CN109194701A - A kind of data processing method and device - Google Patents

A kind of data processing method and device Download PDF

Info

Publication number
CN109194701A
CN109194701A CN201811457359.6A CN201811457359A CN109194701A CN 109194701 A CN109194701 A CN 109194701A CN 201811457359 A CN201811457359 A CN 201811457359A CN 109194701 A CN109194701 A CN 109194701A
Authority
CN
China
Prior art keywords
key
parameter
target data
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811457359.6A
Other languages
Chinese (zh)
Other versions
CN109194701B (en
Inventor
张立国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hundred Enlightenment Technology Co Ltd
Original Assignee
Beijing Hundred Enlightenment Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hundred Enlightenment Technology Co Ltd filed Critical Beijing Hundred Enlightenment Technology Co Ltd
Priority to CN201811457359.6A priority Critical patent/CN109194701B/en
Publication of CN109194701A publication Critical patent/CN109194701A/en
Application granted granted Critical
Publication of CN109194701B publication Critical patent/CN109194701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of data processing method and devices, comprising: server receives the ciphered data information from internet of things equipment;Ciphered data information is decrypted using preset algorithm and using itself pre-stored first key, obtains target data and parameter information;The second key is obtained using preset algorithm and using the length of target data and first key;The corresponding relationship of target data and affiliated parameter is obtained according to the second key and parameter information.From technical solution provided in an embodiment of the present invention, since server only has the information that could obtain the affiliated parameter of data from the second key using the preset algorithm determined in advance with terminal, and then the corresponding meaning of explicit data, therefore it avoids attacker and knows that the meaning of data to carry out data tampering, ensure that the safety of data.

Description

A kind of data processing method and device
Technical field
The present embodiments relate to internet of things field more particularly to a kind of data processing method and devices.
Background technique
Narrowband Internet of Things (Narrow Band Internet of Things, NB-IoT) is that a kind of new narrowband honeycomb is logical Believe low-power consumption wide area network (Low Power Wide Area Network, LPWAN) technology, the technology is in low rate traffic market Have and applies relatively broadly.However, with network environment safety worse and worse, NB-IoT technology be also faced with it is all in full According to such security threat such as distorting.Therefore, how to guarantee device data safety oneself become NB-IoT technology actually answering With middle urgent problem to be solved.
In the related technology, NB-IoT equipment, can be by data together with the affiliated parameter of data when sending data to server It is encrypted, then sends encrypted data and the affiliated parameter of data to server.
However, once this method attacker intercepts and captures and cracks encrypted data and the affiliated parameter of data, it will be able to root According to the meaning of the clear corresponding data of the affiliated parameter of data, and then data tampering is carried out, therefore not can guarantee the safety of data.
Summary of the invention
In order to solve the above-mentioned technical problem, the embodiment of the present invention provides a kind of data processing method and device, can be avoided Attacker knows the meaning of data and then carries out data tampering, guarantees the safety of data.
In order to reach purpose of the embodiment of the present invention, the embodiment of the invention provides a kind of data processing methods, comprising:
Server receives the ciphered data information from internet of things equipment;Wherein, the ciphered data information is the object What networked devices were generated using preset algorithm and using first key encryption target data and parameter information, the first key It is generated for the internet of things equipment using the preset algorithm and using the length of the target data and the second key, institute Stating the second key is what the internet of things equipment was generated according to the number and identification information of the affiliated parameter of the target data, described Parameter information is what the internet of things equipment spliced the affiliated parameter of target data;
The ciphered data information is solved using the preset algorithm and using itself pre-stored first key It is close, obtain the target data and the parameter information;
It is close that described second is obtained using the preset algorithm and using the length of the target data and the first key Key;
The corresponding relationship of the target data Yu affiliated parameter is obtained according to second key and the parameter information.
Second key be the internet of things equipment to the number of the affiliated parameter of the target data and identification information into Row splicing generates;
The corresponding relationship that target data and affiliated parameter are obtained according to the second key and parameter information, comprising:
The number and identification information of the affiliated parameter of the target data are obtained according to second key;
According to parameter information described in the number of the affiliated parameter of the target data and identification information cutting, the target is obtained The parameter of data;
The affiliated parameter of the target data and the target data is respectively corresponded, obtain the target data with it is affiliated The corresponding relationship of parameter.
The identification information of the affiliated parameter of target data includes: the initial of the affiliated parameter of the target data.
The preset algorithm includes: close 4 algorithm of state.
The embodiment of the invention provides a kind of data processing methods, comprising:
Internet of things equipment generates the second key according to the number and identification information of the affiliated parameter of target data to be transmitted, and The affiliated parameter of all target datas is spliced to obtain parameter information;
First key is generated using preset algorithm and using the length of the target data and second key;
The target data and the parameter information are encrypted using the preset algorithm and using the first key, is obtained To ciphered data information;
The ciphered data information is sent to server.
It is described that second key is generated according to the number and identification information of the affiliated parameter of target data to be transmitted, comprising:
The identification information of the number of the affiliated parameter of the target data and the affiliated parameter of the target data is spliced, Obtain second key.
The identification information of the affiliated parameter of target data includes: the initial of parameter described in the target data.
The preset algorithm includes: close 4 algorithm of state.
The embodiment of the invention provides a kind of servers, comprising:
Receiving module, for receiving the ciphered data information from internet of things equipment;Wherein, the ciphered data information is What the internet of things equipment was generated using preset algorithm and using first key encryption target data and parameter information, described the One key is that the internet of things equipment is generated using the preset algorithm and using the length of the target data and the second key , second key is that the internet of things equipment is generated according to the number and identification information of the affiliated parameter of the target data , the parameter information is what the internet of things equipment spliced the affiliated parameter of target data;
First processing module, using the preset algorithm and using itself pre-stored first key to the encryption Data information is decrypted, and obtains the target data and the parameter information;
The first processing module is also used to using the preset algorithm and utilizes the length of the target data and institute It states first key and obtains second key;
The first processing module is also used to obtain the target data according to second key and the parameter information With the corresponding relationship of affiliated parameter.
