CN106961449A - Internet of things data transmission method - Google Patents

Internet of things data transmission method Download PDF

Info

Publication number
CN106961449A
CN106961449A CN201710374700.0A CN201710374700A CN106961449A CN 106961449 A CN106961449 A CN 106961449A CN 201710374700 A CN201710374700 A CN 201710374700A CN 106961449 A CN106961449 A CN 106961449A
Authority
CN
China
Prior art keywords
data
information
terminal
timing node
node information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710374700.0A
Other languages
Chinese (zh)
Other versions
CN106961449B (en
Inventor
刘兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Harmony Technology Co Ltd
Original Assignee
Chongqing Harmony Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Harmony Technology Co Ltd filed Critical Chongqing Harmony Technology Co Ltd
Priority to CN201710374700.0A priority Critical patent/CN106961449B/en
Publication of CN106961449A publication Critical patent/CN106961449A/en
Application granted granted Critical
Publication of CN106961449B publication Critical patent/CN106961449B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A kind of internet of things data transmission method of the offer of the present invention, comprises the following steps:S1. data send terminal to data receiving terminal and send solicited message, and data receiving terminal feedback encrypted characters string;S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;S3. data, which send terminal, will receive the timing node information T2 of encrypted characters string and by timing node information T2 and encrypted characters string according to pre-defined rule formation encryption key;S4. data are sent terminal and message information are encrypted using encryption key, and the message information after encryption and timing node information T1 are sent into data receiving terminal according to predetermined time delay T3;S5. data receiving terminal judges whether the encrypted message information received is legal, in this way, then data is decrypted with processing, otherwise, abandons the information this time received;Message data in platform of internet of things can effectively be encrypted, it is ensured that the data safety in Internet of things system.

