WO2019019280A1 - Procédé pour terminal de l'internet des objets pour chiffrer des données selon des périodes de temps, et appareil - Google Patents

Procédé pour terminal de l'internet des objets pour chiffrer des données selon des périodes de temps, et appareil Download PDF

Info

Publication number
WO2019019280A1
WO2019019280A1 PCT/CN2017/100788 CN2017100788W WO2019019280A1 WO 2019019280 A1 WO2019019280 A1 WO 2019019280A1 CN 2017100788 W CN2017100788 W CN 2017100788W WO 2019019280 A1 WO2019019280 A1 WO 2019019280A1
Authority
WO
WIPO (PCT)
Prior art keywords
internet
data packet
encryption
encryption unit
signal strength
Prior art date
Application number
PCT/CN2017/100788
Other languages
English (en)
Chinese (zh)
Inventor
杜光东
Original Assignee
深圳市盛路物联通讯技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市盛路物联通讯技术有限公司 filed Critical 深圳市盛路物联通讯技术有限公司
Publication of WO2019019280A1 publication Critical patent/WO2019019280A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • the present application relates to the field of communications, and in particular, to a method and apparatus for time-phase encryption of Internet of Things terminal data.
  • the Internet of Things is an important part of the new generation of information technology, and an important stage of development in the era of "informatization.” Its English name is: “Internet of things (IoT)". As the name suggests, the Internet of Things is the Internet that connects things. This has two meanings: First, the core and foundation of the Internet of Things is still the Internet, which is an extended and extended network based on the Internet; Second, its client extends and extends to any item and item for information. Exchange and communication, that is, things and things. The Internet of Things is widely used in the convergence of networks through communication-aware technologies such as intelligent sensing, identification technology and pervasive computing. It is also called the third wave of the development of the world information industry after computers and the Internet.
  • the Internet of Things is the application expansion of the Internet. It is not so much that the Internet of Things is a network, but the Internet of Things is a business and application. Therefore, application innovation is the core of the development of the Internet of Things. Innovation 2.0 with user experience as the core is the soul of the development of the Internet of Things.
  • the Internet of Things solves the interconnection between objects and the exchange of data between objects.
  • the existing Internet of Things is connected to the Internet based on IoT access points (APs).
  • IoT access points There are multiple IoT terminals under the Internet of Things (AP).
  • the data between the Internet of Things (the network side device) and the IoT terminal is not encrypted. This makes it easy for the IoT device to leak, resulting in the leakage of user privacy data. User experience is not high.
  • the application provides a time-phase encryption method for Internet of Things terminal data. Can improve IoT data Security to improve the user experience.
  • a method for time-phase encryption of Internet of Things terminal data comprising the following steps:
  • the Internet of Things terminal acquires a data packet that needs to be sent
  • the IoT terminal extracts a current time, determines a working period of the IOT terminal in the working period according to the current time, and queries the working time period according to the working period in a pre-configured working period and an encryption unit mapping table.
  • First encryption unit First encryption unit
  • the Internet of Things terminal invokes the first encryption unit to perform encryption processing on the data packet
  • the Internet of Things terminal sends the encrypted data and the current time to the network side device.
  • the method may further include: before the IoT terminal sends the encrypted data packet to the gateway:
  • the alternate encryption unit of the first encryption unit is invoked to encrypt the data packet.
  • the invoking the first encryption unit by the Internet of Things terminal to perform encryption processing on the data packet specifically includes:
  • the IoT terminal detects the signal strength of the network network device, determines a secret key according to the signal strength, and performs encryption processing on the data packet by using the first encryption unit by using the secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal acquires a level of signal strength, and queries a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the determining the secret key according to the signal strength includes: acquiring, by the Internet of Things terminal, a signal strength value, and inputting the strength value into a result calculated by a preset algorithm as a secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal obtains the signal strength value, converts the MAC address of the IoT terminal into a decimal number, and adds the absolute value of the intensity value to the decimal number to determine the key.
  • an Internet of Things terminal device comprising:
  • An obtaining unit configured to acquire a data packet that needs to be sent
  • a processing unit configured to extract a current time, determine a working period of the Internet of Things terminal in the working period according to the current time, and perform a pre-configured working period and an encryption unit according to the working period Querying, in the shot table, the first encryption unit corresponding to the working period; invoking the first encryption unit to perform encryption processing on the data packet;
  • a sending unit configured to send the encrypted data and the current time to the network side device.
  • the processing unit is configured to: when the first encryption unit fails to encrypt the data packet, invoke the alternate encryption unit of the first encryption unit to encrypt the data packet.
  • the processing unit is configured to detect a signal strength with the network network device, determine a secret key according to the signal strength, and perform encryption processing on the data packet by using the first encryption unit by using the secret key. .
  • the processing unit is specifically configured to obtain a level of signal strength, and query a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the processing unit is specifically configured to obtain a signal strength value, and input the strength value into a result calculated by a preset algorithm as a secret key.
  • the IoT terminal After the IoT terminal of the technical solution provided by the present invention acquires the data packet that needs to be sent, the IoT terminal queries the encryption unit corresponding to the working time period according to the current time of the Internet of Things terminal, and encrypts the data through the encryption unit, for the Internet of Things.
  • the encryption is set in the Internet of Things terminal, which can encrypt the data, protect the privacy of the user, and improve the user experience.
  • FIG. 1 is a schematic diagram of a network architecture
  • FIG. 2 is a transmission flow chart of an IoT terminal transmitting a data packet to a network side (taking a repeater as an example);
  • 3 is a flow chart of a time-phase encryption method for IoT terminal data
  • FIG. 4 is a schematic diagram of a technical scenario provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a mapping relationship provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a time-phase encryption method for data of an Internet of Things terminal according to another embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an Internet of Things terminal device provided by the present application.
  • FIG. 8 is a schematic structural diagram of hardware of an Internet of Things terminal provided by the present application.
  • Computer device also referred to as “computer” in the context, is meant an intelligent electronic device that can perform predetermined processing, such as numerical calculations and/or logical calculations, by running a predetermined program or instruction, which can include a processor and The memory is executed by the processor to execute a predetermined process pre-stored in the memory to execute a predetermined process, or is executed by hardware such as an ASIC, an FPGA, a DSP, or the like, or a combination of the two.
  • Computer devices include, but are not limited to, servers, personal computers, notebook computers, tablets, smart phones, and the like.
  • a data transmission method of an Internet of Things is provided.
  • the method is applied to the object network shown in FIG. 1.
  • the object network includes: an Internet of Things terminal 10, an Internet of Things access point AP20, a gateway, and a repeater 40.
  • Networked terminals are different according to The situation may have different manifestations.
  • the Internet of Things terminal may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as smart TV, smart air conditioner, smart water bottle or some
  • the terminal device of the Internet of Things, the Internet of Things terminal 10 is connected to the repeater 40 in a wireless manner, and the repeater 40 is connected to the AP.
  • connection may be in a wireless manner or a limited manner.
  • the wireless method includes but not It is limited to: Bluetooth, WIFI, etc., and the foregoing gateway may specifically be a mobile base station, a mobile relay station, a switch, and the like.
  • the wired mode is taken as an example, and for convenience of representation, only one solid line is shown here.
  • the above-mentioned gateway 30 may be a personal computer (PC) according to the size of the Internet of Things. In practice, it may be a plurality of PCs, servers, or server groups. The specific embodiment of the present invention is not limited. The specific manifestation of the above gateway 30.
  • PC personal computer
  • the repeater 40 may be a plurality of devices according to different scenarios, such as a mobile phone, a smart watch, and the like.
  • FIG. 2 is a transmission flowchart of data transmission of the Internet of Things.
  • the network side device takes a repeater as an example. As shown in FIG. 2, the process includes:
  • Step S201 the Internet of Things terminal 10 transmits the data packet to be transmitted to the relay station 40 by wireless;
  • Step S202 The relay station forwards the data packet to the Internet of Things access point
  • Step S203 The Internet of Things access point transmits the data packet to the gateway.
  • FIG. 3 is a time-phase encryption method for data of an Internet of Things terminal according to the present invention.
  • the method is implemented in the network architecture as shown in FIG. 4, as shown in FIG. 4, a plurality of IoT terminals can be connected under one repeater 40, and the repeater can be a mobile phone that provides hotspots and provides a wireless connection.
  • the personal computer, the forwarding device, etc., the method is as shown in FIG. 3, and includes the following steps:
  • Step S301 The Internet of Things terminal acquires a data packet to be sent
  • the object-to-network terminal in the above step S301 may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner, a smart water bottle, a smart light, a smart switch, or Some IoT smart devices.
  • Step S302 The IoT terminal extracts the current time, determines a working period of the Internet of Things terminal in the working period according to the current time, and queries the working time period in the pre-configured working period and the encryption unit mapping table according to the working period. Corresponding first encryption unit.
  • the type of the Internet of Things terminal in the above step S302 can be set according to the situation of the device.
  • the IoT terminal can specifically include: a smart electric light, a smart television, a smart cleaning device, a smart sleep device, an intelligent monitoring device, etc.
  • the form of performance can be various, for example, for a smart electric lamp, including but not limited to: a smart table lamp, a smart ceiling lamp, a smart wall lamp, etc., for example, for a smart TV, it can be a Samsung smart TV, of course It can also be a Sharp smart TV.
  • a smart cleaning device it can be a smart sweeping robot.
  • a smart vacuum cleaner for example, for a smart sleep device
  • a smart garbage processor for example, for a smart sleep device
  • the smart mattress for the smart mattress, the smart sofa, and the like
  • the smart monitoring device it may be an intelligent sphygmomanometer, a smart thermometer, etc., and the specific form, number, or type of the above-mentioned Internet of Things terminal is not limited.
  • the working period (ie, time period) and the encryption unit mapping table in the above steps are as shown in FIG. 5, and the foregoing mapping may be a one-to-one mapping, or may be a one-to-many mapping or the like.
  • the encryption unit in the above step S302 may specifically be a hardware encryption unit provided in the Internet of Things terminal, and includes an encryption algorithm preset by the manufacturer.
  • the encryption unit may also be a software configured in the Internet of Things terminal.
  • the encryption unit, the present invention does not limit the specific expression of the above encryption unit.
  • the above encryption algorithms include but are not limited to: triple data encryption algorithm block code (English: riple Data Encryption Algorithm, 3DES), message digest algorithm (English: Message Digest Algorithm, Encryption algorithms such as MD5) or RSA (Rivest, Shamir, Adleman), and the present invention is not limited to a specific encryption algorithm.
  • 3DES is a generic term for triple-data encryption algorithm block ciphers. It is equivalent to applying three DES encryption algorithms to each data block. Due to the increased computing power of the computer, the key length of the original DES password becomes vulnerable to brute force; 3DES is designed to provide a relatively simple method to avoid similar attacks by increasing the key length of DES.
  • Step S303 The Internet of Things terminal invokes the first encryption unit to perform encryption processing on the data packet.
  • the implementation method of the foregoing step S303 may specifically be:
  • the first encryption unit is a 3DES encryption unit
  • the Internet of Things terminal invokes the 3DES encryption unit to perform 3DES encryption processing on the data packet.
  • the Internet of Things terminal invokes the RAS encryption unit to perform RAS encryption processing on the data packet.
  • the first encryption unit is an MD5 encryption unit
  • the Internet of Things terminal invokes the MD5 encryption unit to perform MD5 encryption processing on the data packet.
  • the implementation method of the foregoing step S303 may specifically be:
  • the IoT terminal invokes the first encryption unit to perform encryption processing on the data packet. If the encryption is successful, the subsequent step S304 is performed. If the encryption is unsuccessful, the alternate encryption unit of the first encryption unit is called to encrypt the data packet, and the data packet is encrypted. The alternate encryption unit identifies the header extension field added to the encrypted packet.
  • Step S304 The Internet of Things terminal sends the encrypted data and the current time to the network side device.
  • the purpose of carrying the current time in the payload of the transmitted frame in step S304 is to facilitate the network side device to acquire the current time, because it always changes for time, and if it does not carry the current time, only the Internet of Things
  • the network side device directly connected to the terminal can obtain the accurate current device. For the subsequent device, the current time cannot be obtained, and then the different encryption units are matched, so that the decryption cannot be performed, so the current time is carried in the frame payload. This can solve this problem very well.
  • the implementation method of the above step S304 can be:
  • the manner in which the Internet of Things terminal sends a data packet to the Internet of Things terminal may be to send a data packet by using a wireless connection, including but not limited to: Bluetooth, Wireless Fidelity (WIFI) or Zigbee And other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • a wireless connection including but not limited to: Bluetooth, Wireless Fidelity (WIFI) or Zigbee And other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • the Internet of Things and IoT terminals here are only for wireless IoT terminals, because for the Internet of Things, the number of devices accessed by them is large.
  • IoT terminals if they are connected by wire, the first thing The number of accesses of the networked terminal is limited, and the wired connection is used for the home, which is unimaginable for the wiring of the home user, and the cost of the cable is also very high, so in the technical solution of the present invention
  • the connection between the IoT terminal and the IoT terminal is limited to wireless connection.
  • the Internet of Things terminal After the Internet of Things terminal acquires the data packet to be sent, the Internet of Things terminal queries the encryption unit corresponding to the working period according to the current working period of the Internet of Things terminal, and encrypts the data through the encryption unit.
  • the Internet of Things network-side devices do not need to be configured for encryption. All encryption settings are in the IoT terminal, so it has high security and improves user experience.
  • FIG. 6 is a time-phase encryption method for data of an Internet of Things terminal according to the present invention.
  • the method is implemented in a network architecture as shown in FIG. 4, as shown in FIG. 4, under an Internet of Things repeater.
  • a plurality of IoT terminals can be connected.
  • the IoT repeater can be a mobile phone that opens a hotspot, a personal computer that provides a wireless connection, and the like.
  • the method is as shown in FIG. 6, and includes the following steps:
  • Step S601 The Internet of Things terminal acquires a data packet that needs to be sent;
  • the IoT terminal in the above step S601 may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner, a smart water bottle, a smart light, a smart switch, or Some IoT smart devices.
  • Step S602 The current time of the IoT terminal extracting the data packet, determining a working time period of the Internet of Things terminal in the working period according to the current time, and querying the working time period in the pre-configured working time period and the encryption unit mapping table according to the working time period. Corresponding first encryption unit.
  • the IoT terminal may specifically include: a smart light, a smart TV, a smart cleaning device, a smart sleep device, an intelligent monitoring device, etc., and the performance may be in various forms, for example, for a smart light, the smart light includes However, it is not limited to: smart table lamps, smart ceiling lamps, smart wall lamps, etc., for example, for smart TVs, it can be a Samsung smart TV, of course, it can also be a Sharp smart TV, for example, for smart cleaning equipment, It can be a smart sweeping robot. Of course, it can also include smart vacuum cleaners, smart garbage processors and the like.
  • smart sleep devices it can be: smart mattresses, smart sofas, etc., for example, for intelligent monitoring devices.
  • it may be an intelligent sphygmomanometer, a smart thermometer, or the like, and the present invention does not limit the specific form, number, or type of the above-described Internet of Things terminal.
  • the working period and the encryption unit mapping table in the above steps are as shown in FIG. 5, and the foregoing mapping may be a one-to-one mapping, or may be a one-to-many mapping or the like.
  • the cryptographic unit in the above step S602 may specifically be a hardware cryptographic unit disposed in the Internet of Things repeater, and includes an encryption algorithm preset by the manufacturer.
  • the cryptographic unit may also be configured in the Internet of Things relay.
  • the software encryption unit in the device does not limit the specific expression of the above encryption unit.
  • the foregoing encryption algorithm includes, but is not limited to, an encryption algorithm such as 3DES, MD5 or RSA, and the present invention is not limited to a specific encryption algorithm.
  • Step S603 The Internet of Things terminal detects the signal strength of the network network device, determines a secret key according to the signal strength, and performs encryption processing on the data packet by using the first encryption unit by using the secret key;
  • the implementation method of the foregoing step S603 may specifically be:
  • the IoT terminal obtains the level of the signal strength, and queries the key corresponding to the level of the signal strength according to the mapping relationship between the level and the key. Specifically, for example, the level of the acquired signal strength is level 1, and the key corresponding to the level 1 is extracted, for example, the level 1 extracts the secret key 1. If the level of the signal strength is level 2, the key corresponding to the level 2 is extracted.
  • the implementation method of the foregoing step S603 may specifically be:
  • the IoT terminal obtains a signal strength value, converts the intensity value into a strength value binary number, and inputs the intensity value binary number into a preset algorithm to calculate a result as a secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal obtains the signal strength value, converts the MAC address of the IoT terminal into a decimal number, and adds the absolute value of the intensity value to the decimal number to determine the key.
  • the implementation method of the foregoing step S603 may specifically be:
  • the first encryption unit is a 3DES encryption unit
  • the Internet of Things terminal invokes the 3DES encryption unit to perform 3DES encryption processing on the data packet.
  • the Internet of Things terminal invokes the RAS encryption unit to perform RAS encryption processing on the data packet.
  • the first encryption unit is an MD5 encryption unit
  • the Internet of Things terminal invokes the MD5 encryption unit to perform MD5 encryption processing on the data packet.
  • the implementation method of the foregoing step S603 may specifically be:
  • the IoT terminal invokes the first encryption unit to perform encryption processing on the data packet. If the encryption is successful, the subsequent step S304 is performed. If the encryption is unsuccessful, the alternate encryption unit of the first encryption unit is called to encrypt the data packet, and the data packet is encrypted. The alternate encryption unit identifies the header extension field added to the encrypted packet.
  • Step S604 The Internet of Things terminal carries the encrypted data packet, the current time, and the signal strength value in a payload of the frame and sends the data packet to the Internet of Things access point.
  • the implementation method of the above step S604 can be:
  • the manner in which the Internet of Things terminal sends a data packet to the Internet of Things may be a method of sending a data packet by using a wireless connection, including but not limited to: Bluetooth, wireless fidelity (English: Wireless Fidelity, WIFI) or Zigbee and other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • a wireless connection including but not limited to: Bluetooth, wireless fidelity (English: Wireless Fidelity, WIFI) or Zigbee and other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • the Internet of Things and IoT terminals here are only for wireless IoT terminals, because for the Internet of Things, the number of devices accessed by them is large.
  • IoT terminals if they are connected by wire, the first thing The number of accesses of the networked terminal is limited, and the wired connection is used for the home, which is unimaginable for the wiring of the home user, and the cost of the cable is also very high, so in the technical solution of the present invention Connection between the IoT terminal and the Internet of Things repeater Wireless connection only.
  • the technical solution adopted by the invention has the advantage of high safety.
  • the foregoing method may further include: before step S604:
  • the IoT terminal invoking the first encryption unit to encrypt is unsuccessful, the IoT terminal invoking the alternate encryption unit of the first encryption unit to encrypt the data packet, and adding the identifier of the alternate encryption unit to the encryption process The header extension field of the packet.
  • FIG. 7 is an IoT terminal device 700, and the device includes:
  • An obtaining unit 701 configured to acquire a data packet that needs to be sent
  • the processing unit 702 is configured to extract a current time of the data packet, determine a working period of the Internet of Things terminal in the working period according to the current time, and query the pre-configured working period and the encryption unit mapping table according to the working period. Determining, by the first encryption unit corresponding to the working period; invoking the first encryption unit to perform encryption processing on the data packet;
  • the sending unit 703 is configured to send the encrypted data and the current time to the network side device.
  • the processing unit 702 is specifically configured to: when the first encryption unit fails to encrypt the data packet, invoke the alternate encryption unit of the first encryption unit to encrypt the data packet.
  • the processing unit 702 is configured to detect a signal strength with the network network device, determine a secret key according to the signal strength, and perform encryption processing on the data packet by using the first encryption unit by using the secret key.
  • the processing unit 702 is specifically configured to obtain a level of signal strength, and query, according to a mapping relationship between the level and the key, a key corresponding to the level of the signal strength.
  • the processing unit is specifically configured to obtain a signal strength value, and input the strength value into a result calculated by a preset algorithm as a secret key.
  • a specific embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium can store a program, where the program is executed, including the part of the time-phase encryption method for receiving data by any one of the Internet of Things terminals described in the first aspect. Or all steps.
  • FIG. 8 is an Internet of Things terminal 800 provided by the present invention.
  • the Internet of Things terminal may be a node deployed in an Internet system, and the Internet system may further include: an Internet of Things repeater and an Internet of Things access point.
  • an Internet of Things terminal and a gateway the Internet of Things terminal 800 includes but is not limited to: a computer, A server or the like, as shown in FIG. 8, the IoT terminal 800 includes a processor 801, a memory 802, a transceiver 803, and a bus 804.
  • the transceiver 803 is configured to transmit and receive data with an external device (eg, other devices in the interconnection system, including but not limited to: a repeater, a core network device, etc.).
  • the number of processors 801 in the Internet of Things terminal 800 may be one or more.
  • processor 801, memory 802, and transceiver 803 may be connected by a bus system or other means.
  • bus system or other means.
  • the program code can be stored in the memory 802.
  • the processor 801 is configured to call program code stored in the memory 802 for performing the following operations:
  • a transceiver 803 configured to acquire a data packet that needs to be sent
  • the processor 801 is configured to: extract the current time, query the first encryption unit corresponding to the working period in the encryption unit mapping table according to the working period, and invoke the first encryption unit to The packet is encrypted.
  • the transceiver 803 is further configured to send the encrypted data packet and the current time to be carried in the payload of the frame to the IoT access point.
  • processor 801 and the transceiver 803 are further configured to perform the refinement and the steps of the steps and steps in the embodiment shown in FIG. 3 or FIG. 6.
  • the processor 801 herein may be a processing component or a general term of multiple processing components.
  • the processing component may be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • DSPs digital singal processors
  • FPGAs Field Programmable Gate Arrays
  • the memory 803 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate.
  • the memory 903 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
  • the bus 804 can be an Industry Standard Architecture (ISA) bus, a Peripheral Component (PCI) bus, or an extended industry standard system. Extended Industry Standard Architecture (EISA) bus, etc.
  • ISA Industry Standard Architecture
  • PCI Peripheral Component
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 8, but it does not mean that there is only one bus or one type of bus.
  • the user equipment may also include input and output devices coupled to bus 804 for connection to other portions, such as processor 801, via a bus.
  • the input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: Flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random accessor (English: Random Access Memory, referred to as: RAM), disk or optical disk.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne un procédé pour un terminal de l'Internet des objets, pour chiffrer des données selon des périodes de temps, et un appareil. Le procédé comprend les étapes suivantes : un terminal de l'Internet des objets obtient un paquet de données qui doit être envoyé; le terminal de l'Internet des objets extrait le temps courant, détermine une période de temps de travail du terminal de l'Internet des objets en fonction du temps actuel, et interroge une première unité de chiffrement correspondant à la période de temps de travail à partir d'une période de temps de travail préconfiguré et d'une table de mappage d'unité de chiffrement selon la période de temps de travail; le terminal de l'Internet des objets appelle la première unité de chiffrement pour chiffrer le paquet de données; le terminal de l'Internet des objets envoie les données chiffrées et le temps courant à un dispositif côté réseau. La solution technique selon la présente invention offre les avantages d'une sécurité élevée et d'une bonne expérience utilisateur.
PCT/CN2017/100788 2017-07-24 2017-09-06 Procédé pour terminal de l'internet des objets pour chiffrer des données selon des périodes de temps, et appareil WO2019019280A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710604663.8 2017-07-24
CN201710604663.8A CN107547516A (zh) 2017-07-24 2017-07-24 物联网终端数据的分时段加密方法及装置

Publications (1)

Publication Number Publication Date
WO2019019280A1 true WO2019019280A1 (fr) 2019-01-31

Family

ID=60970406

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100788 WO2019019280A1 (fr) 2017-07-24 2017-09-06 Procédé pour terminal de l'internet des objets pour chiffrer des données selon des périodes de temps, et appareil

Country Status (2)

Country Link
CN (1) CN107547516A (fr)
WO (1) WO2019019280A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113625691A (zh) * 2021-08-20 2021-11-09 深圳市元征科技股份有限公司 一种车辆诊断方法、诊断设备以及车辆网关
CN116633416A (zh) * 2023-05-11 2023-08-22 广东铁信通科技有限公司 一种物联网卫星通信终端的数据传输方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111212065B (zh) * 2019-12-31 2021-08-27 海信集团有限公司 一种家电设备通信加密的方法、家电设备和服务器

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202296A (zh) * 2010-03-25 2011-09-28 巴比禄股份有限公司 无线局域网中继装置、无线通信系统、无线局域网中继装置的控制方法
CN102694753A (zh) * 2011-03-25 2012-09-26 国基电子(上海)有限公司 对数据进行加密传输的网关设备、系统及方法
CN104935433A (zh) * 2015-03-13 2015-09-23 天地融科技股份有限公司 一种通讯过程中密钥跳变的方法、通讯装置和通讯系统
CN105337981A (zh) * 2015-11-18 2016-02-17 上海新储集成电路有限公司 一种中继装置、更新方法及设备间进行数据交互的方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101111056B (zh) * 2006-07-17 2010-05-12 西安电子科技大学 在无线局域网中的快速切换方法
CN101330379B (zh) * 2007-06-22 2011-02-09 华为技术有限公司 一种密钥下发方法和设备
CN102244861B (zh) * 2011-08-14 2013-09-18 北京理工大学 基于无线信道随机状态生成对称密钥的方法
CN103700177A (zh) * 2013-12-25 2014-04-02 袁磊 使用加密授权数据在特定时间段开锁的密码锁系统
US9900091B2 (en) * 2014-06-24 2018-02-20 Samsung Electronics Co., Ltd. Method and apparatus for pairing electronic device and lighting device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202296A (zh) * 2010-03-25 2011-09-28 巴比禄股份有限公司 无线局域网中继装置、无线通信系统、无线局域网中继装置的控制方法
CN102694753A (zh) * 2011-03-25 2012-09-26 国基电子(上海)有限公司 对数据进行加密传输的网关设备、系统及方法
CN104935433A (zh) * 2015-03-13 2015-09-23 天地融科技股份有限公司 一种通讯过程中密钥跳变的方法、通讯装置和通讯系统
CN105337981A (zh) * 2015-11-18 2016-02-17 上海新储集成电路有限公司 一种中继装置、更新方法及设备间进行数据交互的方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113625691A (zh) * 2021-08-20 2021-11-09 深圳市元征科技股份有限公司 一种车辆诊断方法、诊断设备以及车辆网关
CN113625691B (zh) * 2021-08-20 2023-04-07 深圳市元征科技股份有限公司 一种车辆诊断方法、诊断设备以及车辆网关
CN116633416A (zh) * 2023-05-11 2023-08-22 广东铁信通科技有限公司 一种物联网卫星通信终端的数据传输方法
CN116633416B (zh) * 2023-05-11 2023-12-08 广东铁信通科技有限公司 一种物联网卫星通信终端的数据传输方法

Also Published As

Publication number Publication date
CN107547516A (zh) 2018-01-05

Similar Documents

Publication Publication Date Title
US20220303276A1 (en) Network connection method, hotspot terminal and management terminal
US11917054B2 (en) Network key processing method and system and related device
US11864263B2 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
CN108886685B (zh) 一种终端匹配方法、装置
CN107567017B (zh) 无线连接系统、装置及方法
EP2756649B1 (fr) Clés spécifiques à un protocole pour un réseau hybride
CN112566113B (zh) 密钥生成以及终端配网方法、装置、设备
WO2019019280A1 (fr) Procédé pour terminal de l'internet des objets pour chiffrer des données selon des périodes de temps, et appareil
WO2018053894A1 (fr) Procédé et dispositif de transfert de point d'accès de l'internet des objets sur la base d'un débit de transmission
WO2019041371A1 (fr) Procédé et dispositif de commutation de routeur fondée sur le nombre de connexions à l'internet des objets
WO2019019282A1 (fr) Procédé permettant à un terminal de l'internet des objets de chiffrer de manière séquentielle des données, et appareil
JP2017539176A (ja) デバイス構成のための方法およびデバイス
CN106488483B (zh) 一种配置wifi网关设备的方法及相应的网关设备
WO2018053895A1 (fr) Dispositif et procédé de commande de cryptage de données de liaison montante basés sur un type destinés à un point d'accès à l'internet des objets
CN111479263A (zh) 通信连接的方法、终端及计算机存储介质
WO2019015041A1 (fr) Procédé et dispositif de chiffrement par répartition dans le temps pour des données d'un répéteur de l'internet des objets
WO2019010796A1 (fr) Procédé et dispositif de cryptage par sous-dispositif pour recevoir des données d'ap de l'internet des objets
WO2019010793A1 (fr) Procédé et dispositif de chiffrement basé sur une période de temps concernant des données reçues par un point d'accès de l'internet des objets
WO2019015038A1 (fr) Procédé et dispositif de contrôle de chiffrement pour des données de liaison montante basés sur le type de répéteur d'internet des objets
CN107360566B (zh) 物联网终端基于类型的上行数据加密控制方法及装置
WO2019019287A1 (fr) Procédé et appareil de chiffrement aléatoire de données de terminal de l'internet des objets
WO2019015039A1 (fr) Procédé et appareil basés sur un répéteur de l'internet des objets pour un chiffrement sélectif
WO2019015037A1 (fr) Dispositif et procédé fondés sur un point d'accès de l'internet des objets et destinés au chiffrement sélectif
WO2016183943A1 (fr) Procédé, terminal et système d'accès à un réseau local sans fil
WO2019028780A1 (fr) Procédé et appareil de traitement de données

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17919274

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17919274

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 28/05/2020)