CN110311904B - Internet of things communication method, device, terminal and computer storage medium - Google Patents

Internet of things communication method, device, terminal and computer storage medium Download PDF

Info

Publication number
CN110311904B
CN110311904B CN201910565295.XA CN201910565295A CN110311904B CN 110311904 B CN110311904 B CN 110311904B CN 201910565295 A CN201910565295 A CN 201910565295A CN 110311904 B CN110311904 B CN 110311904B
Authority
CN
China
Prior art keywords
terminal
mail
signature
management unit
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910565295.XA
Other languages
Chinese (zh)
Other versions
CN110311904A (en
Inventor
王高华
唐占国
余鹏
余凌峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wotrus Ca Ltd
Original Assignee
Wotrus Ca Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wotrus Ca Ltd filed Critical Wotrus Ca Ltd
Priority to CN201910565295.XA priority Critical patent/CN110311904B/en
Priority to PCT/CN2019/094135 priority patent/WO2020258351A1/en
Publication of CN110311904A publication Critical patent/CN110311904A/en
Application granted granted Critical
Publication of CN110311904B publication Critical patent/CN110311904B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a communication method, a device, a terminal and a storage medium of the Internet of things, wherein the method comprises the following steps: the first terminal is in signal connection with a preset first management unit, and the Internet of things communication method comprises the following steps: a first terminal acquires a first execution instruction and acquires a first receiving address of a second terminal from the first execution instruction; the first terminal carries out public key encryption processing on the first execution instruction to generate a first encryption instruction; a first terminal acquires a first sending address and carries out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail; and the first terminal sends the first signature mail to the first management unit so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address. The invention solves the technical problem of low communication safety between traditional Internet of things equipment.

Description

Internet of things communication method, device, terminal and computer storage medium
Technical Field
The invention relates to the technical field of communication of the Internet of things, in particular to a communication method, a communication device, a communication terminal and a computer storage medium of the Internet of things.
Background
With the rapid development of communication technology and the rapid popularization of internet of things technology, internet of things equipment plays an increasingly important role in the work and life of people. And communication safety between the internet of things equipment is more and more emphasized. At present, the communication between internet of things devices is generally realized by adopting an internet mode, and the mode basically adopts an http or https mode to submit collected data to a cloud server. However, the security of the internet communication mode is not high, so that many internet of things devices connected to the internet are very easy to attack, and the rapid development of the internet of things technology is influenced.
Therefore, how to solve the problem of low communication security between the traditional internet of things devices is a technical problem to be solved urgently at present.
Disclosure of Invention
The invention mainly aims to provide a communication method, a device, a terminal and a computer storage medium of the Internet of things, and aims to solve the technical problem of low communication safety among traditional Internet of things devices.
In order to achieve the above object, an embodiment of the present invention provides an internet of things communication method, where the internet of things communication method is applied to a first terminal, and the first terminal is in signal connection with a preset first management unit, and the internet of things communication method includes:
a first terminal acquires a first execution instruction and acquires a first receiving address of a second terminal from the first execution instruction;
the first terminal carries out public key encryption processing on the first execution instruction to generate a first encryption instruction;
a first terminal acquires a first sending address and carries out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail;
and the first terminal sends the first signature mail to the first management unit so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
Optionally, the step of acquiring, by the first terminal, a first delivery address, and performing digital signature processing on the first encryption instruction, the first delivery address, and the first recipient address to generate a first signed mail includes:
the method comprises the steps that a first terminal obtains a first timestamp and first warp-weft information from a preset legal verification source;
and the first terminal carries out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address according to a first timestamp and first weft-passing information so as to generate a first signature mail.
Optionally, the step that the first terminal sends the first signed e-mail to the first management unit, so that the first management unit forwards the first signed e-mail to a second management unit in signal connection with the second terminal according to the first recipient address further includes:
if the first terminal does not acquire the first response mail fed back by the second terminal based on the first signature mail within the preset time, carrying out digital signature processing on the first encryption instruction, the first sending address and the first receiving address again to generate a second signature mail;
and the first terminal sends the second signature mail to the first management unit so that the first management unit forwards the second signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
Optionally, the internet of things communication method further includes:
the first terminal acquires the third signature mail forwarded by the first management unit;
the first terminal conducts signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification;
if the first terminal detects that the third signature mail passes signature verification, a second encryption instruction, a second sending address and a second receiving address are obtained from the third signature mail;
the first terminal carries out private key decryption processing on the second encryption instruction to obtain a second execution instruction;
the first terminal executes the instruction operation corresponding to the second execution instruction;
if the first terminal finishes the instruction operation, generating a second response mail based on the second sending address, the second receiving address and the third signature mail;
and the first terminal sends the second response mail to the first management unit so that the first management unit forwards the second response mail according to the second receiving address.
Optionally, if the first terminal detects that the third signed e-mail passes signature verification, the step of obtaining a second encryption instruction, a second sending address and a second receiving address from the third signed e-mail includes:
the first terminal acquires a second timestamp and second longitude and latitude information in the third signature mail;
the first terminal acquires a third timestamp and third longitude and latitude information matched with the third signature mail from a preset legal verification source;
if the first terminal detects that the second timestamp is matched with the third timestamp and the second longitude and latitude information is matched with the third longitude and latitude information, the third signed mail is confirmed to pass signature verification;
and the first terminal acquires a second encryption instruction, a second sending address and a second receiving address from the third signed mail passing the signature verification.
Optionally, the step that the first terminal sends the second response email to the first management unit, so that the first management unit forwards the second response email according to the second recipient address further includes:
and the first terminal acquires the finished mail serial number of the second response mail and stores the finished mail serial number to a finished instruction list.
Optionally, the step of the first terminal performing signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification includes:
the first terminal obtains the serial number of the mail to be verified of the third signature mail;
and if the first terminal detects that the finished mail serial number matched with the mail serial number to be verified does not exist in the finished instruction list, the first terminal performs signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification.
The invention also provides an internet of things communication device, which is applied to a first terminal, wherein the first terminal is in signal connection with a preset first management unit, and the internet of things communication device comprises:
the first acquisition module is used for acquiring a first execution instruction and acquiring a first receiving address of the second terminal from the first execution instruction;
the encryption module is used for carrying out public key encryption processing on the first execution instruction so as to generate a first encryption instruction;
the signature module is used for acquiring a first sending address and carrying out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail;
and the first sending module is used for sending the first signature mail to the first management unit so that the first management unit can forward the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
Optionally, the signature module includes:
the first acquisition unit is used for acquiring a first timestamp and first warp-weft information from a preset legal verification source;
and the signature unit is used for carrying out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address according to a first timestamp and first weft-passing information so as to generate a first signature mail.
Optionally, the internet of things communication device further includes:
the re-signing module is used for re-performing digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a second signature mail if a first response mail fed back by the second terminal based on the first signature mail is not obtained within a preset time;
and the second sending module is used for sending the second signature mail to the first management unit so that the first management unit can forward the second signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
Optionally, the internet of things communication device further includes:
the second acquisition module is used for acquiring the third signature mail forwarded by the first management unit;
the determining module is used for carrying out signature verification processing on the third signed mail so as to determine whether the third signed mail passes signature verification;
a third obtaining module, configured to obtain a second encryption instruction, a second sending address, and a second receiving address from the third signed email if it is detected that the third signed email passes signature verification;
the decryption module is used for carrying out private key decryption processing on the second encryption instruction to obtain a second execution instruction;
the execution module is used for executing the instruction operation corresponding to the second execution instruction;
the generating module is used for generating a second response mail based on the second sending address, the second receiving address and the third signature mail if the instruction operation is completed;
and the third sending module is used for sending the second response mail to the first management unit so that the first management unit can forward the second response mail according to the second receiving address.
Optionally, the third obtaining module includes:
the second acquisition unit is used for acquiring a second timestamp and second longitude and latitude information in the third signature mail;
the third acquisition unit is used for acquiring a third timestamp and third longitude and latitude information matched with the third signature mail from a preset legal verification source;
the matching unit is used for confirming that the third signature mail passes signature verification if the second timestamp is matched with the third timestamp and the second longitude and latitude information is matched with the third longitude and latitude information;
and the fourth acquisition unit is used for acquiring the second encryption instruction, the second sending address and the second receiving address from the third signed mail passing the signature verification.
Optionally, the internet of things communication device further includes:
and the storage module is used for acquiring the serial number of the finished mail of the second response mail and storing the serial number of the finished mail to a finished instruction list.
Optionally, the determining module includes:
a fifth obtaining unit, configured to obtain a serial number of the mail to be verified of the third signed mail;
and the determining unit is used for carrying out signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification or not if detecting that the completed mail serial number matched with the mail serial number to be verified does not exist in the completed instruction list.
In addition, to achieve the above object, the present invention also provides a terminal, including: a memory, a processor, and an internet of things communication program stored on the memory and executable on the processor, wherein: the communication method of the internet of things is applied to the terminal,
the internet of things communication program realizes the steps of the internet of things communication method when being executed by the processor.
In addition, to achieve the above object, the present invention also provides a computer storage medium;
the computer storage medium is stored with an internet of things communication program, and the steps of the internet of things communication method are realized when the internet of things communication program is executed by a processor.
In the invention, a first terminal acquires a first execution instruction and acquires a first receiving address of a second terminal from the first execution instruction; the first terminal carries out public key encryption processing on the first execution instruction to generate a first encryption instruction; a first terminal acquires a first sending address and carries out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail; and the first terminal sends the first signature mail to the first management unit so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address. The invention adopts a decentralized structure, simplifies the system structure, does not communicate in a command transmission mode, but transmits the command through the mail encryption signature, avoids external malicious attack, and ensures the data purity of the internal equipment of the Internet of things, thereby improving the resistance to external data invasion, data fraud and data leakage, further improving the communication safety among the equipment of the Internet of things, and improving the safety level of the communication of the Internet of things.
Drawings
FIG. 1 is a schematic diagram of an apparatus architecture of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an embodiment of the communication method of the internet of things of the present invention;
fig. 3 is a device communication design diagram of different management units in the communication method of the internet of things of the invention;
fig. 4 is a device communication design diagram of the same management unit in the communication method of the internet of things of the present invention.
The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a PC or a server device.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration of the apparatus shown in fig. 1 is not intended to be limiting of the apparatus and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include an operating system, a network communication module, a user interface module, and an internet of things communication program therein.
In the apparatus shown in fig. 1, the network interface 1004 is primarily used to connect to, and communicate data with, witness participant nodes; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; the processor 1001 may be configured to call the internet-of-things communication program stored in the memory 1005, and perform operations in various embodiments of the internet-of-things communication method described below.
Based on the hardware structure, the embodiment of the communication method of the Internet of things is provided.
The invention provides an internet of things communication method, which is mainly applied to a first terminal, wherein in an embodiment of the internet of things communication method, the first terminal is in signal connection with a preset first management unit, and referring to fig. 2, the internet of things communication method comprises the following steps:
step S10, the first terminal acquires a first execution instruction, and acquires a first receiving address of the second terminal from the first execution instruction;
step S20, the first terminal performs public key encryption processing on the first execution instruction to generate a first encryption instruction;
step S30, the first terminal obtains a first delivery address and carries out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address to generate a first signature mail;
step S40, the first terminal sends the first signature e-mail to the first management unit, so that the first management unit forwards the first signature e-mail to a second management unit in signal connection with the second terminal according to the first recipient address.
In the invention, the first terminal is an Internet of things device (such as a mobile phone, an intelligent household device and the like), and is in signal connection with other Internet of things devices through the Internet of things to realize data communication. The Internet of things equipment receives the e-mails sent by other Internet of things management units in real time, executes related operations, and sends one e-mail to the other side according to the needs after the operations are completed. The communication between the devices of the internet of things and human beings all conform to standard mail protocols including SMTP, IMAP and the like, and SSL transmission encryption protocol is adopted to ensure the communication safety.
The invention adopts a decentralized network structure to process the communication between the devices of the Internet of things, and adopts decentralized networking technology, which is similar to an electronic mail system, and adopts a related protocol-S/MIME to process the data of the Internet of things. Each internet of things management unit is a mail server, and each managed internet of things device is an email account on the mail server, that is to say: identifying each internet of things device with an e-mail box; the management units of the internet of things adopt an SMTP protocol for communication and data exchange, so that each piece of internet of things equipment can safely communicate with any piece of internet of things equipment like an electronic mailbox of each person, and can be interconnected and intercommunicated with an electronic mail system of a human, and communication among the pieces of internet of things equipment and communication between the pieces of internet of things equipment and the human are realized.
The specific contents are as follows:
step S10, the first terminal acquires a first execution instruction, and acquires a first receiving address of the second terminal from the first execution instruction;
in this embodiment, each piece of internet-of-things equipment is set as a mail server, instruction information is sent in a mail form, the equipment receives the instruction information in the mail, and then corresponding instruction operation is executed.
The first execution instruction is preset by a person, or is generated intelligently by the device (for example, the device wakes up another device regularly). The first terminal acquires a first execution instruction and acquires a device mailbox address for receiving the first execution instruction from the first execution instruction. For example, the operations to be performed by the first execution instruction are: the control device information is a and the device numbered a performs the music play operation. Then, the first execution instruction includes the number of the device to execute the instruction, and also includes device information a, where the device information a includes a mailbox address, and the mailbox address is the first recipient address. At this time, the device is the second terminal.
Step S20, the first terminal performs public key encryption processing on the first execution instruction to generate a first encryption instruction;
in order to avoid the damage and the theft of the external malicious program data, the embodiment encrypts the first execution instruction. The encryption process adopts a public key and private key encryption algorithm, and the public key is a public encryption key which is disclosed to each management unit and each equipment end of the Internet of things. The first terminal can directly obtain the public key, and the first execution instruction in the plaintext form is encrypted into the ciphertext form through the public key, so that the first encryption instruction is generated. The encryption process can serve as a data leakage prevention.
Step S30, the first terminal obtains a first delivery address and carries out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address to generate a first signature mail;
and sending the first execution instruction in an email form, wherein the first execution instruction needs to be provided with a first sending address, a first receiving address and a first execution instruction. In this embodiment, each internet of things device binds to the email account corresponding to the identifier, so that the first terminal also includes the corresponding first delivery address to obtain the email address. The first terminal carries out digital signature on the first encryption instruction, the first sending address and the first receiving address so as to obtain a first signature mail. The digital signature processing can play a role in preventing data fraud, and prevents the second terminal from receiving harassing mails and fraudulent mails. The first signature mail is a mail containing a first execution instruction, the plaintext instruction content is encrypted by using a public key, and the instruction mail is signed by using a certificate of the first signature mail, so that the mail cannot be tampered and the integrity of the mail can be guaranteed. The first execution instruction is packaged through the mail, so that the first execution instruction can be protected by a mail protocol in the mail, and data leakage is avoided.
Further, the step S30 includes:
a first terminal acquires a first time stamp and first warp-weft information from a preset legal verification source;
each Internet of things device is provided with a trusted computing chip and a digital certificate representing the identity of the device, the digital certificate is bound with an e-mail address of the device, mini encrypted e-mail client software or a chip is arranged in the Internet of things device and used for receiving encrypted mails from an Internet of things management unit and sending digital signatures and encrypted mails, an S/MIME protocol is adopted, the digital signatures in the mails are used for proving the identity of other communication devices, and the encrypted mails ensure that exchanged information can be decrypted, read and executed only by a receiving device. All communications will be time stamped with location information as needed to effectively document the time of message delivery and the location information delivered.
Specifically, time is identified by timestamp data, and location position information is identified by longitude and latitude information. In order to avoid data fraud, the embodiment adopts a preset legal verification source to obtain the first timestamp and the first longitude and latitude information of the first terminal, wherein the legal verification source is an information verification source which is authenticated by the first terminal and the second terminal together in the invention, and digital visa proofreading service is provided for the first terminal and the second terminal. The first terminal may acquire the first timestamp and the first warp information from a legally verified source before sending the mail.
And b, the first terminal carries out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address according to a first timestamp and first warp information to generate a first signature mail.
And according to the first timestamp and the first longitude and latitude, the first terminal carries out digital signature processing on the first encryption instruction, the first sending address information and the first receiving address information to generate a first signature mail. The first signature mail processed by digital signature is the legal authentication mail of the invention, and any terminal can analyze and execute corresponding instruction operation only by receiving the first signature mail processed by digital signature.
The following is an example of the embodiment, the first terminal acquires the first timestamp 20190501 and 183058 from the legal verification source, acquires the first longitude information as north latitudes 39 ' 26 ' to 41 ' 03 ', and acquires the east longitudes 115 ' 25 ' to 117 ' 30. Then the first terminal carries out digital signature processing according to the first timestamp and the first warp information, so as to mark a digital signature for the first delivery address, the first receiving address and the first encryption instruction, so that the first delivery address, the first receiving address and the first encryption instruction have distinguishable attributes, and the first signature mail is generated by encapsulation.
By using the timestamp and the longitude and latitude information to carry out digital visa, the method and the system can improve the resolution efficiency of the mail information, prevent the internal data security of the Internet of things equipment from being damaged by cheating mails, and greatly improve the communication security between the Internet of things equipment.
Step S40, the first terminal sends the first signature e-mail to the first management unit, so that the first management unit forwards the first signature e-mail to a second management unit in signal connection with the second terminal according to the first recipient address.
After the first signature mail is acquired, the first terminal uploads the first signature mail to the first management unit, and then the first management unit forwards the first signature mail, so that the first signature mail acquired from the first terminal is forwarded to the second management unit associated with the first recipient address, and then the second management unit issues the first signature mail to the second terminal corresponding to the first recipient address. It can be understood that the first receiving address is a basis for the first management unit and the second management unit to forward and issue the first signed e-mail, and the encryption and digital signature process ensures the safety of the e-mail in the forwarding process.
Referring to fig. 3, each internet of things device corresponds to one management unit. One management unit may serve multiple devices. Can communicate with two devices belonging to a management unit; two devices belonging to different management units can also communicate normally.
The first terminal of the device belongs to the first management unit, and the second terminal of the device belongs to the second management unit. The first terminal sends the encrypted and signed mail to the first management unit, the first management unit forwards the mail to the second management unit, and the second terminal acquires the instruction mail sent by the first terminal from the second management unit and executes the instruction mail.
After receiving the instruction mail sent by the first terminal, the second terminal sends a response mail to the second management unit, the second management unit forwards the response mail to the first management unit, and the first terminal acquires the response mail from the first management unit to complete the communication process.
Further, the first terminal and the second terminal may be under the same management unit, and referring to fig. 4, the first terminal and the second terminal are under the first management unit, then the second management unit in the present invention is the first management unit at this time, the first terminal sends the mail with the encrypted signature to the first management unit, and since the first recipient address is the device under the management unit, the second terminal may directly obtain the instruction mail sent by the first terminal from the first management unit and execute the instruction mail. Similarly, after the response email of the second terminal is sent to the first management unit, the first terminal can obtain the response email from the first management unit.
In the invention, a first terminal acquires a first execution instruction and acquires a first receiving address of a second terminal from the first execution instruction; the first terminal carries out public key encryption processing on the first execution instruction to generate a first encryption instruction; a first terminal acquires a first sending address and carries out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail; and the first terminal sends the first signature mail to the first management unit so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address. The invention adopts a decentralized structure, simplifies the system structure, does not communicate in a command transmission mode, but transmits the command through the mail encryption signature, avoids external malicious attack, and ensures the data purity of the internal equipment of the Internet of things, thereby improving the resistance to external data invasion, data fraud and data leakage, further improving the communication safety among the equipment of the Internet of things, and improving the safety level of the communication of the Internet of things.
Further, based on the first embodiment, a second embodiment of the method is proposed, in which,
the step that the first terminal sends the first signature mail to the first management unit so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address further comprises the following steps:
step S50, if the first terminal does not acquire the first response mail fed back by the second terminal based on the first signature mail within the preset time, the first terminal re-performs digital signature processing on the first encryption instruction, the first delivery address and the first receiving address to generate a second signature mail;
after sending out the first signature mail, the second terminal executes relevant operation according to the first signature mail. However, in real life, there may be a situation that the management unit is down or the first terminal is not connected, which may cause a situation that the second terminal does not receive the mail because the first management unit or the second management unit cannot forward the first signed mail due to a fault after the first signed mail is sent to the first management unit. Therefore, the second terminal feeds back the response mail to the first terminal after performing the relevant operation, and if the response mail is not received, it is proved that the second terminal may not receive the first signature mail. In this embodiment, after the first signature email is sent out, a preset time is used as a buffer period, and the response email fed back by the second terminal is not obtained within the preset time, so that the first terminal resends the email to ensure that the second terminal device can execute relevant operations in time. However, since the transmitted mail needs to be repackaged, the digital signature process needs to be performed again, and the second signed mail is generated by digitally signing the mail with information such as a time stamp and latitude and longitude.
Step S60, the first terminal sends the second signed e-mail to the first management unit, so that the first management unit forwards the second signed e-mail to a second management unit in signal connection with the second terminal according to the first recipient address.
The first terminal resends the second signature mail to the first management unit for the first management unit to forward according to the first receiving address. It can be understood that if the first terminal still does not obtain the response mail based on the second signature mail within the preset time after the second signature mail is sent, the first terminal continues to generate a new signature mail and sends the new signature mail to the first management unit for forwarding until the packaged mail of the instruction to be executed is sent to the second terminal.
Through the embodiment, the phenomenon that the second terminal does not execute corresponding functional operation due to the fact that things or faults of the intermediate forwarding link occur can be avoided, and the completeness of mail communication is improved.
Further, based on the first embodiment, a second embodiment of the method is provided, in which the method for communicating the internet of things further includes:
step A, a first terminal acquires a third signature mail forwarded by a first management unit;
step B, the first terminal conducts signature verification processing on the third signature mail to determine whether the third signature mail passes signature verification;
each management unit of the internet of things has an access control rule, and the second terminal in the implementation can be set to receive only mails with digital signatures and encrypted mails and can be set to receive only encrypted mails sent by mailboxes with domain names, so that the problem of spam on the internet is prevented from happening on the internet of things.
In this embodiment, any one of the internet of things devices can send and receive mail information. And if the first management unit acquires the third signature mail forwarded by the first management unit, performing signature verification processing on the mail. The signature verification processing is signature verification processing, and the processing step verifies whether the third signature mail is a legal mail or not so as to avoid malicious operations such as data intrusion, data stealing and the like of malicious mails such as cheat mails, phishing mails or attack mails and the like.
Step C, if the first terminal detects that the third signature mail passes signature verification, a second encryption instruction, a second sending address and a second receiving address are obtained from the third signature mail;
specifically, the step C includes:
step C1, the first terminal acquires a second timestamp and second longitude and latitude information in the third signature mail;
step C2, the first terminal acquires a third timestamp and third longitude and latitude information matched with the third signature mail from a preset legal verification source;
the second timestamp and the second longitude and latitude information are verification data samples for the first terminal to confirm that the third signature mail is legal, and after the second timestamp and the second longitude and latitude information are obtained, the first terminal needs to obtain the third timestamp and the third longitude and latitude information which are matched with the third signature mail from a legal verification source. Since whether the third signed e-mail received by the first terminal is legal or not is unknown, the third timestamp and the third longitude and latitude information of the third signed e-mail stored on the legal verification source need to be judged.
Step C3, if the first terminal detects that the second timestamp is matched with the third timestamp and the second longitude and latitude information is matched with the third longitude and latitude information, the first terminal confirms that the third signed e-mail passes signature verification;
if the second timestamp is matched with the third timestamp (for example, the timestamps are uniform), and the second longitude and latitude information is matched with the third longitude and latitude information (for example, the longitude and latitude are uniform), the third signed mail can be confirmed to pass the signature verification. On the contrary, if any data of the timestamp or the longitude and latitude information does not match, the signature verification is not passed.
And step C4, the first terminal acquires the second encryption instruction, the second sending address and the second receiving address from the third signed mail passing the signature verification.
And the third signed e-mail passing the signature verification is a legal e-mail, and at the moment, the first terminal executes the operation of obtaining the second encryption instruction, the second sending address and the second receiving address for subsequent use.
Through the verification of the timestamp and the longitude and latitude information, most of malicious mail information such as fraudulent mails, phishing mails and attack mails can be filtered out, and the data safety and the communication safety in the Internet of things equipment are guaranteed.
D, the first terminal performs private key decryption processing on the second encryption instruction to obtain a second execution instruction;
the second encryption instruction is formed by encrypting through a public key and private key encryption algorithm, and decryption can be performed through private key decryption processing after the second encryption instruction is obtained. Each terminal has respective private key data, and only the device can decrypt and obtain correct decrypted data. By decrypting the second encryption instruction, the first terminal can convert ciphertext data in the second encryption instruction into plaintext data, so as to obtain a second execution instruction in a plaintext form.
Step E, the first terminal executes the instruction operation corresponding to the second execution instruction;
step F, if the first terminal finishes the instruction operation, generating a second response mail based on the second sending address, the second receiving address and a third signature mail;
and the first terminal executes corresponding instruction operation according to the second execution instruction. In order to complete the mail communication, after the instruction operation is completed, a first response mail is generated based on the second sending address, the second receiving address and the second signature mailbox address, and the response mail is mainly sent to a receiving terminal corresponding to the second receiving address to inform the receiving terminal that the communication is completed, so that the effect of finishing the communication is achieved.
And G, the first terminal sends the second response mail to the first management unit so that the first management unit can forward the second response mail according to the second receiving address.
And the first terminal sends the second response mail to the first management unit, and the first management unit sends the second response mail to the corresponding management unit for forwarding so as to finally reach the receiving terminal corresponding to the second receiving address.
It can be understood that any internet of things device in the invention can be a first terminal and a second terminal, the first terminal can decrypt the private key after verifying the signature of the third signature email, and if the signature verification fails or the email ciphertext is decrypted fails, the email is discarded without performing any operation.
Further, based on the second embodiment, a third embodiment of the method is provided, in which step G further includes:
and step H, the first terminal acquires the finished mail serial number of the second response mail and stores the finished mail serial number to a finished instruction list.
In this embodiment, the first terminal acquires the completed email serial number of the second response email, where the serial number provides identification information of the third signature email, and the first terminal may store the execution record of the device communication and store the execution record in the completed instruction list when acquiring the serial number. And storing the corresponding completed mail serial number into a completed instruction list every time the execution operation is completed.
Further, after H, if step B is executed, step B includes:
step B1, the first terminal obtains the serial number of the mail to be verified of the third signature mail;
step B2, if the first terminal detects that the completed email serial number matched with the email serial number to be verified does not exist in the completed instruction list, the first terminal performs signature verification processing on the third signed email to determine whether the third signed email passes signature verification.
In the process of sending and acquiring the mails, the first terminal cannot send out the response mails in time due to the fault or delay of the information transmission or management unit, so that the communication is not finished; if terminal A retransmits the mail, terminal B needs to confirm whether the execution procedure of the re-mail is completed, if so, the mail can be ignored, if not, the relevant operation needs to be executed.
In this embodiment, if the first terminal detects the third signed e-mail, the first terminal may obtain the serial number of the e-mail to be verified in the e-mail, and retrieve the serial number. And if the completed mail serial number corresponding to the mail serial number to be verified exists in the completed instruction list, the fact that the execution function operation referred by the current third signature mail is executed by the first terminal is proved to be completed without executing again. Otherwise, it is proved that the first terminal has not executed the function operation corresponding to the third signed e-mail, and the first terminal needs to check the third signed e-mail to determine whether the e-mail is a legal e-mail.
By processing the second signature mail, the phenomenon that the management unit, the first terminal or the second terminal misses the execution operation due to downtime or faults is avoided.
In addition, an embodiment of the present invention further provides an internet of things communication device, where the internet of things communication device is applied to a first terminal, the first terminal is in signal connection with a preset first management unit, and the internet of things communication device includes:
the first acquisition module is used for acquiring a first execution instruction and acquiring a first receiving address of the second terminal from the first execution instruction;
the encryption module is used for carrying out public key encryption processing on the first execution instruction so as to generate a first encryption instruction;
the signature module is used for acquiring a first sending address and carrying out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail;
and the first sending module is used for sending the first signature mail to the first management unit so that the first management unit can forward the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
Optionally, the signature module includes:
the first acquisition unit is used for acquiring a first timestamp and first warp-weft information from a preset legal verification source;
and the signature unit is used for carrying out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address according to a first timestamp and first weft-passing information so as to generate a first signature mail.
Optionally, the internet of things communication device further includes:
the re-signing module is used for re-performing digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a second signature mail if a first response mail fed back by the second terminal based on the first signature mail is not obtained within a preset time;
and the second sending module is used for sending the second signature mail to the first management unit so that the first management unit can forward the second signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
Optionally, the internet of things communication device further includes:
the second acquisition module is used for acquiring the third signature mail forwarded by the first management unit;
the determining module is used for carrying out signature verification processing on the third signed mail so as to determine whether the third signed mail passes signature verification;
a third obtaining module, configured to obtain a second encryption instruction, a second sending address, and a second receiving address from the third signed email if it is detected that the third signed email passes signature verification;
the decryption module is used for carrying out private key decryption processing on the second encryption instruction to obtain a second execution instruction;
the execution module is used for executing the instruction operation corresponding to the second execution instruction;
the generating module is used for generating a second response mail based on the second sending address, the second receiving address and the third signature mail if the instruction operation is completed;
and the third sending module is used for sending the second response mail to the first management unit so that the first management unit can forward the second response mail according to the second receiving address.
Optionally, the third obtaining module includes:
the second acquisition unit is used for acquiring a second timestamp and second longitude and latitude information in the third signature mail;
the third acquisition unit is used for acquiring a third timestamp and third longitude and latitude information matched with the third signature mail from a preset legal verification source;
the matching unit is used for confirming that the third signature mail passes signature verification if the second timestamp is matched with the third timestamp and the second longitude and latitude information is matched with the third longitude and latitude information;
and the fourth acquisition unit is used for acquiring the second encryption instruction, the second sending address and the second receiving address from the third signed mail passing the signature verification.
Optionally, the internet of things communication device further includes:
and the storage module is used for acquiring the serial number of the finished mail of the second response mail and storing the serial number of the finished mail to a finished instruction list.
Optionally, the determining module includes:
a fifth obtaining unit, configured to obtain a serial number of the mail to be verified of the third signed mail;
and the determining unit is used for carrying out signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification or not if detecting that the completed mail serial number matched with the mail serial number to be verified does not exist in the completed instruction list.
In addition, an embodiment of the present invention further provides a terminal, where the terminal includes: the communication device comprises a memory 109, a processor 110 and an internet of things communication program stored on the memory 109 and capable of running on the processor 110, wherein the internet of things communication program realizes the steps of the embodiments of the internet of things communication method when being executed by the processor 110.
In addition, the invention also provides a computer storage medium, wherein the computer storage medium stores the internet of things communication program, and the internet of things communication program can be executed by a processor to realize the steps of the internet of things communication method.
The specific implementation of the terminal and the computer storage medium of the present invention has basically the same expansion content as the embodiments of the communication method of the internet of things, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a computer storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. The communication method of the Internet of things is applied to a first terminal, the first terminal is in signal connection with a preset first management unit, and the communication method of the Internet of things comprises the following steps:
a first terminal acquires a first execution instruction and acquires a first receiving address of a second terminal from the first execution instruction;
the first terminal carries out public key encryption processing on the first execution instruction to generate a first encryption instruction;
a first terminal acquires a first sending address and carries out digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail, wherein the first terminal encapsulates the first encryption instruction through the mail;
the first terminal sends the first signature mail to the first management unit, so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first receiving address, so that the second terminal executes an operation corresponding to the first execution instruction after acquiring the first signature mail from the second management unit, wherein the first terminal and the second terminal are internet of things devices, the first management unit and the second management unit are mail servers, the first receiving address is a mailbox address bound by the second terminal, and the first sending address is a mailbox address bound by the first terminal.
2. The internet of things communication method of claim 1, wherein the step of the first terminal obtaining a first delivery address and performing digital signature processing on the first encryption instruction, the first delivery address and the first receiving address to generate a first signature mail comprises:
the method comprises the steps that a first terminal obtains a first timestamp and first warp-weft information from a preset legal verification source;
and the first terminal carries out digital signature processing on the first encryption instruction, the first delivery address and the first receiving address according to a first timestamp and first weft-passing information so as to generate a first signature mail.
3. The communication method of the Internet of things according to claim 1,
the step that the first terminal sends the first signature mail to the first management unit so that the first management unit forwards the first signature mail to a second management unit in signal connection with the second terminal according to the first recipient address further comprises the following steps:
if the first terminal does not acquire the first response mail fed back by the second terminal based on the first signature mail within the preset time, carrying out digital signature processing on the first encryption instruction, the first sending address and the first receiving address again to generate a second signature mail;
and the first terminal sends the second signature mail to the first management unit so that the first management unit forwards the second signature mail to a second management unit in signal connection with the second terminal according to the first recipient address.
4. The communication method of the internet of things of claim 1, further comprising:
the first terminal acquires the third signature mail forwarded by the first management unit;
the first terminal conducts signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification;
if the first terminal detects that the third signature mail passes signature verification, a second encryption instruction, a second sending address and a second receiving address are obtained from the third signature mail;
the first terminal carries out private key decryption processing on the second encryption instruction to obtain a second execution instruction;
the first terminal executes the instruction operation corresponding to the second execution instruction;
if the first terminal finishes the instruction operation, generating a second response mail based on the second sending address, the second receiving address and the third signature mail;
and the first terminal sends the second response mail to the first management unit so that the first management unit forwards the second response mail according to the second receiving address.
5. The internet of things communication method of claim 4, wherein the step of acquiring a second encryption instruction, a second sending address and a second receiving address from the third signed email by the first terminal if the first terminal detects that the third signed email passes signature verification comprises:
the first terminal acquires a second timestamp and second longitude and latitude information in the third signature mail;
the first terminal acquires a third timestamp and third longitude and latitude information matched with the third signature mail from a preset legal verification source;
if the first terminal detects that the second timestamp is matched with the third timestamp and the second longitude and latitude information is matched with the third longitude and latitude information, the third signed mail is confirmed to pass signature verification;
and the first terminal acquires a second encryption instruction, a second sending address and a second receiving address from the third signed mail passing the signature verification.
6. The internet of things communication method of claim 4, wherein the step of sending the second response e-mail to the first management unit by the first terminal, so that the first management unit forwards the second response e-mail according to the second recipient address further comprises:
and the first terminal acquires the finished mail serial number of the second response mail and stores the finished mail serial number to a finished instruction list.
7. The internet-of-things communication method of claim 6, wherein the step of the first terminal performing signature verification processing on the third signed e-mail to determine whether the third signed e-mail passes signature verification comprises:
the first terminal obtains the serial number of the mail to be verified of the third signature mail;
and if the first terminal detects that the finished mail serial number matched with the mail serial number to be verified does not exist in the finished instruction list, the first terminal performs signature verification processing on the third signed mail to determine whether the third signed mail passes signature verification.
8. The utility model provides a thing networking communication device, its characterized in that, thing networking communication device is applied to first terminal, first terminal and the first administrative unit signal connection of predetermineeing, thing networking communication device includes:
the first acquisition module is used for acquiring a first execution instruction and acquiring a first receiving address of the second terminal from the first execution instruction;
the encryption module is used for carrying out public key encryption processing on the first execution instruction so as to generate a first encryption instruction;
the signature module is used for acquiring a first sending address and performing digital signature processing on the first encryption instruction, the first sending address and the first receiving address to generate a first signature mail, wherein the first terminal encapsulates the first encryption instruction through the mail;
the first sending module is configured to send the first signature email to the first management unit, so that the first management unit forwards the first signature email to a second management unit in signal connection with the second terminal according to the first recipient address, so that the second terminal executes an operation corresponding to the first execution instruction after acquiring the first signature email from the second management unit, where the first terminal and the second terminal are internet of things devices, the first management unit and the second management unit are email servers, the first recipient address is an address mailbox bound by the second terminal, and the first delivery address is a mailbox address bound by the first binding terminal.
9. The utility model provides a thing networking communication terminal which characterized in that, the terminal includes: the communication method comprises a memory, a processor and an internet of things communication program stored on the memory and capable of running on the processor, wherein the internet of things communication program realizes the steps of the internet of things communication method according to any one of claims 1 to 7 when being executed by the processor.
10. A computer storage medium, wherein the computer storage medium stores an internet of things communication program, and the internet of things communication program, when executed by a processor, implements the steps of the internet of things communication method according to any one of claims 1 to 7.
CN201910565295.XA 2019-06-26 2019-06-26 Internet of things communication method, device, terminal and computer storage medium Active CN110311904B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910565295.XA CN110311904B (en) 2019-06-26 2019-06-26 Internet of things communication method, device, terminal and computer storage medium
PCT/CN2019/094135 WO2020258351A1 (en) 2019-06-26 2019-07-01 Internet of things communication method and apparatus, terminal, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910565295.XA CN110311904B (en) 2019-06-26 2019-06-26 Internet of things communication method, device, terminal and computer storage medium

Publications (2)

Publication Number Publication Date
CN110311904A CN110311904A (en) 2019-10-08
CN110311904B true CN110311904B (en) 2021-11-16

Family

ID=68077634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910565295.XA Active CN110311904B (en) 2019-06-26 2019-06-26 Internet of things communication method, device, terminal and computer storage medium

Country Status (2)

Country Link
CN (1) CN110311904B (en)
WO (1) WO2020258351A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560941A (en) * 2013-09-29 2014-02-05 西安祥泰软件设备系统有限责任公司 Portable mail server and operation method thereof
CN103944719A (en) * 2014-04-02 2014-07-23 尚清实业(上海)有限公司 Comprehensive verification system and method for identities and documentary evidences
US9191401B2 (en) * 2013-06-14 2015-11-17 Paypal, Inc. Signed response to an abusive email account owner and provider systems and methods
CN105933314A (en) * 2016-04-21 2016-09-07 诚迈科技(南京)股份有限公司 Android system email S/MIME function support method and system
CN106130724A (en) * 2016-08-26 2016-11-16 浪潮集团有限公司 A kind of internet-of-things terminal safety implementation method using key agreement
CN108667801A (en) * 2018-04-02 2018-10-16 江苏中控安芯信息安全技术有限公司 A kind of Internet of Things access identity safety certifying method and system
CN109005105A (en) * 2018-07-20 2018-12-14 密信技术(深圳)有限公司 Record generation method, device and the storage medium of sender's location information mail

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101579367B1 (en) * 2014-02-10 2015-12-22 한국과학기술원 Method and system for providing service based on space
CN105530173A (en) * 2016-01-19 2016-04-27 陈勤 Internet-of-things Email system capable of realizing controllable opening and development access and realization method and application thereof
CN105892299B (en) * 2016-03-30 2019-05-03 本钢板材股份有限公司 Computer remote control system and method based on serial ports connection
CN106209606B (en) * 2016-08-31 2019-11-12 北京深思数盾科技股份有限公司 A kind of method, terminal and system for using WEB mail safely
CN109729088B (en) * 2018-12-29 2022-01-25 广东盈世计算机科技有限公司 Mail processing method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9191401B2 (en) * 2013-06-14 2015-11-17 Paypal, Inc. Signed response to an abusive email account owner and provider systems and methods
CN103560941A (en) * 2013-09-29 2014-02-05 西安祥泰软件设备系统有限责任公司 Portable mail server and operation method thereof
CN103944719A (en) * 2014-04-02 2014-07-23 尚清实业(上海)有限公司 Comprehensive verification system and method for identities and documentary evidences
CN105933314A (en) * 2016-04-21 2016-09-07 诚迈科技(南京)股份有限公司 Android system email S/MIME function support method and system
CN106130724A (en) * 2016-08-26 2016-11-16 浪潮集团有限公司 A kind of internet-of-things terminal safety implementation method using key agreement
CN108667801A (en) * 2018-04-02 2018-10-16 江苏中控安芯信息安全技术有限公司 A kind of Internet of Things access identity safety certifying method and system
CN109005105A (en) * 2018-07-20 2018-12-14 密信技术(深圳)有限公司 Record generation method, device and the storage medium of sender's location information mail

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于邮件协议的NAT穿越远程升级与控制系统;陈磊;《上海师范大学学报(自然科学版)》;20170215;第2-5页 *
陈磊.基于邮件协议的NAT穿越远程升级与控制系统.《上海师范大学学报(自然科学版)》.2017, *

Also Published As

Publication number Publication date
WO2020258351A1 (en) 2020-12-30
CN110311904A (en) 2019-10-08

Similar Documents

Publication Publication Date Title
US9215238B2 (en) System and method for transmitting and utilizing attachments
US6904521B1 (en) Non-repudiation of e-mail messages
CN109413060B (en) Message processing method, device, equipment and storage medium
US7650383B2 (en) Electronic message system with federation of trusted senders
US20100100465A1 (en) Trusted third party authentication and notarization for email
JP5204090B2 (en) Communication network, e-mail registration server, network device, method, and computer program
CN107888560B (en) Mail safe transmission system and method for mobile intelligent terminal
CN113508563A (en) Block chain based secure email system
JP4788212B2 (en) Digital signature program and digital signature system
US20100250689A1 (en) Method and apparatus for generating a figure of merit for use in transmission of messages in a multi-level secure environment
US8856525B2 (en) Authentication of email servers and personal computers
EP1701494B1 (en) Determining a correspondent server having compatible secure e-mail technology
US20130103944A1 (en) Hypertext Link Verification In Encrypted E-Mail For Mobile Devices
JP2007053569A (en) Electronic mail security device and system therefor
CN111193750A (en) Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
KR20080074968A (en) Encapsulating address components
JP2009100345A (en) E-mail relay apparatus
CA2793422C (en) Hypertext link verification in encrypted e-mail for mobile devices
CN110311904B (en) Internet of things communication method, device, terminal and computer storage medium
KR102462411B1 (en) Platform and method for authenticating electronic announcements for electronic identification and authentication services (EDS)
CN114928503B (en) Method for realizing secure channel and data transmission method
Van Staden et al. Adding digital forensic readiness to electronic communication using a security monitoring tool
CN114301612A (en) Information processing method, communication apparatus, and encryption apparatus
JP5382766B2 (en) E-mail verification system, transmission terminal, reception terminal, e-mail processing terminal, e-mail verification, transmission and reception method
JP4728902B2 (en) Secure mail distribution system, secure mail distribution apparatus, secure mail distribution method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant