WO2023226478A1 - 用于数据传输的方法及装置、路由器、物联网设备 - Google Patents

用于数据传输的方法及装置、路由器、物联网设备 Download PDF

Info

Publication number
WO2023226478A1
WO2023226478A1 PCT/CN2023/075334 CN2023075334W WO2023226478A1 WO 2023226478 A1 WO2023226478 A1 WO 2023226478A1 CN 2023075334 W CN2023075334 W CN 2023075334W WO 2023226478 A1 WO2023226478 A1 WO 2023226478A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
certificate
request
data transmission
blockchain system
Prior art date
Application number
PCT/CN2023/075334
Other languages
English (en)
French (fr)
Inventor
赵宁
张桂芳
徐改霞
孙璐璐
宋厚良
任雯雯
Original Assignee
青岛海尔空调器有限总公司
青岛海尔空调电子有限公司
海尔智家股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 青岛海尔空调器有限总公司, 青岛海尔空调电子有限公司, 海尔智家股份有限公司 filed Critical 青岛海尔空调器有限总公司
Publication of WO2023226478A1 publication Critical patent/WO2023226478A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Definitions

  • This application relates to the technical field of smart home appliances, for example, to a method and device for data transmission, a router, and an Internet of Things device.
  • router is used for communication between networked devices and cloud servers.
  • the router may experience network congestion and data cannot be sent, causing the IoT device to be considered offline.
  • methods for IoT device network distribution include: establishing a wireless link with the IoT device; receiving address information transmitted by the IoT device; adding the IoT device corresponding to the address information to the protection list; according to the preset value Reserve wireless communication resources; transmit network requests sent by IoT devices through preset wireless communication resources; record the actual wireless communication resources occupied by transmitting network requests; reduce the preset wireless communication resources based on the actual occupied wireless communication resources.
  • This method can reduce the situation where the IoT device is restricted by the router during the communication process and causes disconnection. However, when the information of the IoT device is tampered with, the target data may be modified, resulting in low security of data transmission.
  • Embodiments of the present disclosure provide a method and device for data transmission, a router, and an Internet of Things device, so as to improve the security of data transmission while reducing disconnections of Internet of Things devices.
  • the method includes: upon receiving a data transmission request, performing Parsing; when it is determined that the request data carries a certificate issued by the blockchain system, determine that the device sending the data transmission request is an IoT device; decrypt the request data to obtain the target data; put the target data into the priority sending queue.
  • decrypting the request data to obtain the target data includes: determining the private key corresponding to the certificate carried in the request data; decrypting the request data using the private key to peel off the certificate to obtain the target data.
  • parsing the request data includes: determining the set position of the certificate in the request data according to the anti-dropout protection protocol; and determining the data in the set position as certificate information.
  • determining that the request data carries a certificate issued by the blockchain system includes: determining whether the certificate information exists in the blockchain system; if the certificate information exists in the blockchain system, determining that the request data carries a block Certificate issued by chain system.
  • the request data before parsing the request data, it also includes: upon receiving a certificate application request sent by the blockchain system, determining the type of the application device based on the device information in the certificate application request; when the application device is a physical object In the case of networked devices, a certificate is generated based on the device information; the certificate is sent to the blockchain system.
  • the method includes: when the target data needs to be sent, encrypting the target data using a certificate issued by the blockchain system to obtain the request data; generating a data transmission request according to the request data; transmitting the data The request is sent to the router.
  • use the certificate issued by the blockchain system to encrypt the target data to obtain the requested data including: determining the setting location of the certificate according to the anti-drop protection protocol; adding the certificate to the target data according to the setting location. Get request data.
  • the apparatus includes a processor and a memory storing program instructions, and the processor is configured to perform the above method for data transmission when running the program instructions.
  • the router includes a processor and a memory storing program instructions, and the processor is configured to perform the above method for data transmission when running the program instructions.
  • the Internet of Things device includes a processor and a memory storing program instructions, and the processor is configured to perform the above method for data transmission when running the program instructions.
  • the router When the router receives a data transmission request from the device, it parses the request data in the data transmission request to determine the information in the request data. When it is determined that the requested data carries a certificate issued by the blockchain system, it is determined that the device sending the data transmission request is an IoT device, and the data needs to be sent first. Decrypt the request data to obtain the actual target data that needs to be sent. Put the target data into the priority sending queue to avoid interrupting the current data sending process, and to prevent preempting the priority of data sent by other IoT devices.
  • the target data of IoT devices is placed Enter the priority sending queue, and the priority of sending target data is higher than that of non-IoT devices, which reduces the router's restrictions on IoT devices in the communication process and reduces the possibility of IoT devices going offline.
  • the blockchain system and certificates can encrypt the target data to prevent tampering, it can improve the security of data transmission while reducing the disconnection of IoT devices.
  • Figure 1-1 is a schematic structural diagram of the connection between a networking device and a router provided by an embodiment of the present disclosure
  • Figure 1-2 is a schematic structural diagram of the connection between another networking device and a router provided by an embodiment of the present disclosure
  • Figure 2 is a schematic diagram of a method for data transmission provided by an embodiment of the present disclosure
  • Figure 3 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 4 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 5 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 6 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 7 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 8 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 9 is a schematic diagram of another method for data transmission provided by an embodiment of the present disclosure.
  • Figure 10 is a schematic diagram of a device for data transmission provided by an embodiment of the present disclosure.
  • A/B means: A or B.
  • a and/or B means: A or B, or A and B.
  • correspondence can refer to an association relationship or a binding relationship.
  • correspondence between A and B refers to an association relationship or a binding relationship between A and B.
  • IoT devices At present, with the development of IoT technology, more and more IoT devices have entered people's lives, such as smart speakers, air conditioners, lights, water purifiers, etc. Users can control online IoT devices through terminal devices (such as mobile terminals).
  • terminal devices such as mobile terminals.
  • the commonly used method for determining whether an IoT device is online/offline is: within a certain period of time, the cloud server receives the heartbeat of the IoT device, and the IoT device is deemed to be online. If the cloud server does not receive the heartbeat of the IoT device within a certain period of time, the IoT device is deemed to be offline.
  • routers are used as gateways to realize data transmission.
  • embodiments of the present disclosure provide a method for connecting IoT devices and non-IoT devices to routers.
  • Non-IoT devices connect to routers through common network protocols, and IoT devices connect through anti-dropout protection protocols.
  • the anti-drop protection protocol includes server and client. The server is set in the router, and the client is set in the IoT device.
  • the router puts the target data of the IoT devices into the priority sending queue according to the anti-drop protection protocol, and puts the target data of non-IoT devices into the ordinary sending queue according to the common network protocol.
  • the data in the ordinary sending queue is sent, thereby reducing the possibility of the IoT device going offline. Because during the data transmission process, there may be a problem that the target data is tampered with.
  • the certificate verifying the device type is stored in the distributed database.
  • the server in the router connects to the blockchain system and issues the certificate of the IoT device to the blockchain system.
  • the client in the IoT device connects to the blockchain system and obtains the certificate from the blockchain system. IoT devices encrypt via certificates when sending target data.
  • the router When the router receives a data transmission request, it determines whether the device is an IoT device by parsing the request data, and puts the target data obtained after decrypting the request data of the IoT device into the priority sending queue. Since the blockchain system and certificates can encrypt the target data to prevent tampering, it can improve the security of data transmission while reducing the disconnection of IoT devices. During the implementation process of the connection method provided by the embodiment of the present disclosure, the router and the Internet of Things device only need to update their own firmware. No hardware changes are required. For IoT devices that do not need to send data first, the anti-drop protection protocol can be canceled and treated as non-IoT devices.
  • an embodiment of the present disclosure provides a method for data transmission, including:
  • the router determines that the device sending the data transmission request is an Internet of Things device.
  • the router decrypts the request data to obtain the target data.
  • the router puts the target data into the priority sending queue.
  • the router when receiving a data transmission request from a device, parses the request data in the data transmission request to determine the information in the request data. When it is determined that the requested data carries a certificate issued by the blockchain system, it is determined that the device sending the data transmission request is an IoT device, and the data needs to be sent first. Decrypt the request data to obtain the actual target data that needs to be sent. Put the target data into the priority sending queue to avoid interrupting the current data sending process, and to prevent preempting the priority of data sent by other IoT devices.
  • the priority of sending the target data is higher than that of non-IoT devices, which reduces the router's restrictions on the communication process of the IoT device and thereby reduces the possibility of the IoT device going offline.
  • the blockchain system and certificates can encrypt the target data to prevent tampering, it can improve the security of data transmission while reducing the disconnection of IoT devices.
  • an embodiment of the present disclosure provides another method for data transmission, including:
  • the router Upon receiving the data transmission request, the router determines the setting position of the certificate in the request data according to the anti-dropout protection protocol.
  • S222 The router determines the data in the set location as certificate information.
  • the router determines whether the certificate information exists in the blockchain system.
  • the router determines that the request data carries the certificate issued by the blockchain system.
  • the router determines that the device sending the data transmission request is an Internet of Things device.
  • the router determines the private key corresponding to the certificate carried in the request data.
  • S242 The router decrypts the request data and strips the certificate using the private key to obtain the target data.
  • the router puts the target data into the priority sending queue.
  • the router sends a data transmission request response to the Internet of Things device.
  • the certificate information in the request data is determined according to the anti-dropout protection protocol.
  • the certificate information exists in the blockchain system, it is determined that the request data carries the certificate issued by the blockchain system, and the device sending the request data is an Internet of Things device. Since the request data contains the certificate, it is decrypted through the private key corresponding to the certificate (stored in the router) to obtain the actual target data to be sent.
  • the target data is at the top of the priority sending queue, the target data is sent to the corresponding network node and a data transmission request response is sent to the IoT device.
  • the target data transmission of the IoT device is completed. Since the request data is encrypted data and needs to be decrypted before sending, it can improve the security of data transmission while reducing the number of IoT devices being disconnected.
  • an embodiment of the present disclosure provides another method for data transmission, including:
  • the router initializes the blockchain service.
  • the router connects to the blockchain system.
  • the router checks the validity period of all certificates in the blockchain system.
  • the router When it is determined that the validity period of the existing certificate meets the preset conditions, the router writes the alarm information of the Internet of Things device corresponding to the certificate into the blockchain system.
  • the router Upon receiving the certificate application request sent by the blockchain system, the router determines the type of the applying device based on the device information in the certificate application request.
  • the router when the applied device is an Internet of Things device, the router generates a certificate based on the device information.
  • the router sends the certificate to the blockchain system.
  • the router determines that the device sending the data transmission request is an Internet of Things device.
  • the router decrypts the request data to obtain the target data.
  • the router puts the target data into the priority sending queue.
  • the method for data transmission is used to initialize when starting to run, and connect to the blockchain system through the server.
  • the validity period of the certificate of an IoT device in the blockchain system meets the preset conditions, there is a risk that the certificate will expire, which may affect the data transmission of the corresponding IoT device.
  • IoT devices can be reminded to reduce the possibility of IoT devices going offline.
  • receiving a certificate application request sent by the blockchain system there is a new device applying for anti-dropout protection.
  • the type of the device is determined to be an IoT device, a certificate is generated based on the device information and sent to the blockchain system, so that the IoT device carries the certificate when sending target data. Since the certificate will be reminded when there is a risk of expiration, verification will be performed when the device applies for a certificate to improve the security of data transmission.
  • the router determines that one or more certificates are about to expire or have expired in the blockchain system.
  • an embodiment of the present disclosure provides another method for data transmission, including:
  • the router determines that the device sending the data transmission request is an Internet of Things device.
  • the router decrypts the request data to obtain the target data.
  • the router puts the target data into the priority sending queue.
  • S260 Upon receiving the certificate update request, the router generates a new certificate based on the device information in the certificate update request.
  • the router sends the new certificate to the blockchain system.
  • S270 Upon receiving the certificate invalidation request, the router determines the corresponding invalidated certificate based on the device information in the certificate invalidation request.
  • the router deletes the invalid certificate from the blockchain system.
  • the certificate of the Internet of Things device is at risk of expiration and requires a new certificate.
  • a new certificate is generated based on device information and sent to the blockchain system, which improves the security of certificate issuance.
  • the data of the IoT device does not need to be sent first. By deleting the invalid certificate from the blockchain system, the space occupied by the IoT device in the blockchain system and the priority of data transmission are reduced, and the efficiency of data transmission is improved.
  • an embodiment of the present disclosure provides another method for data transmission, including:
  • the Internet of Things device uses the certificate issued by the blockchain system to encrypt the target data to obtain the requested data.
  • S330 The Internet of Things device generates a data transmission request based on the request data.
  • the IoT device sends the data transmission request to the router.
  • the Internet of Things device when the Internet of Things device needs to send target data, it will use the certificate issued by the blockchain system to encrypt the target data to obtain the request data, and will generate the request data based on the request data.
  • a data transfer request is sent to the router.
  • an embodiment of the present disclosure provides another method for data transmission, including:
  • the IoT device initializes the blockchain service.
  • the Internet of Things device is connected to the blockchain system.
  • step S303 When receiving the alarm information, the Internet of Things device processes the alarm information and executes step S321.
  • the IoT device when it is necessary to apply for a certificate, the IoT device sends the device information to the blockchain system.
  • the Internet of Things device Upon receiving a response to the certificate application, the Internet of Things device obtains the certificate from the blockchain system.
  • the Internet of Things device determines the setting location of the certificate according to the anti-dropout protection protocol.
  • S322 The Internet of Things device adds the certificate to the target data according to the set location to obtain the request data.
  • S330 The Internet of Things device generates a data transmission request based on the request data.
  • the IoT device sends the data transmission request to the router.
  • initialization is performed when running, and the client is connected to the blockchain system.
  • the device information is sent to the blockchain system so that the router can generate the corresponding certificate.
  • the blockchain system determines that the certificate corresponding to the device information does not exist, it sends a certificate application request to the router.
  • the router Upon receiving the response to the application certificate, the router has sent the generated certificate to the blockchain system and obtained the certificate from the blockchain system to improve the security of the certificate.
  • certificates are added to enable encryption. Since the warning information is received when the certificate is at risk of expiration, the target data is encrypted through the certificate when sending it to improve the security of data transmission.
  • the embodiment of the present disclosure provides another method for data transmission, including:
  • the Internet of Things device uses the certificate issued by the blockchain system to encrypt the target data to obtain the requested data.
  • S330 The Internet of Things device generates a data transmission request based on the request data.
  • the IoT device sends the data transmission request to the router.
  • the Internet of Things device obtains a new certificate from the blockchain system.
  • the IoT device when the certificate needs to be invalidated, the IoT device sends a certificate invalidation request to the router and deletes the certificate.
  • a certificate update request is sent to the router to obtain a new certificate.
  • the IoT device no longer needs to send data first and sends a certificate invalidation request to the router to reduce its own usage.
  • the priority is used to improve the efficiency of data transmission.
  • step S351 Regarding the determination in step S351 that the validity period of the certificate satisfies the preset conditions, it is determined for the Internet of Things device that the certificate is about to expire or has expired.
  • an embodiment of the present disclosure provides another method for data transmission, including:
  • the router connects to the blockchain system.
  • the Internet of Things device is connected to the blockchain system.
  • the IoT device sends device information to the blockchain system.
  • the router sends the certificate to the blockchain system.
  • the Internet of Things device obtains the certificate from the blockchain system.
  • the IoT device uses the certificate issued by the blockchain system to encrypt the target data to obtain the requested data.
  • S330 The Internet of Things device generates a data transmission request based on the request data.
  • the IoT device sends the data transmission request to the router.
  • the router determines that the device sending the data transmission request is an Internet of Things device.
  • the router decrypts the request data to obtain the target data.
  • the router sends the target data to the corresponding network node.
  • the router sends a data transmission request response to the Internet of Things device.
  • the router when receiving a data transmission request from a device, parses the request data in the data transmission request to determine the information in the request data. When it is determined that the requested data carries a certificate issued by the blockchain system, it is determined that the device sending the data transmission request is an IoT device, and the data needs to be sent first. Decrypt the request data to obtain the actual target data that needs to be sent. Put the target data into the priority sending queue to avoid interrupting the current data sending process, and to prevent preempting the priority of data sent by other IoT devices.
  • the priority of sending the target data is higher than that of non-IoT devices, which reduces the router's restrictions on the communication process of the IoT device and thereby reduces the possibility of the IoT device being disconnected. Since the blockchain system and certificates can encrypt the target data to prevent tampering, it can improve the security of data transmission while reducing the disconnection of IoT devices.
  • an embodiment of the present disclosure provides a device 40 for data transmission, including a processor (processor) 41 and a memory (memory) 42.
  • the device may also include a communication interface (Communication Interface) 43 and a bus 44.
  • the processor 41, the communication interface 43, and the memory 42 can communicate with each other through the bus 44.
  • the communication interface 43 can be used for information transmission.
  • the processor 41 can call logical instructions in the memory 42 to execute the method for data transmission in the above embodiment.
  • the above-mentioned logical instructions in the memory 42 can be implemented in the form of software functional units and as independent
  • the product may be stored in a computer-readable storage medium when sold or used.
  • the memory 42 can be used to store software programs, computer executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure.
  • the processor 41 executes program instructions/modules stored in the memory 42 to execute functional applications and data processing, that is, to implement the method for data transmission in the above embodiment.
  • the memory 42 may include a program storage area and a data storage area, where the program storage area may store an operating system and an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, etc.
  • the memory 42 may include high-speed random access memory, and may also include non-volatile memory.
  • An embodiment of the present disclosure provides a router, including the above device for data transmission.
  • An embodiment of the present disclosure provides an Internet of Things device, including the above device for data transmission.
  • Embodiments of the present disclosure provide a storage medium that stores computer-executable instructions, and the computer-executable instructions are configured to execute the above method for data transmission.
  • the above-mentioned storage medium may be a transient computer-readable storage medium or a non-transitory computer-readable storage medium.
  • An embodiment of the present disclosure provides a computer program that, when executed by a computer, causes the computer to implement the above method for data transmission.
  • Embodiments of the present disclosure provide a computer program product.
  • the computer program product includes computer instructions stored on a computer-readable storage medium. When the program instructions are executed by a computer, the computer implements the above-mentioned method for data transmission. Methods.
  • the technical solution of the embodiments of the present disclosure may be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes one or more instructions to enable a computer device (which may be a personal computer, a server, or a network equipment, etc.) to perform all or part of the steps of the method described in the embodiments of the present disclosure.
  • the aforementioned storage media can be non-transitory storage media, including: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.
  • the term “and/or” as used in this application refers to an or any and all possible combinations of one or more of the associated listed.
  • the term “comprise” and its variations “comprises” and/or “comprising” etc. refer to stated features, integers, steps, operations, elements, and/or The presence of a component does not exclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groupings of these.
  • an element defined by the statement “comprises a" does not exclude the presence of additional identical elements in a process, method or apparatus including the stated element.
  • each embodiment may focus on its differences from other embodiments, and the same and similar parts among various embodiments may be referred to each other.
  • the relevant parts can be referred to the description of the method part.
  • the disclosed methods and products can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units may only be a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined. Either it can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • each functional unit in the embodiment of the present disclosure may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more components for implementing the specified logical function(s).
  • Executable instructions may occur out of the order noted in the figures. For example, two consecutive blocks can actually execute essentially in parallel, it They can sometimes be executed in reverse order, depending on the functionality involved.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请涉及智能家电技术领域,公开一种用于数据传输的方法,包括:在接收到数据传输请求的情况下,对请求数据进行解析;在确定请求数据携带有区块链系统颁发的证书的情况下,确定发送数据传输请求的设备为物联网设备;对请求数据进行解密以获得目标数据;将目标数据放入优先发送队列。由于将物联网设备的目标数据放入优先发送队列,目标数据发送的优先级高于非物联网设备,降低路由器对物联网设备在通信过程中的限制从而减少物联网设备掉线的可能。由于区块链系统和证书能够对目标数据进行加密防止篡改,以在减少物联网设备掉线的情况下,提高数据传输的安全性。本申请还公开一种用于数据传输的装置、路由器和物联网设备。

Description

用于数据传输的方法及装置、路由器、物联网设备
本申请基于申请号为202210560795.6、申请日为2022年5月23日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及智能家电技术领域,例如涉及一种用于数据传输的方法及装置、路由器、物联网设备。
背景技术
目前,随着物联网技术的发展,越来越多的物联网设备走入了人们的生活。路由器作为一种常用的网络数据传输的设备,用于联网设备和云端服务器之间的通信。但是,当多个设备同时发送请求时,路由器可能会发生网络拥堵的问题,数据无法发送导致物联网设备被视为离线。
相关技术中,用于物联网设备配网的方法包括:与物联网设备建立无线链路;接收物联网设备传输的地址信息;将地址信息相对应的物联网设备加入保护名单;根据预设值保留无线通信资源;通过预设的无线通信资源传输物联网设备发送的网络请求;记录传输网络请求所实际占用的无线通信资源;根据实际占用的无线通信资源缩减预设的无线通信资源。
在实现本公开实施例的过程中,发现相关技术中至少存在如下问题:
该方法能够减少物联网设备在通信过程中被路由器限制导致掉线的情况。但是,当物联网设备的信息被篡改时,目标数据可能会被修改,导致数据传输的安全性低。
发明内容
为了对披露的实施例的一些方面有基本的理解,下面给出了简单的概括。所述概括不是泛泛评述,也不是要确定关键/重要组成元素或描绘这些实施例的保护范围,而是作为后面的详细说明的序言。
本公开实施例提供了一种用于数据传输的方法及装置、路由器、物联网设备,以在减少物联网设备掉线的情况下,提高数据传输的安全性。
在一些实施例中,所述方法包括:在接收到数据传输请求的情况下,对请求数据进行 解析;在确定请求数据携带有区块链系统颁发的证书的情况下,确定发送数据传输请求的设备为物联网设备;对请求数据进行解密以获得目标数据;将目标数据放入优先发送队列。
可选地,对请求数据进行解密以获得目标数据,包括:确定与请求数据携带的证书对应的私钥;通过私钥对请求数据进行解密剥离证书以获得目标数据。
可选地,对请求数据进行解析,包括:根据防掉线保护协议,确定证书在请求数据中的设定位置;将设定位置中的数据确定为证书信息。
可选地,确定请求数据携带有区块链系统颁发的证书,包括:确定证书信息是否存在于区块链系统;在证书信息存在于区块链系统的情况下,确定请求数据携带有区块链系统颁发的证书。
可选地,在对请求数据进行解析之前,还包括:在接收到区块链系统发送的证书申请请求的情况下,根据证书申请请求中的设备信息确定申请设备的类型;在申请设备为物联网设备的情况下,根据设备信息生成证书;将证书发送到区块链系统。
在一些实施例中,所述方法包括:在需要发送目标数据的情况下,利用区块链系统颁发的证书对目标数据进行加密以获得请求数据;根据请求数据,生成数据传输请求;将数据传输请求发送到路由器。
可选地,利用区块链系统颁发的证书对目标数据进行加密以获得请求数据,包括:根据防掉线保护协议,确定证书的设定位置;根据设定位置,将证书加入到目标数据以获得请求数据。
在一些实施例中,所述装置包括处理器和存储有程序指令的存储器,处理器被配置为在运行程序指令时,执行上述用于数据传输的方法。
在一些实施例中,所述路由器包括处理器和存储有程序指令的存储器,处理器被配置为在运行程序指令时,执行上述用于数据传输的方法。
在一些实施例中,所述物联网设备包括处理器和存储有程序指令的存储器,处理器被配置为在运行程序指令时,执行上述用于数据传输的方法。
本公开实施例提供的用于数据传输的方法及装置、路由器、物联网设备,可以实现以下技术效果:
路由器在接收到设备的数据传输请求的情况下,对数据传输请求中的请求数据进行解析,以确定请求数据中的信息。在确定请求数据携带有区块链系统颁发的证书的情况下,确定发送数据传输请求的设备为物联网设备,数据需要优先发送。对请求数据进行解密以获得实际需要发送的目标数据。将目标数据放入优先发送队列,避免中断当前数据发送的过程,和,防止抢占其他物联网设备发送数据的优先级。由于将物联网设备的目标数据放 入优先发送队列,目标数据发送的优先级高于非物联网设备,降低路由器对物联网设备在通信过程中的限制从而减少物联网设备掉线的可能。由于区块链系统和证书能够对目标数据进行加密防止篡改,以在减少物联网设备掉线的情况下,提高数据传输的安全性。
以上的总体描述和下文中的描述仅是示例性和解释性的,不用于限制本申请。
附图说明
一个或多个实施例通过与之对应的附图进行示例性说明,这些示例性说明和附图并不构成对实施例的限定,附图中具有相同参考数字标号的元件示为类似的元件,附图不构成比例限制,并且其中:
图1-1是本公开实施例提供的一个联网设备和路由器连接的结构示意图;
图1-2是本公开实施例提供的另一个联网设备和路由器连接的结构示意图;
图2是本公开实施例提供的一个用于数据传输的方法的示意图;
图3是本公开实施例提供的另一个用于数据传输的方法的示意图;
图4是本公开实施例提供的另一个用于数据传输的方法的示意图;
图5是本公开实施例提供的另一个用于数据传输的方法的示意图;
图6是本公开实施例提供的另一个用于数据传输的方法的示意图;
图7是本公开实施例提供的另一个用于数据传输的方法的示意图;
图8是本公开实施例提供的另一个用于数据传输的方法的示意图;
图9是本公开实施例提供的另一个用于数据传输的方法的示意图;
图10是本公开实施例提供的一个用于数据传输的装置的示意图。
具体实施方式
为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。在以下的技术描述中,为方便解释起见,通过多个细节以提供对所披露实施例的充分理解。然而,在没有这些细节的情况下,一个或多个实施例仍然可以实施。在其它情况下,为简化附图,熟知的结构和装置可以简化展示。
本公开实施例的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本公开实施例的实施例。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含。
除非另有说明,术语“多个”表示两个或两个以上。
本公开实施例中,字符“/”表示前后对象是一种“或”的关系。例如,A/B表示:A或B。
术语“和/或”是一种描述对象的关联关系,表示可以存在三种关系。例如,A和/或B,表示:A或B,或,A和B这三种关系。
术语“对应”可以指的是一种关联关系或绑定关系,A与B相对应指的是A与B之间是一种关联关系或绑定关系。
目前,随着物联网技术的发展,越来越多的物联网设备走入了人们的生活,如智能音箱、空调器、灯、净水器等。用户通过终端设备(如移动终端)能够对在线的物联网设备进行控制。常用的物联网设备在线/离线判定方法为:在一定时间内,云端服务器接收到物联网设备的心跳,视为物联网设备在线。在一定时间内,云端服务器未接收到物联网设备的心跳,视为物联网设备离线。物联网设备在与云端服务器进行通信的过程中,以路由器作为网关,实现数据的传输。
结合图1-1所示,常见的物联网设备和非物联网设备与路由器连接时,通过普通网络协议进行连接。当多个联网设备(包括物联网设备和非物联网设备)同时发送请求时,路由器可能会发生网络拥堵的问题,数据无法发送导致物联网设备被视为离线。即,物联网设备虽然与路由器连接,但是因路由器的限制导致离线。
结合图1-2所示,本公开实施例提供一种物联网设备和非物联网设备与路由器连接方式,非物联网设备通过普通网络协议与路由器进行连接,物联网设备通过防掉线保护协议与路由器进行连接。防掉线保护协议包括服务端(Server)和客户端(Client)。服务端设置于路由器中,客户端设置于物联网设备中。当多个联网设备同时发送请求时,路由器根据防掉线保护协议将物联网设备的目标数据放入优先发送队列,根据普通网络协议将非物联网设备的目标数据放入普通发送队列。在优先发送队列的数据发送完成后,进行普通发送队列的数据发送,从而减少物联网设备掉线的可能。由于在数据传输的过程中,可能存在目标数据被篡改的问题。通过在路由器中加入区块链系统及其分布式数据库,将验证设备类型的证书存放于分布式数据库中。路由器中的服务端与区块链系统进行连接,向区块链系统颁发物联网设备的证书。物联网设备中的客户端与区块链系统进行连接,从区块链系统获取证书。物联网设备在发送目标数据时通过证书进行加密。路由器在接收到数据传输请求时,通过解析请求数据确定设备是否为物联网设备,将物联网设备的请求数据经解密后得到的目标数据放入优先发送队列。由于区块链系统和证书能够对目标数据进行加密防止篡改,以在减少物联网设备掉线的情况下,提高数据传输的安全性。本公开实施例提供的连接方式在实现的过程中,仅需路由器和物联网设备通过更新自身的固件即可实现, 不需要硬件的改变。对于不需要优先发送数据的物联网设备,可以取消防掉线保护协议,视为非物联网设备。
结合图2所示,本公开实施例提供一种用于数据传输的方法,包括:
S220,在接收到数据传输请求的情况下,路由器对请求数据进行解析。
S230,在确定请求数据携带有区块链系统颁发的证书的情况下,路由器确定发送数据传输请求的设备为物联网设备。
S240,路由器对请求数据进行解密以获得目标数据。
S250,路由器将目标数据放入优先发送队列。
采用本公开实施例提供的用于数据传输的方法,路由器在接收到设备的数据传输请求的情况下,对数据传输请求中的请求数据进行解析,以确定请求数据中的信息。在确定请求数据携带有区块链系统颁发的证书的情况下,确定发送数据传输请求的设备为物联网设备,数据需要优先发送。对请求数据进行解密以获得实际需要发送的目标数据。将目标数据放入优先发送队列,避免中断当前数据发送的过程,和,防止抢占其他物联网设备发送数据的优先级。由于将物联网设备的目标数据放入优先发送队列,目标数据发送的优先级高于非物联网设备,降低路由器对物联网设备在通信过程中的限制从而减少物联网设备掉线的可能。由于区块链系统和证书能够对目标数据进行加密防止篡改,以在减少物联网设备掉线的情况下,提高数据传输的安全性。
结合图3所示,本公开实施例提供另一种用于数据传输的方法,包括:
S221,在接收到数据传输请求的情况下,路由器根据防掉线保护协议,确定证书在请求数据中的设定位置。
S222,路由器将设定位置中的数据确定为证书信息。
S223,路由器确定证书信息是否存在于区块链系统。
S224,在证书信息存在于区块链系统的情况下,路由器确定请求数据携带有区块链系统颁发的证书。
S230,路由器确定发送数据传输请求的设备为物联网设备。
S241,路由器确定与请求数据携带的证书对应的私钥。
S242,路由器通过私钥对请求数据进行解密剥离证书以获得目标数据。
S250,路由器将目标数据放入优先发送队列。
S251,在目标数据位于优先发送队列首位的情况下,路由器将目标数据发送到对应的网络节点。
S252,路由器向物联网设备发送数据传输请求回应。
采用本公开实施例提供的用于数据传输的方法,在接收到数据传输请求的情况下,根据防掉线保护协议,确定请求数据中的证书信息。在证书信息存在于区块链系统的情况下,确定请求数据携带有区块链系统颁发的证书,发送请求数据的设备为物联网设备。由于请求数据中包含有证书,通过与证书对应的私钥(存放于路由器中)进行解密以获得实际要发送的目标数据。在目标数据位于优先发送队列首位的情况下,将目标数据发送到对应的网络节点并向物联网设备发送数据传输请求回应,物联网设备的目标数据发送完成。由于请求数据为加密数据且在发送前需要进行解密,以在减少物联网设备掉线的情况下,提高数据传输的安全性。
结合图4所示,本公开实施例提供另一种用于数据传输的方法,包括:
S200,路由器初始化区块链服务。
S201,路由器连接到区块链系统。
S202,路由器检验区块链系统中所有证书的有效期。
S203,在确定存在证书的有效期满足预设条件的情况下,路由器将与证书对应的物联网设备的告警信息写入区块链系统。
S210,在接收到区块链系统发送的证书申请请求的情况下,路由器根据证书申请请求中的设备信息确定申请设备的类型。
S211,在申请设备为物联网设备的情况下,路由器根据设备信息生成证书。
S212,路由器将证书发送到区块链系统。
S220,在接收到数据传输请求的情况下,路由器对请求数据进行解析。
S230,在确定请求数据携带有区块链系统颁发的证书的情况下,路由器确定发送数据传输请求的设备为物联网设备。
S240,路由器对请求数据进行解密以获得目标数据。
S250,路由器将目标数据放入优先发送队列。
采用本公开实施例提供的用于数据传输的方法,在开始运行时进行初始化,通过服务端与区块链系统进行连接。在区块链系统中存在物联网设备的证书的有效期满足预设条件的情况下,证书存在过期的风险,可能会影响对应的物联网设备的数据传输。通过将告警信息写入区块链系统,对物联网设备进行提醒,减少物联网设备掉线的可能。在接收到区块链系统发送的证书申请请求的情况下,存在新的设备申请防掉线保护。在确定该设备的类型为物联网设备的情况下,根据设备信息生成证书并发送到区块链系统,以使物联网设备在发送目标数据时携带证书。由于当证书存在过期风险时进行提醒,在设备申请证书时进行验证,以提高数据传输的安全性。
对于步骤S203中的确定存在证书的有效期满足预设条件,为路由器确定在区块链系统中,存在一个或多个证书即将到期或已过期。
结合图5所示,本公开实施例提供另一种用于数据传输的方法,包括:
S220,在接收到数据传输请求的情况下,路由器对请求数据进行解析。
S230,在确定请求数据携带有区块链系统颁发的证书的情况下,路由器确定发送数据传输请求的设备为物联网设备。
S240,路由器对请求数据进行解密以获得目标数据。
S250,路由器将目标数据放入优先发送队列。
S260,在接收到证书更新请求的情况下,路由器根据证书更新请求中的设备信息生成新证书。
S261,路由器将新证书发送到区块链系统。
S270,在接收到证书作废请求的情况下,路由器根据证书作废请求中的设备信息确定对应的作废证书。
S271,路由器从区块链系统中将作废证书删除。
采用本公开实施例提供的用于数据传输的方法,在接收到证书更新请求的情况下,物联网设备的证书存在过期风险,需要新证书。根据设备信息生成新证书,并发送到区块链系统,提高了证书颁发的安全性。在接收到证书作废请求的情况下,物联网设备的数据不需优先发送。通过从区块链系统将作废证书删除,降低该物联网设备在区块链系统占用的空间和数据发送的优先级,提高数据传输的效率。
结合图6所示,本公开实施例提供另一种用于数据传输的方法,包括:
S320,在需要发送目标数据的情况下,物联网设备利用区块链系统颁发的证书对目标数据进行加密以获得请求数据。
S330,物联网设备根据请求数据,生成数据传输请求。
S340,物联网设备将数据传输请求发送到路由器。
采用本公开实施例提供的用于数据传输的方法,物联网设备在需要发送目标数据的情况下,利用区块链系统颁发的证书对目标数据进行加密以获得请求数据,并将根据请求数据生成的数据传输请求发送至路由器。由于利用区块链系统和证书对目标数据进行加密防止篡改,以在减少物联网设备掉线的情况下,提高数据传输的安全性。
结合图7所示,本公开实施例提供另一种用于数据传输的方法,包括:
S300,物联网设备初始化区块链服务。
S301,物联网设备连接到区块链系统。
S302,在处于防掉线保护的情况下,物联网设备在区块链系统进行设备信息更新。
S303,在接收到告警信息的情况下,物联网设备处理告警信息,并执行步骤S321。
S310,在需要申请证书的情况下,物联网设备将设备信息发送到区块链系统。
S311,在接收到申请证书回应的情况下,物联网设备从区块链系统获取证书。
S321,在需要发送目标数据的情况下,物联网设备根据防掉线保护协议,确定证书的设定位置。
S322,物联网设备根据设定位置,将证书加入到目标数据以获得请求数据。
S330,物联网设备根据请求数据,生成数据传输请求。
S340,物联网设备将数据传输请求发送到路由器。
采用本公开实施例提供的用于数据传输的方法,在开始运行时进行初始化,通过客户端与区块链系统进行连接。在接收到告警信息的情况下,可能存在证书过期的风险,对告警信息进行处理以确定收到提示。在需要申请证书的情况下,将设备信息发送到区块链系统,以便路由器生成对应的证书。区块链系统在确定不存在于设备信息对应的证书时,向路由器发送证书申请请求。在接收到申请证书回应的情况下,路由器已将生成的证书发送到区块链系统,从区块链系统获取证书以提高证书的安全性。在需要发送目标数据的情况下,将证书加入以实现加密。由于在证书存在过期风险时接收到告警信息,在发送目标数据时通过证书进行加密,以提高数据传输的安全性。
结合图8所示,本公开实施例提供另一种用于数据传输的方法,包括:
S320,在需要发送目标数据的情况下,物联网设备利用区块链系统颁发的证书对目标数据进行加密以获得请求数据。
S330,物联网设备根据请求数据,生成数据传输请求。
S340,物联网设备将数据传输请求发送到路由器。
S350,物联网设备检验证书的有效期。
S351,在确定证书的有效期满足预设条件的情况下,物联网设备向路由器发送证书更新请求,并删除证书。
S352,物联网设备从区块链系统获取新证书。
S360,在需要作废证书的情况下,物联网设备向路由器发送证书作废请求,并删除证书。
采用本公开实施例提供的用于数据传输的方法,在确定证书的有效期满足预设条件的情况下,证书存在过期风险,向路由器发送证书更新请求以获取新证书。在需要作废证书的情况下,物联网设备不再需要优先发送数据,向路由器发送证书作废请求以降低自身占 用的优先级从而提高数据传输的效率。
对于步骤S351中的确定证书的有效期满足预设条件,为物联网设备确定证书即将到期或已过期。
结合图9所示,本公开实施例提供另一种用于数据传输的方法,包括:
S202,路由器连接到区块链系统。
S302,物联网设备连接到区块链系统。
S310,物联网设备将设备信息发送到区块链系统。
S212,路由器将证书发送到区块链系统。
S311,物联网设备从区块链系统获取证书。
S320,物联网设备利用区块链系统颁发的证书对目标数据进行加密以获得请求数据。
S330,物联网设备根据请求数据,生成数据传输请求。
S340,物联网设备将数据传输请求发送到路由器。
S230,路由器确定发送数据传输请求的设备为物联网设备。
S240,路由器对请求数据进行解密以获得目标数据。
S251,路由器将目标数据发送到对应的网络节点。
S252,路由器向物联网设备发送数据传输请求回应。
采用本公开实施例提供的用于数据传输的方法,路由器在接收到设备的数据传输请求的情况下,对数据传输请求中的请求数据进行解析,以确定请求数据中的信息。在确定请求数据携带有区块链系统颁发的证书的情况下,确定发送数据传输请求的设备为物联网设备,数据需要优先发送。对请求数据进行解密以获得实际需要发送的目标数据。将目标数据放入优先发送队列,避免中断当前数据发送的过程,和,防止抢占其他物联网设备发送数据的优先级。由于将物联网设备的目标数据放入优先发送队列,目标数据发送的优先级高于非物联网设备,降低路由器对物联网设备通信过程的限制从而减少物联网设备掉线的可能。由于区块链系统和证书能够对目标数据进行加密防止篡改,以在减少物联网设备掉线的情况下,提高数据传输的安全性。
结合图10所示,本公开实施例提供一种用于数据传输的装置40,包括处理器(processor)41和存储器(memory)42。可选地,该装置还可以包括通信接口(Communication Interface)43和总线44。其中,处理器41、通信接口43、存储器42可以通过总线44完成相互间的通信。通信接口43可以用于信息传输。处理器41可以调用存储器42中的逻辑指令,以执行上述实施例的用于数据传输的方法。
此外,上述的存储器42中的逻辑指令可以通过软件功能单元的形式实现并作为独立 的产品销售或使用时,可以存储在一个计算机可读取存储介质中。
存储器42作为一种存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中的方法对应的程序指令/模块。处理器41通过运行存储在存储器42中的程序指令/模块,从而执行功能应用以及数据处理,即实现上述实施例中用于数据传输的方法。
存储器42可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储器42可以包括高速随机存取存储器,还可以包括非易失性存储器。
本公开实施例提供了一种路由器,包含上述的用于数据传输的装置。
本公开实施例提供了一种物联网设备,包含上述的用于数据传输的装置。
本公开实施例提供了一种存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述用于数据传输的方法。
上述的存储介质可以是暂态计算机可读存储介质,也可以是非暂态计算机可读存储介质。
本公开实施例提供了一种计算机程序,当所述计算机程序被计算机执行时,使所述计算机实现上述用于数据传输的方法。
本公开实施例提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机指令,当所述程序指令被计算机执行时,使所述计算机实现上述用于数据传输的方法。
本公开实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括一个或多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开实施例所述方法的全部或部分步骤。而前述的存储介质可以是非暂态存储介质,包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等多种可以存储程序代码的介质,也可以是暂态存储介质。
以上描述和附图充分地示出了本公开的实施例,以使本领域的技术人员能够实践它们。其他实施例可以包括结构的、逻辑的、电气的、过程的以及其他的改变。实施例仅代表可能的变化。除非明确要求,否则单独的部件和功能是可选的,并且操作的顺序可以变化。一些实施例的部分和特征可以被包括在或替换其他实施例的部分和特征。而且,本申请中使用的用词仅用于描述实施例并且不用于限制权利要求。如在实施例以及权利要求的描述中使用的,除非上下文清楚地表明,否则单数形式的“一个”(a)、“一个”(an)和“所述”(the)旨在同样包括复数形式。类似地,如在本申请中所使用的术语“和/或”是指包含一个 或一个以上相关联的列出的任何以及所有可能的组合。另外,当用于本申请中时,术语“包括”(comprise)及其变型“包括”(comprises)和/或包括(comprising)等指陈述的特征、整体、步骤、操作、元素,和/或组件的存在,但不排除一个或一个以上其它特征、整体、步骤、操作、元素、组件和/或这些的分组的存在或添加。在没有更多限制的情况下,由语句“包括一个…”限定的要素,并不排除在包括所述要素的过程、方法或者设备中还存在另外的相同要素。本文中,每个实施例重点说明的可以是与其他实施例的不同之处,各个实施例之间相同相似部分可以互相参见。对于实施例公开的方法、产品等而言,如果其与实施例公开的方法部分相对应,那么相关之处可以参见方法部分的描述。
本领域技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,可以取决于技术方案的特定应用和设计约束条件。所述技术人员可以对每个特定的应用来使用不同方法以实现所描述的功能,但是这种实现不应认为超出本公开实施例的范围。所述技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
本文所披露的实施例中,所揭露的方法、产品(包括但不限于装置、设备等),可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,可以仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例。另外,在本公开实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
附图中的流程图和框图显示了根据本公开实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它 们有时也可以按相反的顺序执行,这可以依所涉及的功能而定。在附图中的流程图和框图所对应的描述中,不同的方框所对应的操作或步骤也可以以不同于描述中所披露的顺序发生,有时不同的操作或步骤之间不存在特定的顺序。例如,两个连续的操作或步骤实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这可以依所涉及的功能而定。框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。

Claims (13)

  1. 一种用于数据传输的方法,其特征在于,包括:
    在接收到数据传输请求的情况下,对请求数据进行解析;
    在确定请求数据携带有区块链系统颁发的证书的情况下,确定发送数据传输请求的设备为物联网设备;
    对请求数据进行解密以获得目标数据;
    将目标数据放入优先发送队列。
  2. 根据权利要求1所述的方法,其特征在于,对请求数据进行解密以获得目标数据,包括:
    确定与请求数据携带的证书对应的私钥;
    通过私钥对请求数据进行解密剥离证书以获得目标数据。
  3. 根据权利要求1所述的方法,其特征在于,对请求数据进行解析,包括:
    根据防掉线保护协议,确定证书在请求数据中的设定位置;
    将设定位置中的数据确定为证书信息。
  4. 根据权利要求3所述的方法,其特征在于,确定请求数据携带有区块链系统颁发的证书,包括:
    确定证书信息是否存在于区块链系统;
    在证书信息存在于区块链系统的情况下,确定请求数据携带有区块链系统颁发的证书。
  5. 根据权利要求1至4任一项所述的方法,其特征在于,在对请求数据进行解析之前,还包括:
    在接收到区块链系统发送的证书申请请求的情况下,根据证书申请请求中的设备信息确定申请设备的类型;
    在申请设备为物联网设备的情况下,根据设备信息生成证书;
    将证书发送到区块链系统。
  6. 一种用于数据传输的方法,其特征在于,包括:
    在需要发送目标数据的情况下,利用区块链系统颁发的证书对目标数据进行加密以获得请求数据;
    根据请求数据,生成数据传输请求;
    将数据传输请求发送到路由器。
  7. 根据权利要求6所述的方法,其特征在于,利用区块链系统颁发的证书对目标 数据进行加密以获得请求数据,包括:
    根据防掉线保护协议,确定证书的设定位置;
    根据设定位置,将证书加入到目标数据以获得请求数据。
  8. 一种用于数据传输的装置,包括处理器和存储有程序指令的存储器,其特征在于,所述处理器被配置为在运行所述程序指令时,执行如权利要求1至7任一项所述的用于数据传输的方法。
  9. 一种路由器,包括处理器和存储有程序指令的存储器,其特征在于,所述处理器被配置为在运行所述程序指令时,执行如权利要求1至5任一项所述的用于数据传输的方法。
  10. 一种物联网设备,包括处理器和存储有程序指令的存储器,其特征在于,所述处理器被配置为在运行所述程序指令时,执行如权利要求1至7任一项所述的用于数据传输的方法。
  11. 一种物联网设备,包括如权利要求8所述的用于数据传输的装置,和/或如权利要求9所述的路由器。
  12. 一种计算机程序,当所述计算机程序被计算机执行时,使所述计算机实现如权利要求1至7任一项所述的用于数据传输的方法。
  13. 一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机指令,当所述程序指令被计算机执行时,使所述计算机实现如权利要求1至7任一项所述的用于数据传输的方法。
PCT/CN2023/075334 2022-05-23 2023-02-10 用于数据传输的方法及装置、路由器、物联网设备 WO2023226478A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210560795.6 2022-05-23
CN202210560795.6A CN114978688A (zh) 2022-05-23 2022-05-23 用于数据传输的方法及装置、路由器、物联网设备

Publications (1)

Publication Number Publication Date
WO2023226478A1 true WO2023226478A1 (zh) 2023-11-30

Family

ID=82984905

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/075334 WO2023226478A1 (zh) 2022-05-23 2023-02-10 用于数据传输的方法及装置、路由器、物联网设备

Country Status (2)

Country Link
CN (1) CN114978688A (zh)
WO (1) WO2023226478A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978688A (zh) * 2022-05-23 2022-08-30 青岛海尔空调器有限总公司 用于数据传输的方法及装置、路由器、物联网设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100049969A1 (en) * 2006-12-21 2010-02-25 Tae-Shik Shon System and method for providing security in mobile WiMAX network system
US20190373472A1 (en) * 2018-03-14 2019-12-05 Clyde Clinton Smith Method and System for IoT Code and Configuration using Smart Contracts
CN112291279A (zh) * 2020-12-31 2021-01-29 南京敏宇数行信息技术有限公司 路由器内网访问方法、系统、设备以及可读存储介质
CN113364771A (zh) * 2021-06-04 2021-09-07 永旗(北京)科技有限公司 一种基于区块链的物联网数据共享方法
CN114039753A (zh) * 2021-10-27 2022-02-11 中国联合网络通信集团有限公司 一种访问控制方法、装置、存储介质及电子设备
CN114070586A (zh) * 2021-10-19 2022-02-18 中诚区块链研究院(南京)有限公司 一种区块链与物联网协同工作方法
CN114978688A (zh) * 2022-05-23 2022-08-30 青岛海尔空调器有限总公司 用于数据传输的方法及装置、路由器、物联网设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100049969A1 (en) * 2006-12-21 2010-02-25 Tae-Shik Shon System and method for providing security in mobile WiMAX network system
US20190373472A1 (en) * 2018-03-14 2019-12-05 Clyde Clinton Smith Method and System for IoT Code and Configuration using Smart Contracts
CN112291279A (zh) * 2020-12-31 2021-01-29 南京敏宇数行信息技术有限公司 路由器内网访问方法、系统、设备以及可读存储介质
CN113364771A (zh) * 2021-06-04 2021-09-07 永旗(北京)科技有限公司 一种基于区块链的物联网数据共享方法
CN114070586A (zh) * 2021-10-19 2022-02-18 中诚区块链研究院(南京)有限公司 一种区块链与物联网协同工作方法
CN114039753A (zh) * 2021-10-27 2022-02-11 中国联合网络通信集团有限公司 一种访问控制方法、装置、存储介质及电子设备
CN114978688A (zh) * 2022-05-23 2022-08-30 青岛海尔空调器有限总公司 用于数据传输的方法及装置、路由器、物联网设备

Also Published As

Publication number Publication date
CN114978688A (zh) 2022-08-30

Similar Documents

Publication Publication Date Title
CN112217876A (zh) 物联网系统、物联网通信方法及电子设备
CN111355684B (zh) 一种物联网数据传输方法、装置、系统、电子设备及介质
CN110599342B (zh) 基于区块链的身份信息的授权方法及装置
WO2017097101A1 (zh) 用于账号登录的方法和装置
CN112187907A (zh) 边缘计算的数据处理方法、物联网通信方法及电子设备
US8958435B2 (en) Information management method and information processing device
CN113901505B (zh) 数据共享方法、装置、电子设备及存储介质
RU2454708C2 (ru) Способ реализации механизма отслеживания состояния в сеансе связи между сервером и клиентской системой
WO2023226478A1 (zh) 用于数据传输的方法及装置、路由器、物联网设备
CN109729000B (zh) 一种即时通信方法及装置
CN113992427B (zh) 基于相邻节点的数据加密发送方法及装置
US9049012B2 (en) Secured cryptographic communication system
CN111953716B (zh) 消息通讯方法、系统、计算机设备及存储介质
CN113726743B (zh) 一种网络重放攻击的检测方法、装置、设备和介质
CN110784318B (zh) 群密钥更新方法、装置、电子设备、存储介质及通信系统
CN109714337B (zh) 一种数据加密传输方法及设备
CN113938883B (zh) 基于中间节点的数据加密发送方法及装置
CN116248746A (zh) 基于mqtt的数据处理方法、装置和计算机可读的存储介质
CN110995730B (zh) 数据传输方法、装置、代理服务器和代理服务器集群
CN114095496A (zh) 终端应用处理方法、边缘云应用服务器以及系统、介质
CN113132320A (zh) 一种加密传输方法、装置及电子设备
CN116561820B (zh) 可信数据处理方法及相关装置
CN111698299B (zh) Session对象复制方法、装置、分布式微服务架构及介质
CN114866537B (zh) 一种跨主机跨网络的文件传输方法及系统
CN112822152B (zh) 定向信息展示处理方法及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23810554

Country of ref document: EP

Kind code of ref document: A1