CN103401678A - Method for ensuring data transmission safety of Internet of things - Google Patents

Method for ensuring data transmission safety of Internet of things Download PDF

Info

Publication number
CN103401678A
CN103401678A CN201310324359XA CN201310324359A CN103401678A CN 103401678 A CN103401678 A CN 103401678A CN 201310324359X A CN201310324359X A CN 201310324359XA CN 201310324359 A CN201310324359 A CN 201310324359A CN 103401678 A CN103401678 A CN 103401678A
Authority
CN
China
Prior art keywords
data
internet
key
server
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310324359XA
Other languages
Chinese (zh)
Inventor
赵银春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201310324359XA priority Critical patent/CN103401678A/en
Publication of CN103401678A publication Critical patent/CN103401678A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to the technical field of Internet of things, and discloses a method for ensuring the data transmission safety of Internet of things. The method comprises the following specific steps of 1, when data are transmitted by a sensing terminal, encrypting data by adopting a symmetric algorithm key to generate encrypted data; 2, encrypting the symmetric algorithm key by adopting the public key of a corresponding server with a non-symmetric algorithm through the sensing terminal, and generating an encrypted key; 3, transmitting the encrypted data and the encrypted key to the corresponding server of the sensing terminal; and 4, decrypting the encrypted key with the private key of the server to obtain a symmetric algorithm key, and decrypting the encrypted data by adopting the symmetric algorithm key to obtain data. According to the method, transmitted data are encrypted on the sensing terminal of the Internet of things, and corresponding encryption is performed at a server terminal, so that data transmitted in the Internet of things are encrypted data, and the transmission safety of data in the Internet of things is ensured.

Description

A kind of method that ensures data transmission of internet of things safety
Technical field
The present invention relates to the technology of Internet of things field, relate in particular to a kind of method that ensures data transmission of internet of things safety.
Background technology
Internet of Things is the important component part of generation information technology.Its English name is " The Internet of things ", and the user side of Internet of Things extends and expanded between any article and article, carries out information exchange and communicates by letter.The proposition of Internet of Things is that national wisdom urban construction is laid a good foundation, realize the coordination sharing that interconnects in wisdom city, China alliance of Internet of Things school-run enterprise is defined as the combination of nearly all technology and computer, Internet technology instantly by Internet of Things, realizes between object and object: environment and state information Real-Time Sharing and intelligentized collection, transmission, processing, execution.Broadly say, instantly relate to the application of information technology, can include the category of Internet of Things in.
When Internet of Things developed rapidly, the problem such as its Industry Foundation is weak, the key core technology remains to be broken through, there is potential risk in the network information security was still outstanding, needs badly and strengthens guiding and accelerate solving.Along with the high speed development of China's Internet of Things industry, the fail safe of data transmission of internet of things will come into one's own.
Internet of Things connect and process to as if machine and intelligent object and relevant data, its proprietorial characteristic causes the requirement of its information security very high, to the protection of the right of privacy, requires higher.The thinking of safety after the first system of the necessary change of Internet of Things safety, at the beginning of Internet of Things application design and implementation, just consider simultaneously application and safety, both are combined closely from the beginning, systematically consider the safety of sensing layer, network layer and application layer, could solve better various Internet of Things safety problems, the new challenge of reply Internet of Things safety.In addition, the Internet of Things information of different industries has the characteristics of oneself, and the countermeasure of taking also is not quite similar, and therefore needs the specific safety demand in clear and definite Internet of Things, for different Internet of Things application provides safeguard protection.
Usually data, in transmitting procedure, are suffered illegally to steal than being easier to, and the disabled user, by the data analysis to stealing, grasps even security information of user profile, by data being distorted etc., Internet of things system are attacked and are destroyed.Therefore ensure that the safety of data in transmitting procedure is extremely important.Yet in prior art, do not have the safety that a kind of effective method guarantees data transmission of internet of things.
Summary of the invention
The technical problem of data security safeguard mechanism is not provided for Internet of Things of the prior art, the invention discloses a kind of method that ensures data transmission of internet of things safety.
Goal of the invention of the present invention realizes by following technical proposals:
A kind of method that ensures data transmission of internet of things safety, when it comprises the following steps: that specifically step 1. perception terminal sends data, adopt the symmetry algorithm key to be encrypted data, generates enciphered data; Step 2. perception terminal adopts the PKI of its corresponding server the symmetry algorithm key to be carried out to the encryption of asymmetric arithmetic, generates the key after encrypting; Rapid 3. send to by the key after enciphered data and encryption the server that perception terminal is corresponding simultaneously; Step 4. server first adopts the key after its private key will be encrypted to be decrypted, and obtains the symmetry algorithm key, then adopts the symmetry algorithm key to be decrypted enciphered data, obtains data.By transmitting data, be encrypted, guaranteed the fail safe of data transmission of internet of things, symmetric encipherment algorithm and rivest, shamir, adelman use together simultaneously, make the better effects if of encryption, and fail safe is higher.
Further, said method also comprises that judgement sends data and whether is tampered, if be tampered, abandons, otherwise continues to use.The judgement data are tampered, and have further ensured the safety of data.
Further, above-mentioned judgement sends the method whether data be tampered and is specially: perception terminal adopts digest algorithm will send data and processes, and obtains the characteristic at perception terminal place, and this characteristic is sent to the server that perception terminal is corresponding; Server adopts the reception data after identical digest algorithm will be deciphered to process, and obtains the characteristic of server end, relatively the characteristic at perception terminal place and the characteristic of server end, if identical, show that data are not tampered, no person, the expression data are tampered.Whether by digest algorithm, judge fast data is tampered.
Further, said method also comprises: server produces public and private key pair, and private key is kept in server, and PKI is announced with the form of digital certificate, and after the perception terminal access server, downloading digital certificate obtains the PKI of server.PKI is issued, and the terminal of access server can obtain.
Further, above-mentioned symmetry algorithm key K is random number, when each perception terminal sends data D, produces a new random number K.Random number is easily obtained, and data one encryption key, strengthened the fail safe of system.
Further, the said sensed terminal is kept at the PKI of digital certificate in perception terminal after obtaining the digital certificate that server announces.Preserve so that follow-up use.
Further, above-mentioned asymmetric arithmetic is RSA, ECC or SM2 algorithm.Asymmetric arithmetic includes but not limited to the above content of enumerating.
Further, above-mentioned symmetry algorithm is DES, AES, SM1 or SM4 algorithm.Symmetry algorithm includes but not limited to the above content of enumerating.
Further, above-mentioned digital digest algorithm is SHA, SM3 or MD5 algorithm.Digest algorithm includes but not limited to the above content of enumerating.
Beneficial effect of the present invention: will send data D by the perception terminal at Internet of Things and be encrypted, and carry out corresponding deciphering at server end, making in the data of transmitting in network is the data after encrypting, and has ensured the fail safe of Internet of Things data in Internet Transmission.Simultaneously first adopt the symmetry algorithm key K to be encrypted data D, then the symmetry algorithm key K is encrypted.At perception terminal, first adopt the symmetry algorithm key K to be encrypted data D, brought into play the advantage that symmetric encipherment algorithm speed is fast, fail safe is good.Adopt simultaneously asymmetric arithmetic that encryption key K is encrypted, brought into play again rivest, shamir, adelman key management advantage easily.Make the data D that on the one hand perception terminal is sent be encrypted, by double-encryption, guaranteed again the effect of encrypting simultaneously.
The accompanying drawing explanation
Fig. 1 is the data handling procedure of perception terminal.
Fig. 2 is the data handling procedure of server end.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and the specific embodiments, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The invention discloses a kind of method that ensures data transmission of internet of things safety, when it comprises the following steps: that specifically step 1. perception terminal sends data D, adopt the symmetry algorithm key K to be encrypted data D, generate enciphered data M.Step 2. perception terminal adopts the PKI of its corresponding server that the symmetry algorithm key K is encrypted, and generates the key PK after encrypting.Step 3. sends to by the key PK after enciphered data M and encryption the server that perception terminal is corresponding simultaneously.Key PK after step 4. server first adopts its private key to encrypt is decrypted, and obtains the symmetry algorithm key K, then adopts the symmetry algorithm key K to be decrypted enciphered data M, obtains data D.By the perception terminal at Internet of Things, will send data D and be encrypted, and carry out corresponding deciphering at server end, making in the data of transmitting in network is the data after encrypting, and has ensured the fail safe of Internet of Things data in Internet Transmission.Simultaneously first adopt the symmetry algorithm key K to be encrypted data D, then the symmetry algorithm key K is encrypted.At perception terminal, first adopt the symmetry algorithm key K to be encrypted data D, brought into play the advantage that symmetric encipherment algorithm speed is fast, fail safe is good.Adopt simultaneously asymmetric arithmetic that encryption key K is encrypted, brought into play again rivest, shamir, adelman key management advantage easily.Make the data D that on the one hand perception terminal is sent be encrypted, guaranteed again the effect of encrypting simultaneously.
Further, said method also comprises judging whether data D is tampered, if be tampered, abandons, otherwise continues to use.By judgement, transmit data and whether be tampered, guaranteed authenticity and the accuracy of transmission data.
Further, the above-mentioned method that judges whether data D is tampered is specially: perception terminal adopts digest algorithm that data D is processed, and obtains the characteristic Zd at perception terminal place, and this characteristic Zd is sent to the server that perception terminal is corresponding; Server adopts the data D after identical digest algorithm will be deciphered to process, obtain the characteristic Zs of server end, compare the characteristic Zd at perception terminal place and the characteristic Zs of server end, if identical, show that data D is not tampered, no person, the expression data are tampered, and data are abandoned.By digest algorithm, the characteristic of the data of sending and receiving is compared, in a single day data are tampered, and abandon, and have guaranteed correctness and the integrality of data.In the data of routine, do not comprise summary data, but in transmission, adopt the method guarantee data that increase the MAC value to revise.Consider the operational capability problem of internet-of-things terminal, adopted digest algorithm here, to increase efficiency, reduced simultaneously the needed key of MAC computing.
Further, said method also comprises: server produces public and private key pair, and private key is kept in server, and PKI is announced with the form of digital certificate, and after the perception terminal access server, downloading digital certificate obtains the PKI of server.By adopting the right mode of public and private key, guaranteed the safety of private key, facilitated the management of key.
Further, above-mentioned symmetry algorithm key K is random number, when each perception terminal sends data D, produces new random number.Mode by random number is upgraded symmetric key, and the generation of random number is very convenient, and key of an information, make the fail safe of transfer of data obtain guarantee simultaneously.
Further, the said sensed terminal is kept at the PKI of digital certificate in perception terminal after obtaining the digital certificate that server announces.For Internet of Things, corresponding which server of each terminal is fixed substantially, after getting the PKI of server, PKI is preserved, with the use after facilitating.
Further, the right asymmetric cryptographic algorithm of above-mentioned employing public and private key is not subjected to the restriction of the form of algorithm own, can be international public key algorithm RSA, ECC, can be the distinctive public key algorithm SM2 of China yet.Can be self-defining other asymmetric arithmetics more, all can be for the present invention, algorithm itself is not emphasis of the present invention, the encryption and decryption process of each algorithm does not repeat them here.
Further, the symmetric cryptographic algorithm that uses of above-mentioned data encryption can be international algorithm DES, AES etc.Can be also symmetric cryptographic algorithm SM1, the SM4 etc. of national special use.Similarly, can be self-defining other symmetry algorithms more, all can be for the present invention, algorithm itself is not emphasis of the present invention, the encryption and decryption process of each algorithm does not repeat them here.
Further, the cryptographic algorithm that carries out the digital digest computing can be international algorithm SHA, can be also national tailor-made algorithm SM3, MD5 etc.Similarly, can be self-defining other digest algorithms more, all can be for the present invention, algorithm itself is not emphasis of the present invention, the process that each algorithm is obtained characteristic value does not repeat them here.
The data handling procedure of perception terminal as shown in Figure 1, when perception terminal will send data, adopt random number K to be encrypted computing to data, its cryptographic algorithm is the DES algorithm, again data are carried out to the computing of digest algorithm, then adopt PKI to be encrypted computing to random number K, its cryptographic algorithm is RSA Algorithm.Random number after data after finally encrypting, encryption, the result that adopts the digest algorithm computing to obtain send to corresponding server.Wherein encrypted random number and summary computing do not have dividing of sequencing.
The data handling procedure of server end as shown in Figure 2, after server end receives data, adopt the private key of server to be decrypted the symmetric key after encrypting, and obtains symmetric key K.Then adopt symmetric key K to be decrypted computing to data, then the data after deciphering are carried out the computing of digest algorithm.Finally the operation result of digest algorithm and the result of the digest algorithm computing of the perception terminal that receives are compared, judge that data are whether complete or be tampered.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the disclosed form of this paper, should not regard the eliminating to other embodiment as, and can be used for various other combinations, modification and environment, and can, in invention contemplated scope described herein, by technology or the knowledge of above-mentioned instruction or association area, change.And the change that those skilled in the art carry out and variation do not break away from the spirit and scope of the present invention, all should be in the protection range of claims of the present invention.

Claims (9)

1. a method that ensures data transmission of internet of things safety, when it comprises the following steps: that specifically step 1. perception terminal sends data, adopt the symmetry algorithm key to be encrypted data, generates enciphered data; Step 2. perception terminal adopts the PKI of its corresponding server the symmetry algorithm key to be carried out to the encryption of asymmetric arithmetic, generates the key after encrypting; Rapid 3. send to by the key after enciphered data and encryption the server that perception terminal is corresponding simultaneously; Step 4. server first adopts the key after its private key will be encrypted to be decrypted, and obtains the symmetry algorithm key, then adopts the symmetry algorithm key to be decrypted enciphered data, obtains data.
2. the method for guarantee data transmission of internet of things safety as claimed in claim 1, is characterized in that whether the data that described method also comprises that judgement sends are tampered, if be tampered, abandon, otherwise continue to use.
3. the method for guarantee data transmission of internet of things safety as claimed in claim 2, it is characterized in that the method whether described judgement transmission data are tampered is specially: perception terminal adopts digest algorithm will send data and processes, obtain the characteristic at perception terminal place, and this characteristic is sent to the server that perception terminal is corresponding; Server adopts the reception data after identical digest algorithm will be deciphered to process, and obtains the characteristic of server end, relatively the characteristic at perception terminal place and the characteristic of server end, if identical, show that data are not tampered, no person, the expression data are tampered.
4. the method for guarantee data transmission of internet of things safety as claimed in claim 3, it is characterized in that described method also comprises: server produces public and private key pair, private key is kept in server, PKI is announced with the form of digital certificate, after the perception terminal access server, downloading digital certificate obtains the PKI of server.
5. the method for guarantee data transmission of internet of things safety as claimed in claim 4, is characterized in that described symmetry algorithm key K is random number, when each perception terminal sends data D, produces a new random number K.
6. the method for guarantee data transmission of internet of things safety as claimed in claim 5, after it is characterized in that described perception terminal is obtained the digital certificate that server announces, be kept at the PKI in digital certificate in perception terminal.
7. the method for guarantee data transmission of internet of things safety as claimed in claim 6, is characterized in that described asymmetric arithmetic is RSA, ECC or SM2 algorithm.
8. the method for guarantee data transmission of internet of things safety as claimed in claim 7, is characterized in that described symmetry algorithm is DES, AES, SM1 or SM4 algorithm.
9. the method for guarantee data transmission of internet of things safety as claimed in claim 8, is characterized in that described digital digest algorithm is SHA, SM3 or MD5 algorithm.
CN201310324359XA 2013-07-30 2013-07-30 Method for ensuring data transmission safety of Internet of things Pending CN103401678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310324359XA CN103401678A (en) 2013-07-30 2013-07-30 Method for ensuring data transmission safety of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310324359XA CN103401678A (en) 2013-07-30 2013-07-30 Method for ensuring data transmission safety of Internet of things

Publications (1)

Publication Number Publication Date
CN103401678A true CN103401678A (en) 2013-11-20

Family

ID=49565209

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310324359XA Pending CN103401678A (en) 2013-07-30 2013-07-30 Method for ensuring data transmission safety of Internet of things

Country Status (1)

Country Link
CN (1) CN103401678A (en)

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560892A (en) * 2013-11-21 2014-02-05 深圳中兴网信科技有限公司 Secret key generation method and secret key generation device
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104735653A (en) * 2015-04-13 2015-06-24 东信和平科技股份有限公司 Wireless communication system and method based on Guomi SM1 algorithm
CN104852961A (en) * 2015-04-09 2015-08-19 黎建军 Internet of Things data transmission method
CN105897745A (en) * 2016-05-26 2016-08-24 努比亚技术有限公司 Upgrade package transmission server, system and method
CN106131088A (en) * 2016-08-31 2016-11-16 成都秦川科技发展有限公司 A kind of information transferring method based on Internet of Things information private passage, Apparatus and system
CN106131087A (en) * 2016-08-31 2016-11-16 成都秦川科技发展有限公司 A kind of information distributing method based on Internet of Things information private passage and device
CN106330941A (en) * 2016-08-31 2017-01-11 成都秦川科技发展有限公司 Information private distribution and object control method and apparatus of private channel of Internet of Things
CN106330943A (en) * 2016-08-31 2017-01-11 成都秦川科技发展有限公司 Internet of things secret channel and public network fuzzy information distribution control method and device
CN103731270B (en) * 2013-12-25 2017-02-08 华南理工大学 Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN106603508A (en) * 2016-11-30 2017-04-26 青岛海尔科技有限公司 Wireless encryption communication method, intelligent household electrical appliance, server, and terminal
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN107612898A (en) * 2017-09-08 2018-01-19 四川省绵阳太古软件有限公司 Internet of Things big data safe transmission and storage method, system
CN107666491A (en) * 2017-11-15 2018-02-06 北京交通大学 The data transmission method of air-ground integrated network based on symmetric cryptography
CN107911370A (en) * 2017-11-22 2018-04-13 深圳市智物联网络有限公司 A kind of data ciphering method and device, data decryption method and device
WO2018076299A1 (en) * 2016-10-28 2018-05-03 华为技术有限公司 Data transmission method and device
CN108092761A (en) * 2016-11-22 2018-05-29 广东亿迅科技有限公司 A kind of key management method and system based on RSA and 3DES
CN108737334A (en) * 2017-04-17 2018-11-02 中国科学院微电子研究所 A kind of ECG detecting data uploading system and method
CN108847930A (en) * 2018-06-05 2018-11-20 深圳市中电数通智慧安全科技股份有限公司 A kind of data transmission method, device and fire-fighting system
CN109347813A (en) * 2018-09-27 2019-02-15 广州邦讯信息系统有限公司 Internet of things equipment login method, system, computer equipment and storage medium
CN109450937A (en) * 2018-12-24 2019-03-08 深圳市华讯方舟卫星产业科技有限公司 Information secure communications method, system, network interface card and storage medium
CN110784480A (en) * 2019-11-01 2020-02-11 华云数据有限公司 Data transmission method, system, equipment and storage medium
CN110858835A (en) * 2018-08-24 2020-03-03 中国电信股份有限公司 Communication method, system and related device and computer readable storage medium
CN111431917A (en) * 2020-03-31 2020-07-17 上海涵润汽车电子有限公司 Upgrade package encryption method and device and upgrade package decryption method and device
CN111626799A (en) * 2019-02-27 2020-09-04 珠海横琴现联盛科技发展有限公司 Machine rental timing settlement method based on tamper-proof encryption algorithm
CN111770060A (en) * 2020-06-01 2020-10-13 中国电力科学研究院有限公司 Data transmission method for power internet of things and power internet of things
CN114189359A (en) * 2021-11-18 2022-03-15 临沂大学 Internet of things equipment for avoiding data tampering, and data secure transmission method and system
CN114255530A (en) * 2021-12-06 2022-03-29 深圳供电局有限公司 Communication safety guarantee method and system for intelligent lock of power supply equipment
CN114900328A (en) * 2022-04-01 2022-08-12 广州新华学院 Internet of things security sensing access system and method
CN115632880A (en) * 2022-12-07 2023-01-20 国网信息通信产业集团有限公司 Reliable data transmission and storage method and system based on state cryptographic algorithm
CN116484443A (en) * 2023-06-19 2023-07-25 深圳市优博生活科技有限公司 Trusted security storage method and device based on hong Monte-go system
WO2024007122A1 (en) * 2022-07-04 2024-01-11 嘉兴倍创网络科技有限公司 Point-to-point secure communication method for internet of things

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560892A (en) * 2013-11-21 2014-02-05 深圳中兴网信科技有限公司 Secret key generation method and secret key generation device
CN103731270B (en) * 2013-12-25 2017-02-08 华南理工大学 Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN104219041A (en) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 Data transmission encryption method applicable for mobile internet
CN104852961A (en) * 2015-04-09 2015-08-19 黎建军 Internet of Things data transmission method
CN104735653A (en) * 2015-04-13 2015-06-24 东信和平科技股份有限公司 Wireless communication system and method based on Guomi SM1 algorithm
CN105897745A (en) * 2016-05-26 2016-08-24 努比亚技术有限公司 Upgrade package transmission server, system and method
CN106330943A (en) * 2016-08-31 2017-01-11 成都秦川科技发展有限公司 Internet of things secret channel and public network fuzzy information distribution control method and device
CN106330941A (en) * 2016-08-31 2017-01-11 成都秦川科技发展有限公司 Information private distribution and object control method and apparatus of private channel of Internet of Things
CN106131087A (en) * 2016-08-31 2016-11-16 成都秦川科技发展有限公司 A kind of information distributing method based on Internet of Things information private passage and device
CN106131088A (en) * 2016-08-31 2016-11-16 成都秦川科技发展有限公司 A kind of information transferring method based on Internet of Things information private passage, Apparatus and system
WO2018076299A1 (en) * 2016-10-28 2018-05-03 华为技术有限公司 Data transmission method and device
CN108092761A (en) * 2016-11-22 2018-05-29 广东亿迅科技有限公司 A kind of key management method and system based on RSA and 3DES
CN106603508A (en) * 2016-11-30 2017-04-26 青岛海尔科技有限公司 Wireless encryption communication method, intelligent household electrical appliance, server, and terminal
CN108737334A (en) * 2017-04-17 2018-11-02 中国科学院微电子研究所 A kind of ECG detecting data uploading system and method
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN107612898A (en) * 2017-09-08 2018-01-19 四川省绵阳太古软件有限公司 Internet of Things big data safe transmission and storage method, system
CN107666491A (en) * 2017-11-15 2018-02-06 北京交通大学 The data transmission method of air-ground integrated network based on symmetric cryptography
CN107911370A (en) * 2017-11-22 2018-04-13 深圳市智物联网络有限公司 A kind of data ciphering method and device, data decryption method and device
CN108847930A (en) * 2018-06-05 2018-11-20 深圳市中电数通智慧安全科技股份有限公司 A kind of data transmission method, device and fire-fighting system
CN110858835A (en) * 2018-08-24 2020-03-03 中国电信股份有限公司 Communication method, system and related device and computer readable storage medium
CN110858835B (en) * 2018-08-24 2022-02-18 中国电信股份有限公司 Communication method, system and related device and computer readable storage medium
CN109347813B (en) * 2018-09-27 2021-09-03 广州邦讯信息系统有限公司 Internet of things equipment login method and system, computer equipment and storage medium
CN109347813A (en) * 2018-09-27 2019-02-15 广州邦讯信息系统有限公司 Internet of things equipment login method, system, computer equipment and storage medium
CN109450937A (en) * 2018-12-24 2019-03-08 深圳市华讯方舟卫星产业科技有限公司 Information secure communications method, system, network interface card and storage medium
CN111626799A (en) * 2019-02-27 2020-09-04 珠海横琴现联盛科技发展有限公司 Machine rental timing settlement method based on tamper-proof encryption algorithm
CN110784480A (en) * 2019-11-01 2020-02-11 华云数据有限公司 Data transmission method, system, equipment and storage medium
CN111431917A (en) * 2020-03-31 2020-07-17 上海涵润汽车电子有限公司 Upgrade package encryption method and device and upgrade package decryption method and device
CN111431917B (en) * 2020-03-31 2022-06-03 上海涵润汽车电子有限公司 Upgrade package encryption method and device and upgrade package decryption method and device
CN111770060A (en) * 2020-06-01 2020-10-13 中国电力科学研究院有限公司 Data transmission method for power internet of things and power internet of things
CN114189359B (en) * 2021-11-18 2023-12-01 临沂大学 Internet of things equipment capable of avoiding data tampering, data safety transmission method and system
CN114189359A (en) * 2021-11-18 2022-03-15 临沂大学 Internet of things equipment for avoiding data tampering, and data secure transmission method and system
CN114255530A (en) * 2021-12-06 2022-03-29 深圳供电局有限公司 Communication safety guarantee method and system for intelligent lock of power supply equipment
CN114255530B (en) * 2021-12-06 2024-01-16 深圳供电局有限公司 Communication security guarantee method and system for intelligent lockset of power supply equipment
CN114900328A (en) * 2022-04-01 2022-08-12 广州新华学院 Internet of things security sensing access system and method
WO2024007122A1 (en) * 2022-07-04 2024-01-11 嘉兴倍创网络科技有限公司 Point-to-point secure communication method for internet of things
CN115632880A (en) * 2022-12-07 2023-01-20 国网信息通信产业集团有限公司 Reliable data transmission and storage method and system based on state cryptographic algorithm
CN115632880B (en) * 2022-12-07 2023-03-21 国网信息通信产业集团有限公司 Reliable data transmission and storage method and system based on state cryptographic algorithm
CN116484443A (en) * 2023-06-19 2023-07-25 深圳市优博生活科技有限公司 Trusted security storage method and device based on hong Monte-go system
CN116484443B (en) * 2023-06-19 2023-09-15 深圳市优博生活科技有限公司 Trusted security storage method and device based on hong Monte-go system

Similar Documents

Publication Publication Date Title
CN103401678A (en) Method for ensuring data transmission safety of Internet of things
US11075759B2 (en) Fingerprint data processing method and processing apparatus
CN102024123B (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN105553951A (en) Data transmission method and data transmission device
CN107454079A (en) Lightweight device authentication and shared key machinery of consultation based on platform of internet of things
CN107896223A (en) A kind of data processing method and system, data collecting system and data receiving system
WO2016058404A1 (en) Entity authentication method and device based on pre-shared key
CN103716157A (en) Grouped multiple-key encryption method and grouped multiple-key encryption device
CN109005027B (en) Random data encryption and decryption method, device and system
Sasi et al. A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security
CN102025744A (en) Import and export system of virtual machine image in cloud computing
CN104052606A (en) Digital signature, signature authentication device and digital signature method
CN104852961A (en) Internet of Things data transmission method
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN103117851A (en) Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI)
CN106209916A (en) Industrial automation produces business data transmission encryption and decryption method and system
CN106161472A (en) A kind of method of data encryption, Apparatus and system
CN110460436A (en) Hardware device key management method, system, storage medium and computer equipment
CN105791258A (en) Data transmission method, terminal and open platform
CN106453362A (en) Data transmission method and apparatus of vehicle-mounted device
CN104717213A (en) Encryption and decryption method and system for network data transmission
CN204808325U (en) Carry out black equipment to data
KR101929355B1 (en) Encryption and decryption system using unique serial number and symmetric cryptography
CN102025743A (en) Method and device for exporting mirror image of virtual machine in cloud computing
CN113408013A (en) Encryption and decryption chip framework with multiple algorithm rules mixed

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20131120