CN103401678A - Method for ensuring data transmission safety of Internet of things - Google Patents
Method for ensuring data transmission safety of Internet of things Download PDFInfo
- Publication number
- CN103401678A CN103401678A CN201310324359XA CN201310324359A CN103401678A CN 103401678 A CN103401678 A CN 103401678A CN 201310324359X A CN201310324359X A CN 201310324359XA CN 201310324359 A CN201310324359 A CN 201310324359A CN 103401678 A CN103401678 A CN 103401678A
- Authority
- CN
- China
- Prior art keywords
- data
- internet
- key
- server
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to the technical field of Internet of things, and discloses a method for ensuring the data transmission safety of Internet of things. The method comprises the following specific steps of 1, when data are transmitted by a sensing terminal, encrypting data by adopting a symmetric algorithm key to generate encrypted data; 2, encrypting the symmetric algorithm key by adopting the public key of a corresponding server with a non-symmetric algorithm through the sensing terminal, and generating an encrypted key; 3, transmitting the encrypted data and the encrypted key to the corresponding server of the sensing terminal; and 4, decrypting the encrypted key with the private key of the server to obtain a symmetric algorithm key, and decrypting the encrypted data by adopting the symmetric algorithm key to obtain data. According to the method, transmitted data are encrypted on the sensing terminal of the Internet of things, and corresponding encryption is performed at a server terminal, so that data transmitted in the Internet of things are encrypted data, and the transmission safety of data in the Internet of things is ensured.
Description
Technical field
The present invention relates to the technology of Internet of things field, relate in particular to a kind of method that ensures data transmission of internet of things safety.
Background technology
Internet of Things is the important component part of generation information technology.Its English name is " The Internet of things ", and the user side of Internet of Things extends and expanded between any article and article, carries out information exchange and communicates by letter.The proposition of Internet of Things is that national wisdom urban construction is laid a good foundation, realize the coordination sharing that interconnects in wisdom city, China alliance of Internet of Things school-run enterprise is defined as the combination of nearly all technology and computer, Internet technology instantly by Internet of Things, realizes between object and object: environment and state information Real-Time Sharing and intelligentized collection, transmission, processing, execution.Broadly say, instantly relate to the application of information technology, can include the category of Internet of Things in.
When Internet of Things developed rapidly, the problem such as its Industry Foundation is weak, the key core technology remains to be broken through, there is potential risk in the network information security was still outstanding, needs badly and strengthens guiding and accelerate solving.Along with the high speed development of China's Internet of Things industry, the fail safe of data transmission of internet of things will come into one's own.
Internet of Things connect and process to as if machine and intelligent object and relevant data, its proprietorial characteristic causes the requirement of its information security very high, to the protection of the right of privacy, requires higher.The thinking of safety after the first system of the necessary change of Internet of Things safety, at the beginning of Internet of Things application design and implementation, just consider simultaneously application and safety, both are combined closely from the beginning, systematically consider the safety of sensing layer, network layer and application layer, could solve better various Internet of Things safety problems, the new challenge of reply Internet of Things safety.In addition, the Internet of Things information of different industries has the characteristics of oneself, and the countermeasure of taking also is not quite similar, and therefore needs the specific safety demand in clear and definite Internet of Things, for different Internet of Things application provides safeguard protection.
Usually data, in transmitting procedure, are suffered illegally to steal than being easier to, and the disabled user, by the data analysis to stealing, grasps even security information of user profile, by data being distorted etc., Internet of things system are attacked and are destroyed.Therefore ensure that the safety of data in transmitting procedure is extremely important.Yet in prior art, do not have the safety that a kind of effective method guarantees data transmission of internet of things.
Summary of the invention
The technical problem of data security safeguard mechanism is not provided for Internet of Things of the prior art, the invention discloses a kind of method that ensures data transmission of internet of things safety.
Goal of the invention of the present invention realizes by following technical proposals:
A kind of method that ensures data transmission of internet of things safety, when it comprises the following steps: that specifically step 1. perception terminal sends data, adopt the symmetry algorithm key to be encrypted data, generates enciphered data; Step 2. perception terminal adopts the PKI of its corresponding server the symmetry algorithm key to be carried out to the encryption of asymmetric arithmetic, generates the key after encrypting; Rapid 3. send to by the key after enciphered data and encryption the server that perception terminal is corresponding simultaneously; Step 4. server first adopts the key after its private key will be encrypted to be decrypted, and obtains the symmetry algorithm key, then adopts the symmetry algorithm key to be decrypted enciphered data, obtains data.By transmitting data, be encrypted, guaranteed the fail safe of data transmission of internet of things, symmetric encipherment algorithm and rivest, shamir, adelman use together simultaneously, make the better effects if of encryption, and fail safe is higher.
Further, said method also comprises that judgement sends data and whether is tampered, if be tampered, abandons, otherwise continues to use.The judgement data are tampered, and have further ensured the safety of data.
Further, above-mentioned judgement sends the method whether data be tampered and is specially: perception terminal adopts digest algorithm will send data and processes, and obtains the characteristic at perception terminal place, and this characteristic is sent to the server that perception terminal is corresponding; Server adopts the reception data after identical digest algorithm will be deciphered to process, and obtains the characteristic of server end, relatively the characteristic at perception terminal place and the characteristic of server end, if identical, show that data are not tampered, no person, the expression data are tampered.Whether by digest algorithm, judge fast data is tampered.
Further, said method also comprises: server produces public and private key pair, and private key is kept in server, and PKI is announced with the form of digital certificate, and after the perception terminal access server, downloading digital certificate obtains the PKI of server.PKI is issued, and the terminal of access server can obtain.
Further, above-mentioned symmetry algorithm key K is random number, when each perception terminal sends data D, produces a new random number K.Random number is easily obtained, and data one encryption key, strengthened the fail safe of system.
Further, the said sensed terminal is kept at the PKI of digital certificate in perception terminal after obtaining the digital certificate that server announces.Preserve so that follow-up use.
Further, above-mentioned asymmetric arithmetic is RSA, ECC or SM2 algorithm.Asymmetric arithmetic includes but not limited to the above content of enumerating.
Further, above-mentioned symmetry algorithm is DES, AES, SM1 or SM4 algorithm.Symmetry algorithm includes but not limited to the above content of enumerating.
Further, above-mentioned digital digest algorithm is SHA, SM3 or MD5 algorithm.Digest algorithm includes but not limited to the above content of enumerating.
Beneficial effect of the present invention: will send data D by the perception terminal at Internet of Things and be encrypted, and carry out corresponding deciphering at server end, making in the data of transmitting in network is the data after encrypting, and has ensured the fail safe of Internet of Things data in Internet Transmission.Simultaneously first adopt the symmetry algorithm key K to be encrypted data D, then the symmetry algorithm key K is encrypted.At perception terminal, first adopt the symmetry algorithm key K to be encrypted data D, brought into play the advantage that symmetric encipherment algorithm speed is fast, fail safe is good.Adopt simultaneously asymmetric arithmetic that encryption key K is encrypted, brought into play again rivest, shamir, adelman key management advantage easily.Make the data D that on the one hand perception terminal is sent be encrypted, by double-encryption, guaranteed again the effect of encrypting simultaneously.
The accompanying drawing explanation
Fig. 1 is the data handling procedure of perception terminal.
Fig. 2 is the data handling procedure of server end.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and the specific embodiments, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The invention discloses a kind of method that ensures data transmission of internet of things safety, when it comprises the following steps: that specifically step 1. perception terminal sends data D, adopt the symmetry algorithm key K to be encrypted data D, generate enciphered data M.Step 2. perception terminal adopts the PKI of its corresponding server that the symmetry algorithm key K is encrypted, and generates the key PK after encrypting.Step 3. sends to by the key PK after enciphered data M and encryption the server that perception terminal is corresponding simultaneously.Key PK after step 4. server first adopts its private key to encrypt is decrypted, and obtains the symmetry algorithm key K, then adopts the symmetry algorithm key K to be decrypted enciphered data M, obtains data D.By the perception terminal at Internet of Things, will send data D and be encrypted, and carry out corresponding deciphering at server end, making in the data of transmitting in network is the data after encrypting, and has ensured the fail safe of Internet of Things data in Internet Transmission.Simultaneously first adopt the symmetry algorithm key K to be encrypted data D, then the symmetry algorithm key K is encrypted.At perception terminal, first adopt the symmetry algorithm key K to be encrypted data D, brought into play the advantage that symmetric encipherment algorithm speed is fast, fail safe is good.Adopt simultaneously asymmetric arithmetic that encryption key K is encrypted, brought into play again rivest, shamir, adelman key management advantage easily.Make the data D that on the one hand perception terminal is sent be encrypted, guaranteed again the effect of encrypting simultaneously.
Further, said method also comprises judging whether data D is tampered, if be tampered, abandons, otherwise continues to use.By judgement, transmit data and whether be tampered, guaranteed authenticity and the accuracy of transmission data.
Further, the above-mentioned method that judges whether data D is tampered is specially: perception terminal adopts digest algorithm that data D is processed, and obtains the characteristic Zd at perception terminal place, and this characteristic Zd is sent to the server that perception terminal is corresponding; Server adopts the data D after identical digest algorithm will be deciphered to process, obtain the characteristic Zs of server end, compare the characteristic Zd at perception terminal place and the characteristic Zs of server end, if identical, show that data D is not tampered, no person, the expression data are tampered, and data are abandoned.By digest algorithm, the characteristic of the data of sending and receiving is compared, in a single day data are tampered, and abandon, and have guaranteed correctness and the integrality of data.In the data of routine, do not comprise summary data, but in transmission, adopt the method guarantee data that increase the MAC value to revise.Consider the operational capability problem of internet-of-things terminal, adopted digest algorithm here, to increase efficiency, reduced simultaneously the needed key of MAC computing.
Further, said method also comprises: server produces public and private key pair, and private key is kept in server, and PKI is announced with the form of digital certificate, and after the perception terminal access server, downloading digital certificate obtains the PKI of server.By adopting the right mode of public and private key, guaranteed the safety of private key, facilitated the management of key.
Further, above-mentioned symmetry algorithm key K is random number, when each perception terminal sends data D, produces new random number.Mode by random number is upgraded symmetric key, and the generation of random number is very convenient, and key of an information, make the fail safe of transfer of data obtain guarantee simultaneously.
Further, the said sensed terminal is kept at the PKI of digital certificate in perception terminal after obtaining the digital certificate that server announces.For Internet of Things, corresponding which server of each terminal is fixed substantially, after getting the PKI of server, PKI is preserved, with the use after facilitating.
Further, the right asymmetric cryptographic algorithm of above-mentioned employing public and private key is not subjected to the restriction of the form of algorithm own, can be international public key algorithm RSA, ECC, can be the distinctive public key algorithm SM2 of China yet.Can be self-defining other asymmetric arithmetics more, all can be for the present invention, algorithm itself is not emphasis of the present invention, the encryption and decryption process of each algorithm does not repeat them here.
Further, the symmetric cryptographic algorithm that uses of above-mentioned data encryption can be international algorithm DES, AES etc.Can be also symmetric cryptographic algorithm SM1, the SM4 etc. of national special use.Similarly, can be self-defining other symmetry algorithms more, all can be for the present invention, algorithm itself is not emphasis of the present invention, the encryption and decryption process of each algorithm does not repeat them here.
Further, the cryptographic algorithm that carries out the digital digest computing can be international algorithm SHA, can be also national tailor-made algorithm SM3, MD5 etc.Similarly, can be self-defining other digest algorithms more, all can be for the present invention, algorithm itself is not emphasis of the present invention, the process that each algorithm is obtained characteristic value does not repeat them here.
The data handling procedure of perception terminal as shown in Figure 1, when perception terminal will send data, adopt random number K to be encrypted computing to data, its cryptographic algorithm is the DES algorithm, again data are carried out to the computing of digest algorithm, then adopt PKI to be encrypted computing to random number K, its cryptographic algorithm is RSA Algorithm.Random number after data after finally encrypting, encryption, the result that adopts the digest algorithm computing to obtain send to corresponding server.Wherein encrypted random number and summary computing do not have dividing of sequencing.
The data handling procedure of server end as shown in Figure 2, after server end receives data, adopt the private key of server to be decrypted the symmetric key after encrypting, and obtains symmetric key K.Then adopt symmetric key K to be decrypted computing to data, then the data after deciphering are carried out the computing of digest algorithm.Finally the operation result of digest algorithm and the result of the digest algorithm computing of the perception terminal that receives are compared, judge that data are whether complete or be tampered.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the disclosed form of this paper, should not regard the eliminating to other embodiment as, and can be used for various other combinations, modification and environment, and can, in invention contemplated scope described herein, by technology or the knowledge of above-mentioned instruction or association area, change.And the change that those skilled in the art carry out and variation do not break away from the spirit and scope of the present invention, all should be in the protection range of claims of the present invention.
Claims (9)
1. a method that ensures data transmission of internet of things safety, when it comprises the following steps: that specifically step 1. perception terminal sends data, adopt the symmetry algorithm key to be encrypted data, generates enciphered data; Step 2. perception terminal adopts the PKI of its corresponding server the symmetry algorithm key to be carried out to the encryption of asymmetric arithmetic, generates the key after encrypting; Rapid 3. send to by the key after enciphered data and encryption the server that perception terminal is corresponding simultaneously; Step 4. server first adopts the key after its private key will be encrypted to be decrypted, and obtains the symmetry algorithm key, then adopts the symmetry algorithm key to be decrypted enciphered data, obtains data.
2. the method for guarantee data transmission of internet of things safety as claimed in claim 1, is characterized in that whether the data that described method also comprises that judgement sends are tampered, if be tampered, abandon, otherwise continue to use.
3. the method for guarantee data transmission of internet of things safety as claimed in claim 2, it is characterized in that the method whether described judgement transmission data are tampered is specially: perception terminal adopts digest algorithm will send data and processes, obtain the characteristic at perception terminal place, and this characteristic is sent to the server that perception terminal is corresponding; Server adopts the reception data after identical digest algorithm will be deciphered to process, and obtains the characteristic of server end, relatively the characteristic at perception terminal place and the characteristic of server end, if identical, show that data are not tampered, no person, the expression data are tampered.
4. the method for guarantee data transmission of internet of things safety as claimed in claim 3, it is characterized in that described method also comprises: server produces public and private key pair, private key is kept in server, PKI is announced with the form of digital certificate, after the perception terminal access server, downloading digital certificate obtains the PKI of server.
5. the method for guarantee data transmission of internet of things safety as claimed in claim 4, is characterized in that described symmetry algorithm key K is random number, when each perception terminal sends data D, produces a new random number K.
6. the method for guarantee data transmission of internet of things safety as claimed in claim 5, after it is characterized in that described perception terminal is obtained the digital certificate that server announces, be kept at the PKI in digital certificate in perception terminal.
7. the method for guarantee data transmission of internet of things safety as claimed in claim 6, is characterized in that described asymmetric arithmetic is RSA, ECC or SM2 algorithm.
8. the method for guarantee data transmission of internet of things safety as claimed in claim 7, is characterized in that described symmetry algorithm is DES, AES, SM1 or SM4 algorithm.
9. the method for guarantee data transmission of internet of things safety as claimed in claim 8, is characterized in that described digital digest algorithm is SHA, SM3 or MD5 algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310324359XA CN103401678A (en) | 2013-07-30 | 2013-07-30 | Method for ensuring data transmission safety of Internet of things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310324359XA CN103401678A (en) | 2013-07-30 | 2013-07-30 | Method for ensuring data transmission safety of Internet of things |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103401678A true CN103401678A (en) | 2013-11-20 |
Family
ID=49565209
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310324359XA Pending CN103401678A (en) | 2013-07-30 | 2013-07-30 | Method for ensuring data transmission safety of Internet of things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103401678A (en) |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103560892A (en) * | 2013-11-21 | 2014-02-05 | 深圳中兴网信科技有限公司 | Secret key generation method and secret key generation device |
CN104219041A (en) * | 2014-09-23 | 2014-12-17 | 中国南方电网有限责任公司 | Data transmission encryption method applicable for mobile internet |
CN104735653A (en) * | 2015-04-13 | 2015-06-24 | 东信和平科技股份有限公司 | Wireless communication system and method based on Guomi SM1 algorithm |
CN104852961A (en) * | 2015-04-09 | 2015-08-19 | 黎建军 | Internet of Things data transmission method |
CN105897745A (en) * | 2016-05-26 | 2016-08-24 | 努比亚技术有限公司 | Upgrade package transmission server, system and method |
CN106131088A (en) * | 2016-08-31 | 2016-11-16 | 成都秦川科技发展有限公司 | A kind of information transferring method based on Internet of Things information private passage, Apparatus and system |
CN106131087A (en) * | 2016-08-31 | 2016-11-16 | 成都秦川科技发展有限公司 | A kind of information distributing method based on Internet of Things information private passage and device |
CN106330941A (en) * | 2016-08-31 | 2017-01-11 | 成都秦川科技发展有限公司 | Information private distribution and object control method and apparatus of private channel of Internet of Things |
CN106330943A (en) * | 2016-08-31 | 2017-01-11 | 成都秦川科技发展有限公司 | Internet of things secret channel and public network fuzzy information distribution control method and device |
CN103731270B (en) * | 2013-12-25 | 2017-02-08 | 华南理工大学 | Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm |
CN106603508A (en) * | 2016-11-30 | 2017-04-26 | 青岛海尔科技有限公司 | Wireless encryption communication method, intelligent household electrical appliance, server, and terminal |
CN107070948A (en) * | 2017-05-23 | 2017-08-18 | 广东工业大学 | Signature and verification method based on hybrid encryption algorithm in cloud storage |
CN107612898A (en) * | 2017-09-08 | 2018-01-19 | 四川省绵阳太古软件有限公司 | Internet of Things big data safe transmission and storage method, system |
CN107666491A (en) * | 2017-11-15 | 2018-02-06 | 北京交通大学 | The data transmission method of air-ground integrated network based on symmetric cryptography |
CN107911370A (en) * | 2017-11-22 | 2018-04-13 | 深圳市智物联网络有限公司 | A kind of data ciphering method and device, data decryption method and device |
WO2018076299A1 (en) * | 2016-10-28 | 2018-05-03 | 华为技术有限公司 | Data transmission method and device |
CN108092761A (en) * | 2016-11-22 | 2018-05-29 | 广东亿迅科技有限公司 | A kind of key management method and system based on RSA and 3DES |
CN108737334A (en) * | 2017-04-17 | 2018-11-02 | 中国科学院微电子研究所 | A kind of ECG detecting data uploading system and method |
CN108847930A (en) * | 2018-06-05 | 2018-11-20 | 深圳市中电数通智慧安全科技股份有限公司 | A kind of data transmission method, device and fire-fighting system |
CN109347813A (en) * | 2018-09-27 | 2019-02-15 | 广州邦讯信息系统有限公司 | Internet of things equipment login method, system, computer equipment and storage medium |
CN109450937A (en) * | 2018-12-24 | 2019-03-08 | 深圳市华讯方舟卫星产业科技有限公司 | Information secure communications method, system, network interface card and storage medium |
CN110784480A (en) * | 2019-11-01 | 2020-02-11 | 华云数据有限公司 | Data transmission method, system, equipment and storage medium |
CN110858835A (en) * | 2018-08-24 | 2020-03-03 | 中国电信股份有限公司 | Communication method, system and related device and computer readable storage medium |
CN111431917A (en) * | 2020-03-31 | 2020-07-17 | 上海涵润汽车电子有限公司 | Upgrade package encryption method and device and upgrade package decryption method and device |
CN111626799A (en) * | 2019-02-27 | 2020-09-04 | 珠海横琴现联盛科技发展有限公司 | Machine rental timing settlement method based on tamper-proof encryption algorithm |
CN111770060A (en) * | 2020-06-01 | 2020-10-13 | 中国电力科学研究院有限公司 | Data transmission method for power internet of things and power internet of things |
CN114189359A (en) * | 2021-11-18 | 2022-03-15 | 临沂大学 | Internet of things equipment for avoiding data tampering, and data secure transmission method and system |
CN114255530A (en) * | 2021-12-06 | 2022-03-29 | 深圳供电局有限公司 | Communication safety guarantee method and system for intelligent lock of power supply equipment |
CN114900328A (en) * | 2022-04-01 | 2022-08-12 | 广州新华学院 | Internet of things security sensing access system and method |
CN115632880A (en) * | 2022-12-07 | 2023-01-20 | 国网信息通信产业集团有限公司 | Reliable data transmission and storage method and system based on state cryptographic algorithm |
CN116484443A (en) * | 2023-06-19 | 2023-07-25 | 深圳市优博生活科技有限公司 | Trusted security storage method and device based on hong Monte-go system |
WO2024007122A1 (en) * | 2022-07-04 | 2024-01-11 | 嘉兴倍创网络科技有限公司 | Point-to-point secure communication method for internet of things |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN102710605A (en) * | 2012-05-08 | 2012-10-03 | 重庆大学 | Information security management and control method under cloud manufacturing environment |
-
2013
- 2013-07-30 CN CN201310324359XA patent/CN103401678A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964793A (en) * | 2010-10-08 | 2011-02-02 | 上海银联电子支付服务有限公司 | Method and system for transmitting data between terminal and server and sign-in and payment method |
CN102710605A (en) * | 2012-05-08 | 2012-10-03 | 重庆大学 | Information security management and control method under cloud manufacturing environment |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103560892A (en) * | 2013-11-21 | 2014-02-05 | 深圳中兴网信科技有限公司 | Secret key generation method and secret key generation device |
CN103731270B (en) * | 2013-12-25 | 2017-02-08 | 华南理工大学 | Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm |
CN104219041A (en) * | 2014-09-23 | 2014-12-17 | 中国南方电网有限责任公司 | Data transmission encryption method applicable for mobile internet |
CN104852961A (en) * | 2015-04-09 | 2015-08-19 | 黎建军 | Internet of Things data transmission method |
CN104735653A (en) * | 2015-04-13 | 2015-06-24 | 东信和平科技股份有限公司 | Wireless communication system and method based on Guomi SM1 algorithm |
CN105897745A (en) * | 2016-05-26 | 2016-08-24 | 努比亚技术有限公司 | Upgrade package transmission server, system and method |
CN106330943A (en) * | 2016-08-31 | 2017-01-11 | 成都秦川科技发展有限公司 | Internet of things secret channel and public network fuzzy information distribution control method and device |
CN106330941A (en) * | 2016-08-31 | 2017-01-11 | 成都秦川科技发展有限公司 | Information private distribution and object control method and apparatus of private channel of Internet of Things |
CN106131087A (en) * | 2016-08-31 | 2016-11-16 | 成都秦川科技发展有限公司 | A kind of information distributing method based on Internet of Things information private passage and device |
CN106131088A (en) * | 2016-08-31 | 2016-11-16 | 成都秦川科技发展有限公司 | A kind of information transferring method based on Internet of Things information private passage, Apparatus and system |
WO2018076299A1 (en) * | 2016-10-28 | 2018-05-03 | 华为技术有限公司 | Data transmission method and device |
CN108092761A (en) * | 2016-11-22 | 2018-05-29 | 广东亿迅科技有限公司 | A kind of key management method and system based on RSA and 3DES |
CN106603508A (en) * | 2016-11-30 | 2017-04-26 | 青岛海尔科技有限公司 | Wireless encryption communication method, intelligent household electrical appliance, server, and terminal |
CN108737334A (en) * | 2017-04-17 | 2018-11-02 | 中国科学院微电子研究所 | A kind of ECG detecting data uploading system and method |
CN107070948A (en) * | 2017-05-23 | 2017-08-18 | 广东工业大学 | Signature and verification method based on hybrid encryption algorithm in cloud storage |
CN107612898A (en) * | 2017-09-08 | 2018-01-19 | 四川省绵阳太古软件有限公司 | Internet of Things big data safe transmission and storage method, system |
CN107666491A (en) * | 2017-11-15 | 2018-02-06 | 北京交通大学 | The data transmission method of air-ground integrated network based on symmetric cryptography |
CN107911370A (en) * | 2017-11-22 | 2018-04-13 | 深圳市智物联网络有限公司 | A kind of data ciphering method and device, data decryption method and device |
CN108847930A (en) * | 2018-06-05 | 2018-11-20 | 深圳市中电数通智慧安全科技股份有限公司 | A kind of data transmission method, device and fire-fighting system |
CN110858835A (en) * | 2018-08-24 | 2020-03-03 | 中国电信股份有限公司 | Communication method, system and related device and computer readable storage medium |
CN110858835B (en) * | 2018-08-24 | 2022-02-18 | 中国电信股份有限公司 | Communication method, system and related device and computer readable storage medium |
CN109347813B (en) * | 2018-09-27 | 2021-09-03 | 广州邦讯信息系统有限公司 | Internet of things equipment login method and system, computer equipment and storage medium |
CN109347813A (en) * | 2018-09-27 | 2019-02-15 | 广州邦讯信息系统有限公司 | Internet of things equipment login method, system, computer equipment and storage medium |
CN109450937A (en) * | 2018-12-24 | 2019-03-08 | 深圳市华讯方舟卫星产业科技有限公司 | Information secure communications method, system, network interface card and storage medium |
CN111626799A (en) * | 2019-02-27 | 2020-09-04 | 珠海横琴现联盛科技发展有限公司 | Machine rental timing settlement method based on tamper-proof encryption algorithm |
CN110784480A (en) * | 2019-11-01 | 2020-02-11 | 华云数据有限公司 | Data transmission method, system, equipment and storage medium |
CN111431917A (en) * | 2020-03-31 | 2020-07-17 | 上海涵润汽车电子有限公司 | Upgrade package encryption method and device and upgrade package decryption method and device |
CN111431917B (en) * | 2020-03-31 | 2022-06-03 | 上海涵润汽车电子有限公司 | Upgrade package encryption method and device and upgrade package decryption method and device |
CN111770060A (en) * | 2020-06-01 | 2020-10-13 | 中国电力科学研究院有限公司 | Data transmission method for power internet of things and power internet of things |
CN114189359B (en) * | 2021-11-18 | 2023-12-01 | 临沂大学 | Internet of things equipment capable of avoiding data tampering, data safety transmission method and system |
CN114189359A (en) * | 2021-11-18 | 2022-03-15 | 临沂大学 | Internet of things equipment for avoiding data tampering, and data secure transmission method and system |
CN114255530A (en) * | 2021-12-06 | 2022-03-29 | 深圳供电局有限公司 | Communication safety guarantee method and system for intelligent lock of power supply equipment |
CN114255530B (en) * | 2021-12-06 | 2024-01-16 | 深圳供电局有限公司 | Communication security guarantee method and system for intelligent lockset of power supply equipment |
CN114900328A (en) * | 2022-04-01 | 2022-08-12 | 广州新华学院 | Internet of things security sensing access system and method |
WO2024007122A1 (en) * | 2022-07-04 | 2024-01-11 | 嘉兴倍创网络科技有限公司 | Point-to-point secure communication method for internet of things |
CN115632880A (en) * | 2022-12-07 | 2023-01-20 | 国网信息通信产业集团有限公司 | Reliable data transmission and storage method and system based on state cryptographic algorithm |
CN115632880B (en) * | 2022-12-07 | 2023-03-21 | 国网信息通信产业集团有限公司 | Reliable data transmission and storage method and system based on state cryptographic algorithm |
CN116484443A (en) * | 2023-06-19 | 2023-07-25 | 深圳市优博生活科技有限公司 | Trusted security storage method and device based on hong Monte-go system |
CN116484443B (en) * | 2023-06-19 | 2023-09-15 | 深圳市优博生活科技有限公司 | Trusted security storage method and device based on hong Monte-go system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103401678A (en) | Method for ensuring data transmission safety of Internet of things | |
US11075759B2 (en) | Fingerprint data processing method and processing apparatus | |
CN102024123B (en) | Method and device for importing mirror image of virtual machine in cloud calculation | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN107454079A (en) | Lightweight device authentication and shared key machinery of consultation based on platform of internet of things | |
CN107896223A (en) | A kind of data processing method and system, data collecting system and data receiving system | |
WO2016058404A1 (en) | Entity authentication method and device based on pre-shared key | |
CN103716157A (en) | Grouped multiple-key encryption method and grouped multiple-key encryption device | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
Sasi et al. | A general comparison of symmetric and asymmetric cryptosystems for WSNs and an overview of location based encryption technique for improving security | |
CN102025744A (en) | Import and export system of virtual machine image in cloud computing | |
CN104052606A (en) | Digital signature, signature authentication device and digital signature method | |
CN104852961A (en) | Internet of Things data transmission method | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN103117851A (en) | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) | |
CN106209916A (en) | Industrial automation produces business data transmission encryption and decryption method and system | |
CN106161472A (en) | A kind of method of data encryption, Apparatus and system | |
CN110460436A (en) | Hardware device key management method, system, storage medium and computer equipment | |
CN105791258A (en) | Data transmission method, terminal and open platform | |
CN106453362A (en) | Data transmission method and apparatus of vehicle-mounted device | |
CN104717213A (en) | Encryption and decryption method and system for network data transmission | |
CN204808325U (en) | Carry out black equipment to data | |
KR101929355B1 (en) | Encryption and decryption system using unique serial number and symmetric cryptography | |
CN102025743A (en) | Method and device for exporting mirror image of virtual machine in cloud computing | |
CN113408013A (en) | Encryption and decryption chip framework with multiple algorithm rules mixed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20131120 |