Description

Internet of things data transmission method
Technical field
Network method, more particularly to a kind of internet of things data transmission method are interconnected the present invention relates to one kind.
Background technology
With the development of network, the use of Internet of Things in modern society is more and more universal, also more and more important, especially For safety-security area, when detecting that the data detected are sent to monitor terminal by terminal, the security of data is most important, closes It is tied to production, the safety of life;Such as fire fighting monitoring, once intercepted and captured or distorted by criminal in data transmission procedure, Irretrievable loss will be caused;In the prior art, there is following defect for data transmission of internet of things AES:It is existing Algorithm is complicated, causes in encryption and decrypting process that time consumption is serious, and for the field for requiring ageing, this is rewinded Carry out fatal consequence, than the fire-fighting domain in as described above, if algorithm is simplified, it will cause the data of transmission extremely uneasy Entirely, there is serious potential safety hazard.
Therefore, a kind of new internet of things data transmission method of proposition is needed badly to solve above-mentioned technical problem.
The content of the invention
In view of this, can be in platform of internet of things it is an object of the invention to provide a kind of internet of things data transmission method Message data effectively encrypted so that effectively prevent criminal carry out data intercepting and capturing or distort, it is ensured that Internet of Things Data safety in system, moreover, algorithm is simple, can effectively ensure data age.
A kind of internet of things data transmission method of the offer of the present invention, comprises the following steps:
S1. data send terminal and set up with data receiving terminal after network connection, and it is whole that data send terminal to data receiver End sends the solicited message for obtaining encrypted characters string, and the encrypted characters string connects including connecing the attribute information of data receipts terminal, data Receive timing node information T1 and check information that terminal receives solicited message;
S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;
S3. data send terminal will receive the timing node information T2 of encrypted characters string and by timing node information T2 and Encrypted characters string is according to pre-defined rule formation encryption key;
S4. data send terminal and message information are encrypted using encryption key, and by the message information after encryption and Timing node information T1 is sent to data receiving terminal according to predetermined time delay T3;
S5. data receiving terminal receives the message information and timing node information T1 after encryption, and judgement is received and added Whether the time difference T4 of message information and timing node information T1 after close meets scheduled delay T3 requirements, in this way, sentences Whether disconnected timing node information T1 and the timing node information T1 of self record are consistent, in this way, then data are decrypted with processing, Otherwise, abandon the information this time received and the information of terminal feedback data bust this is sent to data.
Further, in step S1, in check information include check code and delay time information, and data send terminal and Data receiving terminal is set up after network connection every time, changes time delay and check code.
Further, in step S1, data send terminal and form encrypted characters string according to following method:
S101. the attribute information of data receiving terminal is transformed to 32 binary first character strings;
S102. data receiving terminal by the timing node information T1 for receiving solicited message be transformed to binary code and by It is inserted into according to pre-defined rule in the first character string and forms the second character string;
S103. data send terminal random generation 4 bit checks code, and data send terminal and generate 4 time delays at random T3 code, is inserted into the afterbody of the second character string after the code of check code and time delay T3 is arranged according to pre-defined rule Form final encrypted characters string.
Further, in step S3, data send terminal and form encryption key by the following method:
S301. data send terminal and received after encrypted characters string, according to the formation rule of encrypted characters string in step S1 Extract timing node information T1 when data receiving terminal receives solicited message;
S302. data send terminal and timing node information T2 are transformed into binary code, and according to timing node information Timing node information T2 is inserted into the first character string by rule when T1 is inserted into the first character string forms encryption key.
Further, in step S4, data are sent terminal and message information are added using encryption key and DES algorithms It is close.
Further, in step S5, data receiving terminal is contrasted to time delay T3 by the following method:
S501. data receiving terminal detects current network state, obtains network delay time T5;
S501. data transmission terminal rejects network delay time T5 from time difference T4 and draws the report for being an actually-received encryption Literary information and temporal information T1 time difference, then it is compared with predetermined time delay T3.
Beneficial effects of the present invention:By means of the invention it is possible to the message data in platform of internet of things is effectively encrypted, So as to effectively prevent criminal from carrying out the intercepting and capturing of data or distort, it is ensured that the data safety in Internet of things system, moreover, calculating Method is simple, can effectively ensure data age.
Brief description of the drawings
The invention will be further described with reference to the accompanying drawings and examples:
Fig. 1 is flow chart of the invention.
Fig. 2 forms flow chart for the encrypted characters string of the present invention.
Fig. 3 forms flow chart for the encryption key of the present invention.
Fig. 4 is data receiving terminal process chart of the invention.
Embodiment
The present invention is further elaborated below in conjunction with Figure of description:
As illustrated, a kind of internet of things data transmission method of the offer of the present invention, comprises the following steps:
S1. data send terminal and set up with data receiving terminal after network connection, and it is whole that data send terminal to data receiver End sends the solicited message for obtaining encrypted characters string, and the encrypted characters string connects including connecing the attribute information of data receipts terminal, data Receive the timing node information T1 and check information when terminal receives solicited message;Wherein, attribute information refers to data terminal Id information, that is to say, that in Internet of Things, each terminal remove assign connection network IP address outside, be also endowed one Individual id information, in the present embodiment, id information are constituted using 8 digits, and it is then 32 to be transformed into after binary system, certainly, in reality Using id information can use the method in more long number, the present invention equally applicable;Timing node information T1 is also by data receiver Terminal is recorded, after data send terminal and data receiving terminal is disconnected, the timing node information T1 and check information It is clear, send terminal in data and data receiving terminal is regenerated next time again after connection, in general, in Internet of Things, Data send terminal and data receiving terminal message information be transmitted in last time after in the stipulated time again without information exchange, then It can be considered that current data sends terminal and data receiving terminal is disconnected;
S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;
S3. data send terminal will receive the timing node information T2 of encrypted characters string and by timing node information T2 and Encrypted characters string is according to pre-defined rule formation encryption key;
S4. data send terminal and message information are encrypted using encryption key, and by the message information after encryption and Timing node information T1 is sent to data receiving terminal according to predetermined time delay T3;
S5. data receiving terminal receives the message information and timing node information T1 after encryption, and judgement is received and added Whether the time difference T4 that the time of the message information after close and data send the timing node information T1 of terminal feedback meets predetermined Time delay T3 requirements, in this way, judge whether the timing node information T1 of timing node information T1 and self record is consistent, such as It is that then data are decrypted with processing, otherwise, abandons the information this time received and send terminal feedback data to data and transmit After the information of failure, and the network connection between data transmission terminal is disconnected, wherein, time difference T4 is consistent with time delay T3 It is then consistent within the error range of setting to refer to the difference between time difference T4 and time delay T3, and the error range can be with The state determination of terminal is sent according to network state, data receiving terminal and data in advance, wherein, data receiving terminal and data The state for sending terminal refers to the average time consumed for handling same amount of data;By the present invention, in encryption key With reference in generating process it is above-mentioned in multiple parameters, and after data terminal receives the message information of encryption and decryption Entered above method judgement again before, the possibility that encryption key is cracked in data transmission procedure can be substantially reduced, and And because the control of timing node, data receiving terminal carry out multiple checking, greatly reduce invalid data and be decrypted and enter Enter into Internet of things system, it is ensured that the operation safety of whole Internet of things system.
In the present embodiment, in step S1, check code and delay time information are included in check information, and data are sent eventually End and data receiving terminal are set up after network connection every time, change time delay and check code, wherein, time delay is with millisecond list Position statistics, therefore, can't be impacted, by the above method, time delay and check code are to the ageing of data transfer Dynamic-form, can strengthen the security of data encryption.
In the present embodiment, in step S1, data send terminal and form encrypted characters string according to following method:
S101. the attribute information of data receiving terminal is transformed to 32 binary first character strings;
S102. data receiving terminal by the timing node information T1 for receiving solicited message be transformed to binary code and by It is inserted into according to pre-defined rule in the first character string and forms the second character string;Wherein, the pre-defined rule is prior agreement, with it In by taking following rule as an example:Such as timing node information be 10 points 27 seconds 15 minutes, then, its binary code is 000100000001010100100111, wherein, T1 points of the timing node information is three sections:A=00010000, b= The First ray character of 00010101, c=00100111,32 is to be divided into a section according to every 8, then respectively with bigger letters ABCD is replaced, then, can be the modes such as AaBbCcD, AbaCbDc or AcBbCaD after insertion, certainly, character string can also It is that then a character field enters row interpolation according to above-mentioned rule with every 4;
S103. data send terminal random generation 4 bit checks code, and data send terminal and generate 4 time delays at random T3 code, is inserted into the afterbody of the second character string after the code of check code and time delay T3 is arranged according to pre-defined rule Final encrypted characters string is formed, wherein, check code is the binary code of 4 with time delay T3, wherein, check code Binary system check code is replaced with X, and time delay T3 binary code is replaced with Y, then, still with above-mentioned example explanation:Check code Inserted with time delay T3 after the second character string, then encrypted characters string is:AaBbCcDXY, AbaCbDcXY or AcBbCaDXY etc., by above-mentioned method, can form the higher key of confidentiality, it is ensured that the accuracy of transmission data.
In the present embodiment, in step S3, data send terminal and form encryption key by the following method:
S301. data send terminal and received after encrypted characters string, according to the formation rule of encrypted characters string in step S1 Extract timing node information T1 when data receiving terminal receives solicited message;
S302. data send terminal and timing node information T2 are transformed into binary code, and according to timing node information Timing node information T2 is inserted into the first character string by rule when T1 is inserted into the first character string forms encryption key, Wherein, the form of the form of timing node information T2 binary code and timing node T1 binary code is just as with U, V and W Timing node information T2 character field is represented respectively, then, timing node information T2 is replaced after timing node information T1, with Exemplified by AaBbCcDXY, final key is then:AUBVCWDXY, by the above method, can effectively improve the confidentiality of key, So as to improve the security of the message information after encryption;To sum up state, in key generation process of the invention, taken into full account data The replacement of temporal information and temporal information when the parameter information of receiving terminal, data transmit-receive, and the composition rule of key Also further to be verified after about putting and message information being encrypted in advance by encryption key, so as to effectively increase data safety Property, provide powerful guarantee for the reliability of Internet of Things, security.
In the present embodiment, in step S4, data are sent terminal and message information are carried out using encryption key and DES algorithms Encryption, certainly, message information, which is encrypted, using encryption key can also use other existing algorithms, can realize this The purpose of invention, not in this to go forth.
In the present embodiment, in step S5, data receiving terminal is contrasted to time delay T3 by the following method:
S501. data receiving terminal detects current network state, obtains network delay time T5;
S501. data transmission terminal rejects network delay time T5 from time difference T4 and draws the report for being an actually-received encryption Literary information and temporal information T1 time difference, then it is compared with predetermined time delay T3, can be right by the above method Whether the message information that data receiving terminal is received be that legal information makes accurate judgement, it is to avoid network delay is to judging to tie The influence of fruit, wherein, data receiving terminal can be from the current network state of network monitor server acquisition and real-time network Delay, according to the averaging network time delay drawn after the monitoring to network and can also be stored in data receiving terminal.
Finally illustrate, the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although with reference to compared with The present invention is described in detail good embodiment, it will be understood by those within the art that, can be to skill of the invention Art scheme is modified or equivalent, and without departing from the objective and scope of technical solution of the present invention, it all should cover at this Among the right of invention.

Claims (6)

1. a kind of internet of things data transmission method, it is characterised in that:Comprise the following steps:
S1. data send terminal and set up with data receiving terminal after network connection, and data send terminal to data receiving terminal hair The solicited message for obtaining encrypted characters string is sent, data receiving terminal feedback encrypted characters string, the encrypted characters string includes connecing data Receive timing node information T1 and check information that the attribute information of terminal, data receiving terminal receive solicited message;
S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;
S3. data, which send terminal, will receive the timing node information T2 of encrypted characters string and by timing node information T2 and encryption Character string is according to pre-defined rule formation encryption key;
S4. data are sent terminal and message information are encrypted using encryption key, and by the message information after encryption and time Nodal information T1 is sent to data receiving terminal according to predetermined time delay T3;
S5. data receiving terminal receives the message information and timing node information T1 after encryption, and judges to receive after encryption Message information and timing node information T1 time difference T4 whether meet scheduled delay T3 requirement, in this way, during judgement Whether the intermediate node information T1 and timing node information T1 of self record is consistent, in this way, then data is decrypted with processing, no Then, abandon the information this time received and the information of terminal feedback data bust this is sent to data.
2. internet of things data transmission method according to claim 1, it is characterised in that:In step S1, included in check information Check code and delay time information, and data send terminal and data receiving terminal is set up after network connection every time, and change is prolonged Slow time and check code.
3. internet of things data transmission method according to claim 2, it is characterised in that:In step S1, data send terminal root According to following method formation encrypted characters string:
S101. the attribute information of data receiving terminal is transformed to 32 binary first character strings;
S102. the timing node information T1 for receiving solicited message is transformed to binary code and according to pre- by data receiving terminal Set pattern, which is then inserted into the first character string, forms the second character string;
S103. data transmission terminal generates 4 bit checks code at random, and data send the random 4 time delay T3's of generation of terminal Code, the afterbody that the second character string is inserted into after the code of check code and time delay T3 is arranged according to pre-defined rule is formed Final encrypted characters string.
4. internet of things data transmission method according to claim 3, it is characterised in that:In step S3, data send terminal and led to Cross following method formation encryption key:
S301. data send terminal and received after encrypted characters string, are extracted according to the formation rule of encrypted characters string in step S1 Go out timing node information T1 when data receiving terminal receives solicited message;
S302. data send terminal and timing node information T2 are transformed into binary code, and are inserted according to timing node information T1 Enter to rule during the first character string timing node information T2 being inserted into the first character string and form encryption key.
5. internet of things data transmission method according to claim 1, it is characterised in that:In step S4, data send terminal and adopted Message information is encrypted with encryption key and DES algorithms.
6. internet of things data transmission method according to claim 1, it is characterised in that:In step S5, data receiving terminal leads to Following method is crossed to contrast time delay T3:
S501. data receiving terminal detects current network state, obtains network delay time T5;
S501. data transmission terminal rejects network delay time T5 from time difference T4 and draws the message letter for being an actually-received encryption The time difference of breath and temporal information T1, then it is compared with predetermined time delay T3.
CN201710374700.0A 2017-05-24 2017-05-24 Internet of things data transmission method Active CN106961449B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710374700.0A CN106961449B (en) 2017-05-24 2017-05-24 Internet of things data transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710374700.0A CN106961449B (en) 2017-05-24 2017-05-24 Internet of things data transmission method

Publications (2)

Publication Number Publication Date
CN106961449A true CN106961449A (en) 2017-07-18
CN106961449B CN106961449B (en) 2019-12-03

Family

ID=59482365

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710374700.0A Active CN106961449B (en) 2017-05-24 2017-05-24 Internet of things data transmission method

Country Status (1)

Country Link
CN (1) CN106961449B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107493267A (en) * 2017-07-27 2017-12-19 深圳市盛路物联通讯技术有限公司 A kind of random encrypting method and device of internet-of-things terminal data
CN107566336A (en) * 2017-07-26 2018-01-09 深圳市盛路物联通讯技术有限公司 The encryption method in order and device of internet-of-things terminal data
CN111988288A (en) * 2020-08-04 2020-11-24 网络通信与安全紫金山实验室 Key exchange method, system, equipment and storage medium based on network time delay
CN112333253A (en) * 2020-10-27 2021-02-05 国网重庆市电力公司电力科学研究院 Electric power thing networking security monitoring system at intelligent thing networking terminal
CN113744824A (en) * 2021-08-05 2021-12-03 上海道拓医药科技股份有限公司 Electronic prescription circulation management method and system for Internet hospital
CN113777983A (en) * 2021-08-30 2021-12-10 武汉海昌信息技术有限公司 Method and device for synchronizing high-speed data of Internet of things equipment and data center
US11356246B2 (en) 2019-02-01 2022-06-07 Pegatron Corporation Data analysis system and data analysis method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618380A (en) * 2015-02-03 2015-05-13 浙江师范大学 Secret key update method suitable for internet of things
CN104852961A (en) * 2015-04-09 2015-08-19 黎建军 Internet of Things data transmission method
US20160182459A1 (en) * 2014-12-18 2016-06-23 Afero, Inc. System and method for securely connecting network devices
WO2016172492A1 (en) * 2015-04-24 2016-10-27 Pcms Holdings, Inc. Systems, methods, and devices for device credential protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160182459A1 (en) * 2014-12-18 2016-06-23 Afero, Inc. System and method for securely connecting network devices
CN104618380A (en) * 2015-02-03 2015-05-13 浙江师范大学 Secret key update method suitable for internet of things
CN104852961A (en) * 2015-04-09 2015-08-19 黎建军 Internet of Things data transmission method
WO2016172492A1 (en) * 2015-04-24 2016-10-27 Pcms Holdings, Inc. Systems, methods, and devices for device credential protection

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566336A (en) * 2017-07-26 2018-01-09 深圳市盛路物联通讯技术有限公司 The encryption method in order and device of internet-of-things terminal data
CN107493267A (en) * 2017-07-27 2017-12-19 深圳市盛路物联通讯技术有限公司 A kind of random encrypting method and device of internet-of-things terminal data
US11356246B2 (en) 2019-02-01 2022-06-07 Pegatron Corporation Data analysis system and data analysis method
CN111988288A (en) * 2020-08-04 2020-11-24 网络通信与安全紫金山实验室 Key exchange method, system, equipment and storage medium based on network time delay
CN112333253A (en) * 2020-10-27 2021-02-05 国网重庆市电力公司电力科学研究院 Electric power thing networking security monitoring system at intelligent thing networking terminal
CN113744824A (en) * 2021-08-05 2021-12-03 上海道拓医药科技股份有限公司 Electronic prescription circulation management method and system for Internet hospital
CN113744824B (en) * 2021-08-05 2023-10-24 上海道拓医药科技股份有限公司 Electronic prescription circulation management method and system for Internet hospital
CN113777983A (en) * 2021-08-30 2021-12-10 武汉海昌信息技术有限公司 Method and device for synchronizing high-speed data of Internet of things equipment and data center

Also Published As

Publication number Publication date
CN106961449B (en) 2019-12-03

Similar Documents

Publication Publication Date Title
CN106961449A (en) Internet of things data transmission method
CN104113534B (en) The login system and method for application APP
JP2610107B2 (en) Method and apparatus for managing a network
US20170012978A1 (en) Secure communication method and apparatus
CN104519018A (en) Method, device and system for preventing malicious requests for server
CN112351015B (en) Gateway control method based on API
CN109936545A (en) The detection method and relevant apparatus of Brute Force attack
CN105323222B (en) Login validation method and system
CN106453303A (en) Method and system for storing user login status for IOS client
CN107508672A (en) A kind of cipher key synchronization method and key synchronization device based on pool of symmetric keys, key synchronization system
CN107360131A (en) A kind of method, server and the system of the control of service request legitimacy
CN106571907A (en) Method and system for securely transmitting data between upper computer and USB flash disk
CN107483459A (en) The interface protection method of anti-replay-attack
US8014406B2 (en) System and method of inserting a node into a virtual ring
CN108650261A (en) Mobile terminal system software method for burn-recording based on remote encryption interaction
EP2961204A1 (en) Method and device for implementing instant messaging of mobile user equipment
EP1903740A1 (en) Method for implementing a state tracking mechanism in a communications session between a server and a client system
US20100067695A1 (en) Message processing apparatus and processing method thereof
CN107959930A (en) Terminal access method, device, Lora servers and Lora terminals
CN104394064A (en) Novel method and system for limiting forwarding in email transfer
CN112291296B (en) Internet of things equipment access system for urban fire-fighting remote monitoring system and method thereof
CN110309645A (en) A kind of couple of API carries out the method, apparatus and system of security protection
US20130227173A1 (en) Information notification apparatus, method, and program product
CN111935176B (en) Anti-cheating system and method for network security CTF competition
CN104270346B (en) The methods, devices and systems of two-way authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant