CN105025020A - Internet of Things implementation method - Google Patents
Internet of Things implementation method Download PDFInfo
- Publication number
- CN105025020A CN105025020A CN201510395359.8A CN201510395359A CN105025020A CN 105025020 A CN105025020 A CN 105025020A CN 201510395359 A CN201510395359 A CN 201510395359A CN 105025020 A CN105025020 A CN 105025020A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- user node
- root server
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Small-Scale Networks (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides an Internet of Things implementation method. In the method, integrity verification protection of data collected by user nodes of each layer in a tree layered structure is carried out through a root server. The Internet of Things contains a root server and M user nodes, and the M user nodes can collect the obtained data to the root server layer by layer. The data layer-by-layer collection process comprises steps: firstly, M user nodes are subjected to identity and access authority authentication, N user nodes passing identity and access authority authentication are obtained, and M is more than or equal to N; secondly, the N user nodes passing identity and access authority authentication are subjected to initialization; after the second step, the third step and the fourth step are carried out regularly, wherein, thirdly, the N user nodes passing identity and access authority authentication encrypt the obtained data and collect the data to the root server layer by layer; fourthly, the root server carries out integrity verification of data collected by the user nodes of each layer.
Description
Technical field
The present invention relates to a kind of implementation method of Internet of Things, belong to the crossing domain of Internet of Things and information security technology.
Background technology
Internet of Things refers to by technology such as transducer, REID, global positioning systems, monitoring, connection, interactive object or process is needed in real time to any, gather the information of the various needs such as its sound, light, heat, electricity, mechanics, chemistry, biology, position, by all kinds of possible network insertion, realize the connection of thing and thing, thing and people, realize the intelligent perception to article and process, identification and management.Along with the development of science and technology, the life of Internet of Things distance people is more and more nearer.In the gatherer process of data; there are some application higher to security requirement; so fail safe and the integrity protection of image data will be carried out; gathering with the leakage in fusion process to prevent data and distorting; make the server of root node position correctly can obtain the data that in Internet of Things, in tree hierarchy, each layer user node gathers, finally make application correctly carry out.
Summary of the invention
Technical problem to be solved by this invention how to carry out integrity verification to the data that layer user node each in tree hierarchy in Internet of Things collects.
The present invention is for solving the problems of the technologies described above by the following technical solutions:
A kind of implementation method of Internet of Things, it is characterized in that, comprise a root server and M user node in described Internet of Things, the data of acquisition can be successively collected to this root server by a described M user node, and described data are successively collected process and comprised the following steps:
Step 1, a described M user node carried out to identity and access rights are differentiated, obtain the N number of user node differentiated by identity and access rights, wherein, M >=N;
Step 2, initialization is carried out to the described N number of user node differentiated by identity and access rights; And
After described step 2, regularly perform following steps 3 and step 4, particularly:
After the data of acquisition are encrypted by step 3, the described N number of user node differentiated by identity and access rights, be successively collected to described root server;
Step 4, described root server carry out integrity verification to the data that each layer user node collects.
Alternatively, described step 1 specifically comprises:
Step 1.1, use wireless identity authentication equipment carry out identity verify to user node, specific as follows:
Step 1.1.1, detect user node whether open wireless communication function, be connected if then set up radio communication with described user node, otherwise first remind described user node open wireless communication function, then set up radio communication with described user node and be connected; Wherein, described radio communication function comprises bluetooth and/or NFC;
Step 1.1.2, described wireless identity authentication equipment receive the authentication challenge that described user node sends, the authentication challenge preserved in advance in the authentication challenge received and described wireless identity authentication equipment is compared, if consistent, show that described user node is legal user node, return identity verify to this legal user node and be verified information;
Step 1.1.3, described wireless identity authentication equipment carry out digital signature to the biometric information that legal user node sends, and the biometric information after signature is returned to described user node;
Wherein, described biometric information comprises the finger print information of user, facial characteristics identifying information and voice messaging;
Step 1.2, for by the legal user node of identity verify, based on the biometric information of user, determine that the use user of this user node is to the access rights of Internet resources, specific as follows:
The biometric information of the user of collection is sent to root server by step 1.2.1, user node; Wherein, in the biometric information database of described root server, preserve the finger print information of all validated users, facial characteristics identifying information, voice messaging, and the network access authority corresponding to described validated user;
Step 1.2.2, described root server mate the biometric information of the user gathered with the finger print information in described biometric information database, facial characteristics identifying information and voice messaging, if the match is successful, then user identity is differentiated successfully;
Step 1.2.3, user identity are differentiated successfully, and described root server, according to the biometric information in described biometric information database, gives user corresponding network access authority;
Step 1.2.4, user's Successful login, to conduct interviews to the resource in network according to the network access authority of giving and operate.
