CN118487716B - An Internet of Things processing method and system for data exchange - Google Patents
An Internet of Things processing method and system for data exchange Download PDFInfo
- Publication number
- CN118487716B CN118487716B CN202410913144.XA CN202410913144A CN118487716B CN 118487716 B CN118487716 B CN 118487716B CN 202410913144 A CN202410913144 A CN 202410913144A CN 118487716 B CN118487716 B CN 118487716B
- Authority
- CN
- China
- Prior art keywords
- target
- data
- code
- sequence
- dimensional
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 13
- 108091026890 Coding region Proteins 0.000 claims abstract description 65
- 238000013507 mapping Methods 0.000 claims abstract description 59
- 238000012795 verification Methods 0.000 claims abstract description 59
- 238000012545 processing Methods 0.000 claims abstract description 51
- 238000000034 method Methods 0.000 claims description 57
- 230000006870 function Effects 0.000 claims description 30
- 238000004458 analytical method Methods 0.000 claims description 7
- 238000010276 construction Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 abstract description 54
- 238000004590 computer program Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 239000007787 solid Substances 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 2
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0006—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format
- H04L1/0007—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the transmission format by modifying the frame length
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/0001—Systems modifying transmission characteristics according to link quality, e.g. power backoff
- H04L1/0014—Systems modifying transmission characteristics according to link quality, e.g. power backoff by adapting the source coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及数据传输领域,尤其涉及一种用于数据交换的物联网处理方法及系统。The present invention relates to the field of data transmission, and in particular to an Internet of Things processing method and system for data exchange.
背景技术Background Art
当前的物联网数据交换主要有两种方式:无加密的直接交换和加密交换。无加密的直接交换虽然简便,但存在严重的安全隐患,数据在传输过程中容易被截获、篡改或窃取,无法满足安全需求。There are two main ways of IoT data exchange: direct exchange without encryption and encrypted exchange. Although direct exchange without encryption is simple, it has serious security risks. Data can be easily intercepted, tampered or stolen during transmission, which cannot meet security requirements.
加密交换通过加密技术保障数据安全,但其缺点在于需要部署复杂的加密和解密规则。这些规则不仅增加了系统的实现复杂性,还会显著增加数据传输的数据量。具体而言,加密数据相较于原始数据,往往会有一定的冗余,导致传输负担加重,影响数据交换的效率和性能。此外,解密过程需要额外的计算资源,增加了设备的功耗和延迟。Encrypted exchange ensures data security through encryption technology, but its disadvantage is that it requires the deployment of complex encryption and decryption rules. These rules not only increase the complexity of system implementation, but also significantly increase the amount of data transmitted. Specifically, encrypted data often has a certain degree of redundancy compared to original data, which increases the transmission burden and affects the efficiency and performance of data exchange. In addition, the decryption process requires additional computing resources, which increases the power consumption and latency of the device.
因此,现有技术在物联网数据交换中,要么无法保证数据安全,要么因为加密而增加了数据交换的负担,亟需一种新的方法来平衡数据安全与传输效率。Therefore, in the data exchange of the Internet of Things, the existing technologies either cannot guarantee data security or increase the burden of data exchange due to encryption. A new method is urgently needed to balance data security and transmission efficiency.
发明内容Summary of the invention
本发明针对现有技术直接交换和加密交换存在无法平衡数据安全与传输效率的技术问题,提供一种用于数据交换的物联网处理方法及系统来解决。The present invention aims to solve the technical problem that the direct exchange and encrypted exchange in the prior art cannot balance data security and transmission efficiency, and provides an Internet of Things processing method and system for data exchange to solve the problem.
本发明解决上述技术问题的技术方案如下:The technical solution of the present invention to solve the above technical problems is as follows:
第一方面,本发明提供了一种用于数据交换的物联网处理方法,应用于物联网节点数据中心,包括:接收数据交换请求,其中,所述数据交换请求包括目标数据属性、目标数据来源和目标数据时间戳;根据所述目标数据属性、所述目标数据来源和所述目标数据时间戳从数据库匹配目标交换数据;对所述目标交换数据按照顺序,构建目标高维数组;对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应;对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,其中,任意一个所述目标编码排列结果的目标编码坐标和所述目标编码序列的目标编码序号一一对应;对所述目标编码排列结果进行模糊处理,生成待传输数据集,其中,所述待传输数据集具有模糊验证凭证;基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证;将所述模糊验证凭证和所述高维映射凭证通过短信发送至目标物联网节点,以及将所述待传输数据集发送至所述目标物联网节点。In a first aspect, the present invention provides an Internet of Things processing method for data exchange, which is applied to an Internet of Things node data center, comprising: receiving a data exchange request, wherein the data exchange request includes a target data attribute, a target data source, and a target data timestamp; matching target exchange data from a database according to the target data attribute, the target data source, and the target data timestamp; constructing a target high-dimensional array for the target exchange data in sequence; binary encoding the target high-dimensional array to generate a target coding sequence, wherein the target high-dimensional array has a one-to-one correspondence between the dimension and the sequence number interval of the target coding sequence; performing a two-dimensional plane random arrangement on the target coding sequence to generate a target coding arrangement result, wherein the target coding coordinates of any one of the target coding arrangement results correspond one-to-one to the target coding sequence number of the target coding sequence; performing fuzzy processing on the target coding arrangement result to generate a data set to be transmitted, wherein the data set to be transmitted has a fuzzy verification credential; constructing a high-dimensional mapping credential based on the target high-dimensional array, the target coding sequence, and the target coding arrangement result; sending the fuzzy verification credential and the high-dimensional mapping credential to the target Internet of Things node via SMS, and sending the data set to be transmitted to the target Internet of Things node.
第二方面,本发明提供了一种用于数据交换的物联网处理系统,应用于物联网节点数据中心,包括:用户端,用于接收数据交换请求,其中,所述数据交换请求包括目标数据属性、目标数据来源和目标数据时间戳;目标数据匹配模块,用于根据所述目标数据属性、所述目标数据来源和所述目标数据时间戳从数据库匹配目标交换数据;高维数组构建模块,用于对所述目标交换数据按照顺序,构建目标高维数组;目标数据编码模块,用于对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应;目标编码排列模块,用于对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,其中,任意一个所述目标编码排列结果的目标编码坐标和所述目标编码序列的目标编码序号一一对应;数据模糊处理模块,用于对所述目标编码排列结果进行模糊处理,生成待传输数据集,其中,所述待传输数据集具有模糊验证凭证;高维凭证生成模块,用于基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证;数据交换模块,用于将所述模糊验证凭证和所述高维映射凭证通过短信发送至目标物联网节点,以及将所述待传输数据集发送至所述目标物联网节点。In a second aspect, the present invention provides an Internet of Things processing system for data exchange, which is applied to an Internet of Things node data center, and includes: a user end, which is used to receive a data exchange request, wherein the data exchange request includes a target data attribute, a target data source, and a target data timestamp; a target data matching module, which is used to match the target exchange data from a database according to the target data attribute, the target data source, and the target data timestamp; a high-dimensional array construction module, which is used to construct a target high-dimensional array for the target exchange data in sequence; a target data encoding module, which is used to binary encode the target high-dimensional array to generate a target encoding sequence, wherein the target high-dimensional array has a one-to-one correspondence between the dimension and the sequence number interval of the target encoding sequence; a target encoding sequence A column module is used to perform a two-dimensional plane random arrangement of the target coding sequence to generate a target coding arrangement result, wherein the target coding coordinates of any one of the target coding arrangement results correspond to the target coding sequence number of the target coding sequence one by one; a data fuzzy processing module is used to perform fuzzy processing on the target coding arrangement result to generate a data set to be transmitted, wherein the data set to be transmitted has a fuzzy verification credential; a high-dimensional credential generation module is used to construct a high-dimensional mapping credential based on the target high-dimensional array, the target coding sequence and the target coding arrangement result; a data exchange module is used to send the fuzzy verification credential and the high-dimensional mapping credential to the target Internet of Things node via SMS, and send the data set to be transmitted to the target Internet of Things node.
本发明的有益效果是:通过对待传输代的目标数据进行编码后,再排列至二维平面,更进一步,利用模糊处理策略,得到最终的待传输数据;再生成还原数据的凭证数据通过短信发送至目标节点。由于待传输数据模糊了语义,保障了安全性,且通过编码技术压缩了数据,保障了数据传输效率,通过短信发送凭证保障了凭证的安全性,从而达到了保障数据传输效率以及安全性的技术效果。The beneficial effects of the present invention are: after encoding the target data to be transmitted, the target data is arranged in a two-dimensional plane, and further, the fuzzy processing strategy is used to obtain the final data to be transmitted; the credential data of the restored data is then generated and sent to the target node via SMS. Since the semantics of the data to be transmitted are blurred, security is guaranteed, and the data is compressed by encoding technology to ensure data transmission efficiency, and the security of the credential is guaranteed by sending the credential via SMS, thereby achieving the technical effect of ensuring data transmission efficiency and security.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为本发明提供的一种用于数据交换的物联网处理方法的流程示意图;FIG1 is a schematic flow chart of an Internet of Things processing method for data exchange provided by the present invention;
图2为本发明提供的一种用于数据交换的物联网处理的结构示意图;FIG2 is a schematic diagram of a structure of an Internet of Things process for data exchange provided by the present invention;
图3为本发明提供的电子设备的结构示意图;FIG3 is a schematic diagram of the structure of an electronic device provided by the present invention;
图4为本发明提供的一种计算机可读存储介质的结构示意图。FIG. 4 is a schematic diagram of the structure of a computer-readable storage medium provided by the present invention.
附图中,各标号所代表的部件列表如下:In the accompanying drawings, the components represented by the reference numerals are listed as follows:
用户端1000,目标数据匹配模块2000,高维数组构建模块3000,目标数据编码模块4000,目标编码排列模块5000,数据模糊处理模块6000,高维凭证生成模块7000,数据交换模块8000,电子设备500,存储器510,处理器520,计算机程序511,计算机可读存储介质600,计算机程序611。User end 1000, target data matching module 2000, high-dimensional array construction module 3000, target data encoding module 4000, target encoding arrangement module 5000, data fuzzy processing module 6000, high-dimensional credential generation module 7000, data exchange module 8000, electronic device 500, memory 510, processor 520, computer program 511, computer readable storage medium 600, computer program 611.
具体实施方式DETAILED DESCRIPTION
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work are within the scope of protection of the present invention.
在本发明的描述中,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个所述特征。在本发明的描述中,“多个”的含义是两个或两个以上,除非另有明确具体的限定。In the description of the present invention, the terms "first" and "second" are used for descriptive purposes only and should not be understood as indicating or implying relative importance or implicitly indicating the number of the indicated technical features. Thus, the features defined as "first" and "second" may explicitly or implicitly include one or more of the features. In the description of the present invention, the meaning of "plurality" is two or more, unless otherwise clearly and specifically defined.
在本发明的描述中,术语“例如”一词用来表示“用作例子、例证或说明”。本发明中被描述为“例如”的任何实施例不一定被解释为比其它实施例更优选或更具优势。为了使本领域任何技术人员能够实现和使用本发明,给出了以下描述。在以下描述中,为了解释的目的而列出了细节。应当明白的是,本领域普通技术人员可以认识到,在不使用这些特定细节的情况下也可以实现本发明。在其它实例中,不会对公知的结构和过程进行详细阐述,以避免不必要的细节使本发明的描述变得晦涩。因此,本发明并非旨在限于所示的实施例,而是与符合本发明所公开的原理和特征的最广范围相一致。In the description of the present invention, the term "for example" is used to mean "used as an example, illustration or explanation". Any embodiment described as "for example" in the present invention is not necessarily to be construed as being more preferred or advantageous than other embodiments. The following description is given to enable any technician in the field to implement and use the present invention. In the following description, details are listed for the purpose of explanation. It should be understood that a person of ordinary skill in the art can recognize that the present invention can be implemented without using these specific details. In other examples, well-known structures and processes will not be elaborated in detail to avoid obscuring the description of the present invention with unnecessary details. Therefore, the present invention is not intended to be limited to the embodiments shown, but is consistent with the widest scope consistent with the principles and features disclosed in the present invention.
实施例一:Embodiment 1:
如图1所示,本发明实施例提供了一种用于数据交换的物联网处理方法,应用于物联网节点数据中心,包括步骤:As shown in FIG1 , an embodiment of the present invention provides an Internet of Things processing method for data exchange, which is applied to an Internet of Things node data center and includes the steps of:
S10:接收数据交换请求,其中,所述数据交换请求包括目标数据属性、目标数据来源和目标数据时间戳;S10: receiving a data exchange request, wherein the data exchange request includes target data attributes, target data source and target data timestamp;
具体而言,当接收数据交换请求时,该请求包括目标数据属性、目标数据来源和目标数据时间戳。数据交换请求是发起数据交换操作时发送到服务器的请求信息,包含所需数据的属性、来源和时间信息。目标数据属性定义了需要交换的数据的具体属性或类型,例如温度数据、湿度数据、设备状态等。目标数据来源指明了数据的原始生成来源,如特定的物联网设备、传感器或数据收集节点。目标数据时间戳则是数据生成的具体时间点或时间范围,用于在数据库中查找特定时间段的数据。Specifically, when a data exchange request is received, the request includes the target data attributes, the target data source, and the target data timestamp. The data exchange request is the request information sent to the server when a data exchange operation is initiated, which contains the attributes, source, and time information of the required data. The target data attributes define the specific attributes or types of data to be exchanged, such as temperature data, humidity data, device status, etc. The target data source indicates the original source of the data, such as a specific IoT device, sensor, or data collection node. The target data timestamp is the specific time point or time range when the data is generated, which is used to find data for a specific time period in the database.
在接收数据交换请求的过程中,系统首先生成并接收到该请求。该请求详细列出了目标数据的属性、来源和时间信息。系统根据目标数据属性确定需要交换的数据类型,根据目标数据来源确定数据的生成设备或节点,并根据目标数据时间戳确定数据的生成时间范围。这些信息帮助系统精确定位需要交换的数据。具体的操作步骤包括接收请求、解析请求内容、确定数据类型、数据来源以及数据时间,从而为后续的数据匹配和处理提供准确依据。In the process of receiving a data exchange request, the system first generates and receives the request. The request lists the properties, source, and time information of the target data in detail. The system determines the type of data to be exchanged based on the properties of the target data, determines the data generation device or node based on the source of the target data, and determines the data generation time range based on the target data timestamp. This information helps the system accurately locate the data to be exchanged. The specific operation steps include receiving the request, parsing the request content, determining the data type, data source, and data time, thereby providing an accurate basis for subsequent data matching and processing.
通过这种方法,可以确保数据交换过程的精准性和针对性。系统能够根据接收到的请求信息迅速定位并处理目标数据,从而实现高效、安全的数据交换。这种方式不仅提高了数据交换的效率,还确保了数据的准确性和完整性,为物联网系统的数据管理和应用提供了可靠支持。This method can ensure the accuracy and pertinence of the data exchange process. The system can quickly locate and process the target data according to the received request information, thereby achieving efficient and secure data exchange. This method not only improves the efficiency of data exchange, but also ensures the accuracy and integrity of the data, providing reliable support for data management and application of the IoT system.
S20:根据所述目标数据属性、所述目标数据来源和所述目标数据时间戳从数据库匹配目标交换数据;S20: matching target exchange data from a database according to the target data attribute, the target data source and the target data timestamp;
具体而言,目标交换数据指的是需要进行交换的数据;数据库指的是用于存储物联网节点数据中心的采集数据的数据库,其至少具有三个索引条件,包括数据属性、数据来源和数据时间戳。Specifically, the target exchange data refers to the data that needs to be exchanged; the database refers to the database used to store the collected data of the IoT node data center, which has at least three index conditions, including data attributes, data sources and data timestamps.
在数据库中执行查询操作,通过筛选条件将数据库中的数据与请求中的目标数据属性、来源和时间戳进行匹配。这一过程确保提取出的数据符合请求的具体要求。匹配成功后,系统会将符合条件的数据标识为目标交换数据,以便于后续的处理和传输。Perform a query operation in the database and match the data in the database with the target data attributes, sources and timestamps in the request through screening conditions. This process ensures that the extracted data meets the specific requirements of the request. After a successful match, the system will identify the qualified data as the target exchange data for subsequent processing and transmission.
通过这种方法,系统能够准确地从数据库中筛选出所需的目标交换数据。这不仅提高了数据匹配的效率,还确保了数据的准确性和相关性。实现了数据交换请求与数据库数据的高效匹配,为后续的数据处理和传输提供了可靠的数据基础,优化了物联网数据交换的整体流程。Through this method, the system can accurately filter out the required target exchange data from the database. This not only improves the efficiency of data matching, but also ensures the accuracy and relevance of the data. It achieves efficient matching of data exchange requests with database data, provides a reliable data foundation for subsequent data processing and transmission, and optimizes the overall process of IoT data exchange.
S30:对所述目标交换数据按照顺序,构建目标高维数组;S30: constructing a target high-dimensional array for the target exchange data in order;
具体而言,高维数组是一种多维数据结构,可以存储和处理大量的复杂数据。在构建目标高维数组的过程中,首先需要将匹配到的目标交换数据按照预定的顺序进行排序。优选地,这种排序可以基于数据生成的时间。Specifically, a high-dimensional array is a multidimensional data structure that can store and process a large amount of complex data. In the process of constructing the target high-dimensional array, the matched target exchange data first need to be sorted in a predetermined order. Preferably, this sorting can be based on the time when the data was generated.
S40:对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应;S40: binary-encoding the target high-dimensional array to generate a target encoding sequence, wherein the target high-dimensional array has a one-to-one correspondence between the dimensions and the sequence number intervals of the target encoding sequence;
具体而言,二进制编码是将数据转换为二进制数,即由0和1组成的序列的过程,使得计算机系统能够处理和传输这些数据。目标编码序列则是将目标高维数组进行二进制编码后生成的编码序列,用于后续的数据传输和处理。Specifically, binary encoding is the process of converting data into binary numbers, that is, a sequence of 0s and 1s, so that computer systems can process and transmit these data. The target encoding sequence is the encoding sequence generated after binary encoding of the target high-dimensional array, which is used for subsequent data transmission and processing.
在对目标高维数组进行二进制编码的过程中,首先需要对目标高维数组中的每个数据元素进行二进制编码。具体而言,这个过程包括将数据元素转换为二进制数,例如数据值“10”编码为“1010”,数据值“255”编码为“11111111”。每个数据元素都需要进行这样的编码转换。接着,将所有编码后的二进制数按照原始高维数组的顺序排列,生成目标编码序列。这个序列保留了原始数据在高维数组中的顺序和关系,确保数据在传输和解码时能够正确还原,因此目标高维数组为维度和所述目标编码序列的序号区间一一对应。In the process of binary encoding the target high-dimensional array, each data element in the target high-dimensional array needs to be binary encoded first. Specifically, this process includes converting the data elements into binary numbers, for example, the data value "10" is encoded as "1010", and the data value "255" is encoded as "11111111". Each data element needs to undergo such encoding conversion. Then, all the encoded binary numbers are arranged in the order of the original high-dimensional array to generate a target encoding sequence. This sequence retains the order and relationship of the original data in the high-dimensional array, ensuring that the data can be correctly restored during transmission and decoding, so the target high-dimensional array has a one-to-one correspondence between the dimensions and the serial number intervals of the target encoding sequence.
S50:对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,其中,任意一个所述目标编码排列结果的目标编码坐标和所述目标编码序列的目标编码序号一一对应;S50: performing a two-dimensional random arrangement of the target code sequence to generate a target code arrangement result, wherein the target code coordinates of any one of the target code arrangement results correspond to the target code sequence number of the target code sequence in a one-to-one manner;
具体而言,二维平面随机排列是将目标编码序列中的数据元素随机分布在一个二维平面上。目标编码排列结果是这种随机排列后的结果,其中,任意一个目标编码排列结果的目标编码坐标和目标编码序列的目标编码序号一一对应。Specifically, the two-dimensional plane random arrangement is to randomly distribute the data elements in the target code sequence on a two-dimensional plane. The target code arrangement result is the result after this random arrangement, wherein the target code coordinates of any target code arrangement result correspond to the target code sequence number of the target code sequence one by one.
在对目标编码序列进行二维平面随机排列的过程中,首先需要准备一个二维平面来容纳所有目标编码序列中的数据元素。每个数据元素在目标编码序列中都有一个唯一的序号,称为目标编码序号。然后,通过一种随机排列算法,将这些数据元素随机分布到二维平面上的各个坐标位置。重要的是,每个数据元素在二维平面上的坐标位置(目标编码坐标)必须能够唯一地对应回目标编码序列中的目标编码序号。这样确保即使数据在二维平面上是随机排列的,仍然能够通过目标编码坐标找到其在原始编码序列中的位置。In the process of randomly arranging the target coding sequence in a two-dimensional plane, it is first necessary to prepare a two-dimensional plane to accommodate all the data elements in the target coding sequence. Each data element has a unique serial number in the target coding sequence, called the target coding serial number. Then, through a random arrangement algorithm, these data elements are randomly distributed to various coordinate positions on the two-dimensional plane. It is important that the coordinate position of each data element on the two-dimensional plane (target coding coordinate) must be able to uniquely correspond back to the target coding serial number in the target coding sequence. This ensures that even if the data is randomly arranged on the two-dimensional plane, its position in the original coding sequence can still be found through the target coding coordinates.
通过这种方式,目标编码序列中的数据被随机排列到二维平面上,形成目标编码排列结果。这不仅增加了数据传输的复杂性和安全性,使得未经授权的第三方难以直接解读数据,还保持了数据元素之间的一一对应关系,确保数据在传输和解码过程中能够准确还原。In this way, the data in the target coding sequence is randomly arranged on a two-dimensional plane to form the target coding arrangement result. This not only increases the complexity and security of data transmission, making it difficult for unauthorized third parties to directly interpret the data, but also maintains the one-to-one correspondence between data elements, ensuring that the data can be accurately restored during transmission and decoding.
通过将目标编码序列进行二维平面随机排列并生成目标编码排列结果,数据的传输得到了进一步的安全保障。二维随机排列增加了数据的复杂性,防止了简单的直接解码。任意一个目标编码排列结果的目标编码坐标和目标编码序列的目标编码序号一一对应,确保了数据在传输和接收过程中能够被准确解码,还原为原始数据。这一过程有效提高了物联网数据交换的安全性和可靠性。By randomly arranging the target code sequence in a two-dimensional plane and generating the target code arrangement result, the data transmission is further secured. The two-dimensional random arrangement increases the complexity of the data and prevents simple direct decoding. The target code coordinates of any target code arrangement result correspond to the target code sequence number of the target code sequence, ensuring that the data can be accurately decoded and restored to the original data during transmission and reception. This process effectively improves the security and reliability of IoT data exchange.
S60:对所述目标编码排列结果进行模糊处理,生成待传输数据集,其中,所述待传输数据集具有模糊验证凭证;S60: performing fuzzy processing on the target code arrangement result to generate a data set to be transmitted, wherein the data set to be transmitted has a fuzzy verification credential;
具体而言,模糊处理是通过扰动、替换等方法改变编码的原始语义,使得数据在传输过程中难以被直接解读。待传输数据集是指经过模糊处理后准备进行传输的数据集。模糊验证凭证则是存储有模糊处理参数的凭证,用于在接收端还原数据。Specifically, obfuscation is to change the original semantics of the code by perturbation, replacement, etc., making it difficult to directly interpret the data during transmission. The data set to be transmitted refers to the data set that is ready for transmission after obfuscation. The obfuscated verification certificate is a certificate that stores the obfuscation parameters and is used to restore the data at the receiving end.
在对目标编码排列结果进行模糊处理的过程中,首先,需要通过扰动、替换或加密等方法对数据元素进行处理,改变其原始语义。例如,位置扰动可以随机改变数据元素在二维平面上的位置,数值替换可以用特定规则替换原始数据值。这些处理方法确保了数据在传输过程中无法被轻易解读。接着,将模糊处理后的数据集生成待传输数据集,同时生成模糊验证凭证。模糊验证凭证存储了模糊处理的具体参数,包括扰动、替换的详细信息,以便接收端能够准确还原原始数据。In the process of obfuscating the target coding arrangement results, first of all, the data elements need to be processed by perturbation, replacement or encryption to change their original semantics. For example, position perturbation can randomly change the position of data elements on a two-dimensional plane, and numerical replacement can replace the original data value with specific rules. These processing methods ensure that the data cannot be easily interpreted during transmission. Then, the obfuscated data set is generated into a data set to be transmitted, and a fuzzy verification certificate is generated at the same time. The fuzzy verification certificate stores the specific parameters of the obfuscation process, including detailed information on perturbation and replacement, so that the receiving end can accurately restore the original data.
通过这种方法,对目标编码排列结果进行模糊处理并生成待传输数据集,数据在传输过程中得到了进一步的保护。模糊处理增加了数据的复杂性和安全性,防止了未经授权的第三方直接解读数据。模糊验证凭证为接收端提供了必要的还原信息,确保数据在传输后能够被准确解码和还原。这样既提高了数据传输的安全性和隐私性,又保证了数据处理的可靠性和完整性,优化了物联网数据交换的整体流程。In this way, the target coding arrangement results are obfuscated and the data set to be transmitted is generated, and the data is further protected during the transmission process. The obfuscation process increases the complexity and security of the data and prevents unauthorized third parties from directly interpreting the data. The fuzzy verification certificate provides the necessary restoration information for the receiving end to ensure that the data can be accurately decoded and restored after transmission. This not only improves the security and privacy of data transmission, but also ensures the reliability and integrity of data processing, and optimizes the overall process of IoT data exchange.
S70:基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证;S70: constructing a high-dimensional mapping voucher based on the target high-dimensional array, the target coding sequence and the target coding arrangement result;
具体而言,高维映射凭证则是用于记录这些数据之间映射关系的凭证,确保数据在传输和解码过程中能够准确还原。Specifically, the high-dimensional mapping certificate is a certificate used to record the mapping relationship between these data, ensuring that the data can be accurately restored during the transmission and decoding process.
在构建高维映射凭证的过程中,首先,需要记录目标高维数组中的数据结构和元素位置。这包括每个数据元素在高维数组中的位置以及其对应的值。接着,对目标编码序列进行记录,确保每个二进制编码数据与高维数组中的元素位置一一对应。然后,将目标编码排列结果中的每个编码数据的位置与其在目标编码序列中的位置进行记录。通过这些记录,形成一个详细的映射关系,确保在数据传输和解码过程中可以准确还原每个数据元素的原始位置和值。In the process of constructing a high-dimensional mapping voucher, first of all, it is necessary to record the data structure and element position in the target high-dimensional array. This includes the position of each data element in the high-dimensional array and its corresponding value. Next, the target coding sequence is recorded to ensure that each binary coded data corresponds to the element position in the high-dimensional array. Then, the position of each coded data in the target coding arrangement result is recorded with its position in the target coding sequence. Through these records, a detailed mapping relationship is formed to ensure that the original position and value of each data element can be accurately restored during data transmission and decoding.
通过这种方式,高维映射凭证包含了目标高维数组、目标编码序列和目标编码排列结果之间的详细映射关系。这一凭证在数据接收端可以用于解码和还原数据,确保数据的完整性和准确性。In this way, the high-dimensional mapping voucher contains the detailed mapping relationship between the target high-dimensional array, the target encoding sequence and the target encoding arrangement result. This voucher can be used to decode and restore the data at the data receiving end to ensure the integrity and accuracy of the data.
通过构建高维映射凭证,数据在传输过程中得到了进一步的保护和保证。高维映射凭证确保了目标高维数组、目标编码序列和目标编码排列结果之间的映射关系,使得数据在接收端可以被准确解码和还原。这不仅提高了数据传输的安全性和可靠性,还保证了数据处理的完整性和准确性,为物联网数据交换提供了坚实的基础和保障。By constructing a high-dimensional mapping voucher, data is further protected and guaranteed during transmission. The high-dimensional mapping voucher ensures the mapping relationship between the target high-dimensional array, the target coding sequence, and the target coding arrangement result, so that the data can be accurately decoded and restored at the receiving end. This not only improves the security and reliability of data transmission, but also ensures the integrity and accuracy of data processing, providing a solid foundation and guarantee for IoT data exchange.
S80:将所述模糊验证凭证和所述高维映射凭证通过短信发送至目标物联网节点,以及将所述待传输数据集发送至所述目标物联网节点。S80: Send the fuzzy verification credential and the high-dimensional mapping credential to a target IoT node via SMS, and send the data set to be transmitted to the target IoT node.
具体而言,在数据传输的过程中,首先,将模糊验证凭证和高维映射凭证通过短信发送至目标物联网节点。短信传输确保这些重要的验证信息能够安全、快速地到达目标节点。模糊验证凭证包含模糊处理的具体参数,确保接收端能够准确还原被模糊处理的数据。高维映射凭证记录了数据在各个处理阶段的映射关系,确保接收端能够准确解码和还原原始数据。Specifically, during the data transmission process, first, the fuzzy verification certificate and high-dimensional mapping certificate are sent to the target IoT node via SMS. SMS transmission ensures that these important verification information can reach the target node safely and quickly. The fuzzy verification certificate contains the specific parameters of the fuzzy processing, ensuring that the receiving end can accurately restore the obfuscated data. The high-dimensional mapping certificate records the mapping relationship of the data at each processing stage, ensuring that the receiving end can accurately decode and restore the original data.
接着,将待传输数据集通过网络发送至目标物联网节点。待传输数据集包含了所有经过模糊处理后的数据,准备在目标节点进行解码和还原。通过网络传输数据集,确保数据可以高效地传输到目标节点,并与之前通过短信传输的验证凭证相配合,实现完整的数据还原过程。Next, the data set to be transmitted is sent to the target IoT node via the network. The data set to be transmitted contains all the obfuscated data, ready to be decoded and restored at the target node. Transmitting the data set over the network ensures that the data can be efficiently transmitted to the target node, and cooperates with the verification credentials previously transmitted via SMS to achieve a complete data restoration process.
通过这种方法,确保数据传输的安全性和完整性。短信传输模糊验证凭证和高维映射凭证提供了一层额外的安全保障,防止未经授权的访问。网络传输待传输数据集则确保了数据的高效传输。结合这两种传输方式,目标节点可以准确还原和验证数据,提高了物联网数据交换的安全性和可靠性。This approach ensures the security and integrity of data transmission. The SMS transmission of fuzzy verification credentials and high-dimensional mapping credentials provides an additional layer of security to prevent unauthorized access. The network transmission of the data set to be transmitted ensures the efficient transmission of data. Combining these two transmission methods, the target node can accurately restore and verify the data, improving the security and reliability of IoT data exchange.
通过将模糊验证凭证和高维映射凭证通过短信发送至目标物联网节点,以及将待传输数据集发送至目标物联网节点,确保了数据在传输过程中的安全和完整性。这一过程提高了数据传输的安全性和隐私性,确保接收端能够准确解码和还原数据,优化了物联网数据交换的整体流程。By sending the fuzzy verification credentials and high-dimensional mapping credentials to the target IoT node via SMS, and sending the data set to be transmitted to the target IoT node, the security and integrity of the data during transmission are ensured. This process improves the security and privacy of data transmission, ensures that the receiving end can accurately decode and restore data, and optimizes the overall process of IoT data exchange.
进一步的,对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应,包括:Furthermore, the target high-dimensional array is binary-encoded to generate a target code sequence, wherein the target high-dimensional array has a one-to-one correspondence between the dimension and the sequence number interval of the target code sequence, including:
根据所述目标高维数组,提取第一维度数据直到第N维度数据;According to the target high-dimensional array, extracting first dimension data to Nth dimension data;
对所述第一维度数据进行二进制编码,获得第一编码序列;Binary-encode the first dimensional data to obtain a first encoding sequence;
直到对所述第N维度数据进行二进制编码,获得第N编码序列;Until the Nth dimension data is binary-encoded to obtain an Nth encoding sequence;
依次拼接所述第一编码序列直到所述第N编码序列,生成所述目标编码序列。The first coding sequences are sequentially spliced until the Nth coding sequence to generate the target coding sequence.
具体而言,在对目标高维数组进行二进制编码的过程中,首先需要根据目标高维数组,提取第一维度数据直到第N维度数据。每个维度的数据代表了高维数组中的一部分信息。例如,对于三维数组,第一维度数据可以是整个数组在第一个维度上的切片。接着,对第一维度数据进行二进制编码,获得第一编码序列。二进制编码将每个数据元素转换为二进制数,例如数据值“10”编码为“1010”,数据值“255”编码为“11111111”。这个过程持续进行,直到对第N维度数据进行二进制编码,获得第N编码序列。最后,将所有维度的编码序列按照顺序依次拼接,生成目标编码序列。这样,目标编码序列不仅保留了原始高维数组的结构和顺序,还确保每个维度的数据在序列中的位置一一对应。Specifically, in the process of binary encoding the target high-dimensional array, it is first necessary to extract the first dimension data to the Nth dimension data according to the target high-dimensional array. The data of each dimension represents a part of the information in the high-dimensional array. For example, for a three-dimensional array, the first dimension data can be a slice of the entire array on the first dimension. Next, the first dimension data is binary encoded to obtain a first coding sequence. Binary encoding converts each data element into a binary number, for example, the data value "10" is encoded as "1010", and the data value "255" is encoded as "11111111". This process continues until the Nth dimension data is binary encoded to obtain the Nth coding sequence. Finally, the coding sequences of all dimensions are spliced in order to generate the target coding sequence. In this way, the target coding sequence not only retains the structure and order of the original high-dimensional array, but also ensures that the position of the data of each dimension in the sequence corresponds one to one.
通过将目标高维数组进行二进制编码并生成目标编码序列,数据得到了有效的压缩和组织,便于后续的处理和传输。二进制编码不仅压缩了数据的表示形式,还提高了数据传输的效率和安全性。目标编码序列保持了原始数据的结构和顺序,为物联网系统中的数据交换提供了坚实的基础。这样既优化了数据处理流程,又确保了数据在传输过程中的完整性和可靠性。By binary encoding the target high-dimensional array and generating a target encoding sequence, the data is effectively compressed and organized, which is convenient for subsequent processing and transmission. Binary encoding not only compresses the representation of data, but also improves the efficiency and security of data transmission. The target encoding sequence maintains the structure and order of the original data, providing a solid foundation for data exchange in the IoT system. This not only optimizes the data processing process, but also ensures the integrity and reliability of the data during transmission.
进一步的,对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,包括:Furthermore, the target coding sequence is randomly arranged in a two-dimensional plane to generate a target coding arrangement result, including:
配置二维平面约束宽度;Configure the 2D plane constraint width;
从所述目标编码序列随机提取第i序号编码,基于所述二维平面约束宽度将所述第i序号编码随机排列,获得第i序号编码排列坐标,将所述第i序号编码排列坐标添加进所述目标编码排列结果,其中,一个坐标仅能排列一个编码;Randomly extracting the i-th number code from the target code sequence, randomly arranging the i-th number code based on the two-dimensional plane constraint width, obtaining the i-th number code arrangement coordinate, and adding the i-th number code arrangement coordinate to the target code arrangement result, wherein one coordinate can only arrange one code;
当所述目标编码序列均排列完成时,获得输出所述目标编码排列结果。When the target coding sequences are all arranged, the target coding arrangement result is obtained and outputted.
具体而言,首先需要配置二维平面的约束宽度,这意味着设定一个二维平面的宽度范围,用于限制编码数据元素排列的位置。接着,从目标编码序列中随机提取第i序号编码,基于设定的二维平面约束宽度,将第i序号编码随机排列到二维平面的某个位置,获得第i序号编码排列坐标。需要确保每个坐标仅能排列一个编码数据元素,以避免数据元素的重叠。这个过程依次进行,直到所有目标编码序列中的编码数据元素均排列完成。最终,生成并输出目标编码排列结果,包含所有编码数据元素在二维平面上的随机排列坐标。Specifically, first, you need to configure the constraint width of the two-dimensional plane, which means setting a width range of the two-dimensional plane to limit the position of the arrangement of the coded data elements. Next, randomly extract the i-th sequence code from the target coding sequence, and based on the set two-dimensional plane constraint width, randomly arrange the i-th sequence code to a certain position on the two-dimensional plane to obtain the i-th sequence code arrangement coordinates. It is necessary to ensure that each coordinate can only arrange one coded data element to avoid overlapping data elements. This process is carried out in sequence until all the coded data elements in the target coding sequence are arranged. Finally, the target coding arrangement result is generated and output, which contains the randomly arranged coordinates of all coded data elements on the two-dimensional plane.
通过这种方法,对目标编码序列进行二维平面随机排列并生成目标编码排列结果,数据在传输过程中得到了进一步的保护。二维随机排列增加了数据的复杂性,使得未经授权的第三方难以直接解读数据。每个编码数据元素在二维平面上的坐标与其在原始编码序列中的序号一一对应,确保数据在接收端能够准确还原。这样不仅提高了数据传输的安全性和隐私性,还保证了数据处理的可靠性和完整性,为物联网系统中的数据交换提供了坚实的基础和保障。Through this method, the target coding sequence is randomly arranged in a two-dimensional plane and the target coding arrangement result is generated, and the data is further protected during the transmission process. The two-dimensional random arrangement increases the complexity of the data, making it difficult for unauthorized third parties to directly interpret the data. The coordinates of each coded data element on the two-dimensional plane correspond one-to-one to its serial number in the original coding sequence, ensuring that the data can be accurately restored at the receiving end. This not only improves the security and privacy of data transmission, but also ensures the reliability and integrity of data processing, providing a solid foundation and guarantee for data exchange in the Internet of Things system.
进一步的,对所述目标编码排列结果进行模糊处理,生成待传输数据集,包括:Further, the target coding arrangement result is subjected to fuzzy processing to generate a data set to be transmitted, including:
从模糊处理函数库随机筛选第一函数,其中,所述第一函数具有预设二维曲线图像,所述预设二维曲线图像上具有第一定位坐标、第二定位坐标直到第N定位坐标,任意两个定位坐标欧式距离大于或等于欧式距离阈值;Randomly select a first function from a fuzzy processing function library, wherein the first function has a preset two-dimensional curve image, the preset two-dimensional curve image has a first positioning coordinate, a second positioning coordinate, and up to an Nth positioning coordinate, and the Euclidean distance between any two positioning coordinates is greater than or equal to a Euclidean distance threshold;
将所述预设二维曲线图像分布于所述目标编码排列结果,从所述目标编码排列结果提取所述第一定位坐标对应的第一基准编码和第一基准坐标、第二基准编码和第二基准坐标、直到第N基准编码和第N基准坐标;Distribute the preset two-dimensional curve image to the target code arrangement result, and extract the first reference code and the first reference coordinate, the second reference code and the second reference coordinate, and up to the Nth reference code and the Nth reference coordinate corresponding to the first positioning coordinate from the target code arrangement result;
根据所述第一基准编码和所述第一基准坐标、所述第二基准编码和所述第二基准坐标、直到所述第N基准编码和所述第N基准坐标,结合所述第一函数,对所述目标编码排列结果进行模糊处理,生成所述待传输数据集。According to the first reference code and the first reference coordinates, the second reference code and the second reference coordinates, up to the Nth reference code and the Nth reference coordinates, combined with the first function, the target code arrangement result is fuzzy processed to generate the data set to be transmitted.
具体而言,首先,从模糊处理函数库随机筛选第一函数。模糊处理函数库包含多种预设的模糊处理函数,每个函数具有特定的二维曲线图像。第一函数具有预设的二维曲线图像,图像上标有多个定位坐标(第一定位坐标、第二定位坐标,直到第N定位坐标)。这些定位坐标之间的欧式距离大于或等于预设的欧式距离阈值,确保定位坐标分布均匀,避免过于集中。Specifically, first, a first function is randomly selected from a fuzzy processing function library. The fuzzy processing function library contains a variety of preset fuzzy processing functions, each of which has a specific two-dimensional curve image. The first function has a preset two-dimensional curve image, and a plurality of positioning coordinates (a first positioning coordinate, a second positioning coordinate, and up to the Nth positioning coordinate) are marked on the image. The Euclidean distance between these positioning coordinates is greater than or equal to a preset Euclidean distance threshold, ensuring that the positioning coordinates are evenly distributed and avoid being too concentrated.
接着,将预设的二维曲线图像分布于目标编码排列结果上。然后,从目标编码排列结果中提取与这些定位坐标对应的基准编码和基准坐标。例如,第一定位坐标对应的第一基准编码和第一基准坐标,第二定位坐标对应的第二基准编码和第二基准坐标,直到第N定位坐标对应的第N基准编码和第N基准坐标。Next, the preset two-dimensional curve image is distributed on the target code arrangement result. Then, the reference codes and reference coordinates corresponding to these positioning coordinates are extracted from the target code arrangement result. For example, the first reference code and the first reference coordinate corresponding to the first positioning coordinate, the second reference code and the second reference coordinate corresponding to the second positioning coordinate, until the Nth reference code and the Nth reference coordinate corresponding to the Nth positioning coordinate.
最后,根据提取的基准编码和基准坐标(第一基准编码和第一基准坐标、第二基准编码和第二基准坐标,直到第N基准编码和第N基准坐标),结合第一函数,对目标编码排列结果进行模糊处理。模糊处理通过第一函数改变这些编码的原始语义,例如通过扰动或替换等方式,使得数据在传输过程中难以被直接解读。处理完成后,生成待传输数据集。Finally, according to the extracted reference codes and reference coordinates (the first reference code and the first reference coordinates, the second reference code and the second reference coordinates, until the Nth reference code and the Nth reference coordinates), combined with the first function, the target code arrangement result is fuzzy processed. The fuzzy processing changes the original semantics of these codes through the first function, such as by perturbation or replacement, so that the data is difficult to be directly interpreted during the transmission process. After the processing is completed, the data set to be transmitted is generated.
通过这种方法,对目标编码排列结果进行模糊处理并生成待传输数据集,数据在传输过程中得到了进一步的保护。模糊处理增加了数据的复杂性,改变了数据的原始语义,使得未经授权的第三方难以直接解读数据。待传输数据集为传输提供了安全性和隐私性保障,确保数据在接收端能够通过模糊验证凭证准确还原。这样不仅提高了数据传输的安全性和隐私性,还保证了数据处理的可靠性和完整性,为物联网系统中的数据交换提供了坚实的基础和保障。Through this method, the target coding arrangement results are obfuscated and the data set to be transmitted is generated, and the data is further protected during the transmission process. The obfuscation increases the complexity of the data, changes the original semantics of the data, and makes it difficult for unauthorized third parties to directly interpret the data. The data set to be transmitted provides security and privacy protection for the transmission, ensuring that the data can be accurately restored at the receiving end through the obfuscated verification certificate. This not only improves the security and privacy of data transmission, but also ensures the reliability and integrity of data processing, providing a solid foundation and guarantee for data exchange in the Internet of Things system.
进一步的,根据所述第一基准编码和所述第一基准坐标、所述第二基准编码和所述第二基准坐标、直到所述第N基准编码和所述第N基准坐标,结合所述第一函数,对所述目标编码排列结果进行模糊处理,生成所述待传输数据集,包括:Further, according to the first reference code and the first reference coordinate, the second reference code and the second reference coordinate, until the Nth reference code and the Nth reference coordinate, in combination with the first function, fuzzy processing is performed on the target code arrangement result to generate the data set to be transmitted, including:
将所述目标编码排列结果除开所述第一基准编码、所述第二基准编码直到所述第N基准编码的编码,设为待模糊处理编码;The target code arrangement result except the first reference code, the second reference code and the Nth reference code is set as the code to be blurred;
获得所述待模糊处理编码的第一待模糊处理编码和第一待模糊处理编码坐标;Obtaining a first code to be blurred and a first coordinate of the code to be blurred;
基于所述第一待模糊处理编码坐标,从所述第一基准坐标、所述第二基准坐标直到所述第N基准坐标进行欧式距离最近分选,获得选定基准坐标;Based on the first coded coordinate to be blurred, performing a Euclidean distance sorting from the first reference coordinate, the second reference coordinate to the Nth reference coordinate to obtain a selected reference coordinate;
基于所述选定基准坐标,从所述第一基准编码、所述第二基准编码直到所述第N基准编码分选,获得选定基准编码;Based on the selected reference coordinates, sorting from the first reference code, the second reference code to the Nth reference code to obtain a selected reference code;
根据所述选定基准坐标对所述第一待模糊处理编码坐标进行坐标偏差分析,获得第一偏差信息;Performing coordinate deviation analysis on the first coded coordinate to be fuzzy processed according to the selected reference coordinate to obtain first deviation information;
根据所述选定基准编码对所述第一待模糊处理编码进行语义偏差分析,获得第二偏差信息;Performing semantic deviation analysis on the first code to be fuzzy processed according to the selected reference code to obtain second deviation information;
将所述选定基准坐标和所述选定基准编码按序排列,生成第一数据序列;Arranging the selected reference coordinates and the selected reference codes in order to generate a first data sequence;
将所述第一偏差信息和所述第二偏差信息按序排列,生成第二数据序列,添加进第一数据序列的衔接数据序列集,其中,所述第二数据序列和所述第一数据序列的长度相同;Arrange the first deviation information and the second deviation information in order to generate a second data sequence, and add the second data sequence to the contiguous data sequence set of the first data sequence, wherein the second data sequence has the same length as the first data sequence;
当所述待模糊处理编码遍历完成时,以所述第一数据序列,构建第一元模糊验证凭证,添加进N元验证凭证;When the traversal of the code to be obfuscated is completed, a first-element obfuscated verification credential is constructed with the first data sequence and added to the N-element verification credential;
对所述第一数据序列的所述衔接数据序列集依次排列,构建第一元待传输数据,添加进所述待传输数据集;The connected data sequence sets of the first data sequence are sequentially arranged to construct first element data to be transmitted, and added to the data set to be transmitted;
根据第一函数编码,构建第N+1元模糊验证凭证,结合所述N元验证凭证,构建所述模糊验证凭证。According to the first function encoding, an N+1th fuzzy verification credential is constructed, and the fuzzy verification credential is constructed in combination with the N-ary verification credential.
具体而言,待模糊处理编码为目标编码排列结果中除开基准编码后的其余编码,需要进行模糊处理的编码;第一待模糊处理编码指的是待模糊处理编码的任意一个示例性编码,第一待模糊处理编码坐标为与第一待模糊处理编码对应的编码坐标。Specifically, the code to be blurred is the remaining code in the target code arrangement result except the reference code, which needs to be blurred; the first code to be blurred refers to any exemplary code to be blurred, and the coordinates of the first code to be blurred are the code coordinates corresponding to the first code to be blurred.
基于第一待模糊处理编码的坐标,从第一基准坐标、第二基准坐标,直到第N基准坐标中进行欧式距离最近分选,获得选定基准坐标。然后,基于选定基准坐标,从第一基准编码、第二基准编码,直到第N基准编码中分选,获得选定基准编码。根据选定基准坐标,对第一待模糊处理编码坐标进行坐标偏差分析,获得第一偏差信息,示例性地:第一待模糊处理编码坐标为(1,2),选定基准坐标为(3,4),则第一偏差信息为(-2,-2)。根据选定基准编码,对第一待模糊处理编码进行语义偏差分析,获得第二偏差信息,示例性地:选定基准编码为1,第一待模糊处理编码为0,则第二偏差信息为-1。将所述选定基准坐标和所述选定基准编码按序排列,生成第一数据序列,示例性地:选定基准坐标为(3,4),选定基准编码为1,则第一数据序列341。将第一偏差信息和第二偏差信息按序排列,生成第二数据序列,示例兴地如:第一偏差信息为(-2,-2),第二偏差信息为-1,则第二数据序列为-2-2-1,并添加到第一数据序列的衔接数据序列集中,确保第二数据序列和第一数据序列长度相同,指的是数字数量相同。Based on the coordinates of the first code to be blurred, the first reference coordinates, the second reference coordinates, and the Nth reference coordinates are sorted by the closest Euclidean distance to obtain the selected reference coordinates. Then, based on the selected reference coordinates, the first reference code, the second reference code, and the Nth reference code are sorted to obtain the selected reference code. According to the selected reference coordinates, the coordinate deviation of the first code to be blurred is analyzed to obtain the first deviation information. For example, if the coordinates of the first code to be blurred are (1, 2) and the selected reference coordinates are (3, 4), then the first deviation information is (-2, -2). According to the selected reference code, the semantic deviation analysis of the first code to be blurred is performed to obtain the second deviation information. For example, if the selected reference code is 1 and the first code to be blurred is 0, then the second deviation information is -1. The selected reference coordinates and the selected reference code are arranged in order to generate a first data sequence. For example, if the selected reference coordinates are (3, 4) and the selected reference code is 1, then the first data sequence is 341. Arrange the first deviation information and the second deviation information in order to generate a second data sequence. For example, if the first deviation information is (-2, -2) and the second deviation information is -1, then the second data sequence is -2-2-1. Add them to the connected data sequence set of the first data sequence to ensure that the second data sequence and the first data sequence have the same length, which means that the number of digits is the same.
遍历待模糊处理编码的每一个编码进行相同处理后,将第一数据序列,设为第一元模糊验证凭证;对所述第一数据序列的所述衔接数据序列集依次排列,构建第一元待传输数据。后步在接收端,可基于第一元模糊验证凭证对第一元待传输数据进行还原。将第一数据序列添加进N元验证凭证;将第一元待传输数据,添加进所述待传输数据集。根据第一函数编码,构建第N+1元模糊验证凭证,结合所述N元验证凭证,构建所述模糊验证凭证。根据函数编码可以在接收端确定具体的函数图像,便于执行模糊处理的还原。After traversing each code to be blurred and performing the same processing, the first data sequence is set as the first-element fuzzy verification credential; the connected data sequence set of the first data sequence is arranged in sequence to construct the first-element data to be transmitted. In the later step, at the receiving end, the first-element data to be transmitted can be restored based on the first-element fuzzy verification credential. The first data sequence is added to the N-element verification credential; the first-element data to be transmitted is added to the data set to be transmitted. According to the first function code, the N+1-element fuzzy verification credential is constructed, and the fuzzy verification credential is constructed in combination with the N-element verification credential. According to the function code, the specific function image can be determined at the receiving end to facilitate the restoration of the blurred processing.
模糊处理增加了数据的复杂性,改变了数据的原始语义,使得未经授权的第三方难以直接解读数据。偏差信息和验证凭证确保了数据在接收端能够通过验证准确还原。这不仅提高了数据传输的安全性和隐私性,还保证了数据处理的可靠性和完整性,为物联网系统中的数据交换提供了坚实的基础和保障。Obfuscation increases the complexity of data, changes the original semantics of data, and makes it difficult for unauthorized third parties to directly interpret the data. Deviation information and verification credentials ensure that the data can be accurately restored through verification at the receiving end. This not only improves the security and privacy of data transmission, but also ensures the reliability and integrity of data processing, providing a solid foundation and guarantee for data exchange in IoT systems.
进一步的,基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证,包括:Further, based on the target high-dimensional array, the target coding sequence and the target coding arrangement result, a high-dimensional mapping voucher is constructed, including:
从所述目标高维数组提取第一维目标数据;Extracting first-dimensional target data from the target high-dimensional array;
分析所述第一维目标数据在所述目标编码序列的第一维序号区间;Analyze the first-dimensional target data in the first-dimensional sequence number interval of the target coding sequence;
分析所述第一维序号区间与所述目标编码排列结果的第一序号的第一关联坐标、第二序号的第二关联坐标、直到第Q序号的第Q关联坐标;Analyze the first-dimensional sequence number interval and the first associated coordinate of the first sequence number, the second associated coordinate of the second sequence number, and the Qth associated coordinate of the Qth sequence number of the target code arrangement result;
对所述第一序号、所述第一关联坐标、所述第二序号、所述第二关联坐标、所述第Q序号、所述第Q关联坐标依次排列,构建第一元高维映射凭证,添加进所述高维映射凭证。The first serial number, the first associated coordinate, the second serial number, the second associated coordinate, the Qth serial number, and the Qth associated coordinate are arranged in sequence to construct a first-element high-dimensional mapping certificate, and added to the high-dimensional mapping certificate.
具体而言,在构建高维映射凭证的过程中,首先从目标高维数组提取第一维目标数据。这一步骤获取了高维数组中的一个维度的数据。接着,分析所述第一维目标数据在目标编码序列的第一维序号区间,这意味着确定这些数据在编码序列中的位置范围。然后,分析所述第一维序号区间与目标编码排列结果的关联坐标。具体来说,这包括从目标编码排列结果中找到对应于目标编码序列中每个序号的二维坐标。例如,找到第一序号的第一关联坐标、第二序号的第二关联坐标,直到第Q序号的第Q关联坐标。Specifically, in the process of constructing a high-dimensional mapping voucher, the first-dimensional target data is first extracted from the target high-dimensional array. This step obtains the data of one dimension in the high-dimensional array. Next, the first-dimensional sequence number interval of the first-dimensional target data in the target coding sequence is analyzed, which means determining the position range of these data in the coding sequence. Then, the associated coordinates of the first-dimensional sequence number interval and the target coding arrangement result are analyzed. Specifically, this includes finding the two-dimensional coordinates corresponding to each sequence number in the target coding sequence from the target coding arrangement result. For example, find the first associated coordinates of the first sequence number, the second associated coordinates of the second sequence number, until the Qth associated coordinates of the Qth sequence number.
接下来,对这些序号和关联坐标依次排列,构建第一元高维映射凭证。具体来说,将第一序号和第一关联坐标、第二序号和第二关联坐标,直到第Q序号和第Q关联坐标按照顺序排列,形成一个有序的映射关系。然后,将这个映射凭证添加到高维映射凭证中。Next, these serial numbers and associated coordinates are arranged in sequence to construct the first-element high-dimensional mapping voucher. Specifically, the first serial number and the first associated coordinate, the second serial number and the second associated coordinate, until the Qth serial number and the Qth associated coordinate are arranged in sequence to form an ordered mapping relationship. Then, this mapping voucher is added to the high-dimensional mapping voucher.
通过这种方法,确保每个数据元素在高维数组、编码序列和编码排列结果之间的映射关系得到了详细记录。这一过程确保了在数据传输和解码过程中能够准确还原每个数据元素的位置和值。This method ensures that the mapping relationship between each data element in the high-dimensional array, the encoding sequence, and the encoding permutation result is recorded in detail. This process ensures that the position and value of each data element can be accurately restored during data transmission and decoding.
通过构建高维映射凭证,数据在传输过程中得到了进一步的保护和保证。高维映射凭证确保了目标高维数组、目标编码序列和目标编码排列结果之间的详细映射关系,使得数据在接收端可以被准确解码和还原。这不仅提高了数据传输的安全性和可靠性,还保证了数据处理的完整性和准确性,为物联网数据交换提供了坚实的基础和保障。By constructing a high-dimensional mapping voucher, data is further protected and guaranteed during transmission. The high-dimensional mapping voucher ensures the detailed mapping relationship between the target high-dimensional array, the target coding sequence, and the target coding arrangement result, so that the data can be accurately decoded and restored at the receiving end. This not only improves the security and reliability of data transmission, but also ensures the integrity and accuracy of data processing, providing a solid foundation and guarantee for IoT data exchange.
进一步的,应用于目标物联网节点,包括:Further, it is applied to the target IoT node, including:
根据所述模糊验证凭证对所述待传输数据集进行还原,生成所述目标编码排列结果;Restore the data set to be transmitted according to the fuzzy verification certificate to generate the target coding arrangement result;
根据所述高维映射凭证对所述目标编码排列结果还原,生成所述目标高维数组。The target encoding arrangement result is restored according to the high-dimensional mapping voucher to generate the target high-dimensional array.
具体而言,在目标物联网节点的应用过程中,首先,根据模糊验证凭证对待传输数据集进行还原,生成目标编码排列结果。这一步骤利用模糊验证凭证中包含的参数,对待传输数据集进行逆向处理,恢复其原始的编码排列结果。具体来说,模糊处理过程中引入的扰动、替换或加密步骤会被逆向操作,还原成初始的编码排列形式。Specifically, in the application process of the target IoT node, first, the data set to be transmitted is restored according to the fuzzy verification certificate to generate the target encoding arrangement result. This step uses the parameters contained in the fuzzy verification certificate to reverse the data set to be transmitted and restore its original encoding arrangement result. Specifically, the perturbation, substitution or encryption steps introduced during the fuzzy processing will be reversed and restored to the initial encoding arrangement form.
接着,根据高维映射凭证对目标编码排列结果进行还原,生成目标高维数组。这一步骤利用高维映射凭证中记录的详细映射关系,将目标编码排列结果中的数据元素重新排列,恢复成原始的高维数组结构。高维映射凭证包含了目标高维数组中每个数据元素在编码序列和编码排列结果中的位置关系,确保还原过程的准确性。通过这种方法,目标物联网节点能够准确还原接收到的数据,从而生成原始的目标高维数组。Next, the target encoding arrangement result is restored according to the high-dimensional mapping voucher to generate the target high-dimensional array. This step uses the detailed mapping relationship recorded in the high-dimensional mapping voucher to rearrange the data elements in the target encoding arrangement result and restore it to the original high-dimensional array structure. The high-dimensional mapping voucher contains the positional relationship between each data element in the target high-dimensional array in the encoding sequence and the encoding arrangement result, ensuring the accuracy of the restoration process. In this way, the target IoT node can accurately restore the received data to generate the original target high-dimensional array.
通过在目标物联网节点应用模糊验证凭证和高维映射凭证,确保了数据在传输过程中的安全性和完整性。模糊验证凭证使得模糊处理的数据能够被准确还原,防止了数据在传输过程中被截获和篡改。高维映射凭证确保了目标高维数组、目标编码序列和目标编码排列结果之间的映射关系,使得数据在接收端能够准确还原。这一过程提高了数据传输的安全性和可靠性,确保了物联网系统中的数据交换和处理的完整性和准确性。By applying fuzzy verification credentials and high-dimensional mapping credentials at the target IoT node, the security and integrity of the data during transmission are ensured. The fuzzy verification credentials enable the fuzzy data to be accurately restored, preventing the data from being intercepted and tampered with during transmission. The high-dimensional mapping credentials ensure the mapping relationship between the target high-dimensional array, the target coding sequence, and the target coding arrangement result, so that the data can be accurately restored at the receiving end. This process improves the security and reliability of data transmission and ensures the integrity and accuracy of data exchange and processing in the IoT system.
本发明实施例提供的一种用于数据交换的物联网处理方法,至少具有如下技术效果:An Internet of Things processing method for data exchange provided by an embodiment of the present invention has at least the following technical effects:
通过对待传输代的目标数据进行编码后,再排列至二维平面,更进一步,利用模糊处理策略,得到最终的待传输数据;再生成还原数据的凭证数据通过短信发送至目标节点。由于待传输数据模糊了语义,保障了安全性,且通过编码技术压缩了数据,保障了数据传输效率,通过短信发送凭证保障了凭证的安全性,从而达到了保障数据传输效率以及安全性的技术效果。After encoding the target data to be transmitted, it is arranged in a two-dimensional plane, and further, the fuzzy processing strategy is used to obtain the final data to be transmitted; the credential data of the restored data is then generated and sent to the target node via SMS. Since the semantics of the data to be transmitted are blurred, security is guaranteed, and the data is compressed through encoding technology to ensure data transmission efficiency, and the security of the credential is guaranteed by sending the credential via SMS, thus achieving the technical effect of ensuring data transmission efficiency and security.
实施例二:Embodiment 2:
如图2所示,基于实施例一提供的一种用于数据交换的物联网处理方法相同的发明构思,本发明实施例还提供一种用于数据交换的物联网处理系统,应用于物联网节点数据中心,包括:As shown in FIG2 , based on the same inventive concept as the Internet of Things processing method for data exchange provided in Embodiment 1, an embodiment of the present invention further provides an Internet of Things processing system for data exchange, which is applied to an Internet of Things node data center, including:
用户端1000,用于接收数据交换请求,其中,所述数据交换请求包括目标数据属性、目标数据来源和目标数据时间戳;The user terminal 1000 is used to receive a data exchange request, wherein the data exchange request includes target data attributes, target data source and target data timestamp;
目标数据匹配模块2000,用于根据所述目标数据属性、所述目标数据来源和所述目标数据时间戳从数据库匹配目标交换数据;A target data matching module 2000, for matching target exchange data from a database according to the target data attributes, the target data source and the target data timestamp;
高维数组构建模块3000,用于对所述目标交换数据按照顺序,构建目标高维数组;A high-dimensional array construction module 3000 is used to construct a target high-dimensional array according to the sequence of the target exchange data;
目标数据编码模块4000,用于对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应;A target data encoding module 4000 is used to perform binary encoding on the target high-dimensional array to generate a target encoding sequence, wherein the target high-dimensional array has a one-to-one correspondence between the dimensions and the sequence number intervals of the target encoding sequence;
目标编码排列模块5000,用于对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,其中,任意一个所述目标编码排列结果的目标编码坐标和所述目标编码序列的目标编码序号一一对应;The target code arrangement module 5000 is used to perform a two-dimensional plane random arrangement on the target code sequence to generate a target code arrangement result, wherein the target code coordinates of any of the target code arrangement results correspond to the target code sequence number of the target code sequence in a one-to-one manner;
数据模糊处理模块6000,用于对所述目标编码排列结果进行模糊处理,生成待传输数据集,其中,所述待传输数据集具有模糊验证凭证;The data fuzzy processing module 6000 is used to perform fuzzy processing on the target code arrangement result to generate a data set to be transmitted, wherein the data set to be transmitted has a fuzzy verification certificate;
高维凭证生成模块7000,用于基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证;A high-dimensional voucher generation module 7000 is used to construct a high-dimensional mapping voucher based on the target high-dimensional array, the target coding sequence and the target coding arrangement result;
数据交换模块8000,用于将所述模糊验证凭证和所述高维映射凭证通过短信发送至目标物联网节点,以及将所述待传输数据集发送至所述目标物联网节点。The data exchange module 8000 is used to send the fuzzy verification certificate and the high-dimensional mapping certificate to the target IoT node via SMS, and to send the data set to be transmitted to the target IoT node.
进一步的,所述目标数据编码模块4000执行步骤包括:Furthermore, the target data encoding module 4000 executes the following steps:
根据所述目标高维数组,提取第一维度数据直到第N维度数据;According to the target high-dimensional array, extracting first dimension data to Nth dimension data;
对所述第一维度数据进行二进制编码,获得第一编码序列;Binary-encode the first dimensional data to obtain a first encoding sequence;
直到对所述第N维度数据进行二进制编码,获得第N编码序列;Until the Nth dimension data is binary-encoded to obtain an Nth encoding sequence;
依次拼接所述第一编码序列直到所述第N编码序列,生成所述目标编码序列。The first coding sequences are sequentially spliced until the Nth coding sequence to generate the target coding sequence.
进一步的,所述目标编码排列模块5000执行步骤包括:Furthermore, the target code arrangement module 5000 executes the following steps:
配置二维平面约束宽度;Configure the 2D plane constraint width;
从所述目标编码序列随机提取第i序号编码,基于所述二维平面约束宽度将所述第i序号编码随机排列,获得第i序号编码排列坐标,将所述第i序号编码排列坐标添加进所述目标编码排列结果,其中,一个坐标仅能排列一个编码;Randomly extracting the i-th number code from the target code sequence, randomly arranging the i-th number code based on the two-dimensional plane constraint width, obtaining the i-th number code arrangement coordinate, and adding the i-th number code arrangement coordinate to the target code arrangement result, wherein one coordinate can only arrange one code;
当所述目标编码序列均排列完成时,获得输出所述目标编码排列结果。When the target coding sequences are all arranged, the target coding arrangement result is obtained and outputted.
进一步的,所述数据模糊处理模块6000执行步骤包括:Furthermore, the data fuzzy processing module 6000 executes the following steps:
从模糊处理函数库随机筛选第一函数,其中,所述第一函数具有预设二维曲线图像,所述预设二维曲线图像上具有第一定位坐标、第二定位坐标直到第N定位坐标,任意两个定位坐标欧式距离大于或等于欧式距离阈值;Randomly select a first function from a fuzzy processing function library, wherein the first function has a preset two-dimensional curve image, the preset two-dimensional curve image has a first positioning coordinate, a second positioning coordinate, and up to an Nth positioning coordinate, and the Euclidean distance between any two positioning coordinates is greater than or equal to a Euclidean distance threshold;
将所述预设二维曲线图像分布于所述目标编码排列结果,从所述目标编码排列结果提取所述第一定位坐标对应的第一基准编码和第一基准坐标、第二基准编码和第二基准坐标、直到第N基准编码和第N基准坐标;Distribute the preset two-dimensional curve image to the target code arrangement result, and extract the first reference code and the first reference coordinate, the second reference code and the second reference coordinate, and up to the Nth reference code and the Nth reference coordinate corresponding to the first positioning coordinate from the target code arrangement result;
根据所述第一基准编码和所述第一基准坐标、所述第二基准编码和所述第二基准坐标、直到所述第N基准编码和所述第N基准坐标,结合所述第一函数,对所述目标编码排列结果进行模糊处理,生成所述待传输数据集。According to the first reference code and the first reference coordinate, the second reference code and the second reference coordinate, up to the Nth reference code and the Nth reference coordinate, combined with the first function, the target code arrangement result is fuzzy processed to generate the data set to be transmitted.
进一步的,所述数据模糊处理模块6000执行步骤包括:Furthermore, the data fuzzy processing module 6000 executes the following steps:
将所述目标编码排列结果除开所述第一基准编码、所述第二基准编码直到所述第N基准编码的编码,设为待模糊处理编码;The target code arrangement result except the first reference code, the second reference code and the Nth reference code is set as the code to be blurred;
获得所述待模糊处理编码的第一待模糊处理编码和第一待模糊处理编码坐标;Obtaining a first code to be blurred and a first coordinate of the code to be blurred;
基于所述第一待模糊处理编码坐标,从所述第一基准坐标、所述第二基准坐标直到所述第N基准坐标进行欧式距离最近分选,获得选定基准坐标;Based on the first coded coordinate to be blurred, performing a Euclidean distance sorting from the first reference coordinate, the second reference coordinate to the Nth reference coordinate to obtain a selected reference coordinate;
基于所述选定基准坐标,从所述第一基准编码、所述第二基准编码直到所述第N基准编码分选,获得选定基准编码;Based on the selected reference coordinates, sorting from the first reference code, the second reference code to the Nth reference code to obtain a selected reference code;
根据所述选定基准坐标对所述第一待模糊处理编码坐标进行坐标偏差分析,获得第一偏差信息;Performing coordinate deviation analysis on the first coded coordinate to be fuzzy processed according to the selected reference coordinate to obtain first deviation information;
根据所述选定基准编码对所述第一待模糊处理编码进行语义偏差分析,获得第二偏差信息;Performing semantic deviation analysis on the first code to be fuzzy processed according to the selected reference code to obtain second deviation information;
将所述选定基准坐标和所述选定基准编码按序排列,生成第一数据序列;Arranging the selected reference coordinates and the selected reference codes in order to generate a first data sequence;
将所述第一偏差信息和所述第二偏差信息按序排列,生成第二数据序列,添加进第一数据序列的衔接数据序列集,其中,所述第二数据序列和所述第一数据序列的长度相同;Arrange the first deviation information and the second deviation information in order to generate a second data sequence, and add the second data sequence to the contiguous data sequence set of the first data sequence, wherein the second data sequence has the same length as the first data sequence;
当所述待模糊处理编码遍历完成时,以所述第一数据序列,构建第一元模糊验证凭证,添加进N元验证凭证;When the traversal of the code to be obfuscated is completed, a first-element obfuscated verification credential is constructed with the first data sequence and added to the N-element verification credential;
对所述第一数据序列的所述衔接数据序列集依次排列,构建第一元待传输数据,添加进所述待传输数据集;The connected data sequence sets of the first data sequence are sequentially arranged to construct first element data to be transmitted, and added to the data set to be transmitted;
根据第一函数编码,构建第N+1元模糊验证凭证,结合所述N元验证凭证,构建所述模糊验证凭证。According to the first function encoding, an N+1th fuzzy verification credential is constructed, and the fuzzy verification credential is constructed in combination with the N-ary verification credential.
进一步的,所述高维凭证生成模块7000执行步骤包括:Furthermore, the high-dimensional credential generation module 7000 executes the following steps:
从所述目标高维数组提取第一维目标数据;Extracting first-dimensional target data from the target high-dimensional array;
分析所述第一维目标数据在所述目标编码序列的第一维序号区间;Analyze the first-dimensional target data in the first-dimensional sequence number interval of the target coding sequence;
分析所述第一维序号区间与所述目标编码排列结果的第一序号的第一关联坐标、第二序号的第二关联坐标、直到第Q序号的第Q关联坐标;Analyze the first-dimensional sequence number interval and the first associated coordinate of the first sequence number, the second associated coordinate of the second sequence number, and the Qth associated coordinate of the Qth sequence number of the target code arrangement result;
对所述第一序号、所述第一关联坐标、所述第二序号、所述第二关联坐标、所述第Q序号、所述第Q关联坐标依次排列,构建第一元高维映射凭证,添加进所述高维映射凭证。The first serial number, the first associated coordinate, the second serial number, the second associated coordinate, the Qth serial number, and the Qth associated coordinate are arranged in sequence to construct a first-element high-dimensional mapping certificate, and added to the high-dimensional mapping certificate.
进一步的,应用于目标物联网节点,执行步骤包括:Further, applied to the target IoT node, the execution steps include:
根据所述模糊验证凭证对所述待传输数据集进行还原,生成所述目标编码排列结果;Restore the data set to be transmitted according to the fuzzy verification certificate to generate the target coding arrangement result;
根据所述高维映射凭证对所述目标编码排列结果还原,生成所述目标高维数组。The target encoding arrangement result is restored according to the high-dimensional mapping voucher to generate the target high-dimensional array.
实施例三:Embodiment three:
请参阅图3,图3为本发明实施例提供的电子设备的实施例示意图。如图3所示,本发明实施例提了一种电子设备500,包括存储器510、处理器520及存储在存储器510上并可在处理器520上运行的计算机程序511,处理器520执行计算机程序511时实现以下步骤:接收数据交换请求,其中,所述数据交换请求包括目标数据属性、目标数据来源和目标数据时间戳;根据所述目标数据属性、所述目标数据来源和所述目标数据时间戳从数据库匹配目标交换数据;对所述目标交换数据按照顺序,构建目标高维数组;对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应;对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,其中,任意一个所述目标编码排列结果的目标编码坐标和所述目标编码序列的目标编码序号一一对应;对所述目标编码排列结果进行模糊处理,生成待传输数据集,其中,所述待传输数据集具有模糊验证凭证;基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证;将所述模糊验证凭证和所述高维映射凭证通过短信发送至目标物联网节点,以及将所述待传输数据集发送至所述目标物联网节点。Please refer to Figure 3, which is a schematic diagram of an embodiment of an electronic device provided by an embodiment of the present invention. As shown in Figure 3, an embodiment of the present invention provides an electronic device 500, including a memory 510, a processor 520, and a computer program 511 stored in the memory 510 and executable on the processor 520. When the processor 520 executes the computer program 511, the following steps are implemented: receiving a data exchange request, wherein the data exchange request includes target data attributes, target data source, and target data timestamp; matching target exchange data from a database according to the target data attributes, the target data source, and the target data timestamp; constructing a target high-dimensional array in sequence for the target exchange data; performing binary encoding on the target high-dimensional array to generate a target encoding sequence, wherein the target high-dimensional array The target coding sequence has a one-to-one correspondence between the dimension and the serial number interval of the target coding sequence; the target coding sequence is randomly arranged in a two-dimensional plane to generate a target coding arrangement result, wherein the target coding coordinates of any one of the target coding arrangement results correspond to the target coding serial number of the target coding sequence; the target coding arrangement result is fuzzy processed to generate a data set to be transmitted, wherein the data set to be transmitted has a fuzzy verification credential; based on the target high-dimensional array, the target coding sequence and the target coding arrangement result, a high-dimensional mapping credential is constructed; the fuzzy verification credential and the high-dimensional mapping credential are sent to the target Internet of Things node via SMS, and the data set to be transmitted is sent to the target Internet of Things node.
实施例四:Embodiment 4:
请参阅图4,图4为本发明实施例提供的一种计算机可读存储介质的实施例示意图。如图4所示,本实施例提供了一种计算机可读存储介质600,其上存储有计算机程序611,该计算机程序611被处理器执行时实现如下步骤:接收数据交换请求,其中,所述数据交换请求包括目标数据属性、目标数据来源和目标数据时间戳;根据所述目标数据属性、所述目标数据来源和所述目标数据时间戳从数据库匹配目标交换数据;对所述目标交换数据按照顺序,构建目标高维数组;对所述目标高维数组进行二进制编码,生成目标编码序列,其中,所述目标高维数组为维度和所述目标编码序列的序号区间一一对应;对所述目标编码序列进行二维平面随机排列,生成目标编码排列结果,其中,任意一个所述目标编码排列结果的目标编码坐标和所述目标编码序列的目标编码序号一一对应;对所述目标编码排列结果进行模糊处理,生成待传输数据集,其中,所述待传输数据集具有模糊验证凭证;基于所述目标高维数组、所述目标编码序列和所述目标编码排列结果,构建高维映射凭证;将所述模糊验证凭证和所述高维映射凭证通过短信发送至目标物联网节点,以及将所述待传输数据集发送至所述目标物联网节点。Please refer to Figure 4, which is a schematic diagram of an embodiment of a computer-readable storage medium provided by an embodiment of the present invention. As shown in Figure 4, this embodiment provides a computer-readable storage medium 600, on which a computer program 611 is stored, and when the computer program 611 is executed by a processor, the following steps are implemented: receiving a data exchange request, wherein the data exchange request includes target data attributes, target data source, and target data timestamp; matching target exchange data from a database according to the target data attributes, the target data source, and the target data timestamp; constructing a target high-dimensional array for the target exchange data in sequence; performing binary encoding on the target high-dimensional array to generate a target encoding sequence, wherein the target high-dimensional array is a sequence number of the dimension and the target encoding sequence. The target coding sequence is randomly arranged in a two-dimensional plane to generate a target coding arrangement result, wherein the target coding coordinates of any one of the target coding arrangement results correspond to the target coding sequence number of the target coding sequence; the target coding arrangement result is fuzzy processed to generate a data set to be transmitted, wherein the data set to be transmitted has a fuzzy verification credential; based on the target high-dimensional array, the target coding sequence and the target coding arrangement result, a high-dimensional mapping credential is constructed; the fuzzy verification credential and the high-dimensional mapping credential are sent to the target IoT node via SMS, and the data set to be transmitted is sent to the target IoT node.
需要说明的是,在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详细描述的部分,可以参见其它实施例的相关描述。It should be noted that in the above embodiments, the description of each embodiment has its own emphasis, and for parts that are not described in detail in a certain embodiment, reference can be made to the relevant descriptions of other embodiments.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as methods, systems, or computer program products. Therefore, the present invention may take the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Furthermore, the present invention may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式计算机或者其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to the flowchart and/or block diagram of the method, device (system), and computer program product according to the embodiment of the present invention. It should be understood that each process and/or box in the flowchart and/or block diagram, as well as the combination of the processes and/or boxes in the flowchart and/or block diagram can be implemented by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, a special-purpose computer, an embedded computer, or other programmable data processing device to generate a machine, so that the instructions executed by the processor of the computer or other programmable data processing device generate a device for implementing the functions specified in one process or multiple processes in the flowchart and/or one box or multiple boxes in the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造概念,则可对这些实施例作出另外的变更和修改。Although preferred embodiments of the present invention have been described, additional changes and modifications may occur to these embodiments once those skilled in the art understand the basic inventive concepts.
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明及其等同技术的范围之内,则本发明也意图包括这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. Thus, if these modifications and variations of the present invention belong to the scope of the present invention and its equivalent technologies, the present invention is also intended to include these changes and variations.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410913144.XA CN118487716B (en) | 2024-07-09 | 2024-07-09 | An Internet of Things processing method and system for data exchange |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410913144.XA CN118487716B (en) | 2024-07-09 | 2024-07-09 | An Internet of Things processing method and system for data exchange |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118487716A CN118487716A (en) | 2024-08-13 |
CN118487716B true CN118487716B (en) | 2024-09-10 |
Family
ID=92197276
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410913144.XA Active CN118487716B (en) | 2024-07-09 | 2024-07-09 | An Internet of Things processing method and system for data exchange |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118487716B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN119653356B (en) * | 2025-02-13 | 2025-06-03 | 成都愿景仿视科技有限公司 | Multi-level encryption method and system under 5G network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116488919A (en) * | 2023-05-06 | 2023-07-25 | 北京和德宇航技术有限公司 | Data processing method, communication node and storage medium |
CN116932625A (en) * | 2023-07-26 | 2023-10-24 | 金篆信科有限责任公司 | Fuzzy data generation method, device, equipment and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7363310B2 (en) * | 2001-09-04 | 2008-04-22 | Timebase Pty Limited | Mapping of data from XML to SQL |
WO2020002406A1 (en) * | 2018-06-27 | 2020-01-02 | Erland Møller Og Sønner K/S | A method for decoding an encoded user input |
CN112671921A (en) * | 2020-12-29 | 2021-04-16 | 平安普惠企业管理有限公司 | Data transmission method and device, electronic equipment and readable storage medium |
CN117279038A (en) * | 2022-06-15 | 2023-12-22 | 中兴通讯股份有限公司 | Information transmission methods, devices, base stations, equipment, storage media and program products |
CN118157901A (en) * | 2023-12-27 | 2024-06-07 | 天目山实验室 | Internet of things equipment authentication method and device based on context |
-
2024
- 2024-07-09 CN CN202410913144.XA patent/CN118487716B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116488919A (en) * | 2023-05-06 | 2023-07-25 | 北京和德宇航技术有限公司 | Data processing method, communication node and storage medium |
CN116932625A (en) * | 2023-07-26 | 2023-10-24 | 金篆信科有限责任公司 | Fuzzy data generation method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN118487716A (en) | 2024-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9852306B2 (en) | Conjunctive search in encrypted data | |
US9646166B2 (en) | Masking query data access pattern in encrypted data | |
JP2022549581A (en) | Computing system, method, non-transitory computer-readable medium and computer program product for determining the sequential order of blocks in a DAG-structured blockchain | |
TW201638798A (en) | Database server and client for query processing on encrypted data | |
CN111986764A (en) | Block chain-based medical data sharing method and device, terminal and storage medium | |
CN111797411B (en) | 3D model encryption method and device | |
CN118487716B (en) | An Internet of Things processing method and system for data exchange | |
CN114880697A (en) | Block chain-based data fingerprint generation method and device and storage medium | |
CN111611621A (en) | Block chain based distributed data encryption storage method and electronic equipment | |
CN112434062A (en) | Quasi-real-time data processing method, device, server and storage medium | |
CN116527235A (en) | Data encryption method and device based on key rotation and electronic equipment | |
CN118690396A (en) | A data storage method and system based on blockchain | |
CN110555129B (en) | Space image data interaction method and device based on alliance chain | |
CN112182109A (en) | Distributed data coding storage method based on block chain and electronic equipment | |
CN113051622A (en) | Index construction method, device, equipment and storage medium | |
CN118656345A (en) | A data full-cycle management method, system and medium | |
CN114995949A (en) | Container mirror image construction method and device | |
Shi et al. | Design of file multi-cloud secure storage system based on Web and erasure code | |
CN118468339A (en) | A GPU-based homomorphic ciphertext face concealment query method and system | |
CN114793237B (en) | Smart city data sharing method, equipment and medium based on block chain technology | |
Du et al. | Secure and verifiable keyword search in multiple clouds | |
Yu et al. | Efficient Encrypted Range Query on Cloud Platforms | |
CN115439118B (en) | Digital certificate storage management method based on blockchain | |
CN118332529B (en) | A method, device, medium and electronic device for generating data security identification | |
US11989325B1 (en) | Protecting membership in a secure multi-party computation and/or communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |