High-concurrency data acquisition method and device
A technology for data collection and collection terminals, which is applied to secure communication devices, digital transmission systems, and key distribution, and can solve problems such as difficult to support super-massive concurrent processes, and unable to solve the problem of sending and receiving multiple messages.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] see figure 1 Shown is a flow chart of a high-concurrency data collection method, which is applied to a collection terminal and specifically includes the following steps:
[0042] S101. Perform identity verification to the communication gateway, so that the communication gateway passes the identity verification;
[0043] The verification step specifically includes two steps:
[0044] S1011. Generate a terminal private key according to the serial number of the collection terminal, and send an identity verification request generated using the terminal private key to the communication gateway;
[0045] S1012. Receive the encrypted identity verification response message sent by the communication gateway, wherein the identity verification response message is encrypted using the SM9 encryption algorithm using the gateway private key generated according to the number of the communication gateway, wherein the identity verification The response message is sent by the communicat...
Embodiment 2
[0049] see figure 2 The flow chart of a high-concurrency data acquisition method is shown. This method is applied to a communication gateway. The communication gateway is designed based on a distributed programming platform. There is no single-point bottleneck in the cluster. The number of communication gateways can be expanded horizontally, and the capacity can increase Expand the number of access terminals. Specifically include the following steps:
[0050] S201. Pass the identity verification of the collection terminal;
[0051] Specifically, authentication consists of two steps:
[0052] S2011. Receive the identity verification request generated by using the terminal private key, and obtain the serial number of the collection terminal from the identity verification request, and perform signature authentication on the identity verification request.
[0053] S2012. Sending an encrypted identity verification response message, wherein the identity verification response mes...
Embodiment 3
[0057] For the high-concurrency data collection method provided in the foregoing embodiments, the embodiment of the present invention provides a high-concurrency data collection device, which is applied to a collection terminal, see image 3 Shown is a structural block diagram of a device for high concurrent data acquisition, which includes the following parts:
[0058] Terminal authentication module 31, is used for carrying out identity authentication to communication gateway, so that described communication gateway passes identity authentication;
[0059]The terminal sending module 32 is configured to send encrypted service data to the communication gateway, and receive an encryption instruction sent by the communication gateway.
[0060] Further, the terminal verification module 31 is also used for:
[0061] generating a terminal private key according to the serial number of the collection terminal, and sending an identity verification request generated using the terminal ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


