CN114615094B - Storage method and device based on Internet of things and security chip - Google Patents

Storage method and device based on Internet of things and security chip Download PDF

Info

Publication number
CN114615094B
CN114615094B CN202210508715.2A CN202210508715A CN114615094B CN 114615094 B CN114615094 B CN 114615094B CN 202210508715 A CN202210508715 A CN 202210508715A CN 114615094 B CN114615094 B CN 114615094B
Authority
CN
China
Prior art keywords
data
internet
node
things
security chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210508715.2A
Other languages
Chinese (zh)
Other versions
CN114615094A (en
Inventor
江向东
徐凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongshan Sanxun Electronics Co ltd
Original Assignee
Fenglian Intelligent Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fenglian Intelligent Shenzhen Co ltd filed Critical Fenglian Intelligent Shenzhen Co ltd
Priority to CN202210508715.2A priority Critical patent/CN114615094B/en
Publication of CN114615094A publication Critical patent/CN114615094A/en
Application granted granted Critical
Publication of CN114615094B publication Critical patent/CN114615094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]

Abstract

The invention relates to the technical field of Internet of things and security chips, and discloses a storage method and a storage device based on the Internet of things and the security chip, wherein the storage method and the storage device comprise the following steps: constructing a self-organizing network model of the networking equipment, and calculating to obtain an optimal data transmission path between the equipment node and the cloud server; data uploading personnel utilize the Internet of things equipment to execute data uploading operation, and the security chip generates an encryption key of the uploaded data; after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key; storing the ciphertext data into a Merkle tree cloud data storage model; and extracting ciphertext data required by the user from the Merkle tree cloud data storage model for decryption. The method of the invention guarantees the absolute control right of the user to the data based on the encryption and decryption mode of the security chip, realizes the determination of the optimal data transmission path with low delay in the Internet of things, and improves the transmission efficiency of the data in the Internet of things.

Description

Storage method and device based on Internet of things and security chip
Technical Field
The invention relates to the technical field of Internet of things and security chips, in particular to a storage method and device based on the Internet of things and the security chip.
Background
The internet of things is that various information sensors are used for acquiring any object or process needing monitoring, connection and interaction in real time, acquiring various required information such as sound, light, heat, chemistry, biology, position and the like, and the ubiquitous connection of objects and people is realized through various possible network accesses, so that the intelligent perception of the objects and the process is realized. The internet of things is an information bearer based on the internet, a traditional telecommunication network and the like, and all common physical objects which can be independently addressed can form an interconnected network. With the popularization and development of the internet of things and cloud computing, on one hand, more and more files are stored in a cloud server, so that a user loses the absolute control right of data, and the data security is difficult to guarantee. On the other hand, due to the limitation of the transmission bandwidth of the internet of things, the efficiency of data transmission and storage is low.
Disclosure of Invention
In view of the above, the invention provides a storage method based on the internet of things and a security chip, and aims to (1) realize the determination of a low-delay optimal data transmission path between any internet of things equipment node and a cloud server based on the internet of things, improve the transmission efficiency of data in the internet of things, and further improve the storage capacity of data at the cloud server within a limited time; (2) the storage structure encryption and the uploading data encryption of the Internet of things equipment are realized by using a graph encryption algorithm, and ciphertext data are stored to a cloud server side in a Merkle tree form, so that the cloud server side is prevented from checking and processing original data, and the absolute control right of a user on the data is ensured based on an encryption and decryption mode of a security chip.
The storage method based on the Internet of things and the security chip provided by the invention comprises the following steps:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
s2: the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel execute data uploading operation by using the Internet of things equipment, and the security chip generates an encryption key of the uploaded data;
s3: the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
s5: storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
s6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user. As a further improvement of the method of the invention:
optionally, the constructing a self-organizing network model of networked devices in the step S1 includes:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 924568DEST_PATH_IMAGE001
Figure 233190DEST_PATH_IMAGE002
Figure 930494DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 222935DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 283295DEST_PATH_IMAGE005
is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,
Figure 712002DEST_PATH_IMAGE006
if, if
Figure 97984DEST_PATH_IMAGE007
Representing nodes
Figure 612142DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 725460DEST_PATH_IMAGE009
Figure 274253DEST_PATH_IMAGE010
Node point
Figure 565557DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 567011DEST_PATH_IMAGE009
In the embodiment of the invention, the Internet of things equipment comprises intelligent wearing equipment such as an intelligent old man wearing device, an intelligent pet wearing device, an intelligent adult watch and an intelligent child watch, intelligent household equipment such as an intelligent air purifier platform, a floor sweeping robot, an intelligent extension socket and an intelligent kitchen and toilet, wherein communication links exist among the intelligent wearing equipment, the intelligent household equipment and a cloud server end, and mutual communication can be realized under the condition that the network communication quality is normal.
Optionally, the step S1 of calculating the low-delay optimal data transmission path between any device node in the ad hoc network model of the internet of things device and the cloud server, includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 500332DEST_PATH_IMAGE008
To cloud server
Figure 388785DEST_PATH_IMAGE004
Is optimized by the transmission path
Figure 116570DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 339741DEST_PATH_IMAGE012
Wherein
Figure 811173DEST_PATH_IMAGE013
Is a node
Figure 803400DEST_PATH_IMAGE008
The next-hop path node of (2),
Figure 951353DEST_PATH_IMAGE014
is a node
Figure 927400DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 671365DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 49257DEST_PATH_IMAGE011
The format of (A) is:
Figure 853264DEST_PATH_IMAGE016
Figure 316607DEST_PATH_IMAGE017
Figure 436284DEST_PATH_IMAGE018
wherein:
Figure 668683DEST_PATH_IMAGE019
is a node
Figure 174750DEST_PATH_IMAGE008
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 594230DEST_PATH_IMAGE008
Figure 211156DEST_PATH_IMAGE020
Is a node
Figure 281749DEST_PATH_IMAGE008
Delay of a path link between the mth hop path node and the m-1 hop path node;
Figure 958718DEST_PATH_IMAGE021
transmitting the maximum retransmission times of the data from the (m-1) th hop path node to the (m) th hop path node;
c is the set maximum retransmission times of the data of all path nodes;
Figure 865495DEST_PATH_IMAGE022
is a node
Figure 20532DEST_PATH_IMAGE008
The size of data received by the mth hop path node,
Figure 961944DEST_PATH_IMAGE023
the efficiency of forwarding data for it;
the transmission path optimization objective function
Figure 809814DEST_PATH_IMAGE011
The constraint conditions of (2) are:
Figure 954619DEST_PATH_IMAGE024
Figure 913347DEST_PATH_IMAGE025
wherein:
Figure 443686DEST_PATH_IMAGE026
representing nodes
Figure 462457DEST_PATH_IMAGE008
The m-1 hop path node and the m hop path node can normally communicate;
Figure 343826DEST_PATH_IMAGE027
representing nodes
Figure 355513DEST_PATH_IMAGE008
The Mth hop path node and the cloud server can normally communicate;
by connecting with a node
Figure 5937DEST_PATH_IMAGE008
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 930031DEST_PATH_IMAGE028
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 298695DEST_PATH_IMAGE029
For nodes in the optimal data transmission path
Figure 333647DEST_PATH_IMAGE008
To (1) a
Figure 117539DEST_PATH_IMAGE030
And (4) jumping path nodes.
Optionally, in the step S2, after the identity authentication of the data uploading personnel is passed, the data uploading personnel executes an operation of uploading data by using the internet of things device, and the security chip generates an encryption key of the uploaded data, including:
the data uploading personnel utilizes the Internet of things equipment to perform identity authentication, after a user name and a password are input into the Internet of things equipment, input information is transmitted into the security chip to perform identity authentication, and after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment and randomly generates a unique encryption key
Figure 946955DEST_PATH_IMAGE031
The data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the data format uploaded by the data uploading personnel is as follows:
Figure 68495DEST_PATH_IMAGE032
wherein:
Figure 907138DEST_PATH_IMAGE033
the method comprises the steps of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
Figure 266575DEST_PATH_IMAGE034
the data collection of the internet of things uploaded by the data uploading personnel,
Figure 47318DEST_PATH_IMAGE035
is the ID of the equipment of the Internet of things,
Figure 390575DEST_PATH_IMAGE036
uploading data corresponding to the Internet of things equipment;
in the embodiment of the invention, the security chip is built in the cloud server, and the transmission path of the input information is a low-delay optimal data transmission path between the Internet of things equipment worn by data uploading personnel and the cloud server.
Optionally, in the step S3, transmitting the data uploaded by the data uploading staff according to a low-latency optimal data transmission path between the internet of things device node and the cloud server, where the transmitting includes:
the data uploaded by the data uploading personnel are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and a cloud server side, the cloud server side receives the data uploaded by the data uploading personnel, and each hop node in the low-delay optimal data transmission path is used for transmitting the received data
Figure 32908DEST_PATH_IMAGE033
Verification is carried out by
Figure 512431DEST_PATH_IMAGE033
And subtracting the binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, the verification is successful.
Optionally, the form of the upload data includes:
the data form received by the cloud server side is as follows:
Figure 214808DEST_PATH_IMAGE037
wherein:
Figure 45361DEST_PATH_IMAGE038
for the equipment of the internet of things
Figure 976539DEST_PATH_IMAGE039
Uploading data;
the Internet of things equipment set corresponding to the uploaded data is as follows:
Figure 310568DEST_PATH_IMAGE040
optionally, in the step S4, the secure chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, including:
encryption key generated from a secure chip
Figure 183846DEST_PATH_IMAGE031
The security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded data
Figure 501695DEST_PATH_IMAGE040
Conversion into an adjacency matrix Q
Figure 220253DEST_PATH_IMAGE041
Line of
Figure 189214DEST_PATH_IMAGE042
The column values are additionally assigned
Figure 967815DEST_PATH_IMAGE043
If additional value is assigned
Figure 507380DEST_PATH_IMAGE043
If the result is odd, then the first in the matrix is adjacent
Figure 295208DEST_PATH_IMAGE041
Line of
Figure 603829DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 301134DEST_PATH_IMAGE044
wherein:
Figure 327995DEST_PATH_IMAGE045
for values in the adjacency matrix, r is the result of the additional assignments,
Figure 653934DEST_PATH_IMAGE046
is composed of
Figure 82642DEST_PATH_IMAGE045
The value of the left-hand neighbor is,
Figure 203045DEST_PATH_IMAGE047
is composed of
Figure 232049DEST_PATH_IMAGE045
The value of the right-hand neighbor is,
Figure 96100DEST_PATH_IMAGE048
is composed of
Figure 379314DEST_PATH_IMAGE045
The value of the upper neighbor is determined,
Figure 201776DEST_PATH_IMAGE049
is composed of
Figure 937651DEST_PATH_IMAGE045
The value of the lower neighbor;
Figure 870972DEST_PATH_IMAGE050
is composed of
Figure 493846DEST_PATH_IMAGE045
The encryption result of (2);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 221630DEST_PATH_IMAGE051
wherein:
Figure 444801DEST_PATH_IMAGE052
is composed of
Figure 650655DEST_PATH_IMAGE039
The encryption result in the adjacency matrix;
2) for received data sets
Figure 157728DEST_PATH_IMAGE053
Any data in (1)
Figure 321993DEST_PATH_IMAGE038
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 766881DEST_PATH_IMAGE054
wherein:
Figure 776425DEST_PATH_IMAGE055
as data
Figure 154317DEST_PATH_IMAGE038
The number of z-th bits in (b),
Figure 223904DEST_PATH_IMAGE056
bit-wise corresponding encryption results;
Figure 169470DEST_PATH_IMAGE057
is the z-th digit of the encryption key;
if z is 1, then pair
Figure 982705DEST_PATH_IMAGE058
To perform boundary-crossing processing, i.e.
Figure 949524DEST_PATH_IMAGE059
Wherein
Figure 924434DEST_PATH_IMAGE060
As data
Figure 875072DEST_PATH_IMAGE038
If z is
Figure 475687DEST_PATH_IMAGE060
Then, then
Figure 562591DEST_PATH_IMAGE061
The encryption set of the data received by the cloud server is as follows:
Figure 973981DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server side and the encryption result of the Internet of things equipment as ciphertext data.
Optionally, in the step S5, the storing the ciphertext data in the improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, includes:
the data sets uploaded by one-bit data uploading personnel at the same time
Figure 146336DEST_PATH_IMAGE053
The corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) integrating the encryption result of the Internet of things equipment with the encryption result of the corresponding data:
Figure 301374DEST_PATH_IMAGE063
wherein:
Figure 993518DEST_PATH_IMAGE052
is composed of
Figure 575809DEST_PATH_IMAGE039
As a result of the encryption of (a),
Figure 969881DEST_PATH_IMAGE064
is composed of
Figure 928610DEST_PATH_IMAGE039
Uploading data;
c is the ciphertext data after integration;
2) computing
Figure 724528DEST_PATH_IMAGE065
The hash value of (1), will be hash
Figure 743299DEST_PATH_IMAGE066
As root node of Merkle tree;
3) for any non-leaf node in the Merkle tree
Figure 873935DEST_PATH_IMAGE067
Its value is a non-leaf node
Figure 370775DEST_PATH_IMAGE067
Splicing the sub-nodes, wherein the leaf node value is the hash value of the encryption result of the single internet of things device and the corresponding upload data ciphertext; when adding the Internet of things equipment
Figure 21200DEST_PATH_IMAGE039
When the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
Optionally, in the step S6, the step S includes that the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, including:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
In order to solve the above problem, the present invention further provides a storage device based on the internet of things and a security chip, wherein the storage device includes:
the Internet of things equipment self-organization module is used for constructing an Internet of things equipment self-organization network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server end in the self-organization network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the Internet of things equipment node and the cloud server end;
the data encryption module is used for generating an encryption key of the uploaded data by the security chip, and encrypting the uploaded data by the security chip by utilizing an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
and the data storage module is used for storing the ciphertext data into the improved Merkle tree cloud data storage model and storing corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key and can return encrypted storage parameters of data required by a user, and the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameters and decrypts the ciphertext data to obtain the decrypted data required by the user.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the storage method based on the Internet of things and the security chip.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, which stores at least one instruction, where the at least one instruction is executed by a processor in an electronic device to implement the storage method based on the internet of things and a security chip.
Compared with the prior art, the invention provides a storage method based on the Internet of things and a security chip, and the technology has the following advantages:
firstly, the scheme provides the determination of the low-delay optimal data transmission path between any Internet of things equipment node and a cloud server side, and is based on an Internet of things equipment construction and networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 210873DEST_PATH_IMAGE001
Figure 579537DEST_PATH_IMAGE002
Figure 639590DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 144520DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 505095DEST_PATH_IMAGE005
is an Internet of things equipment node in the self-organizing network model, E represents the communication link connection condition of different nodes in the Internet of things equipment self-organizing network model,
Figure 361055DEST_PATH_IMAGE006
if, if
Figure 199698DEST_PATH_IMAGE007
Representing nodes
Figure 73982DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 605458DEST_PATH_IMAGE009
Figure 683135DEST_PATH_IMAGE010
Node point
Figure 591048DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 70571DEST_PATH_IMAGE009
(ii) a Determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 772948DEST_PATH_IMAGE008
To cloud server
Figure 354233DEST_PATH_IMAGE004
Is optimized by the transmission path
Figure 269099DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 134287DEST_PATH_IMAGE012
Wherein
Figure 741986DEST_PATH_IMAGE013
Is a node
Figure 59835DEST_PATH_IMAGE008
Next hop path of (2)The node is a node of the network,
Figure 27660DEST_PATH_IMAGE014
is a node
Figure 747354DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 525954DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 331099DEST_PATH_IMAGE011
The format of (A) is:
Figure 118927DEST_PATH_IMAGE016
Figure 427548DEST_PATH_IMAGE017
Figure 124853DEST_PATH_IMAGE018
wherein:
Figure 886135DEST_PATH_IMAGE068
is a node
Figure 477654DEST_PATH_IMAGE069
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 640782DEST_PATH_IMAGE069
Figure 26764DEST_PATH_IMAGE070
Is a node
Figure 55768DEST_PATH_IMAGE069
Jump of mthDelay of a path link between the path node and the m-1 th hop path node;
Figure 919819DEST_PATH_IMAGE071
transmitting the maximum retransmission times of the data from the (m-1) th hop path node to the (m) th hop path node; c is the set maximum retransmission times of the data of all path nodes;
Figure 203033DEST_PATH_IMAGE072
is a node
Figure 759916DEST_PATH_IMAGE069
The size of data received by the mth hop path node,
Figure 761370DEST_PATH_IMAGE073
the efficiency of forwarding data for it; the transmission path optimization objective function
Figure 914265DEST_PATH_IMAGE074
The constraint conditions of (2) are:
Figure 317565DEST_PATH_IMAGE024
Figure 45349DEST_PATH_IMAGE025
wherein:
Figure 268520DEST_PATH_IMAGE024
representing nodes
Figure 5532DEST_PATH_IMAGE069
The m-1 hop path node and the m hop path node can normally communicate;
Figure 997759DEST_PATH_IMAGE025
representing nodes
Figure 145712DEST_PATH_IMAGE069
The Mth hop path node and the cloud server can normally communicate; by connecting with a node
Figure 856179DEST_PATH_IMAGE069
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 131303DEST_PATH_IMAGE075
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 978036DEST_PATH_IMAGE076
For nodes in the optimal data transmission path
Figure 313203DEST_PATH_IMAGE069
To (1) a
Figure 510966DEST_PATH_IMAGE077
And (4) jumping path nodes. Compared with the traditional Internet of things communication scheme, the scheme adopts the multi-hop data transmission method, the adjacent Internet of things equipment with the minimum time delay is selected as the next hop node, and the data is transmitted from the initial Internet of things equipment to the cloud server end in the multi-hop transmission mode, so that the problems that the distance between the Internet of things equipment and the cloud server end is long and the transmission efficiency is low due to poor network are solved, the data storage capacity in limited time is improved, and the data storage efficiency is improved.
Meanwhile, the scheme provides a data encryption and decryption method based on a security chip, and the data encryption and decryption method is based on an encryption key generated by the security chip
Figure 72004DEST_PATH_IMAGE031
The security chip utilizes an improved graph encryption algorithm to the cloud server sideThe received data is encrypted, and the improved graph encryption algorithm flow is as follows: 1) converting the Internet of things equipment set corresponding to the uploaded data into an adjacency matrix Q, and comparing the first in the adjacency matrix Q with the second in the adjacency matrix Q
Figure 38823DEST_PATH_IMAGE041
Line of
Figure 279311DEST_PATH_IMAGE042
Additional assignment of column values
Figure 229950DEST_PATH_IMAGE043
If additional value is assigned
Figure 581296DEST_PATH_IMAGE043
The result is odd, then the first in the adjacent matrix
Figure 651890DEST_PATH_IMAGE041
Line of
Figure 63279DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 970055DEST_PATH_IMAGE044
wherein:
Figure 390672DEST_PATH_IMAGE078
for values in the adjacency matrix, r is the result of the additional assignments,
Figure 66504DEST_PATH_IMAGE079
is composed of
Figure 665107DEST_PATH_IMAGE078
The value of the left-hand neighbor is,
Figure 59179DEST_PATH_IMAGE080
is composed of
Figure 17908DEST_PATH_IMAGE078
The value of the right-hand neighbor is,
Figure 79405DEST_PATH_IMAGE081
is composed of
Figure 832597DEST_PATH_IMAGE078
The value of the upper neighbor is,
Figure 713966DEST_PATH_IMAGE082
is composed of
Figure 460074DEST_PATH_IMAGE078
The value of the lower neighbor;
Figure 376077DEST_PATH_IMAGE083
is composed of
Figure 300171DEST_PATH_IMAGE078
The encryption result of (1); then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 934414DEST_PATH_IMAGE051
wherein:
Figure 234946DEST_PATH_IMAGE084
is composed of
Figure 487679DEST_PATH_IMAGE085
The encryption result in the adjacency matrix; 2) for received data sets
Figure 848253DEST_PATH_IMAGE037
Any data in (1)
Figure 438635DEST_PATH_IMAGE086
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 542857DEST_PATH_IMAGE054
wherein:
Figure 167873DEST_PATH_IMAGE087
as data
Figure 699349DEST_PATH_IMAGE086
The number of z-th bits in (b),
Figure 291873DEST_PATH_IMAGE088
bit corresponding encryption results;
Figure 668628DEST_PATH_IMAGE089
is the z-th digit of the encryption key; if z is 1, then pair
Figure 413730DEST_PATH_IMAGE090
To perform boundary-crossing processing, i.e.
Figure 850527DEST_PATH_IMAGE091
Wherein
Figure 681080DEST_PATH_IMAGE092
As data
Figure 127105DEST_PATH_IMAGE086
If z is
Figure 477446DEST_PATH_IMAGE092
Then, then
Figure 350724DEST_PATH_IMAGE093
The encryption set of the data received by the cloud server is as follows:
Figure 137415DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data. Storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, a user inputs a user name and a password at a terminal, the input information is transmitted into the security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain the storage position of the data required by the user and the encryption key, and generates a decryption key corresponding to the encryption key; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal. Compared with the traditional scheme, the scheme is based on the security chip to encrypt and decrypt the data of the Internet of things device, ciphertext data are stored to the cloud server in a Merkle tree form, the cloud server is prevented from viewing and processing original data, meanwhile, the height and the width of the Merkle tree can be adjusted automatically, the data storage of various scenes can be adapted, and the absolute control right of a user on the data is guaranteed through the encryption and decryption mode based on the security chip.
Drawings
Fig. 1 is a schematic flow chart of a storage method based on the internet of things and a security chip according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of one step of the embodiment of FIG. 1;
FIG. 3 is a schematic flow chart of another step of the embodiment of FIG. 1;
fig. 4 is a functional block diagram of a storage device based on the internet of things and a security chip according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device implementing a storage method based on the internet of things and a security chip according to an embodiment of the present invention.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The embodiment of the application provides a storage method based on the Internet of things and a security chip. The execution subject of the storage method based on the internet of things and the security chip includes, but is not limited to, at least one of electronic devices, such as a server and a terminal, which can be configured to execute the method provided by the embodiments of the present application. In other words, the storage method based on the internet of things and the security chip may be executed by software or hardware installed in the terminal device or the server device, and the software may be a block chain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Example 1:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server.
The constructing of the self-organizing network model of the networked device in the step S1 includes:
an Internet of things equipment construction based networking equipment self-organizing network model, wherein the structure of the Internet of things equipment self-organizing network model is a undirected connection diagram
Figure 387130DEST_PATH_IMAGE001
Figure 841245DEST_PATH_IMAGE002
Figure 134692DEST_PATH_IMAGE003
N is a node set in the self-organizing network model,
Figure 674258DEST_PATH_IMAGE004
being the cloud server side in the ad hoc network model,
Figure 196506DEST_PATH_IMAGE005
is self-organizedThe node of the equipment of the internet of things in the network model, E represents the connection condition of communication links of different nodes in the self-organizing network model of the equipment of the internet of things,
Figure 770707DEST_PATH_IMAGE006
if, if
Figure 985788DEST_PATH_IMAGE007
Representing nodes
Figure 12650DEST_PATH_IMAGE008
Cannot be transmitted to the node
Figure 98110DEST_PATH_IMAGE009
Figure 526818DEST_PATH_IMAGE010
Node point
Figure 912799DEST_PATH_IMAGE008
Can be transmitted to the node
Figure 426957DEST_PATH_IMAGE009
It should be explained that, under the condition that the network is normal, any two nodes in the ad hoc network model of the internet of things device can communicate with each other, but under the condition that the network environment is poor, the nodes may not communicate with each other.
In the embodiment of the invention, the Internet of things equipment comprises intelligent wearing equipment such as an intelligent old man wearing device, an intelligent pet wearing device, an intelligent adult watch and an intelligent child watch, intelligent household equipment such as an intelligent air purifier platform, a floor sweeping robot, an intelligent extension socket and an intelligent kitchen and toilet, wherein communication links exist among the intelligent wearing equipment, the intelligent household equipment and a cloud server end, and mutual communication can be realized under the condition that the network communication quality is normal.
The step S1 of calculating the low-delay optimal data transmission path between any device node in the self-organizing network model of the device of the internet of things and the cloud server, includes:
determining any Internet of things equipment node in the model according to the constructed Internet of things equipment self-organizing network model
Figure 291008DEST_PATH_IMAGE008
To cloud server
Figure 839801DEST_PATH_IMAGE004
Is optimized by the transmission path
Figure 380373DEST_PATH_IMAGE011
The optimization result of the transmission path optimization objective function is
Figure 381827DEST_PATH_IMAGE012
Wherein
Figure 315148DEST_PATH_IMAGE013
Is a node
Figure 452868DEST_PATH_IMAGE008
The next-hop path node of (2),
Figure 915074DEST_PATH_IMAGE014
is a node
Figure 154556DEST_PATH_IMAGE008
The mth hop path node of (1),
Figure 891568DEST_PATH_IMAGE015
the path node is not a cloud server end, and the transmission path optimizes an objective function
Figure 883795DEST_PATH_IMAGE011
The format of (A) is:
Figure 782481DEST_PATH_IMAGE016
Figure 492948DEST_PATH_IMAGE017
Figure 768071DEST_PATH_IMAGE018
wherein:
Figure 129651DEST_PATH_IMAGE019
is a node
Figure 199238DEST_PATH_IMAGE008
Node delay of the mth jump path node, wherein the 0 th jump path node is the node
Figure 397002DEST_PATH_IMAGE008
Figure 475816DEST_PATH_IMAGE020
Is a node
Figure 177056DEST_PATH_IMAGE008
Delay of a path link between the mth hop path node and the m-1 hop path node;
Figure 683123DEST_PATH_IMAGE021
the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
Figure 850406DEST_PATH_IMAGE022
is a node
Figure 467332DEST_PATH_IMAGE008
The size of data received by the mth hop path node,
Figure 554237DEST_PATH_IMAGE023
efficiency of forwarding data for it;
the transmission path optimization objective function
Figure 965627DEST_PATH_IMAGE011
The constraint conditions of (1) are:
Figure 137982DEST_PATH_IMAGE024
Figure 558599DEST_PATH_IMAGE025
wherein:
Figure 483699DEST_PATH_IMAGE026
representing nodes
Figure 331569DEST_PATH_IMAGE008
The m-1 hop path node and the m hop path node can normally communicate;
Figure 991221DEST_PATH_IMAGE027
representing nodes
Figure 684370DEST_PATH_IMAGE008
The Mth hop path node and the cloud server can normally communicate;
by connecting with a node
Figure 745867DEST_PATH_IMAGE008
Traversing surrounding communicable nodes as next-hop nodes as a starting point, and repeating the step until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure 499059DEST_PATH_IMAGE028
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure 131160DEST_PATH_IMAGE029
For nodes in the optimal data transmission path
Figure 893580DEST_PATH_IMAGE008
To (1) a
Figure 544004DEST_PATH_IMAGE030
And (4) jumping path nodes.
S2: the data uploading personnel input the user name and the password to the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data.
In the step S2, after the identity authentication of the data uploading person passes, the data uploading person uses the internet of things device to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data, including:
the data uploading personnel use the internet of things equipment to perform identity authentication, and in detail, referring to fig. 2, the identity authentication process of the data uploading personnel is as follows:
s21, after a data uploading person inputs a user name and a password in the Internet of things equipment, the input information is transmitted to the security chip for identity authentication;
s22, after the identity authentication is passed, the security chip generates a random number and sends the random number to the Internet of things equipment, and a unique encryption key is randomly generated;
s23, the data uploading personnel use the Internet of things equipment to execute data uploading operation;
the data format uploaded by the data uploading personnel is as follows:
Figure 733677DEST_PATH_IMAGE032
wherein:
Figure 836762DEST_PATH_IMAGE033
the method comprises the steps of adding a binary result of a random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
Figure 386561DEST_PATH_IMAGE034
for the data collection of the internet of things uploaded by the data uploading personnel,
Figure 422650DEST_PATH_IMAGE035
is the ID of the equipment of the Internet of things,
Figure 517645DEST_PATH_IMAGE036
uploading data corresponding to the Internet of things equipment;
in the embodiment of the invention, the security chip is built in the cloud server, and the transmission path of the input information is a low-delay optimal data transmission path between the Internet of things equipment worn by data uploading personnel and the cloud server;
it should be explained that, the data uploading personnel use the intelligent wearable device in the internet of things device to perform identity authentication and select the uploaded data, and the uploaded data is the user use data from the internet of things device.
S3: and transmitting the uploaded data according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server.
In detail, referring to fig. 3, transmitting data uploaded by a data uploading person according to a low-latency optimal data transmission path between an internet of things device node and a cloud server includes:
s31, transmitting the data uploaded by the data uploading personnel according to a low-delay optimal data transmission path between the node of the Internet of things equipment and the cloud server;
s32 method for receiving data by each hop node in low-delay optimal data transmission path
Figure 373606DEST_PATH_IMAGE033
Verification is carried out by
Figure 212249DEST_PATH_IMAGE033
Subtracting a binary result of the random number generated by the security chip, and if the result is an accurate data uploading personnel instruction, successfully verifying;
and S33, the cloud server receives the data uploaded by the data uploading personnel.
S4: after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data.
In the step S4, the secure chip encrypts the uploaded data by using a modified graph encryption algorithm according to the generated encryption key, including:
encryption key generated from a secure chip
Figure 102844DEST_PATH_IMAGE031
The security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following flows:
1) internet of things equipment set corresponding to uploaded data
Figure 116543DEST_PATH_IMAGE040
Conversion into an adjacency matrix Q
Figure 459800DEST_PATH_IMAGE041
Line of
Figure 102134DEST_PATH_IMAGE042
The column values are additionally assigned
Figure 581657DEST_PATH_IMAGE043
If additional value is assigned
Figure 284033DEST_PATH_IMAGE043
If the result is odd, then the first in the matrix is adjacent
Figure 114586DEST_PATH_IMAGE041
Line of
Figure 544299DEST_PATH_IMAGE042
The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure 143908DEST_PATH_IMAGE044
wherein:
Figure 751607DEST_PATH_IMAGE045
for values in the adjacency matrix, r is the result of the additional assignments,
Figure 803876DEST_PATH_IMAGE046
is composed of
Figure 53592DEST_PATH_IMAGE045
The value of the left-hand neighbor is,
Figure 258440DEST_PATH_IMAGE047
is composed of
Figure 37040DEST_PATH_IMAGE045
The value of the right-hand neighbor is,
Figure 842185DEST_PATH_IMAGE048
is composed of
Figure 630012DEST_PATH_IMAGE045
The value of the upper neighbor is,
Figure 938634DEST_PATH_IMAGE049
is composed of
Figure 153715DEST_PATH_IMAGE045
The value of the lower neighbor;
Figure 695423DEST_PATH_IMAGE050
is composed of
Figure 755783DEST_PATH_IMAGE045
The encryption result of (1);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
Figure 184490DEST_PATH_IMAGE051
wherein:
Figure 570472DEST_PATH_IMAGE052
is composed of
Figure 84630DEST_PATH_IMAGE039
The encryption result in the adjacency matrix;
2) for received data sets
Figure 214260DEST_PATH_IMAGE053
Any data in (1)
Figure 245277DEST_PATH_IMAGE038
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure 802160DEST_PATH_IMAGE054
wherein:
Figure 803614DEST_PATH_IMAGE055
as data
Figure 471356DEST_PATH_IMAGE038
The number of z-th bits in (b),
Figure 874655DEST_PATH_IMAGE056
bit-wise corresponding encryption results;
Figure 586128DEST_PATH_IMAGE057
is the z-th digit of the encryption key;
if z is 1, then
Figure 74879DEST_PATH_IMAGE058
To perform boundary-crossing processing, i.e.
Figure 546311DEST_PATH_IMAGE059
Wherein
Figure 538538DEST_PATH_IMAGE060
As data
Figure 702803DEST_PATH_IMAGE038
If z is
Figure 678849DEST_PATH_IMAGE060
Then, then
Figure 173547DEST_PATH_IMAGE061
The encryption set of the data received by the cloud server is as follows:
Figure 551439DEST_PATH_IMAGE062
3) and taking the encryption set of the data received by the cloud server and the encryption result of the Internet of things equipment as ciphertext data.
S5: and storing the ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key.
In the step S5, the method includes storing ciphertext data in the improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and includes:
the data sets uploaded by one-bit data uploading personnel at the same time
Figure 355446DEST_PATH_IMAGE053
The corresponding ciphertext data form a Merkle tree at the cloud service end to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) integrating the encryption result of the Internet of things equipment with the encryption result of the corresponding data:
Figure 818789DEST_PATH_IMAGE063
wherein:
Figure 632024DEST_PATH_IMAGE052
is composed of
Figure 598843DEST_PATH_IMAGE039
As a result of the encryption of (a),
Figure 354178DEST_PATH_IMAGE064
is composed of
Figure 39238DEST_PATH_IMAGE039
Uploading data;
c is the ciphertext data after integration;
2) computing
Figure 390584DEST_PATH_IMAGE065
The hash value of (1), will be hash
Figure 946331DEST_PATH_IMAGE066
As root node of Merkle tree;
3) for any non-leaf node in the Merkle tree
Figure 851663DEST_PATH_IMAGE067
Its value is a non-leaf node
Figure 24018DEST_PATH_IMAGE067
Splicing the sub-nodes, wherein the leaf node value is the hash value of the encryption result of the single internet of things device and the corresponding upload data ciphertext; when adding the Internet of things equipment
Figure 913477DEST_PATH_IMAGE039
When the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
It should be explained that the values of the non-leaf nodes in the Merkle tree are all hash values of the encryption results of the multiple internet of things devices, and each leaf node corresponds to one internet of things device and ciphertext data of uploaded data.
S6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
In the step S6, the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, including:
the user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encryption key of the required data of the user, and a decryption key corresponding to the encryption key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends a decryption result to the user terminal.
Example 2:
fig. 4 is a functional block diagram of a storage device based on the internet of things and a security chip according to an embodiment of the present invention, which can implement the storage method in embodiment 1.
The storage device 100 based on the internet of things and the security chip can be installed in electronic equipment. According to the realized functions, the storage device based on the internet of things and the security chip may include an internet of things device self-organizing module 101, a data encryption module 102 and a data storage module 103. The module of the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
The internet of things equipment self-organizing module 101 is used for constructing an internet of things equipment self-organizing network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server side in the self-organizing network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the internet of things equipment node and the cloud server side;
the data encryption module 102, wherein the security chip generates an encryption key of the uploaded data, and according to the generated encryption key, the security chip encrypts the uploaded data by using an improved graph encryption algorithm to obtain encrypted ciphertext data;
the data storage module 103 is configured to store ciphertext data in the improved Merkle tree cloud data storage model, and store corresponding encrypted storage parameter information in the security chip, where the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and may return an encrypted storage parameter of data required by the user, and the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data to obtain the decrypted data required by the user.
In detail, when the modules in the storage device 100 based on the internet of things and the security chip in the embodiment of the present invention are used, the same technical means as the storage method based on the internet of things and the security chip described in fig. 1 above are adopted, and the same technical effects can be produced, which is not described herein again.
Example 3:
fig. 5 is a schematic structural diagram of an electronic device for implementing a storage method based on an internet of things and a security chip according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11 and a bus 12, and may further comprise a computer program, such as a data storage program, stored in the memory 11 and executable on the processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as codes of a data storage program, but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by operating or executing programs or modules (data storage programs and the like) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
Fig. 5 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 5 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the embodiments described are illustrative only and are not to be construed as limiting the scope of the claims.
The data storage program stored in the memory 11 of the electronic device 1 is a combination of instructions, which when executed in the processor 10, can implement:
constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel utilize the Internet of things equipment to execute the operation of uploading data, and the security chip generates an encryption key of the uploaded data;
the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
after the cloud server receives the uploaded data, the security chip encrypts the uploaded data by using an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encrypted storage parameter information into a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key;
the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
Specifically, the specific implementation method of the processor 10 for the instruction may refer to the description of the relevant steps in the embodiments corresponding to fig. 1 to fig. 5, which is not repeated herein.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes performed by the present invention or directly or indirectly applied to other related technical fields are also included in the scope of the present invention.

Claims (9)

1. A storage method based on the Internet of things and a security chip is characterized by comprising the following steps:
s1: constructing a self-organization network model of the networking equipment, and calculating to obtain a low-delay optimal data transmission path between any equipment node in the self-organization network model and a cloud server;
s2: the data uploading personnel input a user name and a password into the security chip for identity authentication, after the identity authentication is passed, the data uploading personnel execute data uploading operation by using the Internet of things equipment, and the security chip generates an encryption key of the uploaded data;
s3: the uploaded data are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and the cloud server;
s4: after the cloud server receives the uploaded data, according to the generated encryption key, the security chip encrypts the uploaded data by using an improved graph encryption algorithm to obtain encrypted ciphertext data, and according to the generated encryption key, the security chip encrypts the uploaded data by using the improved graph encryption algorithm, and the method comprises the following steps:
according to an encryption key pk generated by the security chip, the security chip encrypts data received by the cloud server by using an improved graph encryption algorithm, wherein the improved graph encryption algorithm comprises the following steps:
1) internet of things equipment set corresponding to uploaded data
Figure FDA0003750747130000011
Converting into an adjacency matrix Q for the m-th element in the adjacency matrix 1 Line m 2 The column values are assigned an additional value max m 1 ,m 2 Is given value max m 1 ,m 2 If the result is odd, the m-th matrix is adjoined 1 Line m 2 The row values are odd bits, otherwise even bits, and the odd and even bit values of the adjacency matrix Q are encrypted respectively:
Figure FDA0003750747130000012
wherein:
Q r for values in the adjacency matrix, r is the result of the additional assignment, Q r (x) Is Q r Value of left neighbor, Q r (y) is Q r Value of the right neighbor, Q r (s) is Q r Value of the upper neighbor, Q r (h) Is Q r The value of the lower neighbor;
c r is Q r The encryption result of (1);
then the encryption result of the internet of things device corresponding to the uploaded data is as follows:
(c 1 ,c 2 ,...,c K )
wherein:
c K is composed of
Figure FDA0003750747130000013
The encryption result in the adjacency matrix;
2) for received data set
Figure FDA0003750747130000014
Arbitrary data in (1)
Figure FDA0003750747130000015
Carrying out encryption processing, wherein the encryption formula is as follows:
Figure FDA0003750747130000016
wherein:
Figure FDA0003750747130000017
as data
Figure FDA0003750747130000018
Number z of bits of (1), c i (z) is the corresponding encryption result;
pk z is the z-th digit of the encryption key;
if z is 1, then
Figure FDA0003750747130000019
To perform boundary-crossing processing, i.e.
Figure FDA00037507471300000110
Wherein Z i As data
Figure FDA00037507471300000111
If Z is Z i Then, then
Figure FDA00037507471300000112
The encryption set of the data received by the cloud server is as follows:
{(c i (1),c i (2),...,c i (Z i ))|i∈[1,K]};
3) taking an encryption set of data received by a cloud server side and an encryption result of the Internet of things equipment as ciphertext data;
s5: storing ciphertext data into an improved Merkle tree cloud data storage model, and storing corresponding encryption storage parameter information into a security chip, wherein the encryption storage parameter information comprises a data source, a storage position and an encryption key;
s6: the user inputs a user name and a password into the security chip to perform identity authentication, the security chip returns the encrypted storage parameters of the data required by the user after the identity authentication is passed, the user extracts the ciphertext data from the cloud data storage model of the Merkle tree according to the returned encrypted storage parameters, and decrypts the ciphertext data to obtain the decrypted data required by the user.
2. The internet of things and security chip based storage method of claim 1, wherein the constructing of the ad hoc network model of networking devices in the step S1 comprises:
constructing a networking device self-organizing network model based on an Internet of things device, wherein the structure of the Internet of things device self-organizing network model is a undirected connection graph G (N, E), N (N) 0 ,n 1 ,n 2 ,...,n L },E={e ij |i∈[0,L],j∈[0,L]I ≠ j }, N is a node set in the self-organizing network model, and N is 0 For the cloud server side in the ad hoc network model, { n } 1 ,n 2 ,...,n L E represents the connection condition of communication links of different nodes in the self-organizing network model of the equipment in the Internet of things, E ij If e, {0, 1}, is present ij 0 denotes a node n i Cannot be transmitted to the node n j ,e ij 1 node n i Can be transmitted to node n j
3. The internet of things and security chip-based storage method according to claim 2, wherein the step S1 of obtaining the low-latency optimal data transmission path between any device node and the cloud server in the internet of things device ad hoc network model by calculation includes:
determining any Internet of things equipment node n in the model according to the constructed Internet of things equipment self-organizing network model i To cloud server n 0 Is optimized by the transmission path optimization objective function dis (n) i ,n 0 ) The optimization result of the transmission path optimization objective function is { n i ,n i (1),n i (2),...,n i (M),n 0 In which n is i (1) Is a node n i Of the next-hop path node n i (M) is a node n i Of the Mth hop path node, n i (1),n i (2),...,n i (M) belongs to N, the path node is not a cloud server end, and the transmission path optimization objective function dis (N) i ,n 0 ) The format of (A) is:
Figure FDA0003750747130000021
Figure FDA0003750747130000022
Figure FDA0003750747130000023
wherein:
Figure FDA0003750747130000024
is a node n i Node delay of the mth jump path node, wherein the 0 th jump path node is the node n i
Figure FDA0003750747130000025
Is a node n i Delay of a path link between the mth hop path node and the m-1 hop path node;
c m-1,m the maximum retransmission times of the data transmitted from the (m-1) th hop path node to the (m) th hop path node are obtained;
c is the set maximum retransmission times of the data of all path nodes;
Bit m is a node n i Data size, Pro, received by mth hop path node m The efficiency of forwarding data for it;
the transmission path optimization objective function dis (n) i ,n 0 ) The constraint conditions of (1) are:
e (m-1)(m) =1
e MO =1
wherein:
e (m-1)(m) 1 denotes a node n i The m-1 hop path node and the m hop path node can normally communicate;
e M0 1 denotes a node n i The Mth hop path node and the cloud server can normally communicate;
by connecting with node n i Traversing surrounding communicable nodes as next hop nodes as a starting point, and repeating the steps until the nodes reach a cloud server to obtain a data transmission path; repeating the steps to obtain a plurality of data transmission paths, respectively calculating the transmission path optimization objective function value of each transmission path, and selecting the transmission path with the minimum transmission path optimization objective function value
Figure FDA0003750747130000026
As a low-delay optimal data transmission path between any device node and the cloud server side, wherein
Figure FDA0003750747130000027
For node n in the optimal data transmission path i The mth' hop path node of (1).
4. The internet of things and security chip based storage method of claim 1, wherein in the step S2, after the identity authentication of the data uploading person is passed, the data uploading person performs data uploading operation by using an internet of things device, and the security chip generates an encryption key of the uploaded data, including:
data upload personnel and utilize thing networking equipment to carry out authentication, through after inputing user name and password in thing networking equipment, input information is transmitted and is carried out authentication in the security chip, and after authentication passed, the security chip generated the random number and is sent thing networking equipment to unique encryption key pk is generated at random, and data upload personnel utilize thing networking equipment to carry out the operation of uploading data, and the data format that data upload personnel uploaded is:
{Inst,{Equ ID :data ID }}
wherein:
inst is the sum of a binary result of the random number and a binary result of a data uploading personnel instruction, wherein the data uploading personnel instruction comprises the steps of selecting Internet of things equipment, selecting a time range of Internet of things equipment data information and uploading Internet of things equipment data information in a corresponding time range;
{Equ ID :data ID equ is the Internet of things data set uploaded by the data uploading personnel, Equ ID Is the equipment ID, data of the Internet of things ID The data is uploaded to the corresponding internet of things equipment.
5. The internet of things and security chip-based storage method according to claim 4, wherein in the step S3, the transmitting the data uploaded by the data uploading personnel according to a low-delay optimal data transmission path between the internet of things device node and the cloud server end includes:
the data uploaded by the data uploading personnel are transmitted according to a low-delay optimal data transmission path between the Internet of things equipment node and a cloud server side, the cloud server side receives the data uploaded by the data uploading personnel, each hop node in the low-delay optimal data transmission path verifies the Inst of the received data, the binary result of the random number generated by the safety chip is subtracted from the Inst, and if the result is an accurate data uploading personnel instruction, the verification is successful.
6. The internet of things and security chip based storage method of claim 1, wherein the form of the uploaded data comprises:
the data form received by the cloud server side is as follows:
Figure FDA0003750747130000031
wherein:
Figure FDA0003750747130000032
for the equipment of the internet of things
Figure FDA0003750747130000033
Uploading data;
the set of the Internet of things equipment corresponding to the uploaded data is as follows:
Figure FDA0003750747130000034
7. the internet-of-things and security chip based storage method of claim 1, wherein the step S5 is to store ciphertext data into the modified Merkle tree cloud data storage model, and store corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information includes a data source, a storage location, and an encryption key, and includes:
the data sets uploaded by one-bit data uploading personnel at the same time
Figure FDA0003750747130000035
The corresponding ciphertext data form a Merkle tree at the cloud server to finish the storage of the ciphertext data; the construction process of the Merkle tree comprises the following steps:
1) the encryption result of the Internet of things equipment and the encryption result of the corresponding data are integrated:
C=[(c 1 ,(c 1 (1),c 1 (2),...,c 1 (Z 1 )),...,(c K ,(c K (1),c K (2),...,c K (Z K ))]
wherein:
c K is composed of
Figure FDA0003750747130000036
The encryption result of (c) K (1),c K (2),...,c K (Z K ) Is prepared from
Figure FDA0003750747130000037
Uploading data;
c is the ciphertext data after integration;
2) calculating (c) 1 ,c 2 ,...,c K ) Will hash [ (c) 1 ,c 2 ,...,c K )]As root node of Merkle tree;
3) for any non-leaf node g in the Merkle tree, the value of the non-leaf node g is the splicing of the sub-nodes of the non-leaf node g, and the value of the leaf node is the hash value of the encryption result of the single Internet of things device and the corresponding uploaded data ciphertext; when adding the Internet of things equipment
Figure FDA0003750747130000038
When the data is uploaded, traversing from a non-leaf node of the Merkle tree until the leaf node is traversed, and filling an uploading data ciphertext in the leaf node according to the time sequence data of the uploading data;
and storing corresponding encrypted storage parameter information to a security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key, and the data source is an Internet of things equipment ID.
8. The internet of things and security chip based storage method of claim 1, wherein in the step S6, the user extracts ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameter, and decrypts the ciphertext data, and the method includes:
a user inputs a user name and a password at a terminal, the input information is transmitted to a security chip through a network for identity authentication, after the identity authentication is passed, the user inputs an Internet of things equipment ID of required data, the security chip searches from the stored encrypted storage parameters to obtain a storage position and an encrypted key of the data required by the user, and a decryption key corresponding to the encrypted key is generated; the cloud server locates the storage position of the data required by the user, decrypts the ciphertext data of the storage position by using the decryption key, and sends the decryption result to the user terminal.
9. A storage device based on the Internet of things and a security chip is characterized in that the device comprises:
the Internet of things equipment self-organization module is used for constructing an Internet of things equipment self-organization network model, calculating to obtain a low-delay optimal data transmission path between any equipment node and the cloud server end in the self-organization network model, and transmitting the uploaded data according to the low-delay optimal data transmission path between the Internet of things equipment node and the cloud server end;
the data encryption module is used for generating an encryption key of the uploaded data by the security chip, and encrypting the uploaded data by the security chip by utilizing an improved graph encryption algorithm according to the generated encryption key to obtain encrypted ciphertext data;
the data storage module is used for storing ciphertext data into the improved Merkle tree cloud data storage model and storing corresponding encrypted storage parameter information into the security chip, wherein the encrypted storage parameter information comprises a data source, a storage position and an encryption key and can return encrypted storage parameters of data required by a user, the user extracts the ciphertext data from the Merkle tree cloud data storage model according to the returned encrypted storage parameters and decrypts the ciphertext data to obtain decrypted data required by the user, and therefore the storage method based on the Internet of things and the security chip is achieved according to claim 1.
CN202210508715.2A 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip Active CN114615094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210508715.2A CN114615094B (en) 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210508715.2A CN114615094B (en) 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip

Publications (2)

Publication Number Publication Date
CN114615094A CN114615094A (en) 2022-06-10
CN114615094B true CN114615094B (en) 2022-09-30

Family

ID=81870344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210508715.2A Active CN114615094B (en) 2022-05-11 2022-05-11 Storage method and device based on Internet of things and security chip

Country Status (1)

Country Link
CN (1) CN114615094B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115378591B (en) * 2022-07-18 2023-04-07 咚咚数字科技有限公司 Anonymous biological characteristic key transmission method based on fusion
CN116112483B (en) * 2023-02-17 2024-02-20 重庆大学 Multidimensional optimized ROS2 intelligent communication method
CN116739389A (en) * 2023-08-14 2023-09-12 广东创能科技股份有限公司 Smart city management method and system based on cloud computing
CN116915501B (en) * 2023-09-06 2023-12-19 深圳市潼芯传感科技有限公司 Internet of things information security management method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545285A (en) * 2019-09-17 2019-12-06 北京方研矩行科技有限公司 Internet of things terminal security authentication method based on security chip
WO2021203797A1 (en) * 2020-04-07 2021-10-14 南京邮电大学 Alliance chain-based method for storing vehicle maintenance and servicing data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105100076A (en) * 2015-07-03 2015-11-25 浪潮电子信息产业股份有限公司 Cloud data security system based on USB Key
CN105721308B (en) * 2016-02-24 2016-12-28 陕西师范大学 The multi-hop cognition radio network routing method estimated based on average delay and system
CN107330337B (en) * 2017-07-19 2022-05-24 腾讯科技(深圳)有限公司 Data storage method and device of hybrid cloud, related equipment and cloud system
CN112565205B (en) * 2020-11-19 2022-04-08 湖南大学 Credible authentication and measurement method, server, terminal and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110545285A (en) * 2019-09-17 2019-12-06 北京方研矩行科技有限公司 Internet of things terminal security authentication method based on security chip
WO2021203797A1 (en) * 2020-04-07 2021-10-14 南京邮电大学 Alliance chain-based method for storing vehicle maintenance and servicing data

Also Published As

Publication number Publication date
CN114615094A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN114615094B (en) Storage method and device based on Internet of things and security chip
Avudaiappan et al. Medical image security using dual encryption with oppositional based optimization algorithm
CN105653315B (en) A kind of node operating system method for down loading based on block chain technology
Hsiao et al. Employing blockchain technology to strengthen security of wireless sensor networks
CN109698822A (en) Combination learning method and system based on publicly-owned block chain and encryption neural network
CN104715187A (en) Method and apparatus used for authenticating nodes of electronic communication system
Ataei Nezhad et al. An authentication-based secure data aggregation method in internet of things
CN107004068A (en) The safe transmission of genomic data
CN106464490A (en) Device for determining a shared key
CN109542883A (en) A kind of information duplicate checking method based on block chain
CN114679319B (en) Distributed data synchronous encryption method based on block chain
CN108092766A (en) A kind of cipher text searching method for verifying authority and its system
CN109146677A (en) Method, computer system and the readable storage medium storing program for executing of parallel building block chain view
CN115941206A (en) Carbon emission data uplink method based on block chain technology
CN104580246B (en) Dynamic and intelligent safe key is produced and managing and control system and method under WiFi environment
CN112394974A (en) Code change comment generation method and device, electronic equipment and storage medium
WO2018070932A1 (en) System and method for querying an encrypted database for documents satisfying an expressive keyword access structure
CN107196919A (en) A kind of method and apparatus of matched data
CN105359455A (en) Electronic signature system
CN115378658B (en) Park communication data transmission method based on Internet of things cloud edge collaboration
CN112948083A (en) Data processing method and device and electronic equipment
Pham et al. Enhanced security of IoT data sharing management by smart contracts and blockchain
CN114465712A (en) Data encryption method and device
CN109754322A (en) A kind of data service system
Zafar et al. Sustaining security in MANET: biometric stationed authentication protocol (BSAP) inculcating meta-heuristic genetic algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221009

Address after: 528463 Yagang Industrial Zone, Sanxiang Township, Zhongshan City, Guangdong Province

Patentee after: ZHONGSHAN SANXUN ELECTRONICS Co.,Ltd.

Address before: 518000 no.14-5, espresso software building, Haitian 2nd Road, high tech park, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: FENGLIAN INTELLIGENT (SHENZHEN) CO.,LTD.