WO2024113183A1 - Internet of things system and internet of things data processing method - Google Patents

Internet of things system and internet of things data processing method Download PDF

Info

Publication number
WO2024113183A1
WO2024113183A1 PCT/CN2022/135158 CN2022135158W WO2024113183A1 WO 2024113183 A1 WO2024113183 A1 WO 2024113183A1 CN 2022135158 W CN2022135158 W CN 2022135158W WO 2024113183 A1 WO2024113183 A1 WO 2024113183A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
iot
internet
data packet
user
Prior art date
Application number
PCT/CN2022/135158
Other languages
French (fr)
Chinese (zh)
Inventor
梁宝荣
黄镇涛
Original Assignee
上下左右有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上下左右有限公司 filed Critical 上下左右有限公司
Priority to PCT/CN2022/135158 priority Critical patent/WO2024113183A1/en
Publication of WO2024113183A1 publication Critical patent/WO2024113183A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present application relates to the field of Internet of Things, and in particular to an Internet of Things system and an Internet of Things data processing method.
  • the Internet of Things refers to: through various devices and technologies such as information sensors, radio frequency identification technology, global positioning system, infrared sensors, laser scanners, etc., any object or process that needs to be monitored, connected, and interacted with can be collected in real time, and its sound, light, heat, electricity, mechanics, chemistry, biology, location and other required information can be collected.
  • IOT Internet of Things
  • the present application aims to solve at least one of the technical problems existing in the prior art. To this end, the present application proposes an Internet of Things system and an Internet of Things data processing method, which can effectively prevent data from being tampered with.
  • IoT systems including:
  • the user terminal is configured to obtain a private key from the IoT server according to the user's account, and generate a data packet based on the user's uploaded information using the private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information; the user terminal is also configured to send the data packet to the blockchain platform;
  • the Internet of Things server is used to distribute asymmetric encryption keys.
  • the Internet of Things system has at least the following technical effects: the data packet contains a signature generated based on the uploaded information, which can quickly verify the authenticity of the information, quickly identify tampered information, and prevent the Internet of Things system from being attacked; in addition, the data packet is stored in the blockchain platform, which further increases the difficulty of tampering with the information, further improving the security of the Internet of Things system of the present application.
  • the user terminal is further configured as follows:
  • the data packet is obtained from the blockchain platform, and a public key can be obtained from the IoT server according to a user account to verify a signature in the data packet.
  • the user terminal is further configured as follows:
  • the uploaded information in the data packet is encrypted using a private key.
  • the user terminal is further configured as follows:
  • the uploaded information in the data packet is decrypted using the public key.
  • Several information collection devices are configured to collect IoT data and obtain private keys and public keys from the IoT server, encrypt and package the IoT data using the private key to form IoT data packets, and send the IoT data packets to the blockchain platform and broadcast them in the IoT;
  • the Internet of Things data includes first data and second data
  • the first data is data actively generated by the information collection device itself
  • the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
  • the information collection device is further configured as:
  • the received IoT data packet is decrypted using the public key and compared with the first data actively generated by itself, the identical data is eliminated, and the modified first data and the second data are repackaged using the private key to form an IoT data packet, and the IoT data packet is sent to the blockchain platform and broadcast in the IoT.
  • the user terminal is further configured as follows:
  • the second aspect of the present application also provides an Internet of Things data processing method:
  • the user end receives the uploaded information from the user and obtains the private key from the IoT server according to the user's account;
  • the data packet is sent to the blockchain platform.
  • the user end obtains the public key from the IoT server according to the user's account, and uses the public key to verify the signature in the data packet.
  • the following steps are also included:
  • the step of obtaining a public key from the IoT server according to the user's account and verifying the signature in the data packet using the public key at the user end further includes the following steps:
  • the public key is used to decrypt the uploaded information of the user.
  • Information collection equipment collects IoT data
  • the information collection device obtains a private key from the Internet of Things server
  • the information collection device encrypts and packages the IoT data using a private key to form an IoT data packet, and sends the IoT data packet to the blockchain platform and broadcasts it in the IoT.
  • the IoT data packet includes first data and second data
  • the first data is data actively generated by the information collection device itself
  • the second data is data received by the information collection device in the IoT and actively generated by other information collection devices in the IoT and broadcast in the IoT
  • the method further includes the following steps:
  • the information collection device obtains the public key from the Internet of Things
  • the information collection device receives the IoT data packets broadcast in the IoT or obtains the IoT data packets from the blockchain platform;
  • the information collection device decrypts the IoT data packet using the public key
  • the information collection device compares the data in the decrypted IoT data packet with the first data actively generated by itself, and removes the identical data;
  • the information collection device uses the private key to re-encrypt the modified first data and the second data and package them into Internet of Things data, broadcast them in the Internet of Things, and send them to the blockchain platform.
  • the method for processing IoT data also includes the following steps: the user terminal obtains an IoT data packet from the blockchain platform;
  • the user end uses the private key to decrypt the IoT data packet.
  • a non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are used to enable the computer to execute the method provided by any embodiment of the present application.
  • FIG1 is a schematic diagram of data flow of an Internet of Things system according to an embodiment of the present application.
  • FIG2 is a schematic diagram of a data encryption process of an Internet of Things system according to an embodiment of the present application.
  • FIG3 is a schematic diagram of information sharing of an Internet of Things system according to an embodiment of the present application.
  • the Internet of Things system includes:
  • the user terminal is configured to obtain a private key from the IoT server according to the user's account, and generate a data packet based on the user's uploaded information using the private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information; the user terminal is also configured to send the data packet to the blockchain platform;
  • the Internet of Things server is used to distribute asymmetric encryption keys.
  • FIG1 shows the data transmission process of the Internet of Things system according to an embodiment of the present application.
  • the Internet of Things system includes a user terminal, an Internet of Things server, a blockchain, and information collection devices (deviceA, deviceB).
  • the user can log in to the account at the user terminal.
  • the user terminal obtains data access rights and obtains the public key and private key for asymmetric decryption from the Internet of Things server according to the account authority.
  • FIG2 according to the account authority of different users, different numbers of public keys and private keys can be obtained. For example, in FIG2 , user 1 (user1) obtains private keys 1-8 and public keys 11-18, and user 2 (user2) obtains private keys 11-15 and public keys 1-19.
  • the IoT server is used to distribute asymmetric encryption keys, including different private keys and different public keys for each user account, so that each user account has different information access permissions, and also includes distributing different private keys and different public keys to other devices in the IoT system, so that each device has different information access permissions.
  • the user can upload data at the user end to form uploaded information, and then the user end performs a hash operation (hash) on the uploaded information to obtain a summary of the uploaded information, and then uses the private key to asymmetrically encrypt the summary to form a signature, and then package the signature and the uploaded information to form a data packet and send it to the blockchain.
  • a hash operation hashash
  • the user's uploaded information is doubly protected by the signature and the blockchain to ensure that the uploaded information is difficult to be tampered with.
  • the blockchain platform includes the underlying blockchain, which in turn includes multiple blockchain nodes.
  • the underlying blockchain 22 can be any blockchain known in the art or developed in the future, including a public chain, a consortium chain, or a private chain, etc., which will not be described in detail in this disclosure.
  • the user terminal is also configured to: obtain the data packet from the blockchain platform, and obtain the public key from the Internet of Things server based on the user account to verify the signature in the data packet.
  • the user end can obtain the public key from the IoT server to verify the authenticity of the uploaded information shared by other users.
  • the user terminal is further configured as follows:
  • the uploaded information in the data packet is decrypted using the public key.
  • the upload information in the data packet is encrypted using a private key, so that only designated users have the authority to view the information. Exemplarily, the role and effect of this embodiment are explained in detail in the form of a specific embodiment below.
  • the upload information in the data packet is encrypted using a private key, so that the user can share his upload information with other designated users to prevent leakage.
  • the upload information in the solid-line box in the figure is obtained by the user's active upload, and the information in the dotted-line box is obtained by sharing with other users.
  • user 1 only uploaded upload information 1-3 (data1, data2, data3), and obtained upload information 4-5 (data4, data5) through sharing.
  • user 3 did not upload any upload information, but obtained upload information 1-5 (data1, data2, data3, data4, data5) through sharing.
  • the role of the signature is to quickly verify whether the user has the reading permission for the uploaded information in the data packet. If the signature verification passes, it can be directly decrypted. If the signature verification fails, a verification error result is returned.
  • information collection devices which are configured to collect IoT data and obtain a private key and a public key from the IoT server, and encrypt and package the IoT data using the private key to form an IoT data packet, and send the IoT data packet to the blockchain platform and broadcast it in the IoT;
  • the Internet of Things data includes first data and second data
  • the first data is data actively generated by the information collection device itself
  • the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
  • the first data is data actively generated by the information collection device itself. For example, signals or information such as light, heat, electricity, etc. detected from the target object or target environment.
  • the second data is data that is not actively generated by the information collection device itself, but is actively generated by any other information collection device in the Internet of Things and is received by the data collection device through broadcast. For example, taking three information collection devices (device A, device B, device C) in the Internet of Things as an example, the information collection device device A actively collects data to generate data A, the information collection device device B actively collects data to generate data B, and the information collection device device C actively collects data to generate data C.
  • the information collection device device A can receive Internet of Things data packets from the blockchain platform or the broadcast between information collection devices, in which data A is the first data relative to the information collection device device A, and data B and data C are the second data relative to the information collection device device A. It can be understood that for the Internet of Things data packets broadcast from the blockchain platform or between information collection devices, the public key can be used to decrypt them to obtain the second data.
  • blockchain is used to store and transmit data, which can prevent data tampering. Secondly, since data may be lost during the upload process, in order to avoid this situation, the data in the Internet of Things is transmitted between data collection devices, which can maximize the redundancy of the data to avoid data loss.
  • the information collection device is further configured as follows:
  • the received IoT data packet is decrypted using the public key and compared with the first data actively generated by itself, the identical data is eliminated, and the modified first data and the second data are repackaged using the private key to form an IoT data packet, and the IoT data packet is sent to the blockchain platform and broadcast in the IoT.
  • the same data in the received IoT data packets is eliminated, which can effectively reduce the volume of data and speed up decryption efficiency.
  • the user terminal is further configured as follows:
  • the user can view the IoT data at the user end, and at the same time, there is no direct connection between the user end and the information collection device, which can prevent hackers from intruding into the IoT system of the present application from the user end.
  • This application also proposes a method for processing IoT data:
  • the S100 client receives the uploaded information from the user and obtains the private key and the public key from the IoT server according to the user's account;
  • S110 generates a data packet based on the user's uploaded information using a private key, the data packet including the uploaded information and a signature generated based on the uploaded information, and the user's uploaded information encrypted by the private key;
  • S200 information collection equipment collects IoT data
  • the information collection device obtains a private key and a public key from the Internet of Things server;
  • the information collection device encrypts and packages the IoT data using a private key to form an IoT data packet, and sends the IoT data packet to the blockchain platform and broadcasts it in the IoT;
  • the information collection device receives the IoT data packet broadcasted in the IoT or obtains the IoT data packet from the blockchain platform;
  • the information collection device decrypts the IoT data packet using the public key
  • the information collection device compares the data in the decrypted IoT data packet with the first data actively generated by itself, and removes the identical data;
  • the S225 information collection device uses the private key to re-encrypt the modified first data and the second data and package them into IoT data, broadcast them in the IoT, and send them to the blockchain platform.
  • the information collection device uses the private key to re-encrypt the modified first data and the second data and package them into IoT data, broadcast them in the IoT, and send them to the blockchain platform.
  • the Internet of Things data packet includes first data and second data, wherein the first data is data actively generated by the information collection device itself, and the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
  • S300 obtains the public key from the IoT server based on the user account authority of the user terminal;
  • the S320 client uses the public key to decrypt Internet data packets.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed in the present application are an Internet of Things system and an Internet of Things data processing method. The Internet of Things system comprises: a user side, which is configured to acquire a private key from an Internet of Things server according to an account of a user, and generate a data packet by using the private key and on the basis of upload information of the user, wherein the data packet comprises the upload information and a signature which is generated according to the upload information; the user side is further configured to send the data packet to a blockchain platform; and the Internet of Things server is used for allocating a key for asymmetric encryption. By using the Internet of Things system of the present application, data tampering can be effectively prevented.

Description

物联网系统及物联网数据处理方法Internet of things system and Internet of things data processing method 技术领域Technical Field
本申请涉及物联网领域,特别涉及一种物联网系统及物联网数据处理方法。The present application relates to the field of Internet of Things, and in particular to an Internet of Things system and an Internet of Things data processing method.
背景技术Background technique
物联网(The Internet ofThings,简称IOT)是指:通过各种信息传感器、射频识别技术、全球定位系统、红外感应器、激光扫描器等各种装置与技术,实时采集任何需要监控、连接、互动的物体或过程,采集其声、光、热、电、力学、化学、生物、位置等各种需要的信息,通过各类可能的网络接入,实现物与物、物与人的泛在连接,实现对物品和过程的智能化感知、识别和管理。The Internet of Things (IOT) refers to: through various devices and technologies such as information sensors, radio frequency identification technology, global positioning system, infrared sensors, laser scanners, etc., any object or process that needs to be monitored, connected, and interacted with can be collected in real time, and its sound, light, heat, electricity, mechanics, chemistry, biology, location and other required information can be collected. Through various possible network access, ubiquitous connection between things and things, things and people can be achieved, and intelligent perception, identification and management of objects and processes can be realized.
行业区块链(Consortium Block Chains)是指:由某个群体内部指定多个预选的节点为记账人,每个块的生成由所有的预选节点共同决定(预选节点参与共识过程),其他接入节点可以参与交易,但不过问记账过程(本质上还是托管记账,只是变成分布式记账,预选节点的多少,如何决定每个块的记账者成为该区块链的主要风险点),其他任何人可以通过该区块链开放的API进行限定查询。Consortium Block Chains means: multiple pre-selected nodes are designated as bookkeepers within a certain group, and the generation of each block is jointly decided by all pre-selected nodes (pre-selected nodes participate in the consensus process). Other access nodes can participate in transactions but do not inquire about the bookkeeping process (it is essentially still custodial bookkeeping, but it has become distributed bookkeeping. The number of pre-selected nodes and how to decide the bookkeeper of each block become the main risk points of the blockchain). Anyone else can perform limited queries through the open API of the blockchain.
由于物联网多种接入可能性,物理网中的数据容易遭到入侵的黑客篡改,导致物联网系统发生错误。Due to the multiple access possibilities of IoT, data in the physical network can be easily tampered by hackers, causing errors in the IoT system.
发明内容Summary of the invention
本申请旨在至少解决现有技术中存在的技术问题之一。为此,本申请提出一种物联网系统及物联网数据处理方法,可有效防止数据被篡改。The present application aims to solve at least one of the technical problems existing in the prior art. To this end, the present application proposes an Internet of Things system and an Internet of Things data processing method, which can effectively prevent data from being tampered with.
物联网系统,包括:IoT systems, including:
用户端,其被配置为可根据用户的账户从物联网服务器获取私钥,并基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名;所述用户端还被配置为将所述数据包发送给区块 链平台;The user terminal is configured to obtain a private key from the IoT server according to the user's account, and generate a data packet based on the user's uploaded information using the private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information; the user terminal is also configured to send the data packet to the blockchain platform;
其中,所述物联网服务器用于分配非对称加密的密钥。Wherein, the Internet of Things server is used to distribute asymmetric encryption keys.
根据本申请第一方面实施例的物联网系统,至少具有如下技术效果:数据包中包含基于上传信息生产的签名,可快速验证信息的真实性,快速识别被篡改的信息,防止物联网系统被攻击;此外数据包储存于区块链平台中,则进一步增加了篡改信息的难度,进一步提升本申请物联网系统的安全性。The Internet of Things system according to the embodiment of the first aspect of the present application has at least the following technical effects: the data packet contains a signature generated based on the uploaded information, which can quickly verify the authenticity of the information, quickly identify tampered information, and prevent the Internet of Things system from being attacked; in addition, the data packet is stored in the blockchain platform, which further increases the difficulty of tampering with the information, further improving the security of the Internet of Things system of the present application.
根据本申请第一方面实施例的物联网系统,所述用户端还被配置为:According to the Internet of Things system of the first aspect of the present application, the user terminal is further configured as follows:
从区块链平台获取所述数据包,并且可根据用户账户从所述物联网服务器获取公钥,以对所述数据包中的签名进行验证。The data packet is obtained from the blockchain platform, and a public key can be obtained from the IoT server according to a user account to verify a signature in the data packet.
根据本申请第一方面实施例的物联网系统,所述用户端还被配置为:According to the Internet of Things system of the first aspect of the present application, the user terminal is further configured as follows:
利用私钥对所述数据包中的上传信息进行加密。The uploaded information in the data packet is encrypted using a private key.
根据本申请第一方面实施例的物联网系统,所述用户端还被配置为:According to the Internet of Things system of the first aspect of the present application, the user terminal is further configured as follows:
利用公钥对所述数据包中的上传信息进行解密。The uploaded information in the data packet is decrypted using the public key.
根据本申请第一方面实施例的物联网系统,还包括:The Internet of Things system according to the first embodiment of the present application further includes:
若干信息采集设备,其被配置为用于采集物联网数据以及从所述物联网服务器获取私钥以及公钥,并基于所述物联网数据利用私钥加密并打包,形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播;Several information collection devices are configured to collect IoT data and obtain private keys and public keys from the IoT server, encrypt and package the IoT data using the private key to form IoT data packets, and send the IoT data packets to the blockchain platform and broadcast them in the IoT;
其中,所述物联网数据包括第一数据和第二数据,所述第一数据是由所述信息采集设备自身主动生成的数据,所述第二数据是所述信息采集设备在所述物联网中接收到的且由所述物联网中的其他信息采集设备主动生成并在所述物联网中广播的数据。Among them, the Internet of Things data includes first data and second data, the first data is data actively generated by the information collection device itself, and the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
根据本申请第一方面实施例的物联网系统,所述信息采集设备还被配置为:According to the Internet of Things system of the first aspect of the present application, the information collection device is further configured as:
利用公钥对接收的物联网数据包进行解密,并与自身主动生成的第一数据对比,剔除相同的数据,并利用私钥对修改后的第一数据以及第二数据重新打包形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物 联网中广播。The received IoT data packet is decrypted using the public key and compared with the first data actively generated by itself, the identical data is eliminated, and the modified first data and the second data are repackaged using the private key to form an IoT data packet, and the IoT data packet is sent to the blockchain platform and broadcast in the IoT.
根据本申请第一方面实施例的物联网系统,所述用户端还被配置为:According to the Internet of Things system of the first aspect of the present application, the user terminal is further configured as follows:
从区块链平台获取物联网数据包,并利用公钥对所述物联网数据包进行解密。Obtain an IoT data packet from the blockchain platform and decrypt the IoT data packet using a public key.
本申请第二方面实施例还提供一种物联网数据处理方法:The second aspect of the present application also provides an Internet of Things data processing method:
用户端接受用户上传的上传信息,根据用户的账户从物联网服务器处获取私钥;以及The user end receives the uploaded information from the user and obtains the private key from the IoT server according to the user's account; and
基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名;Generate a data packet using a private key based on the user's uploaded information, the data packet including the uploaded information and a signature generated according to the uploaded information;
将所述数据包发送给区块链平台。The data packet is sent to the blockchain platform.
根据本申请第二方面实施例的物联网数据处理方法,还包括如下步骤:The method for processing Internet of Things data according to the second embodiment of the present application further includes the following steps:
用户端根据用户的账户从物联网服务器获取公钥,并利用公钥对所述数据包中的签名进行验证。The user end obtains the public key from the IoT server according to the user's account, and uses the public key to verify the signature in the data packet.
根据本申请第二方面实施例的物联网数据处理方法,还包括如下步骤:The method for processing Internet of Things data according to the second embodiment of the present application further includes the following steps:
在所述基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名步骤中,还包括以下步骤:In the step of generating a data packet based on the user's uploaded information using a private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information, the following steps are also included:
利用私钥对所述用户的上传信息进行加密;Encrypting the user's uploaded information using a private key;
在所述用户端根据用户的账户从物联网服务器获取公钥,并利用公钥对所述数据包中的签名进行验证步骤中,还包括以下步骤:The step of obtaining a public key from the IoT server according to the user's account and verifying the signature in the data packet using the public key at the user end further includes the following steps:
利用公钥对所述用户的上传信息进行解密。The public key is used to decrypt the uploaded information of the user.
根据本申请第二方面实施例的物联网数据处理方法,还包括如下步骤:The method for processing Internet of Things data according to the second embodiment of the present application further includes the following steps:
信息采集设备采集物联网数据;Information collection equipment collects IoT data;
信息采集设备从所述物联网服务器获取私钥;The information collection device obtains a private key from the Internet of Things server;
信息采集设备基于所述物联网数据利用私钥加密并打包,形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播。The information collection device encrypts and packages the IoT data using a private key to form an IoT data packet, and sends the IoT data packet to the blockchain platform and broadcasts it in the IoT.
根据本申请第二方面实施例的物联网数据处理方法,所述物联网数据包包括第一数据以及第二数据,所述第一数据是由所述信息采集设备自身主动生成 的数据,所述第二数据是所述信息采集设备在所述物联网中接收到的且由所述物联网中的其他信息采集设备主动生成并在所述物联网中广播的数据,并且所述方法还包括以下步骤:According to the IoT data processing method of the second aspect of the present application, the IoT data packet includes first data and second data, the first data is data actively generated by the information collection device itself, the second data is data received by the information collection device in the IoT and actively generated by other information collection devices in the IoT and broadcast in the IoT, and the method further includes the following steps:
信息采集设备从物联网获取公钥;The information collection device obtains the public key from the Internet of Things;
信息采集设备接受物联网中广播的物联网数据包或从区块链平台中获取述物联网数据包;The information collection device receives the IoT data packets broadcast in the IoT or obtains the IoT data packets from the blockchain platform;
信息采集设备利用公钥对所述物联网数据包解密;The information collection device decrypts the IoT data packet using the public key;
信息采集设备将解密后的物联网数据包中的数据与自身主动生成的第一数据对比,并剔除相同的数据;The information collection device compares the data in the decrypted IoT data packet with the first data actively generated by itself, and removes the identical data;
信息采集设备利用私钥对修改后第一数据以及第二数据重新加密并打包形成物联网数据并在物联网中广播以及发送至区块链平台。The information collection device uses the private key to re-encrypt the modified first data and the second data and package them into Internet of Things data, broadcast them in the Internet of Things, and send them to the blockchain platform.
根据本申请第二方面实施例的物联网数据处理方法,还包括如下步骤:用户端从区块链平台获取物联网数据包;The method for processing IoT data according to the second aspect of the present application also includes the following steps: the user terminal obtains an IoT data packet from the blockchain platform;
用户端利用私钥对所述物联网数据包进行解密。The user end uses the private key to decrypt the IoT data packet.
根据本申请第三方面方面实施例,提供了一种存储有计算机指令的非瞬时计算机可读存储介质,其特征在于,所述计算机指令用于使所述计算机执行本申请任意实施例提供的方法。According to an embodiment of the third aspect of the present application, a non-transitory computer-readable storage medium storing computer instructions is provided, wherein the computer instructions are used to enable the computer to execute the method provided by any embodiment of the present application.
本申请的附加方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。Additional aspects and advantages of the present application will be given in part in the description below, and in part will become apparent from the description below, or will be learned through the practice of the present application.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
附图用于更好地理解本方案,不构成对本申请的限定。其中:The accompanying drawings are used to better understand the present solution and do not constitute a limitation of the present application.
图1为本申请实施例的物联网系统的数据流转示意图;FIG1 is a schematic diagram of data flow of an Internet of Things system according to an embodiment of the present application;
图2为本申请实施例的物联网系统的数据加密流程示意图;FIG2 is a schematic diagram of a data encryption process of an Internet of Things system according to an embodiment of the present application;
图3为本申请实施例的物联网系统的信息共享示意图。FIG3 is a schematic diagram of information sharing of an Internet of Things system according to an embodiment of the present application.
具体实施方式Detailed ways
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本申请,而不能理解为对本申请的限制。The embodiments of the present application are described in detail below, and examples of the embodiments are shown in the accompanying drawings, wherein the same or similar reference numerals throughout represent the same or similar elements or elements having the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary and are only used to explain the present application, and cannot be understood as limiting the present application.
此外,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。In addition, features defined as "first" or "second" may include one or more of the features explicitly or implicitly. In the description of the present application, unless otherwise specified, "plurality" means two or more.
以下结合附图详细说明本申请实施例的物联网系统,物联网系统,包括:The following describes in detail the Internet of Things system of the embodiment of the present application in conjunction with the accompanying drawings. The Internet of Things system includes:
用户端,其被配置为可根据用户的账户从物联网服务器获取私钥,并基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名;所述用户端还被配置为将所述数据包发送给区块链平台;The user terminal is configured to obtain a private key from the IoT server according to the user's account, and generate a data packet based on the user's uploaded information using the private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information; the user terminal is also configured to send the data packet to the blockchain platform;
其中,所述物联网服务器用于分配非对称加密的密钥。Wherein, the Internet of Things server is used to distribute asymmetric encryption keys.
作为其中的一种示例性的实施方式,图1示出了根据本申请实施例的物联网系统的数据传输过程。如图1所示,该物联网系统包括用户端、物联网服务器、区块链以及信息采集设备(deviceA、deviceB)。用户可在用户端处登录账户,当用户登录成功后,用户端获取数据访问权限,并且根据账户权限从物联网服务器处获取用于非对称解密的公钥和私钥。如图2所示,根据不同用户的账户权限,可获得数量不等的公钥及私钥,示例性地在图2中,用户1(user1)获得了私钥1-8以及公钥11-18,用户2(user2)获得了私钥11-15以及公钥1-19。As an exemplary implementation, FIG1 shows the data transmission process of the Internet of Things system according to an embodiment of the present application. As shown in FIG1 , the Internet of Things system includes a user terminal, an Internet of Things server, a blockchain, and information collection devices (deviceA, deviceB). The user can log in to the account at the user terminal. When the user logs in successfully, the user terminal obtains data access rights and obtains the public key and private key for asymmetric decryption from the Internet of Things server according to the account authority. As shown in FIG2 , according to the account authority of different users, different numbers of public keys and private keys can be obtained. For example, in FIG2 , user 1 (user1) obtains private keys 1-8 and public keys 11-18, and user 2 (user2) obtains private keys 11-15 and public keys 1-19.
在本实施例中,所述物联网服务器用于分配非对称加密的密钥,其中包括用于向各个用户账户分配不同的私钥以及不同的公钥,以使各个用户账户具有不同的信息查阅权限,还包括向物联网系统中的其他设备分配不同的私钥以及不同的公钥,以使各个设备具有不同的信息查阅权限。用户可在用户端处上传数据形成上传信息,随后用户端对上传信息进行哈希运算(hash)得到上传信 息的摘要,然后使用私钥对摘要进行非对称加密形成签名,随后将签名与所述上传信息打包形成数据包并发送至区块链。在上传信息的流转过程中用户的上传信息经过签名以及区块链的双重保护,以确保上传信息难以被篡改。In this embodiment, the IoT server is used to distribute asymmetric encryption keys, including different private keys and different public keys for each user account, so that each user account has different information access permissions, and also includes distributing different private keys and different public keys to other devices in the IoT system, so that each device has different information access permissions. The user can upload data at the user end to form uploaded information, and then the user end performs a hash operation (hash) on the uploaded information to obtain a summary of the uploaded information, and then uses the private key to asymmetrically encrypt the summary to form a signature, and then package the signature and the uploaded information to form a data packet and send it to the blockchain. In the process of uploading information circulation, the user's uploaded information is doubly protected by the signature and the blockchain to ensure that the uploaded information is difficult to be tampered with.
区块链平台包括底层区块链,底层区块链又包括多个区块链节点。The blockchain platform includes the underlying blockchain, which in turn includes multiple blockchain nodes.
这里,底层区块链22可以是本领域已知或将来开发的任何区块链,包括公有链、联盟链或私有链等,在本公开中不再详细描述。Here, the underlying blockchain 22 can be any blockchain known in the art or developed in the future, including a public chain, a consortium chain, or a private chain, etc., which will not be described in detail in this disclosure.
根据本申请实施例,所述用户端还被配置为:从区块链平台获取所述数据包,并且可根据用户账户从所述物联网服务器获取公钥,以对所述数据包中的签名进行验证。According to an embodiment of the present application, the user terminal is also configured to: obtain the data packet from the blockchain platform, and obtain the public key from the Internet of Things server based on the user account to verify the signature in the data packet.
具体的,根据用户账户权限,用户端可从物联网服务器获取公钥,以验证其由他用户共享的上传信息的真伪。Specifically, according to the user account permissions, the user end can obtain the public key from the IoT server to verify the authenticity of the uploaded information shared by other users.
根据本申请实施例,所述用户端还被配置为:According to an embodiment of the present application, the user terminal is further configured as follows:
利用私钥对所述数据包中的上传信息进行加密;Encrypting the uploaded information in the data packet using a private key;
利用公钥对所述数据包中的上传信息进行解密。The uploaded information in the data packet is decrypted using the public key.
具体的,使用私钥对数据包中的上传信息进行加密,可使得指定的用户才有信息查阅权限。示例性地,以下以一个具体实施例的形式详细解释本实施例所作用及效果,利用私钥对所述数据包中的上传信息进行加密,可使用户可向其他的指定用户共享其上传信息,以防止泄密。参照图3,图中实线框中的上传信息由用户主动上传所得,虚线框中的信息由其他用户共享所得,例如用户1只上传了上传信息1-3(data1、data2、data3),并由通过共享得到了上传信息4-5(data4、data5),再如用户3并没有上传任何上传信息,通过共享得到上传信息1-5(data1、data2、data3、data4、data5)。Specifically, the upload information in the data packet is encrypted using a private key, so that only designated users have the authority to view the information. Exemplarily, the role and effect of this embodiment are explained in detail in the form of a specific embodiment below. The upload information in the data packet is encrypted using a private key, so that the user can share his upload information with other designated users to prevent leakage. Referring to Figure 3, the upload information in the solid-line box in the figure is obtained by the user's active upload, and the information in the dotted-line box is obtained by sharing with other users. For example, user 1 only uploaded upload information 1-3 (data1, data2, data3), and obtained upload information 4-5 (data4, data5) through sharing. For another example, user 3 did not upload any upload information, but obtained upload information 1-5 (data1, data2, data3, data4, data5) through sharing.
此外,在本实施例中签名的作用还在于可快速用户验证数据包中上传信息是否具有阅读权限,若签名验证通过则直接解密即可,若签名验证不通过则返回验证错误的结果。In addition, in this embodiment, the role of the signature is to quickly verify whether the user has the reading permission for the uploaded information in the data packet. If the signature verification passes, it can be directly decrypted. If the signature verification fails, a verification error result is returned.
根据本申请实施例,还若干信息采集设备,其被配置为用于采集物联网数据以及从所述物联网服务器获取私钥以及公钥,并基于所述物联网数据利用私钥加密并打包,形成物联网数据包,并将所述物联网数据包发送给区块链平台 以及在所述物联网中广播;According to an embodiment of the present application, there are also several information collection devices, which are configured to collect IoT data and obtain a private key and a public key from the IoT server, and encrypt and package the IoT data using the private key to form an IoT data packet, and send the IoT data packet to the blockchain platform and broadcast it in the IoT;
其中,所述物联网数据包括第一数据和第二数据,所述第一数据是由所述信息采集设备自身主动生成的数据,所述第二数据是所述信息采集设备在所述物联网中接收到的且由所述物联网中的其他信息采集设备主动生成并在所述物联网中广播的数据。Among them, the Internet of Things data includes first data and second data, the first data is data actively generated by the information collection device itself, and the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
第一数据是本信息采集设备自身主动生成的数据。例如对目标物或目标环境进行检测到的光、热、电等信号或信息。第二数据是非本本信息采集设备主动生成的,但由物联网中的其他任一本信息采集设备所主动生成的经广播由本数据采集设备接收到的数据。示例性地,以物联网中得三个信息采集设备(device A、device B、device C)为例,信息采集设备device A主动采集数据生成data A,信息采集设备device B主动采集数据生成data B,信息采集设备device C主动采集数据生成data C。信息采集设备device A,可从区块链平台或者信息采集设备之间的广播受物联网数据包,在这之中data A相对信息采集设备device A来说是第一数据,data B和data C相对信息采集设备device A来说是第二数据。可以理解的是,对于从区块链平台或者信息采集设备之间的广播受物联网数据包,可利用公钥进行解密以得到第二数据。The first data is data actively generated by the information collection device itself. For example, signals or information such as light, heat, electricity, etc. detected from the target object or target environment. The second data is data that is not actively generated by the information collection device itself, but is actively generated by any other information collection device in the Internet of Things and is received by the data collection device through broadcast. For example, taking three information collection devices (device A, device B, device C) in the Internet of Things as an example, the information collection device device A actively collects data to generate data A, the information collection device device B actively collects data to generate data B, and the information collection device device C actively collects data to generate data C. The information collection device device A can receive Internet of Things data packets from the blockchain platform or the broadcast between information collection devices, in which data A is the first data relative to the information collection device device A, and data B and data C are the second data relative to the information collection device device A. It can be understood that for the Internet of Things data packets broadcast from the blockchain platform or between information collection devices, the public key can be used to decrypt them to obtain the second data.
在本实施例中,利用了区块链对数据进行存储和传输,可以避免数据被窜改。其次,由于数据上传过程中有可能会丢失,为了避免这种情况,物联网中的数据在数据采集设备之间相互传播,可以使数据最大化冗余,以避免数据丢失。In this embodiment, blockchain is used to store and transmit data, which can prevent data tampering. Secondly, since data may be lost during the upload process, in order to avoid this situation, the data in the Internet of Things is transmitted between data collection devices, which can maximize the redundancy of the data to avoid data loss.
根据本申请实施例,所述信息采集设备还被配置为:According to an embodiment of the present application, the information collection device is further configured as follows:
利用公钥对接收的物联网数据包进行解密,并与自身主动生成的第一数据对比,剔除相同的数据,并利用私钥对修改后的第一数据以及第二数据重新打包形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播。The received IoT data packet is decrypted using the public key and compared with the first data actively generated by itself, the identical data is eliminated, and the modified first data and the second data are repackaged using the private key to form an IoT data packet, and the IoT data packet is sent to the blockchain platform and broadcast in the IoT.
具体地,为了减少物联网数据包的体量,加快数据传输效率,剔除接收的 物联网数据包中相同的数据,可有效减少数据的体量,加快解密的效率。Specifically, in order to reduce the volume of IoT data packets and speed up data transmission efficiency, the same data in the received IoT data packets is eliminated, which can effectively reduce the volume of data and speed up decryption efficiency.
根据本申请实施例,所述用户端还被配置为:According to an embodiment of the present application, the user terminal is further configured as follows:
从区块链平台获取物联网数据包,并利用公钥对所述物联网数据包进行解密。Obtain an IoT data packet from the blockchain platform and decrypt the IoT data packet using a public key.
具体地,在本申请中用户可在用户端处查看本物联网数据,同时用户端与信息采集设备之间不直接联系,可防止黑客从用户端处侵入到本申请的物联网系统中。Specifically, in the present application, the user can view the IoT data at the user end, and at the same time, there is no direct connection between the user end and the information collection device, which can prevent hackers from intruding into the IoT system of the present application from the user end.
本申请还提出一种物联网数据处理方法:This application also proposes a method for processing IoT data:
S100用户端接受用户上传的上传信息,根据用户的账户从物联网服务器处获取私钥以及公钥;以及The S100 client receives the uploaded information from the user and obtains the private key and the public key from the IoT server according to the user's account; and
S110基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名,通过私钥加密后的所述用户的上传信息;以及S110 generates a data packet based on the user's uploaded information using a private key, the data packet including the uploaded information and a signature generated based on the uploaded information, and the user's uploaded information encrypted by the private key; and
S120将所述数据包发送给区块链平台;S120 sends the data packet to the blockchain platform;
S200信息采集设备采集物联网数据;S200 information collection equipment collects IoT data;
S210信息采集设备从所述物联网服务器获取私钥及公钥;S210 The information collection device obtains a private key and a public key from the Internet of Things server;
S221信息采集设备基于所述物联网数据利用私钥加密并打包,形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播;S221 The information collection device encrypts and packages the IoT data using a private key to form an IoT data packet, and sends the IoT data packet to the blockchain platform and broadcasts it in the IoT;
S222信息采集设备接受物联网中广播的物联网数据包或从区块链平台中获取述物联网数据包;S222 The information collection device receives the IoT data packet broadcasted in the IoT or obtains the IoT data packet from the blockchain platform;
S223信息采集设备利用公钥对所述物联网数据包解密;S223 The information collection device decrypts the IoT data packet using the public key;
S224信息采集设备将解密后的物联网数据包中的数据与自身主动生成的第一数据对比,并剔除相同的数据;S224 The information collection device compares the data in the decrypted IoT data packet with the first data actively generated by itself, and removes the identical data;
S225信息采集设备利用私钥对修改后第一数据以及第二数据重新加密并打包形成物联网数据并在物联网中广播以及发送至区块链平台。The S225 information collection device uses the private key to re-encrypt the modified first data and the second data and package them into IoT data, broadcast them in the IoT, and send them to the blockchain platform.
信息采集设备利用私钥对修改后第一数据以及第二数据重新加密并打包形成物联网数据并在物联网中广播以及发送至区块链平台The information collection device uses the private key to re-encrypt the modified first data and the second data and package them into IoT data, broadcast them in the IoT, and send them to the blockchain platform.
所述物联网数据包包括第一数据以及第二数据,所述第一数据是由所述信息采集设备自身主动生成的数据,所述第二数据是所述信息采集设备在所述物联网中接收到的且由所述物联网中的其他信息采集设备主动生成并在所述物联网中广播的数据。The Internet of Things data packet includes first data and second data, wherein the first data is data actively generated by the information collection device itself, and the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
当用户需要查阅信息时,包括如下步骤:When a user needs to check information, the following steps are included:
S300根据用户账户权限用户端从物联网服务器获取公钥;S300 obtains the public key from the IoT server based on the user account authority of the user terminal;
S310用户端利用公钥验证并解密数据包;S310 The user end verifies and decrypts the data packet using the public key;
S320用户端利用公钥解密互联网数据包。The S320 client uses the public key to decrypt Internet data packets.
尽管已经示出和描述了本申请的实施例,本领域的普通技术人员可以理解:在不脱离本申请的原理和宗旨的情况下可以对这些实施例进行多种变化、修改、替换和变型,本申请的范围由权利要求及其等同物限定。Although the embodiments of the present application have been shown and described, those skilled in the art will appreciate that various changes, modifications, substitutions and variations may be made to the embodiments without departing from the principles and spirit of the present application, and that the scope of the present application is defined by the claims and their equivalents.
应该理解,可以使用上面所示的各种形式的流程,重新排序、增加或删除步骤。例如,本申请中记载的各步骤可以并行地执行也可以顺序地执行也可以不同的次序执行,只要能够实现本申请公开的技术方案所期望的结果,本文在此不进行限制。It should be understood that the various forms of processes shown above can be used to reorder, add or delete steps. For example, the steps recorded in this application can be executed in parallel, sequentially or in different orders, as long as the expected results of the technical solution disclosed in this application can be achieved, and this document is not limited here.
上述具体实施方式,并不构成对本申请保护范围的限制。本领域技术人员应该明白的是,根据设计要求和其他因素,可以进行各种修改、组合、子组合和替代。任何在本申请的精神和原则之内所作的修改、等同替换和改进等,均应包含在本申请保护范围之内。The above specific implementations do not constitute a limitation on the protection scope of this application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions can be made according to design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of this application should be included in the protection scope of this application.

Claims (13)

  1. 物联网系统,其特征在于,包括:The Internet of Things system is characterized by comprising:
    用户端,其被配置为可根据用户的账户从物联网服务器获取私钥,并基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名;所述用户端还被配置为将所述数据包发送给区块链平台;The user terminal is configured to obtain a private key from the IoT server according to the user's account, and generate a data packet based on the user's uploaded information using the private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information; the user terminal is also configured to send the data packet to the blockchain platform;
    其中,所述物联网服务器用于分配非对称加密的密钥。Wherein, the Internet of Things server is used to distribute asymmetric encryption keys.
  2. 根据权利要求1所述的物联网系统,其特征在于,所述用户端还被配置为:The Internet of Things system according to claim 1, characterized in that the user terminal is further configured to:
    从区块链平台获取所述数据包,并且可根据用户账户从所述物联网服务器获取公钥,以对所述数据包中的签名进行验证。The data packet is obtained from the blockchain platform, and a public key can be obtained from the IoT server according to a user account to verify a signature in the data packet.
  3. 根据权利要求2所述的物联网系统,其特征在于,所述用户端还被配置为:The Internet of Things system according to claim 2, characterized in that the user terminal is further configured as:
    利用私钥对所述数据包中的上传信息进行加密。The uploaded information in the data packet is encrypted using a private key.
  4. 根据权利要求3所述的物联网系统,其特征在于,所述用户端还被配置为:The Internet of Things system according to claim 3, characterized in that the user terminal is further configured as:
    利用公钥对所述数据包中的上传信息进行解密。The uploaded information in the data packet is decrypted using the public key.
  5. 根据权利要求1至4任一项所述的物联网系统,其特征在于,还包括:The Internet of Things system according to any one of claims 1 to 4, characterized in that it also includes:
    若干信息采集设备,其被配置为用于采集物联网数据以及从所述物联网服务器获取私钥以及公钥,并基于所述物联网数据利用私钥加密并打包,形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播;Several information collection devices are configured to collect IoT data and obtain private keys and public keys from the IoT server, encrypt and package the IoT data using the private key to form IoT data packets, and send the IoT data packets to the blockchain platform and broadcast them in the IoT;
    其中,所述物联网数据包括第一数据和第二数据,所述第一数据是由所述 信息采集设备自身主动生成的数据,所述第二数据是所述信息采集设备在所述物联网中接收到的且由所述物联网中的其他信息采集设备主动生成并在所述物联网中广播的数据。Among them, the Internet of Things data includes first data and second data, the first data is data actively generated by the information collection device itself, and the second data is data received by the information collection device in the Internet of Things and actively generated by other information collection devices in the Internet of Things and broadcast in the Internet of Things.
  6. 根据权利要求5所述的物联网系统,其特征在于,所述信息采集设备还被配置为:The Internet of Things system according to claim 5, characterized in that the information collection device is further configured as:
    利用公钥对接收的物联网数据包进行解密,并与自身主动生成的第一数据对比,剔除相同的数据,并利用私钥对修改后的第一数据以及第二数据重新打包形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播。The received IoT data packet is decrypted using the public key and compared with the first data actively generated by itself, the identical data is eliminated, and the modified first data and the second data are repackaged using the private key to form an IoT data packet, and the IoT data packet is sent to the blockchain platform and broadcast in the IoT.
  7. 根据权利要求6所述的物联网系统,其特征在于,所述用户端还被配置为:The Internet of Things system according to claim 6, characterized in that the user terminal is further configured to:
    从区块链平台获取物联网数据包,并利用公钥对所述物联网数据包进行解密。Obtain an IoT data packet from the blockchain platform and decrypt the IoT data packet using a public key.
  8. 物联网数据处理方法,其特征在于:The method for processing Internet of Things data is characterized by:
    用户端接受用户上传的上传信息,根据用户的账户从物联网服务器处获取私钥;以及The user end receives the uploaded information from the user and obtains the private key from the IoT server according to the user's account; and
    基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名;Generate a data packet using a private key based on the user's uploaded information, the data packet including the uploaded information and a signature generated according to the uploaded information;
    将所述数据包发送给区块链平台。The data packet is sent to the blockchain platform.
  9. 根据权利要求8所述的方法,其特征在于:The method according to claim 8, characterized in that:
    用户端根据用户的账户从物联网服务器获取公钥,并利用公钥对所述数据包中的签名进行验证。The user end obtains the public key from the IoT server according to the user's account, and uses the public key to verify the signature in the data packet.
  10. 根据权利要求9所述的方法,其特征在于:The method according to claim 9, characterized in that:
    在所述基于用户的上传信息利用私钥生成数据包,所述数据包包含所述上传信息以及根据所述上传信息所产生的签名步骤中,还包括以下步骤:In the step of generating a data packet based on the user's uploaded information using a private key, wherein the data packet includes the uploaded information and a signature generated according to the uploaded information, the following steps are also included:
    利用私钥对所述用户的上传信息进行加密;Encrypting the user's uploaded information using a private key;
    在所述用户端根据用户的账户从物联网服务器获取公钥,并利用公钥对所述数据包中的签名进行验证步骤中,还包括以下步骤:The step of obtaining a public key from the IoT server according to the user's account and verifying the signature in the data packet using the public key at the user end further includes the following steps:
    利用公钥对所述用户的上传信息进行解密。The public key is used to decrypt the user's uploaded information.
  11. 根据权利要求8至10任一项所述的方法,其特征在于,还包括如下步骤:The method according to any one of claims 8 to 10, characterized in that it also includes the following steps:
    信息采集设备采集物联网数据;Information collection equipment collects IoT data;
    信息采集设备从所述物联网服务器获取私钥;The information collection device obtains a private key from the Internet of Things server;
    信息采集设备基于所述物联网数据利用私钥加密并打包,形成物联网数据包,并将所述物联网数据包发送给区块链平台以及在所述物联网中广播。The information collection device encrypts and packages the IoT data using a private key to form an IoT data packet, and sends the IoT data packet to the blockchain platform and broadcasts it in the IoT.
  12. 根据权利要求12所述的方法,其特征在于,所述物联网数据包包括第一数据以及第二数据,所述第一数据是由所述信息采集设备自身主动生成的数据,所述第二数据是所述信息采集设备在所述物联网中接收到的且由所述物联网中的其他信息采集设备主动生成并在所述物联网中广播的数据,并且所述方法还包括以下步骤:The method according to claim 12 is characterized in that the IoT data packet includes first data and second data, the first data is data actively generated by the information collection device itself, the second data is data received by the information collection device in the IoT and actively generated by other information collection devices in the IoT and broadcast in the IoT, and the method further comprises the following steps:
    信息采集设备从物联网获取公钥;The information collection device obtains the public key from the Internet of Things;
    信息采集设备接受物联网中广播的物联网数据包或从区块链平台中获取述物联网数据包;The information collection device receives the IoT data packets broadcast in the IoT or obtains the IoT data packets from the blockchain platform;
    信息采集设备利用公钥对所述物联网数据包解密;The information collection device decrypts the IoT data packet using the public key;
    信息采集设备将解密后的物联网数据包中的数据与自身主动生成的第一数据对比,并剔除相同的数据;The information collection device compares the data in the decrypted IoT data packet with the first data actively generated by itself, and removes the identical data;
    信息采集设备利用私钥对修改后第一数据以及第二数据重新加密并打包形 成物联网数据并在物联网中广播以及发送至区块链平台。The information collection device uses the private key to re-encrypt the modified first data and the second data and package them to form IoT data, broadcast them in the IoT, and send them to the blockchain platform.
  13. 根据权利要求12所述的物联网系统,其特征在于,还包括以下步骤:The Internet of Things system according to claim 12, characterized in that it also includes the following steps:
    用户端从区块链平台获取物联网数据包;The user end obtains IoT data packets from the blockchain platform;
    用户端利用私钥对所述物联网数据包进行解密。The user end uses the private key to decrypt the IoT data packet.
PCT/CN2022/135158 2022-11-29 2022-11-29 Internet of things system and internet of things data processing method WO2024113183A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/135158 WO2024113183A1 (en) 2022-11-29 2022-11-29 Internet of things system and internet of things data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/135158 WO2024113183A1 (en) 2022-11-29 2022-11-29 Internet of things system and internet of things data processing method

Publications (1)

Publication Number Publication Date
WO2024113183A1 true WO2024113183A1 (en) 2024-06-06

Family

ID=91322609

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/135158 WO2024113183A1 (en) 2022-11-29 2022-11-29 Internet of things system and internet of things data processing method

Country Status (1)

Country Link
WO (1) WO2024113183A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190207755A1 (en) * 2017-12-29 2019-07-04 Shanghai Weilian Information Technology Co., Ltd. IoT Devices, Block Chain Platforms and IoT Systems for Recording Transportation Data of Objects and Methods of Using the Same
CN110691088A (en) * 2019-09-29 2020-01-14 广东电网有限责任公司 Block chain-based Internet of things equipment authentication method
WO2022061599A1 (en) * 2020-09-23 2022-03-31 中国科学院深圳先进技术研究院 Blockchain-based distributed internet of things instruction management method and system
CN114499879A (en) * 2022-01-20 2022-05-13 浙商银行股份有限公司 Method, system, equipment and storage medium for transmitting trusted message of internet of things based on block chain technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190207755A1 (en) * 2017-12-29 2019-07-04 Shanghai Weilian Information Technology Co., Ltd. IoT Devices, Block Chain Platforms and IoT Systems for Recording Transportation Data of Objects and Methods of Using the Same
CN110691088A (en) * 2019-09-29 2020-01-14 广东电网有限责任公司 Block chain-based Internet of things equipment authentication method
WO2022061599A1 (en) * 2020-09-23 2022-03-31 中国科学院深圳先进技术研究院 Blockchain-based distributed internet of things instruction management method and system
CN114499879A (en) * 2022-01-20 2022-05-13 浙商银行股份有限公司 Method, system, equipment and storage medium for transmitting trusted message of internet of things based on block chain technology

Similar Documents

Publication Publication Date Title
CN109508552B (en) Privacy protection method of distributed cloud storage system
Guo et al. Blockchain meets edge computing: A distributed and trusted authentication system
Bera et al. Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
Khalid et al. A survey on privacy and access control schemes in fog computing
Bao et al. IoTChain: A three-tier blockchain-based IoT security architecture
CN109327481B (en) Block chain-based unified online authentication method and system for whole network
WO2022199290A1 (en) Secure multi-party computation
CN113553574A (en) Internet of things trusted data management method based on block chain technology
KR101285281B1 (en) Security system and its security method for self-organization storage
KR20200087327A (en) System and method for providing data reliability based on blockchain for iot services
Lu et al. A Fine‐Grained IoT Data Access Control Scheme Combining Attribute‐Based Encryption and Blockchain
US9292532B2 (en) Remote data storage
CN109995530B (en) Safe distributed database interaction system suitable for mobile positioning system
US20180034819A1 (en) Method and apparatus for heterogeneous data storage management in cloud computing
CN111371543B (en) Internet of things equipment access control method based on double-block chain structure
Yuan et al. Enabling secure and efficient video delivery through encrypted in-network caching
US20090180621A1 (en) Adaptive secure authenticated channels for direct sharing of protected content between devices
CN113645039A (en) Communication information transmission system and method based on different authorities
CN114826702A (en) Database access password encryption method and device and computer equipment
GB2488753A (en) Encrypted communication
Duan et al. Design of anonymous authentication scheme for vehicle fog services using blockchain
Arun et al. Mutual authentication and authorized data access between fog and user based on blockchain technology
US20230275759A1 (en) Method and system of encoding data over distributed networks and method of assuring integrity of data transmission between sender and receiver in a communication system
WO2024113183A1 (en) Internet of things system and internet of things data processing method
Kim et al. Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications.