[go: up one dir, main page]

WO2019019282A1 - Procédé permettant à un terminal de l'internet des objets de chiffrer de manière séquentielle des données, et appareil - Google Patents

Procédé permettant à un terminal de l'internet des objets de chiffrer de manière séquentielle des données, et appareil Download PDF

Info

Publication number
WO2019019282A1
WO2019019282A1 PCT/CN2017/100812 CN2017100812W WO2019019282A1 WO 2019019282 A1 WO2019019282 A1 WO 2019019282A1 CN 2017100812 W CN2017100812 W CN 2017100812W WO 2019019282 A1 WO2019019282 A1 WO 2019019282A1
Authority
WO
WIPO (PCT)
Prior art keywords
encryption
encryption unit
internet
unit
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/100812
Other languages
English (en)
Chinese (zh)
Inventor
杜光东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shenglu IoT Communication Technology Co Ltd
Original Assignee
Shenzhen Shenglu IoT Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shenglu IoT Communication Technology Co Ltd filed Critical Shenzhen Shenglu IoT Communication Technology Co Ltd
Publication of WO2019019282A1 publication Critical patent/WO2019019282A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Definitions

  • the present application relates to the field of communications, and in particular, to a method and apparatus for sequentially encrypting data of an Internet of Things terminal.
  • the Internet of Things is an important part of the new generation of information technology, and an important stage of development in the era of "informatization.” Its English name is: “Internet of things (IoT)". As the name suggests, the Internet of Things is the Internet that connects things. This has two meanings: First, the core and foundation of the Internet of Things is still the Internet, which is an extended and extended network based on the Internet; Second, its client extends and extends to any item and item for information. Exchange and communication, that is, things and things. The Internet of Things is widely used in the convergence of networks through communication-aware technologies such as intelligent sensing, identification technology and pervasive computing. It is also called the third wave of the development of the world information industry after computers and the Internet.
  • the Internet of Things is the application expansion of the Internet. It is not so much that the Internet of Things is a network, but the Internet of Things is a business and application. Therefore, application innovation is the core of the development of the Internet of Things. Innovation 2.0 with user experience as the core is the soul of the development of the Internet of Things.
  • the Internet of Things solves the interconnection between objects and the exchange of data between objects.
  • the existing Internet of Things is connected to the Internet based on IoT access points (APs).
  • IoT access points There are multiple IoT terminals under the Internet of Things (AP).
  • the data between the Internet of Things (the network side device) and the IoT terminal is not encrypted. This makes it easy for the IoT device to leak, resulting in the leakage of user privacy data. User experience is not high.
  • the application provides a sequential encryption method for Internet of Things terminal data. Can improve IoT data Security to improve the user experience.
  • a method for sequentially encrypting data of an Internet of Things terminal comprising the following steps:
  • the Internet of Things terminal acquires a data packet that needs to be sent
  • the IoT terminal extracts a first encryption unit used for the last encryption, and the Internet of Things terminal selects a second encryption unit in order, and the second encryption unit is sequentially arranged after the first encryption unit and sequentially An encryption unit adjacent to the first encryption unit;
  • the IoT terminal invokes the second encryption unit to perform encryption processing on the data packet
  • the Internet of Things terminal sends the encrypted data to the network side device.
  • the method may further include: before the IoT terminal sends the encrypted data packet to the gateway:
  • the alternate encryption unit of the second encryption unit is called to encrypt the data packet.
  • the invoking the second encryption unit by the Internet of Things terminal to perform encryption processing on the data packet specifically includes:
  • the IoT terminal detects the signal strength of the network network device, determines a secret key according to the signal strength, and performs encryption processing on the data packet by using the second encryption unit by using the secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal acquires a level of signal strength, and queries a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal obtains the signal strength value, and inputs the intensity value into the result calculated by the preset algorithm as a secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal obtains the signal strength value, converts the Media Access Control (MAC) address of the Internet of Things terminal into a decimal number, and adds the absolute value of the intensity value to the decimal number to determine the secret. key.
  • MAC Media Access Control
  • an Internet of Things terminal device comprising:
  • An obtaining unit configured to acquire a data packet that needs to be sent
  • a processing unit configured to extract a first encryption unit used in the last encryption, where the Internet of Things terminal selects a second encryption unit in order, and the second encryption unit is sequentially arranged after the first encryption unit and sequentially Encrypting unit adjacent to the first encryption unit; invoking the second encryption unit to perform encryption processing on the data packet;
  • a sending unit configured to send the encrypted data to the network side device.
  • the processing unit is configured to: when the second encryption unit fails to encrypt the data packet, call the alternate encryption unit of the second encryption unit to encrypt the data packet.
  • the processing unit is configured to detect a signal strength with the network network device, determine a secret key according to the signal strength, and perform encryption processing on the data packet by using the second encryption unit by using the secret key. .
  • the processing unit is configured to obtain a level of signal strength, and query a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the processing unit is specifically configured to obtain a signal strength value, and input the strength value into a result calculated by a preset algorithm as a secret key.
  • a computer storage medium configured to store a program, and the program includes some or all of the steps of the sequential encryption method of any one of the Internet of Things terminal data described in the first aspect. .
  • an Internet of Things terminal device comprising: one or more processors, a memory, a bus system, a transceiver, and one or more programs, the processor, the memory, and The transceiver is connected by the bus system; wherein the one or more programs are stored in the memory, and the one or more programs include instructions that, when executed by the Internet of Things terminal, cause the Internet of Things terminal to perform the above.
  • the Internet of Things terminal of the technical solution provided by the present invention acquires the data packet to be sent, the Internet of Things terminal extracts the first encryption unit used for the last encryption, and the Internet of Things terminal sequentially selects the next encryption unit of the first encryption unit. That is, the second encryption unit encrypts the data through the encryption unit.
  • the encryption is set in the Internet of Things terminal. This method can encrypt the data, protect the privacy of the user, and improve the user experience.
  • FIG. 1 is a schematic diagram of a network architecture
  • FIG. 2 is a transmission flow chart of an IoT terminal transmitting a data packet to a network side (taking a repeater as an example);
  • 3 is a flow chart of a method for sequentially encrypting data of an Internet of Things terminal
  • FIG. 4 is a schematic diagram of a technical scenario provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a mapping relationship provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a sequential encryption method for data of an Internet of Things terminal according to another embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an Internet of Things terminal device provided by the present application.
  • FIG. 8 is a schematic structural diagram of hardware of an Internet of Things terminal provided by the present application.
  • Computer device also referred to as “computer” in the context, is meant an intelligent electronic device that can perform predetermined processing, such as numerical calculations and/or logical calculations, by running predetermined programs or instructions. It may include a processor and a memory, the processor executing a pre-stored instruction stored in the memory to perform a predetermined process, or performing a predetermined process by hardware such as an ASIC, an FPGA, a DSP, or the like, or a combination of the two.
  • Computer devices include, but are not limited to, servers, personal computers, notebook computers, tablets, smart phones, and the like.
  • the object network includes: an Internet of Things terminal 10, an Internet of Things access point AP20, a gateway, and a repeater 40.
  • the networked terminal may have different manifestations according to different situations.
  • the Internet of Things terminal may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner.
  • the smart water bottle or some Internet of Things terminal device, the Internet of Things terminal 10 is connected to the repeater 40 in a wireless manner, and the repeater 40 is connected to the AP.
  • connection manner may be wireless or limited.
  • the wireless mode includes but is not limited to: Bluetooth, WIFI, etc.
  • the foregoing gateway may specifically be a mobile base station, a mobile relay station, a switch, and the like.
  • the wired mode is taken as an example, and for convenience of representation, only one solid line is shown here.
  • the above-mentioned gateway 30 may be a personal computer (PC) according to the size of the Internet of Things. In practice, it may be a plurality of PCs, servers, or server groups. The specific embodiment of the present invention is not limited. The specific manifestation of the above gateway 30.
  • PC personal computer
  • the repeater 40 may be a plurality of devices according to different scenarios, such as a mobile phone, a smart watch, and the like.
  • FIG. 2 is a transmission flow chart of data transmission of the Internet of Things, wherein the network side device As an example, as shown in Figure 2, the process includes:
  • Step S201 the Internet of Things terminal 10 transmits the data packet to be transmitted to the relay station 40 by wireless;
  • Step S202 The relay station forwards the data packet to the Internet of Things access point
  • Step S203 The Internet of Things access point transmits the data packet to the gateway.
  • FIG. 3 is a method for sequentially encrypting data of an Internet of Things terminal according to the present invention.
  • the method is implemented under the network architecture shown in FIG. 4, as shown in FIG.
  • a plurality of IoT terminals are connected, and the repeater may be a mobile phone that opens a hotspot, a personal computer that provides a wireless connection, a forwarding device, and the like.
  • the method is as shown in FIG. 3, and includes the following steps:
  • Step S301 The Internet of Things terminal acquires a data packet to be sent
  • the object-to-network terminal in the above step S301 may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner, a smart water bottle, a smart light, a smart switch, or Some IoT smart devices.
  • Step S302 the Internet of Things extracts the first encryption unit used for the last encryption, and the Internet of Things terminal sequentially selects the next encryption unit of the first encryption unit, that is, the second encryption unit (ie, the Internet of Things terminal selects the order in order) a second encryption unit, the second encryption unit being an encryption unit sequentially arranged after the first encryption unit and sequentially adjacent to the first encryption unit.
  • the type of the Internet of Things terminal in the above step S302 can be set according to the situation of the device.
  • the IoT terminal can specifically include: a smart electric light, a smart television, a smart cleaning device, a smart sleep device, an intelligent monitoring device, etc.
  • the form of performance can be various, for example, for a smart electric lamp, including but not limited to: a smart table lamp, a smart ceiling lamp, a smart wall lamp, etc., for example, for a smart TV, it can be a Samsung smart TV, of course It can also be summer
  • the smart TV for example, for a smart cleaning device, may be a smart sweeping robot, and of course, it may also include a smart vacuum cleaner, a smart garbage processor, etc., for example, for a smart sleep device, it may be: a smart bed A device such as a pad or a smart sofa, for example, for an intelligent monitoring device, may be an intelligent sphygmomanometer, a smart thermometer, or the like.
  • the specific form, number, or type of the above-described Internet of Things terminal is not limited.
  • the encryption unit in the above steps can be as shown in FIG. 5.
  • the encryption unit in the above step S302 may specifically be a hardware encryption unit provided in the Internet of Things terminal, and includes an encryption algorithm preset by the manufacturer.
  • the encryption unit may also be a software configured in the Internet of Things terminal.
  • the encryption unit, the present invention does not limit the specific expression of the above encryption unit.
  • the foregoing encryption algorithms include, but are not limited to, triple data encryption algorithm block cipher (English: riple Data Encryption Algorithm, 3DES), message digest algorithm (English: Message Digest Algorithm, MD5) or RSA (Rivest, Shamir, Adleman) and other encryption algorithms.
  • the invention is not limited to specific encryption algorithms.
  • 3DES is a generic term for triple-data encryption algorithm block ciphers. It is equivalent to applying three DES encryption algorithms to each data block. Due to the increased computing power of the computer, the key length of the original DES password becomes vulnerable to brute force; 3DES is designed to provide a relatively simple method to avoid similar attacks by increasing the key length of DES.
  • Step S303 The Internet of Things terminal invokes the second encryption unit to perform encryption processing on the data packet.
  • the implementation method of the foregoing step S303 may specifically be:
  • the second encryption unit is a 3DES encryption unit, and the Internet of Things terminal invokes the 3DES encryption unit to perform 3DES encryption processing on the data packet.
  • the Internet of Things terminal invokes the RAS encryption unit to perform RAS encryption processing on the data packet.
  • the second encryption unit is an MD5 encryption unit
  • the Internet of Things terminal invokes the MD5 encryption unit to perform MD5 encryption processing on the data packet.
  • the implementation method of the foregoing step S303 may specifically be:
  • the Internet of Things terminal invokes the second encryption unit to encrypt the data packet, such as encryption success, Subsequent to step S304, if the encryption is unsuccessful, the alternate encryption unit of the second encryption unit is called to encrypt the data packet, and the alternate encryption unit identifier is added to the header extension field of the encrypted data packet.
  • Step S304 The Internet of Things terminal sends the encrypted data to the network side device.
  • the implementation method of the above step S304 can be:
  • the manner in which the Internet of Things terminal sends a data packet to the Internet of Things terminal may be to send a data packet by using a wireless connection, including but not limited to: Bluetooth, Wireless Fidelity (WIFI) or Zigbee And other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • a wireless connection including but not limited to: Bluetooth, Wireless Fidelity (WIFI) or Zigbee And other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • the Internet of Things and IoT terminals here are only for wireless IoT terminals, because for the Internet of Things, the number of devices accessed by them is large.
  • IoT terminals if they are connected by wire, the first thing The number of accesses of the networked terminal is limited, and the wired connection is used for the home, which is unimaginable for the wiring of the home user, and the cost of the cable is also very high, so in the technical solution of the present invention
  • the connection between the IoT terminal and the IoT terminal is limited to wireless connection.
  • the Internet of Things terminal After the Internet of Things terminal acquires the data packet to be sent, the Internet of Things terminal sequentially selects the latter encryption unit, that is, the second encryption unit, of the previously used encryption unit, and performs data on the data through the second encryption unit. Encryption, for the Internet of Things, the network side device does not need to configure the encryption, and all the encryption settings are in the Internet of Things terminal, so it has high security and improves the user experience.
  • FIG. 6 is a method for sequentially encrypting data of an Internet of Things terminal according to the present invention.
  • the method is implemented under the network architecture shown in FIG. 4, as shown in FIG. 4, under an Internet of Things repeater.
  • a plurality of IoT terminals can be connected.
  • the IoT repeater can be a mobile phone that opens a hotspot, a personal computer that provides a wireless connection, and the like.
  • the method is as shown in FIG. 6, and includes the following steps:
  • Step S601 The Internet of Things terminal acquires a data packet that needs to be sent;
  • the IoT terminal in the above step S601 may specifically be: a mobile phone, a tablet computer, a computer, etc., of course, it may also include other devices with networking functions, such as a smart TV, a smart air conditioner, Smart water bottles, smart lights, smart switches or some IoT smart devices.
  • Step S602 the Internet of Things terminal extracts the first encryption unit used for the last encryption, and the Internet of Things terminal selects the second encryption unit in order, and the second encryption unit is sequentially arranged after the first encryption unit and sequentially An encryption unit adjacent to the first encryption unit; invoking the second encryption unit to perform encryption processing on the data packet.
  • the type of the Internet of Things terminal in the above step S602 can be set according to the situation of the device.
  • the IoT terminal can include: a smart light, a smart TV, a smart cleaning device, a smart sleep device, an intelligent monitoring device, etc.
  • the form of performance can be various, for example, for a smart electric lamp, including but not limited to: a smart table lamp, a smart ceiling lamp, a smart wall lamp, etc., for example, for a smart TV, it can be a Samsung smart TV, of course It can also be a Sharp smart TV.
  • a smart cleaning device it can be a smart sweeping robot.
  • a smart vacuum cleaner for example, for a smart sleep device
  • a smart garbage processor for example, for a smart sleep device
  • the smart mattress for the smart mattress, the smart sofa, and the like
  • the smart monitoring device it may be an intelligent sphygmomanometer, a smart thermometer, etc., and the specific form, number, or type of the above-mentioned Internet of Things terminal is not limited.
  • the time period and the encryption unit mapping table in the above steps are as shown in FIG. 5, and the foregoing mapping may be a one-to-one mapping, or may be a one-to-many mapping or the like.
  • the cryptographic unit in the above step S602 may specifically be a hardware cryptographic unit disposed in the Internet of Things repeater, and includes an encryption algorithm preset by the manufacturer.
  • the cryptographic unit may also be configured in the Internet of Things relay.
  • the software encryption unit in the device does not limit the specific expression of the above encryption unit.
  • the foregoing encryption algorithms include, but are not limited to, triple data encryption algorithm block cipher (English: riple Data Encryption Algorithm, 3DES), message digest algorithm (English: Message Digest Algorithm, MD5) or RSA (Rivest, Shamir, Adleman) and other encryption algorithms.
  • the invention is not limited to specific encryption algorithms.
  • 3DES is a generic term for triple-data encryption algorithm block ciphers. It is equivalent to applying three DES encryption algorithms to each data block. Due to the increased computing power of the computer, the key length of the original DES password becomes vulnerable to brute force; 3DES is designed to provide a relatively simple method to avoid similar attacks by increasing the key length of DES.
  • Step S603 the Internet of Things terminal detects the signal strength of the network network device, according to the letter The number strength determination key is used, and the data packet is encrypted by using the second encryption unit by using the secret key;
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal acquires a level of signal strength, and queries a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the signal strength level 1 corresponds to the secret key 1
  • the signal strength level 5 corresponds to the secret key 5.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal obtains the signal strength value, and inputs the intensity value into the result calculated by the preset algorithm as a secret key.
  • the determining the secret key according to the signal strength includes:
  • the IoT terminal obtains the signal strength value, converts the MAC address of the IoT terminal into a decimal number, and adds the absolute value of the intensity value to the decimal number to determine the key.
  • the implementation method of the foregoing step S603 may specifically be:
  • the second encryption unit is a 3DES encryption unit, and the Internet of Things terminal invokes the 3DES encryption unit to perform 3DES encryption processing on the data packet.
  • the Internet of Things terminal invokes the RAS encryption unit to perform RAS encryption processing on the data packet.
  • the second encryption unit is an MD5 encryption unit
  • the Internet of Things terminal invokes the MD5 encryption unit to perform MD5 encryption processing on the data packet.
  • the implementation method of the foregoing step S603 may specifically be:
  • the IoT terminal invokes the second encryption unit to perform encryption processing on the data packet. If the encryption is successful, the subsequent step S304 is performed. If the encryption is unsuccessful, the standby encryption unit of the second encryption unit is called to encrypt the data packet, and the data packet is encrypted. The alternate encryption unit identifies the header extension field added to the encrypted packet.
  • Step S604 The Internet of Things terminal carries the encrypted data packet in the payload of the frame and sends it to the Internet of Things access point.
  • the implementation method of the above step S604 can be:
  • the manner in which the Internet of Things terminal sends a data packet to the Internet of Things may be a method of sending a data packet by using a wireless connection, including but not limited to: Bluetooth, wireless fidelity (English: Wireless Fidelity, WIFI) or Zigbee and other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • a wireless connection including but not limited to: Bluetooth, wireless fidelity (English: Wireless Fidelity, WIFI) or Zigbee and other wireless methods, wherein the above WIFI needs to comply with the IEEE802.11b standard.
  • the Internet of Things and IoT terminals here are only for wireless IoT terminals, because for the Internet of Things, the number of devices accessed by them is large.
  • IoT terminals if they are connected by wire, the first thing The number of accesses of the networked terminal is limited, and the wired connection is used for the home, which is unimaginable for the wiring of the home user, and the cost of the cable is also very high, so in the technical solution of the present invention
  • the connection between the IoT terminal and the IoT repeater is limited to wireless connections.
  • the technical solution adopted by the invention has the advantage of high safety.
  • the foregoing method may further include: before step S604:
  • the IoT terminal invoking the second encryption unit to encrypt is unsuccessful, the IoT terminal invoking the alternate encryption unit of the second encryption unit to encrypt the data packet, and adding the identifier of the alternate encryption unit to the encryption process The header extension field of the packet.
  • FIG. 7 is an IoT terminal device 700.
  • the IoT terminal device 700 may be an Internet of Things terminal as shown in FIG. 3 or FIG. 6.
  • the technical terms and definitions in the foregoing IoT terminal device may be referred to.
  • the apparatus comprises:
  • An obtaining unit 701 configured to acquire a data packet that needs to be sent
  • the processing unit 702 is configured to extract a first encryption unit used for the last encryption, and select a second encryption unit in order, the second encryption unit is sequentially arranged after the first encryption unit and sequentially and the first Encrypting unit adjacent to the encryption unit; invoking the second encryption unit to perform encryption processing on the data packet;
  • the sending unit 703 is configured to send the encrypted data and the current time to the network side device.
  • the processing unit 702 is specifically configured to: when the second encryption unit fails to encrypt the data packet, call the alternate encryption unit of the second encryption unit to encrypt the data packet.
  • the processing unit 702 is configured to detect a signal strength with the network network device, determine a secret key according to the signal strength, and use the second encryption unit to perform the data packet by using the secret key. Encryption processing.
  • the processing unit is configured to obtain a level of signal strength, and query a key corresponding to the level of the signal strength according to a mapping relationship between the level and the key.
  • the processing unit is specifically configured to obtain a signal strength value, and input the strength value into a result calculated by a preset algorithm as a secret key.
  • the present invention also provides a computer storage medium, wherein the computer storage medium can store a program that, when executed, includes some or all of the steps of the sequential encryption method of any one of the Internet of Things terminal data described in the first aspect.
  • FIG. 8 is an Internet of Things terminal 800 provided by the present invention.
  • the Internet of Things terminal may be a node deployed in an Internet system, and the Internet system may further include: an Internet of Things repeater and an Internet of Things access point.
  • the IoT terminal 800 includes, but is not limited to, a computer, a server, and the like. As shown in FIG. 8, the IoT terminal 800 includes a processor 801, a memory 802, a transceiver 803, and a bus 804.
  • the transceiver 803 is configured to transmit and receive data with an external device (eg, other devices in the interconnection system, including but not limited to: a repeater, a core network device, etc.).
  • the number of processors 801 in the Internet of Things terminal 800 may be one or more.
  • processor 801, memory 802, and transceiver 803 may be connected by a bus system or other means.
  • bus system or other means.
  • the program code can be stored in the memory 802.
  • the processor 801 is configured to call program code stored in the memory 802 for performing the following operations:
  • a transceiver 803 configured to acquire a data packet that needs to be sent
  • the processor 801 is configured to extract a first encryption unit used for the last encryption, and sequentially select a second encryption unit, where the second encryption unit is sequentially arranged after the first encryption unit and sequentially and the first Encrypting unit adjacent to the encryption unit; invoking the second encryption unit to perform encryption processing on the data packet.
  • the transceiver 803 is further configured to send the encrypted data packet and the current time to be carried in the payload of the frame to the IoT access point.
  • processor 801 and the transceiver 803 are further configured to perform the refinement and the steps of the steps and steps in the embodiment shown in FIG. 3 or FIG. 6.
  • the processor 801 herein may be a processing component or a general term of multiple processing components.
  • the processing component may be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present application.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • DSPs digital singal processors
  • FPGAs Field Programmable Gate Arrays
  • the memory 803 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate.
  • the memory 903 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
  • the bus 804 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component (PCI) bus, or an Extended Industry Standard Architecture (EISA) bus.
  • ISA Industry Standard Architecture
  • PCI Peripheral Component
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 8, but it does not mean that there is only one bus or one type of bus.
  • the user equipment may also include input and output devices coupled to bus 804 for connection to other portions, such as processor 801, via a bus.
  • the input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: Flash drive, read-only memory (English: Read-Only Memory, referred to as: ROM), random accessor (English: Random Access Memory, referred to as: RAM), disk or CD.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne un procédé pour un terminal de l'Internet des objets pour chiffrer de manière séquentielle des données, et un appareil. Le procédé comprend les étapes suivantes : un terminal de l'Internet des objets obtient un paquet de données qui doit être envoyé; le terminal de l'Internet des objets extrait une première unité de chiffrement adoptée pour le dernier chiffrement, et sélectionne séquentiellement l'unité de chiffrement suivante de la première unité de chiffrement, c'est-à-dire, une seconde unité de chiffrement; le terminal de l'Internet des objets appelle la seconde unité de chiffrement pour chiffrer le paquet de données; le terminal de l'Internet des objets envoie les données chiffrées et le temps courant à un dispositif côté réseau. La solution technique selon la présente invention offre les avantages d'une haute sécurité d'une bonne expérience utilisateur.
PCT/CN2017/100812 2017-07-26 2017-09-07 Procédé permettant à un terminal de l'internet des objets de chiffrer de manière séquentielle des données, et appareil Ceased WO2019019282A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710615793.1 2017-07-26
CN201710615793.1A CN107566336A (zh) 2017-07-26 2017-07-26 物联网终端数据的按顺序加密方法及装置

Publications (1)

Publication Number Publication Date
WO2019019282A1 true WO2019019282A1 (fr) 2019-01-31

Family

ID=60973862

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100812 Ceased WO2019019282A1 (fr) 2017-07-26 2017-09-07 Procédé permettant à un terminal de l'internet des objets de chiffrer de manière séquentielle des données, et appareil

Country Status (2)

Country Link
CN (1) CN107566336A (fr)
WO (1) WO2019019282A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113890766A (zh) * 2021-11-08 2022-01-04 南方电网数字电网研究院有限公司 基于物联网的电力设备鉴权方法、装置、服务器和系统
CN113992427A (zh) * 2020-12-23 2022-01-28 技象科技(浙江)有限公司 基于相邻节点的数据加密发送方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112543452B (zh) * 2020-11-23 2023-06-27 广州技象科技有限公司 基于信号传输安全管理的数据跳传选择方法及装置
CN116455621A (zh) * 2023-04-03 2023-07-18 海光信息技术股份有限公司 数据加密方法、装置、系统、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459510A (zh) * 2007-12-14 2009-06-17 华为技术有限公司 实时传输数据的加密算法的实现方法及装置
CN104052742A (zh) * 2014-06-11 2014-09-17 上海康煦智能科技有限公司 一种可动态加密的物联网通讯协议
CN104935433A (zh) * 2015-03-13 2015-09-23 天地融科技股份有限公司 一种通讯过程中密钥跳变的方法、通讯装置和通讯系统
CN106899562A (zh) * 2016-04-21 2017-06-27 中国移动通信有限公司研究院 物联网的安全算法协商方法、网元及物联网终端

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102244861B (zh) * 2011-08-14 2013-09-18 北京理工大学 基于无线信道随机状态生成对称密钥的方法
US9571464B2 (en) * 2014-08-11 2017-02-14 Intel Corporation Network-enabled device provisioning
KR102370842B1 (ko) * 2015-06-03 2022-03-08 삼성전자주식회사 컨텐츠를 암호화하기 위한 전자 장치 및 방법
CN106961449B (zh) * 2017-05-24 2019-12-03 重庆和贯科技有限公司 物联网数据传输方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101459510A (zh) * 2007-12-14 2009-06-17 华为技术有限公司 实时传输数据的加密算法的实现方法及装置
CN104052742A (zh) * 2014-06-11 2014-09-17 上海康煦智能科技有限公司 一种可动态加密的物联网通讯协议
CN104935433A (zh) * 2015-03-13 2015-09-23 天地融科技股份有限公司 一种通讯过程中密钥跳变的方法、通讯装置和通讯系统
CN106899562A (zh) * 2016-04-21 2017-06-27 中国移动通信有限公司研究院 物联网的安全算法协商方法、网元及物联网终端

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992427A (zh) * 2020-12-23 2022-01-28 技象科技(浙江)有限公司 基于相邻节点的数据加密发送方法及装置
CN113992427B (zh) * 2020-12-23 2023-08-25 技象科技(南京)有限公司 基于相邻节点的数据加密发送方法及装置
CN113890766A (zh) * 2021-11-08 2022-01-04 南方电网数字电网研究院有限公司 基于物联网的电力设备鉴权方法、装置、服务器和系统
CN113890766B (zh) * 2021-11-08 2024-04-09 南方电网数字电网科技(广东)有限公司 基于物联网的电力设备鉴权方法、装置、服务器和系统,存储介质

Also Published As

Publication number Publication date
CN107566336A (zh) 2018-01-09

Similar Documents

Publication Publication Date Title
US11943695B2 (en) Network channel switching method and apparatus, device, and storage medium
US10674353B2 (en) Association establishment method in wireless local area network, terminal, and access point
CN107426828B (zh) 数据传输方法、装置及移动终端
CN105682253A (zh) 建立通信的方法、设备、终端和计算机可读存储介质
WO2018120247A1 (fr) Procédé et dispositif de mise en correspondance de terminal
CN107567017B (zh) 无线连接系统、装置及方法
US20170208630A1 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
WO2019019282A1 (fr) Procédé permettant à un terminal de l'internet des objets de chiffrer de manière séquentielle des données, et appareil
CN103997692A (zh) 一种智能电视无缝连接无线路由器的方法及系统
WO2021043095A1 (fr) Procédé et appareil de fourniture de terminal et de génération de clé, et dispositifs
CN108353442B (zh) 使用网络来委托第二网络
CN110858838A (zh) 桥接通信的方法和设备
WO2019019280A1 (fr) Procédé pour terminal de l'internet des objets pour chiffrer des données selon des périodes de temps, et appareil
CN107423099A (zh) 键码烧写方法、服务器、终端、键码烧写系统及存储介质
CN107113890A (zh) 用于设备配置的方法和设备
WO2022142933A1 (fr) Procédé et système d'accès à un réseau de point d'accès sans fil, ainsi qu'ap et support d'enregistrement
WO2019010796A1 (fr) Procédé et dispositif de cryptage par sous-dispositif pour recevoir des données d'ap de l'internet des objets
CN107846715A (zh) 物联网基于传输速率的接入点切换方法及装置
WO2018053895A1 (fr) Dispositif et procédé de commande de cryptage de données de liaison montante basés sur un type destinés à un point d'accès à l'internet des objets
CN107360566B (zh) 物联网终端基于类型的上行数据加密控制方法及装置
CN111479263A (zh) 通信连接的方法、终端及计算机存储介质
WO2019015041A1 (fr) Procédé et dispositif de chiffrement par répartition dans le temps pour des données d'un répéteur de l'internet des objets
CN107493571B (zh) 物联网中继器基于类型的上行数据加密控制方法及装置
CN107483203B (zh) 物联网接入点接收数据的分时段加密方法及装置
CN106597873A (zh) 用于对自动化设备进行远程维护的方法、装置和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17918848

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17918848

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/05/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17918848

Country of ref document: EP

Kind code of ref document: A1