Alternatively, described step 2 specifically comprises, and performs following operation by root server:
Step 2.1, selected root server encryption key K, and the user encryption key ki of each user node, wherein, i=1,2 ..., N;
Step 2.2, select N number of one group of coprime between two integer p1, p2 ..., pN};
Step 2.3, to be produced by random number generator one group of random number r1, r2 ... rN},
Step 2.4, use encryption key K to described one group of coprime between two integer p1, p2 ..., pN} encrypt, obtain a group encryption numeral p1 ', p2 ' ..., pN ' };
Step 2.5, by this group encryption numeral p1 ', p2 ' ..., pN ' } and described one group of random number r1, r2 ... rN} is corresponding in turn to addition, obtain one group of initial parameter s1, s2 ..., sN}; That is, si=pi '+ri, i=1,2 ..., N;
Step 2.6, send initial parameter si and user encryption key ki to each user node i, wherein, i=1,2 ..., N.
Alternatively, described step 3 specifically comprises:
Step 3.1, for all N number of user nodes, if user node i obtain image data be ai, the checking data calculating this user node i is bi, wherein: bi=ai+si, i=1,2 ..., N;
Step 3.2, for each leaf child m, respectively perform step 3.2.1 and 3.2.2 successively:
Step 3.2.1, the user encryption key km adopting root server in initialization procedure to be distributed to user node m are encrypted image data am and checking data bm respectively, and result is am*=Ekm (am), bm*=Ekm (bm);
Checking data bm* after image data am* after encryption and encryption is sent to the father node of oneself by step 3.2.2, user node m;
Step 3.3, for each n omicronn-leaf child n, respectively perform step 3.3.1 to 3.3.4 successively:
Step 3.3.1, by the image data after the encryption of all childs of this node n and encryption after checking data deciphering, obtain the image data after the deciphering of each child of this node n and deciphering after checking data;
Step 3.3.2, be added by the image data an of the image data after the deciphering of each child of this node n with this node n self, what obtain this node n converges image data an ';
Step 3.3.3, be added by the checking data bn of the checking data after the deciphering of each child of this node n with this node n self, what obtain this node n converges checking data bn ';
Step 3.3.4, the user encryption key kn adopting root server in initialization procedure to be distributed to user node i are encrypted converging image data an ' and converging checking data bn ' respectively, result is an ' *=Ekn (an '), bn ' *=Ekn (bn '); Then by user node n by encryption after converge image data an ' * and encryption after converge the father node that checking data bn ' * sends to oneself;
Step 3.4, for root server, perform step 3.4.1 to 3.4.3:
Step 3.4.1, by the image data after the encryption of all childs of root server and encryption after checking data deciphering, obtain root server each child deciphering after image data and deciphering after checking data;
Step 3.4.2, by after the deciphering of each child of root server image data be added, obtain root server converge image data A;
Step 3.4.3, by after the deciphering of each child of root server checking data be added, obtain root server converge checking data B.
Alternatively, described step 4 specifically comprises:
The initial parameter sum S=s1+s2+ of all user nodes in step 4.1, computing network ... + sN;
Step 4.2, root server converged the initial parameter sum S that checking data B deducts all user nodes, obtain and converge image data control value A ', wherein, A '=B-S;
Step 4.3, converging root server image data A and converging image data control value A ' and compare;
If A=A ', then show that data integrity is not destroyed, the data of acquisition be successively collected in the tidal data recovering process of root server at user node, data are not tampered; Otherwise in this tidal data recovering process, data receive Tampering attack.
The present invention adopts above technical scheme compared with prior art, has following technique effect:
The present invention carries out integrity verification protection by root server to the data that layer user node each in tree hierarchy collects.In above-mentioned integrity verification protection process: first, by carrying out identity and access rights discriminating to user node, there is higher information security access level; Secondly, by data encryption checking procedure, turn increase the fail safe that transfer of data converges collection, safer guarantee can be provided for the application of Internet of Things.
Embodiment
By hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Described description is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of specification, and in order to above and other objects of the present invention, feature and advantage can be become apparent.
Below technical scheme of the present invention is described in further detail:
The present invention carries out integrity verification protection by root server to the data that layer user node each in tree hierarchy collects.
In above-mentioned integrity verification protection process: first, by carrying out identity and access rights discriminating to user node, there is higher information security access level; Secondly, by data encryption checking procedure, turn increase the fail safe that transfer of data converges collection, safer guarantee can be provided for the application of Internet of Things.
Particularly:
An implementation method for Internet of Things, wherein, comprise a root server and M user node in described Internet of Things, the data of acquisition can be successively collected to this root server by a described M user node, and described data are successively collected process and comprised the following steps:
Step 1, a described M user node carried out to identity and access rights are differentiated, obtain the N number of user node differentiated by identity and access rights, wherein, M >=N;
Step 2, initialization is carried out to the described N number of user node differentiated by identity and access rights; And
After described step 2, regularly perform following steps 3 and step 4, particularly:
After the data of acquisition are encrypted by step 3, the described N number of user node differentiated by identity and access rights, be successively collected to described root server;
Step 4, described root server carry out integrity verification to the data that each layer user node collects.
Alternatively, described step 1 specifically comprises:
Step 1.1, use wireless identity authentication equipment carry out identity verify to user node, specific as follows:
Step 1.1.1, detect user node whether open wireless communication function, be connected if then set up radio communication with described user node, otherwise first remind described user node open wireless communication function, then set up radio communication with described user node and be connected; Wherein, described radio communication function comprises bluetooth and/or NFC;
Step 1.1.2, described wireless identity authentication equipment receive the authentication challenge that described user node sends, the authentication challenge preserved in advance in the authentication challenge received and described wireless identity authentication equipment is compared, if consistent, show that described user node is legal user node, return identity verify to this legal user node and be verified information;
Step 1.1.3, described wireless identity authentication equipment carry out digital signature to the biometric information that legal user node sends, and the biometric information after signature is returned to described user node;
Wherein, described biometric information comprises the finger print information of user, facial characteristics identifying information and voice messaging;
Step 1.2, for by the legal user node of identity verify, based on the biometric information of user, determine that the use user of this user node is to the access rights of Internet resources, specific as follows:
The biometric information of the user of collection is sent to root server by step 1.2.1, user node; Wherein, in the biometric information database of described root server, preserve the finger print information of all validated users, facial characteristics identifying information, voice messaging, and the network access authority corresponding to described validated user;
Step 1.2.2, described root server mate the biometric information of the user gathered with the finger print information in described biometric information database, facial characteristics identifying information and voice messaging, if the match is successful, then user identity is differentiated successfully;
Step 1.2.3, user identity are differentiated successfully, and described root server, according to the biometric information in described biometric information database, gives user corresponding network access authority;
Step 1.2.4, user's Successful login, to conduct interviews to the resource in network according to the network access authority of giving and operate.
Alternatively, described step 2 specifically comprises, and performs following operation by root server:
Step 2.1, selected root server encryption key K, and the user encryption key ki of each user node, wherein, i=1,2 ..., N;
Step 2.2, select N number of one group of coprime between two integer p1, p2 ..., pN};
Step 2.3, to be produced by random number generator one group of random number r1, r2 ... rN},
Step 2.4, use encryption key K to described one group of coprime between two integer p1, p2 ..., pN} encrypt, obtain a group encryption numeral p1 ', p2 ' ..., pN ' };
Step 2.5, by this group encryption numeral p1 ', p2 ' ..., pN ' } and described one group of random number r1, r2 ... rN} is corresponding in turn to addition, obtain one group of initial parameter s1, s2 ..., sN}; That is, si=pi '+ri, i=1,2 ..., N;
Step 2.6, send initial parameter si and user encryption key ki to each user node i, wherein, i=1,2 ..., N.
Alternatively, described step 3 specifically comprises:
Step 3.1, for all N number of user nodes, if user node i obtain image data be ai, the checking data calculating this user node i is bi, wherein: bi=ai+si, i=1,2 ..., N;
Step 3.2, for each leaf child m, respectively perform step 3.2.1 and 3.2.2 successively:
Step 3.2.1, the user encryption key km adopting root server in initialization procedure to be distributed to user node m are encrypted image data am and checking data bm respectively, and result is am*=Ekm (am), bm*=Ekm (bm);
Checking data bm* after image data am* after encryption and encryption is sent to the father node of oneself by step 3.2.2, user node m;
Step 3.3, for each n omicronn-leaf child n, respectively perform step 3.3.1 to 3.3.4 successively:
Step 3.3.1, by the image data after the encryption of all childs of this node n and encryption after checking data deciphering, obtain the image data after the deciphering of each child of this node n and deciphering after checking data;
Step 3.3.2, be added by the image data an of the image data after the deciphering of each child of this node n with this node n self, what obtain this node n converges image data an ';
Step 3.3.3, be added by the checking data bn of the checking data after the deciphering of each child of this node n with this node n self, what obtain this node n converges checking data bn ';
Step 3.3.4, the user encryption key kn adopting root server in initialization procedure to be distributed to user node i are encrypted converging image data an ' and converging checking data bn ' respectively, result is an ' *=Ekn (an '), bn ' *=Ekn (bn '); Then by user node n by encryption after converge image data an ' * and encryption after converge the father node that checking data bn ' * sends to oneself; Step 3.4, for root server, perform step 3.4.1 to 3.4.3:
Step 3.4.1, by the image data after the encryption of all childs of root server and encryption after checking data deciphering, obtain root server each child deciphering after image data and deciphering after checking data;
Step 3.4.2, by after the deciphering of each child of root server image data be added, obtain root server converge image data A;
Step 3.4.3, by after the deciphering of each child of root server checking data be added, obtain root server converge checking data B.
Alternatively, described step 4 specifically comprises:
The initial parameter sum S=s1+s2+ of all user nodes in step 4.1, computing network ... + sN;
Step 4.2, root server converged the initial parameter sum S that checking data B deducts all user nodes, obtain and converge image data control value A ', wherein, A '=B-S;
Step 4.3, converging root server image data A and converging image data control value A ' and compare;
If A=A ', then show that data integrity is not destroyed, the data of acquisition be successively collected in the tidal data recovering process of root server at user node, data are not tampered; Otherwise in this tidal data recovering process, data receive Tampering attack.
All or part of content in the technical scheme that the above embodiment of the present invention provides can be realized by software programming, and its software program is stored in the storage medium that can read, storage medium such as: the hard disk in computer, CD or floppy disk.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (5)
1. the implementation method of an Internet of Things, it is characterized in that, comprise a root server and M user node in described Internet of Things, the data of acquisition can be successively collected to this root server by a described M user node, and described data are successively collected process and comprised the following steps:
Step 1, a described M user node carried out to identity and access rights are differentiated, obtain the N number of user node differentiated by identity and access rights, wherein, M >=N;
Step 2, initialization is carried out to the described N number of user node differentiated by identity and access rights; And
After described step 2, regularly perform following steps 3 and step 4, particularly:
After the data of acquisition are encrypted by step 3, the described N number of user node differentiated by identity and access rights, be successively collected to described root server;
Step 4, described root server carry out integrity verification to the data that each layer user node collects.
2. method according to claim 1, is characterized in that, described step 1 specifically comprises:
Step 1.1, use wireless identity authentication equipment carry out identity verify to user node, specific as follows:
Step 1.1.1, detect user node whether open wireless communication function, be connected if then set up radio communication with described user node, otherwise first remind described user node open wireless communication function, then set up radio communication with described user node and be connected; Wherein, described radio communication function comprises bluetooth and/or NFC;
Step 1.1.2, described wireless identity authentication equipment receive the authentication challenge that described user node sends, the authentication challenge preserved in advance in the authentication challenge received and described wireless identity authentication equipment is compared, if consistent, show that described user node is legal user node, return identity verify to this legal user node and be verified information;
Step 1.1.3, described wireless identity authentication equipment carry out digital signature to the biometric information that legal user node sends, and the biometric information after signature is returned to described user node;
Wherein, described biometric information comprises the finger print information of user, facial characteristics identifying information and voice messaging;
Step 1.2, for by the legal user node of identity verify, based on the biometric information of user, determine that the use user of this user node is to the access rights of Internet resources, specific as follows:
The biometric information of the user of collection is sent to root server by step 1.2.1, user node; Wherein, in the biometric information database of described root server, preserve the finger print information of all validated users, facial characteristics identifying information, voice messaging, and the network access authority corresponding to described validated user;
Step 1.2.2, described root server mate the biometric information of the user gathered with the finger print information in described biometric information database, facial characteristics identifying information and voice messaging, if the match is successful, then user identity is differentiated successfully;
Step 1.2.3, user identity are differentiated successfully, and described root server, according to the biometric information in described biometric information database, gives user corresponding network access authority;
Step 1.2.4, user's Successful login, to conduct interviews to the resource in network according to the network access authority of giving and operate.
3. method according to claim 2, is characterized in that, described step 2 specifically comprises, and performs following operation by root server:
Step 2.1, selected root server encryption key K, and the user encryption key ki of each user node, wherein, i=1,2 ..., N;
Step 2.2, select N number of one group of coprime between two integer p1, p2 ..., pN};
Step 2.3, to be produced by random number generator one group of random number r1, r2 ... rN},
Step 2.4, use encryption key K to described one group of coprime between two integer p1, p2 ..., pN} encrypt, obtain a group encryption numeral p1 ', p2 ' ..., pN ' };
Step 2.5, by this group encryption numeral p1 ', p2 ' ..., pN ' } and described one group of random number r1, r2 ... rN} is corresponding in turn to addition, obtain one group of initial parameter s1, s2 ..., sN}; That is, si=pi '+ri, i=1,2 ..., N;
Step 2.6, send initial parameter si and user encryption key ki to each user node i, wherein, i=1,2 ..., N.
4. method according to claim 3, is characterized in that, described step 3 specifically comprises:
Step 3.1, for all N number of user nodes, if user node i obtain image data be ai, the checking data calculating this user node i is bi, wherein: bi=ai+si, i=1,2 ..., N;
Step 3.2, for each leaf child m, respectively perform step 3.2.1 and 3.2.2 successively:
Step 3.2.1, the user encryption key km adopting root server in initialization procedure to be distributed to user node m are encrypted image data am and checking data bm respectively, and result is am*=Ekm (am), bm*=Ekm (bm);
Checking data bm* after image data am* after encryption and encryption is sent to the father node of oneself by step 3.2.2, user node m;
Step 3.3, for each n omicronn-leaf child n, respectively perform step 3.3.1 to 3.3.4 successively:
Step 3.3.1, by the image data after the encryption of all childs of this node n and encryption after checking data deciphering, obtain the image data after the deciphering of each child of this node n and deciphering after checking data;
Step 3.3.2, be added by the image data an of the image data after the deciphering of each child of this node n with this node n self, what obtain this node n converges image data an ';
Step 3.3.3, be added by the checking data bn of the checking data after the deciphering of each child of this node n with this node n self, what obtain this node n converges checking data bn ';
Step 3.3.4, the user encryption key kn adopting root server in initialization procedure to be distributed to user node i are encrypted converging image data an ' and converging checking data bn ' respectively, result is an ' *=Ekn (an '), bn ' *=Ekn (bn '); Then by user node n by encryption after converge image data an ' * and encryption after converge the father node that checking data bn ' * sends to oneself;
Step 3.4, for root server, perform step 3.4.1 to 3.4.3:
Step 3.4.1, by the image data after the encryption of all childs of root server and encryption after checking data deciphering, obtain root server each child deciphering after image data and deciphering after checking data;
Step 3.4.2, by after the deciphering of each child of root server image data be added, obtain root server converge image data A;
Step 3.4.3, by after the deciphering of each child of root server checking data be added, obtain root server converge checking data B.
5. method according to claim 4, is characterized in that, described step 4 specifically comprises:
The initial parameter sum S=s1+s2+ of all user nodes in step 4.1, computing network ... + sN;
Step 4.2, root server converged the initial parameter sum S that checking data B deducts all user nodes, obtain and converge image data control value A ', wherein, A '=B-S;
Step 4.3, converging root server image data A and converging image data control value A ' and compare;
If A=A ', then show that data integrity is not destroyed, the data of acquisition be successively collected in the tidal data recovering process of root server at user node, data are not tampered; Otherwise in this tidal data recovering process, data receive Tampering attack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510395359.8A CN105025020B (en) | 2015-07-07 | 2015-07-07 | A kind of implementation method of Internet of Things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510395359.8A CN105025020B (en) | 2015-07-07 | 2015-07-07 | A kind of implementation method of Internet of Things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105025020A true CN105025020A (en) | 2015-11-04 |
CN105025020B CN105025020B (en) | 2017-12-29 |
Family
ID=54414725
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510395359.8A Expired - Fee Related CN105025020B (en) | 2015-07-07 | 2015-07-07 | A kind of implementation method of Internet of Things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105025020B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106961660A (en) * | 2017-03-22 | 2017-07-18 | 安徽师范大学 | The continuous data collection method that can verify that safely in sensor network |
CN113449161A (en) * | 2020-03-26 | 2021-09-28 | 北京沃东天骏信息技术有限公司 | Data collection method, device, system and storage medium |
CN113709098A (en) * | 2021-07-09 | 2021-11-26 | 泰康保险集团股份有限公司 | Data transmission method and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110246433A1 (en) * | 2010-03-31 | 2011-10-06 | Xerox Corporation. | Random number based data integrity verification method and system for distributed cloud storage |
CN102710668A (en) * | 2012-06-29 | 2012-10-03 | 上海海事大学 | Data privacy guarantee method suitable for cloud storage |
CN103051055A (en) * | 2012-10-31 | 2013-04-17 | 国网电力科学研究院 | Convergence controller |
US8458462B1 (en) * | 2008-08-14 | 2013-06-04 | Juniper Networks, Inc. | Verifying integrity of network devices for secure multicast communications |
CN103166919A (en) * | 2011-12-13 | 2013-06-19 | 中国移动通信集团黑龙江有限公司 | Method and system for internet of things information transmission |
CN103543718A (en) * | 2013-10-16 | 2014-01-29 | 浪潮创新科技有限公司 | Internet of Things based intelligent IDC (Internet data center) computer room monitoring system |
CN104410713A (en) * | 2014-12-16 | 2015-03-11 | 国网重庆市电力公司电力科学研究院 | Monitoring system and monitoring method for state of cable outer sheath based on DigiMesh network |
CN104571898A (en) * | 2013-10-23 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Page display control method and device |
-
2015
- 2015-07-07 CN CN201510395359.8A patent/CN105025020B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8458462B1 (en) * | 2008-08-14 | 2013-06-04 | Juniper Networks, Inc. | Verifying integrity of network devices for secure multicast communications |
US20110246433A1 (en) * | 2010-03-31 | 2011-10-06 | Xerox Corporation. | Random number based data integrity verification method and system for distributed cloud storage |
CN103166919A (en) * | 2011-12-13 | 2013-06-19 | 中国移动通信集团黑龙江有限公司 | Method and system for internet of things information transmission |
CN102710668A (en) * | 2012-06-29 | 2012-10-03 | 上海海事大学 | Data privacy guarantee method suitable for cloud storage |
CN103051055A (en) * | 2012-10-31 | 2013-04-17 | 国网电力科学研究院 | Convergence controller |
CN103543718A (en) * | 2013-10-16 | 2014-01-29 | 浪潮创新科技有限公司 | Internet of Things based intelligent IDC (Internet data center) computer room monitoring system |
CN104571898A (en) * | 2013-10-23 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Page display control method and device |
CN104410713A (en) * | 2014-12-16 | 2015-03-11 | 国网重庆市电力公司电力科学研究院 | Monitoring system and monitoring method for state of cable outer sheath based on DigiMesh network |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106961660A (en) * | 2017-03-22 | 2017-07-18 | 安徽师范大学 | The continuous data collection method that can verify that safely in sensor network |
CN106961660B (en) * | 2017-03-22 | 2020-03-24 | 安徽师范大学 | Method for collecting continuous data capable of being verified safely in sensor network |
CN113449161A (en) * | 2020-03-26 | 2021-09-28 | 北京沃东天骏信息技术有限公司 | Data collection method, device, system and storage medium |
CN113709098A (en) * | 2021-07-09 | 2021-11-26 | 泰康保险集团股份有限公司 | Data transmission method and device |
CN113709098B (en) * | 2021-07-09 | 2023-06-16 | 泰康保险集团股份有限公司 | Data transmission method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105025020B (en) | 2017-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Casino et al. | Research trends, challenges, and emerging topics in digital forensics: A review of reviews | |
Premarathne et al. | Hybrid cryptographic access control for cloud-based EHR systems | |
CN1961525B (en) | Network communication system for mobile intelligent data carrier and dynamic datagram switch | |
CN106776904B (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
CN109450638A (en) | Electronic component data management system and method based on block chain | |
Alshaikhli et al. | Evolution of Internet of Things from blockchain to IOTA: A survey | |
CN107871081A (en) | A kind of computer information safe system | |
Kamal et al. | A review study on blockchain-based IoT security and forensics | |
CN109829333A (en) | A kind of key message guard method and system based on OpenID | |
CN106559386B (en) | A kind of authentication method and device | |
WO2021138591A1 (en) | Blockchain cybersecurity solutions | |
CN105025020A (en) | Internet of Things implementation method | |
CN110555783B (en) | Block chain-based electric power marketing data protection method and system | |
CN116318617A (en) | Medical rescue material charity donation method based on RFID and blockchain | |
CN111352999A (en) | National data circulation and data right confirming method and platform based on block chain | |
CN108156139A (en) | No certificate can verify that multiple key cryptogram search system and method | |
Gangwani et al. | IoT device identity management and blockchain for security and data integrity | |
Srinivas et al. | Lightweight security protocols for blockchain technology | |
Huang et al. | Acquiring data traffic for sustainable IoT and smart devices using machine learning algorithm | |
Shahin et al. | Big data platform privacy and security, a review | |
Ciria et al. | The history-based authentication pattern | |
CN113297176A (en) | Database access method based on Internet of things | |
Patel et al. | Comparative study of blockchain-based voting solutions | |
Paintsil et al. | Executable model-based risk analysis method for identity management systems: using hierarchical colored petri nets | |
Rao et al. | Role of IoT in the ages of digital to smart cities: Security challenges and countermeasures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171229 Termination date: 20180707 |