The embodiment of the invention provides a kind of internet of things equipment, comprising:
Second processing module, for generating second according to the number and identification information of the affiliated parameter of target data to be transmitted Key, and the affiliated parameter of all target datas is spliced to obtain parameter information;
The Second processing module is also used to using preset algorithm and utilizes the length of the target data and described the Two keys generate first key;
The Second processing module is also used to encrypt the mesh using the preset algorithm and using the first key Data and the parameter information are marked, ciphered data information is obtained;
Sending module, for the ciphered data information to be sent to server.
The other feature and advantage of the embodiment of the present invention will illustrate in the following description, also, partly from explanation It is become apparent in book, or understood by implementing the embodiment of the present invention.The purpose of the embodiment of the present invention and other advantages It can be achieved and obtained by structure specifically noted in the specification, claims and drawings.
Detailed description of the invention
Attached drawing is used to provide one for further understanding technical solution of the embodiment of the present invention, and constituting specification Point, it is used to explain the present invention the technical solution of embodiment together with embodiments herein, does not constitute to the embodiment of the present invention The limitation of technical solution.
Fig. 1 is a kind of flow diagram of data processing method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data processing method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another data processing method provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of internet of things equipment provided in an embodiment of the present invention.
Specific embodiment
Understand in order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing pair The embodiment of the embodiment of the present invention is described in detail.It should be noted that in the absence of conflict, the implementation in the application Feature in example and embodiment can mutual any combination.
The embodiment of the present invention provides a kind of data processing method, as shown in Figure 1, this method comprises:
Step 101, server receive the ciphered data information from internet of things equipment.
Wherein, ciphered data information is internet of things equipment using preset algorithm and utilizes first key encryption target data It is generated with parameter information, first key is internet of things equipment using preset algorithm and utilizes the length and second of target data What key generated, the second key is what internet of things equipment was generated according to the number and identification information of the affiliated parameter of target data, ginseng Number information is what internet of things equipment spliced the affiliated parameter of target data.
It should be noted that internet of things equipment can be NB-IoT equipment.
Step 102 solves ciphered data information using preset algorithm and using itself pre-stored first key It is close, obtain target data and parameter information.
Step 103 obtains the second key using preset algorithm and using the length of target data and first key.
Step 104, the corresponding relationship that target data and affiliated parameter are obtained according to the second key and parameter information.
Data processing method provided by the embodiment of the present invention, server receive the encryption data letter from internet of things equipment Breath;Wherein, ciphered data information is internet of things equipment using preset algorithm and utilizes first key encryption target data and parameter What information generated, first key is that internet of things equipment uses preset algorithm, and utilizes the length of target data and the life of the second key At, what the second key generated for internet of things equipment according to the number and identification information of the affiliated parameter of target data, parameter information Spliced for affiliated parameter of the internet of things equipment to target data;It is deposited in advance using preset algorithm and using itself Ciphered data information is decrypted in the first key of storage, obtains target data and parameter information;Using preset algorithm and utilize The length and first key of target data obtain the second key;According to the second key and parameter information obtain target data with it is affiliated The corresponding relationship of parameter.From technical solution provided in an embodiment of the present invention as it can be seen that since server only has utilization in advance and terminal Determining preset algorithm could obtain the information of the affiliated parameter of data, and then the corresponding meaning of explicit data from the second key, Therefore it avoids attacker and knows that the meaning of data to carry out data tampering, ensure that the safety of data.
Optionally, the second key is that internet of things equipment splices the number and identification information of the affiliated parameter of target data It generates.
The corresponding relationship of target data and affiliated parameter is obtained according to the second key and parameter information, comprising:
Step 104a, the number and identification information of the affiliated parameter of target data are obtained according to the second key.
Step 104b, according to the number of the affiliated parameter of target data and identification information cutting parameter information, number of targets is obtained According to parameter.
Step 104c, the affiliated parameter of target data and target data is respectively corresponded, obtains target data and affiliated ginseng Several corresponding relationships.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of the affiliated parameter of target data.
Optionally, preset algorithm includes: close 4 algorithm of state.
Specifically, it is that national Password Management office issued on March 21st, 2012 that state close 4 (SM4) algorithm, which refers to, at home extensively General WLAN authentication and privacy infrastructure (the Wireless LAN Authentication and Privacy used Infrastructure, WAPI) Encryption Algorithm used in standard is the non-equilibrium Feistel structures of iteration of 32 wheel of one kind Block encryption algorithm, key length and block length are 128.Algorithm used in the encryption process of SMS4 algorithm has been Exactly the same, unique difference is that the decruption key of the algorithm is obtained after carrying out backward transformation by its encryption key (i.e. key belongs to symmetric mode).
The embodiment of the present invention provides a kind of data processing method, as shown in Fig. 2, this method comprises:
Step 201, internet of things equipment generate the according to the number and identification information of the affiliated parameter of target data to be transmitted Two keys, and the affiliated parameter of all target datas is spliced to obtain parameter information.
Step 202 generates first key using preset algorithm and using the length of target data and the second key.
Step 203 encrypts target data and parameter information using preset algorithm and using first key, obtains encryption number It is believed that breath.
Ciphered data information is sent to server by step 204.
Data processing method provided by the embodiment of the present invention, internet of things equipment are joined according to belonging to target data to be transmitted Several numbers and identification information generate the second key, and are spliced to obtain parameter letter to the affiliated parameter of all target datas Breath;First key is generated using preset algorithm and using the length of target data and the second key;Using preset algorithm and benefit Target data and parameter information are encrypted with first key, obtains ciphered data information;Ciphered data information is sent to server. From technical solution provided in an embodiment of the present invention as it can be seen that since server only has using the preset algorithm determined in advance with terminal The information of the affiliated parameter of data, and then the corresponding meaning of explicit data can be obtained from the second key, therefore avoid attacker Know that the meaning of data to carry out data tampering, ensure that the safety of data.
Optionally, the second key is generated according to the number of the affiliated parameter of target data to be transmitted and identification information, comprising:
The identification information of the number of the affiliated parameter of target data and the affiliated parameter of target data is spliced, obtains second Key.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of target data parameter.
Optionally, preset algorithm includes: close 4 algorithm of state.
The embodiment of the present invention also provides a kind of data processing method, as shown in figure 3, method includes the following steps:
Step 301, starting NB-IoT equipment equipment and Internet of Things network interface card: being inserted into Internet of Things card for NBIOT equipment first, according to The classification of Internet of Things network interface card executes corresponding networking initialization command, reaches equipment and successfully enters net state.
Step 302, NB-IoT equipment generate after the second cipher key T key:NBIOT equipment networks, according to the network transmission protocol, Such as (Message Queuing Telemetry Transport, MQTT), limited applications agreement are transmitted in message queue telemetering (The Constrained Application Protocol, CAoP) or hypertext transfer protocol (HyperText Transfer Protocol, HTTP) etc. obtain finally send AT instruction number of parameters and length.Then encryption function is write, The implementation method of encryption function are as follows: a, parameter sort according to initial, and obtain the value of number of parameters and initial.B, it will obtain Value binary data is obtained by gebyte method, then take wherein 16bit data illustrate here as the second cipher key T key Lower second cipher key T key main function is the key for making a living into real sm4 algorithm, i.e. first key key prepares, so can To take preceding 16bit, also desirable rear 16bit is ok, and must be selected according to user oneself.
Step 303, NB-IoT equipment generate first key key: the length of encrypted data and the second cipher key T key are made Sm4_setkey function is called to generate first key key for parameter.
Step 304, NB-IoT equipment calls SM4 encryption: sm4_setkey_enc is called using the key that step 3 generates (sm4_context*ctx, unsigned char key [16]) function encrypts target data and parameter information, generates Ciphertext.
Step 305, NB-IoT equipment send ciphertext to server: NB-IoT equipment, which instructs ciphertext by AT, adds sm4 Ciphertext is obtained after close, and server is passed to by NB-IoT network.
Step 306, server calls SM4 decryption: server received data packet simultaneously uses pre-stored first key solution Ciphertext data are analysed, m4_setkey_dec (sm4_context*ctx, unsigned char key [16]) function is called to solve It is close, obtain target data and parameter information.
Step 307, server obtain the second cipher key T key: server makees the length of target data and first key key M4_setkey function is called to obtain the second cipher key T key for parameter.
Step 308, server, which obtain, is encrypted the corresponding parameter of data: server is according to the second cipher key T key cutting parameter Information obtains each affiliated parameter for being encrypted data.
It should be noted that data processing method provided in an embodiment of the present invention is after SM4 algorithm is cracked by backward, due to Only definition rule obtain author just know this in plain text meaning so that obtain data be still disabled plaintext number According to, therefore ensure that data obtain integrality, and improve encryption intensity, it finally ensure that the Information Security of NBIOT equipment.
The embodiment of the present invention also provides a kind of server, as shown in figure 4, the server 4 includes:
Receiving module 41, for receiving the ciphered data information from internet of things equipment;Wherein, ciphered data information is object What networked devices were generated using preset algorithm and using first key encryption target data and parameter information, first key is object Networked devices use preset algorithm, and generated using the length of target data and the second key, the second key sets for Internet of Things Standby according to the generation of the number and identification information of the affiliated parameter of target data, parameter information is internet of things equipment to target data What affiliated parameter was spliced.
First processing module 42, for using preset algorithm and using itself pre-stored first key to encryption number It is believed that breath is decrypted, target data and parameter information are obtained.
First processing module 42 is also used to obtain using preset algorithm and using the length of target data and first key Second key.
First processing module 42 is also used to obtain pair of target data and affiliated parameter according to the second key and parameter information It should be related to.
Optionally, the second key is that internet of things equipment splices the number and identification information of the affiliated parameter of target data It generates.First processing module 42 is specifically used for:
The number and identification information of the affiliated parameter of target data are obtained according to the second key.
According to the number of the affiliated parameter of target data and identification information cutting parameter information, the parameter of target data is obtained.
The affiliated parameter of target data and target data is respectively corresponded, target data pass corresponding with affiliated parameter is obtained System.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of the affiliated parameter of target data.
Optionally, preset algorithm includes: close 4 algorithm of state.
Server provided by the embodiment of the present invention receives the ciphered data information from internet of things equipment;Wherein, it encrypts Data information is that internet of things equipment is generated using preset algorithm and using first key encryption target data and parameter information, First key is what internet of things equipment used preset algorithm, and was generated using the length of target data and the second key, and second is close Key is what internet of things equipment was generated according to the number and identification information of the affiliated parameter of target data, and parameter information is internet of things equipment The affiliated parameter of target data is spliced;Using preset algorithm and utilize itself pre-stored first key Ciphered data information is decrypted, target data and parameter information are obtained;Using preset algorithm and utilize the length of target data Degree and first key obtain the second key;Target data pass corresponding with affiliated parameter is obtained according to the second key and parameter information System.From technical solution provided in an embodiment of the present invention as it can be seen that utilizing the pre- imputation determined in advance with terminal since server only has Method could obtain the information of the affiliated parameter of data, and then the corresponding meaning of explicit data from the second key, therefore avoid and attack The person of hitting knows that the meaning of data to carry out data tampering, ensure that the safety of data.
In practical applications, the receiving module 41 and first processing module 42 can be by the centres in server Manage device (Central Processing Unit, CPU), microprocessor (Micro Processor Unit, MPU), digital signal Processor (Digital Signal Processor, DSP) or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realize.
The embodiment of the present invention also provides a kind of internet of things equipment, as shown in figure 5, the internet of things equipment 5 includes:
Second processing module 51, for generating the according to the number and identification information of the affiliated parameter of target data to be transmitted Two keys, and the affiliated parameter of all target datas is spliced to obtain parameter information.
Second processing module 51 is also used to generate using preset algorithm and using the length of target data and the second key First key.
Second processing module 51 is also used to believe using preset algorithm and using first key encryption target data and parameter Breath, obtains ciphered data information.
Sending module 52, for ciphered data information to be sent to server.
Optionally, Second processing module 51, specifically for will be belonging to the number and target data of the affiliated parameter of target data The identification information of parameter is spliced, and the second key is obtained.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of target data parameter.
Optionally, preset algorithm includes: close 4 algorithm of state.
Internet of things equipment provided by the embodiment of the present invention, according to the number and mark of the affiliated parameter of target data to be transmitted Know information and generate the second key, and the affiliated parameter of all target datas is spliced to obtain parameter information;Using pre- imputation Method simultaneously generates first key using the length of target data and the second key;It is encrypted using preset algorithm and using first key Target data and parameter information, obtain ciphered data information;Ciphered data information is sent to server.From the embodiment of the present invention The technical solution of offer since server only has as it can be seen that utilize the preset algorithm determined in advance with terminal could be from the second key The information of the affiliated parameter of data, and then the corresponding meaning of explicit data are obtained, therefore avoids the meaning that attacker knows data To carry out data tampering, the safety of data ensure that.
In practical applications, the Second processing module 51 and sending module 52 can be by being located in internet of things equipment CPU, MPU, DSP or FPGA etc. are realized.
The embodiment of the present invention also provides a kind of data processing equipment, including first memory and first processor, wherein the The following order that can be executed by first processor is stored in one memory:
Receive the ciphered data information from internet of things equipment;Wherein, ciphered data information is internet of things equipment using pre- Imputation method simultaneously utilizes first key encryption target data and parameter information to generate, and first key is internet of things equipment using in advance Imputation method, and generated using the length of target data and the second key, the second key is internet of things equipment according to target data What the number and identification information of affiliated parameter generated, parameter information is that internet of things equipment spells the affiliated parameter of target data It connects.
Ciphered data information is decrypted using preset algorithm and using itself pre-stored first key, is obtained Target data and parameter information.
The second key is obtained using preset algorithm and using the length of target data and first key.
The corresponding relationship of target data and affiliated parameter is obtained according to the second key and parameter information.
Optionally, the second key is that internet of things equipment splices the number and identification information of the affiliated parameter of target data It generates.The following order that can be executed by first processor is specifically stored in first memory:
The number and identification information of the affiliated parameter of target data are obtained according to the second key.
According to the number of the affiliated parameter of target data and identification information cutting parameter information, the parameter of target data is obtained.
The affiliated parameter of target data and target data is respectively corresponded, target data pass corresponding with affiliated parameter is obtained System.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of the affiliated parameter of target data.
Optionally, preset algorithm includes: close 4 algorithm of state.
The embodiment of the present invention also provides a kind of data processing equipment, including second memory and second processor, wherein the The following order that can be executed by second processor is stored in two memories:
The second key is generated according to the number of the affiliated parameter of target data to be transmitted and identification information, and to all targets The affiliated parameter of data is spliced to obtain parameter information.
First key is generated using preset algorithm and using the length of target data and the second key.
Using preset algorithm and using first key encryption target data and parameter information, ciphered data information is obtained.
Ciphered data information is sent to server.
Optionally, the following order that can be executed by second processor is specifically stored in second memory:
The identification information of the number of the affiliated parameter of target data and the affiliated parameter of target data is spliced, obtains second Key.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of target data parameter.
Optionally, preset algorithm includes: close 4 algorithm of state.
The embodiment of the present invention also provides a kind of computer readable storage medium, and it is executable that computer is stored on storage medium Order, computer executable command is for executing following steps:
Receive the ciphered data information from internet of things equipment;Wherein, ciphered data information is internet of things equipment using pre- Imputation method simultaneously utilizes first key encryption target data and parameter information to generate, and first key is internet of things equipment using in advance Imputation method, and generated using the length of target data and the second key, the second key is internet of things equipment according to target data What the number and identification information of affiliated parameter generated, parameter information is that internet of things equipment spells the affiliated parameter of target data It connects.
Ciphered data information is decrypted using preset algorithm and using itself pre-stored first key, is obtained Target data and parameter information.
The second key is obtained using preset algorithm and using the length of target data and first key.
The corresponding relationship of target data and affiliated parameter is obtained according to the second key and parameter information.
Optionally, the second key is that internet of things equipment splices the number and identification information of the affiliated parameter of target data It generates.Computer executable command is specifically used for executing following steps:
The number and identification information of the affiliated parameter of target data are obtained according to the second key.
According to the number of the affiliated parameter of target data and identification information cutting parameter information, the parameter of target data is obtained.
The affiliated parameter of target data and target data is respectively corresponded, target data pass corresponding with affiliated parameter is obtained System.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of the affiliated parameter of target data.
Optionally, preset algorithm includes: close 4 algorithm of state.
The embodiment of the present invention also provides a kind of computer readable storage medium, and it is executable that computer is stored on storage medium Order, computer executable command is for executing following steps:
The second key is generated according to the number of the affiliated parameter of target data to be transmitted and identification information, and to all targets The affiliated parameter of data is spliced to obtain parameter information.
First key is generated using preset algorithm and using the length of target data and the second key.
Using preset algorithm and using first key encryption target data and parameter information, ciphered data information is obtained.
Ciphered data information is sent to server.
Optionally, computer executable command is specifically used for executing following steps:
The identification information of the number of the affiliated parameter of target data and the affiliated parameter of target data is spliced, obtains second Key.
Optionally, the identification information of the affiliated parameter of target data includes: the initial of target data parameter.
Optionally, preset algorithm includes: close 4 algorithm of state.
Although embodiment disclosed by the embodiment of the present invention is as above, only the present invention is real for ease of understanding for the content The embodiment applying example and using is not intended to limit the invention embodiment.Skill in any fields of the embodiment of the present invention Art personnel can be in the form and details of implementation under the premise of not departing from spirit and scope disclosed by the embodiment of the present invention It is upper to carry out any modification and variation, but the scope of patent protection of the embodiment of the present invention, it still must be with appended claims institute Subject to the range defined.

Claims (10)

1. a kind of data processing method characterized by comprising
Server receives the ciphered data information from internet of things equipment;Wherein, the ciphered data information is the Internet of Things What equipment was generated using preset algorithm and using first key encryption target data and parameter information, the first key is institute Internet of things equipment is stated using the preset algorithm, and is generated using the length of the target data and the second key, described the What two keys generated for the internet of things equipment according to the number and identification information of the affiliated parameter of the target data, the parameter Information is what the internet of things equipment spliced the affiliated parameter of target data;
The ciphered data information is decrypted using the preset algorithm and using itself pre-stored first key, Obtain the target data and the parameter information;
Second key is obtained using the preset algorithm and using the length of the target data and the first key;
The corresponding relationship of the target data Yu affiliated parameter is obtained according to second key and the parameter information.
2. data processing method according to claim 1, which is characterized in that second key is the internet of things equipment Number and identification information to the affiliated parameter of the target data carry out splicing generation;
The corresponding relationship that target data and affiliated parameter are obtained according to the second key and parameter information, comprising:
The number and identification information of the affiliated parameter of the target data are obtained according to second key;
According to parameter information described in the number of the affiliated parameter of the target data and identification information cutting, the target data is obtained The parameter;
The affiliated parameter of the target data and the target data is respectively corresponded, the target data and affiliated parameter are obtained Corresponding relationship.
3. data processing method according to claim 1 or 2, which is characterized in that the mark of the affiliated parameter of target data Know the initial that information includes: the affiliated parameter of the target data.
4. data processing method according to claim 1, which is characterized in that the preset algorithm includes: close 4 algorithm of state.
5. a kind of data processing method characterized by comprising
Internet of things equipment generates the second key according to the number and identification information of the affiliated parameter of target data to be transmitted, and to institute There is the affiliated parameter of target data to be spliced to obtain parameter information;
First key is generated using preset algorithm and using the length of the target data and second key;
The target data and the parameter information are encrypted using the preset algorithm and using the first key, is added Ciphertext data information;
The ciphered data information is sent to server.
6. data processing method according to claim 5, which is characterized in that described according to belonging to target data to be transmitted The number and identification information of parameter generate the second key, comprising:
The identification information of the number of the affiliated parameter of the target data and the affiliated parameter of the target data is spliced, is obtained Second key.
7. data processing method according to claim 5 or 6, which is characterized in that the mark of the affiliated parameter of target data Know the initial that information includes: parameter described in the target data.
8. data processing method according to claim 5, which is characterized in that the preset algorithm includes: close 4 algorithm of state.
9. a kind of server characterized by comprising
Receiving module, for receiving the ciphered data information from internet of things equipment;Wherein, the ciphered data information is described What internet of things equipment was generated using preset algorithm and using first key encryption target data and parameter information, described first is close Key is that the internet of things equipment is generated using the preset algorithm and using the length of the target data and the second key, What second key generated for the internet of things equipment according to the number and identification information of the affiliated parameter of the target data, institute Stating parameter information is what the internet of things equipment spliced the affiliated parameter of target data;
First processing module, using the preset algorithm and using itself pre-stored first key to the encryption data Information is decrypted, and obtains the target data and the parameter information;
The first processing module is also used to using the preset algorithm and utilizes the length of the target data and described the One key obtains second key;
The first processing module is also used to obtain the target data and institute according to second key and the parameter information Belong to the corresponding relationship of parameter.
10. a kind of internet of things equipment characterized by comprising
Second processing module, it is close for generating second according to the number and identification information of the affiliated parameter of target data to be transmitted Key, and the affiliated parameter of all target datas is spliced to obtain parameter information;
The Second processing module is also used to using preset algorithm and utilizes the length of the target data and described second close Key generates first key;
The Second processing module is also used to encrypt the number of targets using the preset algorithm and using the first key According to the parameter information, obtain ciphered data information;
Sending module, for the ciphered data information to be sent to server.
CN201811457359.6A 2018-11-30 2018-11-30 Data processing method and device Active CN109194701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811457359.6A CN109194701B (en) 2018-11-30 2018-11-30 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811457359.6A CN109194701B (en) 2018-11-30 2018-11-30 Data processing method and device

Publications (2)

Publication Number Publication Date
CN109194701A true CN109194701A (en) 2019-01-11
CN109194701B CN109194701B (en) 2021-02-19

Family

ID=64938465

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811457359.6A Active CN109194701B (en) 2018-11-30 2018-11-30 Data processing method and device

Country Status (1)

Country Link
CN (1) CN109194701B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033286A (en) * 2019-04-09 2019-07-19 安谋科技(中国)有限公司 Product false proof verification method, device, readable medium, system and equipment
CN110868294A (en) * 2019-12-09 2020-03-06 北京智宝云科科技有限公司 Key updating method, device and equipment
CN113630370A (en) * 2020-05-08 2021-11-09 许继集团有限公司 Communication system based on STM32 and Internet of things communication module and improved MQTT communication method
CN113992427A (en) * 2020-12-23 2022-01-28 技象科技(浙江)有限公司 Data encryption sending method and device based on adjacent nodes

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853985A (en) * 2012-12-05 2014-06-11 ***通信集团黑龙江有限公司 Data encryption method, decryption method and decryption device
US20160285635A1 (en) * 2014-09-02 2016-09-29 Alcatel-Lucent Usa Inc. Secure communication of data between devices
CN106973048A (en) * 2017-03-21 2017-07-21 南京云创大数据科技股份有限公司 A kind of method that intelligent hardware devices data are safely and fast stored on publicly-owned cloud service platform
CN107800716A (en) * 2017-11-14 2018-03-13 中国银行股份有限公司 A kind of data processing method and device
CN107911370A (en) * 2017-11-22 2018-04-13 深圳市智物联网络有限公司 A kind of data ciphering method and device, data decryption method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103853985A (en) * 2012-12-05 2014-06-11 ***通信集团黑龙江有限公司 Data encryption method, decryption method and decryption device
US20160285635A1 (en) * 2014-09-02 2016-09-29 Alcatel-Lucent Usa Inc. Secure communication of data between devices
CN106973048A (en) * 2017-03-21 2017-07-21 南京云创大数据科技股份有限公司 A kind of method that intelligent hardware devices data are safely and fast stored on publicly-owned cloud service platform
CN107800716A (en) * 2017-11-14 2018-03-13 中国银行股份有限公司 A kind of data processing method and device
CN107911370A (en) * 2017-11-22 2018-04-13 深圳市智物联网络有限公司 A kind of data ciphering method and device, data decryption method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033286A (en) * 2019-04-09 2019-07-19 安谋科技(中国)有限公司 Product false proof verification method, device, readable medium, system and equipment
CN110868294A (en) * 2019-12-09 2020-03-06 北京智宝云科科技有限公司 Key updating method, device and equipment
CN110868294B (en) * 2019-12-09 2023-03-24 北京智宝云科科技有限公司 Key updating method, device and equipment
CN113630370A (en) * 2020-05-08 2021-11-09 许继集团有限公司 Communication system based on STM32 and Internet of things communication module and improved MQTT communication method
CN113630370B (en) * 2020-05-08 2023-03-31 许继集团有限公司 Communication system based on STM32 and Internet of things communication module and improved MQTT communication method
CN113992427A (en) * 2020-12-23 2022-01-28 技象科技(浙江)有限公司 Data encryption sending method and device based on adjacent nodes
CN113992427B (en) * 2020-12-23 2023-08-25 技象科技(南京)有限公司 Data encryption sending method and device based on adjacent nodes

Also Published As

Publication number Publication date
CN109194701B (en) 2021-02-19

Similar Documents

Publication Publication Date Title
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
CN109194701A (en) A kind of data processing method and device
CN102007727B (en) Method for distributing encryption means
Mektoubi et al. New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve
Saxena et al. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication
CN104023013A (en) Data transmission method, server side and client
CN104821874A (en) Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
CN103560879A (en) Method for achieving lightweight authentication and key agreement
CN101707767B (en) Data transmission method and devices
CN109756877A (en) A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment
CN106850191A (en) The encryption and decryption method and device of distributed memory system communication protocol
CN107210915A (en) It is mutually authenticated
CN109586924A (en) A kind of intelligent distribution network data safe transmission method based on cloud computing
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
WO2013182632A1 (en) Random number distribution
CN106230840B (en) A kind of command identifying method of high security
CN111416712A (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN113795023B (en) Bluetooth data transmission encryption method based on chaotic sequence and packet encryption
Li IoT node authentication
CN108650277A (en) A kind of data encryption and transmission method
Agosta et al. Cyber-security analysis and evaluation for smart home management solutions
CN112039654A (en) Electric meter data security acquisition method for resisting man-in-the-middle attack
Bhardwaj et al. Message queuing telemetry transport-secure connection: a power-efficient secure communication
CN110417804A (en) A kind of bidirectional identity authentication encryption communication method and system suitable for chip microcontroller
CN114386020A (en) Quick secondary identity authentication method and system based on quantum security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant