WO2019019279A1 - 物联网终端基于类型的上行数据加密控制方法及装置 - Google Patents

物联网终端基于类型的上行数据加密控制方法及装置 Download PDF

Info

Publication number
WO2019019279A1
WO2019019279A1 PCT/CN2017/100755 CN2017100755W WO2019019279A1 WO 2019019279 A1 WO2019019279 A1 WO 2019019279A1 CN 2017100755 W CN2017100755 W CN 2017100755W WO 2019019279 A1 WO2019019279 A1 WO 2019019279A1
Authority
WO
WIPO (PCT)
Prior art keywords
type
data packet
internet
encryption
encryption unit
Prior art date
Application number
PCT/CN2017/100755
Other languages
English (en)
French (fr)
Inventor
杜光东
Original Assignee
深圳市盛路物联通讯技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市盛路物联通讯技术有限公司 filed Critical 深圳市盛路物联通讯技术有限公司
Publication of WO2019019279A1 publication Critical patent/WO2019019279A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the present invention claims the prior application priority of the application No. 201710609804.5, entitled “IoT Terminal Type-Based Uplink Data Encryption Control Method and Apparatus", filed on July 25, 2017, the content of which is incorporated herein by reference. Incorporated into this text.
  • the present application relates to the field of communications, and in particular, to a type-based uplink data encryption control method and apparatus for an Internet of Things terminal.
  • the Internet of Things is an important part of the new generation of information technology, and an important stage of development in the era of "informatization.” Its English name is: “Internet of things (IoT)". As the name suggests, the Internet of Things is the Internet that connects things. This has two meanings: First, the core and foundation of the Internet of Things is still the Internet, which is an extended and extended network based on the Internet; Second, its client extends and extends to any item and item for information. Exchange and communication, that is, things and things. The Internet of Things is widely used in the convergence of networks through communication-aware technologies such as intelligent sensing, identification technology and pervasive computing. It is also called the third wave of the development of the world information industry after computers and the Internet.
  • the Internet of Things is the application expansion of the Internet. It is not so much that the Internet of Things is a network, but the Internet of Things is a business and application. Therefore, application innovation is the core of the development of the Internet of Things. Innovation 2.0 with user experience as the core is the soul of the development of the Internet of Things.
  • the Internet of Things solves the interconnection between objects and the exchange of data between objects.
  • the existing Internet of Things is connected to the Internet based on IoT access points (APs).
  • APs IoT access points
  • the data security is low, so the user experience is low.
  • the application provides a type-based uplink data encryption control method for an Internet of Things terminal. It can improve the security of IoT data and improve the user experience.
  • the first aspect provides an IOT terminal type-based uplink data encryption control method, The method includes the following steps:
  • the Internet of Things terminal acquires a data packet to be sent
  • the IoT access point identifies the type of the data packet, and queries the first encryption unit corresponding to the type in the pre-configured type and the encryption unit mapping table according to the type;
  • the Internet of Things terminal invokes the first encryption unit to perform encryption processing on the data packet
  • the Internet of Things terminal transmits the encrypted data packet and the type to the network side device.
  • the IoT terminal identifies the type of the data packet, including:
  • the Internet of Things terminal identifies the type of the data packet according to the content of the data packet; the type of the data packet includes: a control instruction type, a parameter type, or a feedback type.
  • the method for the IoT terminal to invoke the first encryption unit to encrypt the data packet specifically includes:
  • the IoT terminal detects the signal strength of the network network device, determines a secret key according to the signal strength, and performs encryption processing on the data packet by using the first encryption unit by using the secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal acquires a level of signal strength, and queries a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the foregoing IoT terminal obtains a signal strength value, converts the intensity value into an intensity value binary number, and inputs the intensity value binary number into a preset algorithm to calculate a result as a secret key.
  • the IoT terminal invokes the first encryption unit to perform encryption processing on the data packet, including:
  • the IoT terminal extracts a 6-digit number from the current MAC address, and sequentially extracts the extracted 6-bit data and the serial number of the type to obtain a secret key, and invokes the first encryption unit to use the secret key pair.
  • the packet is encrypted.
  • an Internet of Things terminal device comprising:
  • An obtaining unit configured to obtain a data packet to be sent
  • a processing unit configured to identify a type of the data packet, and query, according to the type, a first encryption unit corresponding to the type in a pre-configured type and an encryption unit mapping table, and invoke the first encryption
  • the unit encrypts the data packet
  • a sending unit configured to send the encrypted data packet and the type to the network side device.
  • the processing unit is configured to identify a type of the data packet according to a content of the data packet, where the type of the data packet includes: a control instruction type, a parameter type, or a feedback type.
  • the processing unit is configured to detect a signal strength with the network network device, determine a secret key according to the signal strength, and perform encryption processing on the data packet by using the first encryption unit by using the secret key. .
  • the processing unit is specifically configured to obtain a level of signal strength, and query a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the processing unit is specifically configured to obtain a signal strength value, convert the intensity value into a strength value binary number, and input the intensity value binary number into a preset algorithm to calculate a result as a secret key.
  • the processing unit is configured to extract a 6-digit number from the current MAC address, and sequentially extract the extracted 6-digit number and the serial number of the type to obtain a secret key, and invoke the first encryption unit to adopt The secret key encrypts the data packet.
  • a computer storage medium may store a program, where the program includes any part of the IoT terminal type-based uplink data encryption control method described in the first aspect or All steps.
  • an Internet of Things terminal device comprising: one or more processors, a memory, a bus system, a transceiver, and one or more programs, the processor, the memory, and The transceiver is coupled by the bus system; wherein the one or more programs are stored in the memory, and the one or more programs include instructions that, when executed by the Internet of Things terminal, cause the access point to perform the In one aspect and in the first aspect, it is entirely possible to design any of the methods provided.
  • the Internet of Things terminal of the technical solution provided by the present invention acquires the data packet to be sent, the Internet of Things terminal queries the corresponding encryption unit according to the type of the data packet, and encrypts the data through the encryption unit.
  • the Internet of Things AP does not need to configure encryption. All encryption settings are in the IoT terminal. This method can effectively reduce the cost of the IoT terminal, and for the whole In the case of the Internet of Things, the IoT terminal is the starting point in IoT data. By encrypting it, it can encrypt data from the source, improving security and improving user experience.
  • FIG. 1 is a schematic flow chart of a data routing method based on an Internet of Things terminal
  • FIG. 2 is a flow chart of transmission of a packet sent by an Internet of Things terminal to a gateway
  • FIG. 3 is a flow chart of the IoT terminal transmitting data to the network side
  • FIG. 4 is a schematic diagram of an Internet of Things based architecture provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a mapping table according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a type-based uplink data encryption control method for an Internet of Things terminal according to another embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an Internet of Things terminal provided by the present application.
  • FIG. 8 is a schematic structural diagram of an Internet of Things terminal provided by the present application.
  • Computer equipment also known as “computer” means that it can be scheduled to run through An intelligent electronic device that executes a predetermined process, such as numerical calculations and/or logic calculations, that may include a processor and a memory, the processor executing a surviving instruction pre-stored in the memory to perform a predetermined process, or by an ASIC
  • a predetermined process such as numerical calculations and/or logic calculations
  • the hardware such as FPGA or DSP performs a predetermined processing process or is implemented by a combination of the two.
  • Computer devices include, but are not limited to, servers, personal computers, notebook computers, tablets, smart phones, and the like.
  • an uplink data transmission method of an Internet of Things terminal is provided.
  • the method is applied to the object network shown in FIG. 1.
  • the object network includes: an Internet of Things terminal 10, an Internet of Things access point AP20, and a wireless access controller 30.
  • the networked terminal may have different manifestations according to different situations.
  • the Internet of Things terminal may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner.
  • the smart water bottle or some intelligent devices of the Internet of Things, the above-mentioned Internet of Things terminal 10 is connected to the AP 20 in a wireless manner, and the AP 20 accesses the Internet through the gateway 12 by another means (that is, a connection mode different from the wireless mode), and the wireless method includes However, it is not limited to: Bluetooth, WIFI, etc., and the other method may be LTE or wired.
  • the wired mode is taken as an example, and for convenience of representation, only one solid line is shown here.
  • the above-mentioned wireless access controller 30 may be a personal computer (PC) according to the size of the Internet of Things. Of course, in practical applications, it may also be multiple PCs or servers.
  • PC personal computer
  • the specific embodiment of the present invention is not limited. The specific manifestation of the above wireless access controller.
  • FIG. 2 is a transmission flowchart of uplink data transmission of an Internet of Things terminal. As shown in FIG. 2, the process includes:
  • Step S201 the Internet of Things terminal 10 sends the data packet to be sent to the AP20 by wireless;
  • Step S202 AP20 forwards the data packet to the radio access controller 30;
  • Step S203 the radio access controller 30 transmits the data packet to the Internet.
  • FIG. 3 is a schematic diagram of an uplink data encryption control method for an Internet of Things terminal according to the present invention.
  • the method is implemented under the network architecture shown in FIG. 4, as shown in FIG. 4, an AP20 can be connected.
  • the AP may be a relay station.
  • it may also be a router or other network device having a wireless connection and a data forwarding function, such as a mobile phone that opens a hotspot, a personal computer that provides a wireless connection, and the like.
  • the method is as shown in FIG. 3 and includes the following steps:
  • Step S301 The Internet of Things terminal acquires a data packet to be sent
  • the object-to-network terminal in the above step S301 may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner, a smart water bottle, a smart light, a smart switch, or Some IoT smart devices.
  • Step S302 The IoT terminal identifies the type of the data packet, and queries the first encryption unit corresponding to the type in the pre-configured type and the encryption unit mapping table according to the type.
  • the types of the Internet of Things terminals in the above step S302 can be set according to the situation of the device.
  • the types of the Internet of Things terminals can include: smart lights, smart TVs, smart cleaning devices, smart sleep devices, intelligent monitoring devices, etc.
  • the form of performance can be varied.
  • the smart electric light includes, but is not limited to, a smart table lamp, a smart ceiling lamp, a smart wall lamp, etc.
  • a smart TV it can be a Samsung smart TV.
  • it can also be a Sharp smart TV.
  • smart cleaning equipment it can be a smart sweeping machine.
  • a person may also include a smart vacuum cleaner, a smart garbage processor, etc., for example, for a smart sleep device, it may be: a smart mattress, a smart sofa, etc., for example, for an intelligent monitoring device, or it may be
  • the smart blood pressure meter, the smart thermometer, and the like, the present invention is not limited to the specific types and types of the above-mentioned Internet of Things terminals.
  • the types of the foregoing data packets include, but are not limited to, a control instruction type, a parameter type, and a feedback type.
  • the control instruction type corresponds to a control command specified by some protocols, and the protocol corresponds to different protocols according to different connection manners, and is not limited thereto.
  • the parameter type may be a parameter that the IoT terminal needs to feedback, including but not limited to: a speed parameter, a temperature parameter, a time parameter, and the like.
  • the type of the feedback includes, but is not limited to, a type of data that the network side device needs to feed back the IoT terminal. .
  • the type and encryption unit mapping table in the above steps are as shown in FIG. 5, and the foregoing mapping may be a one-to-one mapping, and may of course be a one-to-many mapping.
  • the encryption unit in the above step S302 may specifically be a hardware encryption unit installed in the terminal, which includes an encryption algorithm preset by the manufacturer.
  • the encryption unit may also be a software encryption unit configured in the terminal. The invention does not limit the specific expression of the above encryption unit.
  • the foregoing encryption algorithm includes, but is not limited to, an encryption algorithm such as 3DES, MD5 or RSA, and the present invention is not limited to a specific encryption algorithm.
  • Step S303 The Internet of Things terminal invokes the first encryption unit to perform encryption processing on the data packet.
  • the implementation method of the foregoing step S303 may specifically be:
  • the first encryption unit is a 3DES encryption unit
  • the Internet of Things terminal invokes the 3DES encryption unit to perform 3DES encryption processing on the data packet.
  • the Internet of Things terminal invokes the RAS encryption unit to perform RAS encryption processing on the data packet.
  • the first encryption unit is an MD5 encryption unit
  • the Internet of Things terminal invokes the MD5 encryption unit to perform MD5 encryption processing on the data packet.
  • the foregoing encryption algorithms include, but are not limited to, triple data encryption algorithm block cipher (English: riple Data Encryption Algorithm, 3DES), message digest algorithm (English: Message Digest Algorithm, MD5) or RSA (Rivest, Shamir, Adleman) and other encryption algorithms.
  • the invention is not limited to specific encryption algorithms.
  • 3DES is a generic term for triple-data encryption algorithm block ciphers. It is equivalent to applying three DES encryption algorithms to each data block. Due to the enhancement of computer computing power, the original DES secret The key length of the code becomes vulnerable to brute force; 3DES is designed to provide a relatively simple way to avoid similar attacks by increasing the key length of the DES.
  • the implementation method of the foregoing step S303 may specifically be:
  • the IoT terminal invokes the first encryption unit to perform encryption processing on the data packet. If the encryption is successful, the subsequent step S304 is performed. If the encryption is unsuccessful, the alternate encryption unit of the first encryption unit is called to encrypt the data packet, and the data packet is encrypted. The alternate encryption unit identifies the header extension field added to the encrypted packet.
  • Step S304 The Internet of Things terminal sends the encrypted data packet to the network side device.
  • the manner in which the Internet of Things terminal sends a data packet to the AP 20 may be a method of sending a data packet by using a wireless connection, including but not limited to: Bluetooth, wireless fidelity (English: Wireless Fidelity) , WIFI) or Zigbee and other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • a wireless connection including but not limited to: Bluetooth, wireless fidelity (English: Wireless Fidelity) , WIFI) or Zigbee and other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • the Internet of Things and APs here are only for wireless APs, because for the Internet of Things, the number of devices accessed by them is large.
  • the connection is through a wired connection, the number of APs to access first will be The limitation is, and for the family, the wired connection is unimaginable for the wiring of the home user, and the cost of the cable is also very high, so the Internet of Things terminal and the AP in the technical solution of the present invention The connection between them is limited to wireless connections.
  • the implementation method of the above step S304 can be:
  • the encrypted data packet is sent to the wireless access controller in another manner.
  • the Internet of Things terminal is connected to the AP through the WIFI, and then the AP20 can send the data packet to the wireless access controller by wire, of course, in practice.
  • the AP20 can also send the encrypted data packet to the radio access controller through Long Term Evolution (LTE).
  • LTE Long Term Evolution
  • the foregoing LTE or limited mode and the manner in which the Internet of Things terminal is connected to the AP through the WIFI are merely for illustrative purposes, and the present invention does not limit the specific manner of the foregoing connection.
  • the Internet of Things terminal queries the corresponding encryption unit according to the type of the data packet, and the encryption is performed by the encryption.
  • the unit encrypts the data.
  • the Internet of Things AP does not need to configure encryption. All encryption settings are in the IoT terminal. This method can effectively reduce the cost of the IoT terminal, and for the entire Internet of Things.
  • the Internet of Things terminal is the starting point in IoT data. Encrypting data from the source by encrypting it improves security and improves the user experience.
  • FIG. 6 is a schematic diagram of an uplink data encryption control method for an Internet of Things terminal according to the present invention.
  • the method is implemented in a network architecture as shown in FIG. 4, as shown in FIG. 4, an AP20 can be connected.
  • the AP may be a relay station.
  • it may also be a router or other network device having a wireless connection and a data forwarding function, such as a mobile phone that opens a hotspot, a personal computer that provides a wireless connection, and the like.
  • the method is as shown in FIG. 6, and includes the following steps:
  • Step S601 The Internet of Things terminal acquires a data packet to be sent
  • the IoT terminal in the above step S601 may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner, a smart water bottle, a smart light, a smart switch, or Some IoT smart devices.
  • Step S602 The IoT access point identifies the type of the data packet, and queries the first encryption unit corresponding to the type in the pre-configured type and the encryption unit mapping table according to the type.
  • the types of the Internet of Things terminals in the above step S602 can be set according to the situation of the device.
  • the types of the Internet of Things terminals can include: smart lights, smart TVs, smart cleaning devices, smart sleep devices, intelligent monitoring devices, etc.
  • the form of performance can be varied.
  • the smart electric light includes, but is not limited to, a smart table lamp, a smart ceiling lamp, a smart wall lamp, etc.
  • a smart TV it can be a Samsung smart TV.
  • it can also be a Sharp smart TV.
  • a smart cleaning device it can be a smart sweeping robot.
  • a smart vacuum cleaner for example, for a smart sleep device
  • It can be: a smart mattress, a smart sofa, etc., for example, for an intelligent monitoring device, or it can be an intelligent blood pressure meter, a smart thermometer, etc., the specific types and types of the above-mentioned Internet of Things terminals of the present invention. Not limited.
  • the types of the foregoing data packets include, but are not limited to, a control instruction type, a parameter type, and a feedback type.
  • the control instruction type corresponds to a control command specified by some protocols, and the protocol corresponds to different protocols according to different connection manners, and is not limited thereto.
  • the parameter type can be
  • the parameters that the IoT terminal needs to feedback include, but are not limited to, a speed parameter, a temperature parameter, a time parameter, and the like.
  • the type of the feedback includes, but is not limited to, the type of data that the network side device needs to feed back from the Internet of Things terminal.
  • the type of the data packet identified by the Internet of Things terminal in the foregoing step S602 is specific, and may include:
  • the Internet of Things terminal identifies the type of the data packet according to the content of the data packet.
  • the content IoT terminal of the foregoing data packet can be extracted by unpacking the data packet.
  • the specific implementation manner of the present invention does not limit the specific manner of unpacking and extracting the foregoing data packet.
  • the foregoing Internet of Things terminal identifies the type of the data packet according to the content of the data packet, and includes:
  • the Internet of Things terminal extracts the content of the data packet, and analyzes the content to determine a type corresponding to the content and the type matching table.
  • the above content and type matching table may have the following representation manners, for example, storing all the characters of the control command in the matching table of the control instruction type, and if the content includes the same text as the text of the control command, determining the The content is the type of control instruction.
  • the above parameter types may also be in the same manner, for example, the keywords of the temperature parameters may be Celsius, Fahrenheit, and the like.
  • the type and encryption unit mapping table in the above steps are as shown in FIG. 5, and the foregoing mapping may be a one-to-one mapping, and may of course be a one-to-many mapping.
  • the encryption unit in the above step S602 may specifically be a hardware encryption unit disposed in the Internet of Things terminal, and includes an encryption algorithm preset by the manufacturer.
  • the encryption unit may also be a software configured in the Internet of Things terminal.
  • the encryption unit, the present invention does not limit the specific expression of the above encryption unit.
  • the foregoing encryption algorithm includes, but is not limited to, an encryption algorithm such as 3DES, MD5 or RSA, and the present invention is not limited to a specific encryption algorithm.
  • Step S603 The Internet of Things terminal extracts a 6-digit number from the current MAC address, and sequentially extracts the extracted 6-bit data and the serial number of the type to obtain a secret key, and invokes the first encryption unit to use the secret key pair. Decoding the data packet;
  • step S603 selecting 6 as the number is for convenient extraction, because the MAC address is a 48-bit address, and the 6-bit address can be extracted very conveniently, and the number corresponding to the type is increased.
  • the complexity of the secret key can be increased, and the extracted strategy can be extracted in order, or can be extracted across fields, and the other can be extracted on the same day.
  • step S603 can also be replaced by the following technical solutions, including:
  • the IoT terminal detects the signal strength of the network network device, determines a secret key according to the signal strength, and performs encryption processing on the data packet by using the first encryption unit by using the secret key.
  • the IoT terminal obtains a level of signal strength, and queries a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the Internet of Things terminal obtains a signal strength value, converts the intensity value into an intensity value binary number, and inputs the intensity value binary number into a preset algorithm to calculate a result as a secret key.
  • the implementation method of the foregoing step S603 may specifically be:
  • the first encryption unit is a 3DES encryption unit
  • the Internet of Things terminal invokes the 3DES encryption unit to perform 3DES encryption processing on the data packet.
  • the AP 20 invokes the RAS encryption unit to perform RAS encryption processing on the data packet.
  • the Internet of Things terminal invokes the MD5 encryption unit to perform MD5 encryption processing on the data packet.
  • Step S604 The Internet of Things terminal sends the encrypted data packet, the type, and the current MAC address to the network side device.
  • the implementation method of the above step S604 can be:
  • the encrypted data packet is sent to the wireless access controller in another manner.
  • the Internet of Things terminal is connected to the AP through the WIFI, and then the AP20 can send the data packet to the wireless access controller by wire, of course, in practice.
  • the AP20 can also send the encrypted data packet to the radio access controller through Long Term Evolution (LTE).
  • LTE Long Term Evolution
  • the foregoing LTE or limited mode and the manner in which the Internet of Things terminal is connected to the AP through the WIFI are merely for illustrative purposes, and the present invention does not limit the specific manner of the foregoing connection.
  • the IoT terminal uses a secret key for encrypting the data packet, and the secret key is obtained by the current MAC address and the serial number corresponding to the data packet type, so the secret is secreted.
  • the key is complex, difficult to decrypt, and has the advantage of high security.
  • FIG. 7 is an Internet of Things terminal device 700 according to the present invention.
  • the device includes:
  • An obtaining unit 701 configured to acquire a data packet to be sent
  • the processing unit 702 is configured to identify the type of the data packet, query the first encryption unit corresponding to the type in the pre-configured type and the encryption unit mapping table according to the type, and invoke the first encryption unit to Decoding the data packet;
  • the sending unit 703 is configured to send the encrypted data packet and the type to the network side device.
  • the processing unit is specifically configured to identify the type of the data packet according to the content of the data packet.
  • the processing unit is configured to extract content of the data packet, and analyze the content to determine a type of the content corresponding to the type matching table.
  • the processing unit is configured to invoke the first encryption unit to perform encryption processing on the data packet, for example, if the encryption succeeds, and perform subsequent steps, such as the encryption is unsuccessful, the IoT terminal invokes the first encryption.
  • the spare encryption unit of the unit encrypts the data packet, and adds the alternate encryption unit identifier to the header extension field of the encrypted data packet.
  • the processing unit is configured to extract a 6-digit number from the current MAC address, and sequentially extract the extracted 6-digit number and the serial number of the type to obtain a secret key, and invoke the first encryption unit to adopt The secret key encrypts the data packet.
  • the present invention further provides a computer storage medium, wherein the computer storage medium may store a program, the program including some or all of the type-based uplink data encryption control method of any one of the Internet of Things terminals described in the above first aspect. step.
  • FIG. 8 is an Internet of Things terminal 800 provided by the present invention.
  • the Internet of Things access point may be a node deployed in an Internet system, and the Internet system may further include: an Internet of Things terminal and a wireless access controller.
  • the Internet of Things terminal 800 includes, but is not limited to, a computer, a server, and the like.
  • the Internet of Things terminal 800 includes a processor 801, a memory 802, a transceiver 803, and a bus 804.
  • the transceiver 803 is used with external devices (such as other devices in the interconnection system, including However, it is not limited to: transmitting and receiving data between repeaters, core network devices, and the like.
  • the number of processors 801 in the Internet of Things terminal 800 may be one or more.
  • processor 801, memory 802, and transceiver 803 may be connected by a bus system or other means.
  • bus system or other means.
  • the program code can be stored in the memory 802.
  • the processor 801 is configured to call program code stored in the memory 802 for performing the following operations:
  • a transceiver 803 configured to receive a data packet
  • the processor 801 is configured to identify a type of the data packet, and query, according to the type, a first encryption unit corresponding to the type in a pre-configured type and an encryption unit mapping table, and invoke the first encryption unit. Encrypting the data packet.
  • the transceiver 803 is further configured to send the encrypted data packet to the network side device.
  • processor 801 and the transceiver 803 are further configured to perform the refinement and the steps of the steps and steps in the embodiment shown in FIG. 3 or FIG. 6.
  • the processor 801 herein may be a processing component or a general term of multiple processing components.
  • the processing component may be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • DSPs digital singal processors
  • FPGAs Field Programmable Gate Arrays
  • the memory 803 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate. And the memory 803 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
  • RAM random access memory
  • non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
  • the bus 804 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component (PCI) bus, or an Extended Industry Standard Architecture (EISA) bus.
  • ISA Industry Standard Architecture
  • PCI Peripheral Component
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 8, but it does not mean that there is only one bus or one type of bus.
  • the user equipment may further include an input and output device connected to the bus 804 for passing through the bus.
  • the processor 801 and other parts are connected.
  • the input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: Flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random accessor (English: Random Access Memory, referred to as: RAM), disk or optical disk.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种物联网终端基于类型的上行数据加密控制方法,所述方法包括如下步骤:所述物联网终端获取待发送的数据包;所述物联网接入点识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元;所述物联网终端调用所述第一加密单元对所述数据包进行加密处理;所述物联网终端将加密处理后的数据包和所述类型向网络侧设备发送。本申请具有用户体验度高的优点。

Description

物联网终端基于类型的上行数据加密控制方法及装置
本发明要求2017年7月25日递交的发明名称为“物联网终端基于类型的上行数据加密控制方法及装置”的申请号201710609804.5的在先申请优先权,上述在先申请的内容以引入的方式并入本文本中。
技术领域
本申请涉及通信领域,尤其涉及一种物联网终端基于类型的上行数据加密控制方法及装置。
背景技术
物联网是新一代信息技术的重要组成部分,也是“信息化”时代的重要发展阶段。其英文名称是:“Internet of things(IoT)”。顾名思义,物联网就是物物相连的互联网。这有两层意思:其一,物联网的核心和基础仍然是互联网,是在互联网基础上的延伸和扩展的网络;其二,其用户端延伸和扩展到了任何物品与物品之间,进行信息交换和通信,也就是物物相息。物联网通过智能感知、识别技术与普适计算等通信感知技术,广泛应用于网络的融合中,也因此被称为继计算机、互联网之后世界信息产业发展的第三次浪潮。物联网是互联网的应用拓展,与其说物联网是网络,不如说物联网是业务和应用。因此,应用创新是物联网发展的核心,以用户体验为核心的创新2.0是物联网发展的灵魂。
物联网解决的是物物之间的互联以及物物之间的数据交换,现有的物联网在联网时均基于物联网接入点(英文:access point,AP)来接入互联网,物联网的数据安全性较低,所以用户体验度低。
发明内容
本申请提供一种物联网终端基于类型的上行数据加密控制方法。可以提高物联网数据的安全性,提高用户体验。
第一方面,提供一种物联网终端基于类型的上行数据加密控制方法,所述 方法包括如下步骤:
所述物联网终端获取待发送的数据包;
所述物联网接入点识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元;
所述物联网终端调用所述第一加密单元对所述数据包进行加密处理;
所述物联网终端将加密处理后的数据包和所述类型向网络侧设备发送。
可选的,所述物联网终端识别所述数据包的类型具体,包括:
所述物联网终端依据所述数据包的内容识别所述数据包的类型;所述数据包的类型包括:控制指令类型、参数类型或反馈类型。
所述物联网终端调用所述第一加密单元对所述数据包进行加密处理具体包括:
所述物联网终端检测与所述网络网设备的信号强度,依据所述信号强度确定秘钥,采用所述秘钥采用第一加密单元对所述数据包进行加密处理。
可选的,所述依据所述信号强度确定秘钥具体,包括:
所述物联网终端获取信号强度的等级,依据等级与秘钥的映射关系查询出所述信号强度的等级对应的秘钥。
可选的,上述物联网终端获取信号强度值,将该强度值转换成强度值二进制数,将所述强度值二进制数输入预设算法计算得到的结果作为秘钥。上述预设算法具体可以为:秘钥=LSB 32bit SHA-256(强度值二进制数||MAC),其中该MAC地址为物联网终端的MAC地址。
可选的,所述物联网终端调用所述第一加密单元对所述数据包进行加密处理具体,包括:
所述物联网终端从当前MAC地址中提取出6位数字,将提取出的6位数据与所述类型的序号按顺序排列起来得到秘钥,调用第一加密单元采用所述秘钥对所述数据包进行加密处理。
第二方面,提供一种物联网终端装置,所述装置包括:
获取单元,用于获取待发送的数据包;
处理单元,用于识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元,调用所述第一加密 单元对所述数据包进行加密处理;
发送单元,用于将加密处理后的数据包和所述类型向网络侧设备发送。
可选的,所述处理单元具体,用于依据所述数据包的内容识别所述数据包的类型,所述数据包的类型包括:控制指令类型、参数类型或反馈类型。
可选的,所述处理单元具体,用于检测与所述网络网设备的信号强度,依据所述信号强度确定秘钥,采用所述秘钥采用第一加密单元对所述数据包进行加密处理。
可选的,所述处理单元,具体用于获取信号强度的等级,依据等级与秘钥的映射关系查询出所述信号强度的等级对应的秘钥。可选的,所述处理单元,具体用于获取信号强度值,将该强度值转换成强度值二进制数,将所述强度值二进制数输入预设算法计算得到的结果作为秘钥。上述预设算法具体可以为:秘钥=LSB 32bit SHA-256(强度值二进制数||MAC),其中该MAC地址为物联网终端的MAC地址。
可选的,所述处理单元具体,用于从当前MAC地址中提取出6位数字,将提取出的6位数字与所述类型的序号按顺序排列起来得到秘钥,调用第一加密单元采用所述秘钥对所述数据包进行加密处理。
第三方面,提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述第一方面记载的任何一种物联网终端基于类型的上行数据加密控制方法的部分或全部步骤。
第四方面,提供一种物联网终端设备,所述物联网终端设备包括:一个或多个处理器、存储器、总线系统、收发器以及一个或多个程序,所述处理器、所述存储器和所述收发器通过所述总线系统相连;其中所述一个或多个程序被存储在所述存储器中,一个或多个程序包括指令,指令当被物联网终端执行时使接入点执行上述第一方面及第一方面全部可能设计提供的方法中的任意一种。
本发明提供的技术方案的物联网终端获取待发送的数据包以后,物联网终端依据该数据包的类型查询出该类型对应的加密单元,通过该加密单元对数据进行加密,对于物联网来说,物联网AP无需对加密进行配置,所有的加密设置均在物联网终端,此方式能够有效的降低物联网终端的成本,并且对于整个 物联网来说,物联网终端为物联网数据中的起点,通过对其加密能够从源头对数据进行加密,提高了安全性,提高用户的体验。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是一种基于物联网终端的数据路由方法的流程示意图;
图2是一种物联网终端向网关发送数据包的传输流程图;
图3为物联网终端将数据传输至网络侧的流程图
图4是本申请一实施例提供的基于物联网构架示意图;
图5是本申请一实施例的映射表示意图;
图6是本申请另一实施例提供的物联网终端基于类型的上行数据加密控制方法的流程示意图;
图7是本申请提供的一种物联网终端的结构示意图;
图8是本申请提供的一种物联网终端的结构示意图。
具体实施方式
在更加详细地讨论示例性实施例之前应当提到的是,一些示例性实施例被描述成作为流程图描绘的处理或方法。虽然流程图将各项操作描述成顺序的处理,但是其中的许多操作可以被并行地、并发地或者同时实施。此外,各项操作的顺序可以被重新安排。当其操作完成时所述处理可以被终止,但是还可以具有未包括在附图中的附加步骤。所述处理可以对应于方法、函数、规程、子例程、子程序等等。
在上下文中所称“计算机设备”,也称为“电脑”,是指可以通过运行预定 程序或指令来执行数值计算和/或逻辑计算等预定处理过程的智能电子设备,其可以包括处理器与存储器,由处理器执行在存储器中预存的存续指令来执行预定处理过程,或是由ASIC、FPGA、DSP等硬件执行预定处理过程,或是由上述二者组合来实现。计算机设备包括但不限于服务器、个人电脑、笔记本电脑、平板电脑、智能手机等。
后面所讨论的方法(其中一些通过流程图示出)可以通过硬件、软件、固件、中间件、微代码、硬件描述语言或者其任意组合来实施。当用软件、固件、中间件或微代码来实施时,用以实施必要任务的程序代码或代码段可以被存储在机器或计算机可读介质(比如存储介质)中。(一个或多个)处理器可以实施必要的任务。
这里所公开的具体结构和功能细节仅仅是代表性的,并且是用于描述本发明的示例性实施例的目的。但是本发明可以通过许多替换形式来具体实现,并且不应当被解释成仅仅受限于这里所阐述的实施例。
应当理解的是,虽然在这里可能使用了术语“第一”、“第二”等等来描述各个单元,但是这些单元不应当受这些术语限制。使用这些术语仅仅是为了将一个单元与另一个单元进行区分。举例来说,在不背离示例性实施例的范围的情况下,第一单元可以被称为第二单元,并且类似地第二单元可以被称为第一单元。这里所使用的术语“和/或”包括其中一个或更多所列出的相关联项目的任意和所有组合。
这里所使用的术语仅仅是为了描述具体实施例而不意图限制示例性实施例。除非上下文明确地另有所指,否则这里所使用的单数形式“一个”、“一项”还意图包括复数。还应当理解的是,这里所使用的术语“包括”和/或“包含”规 定所陈述的特征、整数、步骤、操作、单元和/或组件的存在,而不排除存在或添加一个或更多其他特征、整数、步骤、操作、单元、组件和/或其组合。
还应当提到的是,在一些替换实现方式中,所提到的功能/动作可以按照不同于附图中标示的顺序发生。举例来说,取决于所涉及的功能/动作,相继示出的两幅图实际上可以基本上同时执行或者有时可以按照相反的顺序来执行。
下面结合附图对本发明作进一步详细描述。
根据本发明的一个方面,提供了一种物联网终端的上行数据发送方法。其中,该方法应用在如图1所示的物联网络中,如图1所示,该物联网络包括:物联网终端10、物联网接入点AP20以及无线接入控制器30,上述物联网终端根据不同的情况可以具有不同的表现形式,例如该物联网终端具体可以为:手机、平板电脑、计算机等设备,当然其也可以包含带有联网功能的其他设备,例如智能电视、智能空调、智能水壶或一些物联网的智能设备,上述物联网终端10通过无线方式与AP20连接,AP20通过另一种方式(即与无线方式不同的连接方式)与网关12接入互联网,上述无线方式包括但不限于:蓝牙、WIFI等方式,上述另一种方式可以为,LTE或有线方式。图1中以有线方式为示例,为了方便表示,这里仅以一根实线表示。
上述无线接入控制器30根据物联网的大小可以是一台个人电脑(英文:Personal computer,PC),当然在实际应用中,也可以是多台PC或服务器,本发明具体实施方式并不局限上述无线接入控制器的具体表现形式。
参阅图2,图2为物联网终端的上行数据发送的传输流程图,如图2所示,该流程包括:
步骤S201、物联网终端10将需要发送的数据包通过无线方式发送至AP20;
步骤S202、AP20将该数据包转发给无线接入控制器30;
步骤S203、无线接入控制器30将数据包传输至互联网。
通过上述图1和图2的表示,在数据包的实际传输中,如果AP20与无线接入控制器30之间出现泄密,那么对于发送的数据包由于没有经过相应的加密处理,所以很容易导致数据的泄漏,容易出现安全性问题。
参阅图3,图3为本发明提供的一种物联网终端基于类型的上行数据加密控制方法,该方法在如图4所示的网络构架下实现,如图4所示,一个AP20下可以连接多个物联网终端,该AP具体可以为中继站,当然在实际应用中也可以为路由器或其他的具有无线连接以及数据转发功能的网络设备,例如开通热点的手机、提供无线连接的个人电脑等设备,该方法如图3所示,包括如下步骤:
步骤S301、物联网终端获取待发送的数据包;
上述步骤S301中的物联网终端具体可以为:手机、平板电脑、计算机等设备,当然其也可以包含带有联网功能的其他设备,例如智能电视、智能空调、智能水壶、智能灯、智能开关或一些物联网的智能设备。
步骤S302、所述物联网终端识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元。
上述步骤S302中的物联网终端的类型各个厂家可以根据自行的情况进行设置,例如,该物联网终端的类型具体可以包括:智能电灯、智能电视、智能清扫设备、智能睡眠设备,智能监控设备等,其表现的形式可以为多种多样,例如对于智能电灯,该智能电灯包括但不限于:智能台灯,智能吸顶灯,智能壁灯等设备,例如对于智能电视来说,其可以为三星牌智能电视,当然其也可以为夏普牌智能电视,例如对于智能清扫设备来说,其可以为,智能扫地机器 人,当然其还可以包括智能吸尘器、智能垃圾处理器等设备,例如对于智能睡眠设备来说,其可以为:智能床垫、智能沙发等设备,例如对智能监控设备来说或,其可以为,智能血压计,智能温度计等,本发明对上述物联网终端的具体类型以及类型的数量或种类并不限定。
上述数据包的类型包括但不限于:控制指令类型、参数类型、反馈类型,其中,控制指令类型对应一些协议规定的控制命令,该协议根据不同的连接方式对应不同的协议,这里并不限于该协议的具体表现形式。该参数类型可以为物联网终端需要反馈的参数,包括但不限于:速度参数、温度参数、时间参数等等,该反馈类型包括单不限于,网络侧设备需要物联网终端反馈的的数据的类型。
上述步骤中的类型与加密单元映射表如图5所示,上述映射可以为一一映射,当然也可以为一对多映射等方式。
上述步骤S302中的加密单元具体可以为设置在终端的硬件加密单元,其包含厂家预设设置的加密算法,当然在实际应用中,上述加密单元还可以为配置在终端内的软件加密单元,本发明并不限制上述加密单元的具体表现形式。
上述加密算法包括但不限于:3DES、MD5或RSA等加密算法,本发明并不局限具体的加密算法。
步骤S303、物联网终端调用第一加密单元对该数据包进行加密处理;
上述步骤S303的实现方法具体可以为:
例如,第一加密单元为3DES加密单元,则物联网终端调用3DES加密单元对数据包进行3DES加密处理。例如第一加密单元为RAS加密单元,则物联网终端调用RAS加密单元对数据包进行RAS加密处理。例如第一加密单元为MD5加密单元,则物联网终端调用MD5加密单元对数据包进行MD5加密处理。
上述加密算法包括但不限于:三重数据加密算法块密码(英文:riple Data Encryption Algorithm,3DES)、消息摘要算法(英文:Message Digest Algorithm,MD5)或RSA(Rivest,Shamir,Adleman)等加密算法,本发明并不局限具体的加密算法。例如3DES是三重数据加密算法块密码的通称。它相当于是对每个数据块应用三次DES加密算法。由于计算机运算能力的增强,原版DES密 码的密钥长度变得容易被暴力破解;3DES即是设计用来提供一种相对简单的方法,即通过增加DES的密钥长度来避免类似的攻击。
上述步骤S303的实现方法具体可以为:
物联网终端调用第一加密单元对该数据包进行加密处理,如加密成功,进行后续步骤S304,如加密不成功,则调用第一加密单元的备用加密单元对该数据包进行加密处理,将采用备用加密单元标识添加到加密处理后的数据包的包头扩展字段。
步骤S304、物联网终端将该加密处理后的数据包向网络侧设备发送。
上述步骤S304中物联网终端向AP20(一种网络侧设备)发送数据包的方式可以为通过无线连接的方式发送数据包,该无线方式包括但不限于:蓝牙、无线保真(英文:Wireless Fidelity,WIFI)或Zigbee等无线方式,其中,上述WIFI需要遵守IEEE802.11b的标准。
需要说明的是,这里的物联网以及AP仅仅只是针对无线AP,因为对于物联网来说,其接入的设备数量众多,对于AP来说,如果通过有线连接,首先AP的接入数量会有所限制,并且对于家庭来说,均用有线连接,对于家庭用户的布线来说是无法想象的,另外此有线的成本也非常高,所以本发明的技术方案中的中物联网终端与AP之间的连接仅限无线连接。
上述步骤S304的实现方法可以为:
通过另一种方式将加密处理的数据包发送至无线接入控制器,例如,物联网终端通过WIFI与AP连接,那么AP20可以通过有线方式将数据包发送至无线接入控制器,当然在实际应用中,AP20也可以通过长期演进(英文:Long Term Evolution,LTE)将加密处理后的数据包发送至无线接入控制器。当然上述LTE或有限方式以及物联网终端通过WIFI与AP连接的方式仅仅为了举例说明,本发明并不局限上述连接的具体方式。
依据如图3提供的方法,如图3所示提供的技术方案的物联网终端获取待发送的数据包以后,物联网终端依据该数据包的类型查询出该类型对应的加密单元,通过该加密单元对数据进行加密,对于物联网来说,物联网AP无需对加密进行配置,所有的加密设置均在物联网终端,此方式能够有效的降低物联网终端的成本,并且对于整个物联网来说,物联网终端为物联网数据中的起点, 通过对其加密能够从源头对数据进行加密,提高了安全性,提高用户的体验。
参阅图6,图6为本发明提供的一种物联网终端基于类型的上行数据加密控制方法,该方法在如图4所示的网络构架下实现,如图4所示,一个AP20下可以连接多个物联网终端,该AP具体可以为中继站,当然在实际应用中也可以为路由器或其他的具有无线连接以及数据转发功能的网络设备,例如开通热点的手机、提供无线连接的个人电脑等设备,该方法如图6所示,包括如下步骤:
步骤S601、物联网终端获取待发送的数据包;
上述步骤S601中的物联网终端具体可以为:手机、平板电脑、计算机等设备,当然其也可以包含带有联网功能的其他设备,例如智能电视、智能空调、智能水壶、智能灯、智能开关或一些物联网的智能设备。
步骤S602、所述物联网接入点识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元。
上述步骤S602中的物联网终端的类型各个厂家可以根据自行的情况进行设置,例如,该物联网终端的类型具体可以包括:智能电灯、智能电视、智能清扫设备、智能睡眠设备,智能监控设备等,其表现的形式可以为多种多样,例如对于智能电灯,该智能电灯包括但不限于:智能台灯,智能吸顶灯,智能壁灯等设备,例如对于智能电视来说,其可以为三星牌智能电视,当然其也可以为夏普牌智能电视,例如对于智能清扫设备来说,其可以为,智能扫地机器人,当然其还可以包括智能吸尘器、智能垃圾处理器等设备,例如对于智能睡眠设备来说,其可以为:智能床垫、智能沙发等设备,例如对智能监控设备来说或,其可以为,智能血压计,智能温度计等,本发明对上述物联网终端的具体类型以及类型的数量或种类并不限定。
上述数据包的类型包括但不限于:控制指令类型、参数类型、反馈类型,其中,控制指令类型对应一些协议规定的控制命令,该协议根据不同的连接方式对应不同的协议,这里并不限于该协议的具体表现形式。该参数类型可以为 物联网终端需要反馈的参数,包括但不限于:速度参数、温度参数、时间参数等等,该反馈类型包括单不限于,网络侧设备需要物联网终端反馈的的数据的类型。
上述步骤S602中物联网终端识别所述数据包的类型具体,可以包括:
所述物联网终端依据所述数据包的内容识别所述数据包的类型。
上述数据包的内容物联网终端可以通过对数据包解包提取,本发明具体实施方式并不局限上述数据包解包和提取的具体方式。
上述物联网终端依据所述数据包的内容识别所述数据包的类型具体,包括:
物联网终端提取所述数据包的内容,对所述内容进行分析确定所述内容与类型匹配表对应的类型。
上述内容与类型匹配表可以有如下的表现方式,例如,将所有的控制命令的文字存储在控制指令类型的匹配表中,如该内容中包含与该控制命令的文字相同的文字,则确定该内容为该控制指令类型。当然在实际应用中,上述参数类型也可以通过同样的方式,例如温度参数的关键字可以为,摄氏度,华氏度等等。
上述步骤中的类型与加密单元映射表如图5所示,上述映射可以为一一映射,当然也可以为一对多映射等方式。
上述步骤S602中的加密单元具体可以为设置在物联网终端的硬件加密单元,其包含厂家预设设置的加密算法,当然在实际应用中,上述加密单元还可以为配置在物联网终端内的软件加密单元,本发明并不限制上述加密单元的具体表现形式。
上述加密算法包括但不限于:3DES、MD5或RSA等加密算法,本发明并不局限具体的加密算法。
步骤S603、物联网终端从当前MAC地址中提取出6位数字,将提取出的6位数据与所述类型的序号按顺序排列起来得到秘钥,调用第一加密单元采用所述秘钥对所述数据包进行加密处理;
步骤S603中选择6为数字是为了方便提取,因为MAC地址为48位的地址,采用6位地址可以非常方便的提取,另外,增加该类型对应的序号,这样 能够增加秘钥的复杂程度,该提取的策略,可以为按顺序提取,也可以跨字段提取,当天还可以为其他的提取方式。
上述步骤S603还可以采用如下技术方案替换,具体包括:
所述物联网终端检测与所述网络网设备的信号强度,依据所述信号强度确定秘钥,采用所述秘钥采用第一加密单元对所述数据包进行加密处理。
或所述物联网终端获取信号强度的等级,依据等级与秘钥的映射关系查询出所述信号强度的等级对应的秘钥。
或物联网终端获取信号强度值,将该强度值转换成强度值二进制数,将所述强度值二进制数输入预设算法计算得到的结果作为秘钥。上述预设算法具体可以为:秘钥=LSB 32bit SHA-256(强度值二进制数||MAC),其中该MAC地址为物联网终端的MAC地址。
上述步骤S603的实现方法具体可以为:
例如,第一加密单元为3DES加密单元,则物联网终端调用3DES加密单元对数据包进行3DES加密处理。例如第一加密单元为RAS加密单元,则AP20调用RAS加密单元对数据包进行RAS加密处理。例如第一加密单元为MD5加密单元,则物联网终端调用MD5加密单元对数据包进行MD5加密处理。
上述加密处理的具体方式可以参见3DES、RSA以及MD5的相关描述,这里不再赘述。
步骤S604、物联网终端将该加密处理后的数据包、所述类型和所述当前MAC地址向网络侧设备发送。
上述步骤S604的实现方法可以为:
通过另一种方式将加密处理的数据包发送至无线接入控制器,例如,物联网终端通过WIFI与AP连接,那么AP20可以通过有线方式将数据包发送至无线接入控制器,当然在实际应用中,AP20也可以通过长期演进(英文:Long Term Evolution,LTE)将加密处理后的数据包发送至无线接入控制器。当然上述LTE或有限方式以及物联网终端通过WIFI与AP连接的方式仅仅为了举例说明,本发明并不局限上述连接的具体方式。
依据如图6提供的方法,物联网终端对数据包的加密方式采用了秘钥,该秘钥通过当前MAC地址以及数据包类型对应的序号共同获得,所以其具有秘 钥复杂,不易解密,安全性高的优点。
参阅图7,图7为本发明提供的一种物联网终端装置700,所述装置包括:
获取单元701,用于获取待发送的数据包;
处理单元702,用于识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元,调用所述第一加密单元对所述数据包进行加密处理;
发送单元703,用于将加密处理后的数据包和所述类型向网络侧设备发送。
可选的,处理单元具体,用于依据所述数据包的内容识别所述数据包的类型。
可选的,所述处理单元具体,用于提取所述数据包的内容,对所述内容进行分析确定所述内容与类型匹配表对应的类型。
可选的,所述处理单元具体,用于调用所述第一加密单元对所述数据包进行加密处理,如加密成功,进行后续步骤,如加密不成功,所述物联网终端调用第一加密单元的备用加密单元对所述数据包进行加密处理,将采用备用加密单元标识添加到加密处理后的数据包的包头扩展字段。
可选的,所述处理单元具体,用于从当前MAC地址中提取出6位数字,将提取出的6位数字与所述类型的序号按顺序排列起来得到秘钥,调用第一加密单元采用所述秘钥对所述数据包进行加密处理。
如图7所示的装置的具体实现方式以及技术效果可以参见如图3或如图6所示的实施例的描述,这里不在赘述。
本发明还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述第一方面记载的任何一种物联网终端基于类型的上行数据加密控制方法的部分或全部步骤。
参阅图8,图8为本发明提供的一种物联网终端800,该物联网接入点可以为部署在互联网系统中的一个节点,互联网系统还可以包括:物联网终端和无线接入控制器,该物联网终端800包括但不限于:计算机、服务器等设备,如图8所示,该物联网终端800包括:处理器801、存储器802、收发器803和总线804。收发器803用于与外部设备(例如互联系统中的其他设备,包括 但不限于:中继器,核心网设备等)之间收发数据。物联网终端800中的处理器801的数量可以是一个或多个。本申请的一些实施例中,处理器801、存储器802和收发器803可通过总线系统或其他方式连接。关于本实施例涉及的术语的含义以及举例,可以参考图3或图6对应的实施例,此处不再赘述。
其中,存储器802中可以存储程序代码。处理器801用于调用存储器802中存储的程序代码,用于执行以下操作:
收发器803,用于接收数据包;
处理器801,用于用于识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元,调用所述第一加密单元对所述数据包进行加密处理。
收发器803,还用于将加密处理后的数据包向网络侧设备发送。
可选的,处理器801、收发器803,还可以用于执行如图3或如图6所示实施例中的步骤以及步骤的细化方案以及可选方案。
需要说明的是,这里的处理器801可以是一个处理元件,也可以是多个处理元件的统称。例如,该处理元件可以是中央处理器(Central Processing Unit,CPU),也可以是特定集成电路(Application Specific Integrated Circuit,ASIC),或者是被配置成实施本申请实施例的一个或多个集成电路,例如:一个或多个微处理器(digital singnal processor,DSP),或,一个或者多个现场可编程门阵列(Field Programmable Gate Array,FPGA)。
存储器803可以是一个存储装置,也可以是多个存储元件的统称,且用于存储可执行程序代码或应用程序运行装置运行所需要参数、数据等。且存储器803可以包括随机存储器(RAM),也可以包括非易失性存储器(non-volatile memory),例如磁盘存储器,闪存(Flash)等。
总线804可以是工业标准体系结构(Industry Standard Architecture,ISA)总线、外部设备互连(Peripheral Component,PCI)总线或扩展工业标准体系结构(Extended Industry Standard Architecture,EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。为便于表示,图8中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
该用户设备还可以包括输入输出装置,连接于总线804,以通过总线与处 理器801等其它部分连接。该输入输出装置可以为操作人员提供一输入界面,以便操作人员通过该输入界面选择布控项,还可以是其它接口,可通过该接口外接其它设备。
需要说明的是,对于前述的各个方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某一些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详细描述的部分,可以参见其他实施例的相关描述。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:闪存盘、只读存储器(英文:Read-Only Memory,简称:ROM)、随机存取器(英文:Random Access Memory,简称:RAM)、磁盘或光盘等。
以上对本申请实施例所提供的内容下载方法及相关设备、系统进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (12)

  1. 一种物联网终端基于类型的上行数据加密控制方法,其特征在于,所述方法包括如下步骤:
    所述物联网终端获取待发送的数据包;
    所述物联网接入点识别所述数据包的类型,依据所述类型在预先配置的类型与加密单元映射表中查询出所述类型对应的第一加密单元;
    所述物联网终端调用所述第一加密单元对所述数据包进行加密处理;
    所述物联网终端将加密处理后的数据包和所述类型向网络侧设备发送。
  2. 根据权利要求1所述的方法,其特征在于,所述物联网终端识别所述数据包的类型具体,包括:
    所述物联网终端依据所述数据包的内容识别所述数据包的类型,所述数据包的类型包括:控制指令类型、参数类型或反馈类型。
  3. 根据权利要求1所述的方法,其特征在于,所述物联网终端调用所述第一加密单元对所述数据包进行加密处理具体包括:
    所述物联网终端检测与所述网络网设备的信号强度,依据所述信号强度确定秘钥,采用所述秘钥采用第一加密单元对所述数据包进行加密处理。
  4. 根据权利要求3所述的方法,其特征在于,所述依据所述信号强度确定秘钥具体,包括:
    所述物联网终端获取信号强度的等级,依据等级与秘钥的映射关系查询出所述信号强度的等级对应的秘钥。
  5. 根据权利要求1所述的方法,其特征在于,所述物联网终端调用所述第一加密单元对所述数据包进行加密处理具体,包括:
    所述物联网终端从当前媒体接入访问MAC地址中提取出6位数字,将提取出的6位数据与所述类型的序号按顺序排列起来得到秘钥,调用第一加密单元采用所述秘钥对所述数据包进行加密处理。
  6. 一种物联网终端装置,其特征在于,所述装置包括:
    获取单元,用于获取待发送的数据包;
    处理单元,用于识别所述数据包的类型,依据所述类型在预先配置的类型 与加密单元映射表中查询出所述类型对应的第一加密单元,调用所述第一加密单元对所述数据包进行加密处理;
    发送单元,用于将加密处理后的数据包和所述类型向网络侧设备发送。
  7. 根据权利要求6所述的装置,其特征在于,所述处理单元具体,用于依据所述数据包的内容识别所述数据包的类型;所述数据包的类型包括:控制指令类型、参数类型或反馈类型。
  8. 根据权利要求7所述的装置,其特征在于,所述处理单元具体,用于检测与所述网络网设备的信号强度,依据所述信号强度确定秘钥,采用所述秘钥采用第一加密单元对所述数据包进行加密处理。
  9. 根据权利要求8所述的装置,其特征在于,所述处理单元,具体用于获取信号强度的等级,依据等级与秘钥的映射关系查询出所述信号强度的等级对应的秘钥。
  10. 根据权利要求8所述的装置,其特征在于,所述处理单元,用于从当前媒体接入访问MAC地址中提取出6位数字,将提取出的6位数据与所述类型的序号按顺序排列起来得到秘钥,调用第一加密单元采用所述秘钥对所述数据包进行加密处理。
  11. 一种计算机可读存储介质,其特征在于,其存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求1-5任一项所述的方法。
  12. 一种计算机程序产品,其特征在于,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计算机执行如权利要求1-5任一项所述的方法。
PCT/CN2017/100755 2017-07-25 2017-09-06 物联网终端基于类型的上行数据加密控制方法及装置 WO2019019279A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710609804.5 2017-07-25
CN201710609804.5A CN107360566B (zh) 2017-07-25 2017-07-25 物联网终端基于类型的上行数据加密控制方法及装置

Publications (1)

Publication Number Publication Date
WO2019019279A1 true WO2019019279A1 (zh) 2019-01-31

Family

ID=60286479

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100755 WO2019019279A1 (zh) 2017-07-25 2017-09-06 物联网终端基于类型的上行数据加密控制方法及装置

Country Status (2)

Country Link
CN (1) CN107360566B (zh)
WO (1) WO2019019279A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865829B (zh) * 2019-04-24 2022-08-02 成都鼎桥通信技术有限公司 业务数据的加密解密方法及设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616084A (zh) * 2009-07-29 2009-12-30 中兴通讯股份有限公司 一种分布式IPSec负荷分担装置和方法
CN105208352A (zh) * 2015-10-16 2015-12-30 杭州中威电子股份有限公司 一种网络视频安全监控系统及物理隔离方法
WO2016118776A1 (en) * 2015-01-21 2016-07-28 CloudLeaf, Inc. Systems, methods and devices for asset status determination
CN105871918A (zh) * 2016-06-08 2016-08-17 美的集团股份有限公司 家电设备及其与云服务器的通讯系统及方法、云服务器
CN106488447A (zh) * 2016-09-27 2017-03-08 深圳Tcl智能家庭科技有限公司 一种智能设备接入网络的方法及系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9497624B2 (en) * 2014-10-30 2016-11-15 Alcatel-Lucent Usa Inc. Connectionless wireless access
CN104580233B (zh) * 2015-01-16 2017-09-01 重庆邮电大学 一种物联网智能家居安全网关系统
CN104703176B (zh) * 2015-03-18 2023-11-10 北京联盛德微电子有限责任公司 无线网络的配置方法、智能终端和无线网络设备
CN106603568B (zh) * 2016-12-30 2019-09-17 Oppo广东移动通信有限公司 数据加密方法、装置及接入点设备
CN106973072A (zh) * 2017-05-24 2017-07-21 深圳市乃斯网络科技有限公司 基于终端的网络链路加密方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616084A (zh) * 2009-07-29 2009-12-30 中兴通讯股份有限公司 一种分布式IPSec负荷分担装置和方法
WO2016118776A1 (en) * 2015-01-21 2016-07-28 CloudLeaf, Inc. Systems, methods and devices for asset status determination
CN105208352A (zh) * 2015-10-16 2015-12-30 杭州中威电子股份有限公司 一种网络视频安全监控系统及物理隔离方法
CN105871918A (zh) * 2016-06-08 2016-08-17 美的集团股份有限公司 家电设备及其与云服务器的通讯系统及方法、云服务器
CN106488447A (zh) * 2016-09-27 2017-03-08 深圳Tcl智能家庭科技有限公司 一种智能设备接入网络的方法及系统

Also Published As

Publication number Publication date
CN107360566A (zh) 2017-11-17
CN107360566B (zh) 2020-11-27

Similar Documents

Publication Publication Date Title
US20220303276A1 (en) Network connection method, hotspot terminal and management terminal
US11943695B2 (en) Network channel switching method and apparatus, device, and storage medium
WO2018120247A1 (zh) 一种终端匹配方法、装置
US10820369B2 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
EP2756649B1 (en) Protocol-specific keys for a hybrid network
CN112566113B (zh) 密钥生成以及终端配网方法、装置、设备
WO2021232309A1 (en) Electronic gateway device, system, method and program for prompting creation of hotspot on mobile device for client device
WO2018053894A1 (zh) 物联网基于传输速率的接入点切换方法及装置
WO2019041371A1 (zh) 物联网基于连接数量的路由器切换方法及装置
WO2023179715A1 (zh) 数据通道构建方法及装置
WO2023001082A1 (zh) 一种配网方法及装置
WO2019019280A1 (zh) 物联网终端数据的分时段加密方法及装置
WO2019019282A1 (zh) 物联网终端数据的按顺序加密方法及装置
WO2018053895A1 (zh) 物联网接入点基于类型的上行数据加密控制方法及装置
JP2017539176A (ja) デバイス構成のための方法およびデバイス
WO2022142933A1 (zh) 无线接入点的入网方法、系统、ap及存储介质
CN113301563A (zh) 网络配置方法、装置、设备和存储介质
WO2019015041A1 (zh) 一种物联网中继器数据的分时段加密方法及装置
WO2019010793A1 (zh) 物联网接入点接收数据的分时段加密方法及装置
CN110235417B (zh) 一种sdn及其报文转发的方法和装置
CN106488483B (zh) 一种配置wifi网关设备的方法及相应的网关设备
WO2019019279A1 (zh) 物联网终端基于类型的上行数据加密控制方法及装置
WO2019015039A1 (zh) 一种基于物联网中继器的选择加密方法及装置
WO2019015038A1 (zh) 物联网中继器基于类型的上行数据加密控制方法及装置
WO2019019287A1 (zh) 一种物联网终端数据的随机加密方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17919571

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17919571

Country of ref document: EP

Kind code of ref document: A1