device, a base station and a storage medium of the Internet of things, wherein the method comprises the following steps: broadcasting a key request at a first frequency, the key request including base station identity information; receiving vibration data returned by the responder based on the key request at a second frequency, wherein the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station is verified; analyzing the vibration data to obtain a preset secret key; a communication connection is established with the transponder using the preset key. According to the technical scheme, the key transmission between the base station and the responder is completed by adopting the vibration data, the risks of tampering and eavesdropping in the process of transmitting the key through a wireless channel are avoided, the energy waste caused by long-time high-frequency data transmission is avoided by setting different first frequency and second frequency, and the later intervention of a user is not needed after the base station configuration is completed in the scheme, so that the operation is simple and convenient.

Description

Internet of things pairing method and device, base station and storage medium
Technical Field
The invention relates to the field of communication of the Internet of things, in particular to a pairing method, a pairing device, a base station and a storage medium of the Internet of things.
Background
With the development of the internet of things and the industrial internet, new technology which is continuously emerging prompts the intelligent equipment to greatly facilitate the daily life of people. More and more industries are beginning to improve the convenience of device usage in daily life by setting up applications that are combined with smart devices.
The commonly used method for realizing pairing of the internet of things at present comprises the following steps:
1 techniques based on wireless channels
The radio frequency identification technology RFID (radio frequency identification) is a technology for performing non-contact data communication by using a radio signal, and realizes identification of a specific target and data reading and writing by combining wireless communication with a data access technology. In the process of object identification, the reading, writing and communication of the electronic tag by the device are realized in the form of electromagnetic waves, and physical or optical contact between an identification system and a specific object is not needed. Conventional RFID systems consist of three parts: readers, electronic tags (transponders) and application software systems. The working principle of the RFID system is as follows: firstly, a reader activates a transponder in a mode of transmitting radio waves with preset frequency to the transponder, after energy is transmitted to the transponder, the transponder starts a driving circuit to transmit identification information stored in the transponder to the outside, the reader receives and decodes data of the transponder in sequence, and finally the data are sent to an application program to be correspondingly processed.
NFC (near field communication) is an improved technology for RFID, and is also a short-distance high-frequency near field wireless communication technology, and the main difference with RFID is that point-to-point communication is added. For RFID the relationship between the reader and the transponder is a master-slave relationship, whereas for NFC the two are peer-to-peer relationships, and the devices can find each other and establish a communication connection. Therefore, the RFID is mainly applied to logistics, asset management, production and tracking, and the NFC is applied to the fields of public transport, mobile payment, entrance guard and the like.
Other wireless channel technologies such as Wi-Fi, bluetooth and ZigBee have longer communication distances than NFC, but users still face the risk of being eavesdropped without knowing.
2 Acoustic based techniques
The acoustic-based technique refers to generating a key by sound. The principle is that according to the background sound of the position of the equipment, a secret key is obtained from frequency domain information, and pairing is completed through fast Fourier transform. Dhwani further uses the sound signal to emulate hardware NFC to achieve the goal of near field communication. The microphone and the loudspeaker are used for realizing the secure communication pairing of the mobile phone under the near field condition, and the requirement on any special NFC hardware is eliminated. However, the limitations of microphones result in inconsistent and less secure communication information. In order to improve the security, the sampling time needs to be prolonged, and the matching difficulty is increased.
Compared with the traditional network communication, the communication between the Internet of things devices sends information through a public channel, and the risk of interception and tampering by a third party exists. In order to avoid the risk that information is intercepted and cracked in the transmission process and ensure the safety and the confidentiality of information transmission, a wireless network communication protocol needs to encrypt the information before transmitting the information; meanwhile, in order to ensure the reliability of data transmission, it is necessary to prevent information from being interfered by an external signal source during transmission. How to realize safe and stable information transmission becomes a challenge without influencing the life convenience of people.
Disclosure of Invention
The invention provides an Internet of things pairing method, an Internet of things pairing device, a base station and a storage medium, which are used for avoiding risks of tampering and eavesdropping in the process of transmitting a secret key through a wireless channel.
In a first aspect, an embodiment of the present invention provides an internet of things pairing method, which is applied to a base station, and includes:
broadcasting a key request at a first frequency, the key request including base station identity information;
receiving vibration data returned by a responder based on the key request at a second frequency, wherein the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station passes verification;
analyzing the vibration data to obtain a preset secret key;
and establishing communication connection with the responder by using the preset secret key.
In a second aspect, an embodiment of the present invention provides an internet of things pairing method, applied to a transponder, including:
receiving a key request sent by a base station, wherein the key request comprises base station identity information, and verifying whether the base station is a matched base station according to the base station identity information;
if so, converting the preset secret key into vibration data;
transmitting the vibration data to the base station in the form of mechanical vibrations.
In a third aspect, an embodiment of the present invention further provides an internet of things pairing apparatus, including:
a broadcast module for broadcasting a key request at a first frequency, the key request including base station identity information;
a key receiving module, configured to receive, at a second frequency, vibration data returned by a responder based on the key request, where the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station is verified;
the key analysis module is used for analyzing the vibration data to obtain a preset key;
and the pairing module is used for establishing communication connection with the responder by using the preset secret key.
In a fourth aspect, an embodiment of the present invention further provides a base station, including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement an internet of things pairing method as described above.
In a fifth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the internet of things pairing method as described above.
According to the technical scheme, the key transmission between the base station and the responder is completed by adopting the vibration data, the risks of tampering and eavesdropping in the process of transmitting the key through a wireless channel are avoided, the different first frequency and second frequency are set, the energy waste caused by long-time high-frequency data transmission is avoided, the later intervention of a user is not needed after the base station configuration is completed, and the operation is simple and convenient.
Drawings
Fig. 1 is a flowchart of a pairing method of the internet of things in the first embodiment of the present invention;
fig. 2 is a sub-flowchart of the pairing method of the internet of things in the second embodiment of the present invention;
fig. 3 is a flowchart of a pairing method of the internet of things according to a second embodiment of the present invention;
fig. 4 is a sub-flowchart of the pairing method of the internet of things in the third embodiment of the present invention;
fig. 5 is a schematic structural diagram of an internet-of-things pairing device in the fourth embodiment of the present invention;
fig. 6 is a schematic structural diagram of an internet-of-things pairing device in the fourth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a base station in a fourth embodiment of the present invention;
fig. 8 is a schematic structural diagram of a transponder in a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. A process may be terminated when its operations are completed, but may have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
Furthermore, the terms "first," "second," and the like may be used herein to describe various orientations, actions, steps, elements, or the like, but the orientations, actions, steps, or elements are not limited by these terms. These terms are only used to distinguish one direction, action, step or element from another direction, action, step or element. For example, the first speed difference may be referred to as a second speed difference, and similarly, the second speed difference may be referred to as a first speed difference, without departing from the scope of the present application. The first speed difference and the second speed difference are both speed differences, but they are not the same speed difference. The terms "first", "second", etc. are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Example one
Fig. 1 is a flowchart of an internet of things pairing method according to an embodiment of the present invention, where the embodiment is applicable to a base station capable of implementing internet of things pairing, and the method specifically includes the following steps:
s110, broadcasting a key request at a first frequency, wherein the key request comprises base station identity information.
In this embodiment, the base station continuously broadcasts the key request when the base station does not establish the communication connection with the transponder, the key request is used to activate the transponder within the effective communication range of the base station, the key request can be received by all transponders within the effective communication range of the base station, but only a specific transponder will establish the communication connection with the base station, where the first frequency is a broadcast frequency in a state of maintaining low power consumption of the base station. Broadcasting key requests at a first frequency aims at reducing base station energy consumption. The base station identity information is a base station id (identity document), which may be a unique code or other identifier representing the identity of the base station, so that the responder can identify different base stations to realize communication with the specified base station.
Optionally, in some embodiments, step S110 includes steps S111-113 (not shown):
s111, judging whether a responder which is already in communication connection with the base station exists in the communication range of the base station.
And S112, if so, stopping broadcasting the key request.
And S113, if not, periodically broadcasting the key request outwards at the first frequency.
Considering that in the case that the base station has established a communication connection with the responder within the communication range of the base station, there is no need to broadcast the key request and perform data reception and analysis, and in this case, in order to reduce unnecessary energy consumption and achieve the function of energy protection, in an alternative embodiment, the base station stops broadcasting the key request when the base station has established a communication connection with the responder, and the base station is normally maintained in a servo state, which means that the base station operates in a low energy consumption state. In the above embodiment, in order to avoid activating the subsequent pairing process due to the key request of the unpaired base station after the responder enters the communication area of the unpaired base station, the key request broadcast by the base station includes the base station identity information (ID information), which is intended to provide an identification mark for the responder, thereby avoiding energy waste and key leakage caused by frequent unnecessary activation of the responder.
And S120, receiving vibration data returned by the responder based on the key request at a second frequency, wherein the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station passes verification.
After receiving the key request sent by the base station, the responder returns vibration data after verifying that the base station sending the key request is the appointed pairing base station, specifically, whether the base station sending the key request is the appointed pairing base station is verified according to the identity information of the base station, if so, the verification is passed, otherwise, the verification is not passed. The base station can detect whether the responder returns vibration data or not before completing pairing with the responder, the base station can enter a high-frequency data sampling state when receiving the vibration data, the base station performs high-frequency sampling on the vibration data at the moment, full-range high-frequency vibration data acquisition is performed in a vibration time period when the vibration is sensed, and after the responder stops returning the vibration data, the base station cannot sense the vibration and then recovers a servo state to listen to the vibration at a low frequency. The second frequency is a sampling frequency after a base station enters a high-frequency data sampling state, and the second frequency is greater than the first frequency.
Optionally, in some embodiments, step S120 includes S121-122 (not shown):
and S121, detecting whether vibration data reaching a preset threshold exists in the communication range in a low-frequency mode.
And S122, if so, receiving the vibration data at a second frequency, converting the vibration data into vibration data by the responder according to a preset encoding algorithm and a preset key, and returning the vibration data in a mechanical vibration mode.
The low-frequency mode is a mode that the base station monitors vibration in a low power consumption state, the base station cannot always collect vibration data in order to reduce energy consumption, and because the sampling frequency is far higher than the monitoring frequency, the energy consumption is higher, so that the vibration data can be collected at the second frequency (sampling frequency) only when the vibration data returned by the responder is detected.
And S130, analyzing the vibration data to obtain a preset key.
After the base station receives all the vibration data, the vibration data in this embodiment cannot be directly used as a secret key, and the vibration data needs to be processed and analyzed, specifically, the vibration data is restored to a preset secret key according to a preset analysis algorithm.
And S140, establishing communication connection with the responder by using the preset key.
After the preset key is obtained through analysis, the base station performs subsequent arrangement according to the validity of the preset key, specifically: and matching the preset secret key with a standard secret key stored in the base station, if the preset secret key is not in accordance with the standard secret key, the preset secret key is invalid, the base station stops receiving the vibration data and enters a servo state, if the preset secret key is in accordance with the standard secret key, the base station starts to establish a link with the responder, and the base station and the responder are established to be in communication connection to complete pairing.
In the technical scheme of the embodiment of the invention, the base station broadcasts the key request at the first frequency to activate the responder, receives the vibration data returned by the responder at the second frequency which is higher than the first frequency, and analyzes the vibration data to obtain the preset key to establish communication connection with the responder.
Example two
The embodiment is further optimized based on the above embodiments, and for example, the process of analyzing the vibration data is further explained, which includes the following specific contents:
in this embodiment, the base station senses the vibration condition around based on the acceleration sensor, that is, collects vibration data through the acceleration sensor. In the process of detecting whether vibration data reaching a preset threshold exist in the communication range in a low-frequency mode, adopting an SVM threshold detection method: in the detection process, the spatial direction of the acceleration is ignored, the vector sum operation is carried out on the spatial acceleration, the resultant acceleration V is calculated through the vector sum of the three-axis acceleration, and the resultant acceleration V is compared with a preset threshold value to judge whether the vibration occurs. If the combined acceleration V of the three values of the sensor reaches a preset threshold value, the vibration can be preliminarily judged and the vibration data can be received. The resultant acceleration V based on the SVM is calculated as follows:
Figure BDA0002513862750000091
wherein x, y and z respectively represent acceleration values on three coordinate axes.
The vibration data generation is transmitted by a vibration motor on the transponder, which transmits the vibration data in the form of vibrations to the surroundings by means of different vibration durations, vibration intensities and vibration frequencies. The motion of acceleration along three orthogonal axes in the presence of vibration can convert the data into a three-dimensional data set (X, Y, Z), in which gravitational acceleration represents a constant offset along an axis directed toward the floor. According to the embodiment, the preset key for transmitting the vibration data depends on the length of the vibration time, different vibration times represent different key elements, and the deviation direction of vibration in the physical direction is not considered, so that the system ignores the spatial direction of acceleration in the process of extracting the vibration characteristics from the data monitored by the acceleration sensor.
More specifically, as shown in FIG. 2, step S130 includes steps S131-133:
s131, analyzing the single character of the vibration data through a key character analysis algorithm, and determining character information corresponding to the vibration data.
In this embodiment, the single character in the vibration data is analyzed to ensure accurate determination and completeness of the analyzed character string, and after each character is accurately analyzed, complete character information of the preset key is obtained.
S132, analyzing the time interval of the character string from the vibration data by using a key character string start time determination algorithm.
On one hand, different from wireless transmission, only the start time and the end time of character string transmission need to be confirmed, and in the vibration data transmission process, the corresponding start time and end time need to be confirmed for each key unit in the preset key, so that the preset key can be accurately analyzed. On the other hand, the transponder starts transmission upon receiving a key request sent by the base station. In order to ensure the success rate of transmission and the accuracy of received data, the transponder usually performs more than one data transmission, and the base station needs to have the capability of separating out the correct secret key from the vibration data and starting matching after obtaining the vibration data. How to obtain the correct pre-key from the continuous vibration requires a mechanism to be set up to confirm. The time interval for analyzing the character string is to analyze the starting time and the ending time of intercepting the character string data in the vibration data, avoid the occurrence of string codes in the obtained preset key, and ensure that the obtained preset key is complete and has no error in sequence.
And S133, determining a preset key corresponding to the vibration data according to the character information and the time interval.
More specifically, the time interval for parsing the character string in step S132 corresponds to the mechanism adopted by the vibration data transmission process of the transponder, and is illustrated here by two examples:
the first is a vibration interval based detection mechanism. The base station starts collecting vibration data and extracting the key from the vibration data when the vibration is detected. Under the mechanism, as long as the base station detects that vibration data is generated, the secret key is supposed to start to be transmitted, the sampling frequency is increased, and the vibration data is started to be collected and the secret key is analyzed. The method is simple to operate and easy to realize. However, the key transmitted by the transponder is easily determined as an invalid key by misidentification of the base station, resulting in a failure of the authentication. According to the VibKey (Vibration-based Key Generation and Communication) transmission mechanism, after the responder enters the Communication range of the base station and receives a Key request sent by the base station, the responder starts to transmit the preset Key in a Vibration mode. To ensure the integrity and accuracy of the delivery of the preset keys, the transponder must continuously transmit multiple sets of preset keys. When the transponder contacts the base station, the preset key is not normally transferred from the first character, so the base station will easily generate an erroneous string code by decoding the key only by recording the continuous vibration data. For example, the transponder passes two sets of preset keys 213 and 213. Since the base station starts receiving vibration data from the second digit in the first set, the base station may misidentify the pre-key as 132.
This problem can be achieved by setting the key transmission interval. In general, there are three ways to set the transmission time interval: in the first mode, the key interval is the interval time between the end time of the first transmission and the start time of the second transmission, and is used for facilitating the base station to intercept the key character string; in the second mode, the key interval is the time interval between the characters in the same group of key strings, and is used for clarifying the starting time and the ending time of a single character, so that each individual character contained in the character can be distinguished conveniently; in a third mode, the key interval is the transmission interval time between adjacent bits of each key character after being encoded by the binary encoding mechanism, and is used for determining the starting time and the ending time of each binary encoding in the vibration data of the single character. The three key interval time relations are as follows: the interval time between the key character strings is longest, the interval time between the characters in the key character strings is next to the longest, and the time interval between the binary coding numbers corresponding to each character after the binary coding is carried out on the key is shortest. That is, the vibration data generated by the transponder is determined from the vibration data, from which three vibration intervals are determined: the key structure comprises a first vibration interval (interval time between key strings), a second vibration interval (interval time between characters in the key strings) and a third vibration interval (time between each character and a binary encoding code after binary encoding of the key) the first vibration interval is larger than the second vibration interval, the second vibration interval is larger than the third vibration interval, the first vibration interval corresponds to the character string interval, the second vibration interval corresponds to the character interval, and the third vibration interval corresponds to the binary encoding bit interval of each character.
The second is a start time identifier based detection mechanism. The starting time and the ending time of the key transmission are represented by setting a special transmission vibration mode. Before the preset secret key is transmitted, setting a special vibration (initial transmission vibration symbol) to indicate that the next transmitted data is the vibration data of the preset secret key to the base station module; and setting an end vibration symbol after the key transmission is finished to inform the base station that the vibration data of the preset key is transmitted completely. Compared with the detection mechanism based on the vibration time interval, the detection mechanism based on the start time identifier needs to perform additional vibration mode representation before each transmission unit starts transmission and after the transmission is finished, the transmission complexity is high, the system energy consumption is high, and the risk of intercepting the vibration data is increased. Therefore, VibKey preferentially selects a mechanism based on vibration intervals to realize key coding and transmission of a responder end and key analysis of a base station end. Namely, a first pass vibration symbol and an end vibration symbol are identified based on the vibration data, the first pass vibration symbol is used for determining a vibration data starting point corresponding to the character string of the preset key, and the end vibration symbol is used for determining a vibration data ending point corresponding to the character string of the preset key.
Optionally, in some embodiments, as shown in fig. 3, after step S130, the method further includes:
s150, sending a vibration stopping request to the responder, wherein the vibration stopping request is used for informing the responder to stop sending vibration data and comprises base station identity information.
After the complete preset key is obtained based on the vibration data, no matter whether the preset key is consistent with the standard key of the base station or not, the base station sends a vibration stopping request to the responder to inform the responder to stop transmitting vibration data so as to reduce energy consumption, and meanwhile, in order to not influence the normal work of other responders, the vibration stopping request sent by the base station also comprises base station identity information which is used for the responder to verify whether the base station sending the vibration stopping request is the base station receiving the vibration data of the responder.
According to the technical scheme of the embodiment of the invention, a specific mode for detecting whether the vibration data appears or not according to the preset threshold value and a specific mode for analyzing the time interval of the character string are provided, so that the completeness and the accuracy of obtaining the vibration data and analyzing to obtain the preset key are further ensured.
EXAMPLE III
Fig. 4 is a schematic diagram of a pairing method of the internet of things according to a third embodiment of the present invention, where the present embodiment is applicable to a transponder capable of implementing pairing of the internet of things, and the method specifically includes the following steps:
s310, receiving a key request sent by a base station, wherein the key request comprises base station identity information, and verifying whether the base station is a matched base station or not according to the base station identity information.
The responder is responsible for receiving a key request sent by a base station and transmitting a preset key carried by the responder to a specified base station in a vibration mode to complete pairing, before the key request sent by the base station is not received, the responder is in a servo state, the responder is maintained to operate in a low-power state, wireless data information (such as the key request) around the responder is periodically intercepted, after the key request is intercepted, whether the key request is sent by the specified base station needs to be verified, namely whether the base station corresponding to the key request is the specified base station is verified according to the identity information of the base station in the key request, if so, the key request is responded, and if not, the key request is not responded (the servo state is maintained).
And S320, if so, converting the preset key into vibration data.
After the key request received by the responder is verified to be sent by the appointed pairing base station, the responder can convert the preset key stored in the responder into vibration data according to the preset coding algorithm, so that the conversion from characters to a vibration mode digital sequence is realized. In the process, the character string of the key is expressed into a key character string array according to a preset encoding algorithm. In order to facilitate the effective recognition of the character codes in the preset key by the base station after transmission, the process also comprises a mechanism for processing the starting time and the ending time of the character string of the key, and the position of the character string in the data stream can be effectively marked.
S330, transmitting the vibration data to the base station in a mechanical vibration mode.
After the vibration data is obtained, the transponder realizes data stream transmission of the key through mechanical vibration of the vibration motor, and due to the limitation of the intelligent device on the vibration mechanical motor, preferably, the vibration data transmission can be performed in a time-sharing mode.
More specifically, in some embodiments, the process of converting the preset key into the vibration data, that is, the encoding process according to the preset encoding algorithm and the preset key, may be implemented in two ways, including:
the time-based encoding mechanism represents different characters by vibrating for different vibration time lengths for characters in the preset key, for example, a character string to be transmitted is encoded by the corresponding time length of each character, vibrating for 1 second continuously represents the number 1, vibrating for 2 seconds continuously represents the number 2, and so on. The coding mechanism has the advantages that the coding is simple, the characters in the preset key only need to vibrate in equal length according to the numerical value, and the key identification accuracy is high because each character corresponds to a continuous vibration time period. Its disadvantages are slow transmission speed and high energy consumption.
A binary-based encoding mechanism sets a password according to a binary code, encoding each character in a binary manner. The method has the advantages that the average length of a single secret key is short, and the energy consumption is low; the method has the disadvantages that each character is represented by a plurality of binary systems, the characters in the preset key can be analyzed only by accurately identifying each binary system, and the difficulty coefficient of key analysis is increased.
In either way, due to the nature of mechanical vibrations, a problem needs to be solved first: how to set the representation method of the number 0. In wireless signal transmission, coding is generally performed using manchester coding technology to realize identification of data such as consecutive 0 s or 1 s without a clock synchronization signal. However, in the process of transferring a key by vibration, if non-vibration is represented as 0, it is easy to confuse the time when no data is transmitted with the transmission time representing the digital 0, resulting in erroneous key identification. Therefore, a setting mechanism is required to effectively distinguish the time period of transmitting the digital 0 from the time period of no data transmission.
In the digital coding process of the vibration data, the invention adopts a +1 method to realize coding, and avoids the identification error easily caused by a digital 0. In the encoding process, 1 is used to represent 0, 2 represents 1, and so on 10 represents 9. The corresponding vibration data encoded under the two-bit system encoding scheme is composed of 2 and 1. According to the principle of the time length coding scheme described above, the number 0 is represented by a 1 millisecond vibration time after coding, and the number 1 is represented by a 2 millisecond vibration time after coding. For example, the modified binary-coded representation of the number 0 is 11 and the modified binary-coded representation of the number 1 is 21.
In the internet of things pairing method applied to the responder, after the key request sent by the pairing base station is verified, the preset key is converted into the vibration data, the vibration data is sent to the pairing base station for analysis, and the key is transmitted in a mechanical vibration mode through the vibration data, so that the risk that the key is easily attacked and interfered by types such as 'attack of a third party' and the like during wireless channel transmission is avoided.
Example four
Fig. 5 is a schematic structural diagram of an internet of things pairing device 400 according to a fourth embodiment of the present invention, which may be applied to a base station for pairing an internet of things, and has a specific structure as follows:
a broadcasting module 410 configured to broadcast a key request at a first frequency, the key request including base station identity information.
The broadcast module 410 is specifically configured to: judging whether a responder which is in communication connection with a base station exists in the communication range of the base station; if yes, stopping broadcasting the key request; if not, the key request is broadcasted outwards at the first frequency periodically, and the key request comprises the identity information of the base station. The method maintains the base station to operate in a low energy consumption state without receiving and analyzing the key, and periodically broadcasts the key request to the outside at the first frequency, so that the vibration data can be fed back in time after the responder enters the communication range of the base station. The key request broadcast by the broadcast module 410 includes the base station identity information, which is intended to provide an identification mark for the responder, and avoid the energy waste and key leakage caused by the subsequent pairing process triggered by the responder after entering the communication area of the non-paired base station. The broadcasting module 410 broadcasts the key request only when it is determined that the transponder is not within the communication range, and if the key is within the communication range and the link is established, the base station stops broadcasting the key request, thereby reducing unnecessary energy consumption and realizing the function of energy protection.
And a key receiving module 420, configured to receive, at a second frequency, vibration data returned by the transponder based on the key request, where the second frequency is greater than the first frequency, and the vibration data is generated by the transponder after the identity information of the base station is verified.
The key receiving module 420 is specifically configured to: detecting whether vibration data reaching a preset threshold exists in the communication range in a low-frequency mode; if so, receiving the vibration data at a second frequency, converting the vibration data into vibration data by the responder according to a preset encoding algorithm and a preset key, and returning the vibration data in a mechanical vibration mode, otherwise, keeping a low-frequency mode to sense vibration. The key receiving module 420 collects the whole course high-frequency vibration data of the sensed vibration in the vibration time period to obtain vibration data, and monitors in a low-frequency mode when the vibration is not detected, and enters a high-frequency data sampling state after the vibration is detected to exist until the vibration stops detecting the vibration data and then returns to the low-frequency monitoring mode.
And a key analysis module 430, configured to analyze the vibration data to obtain a preset key.
In some embodiments, the key resolution module 430 includes:
the character analysis unit is used for analyzing a single character of the vibration data through a key character analysis algorithm and determining character information corresponding to the vibration data;
the time analysis unit is used for analyzing the time interval of the character string from the vibration data through a key character string starting time judgment algorithm;
and the key determining unit is used for determining a preset key corresponding to the vibration data according to the character information and the time interval.
The character analysis unit is used for ensuring the integrity and the accuracy of character string analysis, and the time analysis unit is used for avoiding the generation of key string codes and ensuring the validity of generated keys.
More specifically, the time resolution unit is configured to: determining a first vibration interval, a second vibration interval and a third vibration interval based on the vibration data, the first vibration interval being greater than the second vibration interval, the second vibration interval being greater than the third vibration interval, the first vibration interval corresponding to a string interval, the second vibration interval corresponding to a character interval, the third vibration interval corresponding to a binary encoding bit interval of each character; or identifying a first-pass vibration symbol and an end vibration symbol based on the vibration data, wherein the first-pass vibration symbol is used for determining a vibration data starting point corresponding to the character string of the preset key, and the end vibration symbol is used for determining a vibration data end point corresponding to the character string of the preset key.
And a pairing module 440, configured to establish a communication connection with the responder by using the preset key.
After the preset key is obtained through analysis, the pairing module 440 performs subsequent arrangement according to the validity of the preset key, specifically: and matching the preset secret key with a standard secret key stored in the base station, if the preset secret key is not in accordance with the standard secret key, the preset secret key is invalid, the base station stops receiving the vibration data and enters a servo state, if the preset secret key is in accordance with the standard secret key, the base station starts to establish a link with the responder, and the base station and the responder are established to be in communication connection to complete pairing.
More specifically, the pairing module 440 is further configured to send a vibration stop request to the responder, and is configured to notify the responder to stop sending vibration data, where the vibration stop request includes base station identity information.
In the technical scheme of the embodiment, the base station broadcasts the key request at the first frequency to activate the responder, receives the vibration data returned by the responder at the second frequency which is higher than the first frequency, analyzes the vibration data to obtain the preset key to establish communication connection with the responder, and the scheme adopts the vibration data to complete the key transmission between the base station and the responder, thereby avoiding the risks of falsification and eavesdropping in the process of transmitting the key through a wireless channel, and setting different first frequency and second frequency to avoid energy waste caused by long-time high-frequency data transmission.
EXAMPLE five
Fig. 6 is a schematic structural diagram of an internet of things pairing device 500 according to a fourth embodiment of the present invention, which may be applied to a transponder for internet of things pairing, and has a specific structure as follows:
a key request receiving module 510, configured to receive a key request sent by a base station, where the key request includes base station identity information, and verify whether the base station is a paired base station according to the base station identity information.
The responder is responsible for receiving a key request sent by a base station and transmitting a preset key carried by the responder to a specified base station in a vibration mode to complete pairing, before the key request sent by the base station is not received, the key request receiving module 510 enables the responder to be in a servo state, maintains the responder to operate in a low-power state, periodically listens to wireless data information (such as the key request) around the responder, needs to verify whether the key request is the key request sent by the specified base station after the key request is intercepted, if so, responds to the key request, and if not, does not respond (maintains the servo state).
And a vibration data generating module 520, configured to convert the preset key into vibration data if the preset key is positive.
After the key request received by the responder is verified to be sent by the designated pairing base station, the vibration data generation module 520 converts the preset key stored in the responder into vibration data according to the preset encoding algorithm, so as to realize the conversion from the character to the vibration mode digital sequence. In the process, the character string of the key is expressed into a key character string array according to a preset encoding algorithm. In order to facilitate the effective recognition of the character codes in the preset secret key by the base station after transmission, the process also comprises a mechanism for processing the starting time and the ending time of the character string of the secret key, and the position of the character string in the data stream can be effectively marked
A vibration transmission module 530, configured to transmit the vibration data to the base station in the form of mechanical vibration.
After obtaining the vibration data, the vibration transmission module 530 implements data stream transmission of the key through mechanical vibration of the vibration motor, and preferably, the vibration data transmission may be performed in a time-sharing manner due to the limitation of the smart device on the vibration motor.
In the technical scheme of the embodiment, after the key request sent by the pairing base station is verified, the preset key is converted into vibration data, the vibration data is sent to the pairing base station for analysis, and the key is transmitted in a mechanical vibration mode through the vibration data, so that the risk that the key is easily attacked and interfered by types such as 'attack of a third party' and the like during wireless channel transmission is avoided.
EXAMPLE six
Fig. 7 is a schematic structural diagram of a base station according to a sixth embodiment of the present invention. As shown in fig. 7, the base station comprises a processor 60, a memory 61, an input means 62 and an output means 63; the number of the processors 60 in the base station may be one or more, and one processor 60 is taken as an example in the figure; the processor 60, the memory 61, the input device 62 and the output device 63 in the base station may be connected by a bus or other means, and the connection by the bus is exemplified in fig. 7. The base station shown in fig. 7 is only an example, and should not bring any limitation to the function and the scope of the application of the embodiments of the present invention.
The base station typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the base station and includes both volatile and nonvolatile media, removable and non-removable media.
The memory 61 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the theme update method in the embodiment of the present invention (for example, the broadcast module 410, the key receiving module 420, the key parsing module 430, the pairing module 440, and the like in the matching device of the internet of things). The processor 60 executes various functional applications of the server and data processing by running software programs, instructions and modules stored in the memory 61, so as to implement the internet of things matching method of any one of the above embodiments.
The memory 61 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the client, and the like. Further, the memory 61 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 61 may further include memory located remotely from the processor 50, which may be connected to a base station through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 62 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function controls of the base station. The output device 63 may include a display device such as a display screen.
The server can execute the matching method of the internet of things provided by any embodiment of the invention, and has functional modules corresponding to the execution method and beneficial effects.
EXAMPLE seven
Fig. 8 is a schematic structural diagram of a transponder according to a sixth embodiment of the present invention. As shown in fig. 8, the transponder comprises a processor 70, a memory 71, an input device 72 and an output device 73; the number of the processors 70 in the transponder may be one or more, and one processor 70 is taken as an example in the figure; the processor 70, the memory 71, the input device 72 and the output device 73 in the transponder may be connected by a bus or other means, as exemplified by the bus connection in fig. 8. The transponder shown in fig. 8 is only an example and should not bring any limitation to the function and the range of use of the embodiment of the present invention.
The transponder typically includes a variety of computer system readable media. Such media may be any available media that is accessible by the transponder and includes both volatile and nonvolatile media, removable and non-removable media.
The memory 71 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the theme update method in the embodiment of the present invention (for example, the key request accepting module 510, the vibration data generating module 520, the vibration transmitting module 530, and the like in the matching device of the internet of things). The processor 70 executes various functional applications and data processing of the server by running software programs, instructions and modules stored in the memory 71, so as to implement the internet of things matching method of any one of the above embodiments.
The memory 71 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the client, and the like. Further, the memory 71 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 71 may further include memory located remotely from the processor 50, which may be connected to the transponder through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 72 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function control of the transponder. The output device 73 may include a display device such as a display screen.
The server can execute the matching method of the internet of things provided by any embodiment of the invention, and has functional modules corresponding to the execution method and beneficial effects.
Example eight
An eighth embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements an internet of things pairing method according to any embodiment of the present invention, where the method may include an internet of things pairing method applied to a base station or a transponder:
broadcasting a key request at a first frequency, the key request including base station identity information;
receiving vibration data returned by a responder based on the key request at a second frequency, wherein the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station passes verification;
analyzing the vibration data to obtain a preset secret key;
and establishing communication connection with the responder by using the preset secret key.
Or the like, or, alternatively,
receiving a key request sent by a base station, wherein the key request comprises base station identity information, and verifying whether the base station is a matched base station according to the base station identity information;
if so, converting the preset secret key into vibration data;
transmitting the vibration data to the base station in the form of mechanical vibrations.
The computer-readable storage media of embodiments of the invention may take any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or terminal. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. An Internet of things pairing method is applied to a base station and is characterized by comprising the following steps:
broadcasting a key request at a first frequency, the key request including base station identity information;
receiving vibration data returned by a responder based on the key request at a second frequency, wherein the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station passes verification;
analyzing the vibration data to obtain a preset secret key;
and establishing communication connection with the responder by using the preset secret key.
2. The pairing method of the internet of things as claimed in claim 1, wherein the broadcasting the key request at the first frequency comprises:
judging whether a responder which is in communication connection with a base station exists in the communication range of the base station;
if yes, stopping broadcasting the key request;
if not, the key request is periodically broadcast out at the first frequency.
3. The pairing method of the internet of things as claimed in claim 1, wherein the receiving vibration data returned by the transponder based on the key request at the second frequency comprises:
detecting whether vibration data reaching a preset threshold exists in the communication range in a low-frequency mode;
and if so, receiving the vibration data at a second frequency, converting the vibration data into vibration data by the responder according to a preset encoding algorithm and a preset secret key, and returning the vibration data in a mechanical vibration mode.
4. The pairing method for the internet of things according to any one of claims 1 to 3, wherein the analyzing the vibration data to obtain a preset key comprises:
analyzing a single character of the vibration data through a key character analysis algorithm, and determining character information corresponding to the vibration data;
analyzing the time interval of the character string from the vibration data through a key character string starting time judgment algorithm;
and determining a preset key corresponding to the vibration data according to the character information and the time interval.
5. The pairing method of the internet of things as claimed in claim 4, wherein the analyzing the time interval of the character string from the vibration data by a key character string start time decision algorithm comprises:
determining a first vibration interval, a second vibration interval and a third vibration interval based on the vibration data, the first vibration interval being greater than the second vibration interval, the second vibration interval being greater than the third vibration interval, the first vibration interval corresponding to a string interval, the second vibration interval corresponding to a character interval, the third vibration interval corresponding to a binary encoding bit interval of each character;
or identifying a first-pass vibration symbol and an end vibration symbol based on the vibration data, wherein the first-pass vibration symbol is used for determining a vibration data starting point corresponding to the character string of the preset key, and the end vibration symbol is used for determining a vibration data end point corresponding to the character string of the preset key.
6. The pairing method for the internet of things according to claim 1, wherein the analyzing the vibration data to obtain a preset key further comprises:
and sending a vibration stopping request to the responder, wherein the vibration stopping request is used for informing the responder to stop sending vibration data and comprises the identity information of the base station.
7. An Internet of things pairing method is applied to a transponder and is characterized by comprising the following steps:
receiving a key request sent by a base station, wherein the key request comprises base station identity information, and verifying whether the base station is a matched base station according to the base station identity information;
if so, converting the preset secret key into vibration data;
transmitting the vibration data to the base station in the form of mechanical vibrations.
8. An internet of things pairing device, comprising:
a broadcast module for broadcasting a key request at a first frequency, the key request including base station identity information;
a key receiving module, configured to receive, at a second frequency, vibration data returned by a responder based on the key request, where the second frequency is greater than the first frequency, and the vibration data is generated by the responder after the identity information of the base station is verified;
the key analysis module is used for analyzing the vibration data to obtain a preset key;
and the pairing module is used for establishing communication connection with the responder by using the preset secret key.
9. A base station for matching of the Internet of things, comprising:
one or more processors;
a storage device for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the internet of things pairing method of any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the internet of things pairing method as claimed in any one of claims 1 to 7.
CN202010469667.1A 2020-05-28 2020-05-28 Internet of things pairing method and device, base station and storage medium Pending CN111556494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010469667.1A CN111556494A (en) 2020-05-28 2020-05-28 Internet of things pairing method and device, base station and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010469667.1A CN111556494A (en) 2020-05-28 2020-05-28 Internet of things pairing method and device, base station and storage medium

Publications (1)

Publication Number Publication Date
CN111556494A true CN111556494A (en) 2020-08-18

Family

ID=72008552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010469667.1A Pending CN111556494A (en) 2020-05-28 2020-05-28 Internet of things pairing method and device, base station and storage medium

Country Status (1)

Country Link
CN (1) CN111556494A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113518411A (en) * 2021-04-14 2021-10-19 珠海派诺科技股份有限公司 Communication network access connection method of Internet of things equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113518411A (en) * 2021-04-14 2021-10-19 珠海派诺科技股份有限公司 Communication network access connection method of Internet of things equipment

Similar Documents

Publication Publication Date Title
JP4047909B2 (en) Wireless device monitoring system
US7295115B2 (en) Radio-frequency identification (RFID) tag employing unique reception window and method therefor
JP2006295234A (en) Authentication system and method, and entrance/exit management system
CN110278083B (en) Identity authentication request processing method and device, and equipment resetting method and device
US9336418B2 (en) System and method for polling NFC-A devices alongside RF barcode devices
US20080070547A1 (en) Method for Radio Transmission in a Radio Cell of an Alarm System
CN105046177A (en) Proximity check for communication devices
Su et al. An efficient missing tag identification approach in RFID collisions
CN113271205A (en) Active identification carrier, interactive system and active identification mutual identification method
JP7284701B2 (en) Communication equipment and systems
CN111556494A (en) Internet of things pairing method and device, base station and storage medium
US10638318B2 (en) Optical chaos based wireless device fingerprinting
KR20170025389A (en) System and method for smart entrance management using mobile handset
CN111448815A (en) Secure RFID tag identification
KR20210148778A (en) Electronic device and method for performing ranging through uwb
CN111540087A (en) Door lock control method, device, equipment and storage medium
US20140300467A1 (en) System for Locating Tagged Objects
Pai et al. Power-efficient direct-voting assurance for data fusion in wireless sensor networks
US11178524B2 (en) Data collection method using user terminal and data collection system
JP7454399B2 (en) Communication systems, in-vehicle devices, and programs
CN112469034B (en) Internet of things gateway device capable of safely authenticating physical sensing equipment and access method thereof
EP2940883B1 (en) Power system
JP2007188375A (en) Privacy protection type authentication system and device for retrieving id in database
EP3252728B1 (en) System and method for an alarm system
US8615265B2 (en) Coded system for radio frequency communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200818