WO2020258336A1 - 一种资源配置方法、设备及存储介质 - Google Patents

一种资源配置方法、设备及存储介质 Download PDF

Info

Publication number
WO2020258336A1
WO2020258336A1 PCT/CN2019/093926 CN2019093926W WO2020258336A1 WO 2020258336 A1 WO2020258336 A1 WO 2020258336A1 CN 2019093926 W CN2019093926 W CN 2019093926W WO 2020258336 A1 WO2020258336 A1 WO 2020258336A1
Authority
WO
WIPO (PCT)
Prior art keywords
shared key
client
remote service
client device
service host
Prior art date
Application number
PCT/CN2019/093926
Other languages
English (en)
French (fr)
Inventor
唐海
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to PCT/CN2019/093926 priority Critical patent/WO2020258336A1/zh
Priority to CN201980077540.0A priority patent/CN113169965B/zh
Publication of WO2020258336A1 publication Critical patent/WO2020258336A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the present invention relates to the field of wireless communication technology, in particular to a resource configuration method, equipment and storage medium.
  • the group resource host (Collection Host, CH) has the right to access the group resource (Collection) of the remote service node (Remote Reference Host, RRH), and the client (Original Client, OC) has the right to access the CH Collection.
  • the existing Collection mechanism does not specify how to configure the OC and RRH shared keys.
  • embodiments of the present invention provide a resource configuration method, device, and storage medium, which clarify how to configure OC and RRC resources under the Collection mechanism.
  • an embodiment of the present invention provides a resource configuration method, including: a client device obtains a public key of a remote service host through a group resource host; encrypts information related to the shared key by using the public key; ⁇ related information.
  • an embodiment of the present invention provides a resource configuration method, including: a remote service host receives encrypted related information about a shared key, and the encrypted related information is sent by a client device via a group resource host; The information related to the encrypted shared key is decrypted to obtain the related information of the shared key.
  • an embodiment of the present invention provides a resource configuration method, including: a client device receives information related to a shared key encrypted with a private key of a remote service host from a group resource host; and uses the remote service The public key corresponding to the private key of the host decrypts the information related to the encrypted shared key to obtain a list of shared keys and client identifications.
  • an embodiment of the present invention provides a resource configuration method, including: a remote service host generates a shared key based on a request message for querying the public key of the remote service host; and corresponds to the public key of the remote service host The private key to encrypt the related information of the shared key; send the encrypted related information of the shared key and the shared key.
  • an embodiment of the present invention provides a client device, the client device includes: a first processing unit configured to obtain a public key of a remote service host through a group resource host, and use the public key to pair a shared secret Encrypt the related information of the key;
  • the first sending unit is configured to send the related information.
  • an embodiment of the present invention provides a remote service host, where the remote service host includes:
  • the second receiving unit is configured to receive encrypted related information of the shared key, and the encrypted related information is sent by the client device via the group resource host;
  • the second processing unit is configured to decrypt the encrypted information related to the shared key to obtain the related information of the shared key.
  • an embodiment of the present invention provides a client device, where the client device includes:
  • the third receiving unit is configured to receive information related to the shared key encrypted by the private key of the remote service host sent by the group resource host;
  • the third processing unit is configured to use the public key corresponding to the private key of the remote service host to decrypt the encrypted information related to the shared key to obtain a list of shared keys and client identifications.
  • an embodiment of the present invention provides a remote service host, where the remote service host includes:
  • the fourth processing unit is configured to generate a shared key based on a request message for querying the public key of the remote service host; use the private key corresponding to the public key of the remote service host to encrypt related information about the shared key;
  • the third sending unit is configured to send the encrypted shared key related information and the shared key.
  • an embodiment of the present invention provides a client device, including a processor and a memory for storing a computer program that can run on the processor, wherein the processor is configured to execute the above
  • the client device executes the steps of the method.
  • an embodiment of the present invention provides a remote service host, including a processor and a memory for storing a computer program that can run on the processor, wherein the processor is used to execute the computer program when the computer program is running. The steps of the method executed by the above remote service host.
  • an embodiment of the present invention provides a storage medium that stores an executable program, and when the executable program is executed by a processor, the method executed by the client device is implemented.
  • an embodiment of the present invention provides a storage medium that stores an executable program, and when the executable program is executed by a processor, the above-mentioned remote service host execution method is implemented.
  • the resource configuration method provided by the embodiment of the present invention includes: the client device obtains the public key of the remote service host through the group resource host; encrypts the related information of the shared key by using the public key; and sends the related information to the remote End service host and/or another client device; in this way, the shared key is generated by the client device, and the shared key is sent to the remote service host and/or another client device; the sharing under the group resource mechanism is clarified Key configuration process.
  • the resource configuration method provided by the embodiment of the present invention further includes: the remote service host generates a shared key based on a request message for querying the shared key of the remote service host; and uses the private key corresponding to the public key of the remote service host , Encrypt the related information of the shared key; send the encrypted related information of the shared key and the shared key to the client device; in this way, generate the shared key through the remote service host, and send the shared key to the client End device; clarified the configuration process of the shared key under the group resource mechanism.
  • Figure 1 is a schematic diagram of the communication architecture of the Internet of Things device of the present invention.
  • FIG. 2 is a schematic diagram of Collection resources of the present invention
  • Figure 3 is a schematic diagram of an OC requesting access to resources according to the present invention.
  • FIG. 5 is a schematic diagram of an optional processing flow of a resource configuration method applied to a client device according to an embodiment of the present invention
  • FIG. 6 is a schematic diagram of an optional processing flow of a resource configuration method applied to a remote service host according to an embodiment of the present invention
  • FIG. 7 is a schematic diagram of a detailed processing flow of a resource configuration method provided by an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of another detailed processing flow of a resource configuration method provided by an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of another optional processing flow of a resource configuration method applied to a client device according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of another optional processing flow of a resource configuration method applied to a remote service host according to an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of a detailed processing flow of yet another resource configuration method according to an embodiment of the present invention.
  • FIG. 12 is a schematic diagram of the composition structure of a client device according to an embodiment of the present invention.
  • FIG. 13 is a schematic diagram of the composition structure of a remote service host according to an embodiment of the present invention.
  • 15 is a schematic diagram of the composition structure of another remote service host according to an embodiment of the present invention.
  • FIG. 16 is a schematic diagram of the hardware composition structure of an electronic device according to an embodiment of the present invention.
  • the Open Connectivity Foundation adopts a RESTful architecture, which uses resources to represent physical Internet of Things devices, as well as information about the functional services and device status provided by the devices; among them, the device that provides the resource is the server device (also called For the remote service host), the device that accesses the resource is the client device (also called the client).
  • the client device and server device defined in OCF are logical functional entities; each device can be a client device, a server device, or both a client device and a server device.
  • a device such as a light bulb
  • a server device which implements a certain basic function can only be used as a server device, which is provided to the client device for query and control, without itself controlling or querying other devices.
  • the business interaction between the client device and the server device is realized by CRUDN operation methods such as RESTful operations, Create, Retrieve, Update, Delete, and Notify on resources.
  • the client device is the initiator of the RESTful operation
  • the server device is the responder of the RESTful operation.
  • the client device sends a resource operation request to the server device to request operations on the resources on the server device, and the server device performs resource operations. And return a response to the client device, which carries the content and description information of the resource.
  • FIG. 1 A schematic diagram of the communication architecture of IoT devices, as shown in Figure 1.
  • the resource model layer is used to describe resources. Each resource corresponds to a specific Uniform Resource Identifier (URI), which can be accessed through the URI of the resource. Access this resource; each resource has a corresponding interface that supports Restful operations.
  • the transmission protocol layer is used to transmit resource content and description information. By mapping resource operations to specific transmission protocols, the Restful operation of each resource is transformed into a physical message to be transferred between devices, providing a means for interconnection and intercommunication between devices.
  • URI Uniform Resource Identifier
  • OCF defines a resource link (Link).
  • the OCF server device can provide its own resources in the form of a resource link, so that the OCF client device can discover the resources of the server device.
  • Link is defined; a Link is composed of a set of defined parameters, and each parameter is represented by a key-value pair.
  • the parameters include the context URI of the link, the target URI, the relationship between the two, and the link related Metadata for:
  • Anchor The URI of the context. When the anchor is implicit, it actually means the host resource that contains the Link (the resource that implements the Link). When the anchor is explicit, it is generally used to cover the host resource URI of the Link and provide non-hosting.
  • the resource URI is used as the context URI, the anchor parameter value is in the form of ocf:// ⁇ deviceID>, and the deviceId indicates the host device of the target resource.
  • Target URI that is, the target resource referenced by Link, which can be a relative path (the referenced resource is a local resource) or an absolute path (the referenced resource is a remote resource), and href is a mandatory attribute of Link.
  • rel The relationship between the referenced resource target URI and the context URI.
  • rel When rel is implicit, it means “hosts” by default, that is, the target URI resource is carried by the context URI resource.
  • rel When rel is "item”, it means the target URI resource is a collection resource. (Context URI resource) member, when rel is "self”, it means the referenced target resource is itself.
  • p:bitmap indicates whether the target resource is discoverable and observable.
  • eps Message endpoints (Endpoints) that can access the target resource; such as IP address/DNS domain name + port number, if it is a DNS domain name, it needs to be resolved to an IP address through DNS.
  • Endpoints Message endpoints (Endpoints) that can access the target resource; such as IP address/DNS domain name + port number, if it is a DNS domain name, it needs to be resolved to an IP address through DNS.
  • the target URI, resource type and interface are mandatory, and other parameters are optional and can be used in Link according to different contexts.
  • resource Link there are multiple rooms on a first floor, and there is light 1 in room 1, which can control all lights on a floor or a room to be turned on or off at the same time through Link.
  • a collection resource is a collection resource that contains a list of Links.
  • the list of Links must be in array format, represented by the attribute value "links”.
  • the collection resource has its own resource type and interface; if no other resource types are defined, the default resource type of the Collection resource is "oic.wk.col” ", the default resource type needs to support the baseline interface "oic.if.baseline” and the links list interface "oic.if.ll", and the default interface is the links list interface "oic.if.ll”.
  • Use cases for Collection include:
  • a Collection resource contains the switch resources of device A (light) and the switch resources of device B (fan), forming a centralized resource group.
  • the client device can request multiple resources at the same time by accessing the oic.if.b interface of the Collection resource.
  • the Collection will send the request to each resource in the links, collect the response returned by each resource, and return it to the client in a unified manner. equipment.
  • the schematic diagram of the OC requesting access to resources is shown in Fig. 3.
  • the CH also contains the ACE for the resource B on the RRH.
  • the CH judges whether it matches the above ACE; if it matches, the CH will package the request for resource B and send it to the RRH.
  • RRH contains access control items for resource B, allowing CH to access resource B.
  • RRH executes the request according to ACE judgment and returns the response to CH. After the CH collects all the responses, they are packaged and sent to the OC.
  • the resource configuration method of the embodiment of the present application can be applied to Internet of Things devices.
  • the schematic diagram of the protocol architecture of the Internet of Things devices includes an application layer, a service layer, a transmission layer, a network layer, a connection layer, and an OS platform; among them,
  • the connection layer supports a variety of low-level networks such as Wireless Fidelity (Wi-Fi) and Thread, and supports Constrained Application Protocol (CoAP), and remote messaging message queue transmission (Message Queuing Telemetry Transport, MQTT) Protocols and mainstream bearer protocols such as HyperText Transfer Protocol (HTTP).
  • Wi-Fi Wireless Fidelity
  • CoAP Constrained Application Protocol
  • MQTT Remote messaging message queue transmission Protocol
  • MQTT Remote messaging message queue transmission Protocol
  • HTTP HyperText Transfer Protocol
  • An optional processing flow of the resource configuration method applied to the client device provided by the embodiment of the invention, as shown in FIG. 5, includes the following steps:
  • Step S101 The client device obtains the public key of the remote service host through the group resource host.
  • the client device creates a Collection resource, which contains a link reference to a resource on another device RRH (such as light); or the OC adds a link to the existing Collection resource, and the link points to another resource.
  • the OC queries the CH for the links of the Collection resource of the Collection resource; among them, the RRH link includes the public key PUB RRH certificate of the RRH ; the OC extracts the public key PUB RRH of the RRH from the public key PUB RRH certificate of the RRH .
  • Step S102 The client device encrypts the related information of the shared key by using the public key.
  • the related information of the shared key includes a client identification list (CID) and a shared secret key (Ks).
  • CID client identification list
  • Ks shared secret key
  • the related information of the shared key may also include at least one of the number of client IDs included in the client ID list and a random number (Rx).
  • the client identification list includes at least one client identification
  • the client identification list includes at least one of the following: the client identification of the client device, and the client device in the client identification list Access RRH resources through the group resource host.
  • PUB RRH is used to encrypt CID, Ks, Rx, and n, where n is the number of client IDs included in the CID.
  • the related information of the shared secret key includes CID, Ks, Rx, and n. Therefore, before the OC uses the public key to encrypt the related information of the shared key, it needs to generate Ks and Rx.
  • OC can generate Rx through a random number generation function, and combine physical quantities such as clock and perturbation to increase the randomness of Rx.
  • the OC can generate a Ks for a list of client IDs, or the OC can also generate a Ks for a client ID.
  • the OC can generate a Ks for a client ID list, multiple client IDs in a client ID list correspond to the same Ks.
  • the OC generates a Ks for a client ID, different client IDs correspond to different Ks, or some client IDs correspond to the same Ks.
  • Step S103 The client device sends the related information.
  • the client device sends information related to the encrypted shared key to the remote service host and/or another client device via the group resource host, and the client device It is a client device that allows access to remote service host resources through the group resource host.
  • the OC sends the encrypted shared key information to the CH, and the CH sends the encrypted shared key information to RRH, or the CH sends the encrypted shared key information To the client device; wherein, the client device is a client device that allows access to the RRH through the CH.
  • the OC configures Ks by itself and sends the Ks to the RRH or other client devices.
  • step S103 after step S103 is performed, the method further includes:
  • Step S104 the client device receives the configuration response message.
  • the configuration response message includes a ciphertext obtained by encrypting a random number with a shared key; the configuration response message is sent by the remote service host and/or another client device via the group resource host Sending, the configuration response message includes a ciphertext obtained by encrypting a random number with a shared key.
  • the OC receives the configuration response message sent by the RRH; if the OC sends the encrypted shared key information to other client devices, The OC receives the configuration response message sent by other client devices; here, other client devices can be understood as client devices in the client identification list.
  • Step S105 The client device determines whether the remote service host and/or another client device successfully configures the shared key.
  • the OC uses the shared key to decrypt the ciphertext in the configuration response message to obtain a random number; if the decrypted random number is consistent with the random number generated by itself, the remote service host and/or The configuration of the shared key by the other client device succeeds; when the random number obtained by decryption is inconsistent with the random number generated by itself, the remote service host and/or the other client device fails to configure the shared key .
  • An optional processing flow of the resource configuration method applied to the remote service host provided by the embodiment of the invention, as shown in FIG. 6, includes the following steps:
  • Step S201 The remote service host receives the encrypted information related to the shared key.
  • the client device sends the encrypted related information of the shared key to the remote service host via the group resource host.
  • Step S202 The remote service host decrypts the encrypted information related to the shared key to obtain the related information of the shared key.
  • the remote service host uses the private key corresponding to the public key of the remote service host to decrypt the information related to the encrypted shared key to obtain the shared key Ks.
  • the remote service host queries the access authority of the group resource host, and when the group resource host has the access authority, the remote service host uses the public key of the remote service host to correspond to The private key decrypts the information related to the encrypted shared key to obtain the shared key Ks.
  • step S202 the method further includes:
  • Step S203 The remote service host sends a configuration response message, and the configuration response message is sent to the client device via the group resource host.
  • the configuration response message includes a ciphertext obtained by encrypting a random number Rx with a shared key Ks.
  • step S203 the method further includes:
  • Step S204 the remote service host saves the shared key.
  • the remote service host saves the shared key in the related information of the shared key in the related information of the shared key, which corresponds to the client identification list corresponding to the shared key. Resources.
  • the remote service host saves the shared key in the related information of the shared key in the related information of the shared key, which corresponds to the client identifier corresponding to the shared key. Resources.
  • step S201 before step S201 is executed, the method further includes:
  • Step S200 the remote service host receives a request message for the public key of the remote service host; the request message is sent by the receiving group resource host for the group resource host to add the public key of the remote service host To the resources of the remote service host.
  • the group resource host can add a pubdata attribute to the Links of the Collection resource to store the public key certificate of the RRH.
  • the following takes the OC to generate a Ks for a group of client identifiers as an example to illustrate a detailed processing flow of the resource configuration method provided by the embodiment of the present invention, as shown in FIG. 7, including:
  • Step S301 the OC creates a Collection resource, or adds an RRH resource to the Collection resource.
  • the Collection resource contains a link reference to a resource on another device RRH (such as light); or the OC adds a link to the existing Collection resource, and the link points to a resource on another device RRH.
  • Step S302 the CH sends a request to the RRH to query the public key PUB RRH certificate of the RRH .
  • step S303 the RRH returns the public key PUB RRH certificate to the CH, and the CH adds the public key PUB RRH certificate to the RRH link.
  • the CH can add a pubdata attribute to the Links of the Collection resource to store the public key PUB RRH certificate of the RRH .
  • the CH adds the public key PUB RRH certificate to the RRH link as follows:
  • the Collection resource contains 2 links, which point to the lamp with the device ID of dc70373c-1e8d-4fb3-962e-017eaa863989 and the fan with the device ID of 88b7c7f0-4b51-4e0a-9faa-cfb439fd7f49.
  • the public key certificate of the lamp is in der encoding format
  • the public key certificate of the fan is in pem encoding format.
  • Step S304 the OC generates a symmetric key Ks and a random number Rx.
  • the OC generates one Ks for all client identifiers in a client identifier list, that is, all client identifiers in a client identifier list correspond to one Ks.
  • Step S305 the OC queries the CH for Collection resources.
  • the OC queries the CH for Collection resources to obtain the links of the Collection resources; among them, the RRH link contains its public key PUB RRH certificate.
  • the OC can extract the public key PUB RRH of the RRH from the public key PUB RRH certificate.
  • Step S306 the OC calculates PUB RRH (n, [CID], Ks, Rx).
  • OC uses PUB RRH to encrypt n, [CID], Ks, and Rx.
  • CID is a list of client IDs
  • n is the number of client IDs included in the CID
  • Ks is a shared secret key
  • Rx is a random number.
  • OC allows client devices in CID to access RRH resources through CH.
  • Step S307 the OC configures the ACL of the Collection resource, and sends [PUB RRH ([CID], Ks, Rx)] to the CH.
  • the OC configures the ACL of the Collection resource and sends [PUB RRH ([CID],Ks,Rx)] to the CH, as shown below:
  • Step S309 After receiving the request, the RRH uses the private key corresponding to the PUB RRH to decrypt to obtain n, [CID], Ks and Rx.
  • step S310 the RRH saves Ks and associates it with [CID].
  • the RRH saves Ks in the /oic/sec/cred resource corresponding to [CID].
  • step S311 the RRH returns a configuration success response.
  • the configuration success response includes the ciphertext obtained by encrypting Rx with Ks, which is returned to the OC via the CH.
  • step S312 the OC decrypts the ciphertext with Ks to obtain Rx, and verifies whether the Rx configuration is successfully executed.
  • OC uses Ks to decrypt the ciphertext to obtain Rx. OC compares whether the decrypted Rx is consistent with the Rx generated by itself. When the Rx obtained by decryption is consistent with the Rx generated by itself, confirm that the configuration is successfully executed; When the obtained Rx is inconsistent with the Rx generated by yourself, confirm that the configuration has not been successfully executed.
  • Step S401 the OC creates a Collection resource, or adds an RRH resource to the Collection resource.
  • Step S402 The CH sends a request to the RRH to query the public key PUB RRH certificate of the RRH .
  • step S403 the RRH returns the public key PUB RRH certificate to the CH, and the CH adds the public key PUB RRH certificate to the RRH link.
  • steps S401-S403 are the same as the operations performed in steps S301-S303 in the foregoing embodiment, and will not be repeated here.
  • Step S404 the OC generates a random number Rx.
  • Step S405 the OC queries the CH for Collection resources.
  • step S405 is the same as the operation performed in step S305 in the foregoing embodiment, and will not be repeated here.
  • step S406 the OC generates a corresponding symmetric key Ks for each client device that is allowed to access RRH resources through the CH, calculates PUB RRH (n, CID, Ks, Rx), and obtains a list of encrypted ciphertexts [ PUB RRH (n,[CID],Ks,Rx)].
  • OC uses PUB RRH to encrypt n, [CID], Ks, and Rx.
  • CID is a list of client IDs
  • n is the number of client IDs included in the CID
  • Ks is a shared secret key
  • Rx is a random number.
  • OC allows client devices in CID to access RRH resources through CH.
  • Step S407 the OC configures the ACL of the Collection resource and sends [PUB RRH ([CID], Ks, Rx)] to the CH.
  • OC configures the ACL of Collection resources, which can be implemented as follows:
  • Step S408 the CH sets the authority of the OC.
  • Step S409 the OC sends a batch processing request [n, PUB RRH (CID, Ks, Rx)] to the RRH via the CH.
  • OC sends batch processing request to RRH via CH can be realized as follows:
  • Step S410 After receiving the request, the RRH checks the access authority of the CH,
  • step S411 after the CH access permission check passes, the RRH uses the private key corresponding to the PUB RRH to decrypt the ciphertext carried in the request to obtain a set of [n, CID, Ks] and Rx.
  • step S412 the RRH saves Ks and associates it with [CID].
  • the RRH saves a set of Ks in the /oic/sec/cred resource with a corresponding CID of subject, which contains the key Ks_oc corresponding to the OC.
  • Step S413 The RRH returns a configuration success response to the OC via the CH, and the response contains the ciphertext obtained by encrypting Rx with Ks_oc.
  • Step S414 the OC uses Ks to decrypt the ciphertext to obtain Rx, and verifies whether the Rx configuration is successfully executed.
  • steps S407-S409 are the same as the operations performed in steps S307-309 in the foregoing embodiment, and the operations performed in S411-S414 are the same as the operations performed in steps S311-314 in the foregoing embodiment.
  • Another optional processing flow of the resource configuration method applied to the client device provided by the embodiment of the present invention, as shown in FIG. 9, includes the following steps:
  • Step S501 The client device receives information about the shared key that is encrypted by the private key of the remote service host and sent by the group resource host.
  • the remote service host uses its own private key to encrypt information related to the shared key, and the private key corresponds to the public key of the remote service host; the remote service host encrypts the encrypted shared key The related information of is sent to the group resource host, and the group resource host forwards the encrypted related information of the shared key to the client device.
  • Step S502 The client device uses the public key corresponding to the private key of the remote service host to decrypt the encrypted information related to the shared key to obtain a shared key and a list of client identifications.
  • step S502 the method further includes:
  • Step S503 The client device saves the shared key obtained by decryption.
  • the client identification list obtained by decryption by the client device is consistent with the client identification list sent by the client device to the group resource host, and the shared key obtained by decryption by the client device is consistent with the If the shared keys received by the client device are consistent, the client device saves the shared key obtained by decryption.
  • the related information of the shared key includes at least: a client identification list and a shared key; wherein, the client identification list includes at least one client identification.
  • the related information of the shared key also includes at least one of the number of client identifications and a random number included in the client identification list.
  • Another optional processing flow of the resource configuration method applied to the remote service host provided by the embodiment of the present invention, as shown in FIG. 10, includes the following steps:
  • Step S601 The remote service host generates a shared key based on the request message for querying the public key of the remote service host.
  • the remote service host receives a request message for querying the public key of the remote service host sent by the group resource host; the remote service host generates a shared key based on the request message.
  • step S602 the remote service host uses the private key corresponding to the public key of the remote service host to encrypt information related to the shared key.
  • the related information of the shared key includes at least: a client identification list and a shared key; wherein, the client identification list includes at least one client identification.
  • the related information of the shared key also includes at least one of the number of client identifications and a random number included in the client identification list.
  • Step S603 The remote service host sends the encrypted shared key related information and the shared key.
  • the remote service host sends the encrypted related information of the shared key and the shared key to the client device via the group resource host.
  • the RRH configures Ks and sends Ks to the OC.
  • the OC may also send Ks to the client device in the client identification list.
  • step S801 the OC creates a Collection resource, or adds an RRH resource to the Collection resource.
  • Step S802 the CH sends a request to the RRH to query the public key PUB RRH certificate of the RRH .
  • step S803 the RRH returns the public key PUB RRH certificate to the CH, and the CH adds the public key PUB RRH certificate to the RRH link.
  • steps S801-S803 are the same as the operations performed in steps S301-S303 in the foregoing embodiment, and will not be repeated here.
  • step S804 the OC queries the CH for Collection resources.
  • the OC queries the CH for Collection resources to obtain the links of the Collection resources; among them, the RRH link contains its public key PUB RRH certificate.
  • the OC can extract the public key PUB RRH of the RRH from the public key PUB RRH certificate.
  • Step S805 the OC configures the ACL of the Collection resource, and the ACL contains a list of client identifiers that can access the RRH through the Collection resource.
  • OC can be implemented as follows:
  • step S806 the CH sets the OC authority, and requests the shared key from the RRH with [CID] as a parameter.
  • the CH can request the shared key from the RRH through the following:
  • Step S807 the RRH generates the shared key Ks corresponding to the [CID].
  • step S808 the RRH saves Ks in the /oic/sec/cred resource corresponding to [CID].
  • Step S809 RRH encrypts [CID] and Ks with the private key corresponding to PUB RRH to obtain the ciphertext SIG RRH ([CID],Ks), and returns a response to CH, which contains Ks and ciphertext SIG RRH ([CID] ,Ks).
  • step S810 after receiving the response, the CH returns Ks and the ciphertext SIG RRH ([CID], Ks) to the OC.
  • Step S811 OC uses PUB RRH to decrypt SIG RRH ([CID],Ks) to obtain [CID] and Ks. OC compares [CID] with the [CID] sent by itself, and compares the decrypted Ks with the received Ks. After that, save Ks.
  • the OC can also configure Ks to the corresponding client device in [CID].
  • an embodiment of the present invention also provides a client device.
  • the structure of the client device 900 as shown in FIG. 12, includes:
  • the first processing unit 901 is configured to obtain the public key of the remote service host through the group resource host, and use the public key to encrypt information related to the shared key;
  • the first sending unit 902 is configured to send the related information.
  • the related information of the shared key includes at least: a client identification list and a shared key; wherein, the client identification list includes at least one client identification.
  • the related information of the shared key also includes: the number of client identifications included in the client identification list, and/or a random number.
  • the client identification list includes at least one of the following: the client identification of the client device, and the client in the client identification list accessing the remote service host through the group resource host Resources.
  • the first processing unit 901 is further configured to generate a shared key and/or random number.
  • the first processing unit 901 is configured to generate a shared key for all client devices in the client identification list.
  • the first processing unit 901 is configured to generate a shared key corresponding to the client device for each client device.
  • the first sending unit 902 is configured to send related information about the encrypted shared key to the remote service host and/or another client device via the group resource host,
  • the other client device is a client device that allows access to the remote service host resource through the group resource host.
  • the client device further includes: a first receiving unit 903 configured to receive a configuration response message; the configuration response message is transmitted by the remote service host and/or the other client device The group resource host sends that the configuration response message includes a ciphertext obtained by encrypting a random number with a shared key.
  • the first processing unit 901 is further configured to determine whether the remote service host and/or the other client device successfully configures the shared key.
  • the first processing unit 901 is further configured to decrypt the ciphertext using a shared key to obtain a random number
  • the remote service host and/or the other client device successfully configures the shared key
  • the remote service host and/or the other client device fails to configure the shared key.
  • the shared key corresponds to a client identification list
  • the client identification list includes at least two client identifications; or, the shared key corresponds to one client identification.
  • an embodiment of the present invention also provides a remote service host.
  • the composition structure of the remote service host 1000 includes:
  • the second receiving unit 1001 is configured to receive information related to the encrypted shared key, and the related information of the encrypted shared key is sent by the client device via the group resource host;
  • the second processing unit 1002 is configured to decrypt the encrypted information related to the shared key to obtain the related information of the shared key.
  • the second processing unit 1002 is configured to use the private key corresponding to the public key of the remote service host to decrypt the information related to the encrypted shared key.
  • the second processing unit 1002 is configured to query the access authority of the group resource host;
  • the private key corresponding to the public key of the remote service host is used to decrypt the information related to the encrypted shared key.
  • the remote service host further includes: a second sending unit 1003 configured to send a configuration response message, the configuration response message being sent to the client device via the group resource host; the configuration response message includes The ciphertext obtained by encrypting the random number with the shared key.
  • the remote service host further includes: a first storage unit 1004 configured to store the shared key in the related information of the shared key in the related information of the shared key and The resource corresponding to the client identification list corresponding to the shared key.
  • the remote service host further includes: a second storage unit 1005 configured to store the shared key in the related information of the shared key in the related information of the shared key and The resource corresponding to the client identifier corresponding to the shared key.
  • the second receiving unit 1001 is further configured to receive a request message for the public key of the remote service host; the request message is sent by the receiving group resource host for the group resource host The public key of the remote service host is added to the resources of the remote service host.
  • the related information of the shared key includes at least: a client identification list and a shared key; wherein, the client identification list includes at least one client identification.
  • the related information of the shared key also includes: the number of client identifications included in the client identification list, and/or a random number.
  • the client identifier list includes at least one of the following: the client identifier of the client device, and the client in the client identifier list accesses the remote service host through the group resource host Resources.
  • the composition structure of the client device 1100 includes:
  • the third receiving unit 1101 is configured to receive information related to the shared key encrypted by the private key of the remote service host sent by the group resource host;
  • the third processing unit 1102 is configured to use the public key corresponding to the private key of the remote service host to decrypt the information related to the encrypted shared key to obtain a shared key and a list of client identifications.
  • the information related to the encrypted shared key is sent by the remote service host to the group resource host.
  • the client device 1100 further includes:
  • the third storage unit 1103 is configured such that the client identification list obtained by decryption by the third processing unit is consistent with the client identification list sent by the client device to the group resource host, and the client device decrypts the list obtained by the client device.
  • the shared key is consistent with the shared key received by the client device, the shared key obtained by decryption is saved.
  • the related information of the shared key includes at least: a client identification list and a shared key; wherein, the client identification list includes at least one client identification.
  • the related information of the shared key also includes: the number of client identifications included in the client identification list, and/or a random number.
  • the client identification list includes at least one of the following: the client identification of the client device, and the client device in the client identification list accesses the remote service host through the group resource host resource of.
  • the embodiment of the present invention also provides another remote service host, the composition structure of the remote service host 1200, as shown in FIG. 15, including:
  • the fourth processing unit 1201 is configured to generate a shared key based on a request message for querying the shared key of the remote service host; use the private key corresponding to the public key of the remote service host to perform information related to the shared key encryption;
  • the third sending unit 1202 is configured to send the encrypted shared key related information and the shared key.
  • the third sending unit 1202 is configured to send the encrypted related information of the shared key and the shared key to the client device via the group resource host.
  • the related information of the shared key includes at least: a client identification list and a shared key; wherein, the client identification list includes at least one client identification.
  • the related information of the shared key also includes: the number of client identifications included in the client identification list, and/or a random number.
  • the client identification list includes at least one of the following: the client identification of the client device, and the client device in the client identification list accesses the remote service host through the group resource host resource of.
  • An embodiment of the present invention also provides a client device, including a processor and a memory for storing a computer program that can run on the processor, wherein the processor is used to execute the above-mentioned client device when the computer program is running. The steps of the resource allocation method performed.
  • the embodiment of the present invention also provides a remote service host, including a processor and a memory for storing a computer program that can run on the processor, wherein the processor is used to execute the remote The steps of the resource configuration method performed by the service host.
  • the electronic device 700 includes: at least one processor 701, a memory 702, and at least one network interface 704.
  • the various components in the electronic device 700 are coupled together through the bus system 705. It can be understood that the bus system 705 is used to implement connection and communication between these components.
  • the bus system 705 also includes a power bus, a control bus, and a status signal bus. However, for clarity of description, various buses are marked as the bus system 705 in FIG. 16.
  • the memory 702 may be a volatile memory or a non-volatile memory, and may also include both volatile and non-volatile memory.
  • the non-volatile memory may be ROM, Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), and electrically erasable Programmable read-only memory (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access memory (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface memory, optical disk, or CD-ROM -ROM, Compact Disc Read-Only Memory); Magnetic surface memory can be disk storage or tape storage.
  • the volatile memory may be a random access memory (RAM, Random Access Memory), which is used as an external cache.
  • RAM random access memory
  • SRAM static random access memory
  • SSRAM synchronous static random access memory
  • DRAM Dynamic Random Access Memory
  • SDRAM Synchronous Dynamic Random Access Memory
  • DDRSDRAM Double Data Rate Synchronous Dynamic Random Access Memory
  • ESDRAM enhanced -Type synchronous dynamic random access memory
  • SLDRAM SyncLink Dynamic Random Access Memory
  • direct memory bus random access memory DRRAM, Direct Rambus Random Access Memory
  • DRRAM Direct Rambus Random Access Memory
  • the memory 702 described in the embodiment of the present invention is intended to include but not limited to these and any other suitable types of memory.
  • the memory 702 in the embodiment of the present invention is used to store various types of data to support the operation of the electronic device 700. Examples of these data include: any computer program used to operate on the electronic device 700, such as the application program 7022.
  • the program for implementing the method of the embodiment of the present invention may be included in the application program 7022.
  • the method disclosed in the foregoing embodiment of the present invention may be applied to the processor 701 or implemented by the processor 701.
  • the processor 701 may be an integrated circuit chip with signal processing capabilities. In the implementation process, the steps of the foregoing method can be completed by hardware integrated logic circuits in the processor 701 or instructions in the form of software.
  • the aforementioned processor 701 may be a general-purpose processor, a digital signal processor (DSP, Digital Signal Processor), or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the processor 701 may implement or execute various methods, steps, and logical block diagrams disclosed in the embodiments of the present invention.
  • the general-purpose processor may be a microprocessor or any conventional processor.
  • the steps of the method disclosed in the embodiments of the present invention can be directly embodied as being executed and completed by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module may be located in a storage medium, and the storage medium is located in the memory 702.
  • the processor 701 reads the information in the memory 702 and completes the steps of the foregoing method in combination with its hardware.
  • the electronic device 700 may be used by one or more application specific integrated circuits (ASIC, Application Specific Integrated Circuit), DSP, programmable logic device (PLD, Programmable Logic Device), and complex programmable logic device (CPLD). , Complex Programmable Logic Device), FPGA, general-purpose processor, controller, MCU, MPU, or other electronic components to implement the foregoing method.
  • ASIC Application Specific Integrated Circuit
  • DSP digital signal processor
  • PLD programmable logic device
  • CPLD complex programmable logic device
  • FPGA field-programmable Logic Device
  • controller MCU
  • MPU or other electronic components to implement the foregoing method.
  • the embodiment of the present application also provides a storage medium for storing computer programs.
  • the storage medium can be applied to the client device in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process in each method of the embodiment of the present application.
  • the computer program causes the computer to execute the corresponding process in each method of the embodiment of the present application.
  • the storage medium can be applied to the remote service host in the embodiment of the present application, and the computer program causes the computer to execute the corresponding process in each method of the embodiment of the present application.
  • the computer program causes the computer to execute the corresponding process in each method of the embodiment of the present application.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种资源配置方法,包括:客户端设备通过组资源主机获取远端服务主机的公钥;利用所述公钥对共享密钥的相关信息进行加密;发送所述相关信息。本发明还公开了另一种资源配置方法、设备及存储介质。

Description

一种资源配置方法、设备及存储介质 技术领域
本发明涉及无线通信技术领域,尤其涉及一种资源配置方法、设备及存储介质。
背景技术
相关技术中,组资源主机(Collection Host,CH)具有访问远端服务节点(Remote Reference Host,RRH)的组资源(Collection)的权限,客户端(Original Client,OC)具有访问CH的Collection的权限。然而,现有的Collection机制并未明确如何配置OC和RRH共享密钥。
发明内容
为解决上述技术问题,本发明实施例提供一种资源配置方法、设备及存储介质,明确了Collection机制下如何对OC和RRC进行资源配置。
第一方面,本发明实施例提供一种资源配置方法,包括:客户端设备通过组资源主机获取远端服务主机的公钥;利用所述公钥对共享密钥的相关信息进行加密;发送所述相关信息。
第二方面,本发明实施例提供一种资源配置方法,包括:远端服务主机接收加密后的共享密钥的相关信息,所述加密后的相关信息由客户端设备经组资源主机发送;对所述加密后的共享密钥的相关信息进行解密,得到共享密钥的相关信息。
第三方面,本发明实施例提供一种资源配置方法,包括:客户端设备接收组资源主机发送的利用远端服务主机的私钥加密后的共享密钥的相关信息;利用所述远端服务主机的私钥对应的公钥对所述加密后的共享密钥的相关信息进行解密,获得共享密钥和客户端标识列表。
第四方面,本发明实施例提供一种资源配置方法,包括:远端服务主机基于查询所述远端服务主机的公钥的请求消息,产生共享密钥;利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密;发送加密后的共享密钥的相关信息和共享密钥。
第五方面,本发明实施例提供一种客户端设备,所述客户端设备包括:第一处理单元,配置为通过组资源主机获取远端服务主机的公钥,利用所述公钥对共享密钥的相关信息进行加密;
第一发送单元,配置为发送所述相关信息。
第六方面,本发明实施例提供一种远端服务主机,所述远端服务主机包括:
第二接收单元,配置为接收加密后的共享密钥的相关信息,所述加密后的相关信息由客户端设备经组资源主机发送;
第二处理单元,配置为对所述加密后的共享密钥的相关信息进行解密,得到共享密钥的相关信息。
第七方面,本发明实施例提供一种客户端设备,所述客户端设备包括:
第三接收单元,配置为接收组资源主机发送的利用远端服务主机的私钥加密后的共享密钥的相关信息;
第三处理单元,配置为利用所述远端服务主机的私钥对应的公钥对所述加密后的共享密钥的相关信息进行解密,获得共享密钥和客户端标识列表。
第八方面,本发明实施例提供一种远端服务主机,所述远端服务主机包括:
第四处理单元,配置为基于查询所述远端服务主机的公钥的请求消息,产生共享密钥;利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密;
第三发送单元,配置为发送加密后的共享密钥的相关信息和共享密钥。
第九方面,本发明实施例提供一种客户端设备,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,所述处理器用于运行所述计算机程序时,执行上述客户端设备执行方法的步骤。
第十方面,本发明实施例提供一种远端服务主机,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,所述处理器用于运行所述计算机程序时,执行上述远端服务主机执行的方法的步骤。
第十一方面,本发明实施例提供一种存储介质,存储有可执行程序,所述可执行程序被处理器执行时,实现上述客户端设备执行的方法。
第十二方面,本发明实施例提供一种存储介质,存储有可执行程序,所述可执行程序被处理器执行时,实现上述远端服务主机执行的方法。
本发明实施例提供的资源配置方法,包括:客户端设备通过组资源主机获取远端服务主机的公钥;利用所述公钥对共享密钥的相关信息进行加密;发送所述相关信息至远端服务主机和/或另一客户端设备;如此,通过客户端设备生成共享密钥,并将共享密钥发送至远端服务主机和/或另一客户端设备;明确了组资源机制下共享密钥的配置流程。本发明实施例提供的资源配置方法,还包括:远端服务主机基于查询所述远端服务主机的共享密钥的请求消息,产生共享密钥;利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密;发送加密后的共享密钥的相关信息和共享密钥至客户端设备;如此,通过远端服务主机生成共享密钥,并将共享密钥发送至客户端设备;明确了组资源机制下共享密钥的配置流程。
附图说明
图1为本发明物联网设备的通信架构示意图;
图2为本发明Collection资源示意图Collection资源示意图;
图3为本发明OC请求访问资源的示意图;
图4为本发明物联网设备的协议架构示意图;
图5为本发明实施例提供的应用于客户端设备的资源配置方法的一种可选处理流程示意图;
图6为本发明实施例提供的应用于远端服务主机的资源配置方法的一种可选处理流程示意图;
图7为本发明实施例提供的资源配置方法的一种详细处理流程示意图;
图8为本发明实施例提供的资源配置方法的另一种详细处理流程示意图;
图9为本发明实施例提供的应用于客户端设备的资源配置方法的另一种可选处理流程示意图;
图10为本发明实施例提供的应用于远端服务主机的资源配置方法的另一种可选处理流程示意图;
图11为本发明实施例又一种资源配置方法的详细处理流程示意图;
图12为本发明实施例一种客户端设备的组成结构示意图;
图13为本发明实施例一种远端服务主机的组成结构示意图;
图14为本发明实施例另一种客户端设备的组成结构示意图;
图15为本发明实施例另一种远端服务主机的组成结构示意图;
图16为本发明实施例电子设备的硬件组成结构示意图。
具体实施方式
为了能够更加详尽地了解本发明实施例的特点和技术内容,下面结合附图对本发明实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本发明实施例。
在对本发明实施例提供的资源配置方法进行详细说明之前,首先对物联网的相关知识进行简要说明。
开放连接基金会(Open Connectivity Foundation,OCF)采用RESTful架构,通过资源来表述物联网实体设备,以及设备提供的功能服务和设备的状态等信息;其中,提供资源的设备是服务端设备(也称为远端服务主机),访问资源的设备是客户端设备(也称为客户端)。OCF中定义的客户端设备和服务端设备是逻辑功能实体;每个设备可以是客户端设备,也可以服务端设备,还可以既是客户端设备又是服务端设备。例如,实现某项最基本功能的设备(例如灯泡)可以只做服务端设备,提供给客户端设备进行查询和控制,本身无控制或者查询其他设备的需求。
客户端设备和服务端设备的业务交互是通过对资源进行RESTful操作、创建(Create)、读取(Retrieve)、更新(Update)、删除(Delete)和通知(Notify)等CRUDN操作方法而实现。客户端设备是RESTful操作的发起方,服务端设备是RESTful操作的响应方,客户端设备向服务端设备发送资源操作请求,请求对服务端设备上的资源进行操作,服务端设备执行资源操作,并向客户端设备返回响应,响应中携带资源的内容及描述信息。
物联网设备的通信架构示意图,如图1所示,资源模型层用于对资源进行描述,每个资源对应一个特定的统一资源标识符(Uniform Resource Identifier,URI),可通过访问资源的URI来访问这个资源;每个资源具有支持Restful操作的相应接口。传输协议层用于传输资源内容及描述信息,通过把资源操作映射到具体的传输协议中,使每个资源的Restful操作转变为实体消息在设备间传递,为设备间的互联互通提供手段。
为表示资源之间的关联关系,OCF定义了资源链接(Link),OCF服务端设备可以以资源link的形式提供自己所拥有的资源,便于OCF客户端设备发现服务端设备的资源。
为了表示资源之间的引用关系,定义了Link;一个Link由一组定义的参数组成,每个参数均由键值对表示,参数包括Link的上下文URI、目标URI、两者的关系及Link相关的元数据:
(1)anchor:上下文的URI,当anchor隐性化时,其实是表示包含Link的寄主资源(实现Link的资源),当anchor显性化时一般用于覆盖Link的寄主资源URI,提供非hosting resource URI作为上下文URI,anchor参数值的形式为ocf://<deviceID>,deviceId指示目标资源的宿主设备。
(2)href:目标URI,即Link引用的目标资源,可以是相对路径(引用的资源是本地资源)或绝对路径(引用的资源是远程资源),href是Link的强制属性。
(3)rel:引用的资源目标URI和上下文URI的关系,当rel隐性化时默认表示“hosts”即目标URI资源由上下文URI资源承载,当rel为”item”表示目标URI资源是collection资源(上下文URI资源)的成员,当rel为”self”表示引用的目标资源是 自身。
(4)rt:目标资源的资源类型标识,强制属性。
(5)if:目标资源支持的接口集,强制属性。
(6)p:bitmap指示目标资源是否可发现性、是否可观察。
(7)eps:可以访问目标资源的消息端点(Endpoints);如IP地址/DNS域名+端口号,如果是DNS域名需要通过DNS解析为IP地址。
在Link参数项中,目标URI、资源类型和接口是强制性的,其他参数是可选的,可以根据不同上下文在Link中使用。
如下所示为资源Link的示例:一层楼有多个房间,房间1中有灯1,这就可以通过Link控制一层楼或一个房间的所有的灯同时被打开或关上。
Figure PCTCN2019093926-appb-000001
下面再对Collection资源进行简要描述。Collection资源是包含Links列表的集合资源,在JSON数据表示中,Links列表必须是数组格式,通过属性值“links”表示。通过Collection资源可以将多个资源的链接绑定为一个集合资源,集合资源具有自己的资源类型和接口;在没有定义其他资源类型的情况下,Collection资源默认的资源类型为“oic.wk.col”,默认资源类型需要支持baseline接口“oic.if.baseline”和links list接口“oic.if.ll”,默认接口为links list接口“oic.if.ll”。
Collection的使用场景包括:
1)通过Collection资源对一个IoT设备进行建模,每个单独的功能作为一个Link。
2)多个服务端设备组合为一个Collection,客户端设备可以和Collection资源交互实现和多个服务端设备的通信。
3)在一个集中式设备上管理Collection资源,可以被其他设备访问或控制。
Collection资源示例如下所示,”links”属性的值为数组,每个元素是一个Link。
Figure PCTCN2019093926-appb-000002
Collection资源示意图,如图2所示,一个Collection资源包含设备A(light)的开关资源,以及设备B(fan)的开关资源,形成了集中的资源组。客户端设备可以通过访问Collection资源的oic.if.b接口同时请求多个资源,Collection会把请求发送给links中的每一个资源,并收集每个资源返回的响应,集中后统一返回给客户端设备。
OC请求访y问资源的示意图,如图.3所示,CH除了包含对本地资源A的访问控制项(ACE)外,还包含对RRH上资源B的ACE。对于OC发来的Collection请求,CH判断是否与上述ACE匹配;如果匹配,CH将对资源B的请求进行包装,发送到RRH。RRH包含对资源B的访问控制项,允许CH访问资源B。当RRH接收到CH访问资源B的请求时,RRH根据ACE判断执行该请求,并将响应返回CH。CH收集到所有响应后,统一打包发送给OC。
本申请实施例的资源配置方法可以应用于物联网设备,物联网设备的协议架构示意图,如图4所示,包括应用层、服务层、传输层、网络层、连接层和OS平台;其中,连接层支持无线保真(Wireless Fidelity,Wi-Fi)、Thread等多种不同的低层网络,支持受限应用协议(Constrained Application Protocol,CoAP)、遥信消息队列传输(Message Queuing Telemetry Transport,MQTT)协议和超文本传输协议(HyperText Transfer Protocol,HTTP)等主流承载协议。
发明实施例提供的应用于客户端设备的资源配置方法的一种可选处理流程,如图5所示,包括以下步骤:
步骤S101,客户端设备通过组资源主机获取远端服务主机的公钥。
本发明实施例中,客户端设备(OC)创建一个Collection资源,其中包含对另一设备RRH(如light)上资源的link引用;或者OC在现有Collection资源中增加一个link,该link指向另一设备RRH上的资源。CH向RRH发送查询RRH的公钥PUB RRH证书, CH接收到RRH发送的RRH的公钥PUB RRH证书后,在RRH的link中添加RRH的公钥PUB RRH证书。当OC向CH查询Collection资源的Collection资源的links;其中,RRH的link中包括RRH的公钥PUB RRH证书;OC在RRH的公钥PUB RRH证书中提取RRH的公钥PUB RRH
步骤S102,客户端设备利用所述公钥对共享密钥的相关信息进行加密。
本发明实施例中,所述共享密钥的相关信息包括客户端标识列表(CID)和共享秘钥(Ks)。可选地,所述共享密钥的相关信息除了包括CID和Ks之外,还可以包括所述客户端标识列表中包含的客户端标识的数量以及随机数(Rx)中的至少一项。
其中,所述客户端标识列表至少包括一个客户端标识,所述客户端标识列表包括下述中的至少一项:所述客户端设备的客户端标识,和客户端标识列表中的客户端设备通过组资源主机访问RRH的资源。
在一些实施例中,利用PUB RRH对CID、Ks、Rx和n进行加密,其中,n为CID中包括的客户端标识的数量。在该场景下,共享秘钥的相关信息包括CID、Ks、Rx和n。因此,OC利用所述公钥对共享密钥的相关信息进行加密之前,需要生成Ks和Rx。在具体实施时,OC可通过随机数生成函数产生Rx,并结合时钟、扰动等物理量以增加所先生的Rx的随机性。
在具体实施时,OC可以为一个客户端标识列表生成一个Ks,或者OC还可以为一个客户端标识生成一个Ks。当OC为一个客户端标识列表生成一个Ks时,一个客户端标识列表内的多个客户端标识对应同一个Ks。当OC为一个客户端标识生成一个Ks时,不同的客户端标识对应不同的Ks,或者部分客户端标识对应相同的Ks。
步骤S103,客户端设备发送所述相关信息。
在一些实施例中,所述客户端设备将所述加密后的共享密钥的相关信息,经组资源主机发送至所述远端服务主机和/或另一客户端设备,所述客户端设备为允许通过组资源主机访问远端服务主机资源的客户端设备。在具体实施时,OC将加密后的共享密钥的相关信息发送给CH,CH再将加密后的共享密钥的相关信息发送给RRH,或者CH将将加密后的共享密钥的相关信息发送给客户端设备;其中,所述客户端设备为允许通过CH访问RRH的客户端设备。
通过本发明上述实施例,明确了在Collection机制下,OC自身配置Ks,并将Ks发送至RRH或其他客户端设备。
在一些实施例中,在执行步骤S103之后,所述方法还包括:
步骤S104,客户端设备接收配置响应消息。
在一些实施例中,所述配置响应消息包括用共享密钥加密随机数得到的密文;所述配置响应消息由所述远端服务主机和/或另一客户端设备经所述组资源主机发送,所述配置响应消息包括用共享密钥加密随机数得到的密文。
在具体实施时,若OC将加密后的共享密钥的相关信息发送给RRH,则OC接收RRH发送的配置响应消息;若OC将加密后的共享密钥的相关信息发送给其他客户端设备,则OC接收其他客户端设备发送的配置响应消息;这里,其他客户端设备可以理解为客户端标识列表中的客户端设备。
步骤S105,客户端设备判断所述远端服务主机和/或另一客户端设备配置共享密钥是否成功。
在具体实施时,OC利用共享密钥对配置响应消息中的密文进行解密得到随机数;解密得到的随机数与自身生成的随机数一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥成功;解密得到的随机数与自身生成的随机数不一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥失败。
发明实施例提供的应用于远端服务主机的资源配置方法的一种可选处理流程,如图6所示,包括以下步骤:
步骤S201,远端服务主机接收加密后的共享密钥的相关信息。
本发明实施例中,客户端设备将加密后的共享密钥的相关信息,经组资源主机发送至所述远端服务主机。
其中,针对共享密钥的相关信息的说明,与上述步骤S101相同,这里不再赘述。
步骤S202,远端服务主机对所述加密后的共享密钥的相关信息进行解密,得到共享密钥的相关信息。
在一些实施例中,远端服务主机利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密,得到共享密钥Ks。
在另一些实施例中,远端服务主机查询组资源主机的访问权限,在所述组资源主机具有访问权限的情况下,所述远端服务主机利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密,得到共享密钥Ks。
在步骤S202之后,所述方法还包括:
步骤S203,远端服务主机发送配置响应消息,所述配置响应消息经组资源主机发送至客户端设备。
本发明实施例中,所述配置响应消息包括用共享密钥Ks加密随机数Rx得到的密文。
在步骤S203之后,所述方法还包括:
步骤S204,远端服务主机保存共享密钥。
在一些实施例中,远端服务主机将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识列表对应的资源中。
在另一些实施例中,远端服务主机将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识对应的资源中。
本发明实施例中,在执行步骤S201之前,所述方法还包括:
步骤S200,远端服务主机接收所述远端服务主机的公钥的请求消息;所述请求消息由接收组资源主机发送,用于所述组资源主机将所述远端服务主机的公钥添加到所述远端服务主机的资源中。
具体的,组资源主机可以在Collection资源的Links中加入一个pubdata属性,用于存放RRH的公钥证书。
下面以OC为一组客户端标识生成一个Ks为例,对本发明实施例提供的资源配置方法的一种详细处理流程进行说明,如图7所示,包括:
步骤S301,OC创建Collection资源,或在Collection资源中增加RRH的资源。
在一些实施例中,Collection资源中包含对另一设备RRH(如light)上资源的link引用;或者OC在现有Collection资源中增加一个link,该link指向另一设备RRH上的资源。
步骤S302,CH向RRH发送请求,查询RRH的公钥PUB RRH证书。
在一些实施例中,CH发送的请求如下所示:retrieve/oic/sec/cred?credtype=8。
步骤S303,RRH向CH返回公钥PUB RRH证书,CH在RRH的链接中添加公钥PUB RRH证书。
具体的,CH可以在Collection资源的Links中加入一个pubdata属性,用于存放RRH的公钥PUB RRH证书。
在一些实施例中,CH在RRH的链接中添加公钥PUB RRH证书如下所示:
Figure PCTCN2019093926-appb-000003
Figure PCTCN2019093926-appb-000004
该Collection资源中包含2个link,分别指向设备ID为dc70373c-1e8d-4fb3-962e-017eaa863989的灯和设备ID为88b7c7f0-4b51-4e0a-9faa-cfb439fd7f49的风扇。灯的公钥证书为der编码格式,风扇的公钥证书为pem编码格式。
步骤S304,OC产生对称密钥Ks和随机数Rx。
本发明实施例中,OC为一个客户端标识列表中的全部客户端标识产生一个Ks,即一个客户端标识列表中的全部客户端标识对应一个Ks。
步骤S305,OC向CH查询Collection资源。
在一些实施例中,OC向CH查询Collection资源,得到Collection资源的links;其中,RRH的link中含有其公钥PUB RRH证书。OC可以在公钥PUB RRH证书中提取RRH的公钥PUB RRH
步骤S306,OC计算PUB RRH(n,[CID],Ks,Rx)。
本发明实施例中,OC利用PUB RRH对n、[CID]、Ks和Rx进行加密。
其中,CID为客户端标识列表,n为CID中包括的客户端标识的数量,Ks为共享秘钥,Rx为随机数。OC允许CID中的客户端设备通过CH访问RRH的资源。
步骤S307,OC配置Collection资源的ACL,并向CH发送[PUB RRH([CID],Ks,Rx)]。
具体的,OC配置Collection资源的ACL,并向CH发送[PUB RRH([CID],Ks,Rx)],如下所示:
Figure PCTCN2019093926-appb-000005
步骤S309,RRH收到请求后,用PUB RRH对应的私钥解密,得到n,[CID]、Ks和Rx。
步骤S310,RRH保存Ks,并与[CID]关联。
在一些实施例中,RRH将Ks保存在[CID]对应的/oic/sec/cred资源中。
步骤S311,RRH返回配置成功响应。
在一些实施例中,配置成功响应中包含用Ks加密Rx得到的密文,经CH返回给OC。
步骤S312,OC用Ks解密密文得到Rx,并验证Rx配置是否得到成功执行。
在具体实施时,OC利用Ks解密密文得到Rx,OC比较利用解密得到的Rx与自己生成的Rx是否一致,利用解密得到的Rx与自己生成的Rx一致时,确认配置得到成功执行;利用解密得到的Rx与自己生成的Rx不一致时,确认配置未得到成功执行。
下面再以OC为一个客户端标识生成一个Ks为例,对本发明实施例提供的资源配置方法的另一种详细处理流程进行说明,如图8所示,包括:
步骤S401,OC创建Collection资源,或在Collection资源中增加RRH的资源。
步骤S402,CH向RRH发送请求,查询RRH的公钥PUB RRH证书。
步骤S403,RRH向CH返回公钥PUB RRH证书,CH在RRH的链接中添加公钥PUB RRH证书。
需要说明的是,步骤S401-S403执行的操作与上述实施例中步骤S301-S303执行的操作相同,这里不再赘述。
步骤S404,OC产生随机数Rx。
步骤S405,OC向CH查询Collection资源。
需要说明的是,步骤S405执行的操作与上述实施例中步骤S305执行的操作相同,这里不再赘述。
步骤S406,OC对允许通过CH访问RRH的资源的每一客户端设备,分别产生相应的对称密钥Ks,计算PUB RRH(n,CID,Ks,Rx),得到一组加密密文的列表[PUB RRH(n,[CID],Ks,Rx)]。
本发明实施例中,OC利用PUB RRH对n、[CID]、Ks和Rx进行加密。
其中,CID为客户端标识列表,n为CID中包括的客户端标识的数量,Ks为共享秘钥,Rx为随机数。OC允许CID中的客户端设备通过CH访问RRH的资源。
步骤S407,OC配置Collection资源的ACL,并向CH发送[PUB RRH([CID],Ks,Rx)]。
其中,OC配置Collection资源的ACL,可通过如下实现:
Figure PCTCN2019093926-appb-000006
步骤S408,CH设置OC的权限。
步骤S409,OC经CH向RRH发送批处理请求[n,PUB RRH(CID,Ks,Rx)]。
其中,OC经CH向RRH发送批处理请求可通过如下实现:
Figure PCTCN2019093926-appb-000007
步骤S410,RRH收到请求后,检查CH的访问权限、
步骤S411,当CH的访问权限检查通过后,RRH用PUB RRH对应的私钥对请求中携带的密文进行解密,得到一组[n,CID,Ks]和Rx。
步骤S412,RRH保存Ks,并与[CID]关联。
在一些实施例中,RRH将一组Ks保存在相应CID为subject的/oic/sec/cred资源中,其中包含OC对应的密钥Ks_oc。
步骤S413,RRH经CH向OC返回配置成功的响应,响应中包含用Ks_oc加密Rx得到的密文。
步骤S414,OC用Ks解密密文得到Rx,并验证Rx配置是否得到成功执行。
需要说明的是,步骤S407-S409执行的操作与上述实施例中步骤S307-309执行的操作相同,S411-S414执行的操作与上述实施例中步骤S311-314执行的操作相同这里不再赘述。
本发明实施例提供的应用于客户端设备的资源配置方法的另一种可选处理流程,如图9所示,包括以下步骤:
步骤S501,客户端设备接收组资源主机发送的利用远端服务主机的私钥加密后的共享密钥的相关信息。
在一些实施例中,远端服务主机利用自身的私钥加密共享密钥的相关信息,所述私钥与远端服务主机的公钥一一对应;远端服务主机将加密后的共享密钥的相关信息发送至组资源主机,组资源主机再将加密后的共享密钥的相关信息转发至客户端设备。
其中,针对共享密钥的相关信息的说明,与上述步骤S101相同,这里不再赘述。
步骤S502,客户端设备利用所述远端服务主机的私钥对应的公钥对所述加密后的共享密钥的相关信息进行解密,获得共享密钥和客户端标识列表。
本发明实施例中,在步骤S502之后,所述方法还包括:
步骤S503,客户端设备保存解密获得的共享密钥。
具体的,在所述客户端设备解密获得的客户端标识列表与所述客户端设备发送至所述组资源主机的客户端标识列表一致、且所述客户端设备解密获得的共享密钥与所述客户端设备接收到的共享密钥一致的情况下,所述客户端设备保存解密获得的共享密钥。
本发明实施例中,共享密钥的相关信息至少包括:客户端标识列表和共享密钥;其中,所述客户端标识列表至少包括一个客户端标识。或者,共享密钥的相关信息包括客户端标识列表和共享密钥的基础上,还包括所述客户端标识列表中包含的客户端标识的数量和随机数中的至少一项。
本发明实施例提供的应用于远端服务主机的资源配置方法的另一种可选处理流程,如图10所示,包括以下步骤:
步骤S601,远端服务主机基于查询所述远端服务主机的公钥的请求消息,产生共享密钥。
本发明实施例中,远端服务主机接收组资源主机发送的查询远端服务主机的公钥的 请求消息;远端服务主机基于所述请求消息,产生共享密钥。
步骤S602,远端服务主机利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密。
本发明实施例中,共享密钥的相关信息至少包括:客户端标识列表和共享密钥;其中,所述客户端标识列表至少包括一个客户端标识。或者,共享密钥的相关信息包括客户端标识列表和共享密钥的基础上,还包括所述客户端标识列表中包含的客户端标识的数量和随机数中的至少一项。
步骤S603,远端服务主机发送加密后的共享密钥的相关信息和共享密钥。
本发明实施例中,远端服务主机将加密后的共享密钥的相关信息和共享密钥,经组资源主机发送至客户端设备。
通过本发明图9和图10所示的实施例中,明确了在Collection机制下,RRH配置Ks,并将Ks发送至OC。可选地,OC还可以将Ks发送至客户端标识列表中的客户端设备。
下面以RRH生成共享密钥为例,对又一种资源配置方法的详细处理流程进行说明,如图11所示:
步骤S801,OC创建Collection资源,或在Collection资源中增加RRH的资源。
步骤S802,CH向RRH发送请求,查询RRH的公钥PUB RRH证书。
步骤S803,RRH向CH返回公钥PUB RRH证书,CH在RRH的链接中添加公钥PUB RRH证书。
需要说明的是,步骤S801-S803执行的操作与上述实施例中步骤S301-S303执行的操作相同,这里不再赘述。
步骤S804,OC向CH查询Collection资源。
在一些实施例中,OC向CH查询Collection资源,得到Collection资源的links;其中,RRH的link中含有其公钥PUB RRH证书。OC可以在公钥PUB RRH证书中提取RRH的公钥PUB RRH
步骤S805,OC配置Collection资源的ACL,ACL中带有可通过Collection资源访问RRH的一个客户端标识列表。
在具体实施时,OC可通过如下实现:
Figure PCTCN2019093926-appb-000008
Figure PCTCN2019093926-appb-000009
步骤S806,CH设置OC权限,并以[CID]为参数向RRH请求共享密钥。
具体的,CH可通过下述向RRH请求共享密钥:
retrieve/signedkey?subject=[CID]。
步骤S807,RRH产生[CID]对应的共享密钥Ks。
步骤S808,RRH将Ks保存在[CID]对应的/oic/sec/cred资源中。
步骤S809,RRH用PUB RRH对应的私钥加密[CID]和Ks,得到密文SIG RRH([CID],Ks),并向CH返回响应,响应中包含Ks和密文SIG RRH([CID],Ks)。
步骤S810,CH收到响应后,将Ks和密文SIG RRH([CID],Ks)返回OC。
步骤S811,OC用PUB RRH解密SIG RRH([CID],Ks)得到[CID]和Ks,OC将[CID]与自身发出的[CID]比较,将解密得到的Ks与接收到的Ks比较一致后,保存Ks。
在一些实施例中,OC还可以将Ks配置给[CID]中相应的客户端设备。
为实现上述资源配置方法,本发明实施例还提供一种客户端设备,客户端设备900的组成结构,如图12所示,包括:
第一处理单元901,配置为通过组资源主机获取远端服务主机的公钥,利用所述公钥对共享密钥的相关信息进行加密;
第一发送单元902,配置为发送所述相关信息。
本发明实施例中,共享密钥的相关信息至少包括:客户端标识列表和共享密钥;其中,所述客户端标识列表至少包括一个客户端标识。
在一些实施例中,所述共享密钥的相关信息除了客户端标识列表和共享密钥以外,还包括:所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
在一些实施例中,所述客户端标识列表包括下述中的至少一项:所述客户端设备的客户端标识,和客户端标识列表中的客户端通过组资源主机访问远端服务主机的资源。
本发明实施例中,所述第一处理单元901,还配置为生成共享密钥和/或随机数。
在一些实施例中,所述第一处理单元901,配置为为客户端标识列表中所有的客户端设备生成一个共享密钥。
在另一些实施例中,所述第一处理单元901,配置为为每个客户端设备生成一个与所述客户端设备对应的共享密钥。
本发明实施例中,所述第一发送单元902,配置为将所述加密后的共享密钥的相关信息,经组资源主机发送至所述远端服务主机和/或另一客户端设备,所述另一客户端设备为允许通过组资源主机访问远端服务主机资源的客户端设备。
本发明实施例中,所述客户端设备还包括:第一接收单元903,配置为接收配置响应消息;所述配置响应消息由所述远端服务主机和/或所述另一客户端设备经所述组资源主机发送,所述配置响应消息包括用共享密钥加密随机数得到的密文。
本发明实施例中,所述第一处理单元901,还配置为判断所述远端服务主机和/或所述另一客户端设备配置共享密钥是否成功。
本发明实施例中,所述第一处理单元901,还配置为利用共享密钥对所述密文进行解密得到随机数;
解密得到的随机数与自身生成的随机数一致的情况下,所述远端服务主机和/或所述 另一客户端设备配置共享密钥成功;
解密得到的随机数与自身生成的随机数不一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥失败。
本发明实施例中,所述共享密钥对应一个客户端标识列表,所述客户端标识列表包括至少两个客户端标识;或者,所述共享密钥对应一个客户端标识。
为实现上述资源配置方法,本发明实施例还提供一种远端服务主机,远端服务主机1000的组成结构,如图13所示,包括:
第二接收单元1001,配置为接收加密后的共享密钥的相关信息,所述加密后的共享密钥的相关信息由客户端设备经组资源主机发送;
第二处理单元1002,配置为对所述加密后的共享密钥的相关信息进行解密,得到共享密钥的相关信息。
本发明实施例中,所述第二处理单元1002,配置为利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密。
本发明实施例中,所述第二处理单元1002,配置为查询组资源主机的访问权限;
在所述组资源主机具有访问权限的情况下,利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密。
本发明实施例中,所述远端服务主机还包括:第二发送单元1003,配置为发送配置响应消息,所述配置响应消息经组资源主机发送至客户端设备;所述配置响应消息包括用共享密钥加密随机数得到的密文。
本发明实施例中,所述远端服务主机还包括:第一存储单元1004,配置为将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识列表对应的资源中。
本发明实施例中,所述远端服务主机还包括:第二存储单元1005,配置为将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识对应的资源中。
本发明实施例中,所述第二接收单元1001,还配置为接收所述远端服务主机的公钥的请求消息;所述请求消息由接收组资源主机发送,用于所述组资源主机将所述远端服务主机的公钥添加到所述远端服务主机的资源中。
本发明实施例中,所述共享密钥的相关信息至少包括:客户端标识列表和共享密钥;其中,所述客户端标识列表至少包括一个客户端标识。或者,所述共享密钥的相关信息除了包括客户端标识列表和共享密钥之外,还包括:所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
本发明实施例中,所述客户端标识列表包括下述中的至少一项:所述客户端设备的客户端标识,和客户端标识列表中的客户端通过组资源主机访问远端服务主机的资源。
为实现上述资源配置方法,本发明实施例还提供另一种客户端设备,客户端设备1100的组成结构,如图14所示,包括:
第三接收单元1101,配置为接收组资源主机发送的利用远端服务主机的私钥加密后的共享密钥的相关信息;
第三处理单元1102,配置为利用所述远端服务主机的私钥对应的公钥对所述加密后的共享密钥的相关信息进行解密,获得共享密钥和客户端标识列表。
本发明实施例中,所述加密后的共享密钥的相关信息由所述远端服务主机发送至所述组资源主机。
本发明实施例中,所述客户端设备1100还包括:
第三存储单元1103,配置为所述第三处理单元解密获得的客户端标识列表与所述客 户端设备发送至所述组资源主机的客户端标识列表一致、且所述客户端设备解密获得的共享密钥与所述客户端设备接收到的共享密钥一致的情况下,保存解密获得的共享密钥。
本发明实施例中,所述共享密钥的相关信息至少包括:客户端标识列表和共享密钥;其中,所述客户端标识列表至少包括一个客户端标识。或者,所述共享密钥的相关信息除了包括客户端标识列表和共享密钥之外,还包括:所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
本发明实施例中,所述客户端标识列表包括下述中的至少一项:所述客户端设备的客户端标识,和客户端标识列表中的客户端设备通过组资源主机访问远端服务主机的资源。
为实现上述资源配置方法,本发明实施例还提供另一种远端服务主机,远端服务主机1200的组成结构,如图15所示,包括:
第四处理单元1201,配置为基于查询所述远端服务主机的共享密钥的请求消息,产生共享密钥;利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密;
第三发送单元1202,配置为发送加密后的共享密钥的相关信息和共享密钥。
本发明实施例中,所述第三发送单元1202,配置为将加密后的共享密钥的相关信息和共享密钥,经组资源主机发送至客户端设备。
本发明实施例中,所述共享密钥的相关信息至少包括:客户端标识列表和共享密钥;其中,所述客户端标识列表至少包括一个客户端标识。或者,所述共享密钥的相关信息除了包括客户端标识列表和共享密钥之外,还包括:所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
本发明实施例中,所述客户端标识列表包括下述中的至少一项:所述客户端设备的客户端标识,和客户端标识列表中的客户端设备通过组资源主机访问远端服务主机的资源。
本发明实施例还提供一种客户端设备,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,所述处理器用于运行所述计算机程序时,执行上述客户端设备执行的资源配置方法的步骤。
本发明实施例还提供一种远端服务主机,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,所述处理器用于运行所述计算机程序时,执行上述远端服务主机执行的资源配置方法的步骤。
图16是本发明实施例的电子设备(客户端设备和远端服务主机)的硬件组成结构示意图,电子设备700包括:至少一个处理器701、存储器702和至少一个网络接口704。电子设备700中的各个组件通过总线系统705耦合在一起。可理解,总线系统705用于实现这些组件之间的连接通信。总线系统705除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图16中将各种总线都标为总线系统705。
可以理解,存储器702可以是易失性存储器或非易失性存储器,也可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是ROM、可编程只读存储器(PROM,Programmable Read-Only Memory)、可擦除可编程只读存储器(EPROM,Erasable Programmable Read-Only Memory)、电可擦除可编程只读存储器(EEPROM,Electrically Erasable Programmable Read-Only Memory)、磁性随机存取存储器(FRAM,ferromagnetic random access memory)、快闪存储器(Flash Memory)、磁表面存储器、光盘、或只读光盘(CD-ROM,Compact Disc Read-Only Memory);磁表面存储器可以是磁盘存储器或磁带存储器。易失性存储器可以是随机存取存储器(RAM,Random Access Memory), 其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(SRAM,Static Random Access Memory)、同步静态随机存取存储器(SSRAM,Synchronous Static Random Access Memory)、动态随机存取存储器(DRAM,Dynamic Random Access Memory)、同步动态随机存取存储器(SDRAM,Synchronous Dynamic Random Access Memory)、双倍数据速率同步动态随机存取存储器(DDRSDRAM,Double Data Rate Synchronous Dynamic Random Access Memory)、增强型同步动态随机存取存储器(ESDRAM,Enhanced Synchronous Dynamic Random Access Memory)、同步连接动态随机存取存储器(SLDRAM,SyncLink Dynamic Random Access Memory)、直接内存总线随机存取存储器(DRRAM,Direct Rambus Random Access Memory)。本发明实施例描述的存储器702旨在包括但不限于这些和任意其它适合类型的存储器。
本发明实施例中的存储器702用于存储各种类型的数据以支持电子设备700的操作。这些数据的示例包括:用于在电子设备700上操作的任何计算机程序,如应用程序7022。实现本发明实施例方法的程序可以包含在应用程序7022中。
上述本发明实施例揭示的方法可以应用于处理器701中,或者由处理器701实现。处理器701可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器701中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器701可以是通用处理器、数字信号处理器(DSP,Digital Signal Processor),或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。处理器701可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本发明实施例所公开的方法的步骤,可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于存储介质中,该存储介质位于存储器702,处理器701读取存储器702中的信息,结合其硬件完成前述方法的步骤。
在示例性实施例中,电子设备700可以被一个或多个应用专用集成电路(ASIC,Application Specific Integrated Circuit)、DSP、可编程逻辑器件(PLD,Programmable Logic Device)、复杂可编程逻辑器件(CPLD,Complex Programmable Logic Device)、FPGA、通用处理器、控制器、MCU、MPU、或其他电子元件实现,用于执行前述方法。
本申请实施例还提供了一种存储介质,用于存储计算机程序。
可选的,该存储介质可应用于本申请实施例中的客户端设备,并且该计算机程序使得计算机执行本申请实施例的各个方法中的相应流程,为了简洁,在此不再赘述。
可选的,该存储介质可应用于本申请实施例中的远端服务主机,并且该计算机程序使得计算机执行本申请实施例的各个方法中的相应流程,为了简洁,在此不再赘述。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (74)

  1. 一种资源配置方法,所述方法包括:
    客户端设备通过组资源主机获取远端服务主机的公钥;
    利用所述公钥对共享密钥的相关信息进行加密;
    发送加密后的所述相关信息。
  2. 根据权利要求1所述的方法,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  3. 根据权利要求2所述的方法,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  4. 根据权利要求2或3所述的方法,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    所述客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  5. 根据权利要求1至4任一项所述的方法,其中,所述方法还包括:
    所述客户端设备生成共享密钥和/或随机数。
  6. 根据权利要求5所述的方法,其中,所述客户端设备生成共享密钥,包括:
    所述客户端设备为客户端标识列表中所有的客户端生成一个共享密钥。
  7. 根据权利要求5所述的方法,其中,所述客户端设备生成共享密钥,包括:
    所述客户端设备为每个客户端设备生成一个与所述客户端设备对应的共享密钥。
  8. 根据权利要求1至7任一项所述的方法,其中,所述发送加密后的所述相关信息,包括:
    所述客户端设备将所述加密后的共享密钥的相关信息,经组资源主机发送至所述远端服务主机和/或另一客户端设备,所述另一客户端设备为允许通过组资源主机访问远端服务主机资源的客户端设备。
  9. 根据权利要求1至8任一项所述的方法,其中,所述方法还包括:
    所述客户端设备接收配置响应消息;
    所述配置响应消息由所述远端服务主机和/或另一所述客户端设备经所述组资源主机发送,所述配置响应消息包括用共享密钥加密随机数得到的密文。
  10. 根据权利要求9所述的方法,其中,所述方法还包括:
    所述客户端设备判断所述远端服务主机和/或另一客户端设备配置共享密钥是否成功。
  11. 根据权利要求10所述的方法,其中,所述客户端设备判断所述远端服务主机和/或另一客户端设备配置共享密钥是否成功,包括:
    所述客户端设备利用共享密钥对所述密文进行解密得到随机数;
    解密得到的随机数与自身生成的随机数一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥成功;
    解密得到的随机数与自身生成的随机数不一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥失败。
  12. 根据权利要求2至10任一项所述的方法,其中,所述共享密钥对应一个客户端标识列表,所述客户端标识列表包括至少两个客户端标识;
    或者,所述共享密钥对应一个客户端标识。
  13. 一种资源配置方法,所述方法包括:
    远端服务主机接收加密后的共享密钥的相关信息,所述加密后的共享密钥的相关信息由客户端设备经组资源主机发送;
    对所述加密后的共享密钥的相关信息进行解密,得到共享密钥的相关信息。
  14. 根据权利要求13所述的方法,其中,所述对所述加密后的共享密钥的相关信息进行解密,包括:
    所述远端服务主机利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密。
  15. 根据权利要求13所述的方法,其中,所述对所述加密后的共享密钥的相关信息进行解密,包括:
    所述远端服务主机查询组资源主机的访问权限;
    在所述组资源主机具有访问权限的情况下,所述远端服务主机利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密。
  16. 根据权利要求13至15任一项所述的方法,其中,所述方法还包括:
    所述远端服务主机发送配置响应消息,所述配置响应消息经组资源主机发送至客户端设备;
    所述配置响应消息包括用共享密钥加密随机数得到的密文。
  17. 根据权利要求13至16任一项所述的方法,其中,所述方法还包括:
    所述远端服务主机将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识列表对应的资源中。
  18. 根据权利要求13至16任一项所述的方法,其中,所述方法还包括:
    所述远端服务主机将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识对应的资源中。
  19. 根据权利要求13至18任一项所述的方法,其中,所述方法还包括:
    所述远端服务主机接收所述远端服务主机的公钥的请求消息;所述请求消息由接收组资源主机发送,用于所述组资源主机将所述远端服务主机的公钥添加到所述远端服务主机的资源中。
  20. 根据权利要求13至19任一项所述的方法,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  21. 根据权利要求20所述的方法,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  22. 根据权利要求20或21所述的方法,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  23. 一种资源配置方法,所述方法包括:
    客户端设备接收组资源主机发送的利用远端服务主机的私钥加密后的共享密钥的相关信息;
    利用所述远端服务主机的私钥对应的公钥对所述加密后的共享密钥的相关信息进行解密,获得共享密钥和客户端标识列表。
  24. 根据权利要求23所述的方法,其中,所述加密后的共享密钥的相关信息由所述远端服务主机发送至所述组资源主机。
  25. 根据权利要求23或24所述的方法,其中,所述方法还包括:
    所述客户端设备解密获得的客户端标识列表与所述客户端设备发送至所述组资源主机的客户端标识列表一致、且所述客户端设备解密获得的共享密钥与所述客户端设备接收到的共享密钥一致的情况下,所述客户端设备保存解密获得的共享密钥。
  26. 根据权利要求23至25任一项所述的方法,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  27. 根据权利要求26所述的方法,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  28. 根据权利要求26或27所述的方法,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  29. 一种资源配置方法,所述方法包括:
    远端服务主机基于查询所述远端服务主机的共享密钥的请求消息,产生共享密钥;
    利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密;
    发送加密后的共享密钥的相关信息和共享密钥。
  30. 根据权利要求29所述的方法,其中,所述发送加密后的共享密钥的相关信息和共享密钥,包括:
    所述远端服务主机将加密后的共享密钥的相关信息和共享密钥,经组资源主机发送至客户端设备。
  31. 根据权利要求29或30所述的方法,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  32. 根据权利要求31所述的方法,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  33. 根据权利要求31或32所述的方法,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  34. 一种客户端设备,所述客户端设备包括:
    第一处理单元,配置为通过组资源主机获取远端服务主机的公钥,利用所述公钥对共享密钥的相关信息进行加密;
    第一发送单元,配置为发送加密后的所述相关信息。
  35. 根据权利要求34所述的客户端设备,其中,共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  36. 根据权利要求35所述的客户端设备,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  37. 根据权利要求35或36所述的客户端设备,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  38. 根据权利要求34至37任一项所述的客户端设备,其中,所述第一处理单元, 还配置为生成共享密钥和/或随机数。
  39. 根据权利要求38所述的客户端设备,其中,所述第一处理单元,配置为为客户端标识列表中所有的客户端设备生成一个共享密钥。
  40. 根据权利要求38所述的客户端设备,其中,所述第一处理单元,配置为为每个客户端生成一个与所述客户端设备对应的共享密钥。
  41. 根据权利要求34至40任一项所述的客户端设备,其中,所述第一发送单元,配置为将所述加密后的共享密钥的相关信息,经组资源主机发送至所述远端服务主机和/或另一客户端设备,所述另一客户端设备为允许通过组资源主机访问远端服务主机资源的客户端设备。
  42. 根据权利要求34至41任一项所述的客户端设备,其中,所述客户端设备还包括:
    第一接收单元,配置为接收配置响应消息;
    所述配置响应消息由所述远端服务主机和/或另一客户端设备经所述组资源主机发送,所述配置响应消息包括用共享密钥加密随机数得到的密文。
  43. 根据权利要求42所述的客户端设备,其中,所述第一处理单元,还配置为判断所述远端服务主机和/或所述另一客户端设备配置共享密钥是否成功。
  44. 根据权利要求43所述的客户端设备,其中,所述第一处理单元,还配置为利用共享密钥对所述密文进行解密得到随机数;
    解密得到的随机数与自身生成的随机数一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥成功;
    解密得到的随机数与自身生成的随机数不一致的情况下,所述远端服务主机和/或所述另一客户端设备配置共享密钥失败。
  45. 根据权利要求35至44任一项所述的客户端设备,其中,所述共享密钥对应一个客户端标识列表,所述客户端标识列表包括至少两个客户端标识;
    或者,所述共享密钥对应一个客户端标识。
  46. 一种远端服务主机,所述远端服务主机包括:
    第二接收单元,配置为接收加密后的共享密钥的相关信息,所述加密后的共享密钥的相关信息由客户端设备经组资源主机发送;
    第二处理单元,配置为对所述加密后的共享密钥的相关信息进行解密,得到共享密钥的相关信息。
  47. 根据权利要求46所述的远端服务主机,其中,所述第二处理单元,配置为利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密。
  48. 根据权利要求46所述的远端服务主机,其中,所述第二处理单元,配置为查询组资源主机的访问权限;
    在所述组资源主机具有访问权限的情况下,利用所述远端服务主机的公钥对应的私钥,对所述加密后的共享密钥的相关信息进行解密。
  49. 根据权利要求46至48任一项所述的远端服务主机,其中,所述远端服务主机还包括:
    第二发送单元,配置为发送配置响应消息,所述配置响应消息经组资源主机发送至客户端设备;
    所述配置响应消息包括用共享密钥加密随机数得到的密文。
  50. 根据权利要求46至49任一项所述的远端服务主机,其中,所述远端服务主机还包括:
    第一存储单元,配置为将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识列表对应的资源中。
  51. 根据权利要求46至49任一项所述的远端服务主机,其中,所述远端服务主机还包括:
    第二存储单元,配置为将所述共享密钥的相关信息中的共享密钥,保存在所述共享密钥的相关信息中与所述共享密钥对应的客户端标识对应的资源中。
  52. 根据权利要求46至51任一项所述的远端服务主机,其中,所述第二接收单元,还配置为接收所述远端服务主机的公钥的请求消息;所述请求消息由接收组资源主机发送,用于所述组资源主机将所述远端服务主机的公钥添加到所述远端服务主机的资源中。
  53. 根据权利要求46至52任一项所述的远端服务主机,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  54. 根据权利要求53所述的远端服务主机,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  55. 根据权利要求53或54所述的远端服务主机,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备通过组资源主机访问远端服务主机的资源。
  56. 一种客户端设备,所述客户端设备包括:
    第三接收单元,配置为接收组资源主机发送的利用远端服务主机的私钥加密后的共享密钥的相关信息;
    第三处理单元,配置为利用所述远端服务主机的私钥对应的公钥对所述加密后的共享密钥的相关信息进行解密,获得共享密钥和客户端标识列表。
  57. 根据权利要求56所述的客户端设备,其中,所述加密后的共享密钥的相关信息由所述远端服务主机发送至所述组资源主机。
  58. 根据权利要求56或57所述的客户端设备,其中,所述客户端设备还包括:
    第三存储单元,配置为所述第三处理单元解密获得的客户端标识列表与所述客户端设备发送至所述组资源主机的客户端标识列表一致、且所述客户端设备解密获得的共享密钥与所述客户端设备接收到的共享密钥一致的情况下,保存解密获得的共享密钥。
  59. 根据权利要求56至58任一项所述的客户端设备,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  60. 根据权利要求59所述的客户端设备,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  61. 根据权利要求59或60所述的客户端设备,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  62. 一种远端服务主机,所述远端服务主机包括:
    第四处理单元,配置为基于查询所述远端服务主机的共享密钥的请求消息,产生共 享密钥;利用远端服务主机的公钥对应的私钥,对共享密钥的相关信息进行加密;
    第三发送单元,配置为发送加密后的共享密钥的相关信息和共享密钥。
  63. 根据权利要求62所述的远端服务主机,其中,所述第三发送单元,配置为将加密后的共享密钥的相关信息和共享密钥,经组资源主机发送至客户端设备。
  64. 根据权利要求62或63所述的远端服务主机,其中,所述共享密钥的相关信息至少包括:
    客户端标识列表和共享密钥;
    所述客户端标识列表至少包括一个客户端标识。
  65. 根据权利要求64所述的远端服务主机,其中,所述共享密钥的相关信息还包括:
    所述客户端标识列表中包含的客户端标识的数量,和/或随机数。
  66. 根据权利要求64或65所述的远端服务主机,其中,所述客户端标识列表包括下述中的至少一项:
    所述客户端设备的客户端标识;
    客户端标识列表中的客户端设备,通过组资源主机访问远端服务主机的资源。
  67. 一种客户端设备,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,
    所述处理器用于运行所述计算机程序时,执行权利要求1至12任一项所述的方法的步骤。
  68. 一种远端服务主机,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,
    所述处理器用于运行所述计算机程序时,执行权利要求13至22任一项所述的方法的步骤。
  69. 一种客户端设备,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,
    所述处理器用于运行所述计算机程序时,执行权利要求23至28任一项所述的方法的步骤。
  70. 一种远端服务主机,包括处理器和用于存储能够在处理器上运行的计算机程序的存储器,其中,
    所述处理器用于运行所述计算机程序时,执行权利要求29至33任一项所述的方法的步骤。
  71. 一种存储介质,存储有可执行程序,所述可执行程序被处理器执行时,实现权利要求1至12任一项所述的方法。
  72. 一种存储介质,存储有可执行程序,所述可执行程序被处理器执行时,实现权利要求13至22任一项所述的方法。
  73. 一种存储介质,存储有可执行程序,所述可执行程序被处理器执行时,实现权利要求23至28任一项所述的方法。
  74. 一种存储介质,存储有可执行程序,所述可执行程序被处理器执行时,实现权利要求29至33任一项所述的方法。
PCT/CN2019/093926 2019-06-28 2019-06-28 一种资源配置方法、设备及存储介质 WO2020258336A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2019/093926 WO2020258336A1 (zh) 2019-06-28 2019-06-28 一种资源配置方法、设备及存储介质
CN201980077540.0A CN113169965B (zh) 2019-06-28 2019-06-28 一种资源配置方法、设备及存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/093926 WO2020258336A1 (zh) 2019-06-28 2019-06-28 一种资源配置方法、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2020258336A1 true WO2020258336A1 (zh) 2020-12-30

Family

ID=74060712

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/093926 WO2020258336A1 (zh) 2019-06-28 2019-06-28 一种资源配置方法、设备及存储介质

Country Status (2)

Country Link
CN (1) CN113169965B (zh)
WO (1) WO2020258336A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821930A (zh) * 2014-02-03 2015-08-05 塔塔咨询服务公司 计算机实施的物联网数据报传输轻型认证系统和方法
CN105359480A (zh) * 2013-07-02 2016-02-24 瑞典爱立信有限公司 针对受约束资源设备的密钥建立
WO2017014614A1 (ko) * 2015-07-23 2017-01-26 주식회사 투아이피 Iot 디바이스의 통신 클라이언트의 동작 방법 및 상기 통신 클라이언트를 포함하는 iot 디바이스
WO2019006085A1 (en) * 2017-06-30 2019-01-03 Intel Corporation V2X COMMUNICATIONS USING MULTIPLE RAT (MULTI-RAT) ACCESS TECHNOLOGIES

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102264068B (zh) * 2010-05-28 2014-04-02 中国移动通信集团公司 共享密钥协商方法与系统、网络平台及终端
CN103795545B (zh) * 2014-02-14 2017-01-18 飞天诚信科技股份有限公司 一种安全通信的方法和系统
US11025627B2 (en) * 2017-07-10 2021-06-01 Intel Corporation Scalable and secure resource isolation and sharing for IoT networks
CN107493294B (zh) * 2017-09-04 2020-08-21 上海润欣科技股份有限公司 一种基于非对称加密算法的ocf设备的安全接入与管理控制方法
CN109905431B (zh) * 2017-12-08 2021-01-26 京东方科技集团股份有限公司 消息处理方法及系统、存储介质、电子设备
CN109922084B (zh) * 2019-04-10 2021-08-03 北京阿尔山区块链联盟科技有限公司 密钥管理方法、装置以及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105359480A (zh) * 2013-07-02 2016-02-24 瑞典爱立信有限公司 针对受约束资源设备的密钥建立
CN104821930A (zh) * 2014-02-03 2015-08-05 塔塔咨询服务公司 计算机实施的物联网数据报传输轻型认证系统和方法
WO2017014614A1 (ko) * 2015-07-23 2017-01-26 주식회사 투아이피 Iot 디바이스의 통신 클라이언트의 동작 방법 및 상기 통신 클라이언트를 포함하는 iot 디바이스
WO2019006085A1 (en) * 2017-06-30 2019-01-03 Intel Corporation V2X COMMUNICATIONS USING MULTIPLE RAT (MULTI-RAT) ACCESS TECHNOLOGIES

Also Published As

Publication number Publication date
CN113169965B (zh) 2023-06-13
CN113169965A (zh) 2021-07-23

Similar Documents

Publication Publication Date Title
JP6923611B2 (ja) サービス層におけるコンテンツセキュリティ
US10382203B1 (en) Associating applications with Internet-of-things (IoT) devices using three-way handshake
US10812452B2 (en) Methods for improving performance and security in a cloud computing system
US10491568B1 (en) Management of encrypted data storage
US7127613B2 (en) Secured peer-to-peer network data exchange
RU2756304C2 (ru) Идентификация сетевого узла, на который будут реплицироваться данные
US20160364553A1 (en) System, Apparatus And Method For Providing Protected Content In An Internet Of Things (IOT) Network
US11303431B2 (en) Method and system for performing SSL handshake
US9225721B2 (en) Distributing overlay network ingress information
US20070223398A1 (en) Method for Implementing Grouping Devices and Interacting Among Grouped Devices
US12034709B1 (en) Centralized secure distribution of messages and device updates
US11838409B2 (en) Method and apparatus for transferring data in a publish-subscribe system
CN116743850B (zh) 基于物联网平台的设备自发现方法、装置、计算机设备和存储介质
JP2018041224A (ja) ソフトウェア更新システム
CN112307116A (zh) 基于区块链的数据访问控制方法、装置及设备
CA3160111A1 (en) Shared secret implementation of proxied cryptographic keys
WO2022037235A1 (en) Method and apparatus for supporting secure data routing
Cui Comparison of IoT application layer protocols
US9083682B2 (en) Communication device and computer program product
WO2020258336A1 (zh) 一种资源配置方法、设备及存储介质
WO2019184027A1 (zh) 共享数据处理方法、通信装置及通信设备
CN115694802A (zh) 区块链网络服务平台的随机数生成方法及装置、存储介质
JP6527115B2 (ja) 機器リスト作成システムおよび機器リスト作成方法
US11647013B1 (en) Encryption of data via public key cryptography with certificate verification of target
WO2023142072A1 (zh) 加密配置方法、装置、设备、存储介质及程序产品

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19934870

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19934870

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19934870

Country of ref document: EP

Kind code of ref document: A1