CN113660385A - Information collection method, communication device, server, system, and storage medium - Google Patents

Information collection method, communication device, server, system, and storage medium Download PDF

Info

Publication number
CN113660385A
CN113660385A CN202110924584.1A CN202110924584A CN113660385A CN 113660385 A CN113660385 A CN 113660385A CN 202110924584 A CN202110924584 A CN 202110924584A CN 113660385 A CN113660385 A CN 113660385A
Authority
CN
China
Prior art keywords
data
server
module
communication connection
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110924584.1A
Other languages
Chinese (zh)
Inventor
李海雄
彭继兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Pantum Electronics Co Ltd
Original Assignee
Zhuhai Pantum Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Pantum Electronics Co Ltd filed Critical Zhuhai Pantum Electronics Co Ltd
Priority to CN202110924584.1A priority Critical patent/CN113660385A/en
Publication of CN113660385A publication Critical patent/CN113660385A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00204Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server
    • H04N1/00244Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server with a server, e.g. an internet server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The embodiment of the application provides an information collection method, a communication device, a server, a system and a storage medium, wherein the method comprises the steps of sending first data to the server through a first communication connection; sending second data to the server through a second communication connection, wherein the second data is associated with the first data, and the second data is used for checking the first data. In the embodiment of the application, data collection is performed in a double-channel mutual verification mode, and the integrity and accuracy of collected data are guaranteed.

Description

Information collection method, communication device, server, system, and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to an information collection method, a communication apparatus, a server, a system, and a storage medium.
Background
An image forming apparatus is a device that forms an image on a recording medium by the principle of image formation, such as a printer, a copying machine, a facsimile machine, a multifunction image making and copying apparatus, an electrostatic printing apparatus, and any other similar apparatus.
In order to facilitate management of the image forming apparatuses, information of the image forming apparatuses is generally collected by cluster management software. However, in the prior art, information of the image forming apparatus is transmitted in a single-channel manner in the network, and is easily intercepted and tampered by a third party in a malicious manner, so that the cluster management center cannot obtain real information of the image forming apparatus.
Disclosure of Invention
The embodiment of the application provides an information collection method, a communication device, a server, a system and a storage medium, which are beneficial to solving the problems that information is transmitted in a single-channel form in a network and is easily intercepted and tampered by a third party in a malicious way in the prior art.
In a first aspect, an embodiment of the present application provides an information collection method, including:
sending first data to a server through a first communication connection;
sending second data to the server through a second communication connection, wherein the second data is associated with the first data, and the second data is used for checking the first data.
Preferably, before the sending the second data to the server through the second communication connection, the method further includes:
and generating the second data according to a preset first algorithm based on the first data.
Preferably, the preset first algorithm includes at least one of an encryption and decryption algorithm, an MD5 algorithm, and a hash algorithm.
Preferably, the generating the second data according to a preset first algorithm based on the first data includes:
and encrypting the first data through a preset secret key and/or an encryption algorithm to obtain second data.
Preferably, the encrypting the first data through a preset key and/or an encryption algorithm to obtain second data includes:
performing hash operation on the first data to obtain a first hash value;
and encrypting the first hash value through a preset secret key and/or an encryption algorithm to obtain second data.
Preferably, the generating the second data according to a preset first algorithm based on the first data includes:
and performing hash operation on the first data to obtain second data, wherein the second data is a first hash value obtained by performing hash operation on the first data.
Preferably, the first data includes image forming apparatus information and/or consumable information.
Preferably, the first communication connection and the second communication connection belong to different communication modes.
In a second aspect, an embodiment of the present application provides an information collection method, which is applied to a server, and the method includes:
receiving first data transmitted by an image forming apparatus through a first communication connection;
receiving second data transmitted by the image forming apparatus through a second communication connection, the second data being associated with the first data;
verifying the first data and the second data;
and if the verification is passed, storing the first data.
Preferably, the verifying the first data and the second data includes:
obtaining third data based on the second data according to a preset second algorithm, and verifying the first data through the third data; and/or the presence of a gas in the gas,
and obtaining fourth data according to a preset third algorithm based on the first data, and verifying the second data through the fourth data.
Preferably, the obtaining third data based on the second data according to a preset second algorithm, and checking the first data through the third data includes: decrypting the second data through a preset secret key and/or an encryption algorithm;
verifying the first data through the decrypted data;
the obtaining of fourth data based on the first data according to a preset third algorithm, and the verifying of the second data by the fourth data, includes:
encrypting the first data through a preset secret key and/or an encryption algorithm;
and verifying the second data through the encrypted data.
Preferably, the decrypting the second data by using a preset key and/or an encryption algorithm includes:
decrypting the second data through a preset secret key and/or an encryption algorithm to obtain a first hash value;
the verifying the first data by the decrypted data includes:
performing hash operation on the first data to obtain a second hash value;
and checking the second hash value through the first hash value.
Preferably, the second data is a first hash value, the obtaining fourth data according to a preset third algorithm based on the first data, and checking the second data through the fourth data includes:
performing hash operation on the first data to obtain a second hash value;
and checking the second hash value through the first hash value.
In a third aspect, an embodiment of the present application provides a communication apparatus, including: the first sending module is used for sending first data to the server through a first communication connection;
a second sending module, configured to send second data to the server through a second communication connection, where the second data is associated with the first data, and the second data is used to verify the first data.
Preferably, the method further comprises the following steps:
and the first calculating unit is used for obtaining the second data based on the first data according to a preset first algorithm.
Preferably, the method comprises the following steps:
the control unit comprises a first sending module and a second sending module, the control unit is connected with a first communication module and a second communication module, the first communication module is used for establishing first communication connection with the server, and the second communication module is specifically used for establishing second communication connection with the server.
Preferably, the first calculation unit includes:
and the first encryption module is used for encrypting the first data through a preset secret key and/or an encryption algorithm to obtain second data.
Preferably, the first calculation unit further includes:
the first hash calculation module is used for carrying out hash operation on the first data to obtain a first hash value;
the first encryption module is specifically configured to encrypt the first hash value through a preset key and/or an encryption algorithm to obtain second data.
In a fourth aspect, an embodiment of the present application provides a server, including:
the first receiving module is used for receiving first data sent by the communication device through a first communication connection;
a second receiving module, configured to receive second data sent by the communication device through a second communication connection, where the second data is associated with the first data;
the verification module is used for verifying the first data and the second data;
and the storage module is used for storing the first data if the verification is passed.
Preferably, the method further comprises the following steps:
the second computing unit is used for generating third data based on the second data according to a preset second algorithm and verifying the first data through the third data; and/or the presence of a gas in the gas,
and the third calculating unit is used for obtaining fourth data according to a preset third algorithm based on the first data and verifying the second data through the fourth data.
Preferably, the second calculation unit includes: a decryption module;
the decryption module is used for decrypting the second data through a preset secret key and/or an encryption algorithm;
the third calculation unit includes: a second encryption module;
the second encryption module is used for encrypting the first data through a preset secret key and/or an encryption algorithm;
the verification module is specifically configured to verify the first data with the data decrypted by the decryption module; and/or verifying the second data through the data encrypted by the second encryption module.
Preferably, the third calculation unit further includes: a second hash calculation module;
the decryption module is specifically configured to decrypt the second data through a preset key and/or an encryption algorithm to obtain a first hash value;
the second hash calculation module is configured to perform hash operation on the first data to obtain a second hash value;
the verification module is specifically configured to verify the second hash value by using the first hash value.
In a fifth aspect, an embodiment of the present application provides an information collection system, including the communication apparatus in any one of the third aspects and the server in any one of the fourth aspects, where the communication apparatus and the server are connected by a first communication connection and a second communication connection, respectively.
In a sixth aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method according to any one of the first aspects.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program, when executed, controls an apparatus in which the computer-readable storage medium is located to perform the method according to any one of the second aspects.
In the embodiment of the application, data collection is performed in a double-channel mutual verification mode, and the integrity and accuracy of collected data are guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
fig. 2 is a schematic view of a dual channel communication scenario provided in an embodiment of the present application;
fig. 3 is a schematic flow chart of an information collection method according to an embodiment of the present disclosure;
FIG. 4 is a schematic structural diagram of an image forming apparatus according to an embodiment of the present disclosure;
fig. 5 is a schematic flow chart of another information collection method according to an embodiment of the present disclosure.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Referring to fig. 1, a schematic view of an application scenario provided in the embodiment of the present application is shown. In fig. 1, 1 server 101 and 3 image forming apparatuses 102 are shown, and the server 101 and the image forming apparatuses 102 communicate with each other via a network.
In this application scenario, the communication mode between the server 101 and the image forming apparatus 102 may be wired communication or wireless communication, wherein the wireless communication may be a Near Field Communication (NFC) network such as a Wi-Fi hotspot network, a Wi-Fi P2P network, a bluetooth network, a zigbee network or a Near Field Communication (NFC) network; or a third-generation wireless telephone technology (3G) network, a fourth-generation mobile communication technology (4G) network, a fifth-generation mobile communication technology (5G) network, a future-evolution Public Land Mobile Network (PLMN), the internet, or the like. This is not particularly limited by the examples of the present application.
It should be noted that the application scenario shown in fig. 1 is only an exemplary description, and should not be taken as a limitation to the scope of the present application. For example, the image forming apparatus may be replaced with another communication apparatus such as a television, a refrigerator, or the like, which is not limited herein. The image forming apparatus may be a copying machine, a facsimile machine, a multifunction image forming and copying apparatus, an electrostatic printing apparatus, or the like, in addition to the printer.
In practical applications, cluster management software may be deployed in the server, and the cluster management software collects information of the image forming apparatuses, which may include image forming apparatus information and/or consumable information, through the network. For example, the current state of the image forming apparatus, the serial number of the image forming apparatus, the IP address of the image forming apparatus, the firmware version of the image forming apparatus; consumable serial number, consumable remaining amount, number of printed pages, etc.
However, in the prior art, the server collects the information of the image forming apparatus only through a single channel, and this method is easily intercepted and tampered by a third party with a malicious means, so that the cluster management center cannot obtain the real information of the image forming apparatus. Here, the single channel may be understood as meaning that the server and the image forming apparatus establish only one network connection channel through which communication is performed.
Based on this, the embodiment of the application provides an information collection method, a communication device, a server, a system and a storage medium, so as to be beneficial to solving the problems that information is transmitted in a single-channel form in a network and is easily intercepted and tampered by a third party in a malicious way in the prior art. The details will be described below.
Referring to fig. 2, a schematic diagram of a dual channel communication scenario provided in the embodiment of the present application is shown. As shown in fig. 2, in the embodiment of the present application, the server and the image forming apparatus establish a first communication connection and a second communication connection, respectively, that is, the server and the image forming apparatus can perform information interaction through the first communication connection and the second communication connection, respectively. The data transmitted through the first communication connection and the second communication connection are mutually verified, so that the accuracy of the data collected by the server can be ensured.
In some possible implementations, the first communication connection and the second communication connection belong to different communication modes. For example, the first communication connection is a wired network or a Wi-Fi network; the second communication connection is a mobile communication network, such as a 2G, 3G, 4G or 5G network, and is not limited herein. Of course, those skilled in the art may also configure other network modes according to practical application scenarios, and this is not limited in this application embodiment.
In some possible implementations, the wired network or Wi-Fi network is used to transmit traffic data; the mobile communication network is used for transmitting the check data corresponding to the service data.
It should be noted that the application scenario shown in fig. 2 is only an exemplary description, and should not be taken as a limitation to the scope of the present application. For example, the image forming apparatus may be other communication apparatus.
Referring to fig. 3, a schematic flow chart of an information collection method provided in the embodiment of the present application is shown. The method can be applied to the application scenario shown in fig. 2, as shown in fig. 3, which mainly includes the following steps.
Step S301: the communication device transmits first data to the server through the first communication connection.
Specifically, the first data is service data. Taking the communication device as an image forming device as an example, the first data may correspond to image forming device information and/or consumable information. For example, the current state of the image forming apparatus, the serial number of the image forming apparatus, the IP address of the image forming apparatus, the firmware version of the image forming apparatus; consumable serial number, consumable remaining amount, number of printed pages, etc.
In some possible implementations, the first communication connection is a wired network or a Wi-Fi network. Of course, those skilled in the art may also use other communication modes to establish the first communication connection, and the embodiment of the present application is not limited thereto.
Step S302: the communication device sends second data to the server via a second communication connection.
Specifically, the second data is check data corresponding to the service data, the second data is associated with the first data, and the second data is used for checking the first data. That is, the server may receive the first data and the second data at the same time, and then perform mutual verification through the first data and the second data, which may ensure accuracy of the collected data.
In some possible implementations, the second communication connection may be a mobile communication network. Of course, those skilled in the art may also use other communication modes to establish the second communication connection, and the embodiment of the present application is not limited thereto.
In some possible implementations, the first communication connection and the second communication connection belong to different communication modes. For example, the first communication connection is a Wi-Fi network and the second communication connection is a mobile communication network. It can be understood that by adopting the configuration mode, a third party can be prevented from adopting a malicious means to intercept the first data and the second data at the same time, and the communication safety is improved.
In some possible implementations, the first communication connection may also be a mobile communication network, and the second communication connection is a Wi-Fi network, which is not limited herein.
In practical applications, the second data may be generated according to a preset first algorithm based on the first data.
Specifically, the first algorithm may be at least one of an encryption and decryption algorithm, a hash calculation, and an MD5 algorithm, which is not specifically limited by the embodiment of the present application.
In order to facilitate a better understanding of the technical solution for those skilled in the art, the following three ways are used to describe the process of acquiring the second data.
Firstly, encrypting the first data through a preset secret key and/or an encryption algorithm to obtain second data.
And secondly, carrying out hash operation on the first data to obtain a first hash value, wherein the first hash value is the second data.
Thirdly, carrying out hash operation on the first data to obtain a first hash value; and encrypting the first hash value through a preset secret key and/or an encryption algorithm to obtain second data.
Of course, the skilled person may also configure the second data in other manners, such as performing the MD5 algorithm on the first data to obtain an MD5 value as the second data, and of course, the second data may also be generated according to a plurality of algorithms in the above-mentioned first algorithm based on the first data, which is not limited in particular by the embodiment of the present application.
Step S303: and the server verifies the first data and the second data.
Specifically, after the server receives the first data and the second data through the first connection and the second connection, the server may check the first data and the second data to verify whether the first data and the second data are matched.
In specific implementation, third data can be obtained according to a preset second algorithm based on the second data, and the first data is verified through the third data; and/or obtaining fourth data according to a preset third algorithm based on the first data, and verifying the second data through the fourth data.
It can be understood that the verification process of the first data and the second data matches the generation mode of the second data. That is, the second algorithm and the third algorithm according to the embodiments of the present application are matched to the first algorithm.
For example, if the second data is obtained by "encrypting the first data by using a preset key and/or an encryption algorithm to obtain the second data" in the first manner, the corresponding verification process is as follows: decrypting the second data through a preset secret key and/or an encryption algorithm; and verifying the first data through the decrypted data. If the decrypted data is consistent with the first data and indicates that the data is not tampered, the verification is passed; otherwise, the check fails.
Or, encrypting the first data through a preset key and/or an encryption algorithm; and verifying the second data through the encrypted data. If the encrypted data is consistent with the second data, the data is not tampered, and the verification is passed; otherwise, the check fails.
If the second data is obtained by performing hash operation on the first data in the second manner to obtain a first hash value, where the first hash value is obtained as the second data, the corresponding verification process is as follows: performing hash operation on the first data to obtain a second hash value; and checking the second hash value through the first hash value. If the first hash value is consistent with the second hash value, the data is not tampered, and the verification is passed; otherwise, the check fails.
If the second data adopts the third mode, performing hash operation on the first data to obtain a first hash value; encrypting the first hash value through a preset secret key and/or an encryption algorithm to obtain second data, wherein the corresponding verification process is as follows: decrypting the second data through a preset secret key and/or an encryption algorithm to obtain a first hash value; performing hash operation on the first data to obtain a second hash value; and checking the second hash value through the first hash value. If the first hash value is consistent with the second hash value, the data is not tampered, and the verification is passed; otherwise, the check fails.
Step S304: and if the verification is passed, storing the first data.
It can be understood that if the verification is passed and the data is not tampered, the first data is stored, and the data collection is completed; otherwise, the first data is discarded.
In the embodiment of the application, data collection is performed in a double-channel mutual verification mode, and the integrity and accuracy of collected data are guaranteed.
In order to facilitate understanding of the technical solutions provided in the embodiments of the present application, the following describes an information collection method provided in the embodiments of the present application, taking an image forming apparatus as an example.
Referring to fig. 4, a schematic structural diagram of an image forming apparatus according to an embodiment of the present disclosure is shown. As shown in fig. 4, the image forming apparatus includes an image forming apparatus main control System-on-a-chip (SoC), an internet of things module, a network module, and consumables.
The internet of things module may specifically include a mobile communication module such as 2G, 3G, 4G, 5G, and an N-IoT module, which is not limited herein.
The network module may specifically include a wired network module or a wireless network module such as Wi-Fi, which is not limited herein.
It should be noted that the internet of things module and the network module may also be included in the same communication module, and are not limited herein.
In specific implementation, the image forming apparatus main control SoC may establish a first communication connection and a second communication connection with the server through the internet of things module and the network module, respectively, where the network module may be used to transmit service data, and the internet of things module may be used to transmit check data corresponding to the service data. Specifically, in order to improve the security of the data, the service data is plaintext information, and the check data is ciphertext information. In addition, the master control SoC is further connected with the consumable items and used for acquiring consumable item data and sending the consumable item data and the verification data corresponding to the consumable item data to the server through the first communication connection and the second communication connection.
Referring to fig. 5, a schematic flow chart of another information collection method provided in the embodiment of the present application is shown. The method is applicable to the image forming apparatus shown in fig. 4, which mainly includes the following steps, as shown in fig. 5.
S501: the server sends a query message instruction to the network module.
When the server needs to collect the image forming apparatus information, an inquiry information instruction may be sent to the network module of the image forming apparatus.
In a specific implementation, the server can send a query information instruction to the network module according to a preset time interval; the query information instruction may also be sent to the network module based on the trigger for the query information instruction, which is not specifically limited in this embodiment of the present application.
S502: the network module collects first data including image forming apparatus information and/or consumable information.
After receiving the query information instruction, the network module starts information collection, that is, first data is collected. The information may include image forming apparatus information and/or consumable information. For example, the current state of the image forming apparatus, the serial number of the image forming apparatus, the IP address of the image forming apparatus, the firmware version of the image forming apparatus; consumable serial number, consumable remaining amount, number of printed pages, etc.
S503: the network module sends first data to the Internet of things module.
After the network module finishes the collection of the first data, the first data are sent to the Internet of things module, so that the Internet of things module can generate check data corresponding to the first data according to the first data.
S504: the Internet of things module carries out Hash operation on the first data to obtain a first Hash value.
In the embodiment of the application, after receiving the first data, the internet of things module firstly performs hash operation on the first data to obtain a first hash value.
S505: the internet of things module encrypts the first hash value through a preset secret key and an encryption algorithm to obtain a ciphertext.
A key and an encryption algorithm are preset in the image forming device, and after the Internet of things module finishes Hash operation to obtain a first Hash value, the preset key and the encryption algorithm are called to encrypt the first Hash value to obtain a ciphertext. That is to say, the internet of things module transmits the check data in the form of the ciphertext.
S506: the network module sends the first data to the server through the first connection.
In a specific implementation, the network module establishes a first connection with the server, where the first connection may be a wired network or a Wi-Fi network. Accordingly, the network module may transmit the first data, i.e., the image forming apparatus information and/or the consumable information, to the server through the wired network or the Wi-Fi network.
S507: and the Internet of things module sends the ciphertext to the server through the second connection.
In a specific implementation, the internet of things module establishes a second connection with the server, and the second connection may be a mobile communication network. Accordingly, after the internet of things module completes encryption, a ciphertext can be sent to the server through the mobile communication network.
S508: and the server decrypts the ciphertext to obtain a first hash value.
The server is corresponding to the image forming device, a corresponding key and an encryption algorithm are preset in the server, and after receiving the ciphertext, the server decrypts the ciphertext according to the preset key and the encryption algorithm to obtain a first hash value. It can be understood that the first hash value is a hash value obtained by performing a hash operation on the first data by the internet of things module.
S509: and the server performs hash operation on the first data to obtain a second hash value.
After receiving the first data sent by the network module, the server performs hash operation on the first data to obtain a second hash value.
S510: and the server checks the first hash value and the second hash value.
It can be understood that if the first data is not intercepted and tampered, the first hash value is matched with the second hash value; on the contrary, if the first data is intercepted and tampered, the first hash value is not matched with the second hash value. Based on this principle, the first hash value and the second hash value are checked.
S511: and if the verification is passed, storing the first data.
If the verification is passed, the data is not tampered, the first data is stored, and data collection is completed; otherwise, the first data is discarded.
In one information collecting method shown in fig. 5, the image forming apparatus sends the first data to the server through a first connection established between the network module and the server, and the image forming apparatus sends the verification data of the first data to the server through a second connection established between the internet of things module and the server.
In the embodiment of the application, data collection is performed in a double-channel mutual verification mode, and the integrity and accuracy of collected data are guaranteed.
Corresponding to the foregoing method embodiment, an embodiment of the present application further provides a communication apparatus, including: the first sending module is used for sending first data to the server through a first communication connection;
a second sending module, configured to send second data to the server through a second communication connection, where the second data is associated with the first data, and the second data is used to verify the first data.
In one possible implementation, the communication apparatus further includes:
and the first calculating unit is used for obtaining the second data based on the first data according to a preset first algorithm.
In one possible implementation, the communication apparatus further includes:
the control unit comprises a first sending module and a second sending module, the control unit is connected with a first communication module and a second communication module, the first communication module is used for establishing first communication connection with the server, and the second communication module is specifically used for establishing second communication connection with the server.
In one possible implementation, the first computing unit includes:
and the first encryption module is used for encrypting the first data through a preset secret key and/or an encryption algorithm to obtain second data.
In one possible implementation manner, the first computing unit further includes:
the first hash calculation module is used for carrying out hash operation on the first data to obtain a first hash value;
the first encryption module is specifically configured to encrypt the first hash value through a preset key and/or an encryption algorithm to obtain second data.
Corresponding to the foregoing method embodiment, an embodiment of the present application further provides a server, including:
the first receiving module is used for receiving first data sent by the communication device through a first communication connection;
a second receiving module, configured to receive second data sent by the communication device through a second communication connection, where the second data is associated with the first data;
the verification module is used for verifying the first data and the second data;
and the storage module is used for storing the first data if the verification is passed.
In one possible implementation, the server further includes:
the second computing unit is used for generating third data based on the second data according to a preset second algorithm and verifying the first data through the third data; and/or the presence of a gas in the gas,
and the third calculating unit is used for obtaining fourth data according to a preset third algorithm based on the first data and verifying the second data through the fourth data.
In one possible implementation, the second computing unit includes: a decryption module;
the decryption module is used for decrypting the second data through a preset secret key and/or an encryption algorithm;
the third calculation unit includes: a second encryption module;
the second encryption module is used for encrypting the first data through a preset secret key and/or an encryption algorithm;
the verification module is specifically configured to verify the first data with the data decrypted by the decryption module; and/or verifying the second data through the data encrypted by the second encryption module.
In one possible implementation, the third computing unit further includes: a second hash calculation module;
the decryption module is specifically configured to decrypt the second data through a preset key and/or an encryption algorithm to obtain a first hash value;
the second hash calculation module is configured to perform hash operation on the first data to obtain a second hash value;
the verification module is specifically configured to verify the second hash value by using the first hash value.
Corresponding to the above device embodiment, an embodiment of the present application further provides an information collection system, including the above communication device and the above server, where the communication device and the server are connected through a first communication connection and a second communication connection, respectively. For the sake of brevity, detailed description is omitted here.
In specific implementation, the present application further provides a computer storage medium, where the computer storage medium may store a program, and the program may include some or all of the steps in the embodiments provided in the present application when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
In a specific implementation, an embodiment of the present application further provides a computer program product, where the computer program product includes executable instructions, and when the executable instructions are executed on a computer, the computer is caused to perform some or all of the steps in the foregoing method embodiment.
In the embodiments of the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, and means that there may be three relationships, for example, a and/or B, and may mean that a exists alone, a and B exist simultaneously, and B exists alone. Wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" and similar expressions refer to any combination of these items, including any combination of singular or plural items. For example, at least one of a, b, and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only for the specific embodiments of the present application, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure, and all the changes or substitutions should be covered by the protection scope of the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. An information collection method, comprising:
sending first data to a server through a first communication connection;
sending second data to the server through a second communication connection, wherein the second data is associated with the first data, and the second data is used for checking the first data.
2. The method of claim 1, further comprising, prior to said sending said second data to said server over a second communication connection:
and generating the second data according to a preset first algorithm based on the first data.
3. The method according to claim 2, wherein the preset first algorithm comprises at least one of an encryption and decryption algorithm, an MD5 algorithm, and a hash algorithm.
4. An information collection method applied to a server, the method comprising:
receiving first data transmitted by an image forming apparatus through a first communication connection;
receiving second data transmitted by the image forming apparatus through a second communication connection, the second data being associated with the first data;
verifying the first data and the second data;
and if the verification is passed, storing the first data.
5. The method of claim 4, wherein the verifying the first data and the second data comprises:
obtaining third data based on the second data according to a preset second algorithm, and verifying the first data through the third data; and/or the presence of a gas in the gas,
and obtaining fourth data according to a preset third algorithm based on the first data, and verifying the second data through the fourth data.
6. A communications apparatus, comprising:
the first sending module is used for sending first data to the server through a first communication connection;
a second sending module, configured to send second data to the server through a second communication connection, where the second data is associated with the first data, and the second data is used to verify the first data.
7. The communications device of claim 6, further comprising:
and the first calculating unit is used for obtaining the second data based on the first data according to a preset first algorithm.
8. The communication device according to claim 7, comprising a control unit, wherein the control unit comprises the first sending module and the second sending module, the control unit is connected to a first communication module and a second communication module, the first communication module is configured to establish the first communication connection with the server, and the second communication module is specifically configured to establish the second communication connection with the server.
9. A server, comprising:
the first receiving module is used for receiving first data sent by the communication device through a first communication connection;
a second receiving module, configured to receive second data sent by the communication device through a second communication connection, where the second data is associated with the first data;
the verification module is used for verifying the first data and the second data;
and the storage module is used for storing the first data if the verification is passed.
10. The server of claim 9, further comprising:
the second computing unit is used for generating third data based on the second data according to a preset second algorithm and verifying the first data through the third data; and/or the presence of a gas in the gas,
and the third calculating unit is used for obtaining fourth data according to a preset third algorithm based on the first data and verifying the second data through the fourth data.
11. An information collection system comprising a communication device according to any one of claims 6 to 8 and a server according to claim 9 or 10, the communication device and the server being connected by a first communication connection and a second communication connection respectively.
12. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus on which the computer-readable storage medium resides to perform the method of any one of claims 1-3.
13. A computer-readable storage medium, comprising a stored program, wherein the program, when executed, controls an apparatus in which the computer-readable storage medium resides to perform the method of claim 4 or 5.
CN202110924584.1A 2021-08-12 2021-08-12 Information collection method, communication device, server, system, and storage medium Pending CN113660385A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110924584.1A CN113660385A (en) 2021-08-12 2021-08-12 Information collection method, communication device, server, system, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110924584.1A CN113660385A (en) 2021-08-12 2021-08-12 Information collection method, communication device, server, system, and storage medium

Publications (1)

Publication Number Publication Date
CN113660385A true CN113660385A (en) 2021-11-16

Family

ID=78479518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110924584.1A Pending CN113660385A (en) 2021-08-12 2021-08-12 Information collection method, communication device, server, system, and storage medium

Country Status (1)

Country Link
CN (1) CN113660385A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159550A (en) * 2007-11-09 2008-04-09 中国移动通信集团广东有限公司 Identification identifying method
US20130276019A1 (en) * 2011-10-18 2013-10-17 Huawei Device Co., Ltd. Method and authentication server for verifying access identity of set-top box
CN104753878A (en) * 2013-12-30 2015-07-01 国民技术股份有限公司 Data verification method, mobile terminal and verification terminal
CN105262563A (en) * 2015-09-07 2016-01-20 南京科远自动化集团股份有限公司 Redundancy check method and system for enhancing communication reliability
CN106101136A (en) * 2016-07-22 2016-11-09 飞天诚信科技股份有限公司 The authentication method of a kind of biological characteristic contrast and system
CN108347404A (en) * 2017-01-24 2018-07-31 中国移动通信有限公司研究院 A kind of identity identifying method and device
CN110690956A (en) * 2019-09-27 2020-01-14 杭州海康威视数字技术股份有限公司 Bidirectional authentication method and system, server and terminal
KR20210090563A (en) * 2020-01-10 2021-07-20 베이징 바이두 넷컴 사이언스 앤 테크놀로지 코., 엘티디. Method, apparatus, device and medium for blockchain-based muti-party computation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159550A (en) * 2007-11-09 2008-04-09 中国移动通信集团广东有限公司 Identification identifying method
US20130276019A1 (en) * 2011-10-18 2013-10-17 Huawei Device Co., Ltd. Method and authentication server for verifying access identity of set-top box
CN104753878A (en) * 2013-12-30 2015-07-01 国民技术股份有限公司 Data verification method, mobile terminal and verification terminal
CN105262563A (en) * 2015-09-07 2016-01-20 南京科远自动化集团股份有限公司 Redundancy check method and system for enhancing communication reliability
CN106101136A (en) * 2016-07-22 2016-11-09 飞天诚信科技股份有限公司 The authentication method of a kind of biological characteristic contrast and system
CN108347404A (en) * 2017-01-24 2018-07-31 中国移动通信有限公司研究院 A kind of identity identifying method and device
CN110690956A (en) * 2019-09-27 2020-01-14 杭州海康威视数字技术股份有限公司 Bidirectional authentication method and system, server and terminal
KR20210090563A (en) * 2020-01-10 2021-07-20 베이징 바이두 넷컴 사이언스 앤 테크놀로지 코., 엘티디. Method, apparatus, device and medium for blockchain-based muti-party computation

Similar Documents

Publication Publication Date Title
CN108347331B (en) Method and device for safe communication between T _ Box device and ECU device in Internet of vehicles system
US10015146B2 (en) Computer implemented system and method for secure session establishment and encrypted exchange of data
US20170085543A1 (en) Apparatus and method for exchanging encryption key
CN113099443A (en) Equipment authentication method, device, equipment and system
CN108449756B (en) System, method and device for updating network key
WO2016161583A1 (en) Gprs system key enhancement method, sgsn device, ue, hlr/hss and gprs system
US11303453B2 (en) Method for securing communication without management of states
Vasudev et al. An efficient authentication and secure vehicle-to-vehicle communications in an IoV
KR20210129742A (en) Cryptographic safety mechanisms for remote control of autonomous vehicles
US20220141004A1 (en) Efficient Internet-Of-Things (IoT) Data Encryption/Decryption
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN108777678B (en) Network key interaction system, device and method
CN111726346A (en) Data secure transmission method, device and system
CN106789963B (en) Asymmetric white-box password encryption method, device and equipment
CN114520726A (en) Processing method and device based on block chain data, processor and electronic equipment
Coruh et al. ESAR: enhanced secure authentication and revocation scheme for vehicular Ad Hoc networks
Büttner et al. Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks
CN113660385A (en) Information collection method, communication device, server, system, and storage medium
CN115766119A (en) Communication method, communication apparatus, communication system, and storage medium
CN113434837B (en) Method and device for equipment identity authentication and smart home system
CN114422266A (en) IDaaS system based on dual verification mechanism
Singh et al. Pseudo-identity based secure communication scheme for vehicular ad-hoc networks
KR101595056B1 (en) System and method for data sharing of intercloud enviroment
Idrissi Anonymous ECC-authentication and intrusion detection based on execution tracing for mobile agent security
CN115001719B (en) Private data processing system, method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination