CN113923655B - Data decryption receiving method and device based on adjacent nodes - Google Patents
Data decryption receiving method and device based on adjacent nodes Download PDFInfo
- Publication number
- CN113923655B CN113923655B CN202111422147.6A CN202111422147A CN113923655B CN 113923655 B CN113923655 B CN 113923655B CN 202111422147 A CN202111422147 A CN 202111422147A CN 113923655 B CN113923655 B CN 113923655B
- Authority
- CN
- China
- Prior art keywords
- equipment
- node
- internet
- data
- things
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the application discloses a data decryption receiving method and device based on adjacent nodes, wherein the method comprises the following steps: the method comprises the steps that the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and relevant decryption equipment identifiers are recorded in the ciphertext data; the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network; and the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and decrypts the ciphertext data according to the key information to obtain decrypted data. According to the scheme, the safety of data transmission of the Internet of things is improved, and the fault tolerance mechanism is higher.
Description
Technical Field
The embodiment of the application relates to the technical field of the Internet of things, in particular to a data decryption receiving method and device based on adjacent nodes.
Background
With popularization of internet of things technology and strong functions of intelligent devices, internet of things devices play an increasingly important role in daily life of people. When a large number of traditional devices are digitally transformed, the protection capability of synchronous configuration is hardly generated, and the overall safety and reliability of the Internet of things are affected. Meanwhile, due to fusion and diversification of the terminal and the application of the Internet of things, more safety uncertainty is brought to the business of the Internet of things. The ever-increasing internet of things interconnection devices provide a huge and wide network attack entrance for attackers, so that the internet of things is faced with a great number of problems and challenges.
In the prior art, a data encryption and decryption mode for indirectly verifying by using a safe intermediate device exists, and the mode has higher safety requirement on the intermediate device, and once a problem occurs, the risk of total leakage of information under the networking is caused; another solution is to set the corresponding key data for each node device separately, but this approach causes a large amount of data to leak in a short time when the data is cracked for a single node, and the fault tolerance mechanism is poor.
Disclosure of Invention
The embodiment of the application provides a data decryption receiving method and device based on adjacent nodes, which improves the safety of data transmission of the Internet of things and has higher fault-tolerant mechanism.
In a first aspect, an embodiment of the present application provides a method for receiving and decrypting data based on a neighboring node, where the method includes:
the method comprises the steps that the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and relevant decryption equipment identifiers are recorded in the ciphertext data;
the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network;
and the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and decrypts the ciphertext data according to the key information to obtain decrypted data.
Optionally, the communication connection between the node device corresponding to the decryption device identifier and the internet of things terminal device is established, including:
the terminal equipment of the Internet of things decrypts the ciphertext data according to the first secret key stored locally to obtain a decryption equipment identifier and first ciphertext data;
the terminal equipment of the Internet of things determines node equipment corresponding to the decryption equipment identifier;
and the terminal equipment of the Internet of things determines a network connection mode with the node equipment, and establishes communication connection with the node equipment according to the network connection mode.
Optionally, after the terminal device of the internet of things sends an information obtaining instruction to the node device to obtain the key information, the method further includes:
and the node equipment determines the associated stored key information corresponding to the terminal equipment of the Internet of things according to the information acquisition instruction, and sends the key information to the terminal equipment of the Internet of things.
Optionally, the decrypting the ciphertext data according to the key information to obtain decrypted data includes:
and decrypting the first ciphertext data through the key information to obtain decrypted data.
Optionally, before the terminal device of the internet of things receives the ciphertext data sent by the application server, the method further includes:
the application server acquires data to be transmitted and corresponding terminal equipment of the Internet of things;
determining a networking node information data table under the terminal equipment of the Internet of things, selecting a node equipment in the networking node information table, acquiring a decryption equipment identifier of the selected node equipment, and acquiring a node encryption key associated with the decryption equipment identifier;
encrypting the data to be transmitted through the node encryption key, encrypting the decryption equipment identifier through an encryption public key, and combining the obtained encrypted data into ciphertext data;
and sending the ciphertext data to the terminal equipment of the Internet of things.
Optionally, selecting a node device in the networking node information table includes:
determining the calling frequency of each node device of the networking node information table;
and determining a node device according to the calling frequency.
Optionally, before the terminal device of the internet of things receives the ciphertext data sent by the application server, the method further includes:
after establishing a secure communication transmission link with the node equipment in each networking, the server receives the identification sent by each node equipment and the corresponding key information and stores the identification.
In a second aspect, an embodiment of the present application further provides a data decryption receiving apparatus based on a neighboring node, including:
the data receiving module is used for receiving ciphertext data sent by the application server, and the ciphertext data is recorded with an associated decryption equipment identifier;
the networking connection communication module is used for establishing communication connection of node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same networking;
and the data decryption module is used for sending an information acquisition instruction to the node equipment so as to acquire key information, and decrypting the ciphertext data according to the key information to obtain decrypted data.
In a third aspect, an embodiment of the present application further provides a data decryption receiving apparatus based on a neighboring node, where the apparatus includes:
one or more processors;
storage means for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the data decryption receiving method based on the neighboring node according to the embodiment of the present application.
In a fourth aspect, embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the neighbor node-based data decryption reception method according to embodiments of the present application.
In the embodiment of the application, ciphertext data sent by an application server is received through terminal equipment of the Internet of things, and the ciphertext data is recorded with an associated decryption equipment identifier; the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network; and the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and decrypts the ciphertext data according to the key information to obtain decrypted data. According to the scheme, the safety of data transmission of the Internet of things is improved, and the fault tolerance mechanism is higher.
Drawings
Fig. 1 is a flowchart of a data decryption receiving method based on neighboring nodes according to an embodiment of the present application;
fig. 2 is a flowchart of another method for receiving data decryption based on neighboring nodes according to an embodiment of the present application;
fig. 3 is a flowchart of another method for receiving data decryption based on neighboring nodes according to an embodiment of the present application;
fig. 4 is a block diagram of a data decryption receiving device based on neighboring nodes according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an apparatus according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in further detail below with reference to the drawings and examples. It should be understood that the particular embodiments described herein are illustrative only and are not limiting of embodiments of the application. It should be further noted that, for convenience of description, only some, but not all of the structures related to the embodiments of the present application are shown in the drawings.
Fig. 1 is a flowchart of a data decryption receiving method based on neighboring nodes according to an embodiment of the present application, where the embodiment is applicable to decryption of transmission data of the internet of things. An embodiment of the present application specifically includes the following steps:
step S101, the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and the ciphertext data is recorded with an associated decryption equipment identifier.
In one embodiment, the terminal device of the internet of things and the application server perform data transmission, and receive ciphertext data sent by the application server, where the ciphertext data is obtained by encrypting the sent data by the application server through an encryption key. The encrypted data is recorded with an associated decryption device identifier, wherein the decryption device identifier uniquely corresponds to a node device, and the node device is in the same network as the terminal device of the internet of things, which receives the encrypted data. If a network includes 20 terminal devices of the internet of things, each terminal device can be used as a node device, the 20 node devices are located under the same network, and the network may be an internal wifi network, a wireless local area network, or the like.
Step S102, the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier.
In one embodiment, the internet of things terminal establishes a communication connection with the node device corresponding to the decryption device identifier. In general, when the node devices in the network do not transmit data, in order to reduce power consumption, a low power consumption operation mode is adopted. At this time, after the terminal of the internet of things determines the node device corresponding to the decryption device identifier, a wake-up instruction is sent to the node device, and communication connection is established between the node device and the wake-up instruction.
Step S103, the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and the ciphertext data is decrypted according to the key information to obtain decrypted data.
In one embodiment, after determining the node device and performing secure network connection (internal local area network), key information stored in the node device is obtained, and the ciphertext data is decrypted according to the key information to obtain decrypted data.
From this, it can be known that, the ciphertext data sent by the application server is received through the terminal device of the internet of things, and the ciphertext data is recorded with the associated decryption device identifier; the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network; the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and the ciphertext data is decrypted according to the key information to obtain decrypted data.
Fig. 2 is a flowchart of another method for receiving data decryption based on neighboring nodes according to an embodiment of the present application. On the basis of the technical scheme, the terminal equipment of the internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, and the communication connection method comprises the following steps:
the terminal equipment of the Internet of things decrypts the ciphertext data according to the first secret key stored locally to obtain a decryption equipment identifier and first ciphertext data;
the terminal equipment of the Internet of things determines node equipment corresponding to the decryption equipment identifier;
and the terminal equipment of the Internet of things determines a network connection mode with the node equipment, and establishes communication connection with the node equipment according to the network connection mode. The method comprises the following steps:
step S201, the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and the ciphertext data is recorded with an associated decryption equipment identifier.
Step S202, the terminal equipment of the Internet of things decrypts the ciphertext data according to a first secret key stored locally to obtain a decryption equipment identifier and first ciphertext data; the terminal equipment of the Internet of things determines node equipment corresponding to the decryption equipment identifier; and the terminal equipment of the Internet of things determines a network connection mode with the node equipment, and establishes communication connection with the node equipment according to the network connection mode.
In an embodiment, the internet of things terminal device locally stores a first key, decrypts the ciphertext data through the first key to obtain a decryption device identifier and first ciphertext data, where the ciphertext data may be data formed by combining two pieces of data when the ciphertext data is sent by the server, one piece of the ciphertext data is the first ciphertext data obtained by encrypting actually sent service data, and the data obtained by encrypting the decryption device identifier, the decrypted key for the decryption device identifier is stored in the internet of things terminal device, that is, the internet of things terminal device itself may decrypt to obtain the decryption device identifier, and the decryption device identifier corresponds to another node device under the network, and the other piece of corresponding ciphertext data, that is, the first ciphertext data, needs to be decrypted through the decryption key of the node device corresponding to the decryption device identifier.
In one embodiment, the terminal device of the internet of things determines a network connection mode with the node device, and establishes communication connection with the node device according to the network connection mode. The network connection mode comprises internal local area network connection, wifi wireless network connection, bluetooth connection and the like. The scheme can flexibly process according to different forms of networking of the Internet of things.
Step 203, the terminal device of the internet of things establishes communication connection with the node device corresponding to the decryption device identifier.
Step S204, the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and the ciphertext data is decrypted according to the key information to obtain decrypted data.
According to the above, the encrypted data is decrypted through the terminal device of the internet of things according to the first secret key stored locally to obtain a decryption device identifier and first encrypted data; the terminal equipment of the Internet of things determines node equipment corresponding to the decryption equipment identifier; the terminal equipment of the Internet of things determines a network connection mode with the node equipment, establishes communication connection with the node equipment according to the network connection mode, ensures data transmission safety, improves data cracking difficulty, and optimizes a data transmission mechanism.
On the basis of the above technical solution, after the terminal device of the internet of things sends an information acquisition instruction to the node device to acquire the key information, the method further includes: and the node equipment determines the associated stored key information corresponding to the terminal equipment of the Internet of things according to the information acquisition instruction, and sends the key information to the terminal equipment of the Internet of things. When the node equipment receives the information acquisition instruction, the node equipment sends the self-stored key information to the terminal equipment of the Internet of things to decrypt the first ciphertext data so as to obtain decrypted data. Preferably, after the terminal device of the internet of things decrypts to obtain the decrypted data, the obtained key information sent by the node device is deleted.
On the basis of the above technical solution, the decrypting the ciphertext data according to the key information to obtain decrypted data includes: and decrypting the first ciphertext data through the key information to obtain decrypted data.
Fig. 3 is a flowchart of another method for receiving data decryption based on neighboring nodes according to an embodiment of the present application. On the basis of the technical scheme, before the terminal equipment of the internet of things receives the ciphertext data sent by the application server, the method further comprises the following steps:
the application server acquires data to be transmitted and corresponding terminal equipment of the Internet of things;
determining a networking node information data table under the terminal equipment of the Internet of things, selecting a node equipment in the networking node information table, acquiring a decryption equipment identifier of the selected node equipment, and acquiring a node encryption key associated with the decryption equipment identifier;
encrypting the data to be transmitted through the node encryption key, encrypting the decryption equipment identifier through an encryption public key, and combining the obtained encrypted data into ciphertext data;
and sending the ciphertext data to the terminal equipment of the Internet of things. The method comprises the following steps:
step S301, an application server acquires data to be transmitted and corresponding terminal equipment of the Internet of things, determines a networking node information data table under the terminal equipment of the Internet of things, and selects a node equipment from the networking node information table.
The networking node information data table records decryption equipment identifiers and corresponding encryption keys of all node equipment in the networking where the terminal equipment of the Internet of things is located.
Step S302, obtaining a decryption device identifier of the selected node device, and a node encryption key associated with the decryption device identifier, encrypting the data to be sent by using the node encryption key, encrypting the decryption device identifier by using an encryption public key, combining the obtained encrypted data into ciphertext data, and sending the ciphertext data to the terminal device of the internet of things.
After encrypting the data to be transmitted through the encryption key of the node equipment, encrypting the decryption equipment identifier through the encryption public key, and combining the obtained encrypted data into ciphertext data.
Step S303, the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and the ciphertext data is recorded with an associated decryption equipment identifier.
Step S304, the terminal equipment of the Internet of things decrypts the ciphertext data according to a first secret key (namely a public decryption key common to an application server) stored locally to obtain a decryption equipment identifier and first ciphertext data; the terminal equipment of the Internet of things determines node equipment corresponding to the decryption equipment identifier; and the terminal equipment of the Internet of things determines a network connection mode with the node equipment, and establishes communication connection with the node equipment according to the network connection mode.
Step S305, the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier.
Step S306, the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and the ciphertext data is decrypted according to the key information to obtain decrypted data.
According to the method, the data to be sent and the corresponding terminal equipment of the Internet of things are obtained through the application server; determining a networking node information data table under the terminal equipment of the Internet of things, selecting a node equipment in the networking node information table, acquiring a decryption equipment identifier of the selected node equipment, and acquiring a node encryption key associated with the decryption equipment identifier; encrypting the data to be transmitted through the node encryption key, encrypting the decryption equipment identifier through an encryption public key, and combining the obtained encrypted data into ciphertext data; the ciphertext data is sent to the terminal equipment of the Internet of things, so that the data security is improved, the problem of data leakage caused by the fact that data are cracked or an independent terminal is invaded is solved, and the data encryption and decryption mechanism is optimized.
On the basis of the technical scheme, selecting a node device in the networking node information table comprises the following steps: determining the calling frequency of each node device of the networking node information table; and determining a node device according to the calling frequency. In one embodiment, for a certain terminal device of the internet of things, the server may frequently send different service data multiple times, where each time the service data is sent, a node device is called to assist in decryption, optionally, each time the selected auxiliary node device is recorded, the number of times the selected auxiliary node device is called is recorded, when the auxiliary node device is selected again, the auxiliary node device is selected according to the number of times of recording, such as an average selection manner, and each node device uniformly decrypts the auxiliary service data. By the mode, the data processing time of each node device is balanced, and the data decryption receiving method is optimized.
On the basis of the technical scheme, before the terminal equipment of the internet of things receives the ciphertext data sent by the application server, the method further comprises the following steps: after establishing a secure communication transmission link with the node equipment in each networking, the server receives the identification sent by each node equipment and the corresponding key information and stores the identification.
Fig. 4 is a block diagram of a data decryption receiving device based on an adjacent node according to an embodiment of the present application, where the device is configured to execute the data decryption receiving method based on an adjacent node provided by the foregoing embodiment of the data receiving end, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus specifically includes: a data receiving module 101, a networking connection communication module 102 and a data decrypting module 103, wherein,
the data receiving module 101 is configured to receive ciphertext data sent by an application server, where an associated decryption device identifier is recorded in the ciphertext data;
the networking connection communication module 102 is configured to establish a communication connection with a node device corresponding to the decryption device identifier, where the terminal device of the internet of things and the node device are two different intelligent devices in the same network;
and the data decryption module 103 is configured to send an information acquisition instruction to the node device to acquire key information, and decrypt the ciphertext data according to the key information to obtain decrypted data.
According to the scheme, the terminal equipment of the Internet of things receives ciphertext data sent by the application server, and the ciphertext data is recorded with an associated decryption equipment identifier; the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network; and the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and decrypts the ciphertext data according to the key information to obtain decrypted data. According to the scheme, the safety of data transmission of the Internet of things is improved, and the fault tolerance mechanism is higher.
In one possible embodiment, the networking connection communication module is specifically configured to:
the terminal equipment of the Internet of things decrypts the ciphertext data according to the first secret key stored locally to obtain a decryption equipment identifier and first ciphertext data;
the terminal equipment of the Internet of things determines node equipment corresponding to the decryption equipment identifier;
and the terminal equipment of the Internet of things determines a network connection mode with the node equipment, and establishes communication connection with the node equipment according to the network connection mode.
In a possible embodiment, the data decryption module is further configured to:
after the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment to acquire key information, the node equipment determines associated stored key information corresponding to the terminal equipment of the Internet of things according to the information acquisition instruction and sends the key information to the terminal equipment of the Internet of things.
In one possible embodiment, the data decryption module is specifically configured to:
and decrypting the first ciphertext data through the key information to obtain decrypted data.
In one possible embodiment, the apparatus further comprises a server encryption module for: before the terminal equipment of the Internet of things receives ciphertext data sent by an application server, the application server acquires data to be sent and corresponding terminal equipment of the Internet of things;
determining a networking node information data table under the terminal equipment of the Internet of things, selecting a node equipment in the networking node information table, acquiring a decryption equipment identifier of the selected node equipment, and acquiring a node encryption key associated with the decryption equipment identifier;
encrypting the data to be transmitted through the node encryption key, encrypting the decryption equipment identifier through an encryption public key, and combining the obtained encrypted data into ciphertext data;
and sending the ciphertext data to the terminal equipment of the Internet of things.
In one possible embodiment, the server encryption module is specifically configured to:
determining the calling frequency of each node device of the networking node information table;
and determining a node device according to the calling frequency.
In a possible embodiment, the networking connection communication module is further configured to:
before the terminal equipment of the Internet of things receives ciphertext data sent by the application server, the server receives and stores an identifier and corresponding key information sent by each node equipment after establishing a secure communication transmission link with the node equipment in each networking.
Fig. 5 is a schematic structural diagram of a data decryption receiving apparatus based on neighboring nodes according to an embodiment of the present application, where, as shown in fig. 5, the apparatus includes a processor 201, a memory 202, an input device 203, and an output device 204; the number of processors 201 in the device may be one or more, one processor 201 being taken as an example in fig. 5; the processor 201, memory 202, input devices 203, and output devices 204 in the apparatus may be connected by a bus or other means, for example in fig. 5. The memory 202 is used as a computer readable storage medium for storing a software program, a computer executable program, and modules, such as program instructions/modules corresponding to the data decryption receiving method based on neighboring nodes in the embodiment of the present application. The processor 201 executes various functional applications of the device and data processing by running software programs, instructions and modules stored in the memory 202, i.e., implements the above-described neighbor-based data decryption reception method. The input means 203 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the device. The output device 204 may include a display device such as a display screen.
The embodiments of the present application also provide a storage medium containing computer executable instructions which, when executed by a computer processor, are for performing a neighbor node based data decryption reception method, the method comprising:
the method comprises the steps that the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and relevant decryption equipment identifiers are recorded in the ciphertext data;
the terminal equipment of the Internet of things establishes communication connection with the node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network;
and the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and decrypts the ciphertext data according to the key information to obtain decrypted data.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments of the present application may be implemented by software and necessary general purpose hardware, and of course may be implemented by hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the embodiments of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk, or an optical disk of a computer, where the instructions include a number of instructions for causing a computer device (which may be a personal computer, a service, or a network device, etc.) to perform the method according to the embodiments of the present application.
It should be noted that, in the above embodiment of the data decryption receiving apparatus based on the neighboring node, each unit and module included are only divided according to the functional logic, but not limited to the above division, so long as the corresponding function can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the embodiments of the present application.
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the embodiments of the present application are not limited to the particular embodiments described herein, but are capable of numerous obvious changes, rearrangements and substitutions without departing from the scope of the embodiments of the present application. Therefore, while the embodiments of the present application have been described in connection with the above embodiments, the embodiments of the present application are not limited to the above embodiments, but may include many other equivalent embodiments without departing from the spirit of the embodiments of the present application, and the scope of the embodiments of the present application is determined by the scope of the appended claims.
Claims (7)
1. A method for receiving data decryption based on neighboring nodes, comprising:
the application server acquires data to be transmitted and corresponding terminal equipment of the Internet of things;
determining a networking node information data table under the terminal equipment of the Internet of things, selecting a node equipment in the networking node information table, acquiring a decryption equipment identifier of the selected node equipment, and acquiring a node encryption key associated with the decryption equipment identifier;
encrypting the data to be transmitted through the node encryption key, encrypting the decryption equipment identifier through an encryption public key, and combining the obtained encrypted data into ciphertext data;
the ciphertext data is sent to the terminal equipment of the Internet of things;
the method comprises the steps that the terminal equipment of the Internet of things receives ciphertext data sent by an application server, and relevant decryption equipment identifiers are recorded in the ciphertext data;
the method comprises the steps that the terminal equipment of the Internet of things establishes communication connection with node equipment corresponding to the decryption equipment identifier, wherein the terminal equipment of the Internet of things and the node equipment are two different intelligent equipment in the same network, the terminal equipment of the Internet of things and the node equipment are included, the terminal equipment of the Internet of things decrypts the ciphertext data according to a first secret key stored locally to obtain the decryption equipment identifier and first ciphertext data, the terminal equipment of the Internet of things determines the node equipment corresponding to the decryption equipment identifier, the terminal equipment of the Internet of things determines a network connection mode of the terminal equipment of the Internet of things and establishes communication connection with the node equipment according to the network connection mode;
and the terminal equipment of the Internet of things sends an information acquisition instruction to the node equipment so as to acquire key information, and decrypts the first ciphertext data through the key information to obtain decrypted data.
2. The method for decrypting and receiving data based on a neighboring node according to claim 1, further comprising, after the terminal device of the internet of things sends an information acquisition instruction to the node device to acquire key information:
and the node equipment determines the associated stored key information corresponding to the terminal equipment of the Internet of things according to the information acquisition instruction, and sends the key information to the terminal equipment of the Internet of things.
3. The method for decrypting and receiving data based on a neighboring node according to claim 1, wherein selecting a node device in the networking node information table comprises:
determining the calling frequency of each node device of the networking node information table;
and determining a node device according to the calling frequency.
4. The data decryption receiving method based on neighboring nodes according to claim 1, further comprising, before the terminal device of the internet of things receives ciphertext data sent by the application server:
after establishing a secure communication transmission link with the node equipment in each networking, the server receives the identification sent by each node equipment and the corresponding key information and stores the identification.
5. A data decryption reception apparatus based on a neighboring node, comprising:
the server encryption module is used for acquiring data to be transmitted and corresponding data transmitted to the terminal equipment of the Internet of things, determining a networking node information data table under the terminal equipment of the Internet of things, selecting a node equipment in the networking node information table, acquiring a decryption equipment identifier of the selected node equipment and a node encryption key associated with the decryption equipment identifier, encrypting the data to be transmitted through the node encryption key, encrypting the decryption equipment identifier through an encryption public key, combining the obtained encrypted data into ciphertext data, and transmitting the ciphertext data to the terminal equipment of the Internet of things;
the data receiving module is used for receiving ciphertext data sent by the application server, and the ciphertext data is recorded with an associated decryption equipment identifier;
the network connection communication module is used for establishing communication connection of node equipment corresponding to the decryption equipment identifier, wherein the Internet of things terminal equipment and the node equipment are two different intelligent equipment in the same network, and the network connection communication module is specifically used for decrypting the ciphertext data according to a first secret key stored locally by the Internet of things terminal equipment to obtain the decryption equipment identifier and first ciphertext data, the Internet of things terminal equipment determines the node equipment corresponding to the decryption equipment identifier, the Internet of things terminal equipment determines a network connection mode of the node equipment, and establishes communication connection with the node equipment according to the network connection mode;
and the data decryption module is used for sending an information acquisition instruction to the node equipment so as to acquire key information, and decrypting the first ciphertext data through the key information to obtain decrypted data.
6. A neighbor node-based data decryption receiving apparatus, the apparatus comprising: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the neighbor node based data decryption reception method of any of claims 1-4.
7. A storage medium containing computer executable instructions which, when executed by a computer processor, are for performing the neighbor node-based data decryption reception method of any one of claims 1-4.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2020115486535 | 2020-12-23 | ||
CN202011548653 | 2020-12-23 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113923655A CN113923655A (en) | 2022-01-11 |
CN113923655B true CN113923655B (en) | 2023-08-25 |
Family
ID=79248427
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111422147.6A Active CN113923655B (en) | 2020-12-23 | 2021-11-26 | Data decryption receiving method and device based on adjacent nodes |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113923655B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114760156B (en) * | 2022-06-15 | 2022-10-18 | 广州万协通信息技术有限公司 | Method and device for determining associated node of terminal equipment |
CN114760056B (en) * | 2022-06-15 | 2022-10-18 | 广州万协通信息技术有限公司 | Secure communication method and device for dynamically updating key |
CN115119200B (en) * | 2022-08-29 | 2022-11-22 | 深圳慧城智联科技有限公司 | Information transmission method for 5G communication environment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603485A (en) * | 2016-10-31 | 2017-04-26 | 美的智慧家居科技有限公司 | Secret key negotiation method and device |
WO2018177385A1 (en) * | 2017-03-31 | 2018-10-04 | 华为技术有限公司 | Data transmission method, apparatus and device |
KR20190063193A (en) * | 2017-11-29 | 2019-06-07 | 고려대학교 산학협력단 | METHOD AND SYSTEM FOR DATA SHARING FOR INTERNET OF THINGS(IoT) MANAGEMENT IN CLOUD COMPUTING |
CN111953705A (en) * | 2020-08-20 | 2020-11-17 | 全球能源互联网研究院有限公司 | Internet of things identity authentication method and device and electric power Internet of things identity authentication system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20200086800A (en) * | 2019-01-10 | 2020-07-20 | 삼성전자주식회사 | Electronic apparatus, control method of the electronic apparatus and network system |
-
2021
- 2021-11-26 CN CN202111422147.6A patent/CN113923655B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603485A (en) * | 2016-10-31 | 2017-04-26 | 美的智慧家居科技有限公司 | Secret key negotiation method and device |
WO2018177385A1 (en) * | 2017-03-31 | 2018-10-04 | 华为技术有限公司 | Data transmission method, apparatus and device |
KR20190063193A (en) * | 2017-11-29 | 2019-06-07 | 고려대학교 산학협력단 | METHOD AND SYSTEM FOR DATA SHARING FOR INTERNET OF THINGS(IoT) MANAGEMENT IN CLOUD COMPUTING |
CN111953705A (en) * | 2020-08-20 | 2020-11-17 | 全球能源互联网研究院有限公司 | Internet of things identity authentication method and device and electric power Internet of things identity authentication system |
Also Published As
Publication number | Publication date |
---|---|
CN113923655A (en) | 2022-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113923655B (en) | Data decryption receiving method and device based on adjacent nodes | |
WO2022247576A1 (en) | Data processing method and apparatus, device, and computer-readable storage medium | |
CN110335043B (en) | Transaction privacy protection method, device and system based on blockchain system | |
CN108134789B (en) | Method for synchronizing data between devices through cloud and cloud server | |
CN113992427B (en) | Data encryption sending method and device based on adjacent nodes | |
US11394696B2 (en) | Resource request method, device and storage medium | |
CN111741268B (en) | Video transmission method, device, server, equipment and medium | |
CN115208697A (en) | Adaptive data encryption method and device based on attack behavior | |
US20220272511A1 (en) | Subscription data management method and apparatus | |
CN111246407B (en) | Data encryption and decryption method and device for short message transmission | |
CN112822177A (en) | Data transmission method, device, equipment and storage medium | |
CN114531239B (en) | Data transmission method and system for multiple encryption keys | |
CN114173328B (en) | Key exchange method and device and electronic equipment | |
CN114417309A (en) | Bidirectional identity authentication method, device, equipment and storage medium | |
WO2023226778A1 (en) | Identity authentication method and apparatus, and electronic device and computer-readable storage medium | |
CN113938883B (en) | Data encryption sending method and device based on intermediate node | |
CN106537962B (en) | Wireless network configuration, access and access method, device and equipment | |
CN100499649C (en) | Method for realizing safety coalition backup and switching | |
CN110519232A (en) | The remote encryption transmission system of file based on Android OS two-dimensional symmetric Encryption Algorithm | |
CN114793178A (en) | Network distribution method and device | |
CN107682380A (en) | A kind of method and device of cross-certification | |
CN114430345A (en) | Data transmission method and device, storage medium and electronic equipment | |
CN112422275A (en) | Key negotiation method, system, equipment and computer storage medium in UART communication | |
CN201663659U (en) | Front end of conditional access system and scriber management system | |
CN110457171A (en) | A kind of embedded apparatus debugging method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 401, Building A1, Qingyun Building, No. 266, Puyun Road, Jiangbei New District, Nanjing, Jiangsu Province, 210000 Applicant after: Technology Image Technology (Nanjing) Co.,Ltd. Address before: 314000 Room 101, floor 1, building 17, No. 70, Longyuan Road, Wuzhen Town, Tongxiang City, Jiaxing City, Zhejiang Province Applicant before: Jixiang Technology (Zhejiang) Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |