CN106961449A - Internet of things data transmission method - Google Patents
Internet of things data transmission method Download PDFInfo
- Publication number
- CN106961449A CN106961449A CN201710374700.0A CN201710374700A CN106961449A CN 106961449 A CN106961449 A CN 106961449A CN 201710374700 A CN201710374700 A CN 201710374700A CN 106961449 A CN106961449 A CN 106961449A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- terminal
- timing node
- node information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A kind of internet of things data transmission method of the offer of the present invention, comprises the following steps:S1. data send terminal to data receiving terminal and send solicited message, and data receiving terminal feedback encrypted characters string;S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;S3. data, which send terminal, will receive the timing node information T2 of encrypted characters string and by timing node information T2 and encrypted characters string according to pre-defined rule formation encryption key;S4. data are sent terminal and message information are encrypted using encryption key, and the message information after encryption and timing node information T1 are sent into data receiving terminal according to predetermined time delay T3;S5. data receiving terminal judges whether the encrypted message information received is legal, in this way, then data is decrypted with processing, otherwise, abandons the information this time received;Message data in platform of internet of things can effectively be encrypted, it is ensured that the data safety in Internet of things system.
Description
Technical field
Network method, more particularly to a kind of internet of things data transmission method are interconnected the present invention relates to one kind.
Background technology
With the development of network, the use of Internet of Things in modern society is more and more universal, also more and more important, especially
For safety-security area, when detecting that the data detected are sent to monitor terminal by terminal, the security of data is most important, closes
It is tied to production, the safety of life;Such as fire fighting monitoring, once intercepted and captured or distorted by criminal in data transmission procedure,
Irretrievable loss will be caused;In the prior art, there is following defect for data transmission of internet of things AES:It is existing
Algorithm is complicated, causes in encryption and decrypting process that time consumption is serious, and for the field for requiring ageing, this is rewinded
Carry out fatal consequence, than the fire-fighting domain in as described above, if algorithm is simplified, it will cause the data of transmission extremely uneasy
Entirely, there is serious potential safety hazard.
Therefore, a kind of new internet of things data transmission method of proposition is needed badly to solve above-mentioned technical problem.
The content of the invention
In view of this, can be in platform of internet of things it is an object of the invention to provide a kind of internet of things data transmission method
Message data effectively encrypted so that effectively prevent criminal carry out data intercepting and capturing or distort, it is ensured that Internet of Things
Data safety in system, moreover, algorithm is simple, can effectively ensure data age.
A kind of internet of things data transmission method of the offer of the present invention, comprises the following steps:
S1. data send terminal and set up with data receiving terminal after network connection, and it is whole that data send terminal to data receiver
End sends the solicited message for obtaining encrypted characters string, and the encrypted characters string connects including connecing the attribute information of data receipts terminal, data
Receive timing node information T1 and check information that terminal receives solicited message;
S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;
S3. data send terminal will receive the timing node information T2 of encrypted characters string and by timing node information T2 and
Encrypted characters string is according to pre-defined rule formation encryption key;
S4. data send terminal and message information are encrypted using encryption key, and by the message information after encryption and
Timing node information T1 is sent to data receiving terminal according to predetermined time delay T3;
S5. data receiving terminal receives the message information and timing node information T1 after encryption, and judgement is received and added
Whether the time difference T4 of message information and timing node information T1 after close meets scheduled delay T3 requirements, in this way, sentences
Whether disconnected timing node information T1 and the timing node information T1 of self record are consistent, in this way, then data are decrypted with processing,
Otherwise, abandon the information this time received and the information of terminal feedback data bust this is sent to data.
Further, in step S1, in check information include check code and delay time information, and data send terminal and
Data receiving terminal is set up after network connection every time, changes time delay and check code.
Further, in step S1, data send terminal and form encrypted characters string according to following method:
S101. the attribute information of data receiving terminal is transformed to 32 binary first character strings;
S102. data receiving terminal by the timing node information T1 for receiving solicited message be transformed to binary code and by
It is inserted into according to pre-defined rule in the first character string and forms the second character string;
S103. data send terminal random generation 4 bit checks code, and data send terminal and generate 4 time delays at random
T3 code, is inserted into the afterbody of the second character string after the code of check code and time delay T3 is arranged according to pre-defined rule
Form final encrypted characters string.
Further, in step S3, data send terminal and form encryption key by the following method:
S301. data send terminal and received after encrypted characters string, according to the formation rule of encrypted characters string in step S1
Extract timing node information T1 when data receiving terminal receives solicited message;
S302. data send terminal and timing node information T2 are transformed into binary code, and according to timing node information
Timing node information T2 is inserted into the first character string by rule when T1 is inserted into the first character string forms encryption key.
Further, in step S4, data are sent terminal and message information are added using encryption key and DES algorithms
It is close.
Further, in step S5, data receiving terminal is contrasted to time delay T3 by the following method:
S501. data receiving terminal detects current network state, obtains network delay time T5;
S501. data transmission terminal rejects network delay time T5 from time difference T4 and draws the report for being an actually-received encryption
Literary information and temporal information T1 time difference, then it is compared with predetermined time delay T3.
Beneficial effects of the present invention:By means of the invention it is possible to the message data in platform of internet of things is effectively encrypted,
So as to effectively prevent criminal from carrying out the intercepting and capturing of data or distort, it is ensured that the data safety in Internet of things system, moreover, calculating
Method is simple, can effectively ensure data age.
Brief description of the drawings
The invention will be further described with reference to the accompanying drawings and examples:
Fig. 1 is flow chart of the invention.
Fig. 2 forms flow chart for the encrypted characters string of the present invention.
Fig. 3 forms flow chart for the encryption key of the present invention.
Fig. 4 is data receiving terminal process chart of the invention.
Embodiment
The present invention is further elaborated below in conjunction with Figure of description:
As illustrated, a kind of internet of things data transmission method of the offer of the present invention, comprises the following steps:
S1. data send terminal and set up with data receiving terminal after network connection, and it is whole that data send terminal to data receiver
End sends the solicited message for obtaining encrypted characters string, and the encrypted characters string connects including connecing the attribute information of data receipts terminal, data
Receive the timing node information T1 and check information when terminal receives solicited message;Wherein, attribute information refers to data terminal
Id information, that is to say, that in Internet of Things, each terminal remove assign connection network IP address outside, be also endowed one
Individual id information, in the present embodiment, id information are constituted using 8 digits, and it is then 32 to be transformed into after binary system, certainly, in reality
Using id information can use the method in more long number, the present invention equally applicable;Timing node information T1 is also by data receiver
Terminal is recorded, after data send terminal and data receiving terminal is disconnected, the timing node information T1 and check information
It is clear, send terminal in data and data receiving terminal is regenerated next time again after connection, in general, in Internet of Things,
Data send terminal and data receiving terminal message information be transmitted in last time after in the stipulated time again without information exchange, then
It can be considered that current data sends terminal and data receiving terminal is disconnected;
S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;
S3. data send terminal will receive the timing node information T2 of encrypted characters string and by timing node information T2 and
Encrypted characters string is according to pre-defined rule formation encryption key;
S4. data send terminal and message information are encrypted using encryption key, and by the message information after encryption and
Timing node information T1 is sent to data receiving terminal according to predetermined time delay T3;
S5. data receiving terminal receives the message information and timing node information T1 after encryption, and judgement is received and added
Whether the time difference T4 that the time of the message information after close and data send the timing node information T1 of terminal feedback meets predetermined
Time delay T3 requirements, in this way, judge whether the timing node information T1 of timing node information T1 and self record is consistent, such as
It is that then data are decrypted with processing, otherwise, abandons the information this time received and send terminal feedback data to data and transmit
After the information of failure, and the network connection between data transmission terminal is disconnected, wherein, time difference T4 is consistent with time delay T3
It is then consistent within the error range of setting to refer to the difference between time difference T4 and time delay T3, and the error range can be with
The state determination of terminal is sent according to network state, data receiving terminal and data in advance, wherein, data receiving terminal and data
The state for sending terminal refers to the average time consumed for handling same amount of data;By the present invention, in encryption key
With reference in generating process it is above-mentioned in multiple parameters, and after data terminal receives the message information of encryption and decryption
Entered above method judgement again before, the possibility that encryption key is cracked in data transmission procedure can be substantially reduced, and
And because the control of timing node, data receiving terminal carry out multiple checking, greatly reduce invalid data and be decrypted and enter
Enter into Internet of things system, it is ensured that the operation safety of whole Internet of things system.
In the present embodiment, in step S1, check code and delay time information are included in check information, and data are sent eventually
End and data receiving terminal are set up after network connection every time, change time delay and check code, wherein, time delay is with millisecond list
Position statistics, therefore, can't be impacted, by the above method, time delay and check code are to the ageing of data transfer
Dynamic-form, can strengthen the security of data encryption.
In the present embodiment, in step S1, data send terminal and form encrypted characters string according to following method:
S101. the attribute information of data receiving terminal is transformed to 32 binary first character strings;
S102. data receiving terminal by the timing node information T1 for receiving solicited message be transformed to binary code and by
It is inserted into according to pre-defined rule in the first character string and forms the second character string;Wherein, the pre-defined rule is prior agreement, with it
In by taking following rule as an example:Such as timing node information be 10 points 27 seconds 15 minutes, then, its binary code is
000100000001010100100111, wherein, T1 points of the timing node information is three sections:A=00010000, b=
The First ray character of 00010101, c=00100111,32 is to be divided into a section according to every 8, then respectively with bigger letters
ABCD is replaced, then, can be the modes such as AaBbCcD, AbaCbDc or AcBbCaD after insertion, certainly, character string can also
It is that then a character field enters row interpolation according to above-mentioned rule with every 4;
S103. data send terminal random generation 4 bit checks code, and data send terminal and generate 4 time delays at random
T3 code, is inserted into the afterbody of the second character string after the code of check code and time delay T3 is arranged according to pre-defined rule
Final encrypted characters string is formed, wherein, check code is the binary code of 4 with time delay T3, wherein, check code
Binary system check code is replaced with X, and time delay T3 binary code is replaced with Y, then, still with above-mentioned example explanation:Check code
Inserted with time delay T3 after the second character string, then encrypted characters string is:AaBbCcDXY, AbaCbDcXY or
AcBbCaDXY etc., by above-mentioned method, can form the higher key of confidentiality, it is ensured that the accuracy of transmission data.
In the present embodiment, in step S3, data send terminal and form encryption key by the following method:
S301. data send terminal and received after encrypted characters string, according to the formation rule of encrypted characters string in step S1
Extract timing node information T1 when data receiving terminal receives solicited message;
S302. data send terminal and timing node information T2 are transformed into binary code, and according to timing node information
Timing node information T2 is inserted into the first character string by rule when T1 is inserted into the first character string forms encryption key,
Wherein, the form of the form of timing node information T2 binary code and timing node T1 binary code is just as with U, V and W
Timing node information T2 character field is represented respectively, then, timing node information T2 is replaced after timing node information T1, with
Exemplified by AaBbCcDXY, final key is then:AUBVCWDXY, by the above method, can effectively improve the confidentiality of key,
So as to improve the security of the message information after encryption;To sum up state, in key generation process of the invention, taken into full account data
The replacement of temporal information and temporal information when the parameter information of receiving terminal, data transmit-receive, and the composition rule of key
Also further to be verified after about putting and message information being encrypted in advance by encryption key, so as to effectively increase data safety
Property, provide powerful guarantee for the reliability of Internet of Things, security.
In the present embodiment, in step S4, data are sent terminal and message information are carried out using encryption key and DES algorithms
Encryption, certainly, message information, which is encrypted, using encryption key can also use other existing algorithms, can realize this
The purpose of invention, not in this to go forth.
In the present embodiment, in step S5, data receiving terminal is contrasted to time delay T3 by the following method:
S501. data receiving terminal detects current network state, obtains network delay time T5;
S501. data transmission terminal rejects network delay time T5 from time difference T4 and draws the report for being an actually-received encryption
Literary information and temporal information T1 time difference, then it is compared with predetermined time delay T3, can be right by the above method
Whether the message information that data receiving terminal is received be that legal information makes accurate judgement, it is to avoid network delay is to judging to tie
The influence of fruit, wherein, data receiving terminal can be from the current network state of network monitor server acquisition and real-time network
Delay, according to the averaging network time delay drawn after the monitoring to network and can also be stored in data receiving terminal.
Finally illustrate, the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although with reference to compared with
The present invention is described in detail good embodiment, it will be understood by those within the art that, can be to skill of the invention
Art scheme is modified or equivalent, and without departing from the objective and scope of technical solution of the present invention, it all should cover at this
Among the right of invention.
Claims (6)
1. a kind of internet of things data transmission method, it is characterised in that:Comprise the following steps:
S1. data send terminal and set up with data receiving terminal after network connection, and data send terminal to data receiving terminal hair
The solicited message for obtaining encrypted characters string is sent, data receiving terminal feedback encrypted characters string, the encrypted characters string includes connecing data
Receive timing node information T1 and check information that the attribute information of terminal, data receiving terminal receive solicited message;
S2. data send terminal and receive encrypted characters string, and record the timing node information T2 for receiving encrypted characters string;
S3. data, which send terminal, will receive the timing node information T2 of encrypted characters string and by timing node information T2 and encryption
Character string is according to pre-defined rule formation encryption key;
S4. data are sent terminal and message information are encrypted using encryption key, and by the message information after encryption and time
Nodal information T1 is sent to data receiving terminal according to predetermined time delay T3;
S5. data receiving terminal receives the message information and timing node information T1 after encryption, and judges to receive after encryption
Message information and timing node information T1 time difference T4 whether meet scheduled delay T3 requirement, in this way, during judgement
Whether the intermediate node information T1 and timing node information T1 of self record is consistent, in this way, then data is decrypted with processing, no
Then, abandon the information this time received and the information of terminal feedback data bust this is sent to data.
2. internet of things data transmission method according to claim 1, it is characterised in that:In step S1, included in check information
Check code and delay time information, and data send terminal and data receiving terminal is set up after network connection every time, and change is prolonged
Slow time and check code.
3. internet of things data transmission method according to claim 2, it is characterised in that:In step S1, data send terminal root
According to following method formation encrypted characters string:
S101. the attribute information of data receiving terminal is transformed to 32 binary first character strings;
S102. the timing node information T1 for receiving solicited message is transformed to binary code and according to pre- by data receiving terminal
Set pattern, which is then inserted into the first character string, forms the second character string;
S103. data transmission terminal generates 4 bit checks code at random, and data send the random 4 time delay T3's of generation of terminal
Code, the afterbody that the second character string is inserted into after the code of check code and time delay T3 is arranged according to pre-defined rule is formed
Final encrypted characters string.
4. internet of things data transmission method according to claim 3, it is characterised in that:In step S3, data send terminal and led to
Cross following method formation encryption key:
S301. data send terminal and received after encrypted characters string, are extracted according to the formation rule of encrypted characters string in step S1
Go out timing node information T1 when data receiving terminal receives solicited message;
S302. data send terminal and timing node information T2 are transformed into binary code, and are inserted according to timing node information T1
Enter to rule during the first character string timing node information T2 being inserted into the first character string and form encryption key.
5. internet of things data transmission method according to claim 1, it is characterised in that:In step S4, data send terminal and adopted
Message information is encrypted with encryption key and DES algorithms.
6. internet of things data transmission method according to claim 1, it is characterised in that:In step S5, data receiving terminal leads to
Following method is crossed to contrast time delay T3:
S501. data receiving terminal detects current network state, obtains network delay time T5;
S501. data transmission terminal rejects network delay time T5 from time difference T4 and draws the message letter for being an actually-received encryption
The time difference of breath and temporal information T1, then it is compared with predetermined time delay T3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710374700.0A CN106961449B (en) | 2017-05-24 | 2017-05-24 | Internet of things data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710374700.0A CN106961449B (en) | 2017-05-24 | 2017-05-24 | Internet of things data transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106961449A true CN106961449A (en) | 2017-07-18 |
CN106961449B CN106961449B (en) | 2019-12-03 |
Family
ID=59482365
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710374700.0A Active CN106961449B (en) | 2017-05-24 | 2017-05-24 | Internet of things data transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106961449B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107493267A (en) * | 2017-07-27 | 2017-12-19 | 深圳市盛路物联通讯技术有限公司 | A kind of random encrypting method and device of internet-of-things terminal data |
CN107566336A (en) * | 2017-07-26 | 2018-01-09 | 深圳市盛路物联通讯技术有限公司 | The encryption method in order and device of internet-of-things terminal data |
CN111988288A (en) * | 2020-08-04 | 2020-11-24 | 网络通信与安全紫金山实验室 | Key exchange method, system, equipment and storage medium based on network time delay |
CN112333253A (en) * | 2020-10-27 | 2021-02-05 | 国网重庆市电力公司电力科学研究院 | Electric power thing networking security monitoring system at intelligent thing networking terminal |
CN113744824A (en) * | 2021-08-05 | 2021-12-03 | 上海道拓医药科技股份有限公司 | Electronic prescription circulation management method and system for Internet hospital |
CN113777983A (en) * | 2021-08-30 | 2021-12-10 | 武汉海昌信息技术有限公司 | Method and device for synchronizing high-speed data of Internet of things equipment and data center |
US11356246B2 (en) | 2019-02-01 | 2022-06-07 | Pegatron Corporation | Data analysis system and data analysis method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104618380A (en) * | 2015-02-03 | 2015-05-13 | 浙江师范大学 | Secret key update method suitable for internet of things |
CN104852961A (en) * | 2015-04-09 | 2015-08-19 | 黎建军 | Internet of Things data transmission method |
US20160182459A1 (en) * | 2014-12-18 | 2016-06-23 | Afero, Inc. | System and method for securely connecting network devices |
WO2016172492A1 (en) * | 2015-04-24 | 2016-10-27 | Pcms Holdings, Inc. | Systems, methods, and devices for device credential protection |
-
2017
- 2017-05-24 CN CN201710374700.0A patent/CN106961449B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160182459A1 (en) * | 2014-12-18 | 2016-06-23 | Afero, Inc. | System and method for securely connecting network devices |
CN104618380A (en) * | 2015-02-03 | 2015-05-13 | 浙江师范大学 | Secret key update method suitable for internet of things |
CN104852961A (en) * | 2015-04-09 | 2015-08-19 | 黎建军 | Internet of Things data transmission method |
WO2016172492A1 (en) * | 2015-04-24 | 2016-10-27 | Pcms Holdings, Inc. | Systems, methods, and devices for device credential protection |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107566336A (en) * | 2017-07-26 | 2018-01-09 | 深圳市盛路物联通讯技术有限公司 | The encryption method in order and device of internet-of-things terminal data |
CN107493267A (en) * | 2017-07-27 | 2017-12-19 | 深圳市盛路物联通讯技术有限公司 | A kind of random encrypting method and device of internet-of-things terminal data |
US11356246B2 (en) | 2019-02-01 | 2022-06-07 | Pegatron Corporation | Data analysis system and data analysis method |
CN111988288A (en) * | 2020-08-04 | 2020-11-24 | 网络通信与安全紫金山实验室 | Key exchange method, system, equipment and storage medium based on network time delay |
CN112333253A (en) * | 2020-10-27 | 2021-02-05 | 国网重庆市电力公司电力科学研究院 | Electric power thing networking security monitoring system at intelligent thing networking terminal |
CN113744824A (en) * | 2021-08-05 | 2021-12-03 | 上海道拓医药科技股份有限公司 | Electronic prescription circulation management method and system for Internet hospital |
CN113744824B (en) * | 2021-08-05 | 2023-10-24 | 上海道拓医药科技股份有限公司 | Electronic prescription circulation management method and system for Internet hospital |
CN113777983A (en) * | 2021-08-30 | 2021-12-10 | 武汉海昌信息技术有限公司 | Method and device for synchronizing high-speed data of Internet of things equipment and data center |
Also Published As
Publication number | Publication date |
---|---|
CN106961449B (en) | 2019-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106961449A (en) | Internet of things data transmission method | |
CN104113534B (en) | The login system and method for application APP | |
JP2610107B2 (en) | Method and apparatus for managing a network | |
US20170012978A1 (en) | Secure communication method and apparatus | |
CN104519018A (en) | Method, device and system for preventing malicious requests for server | |
CN112351015B (en) | Gateway control method based on API | |
CN109936545A (en) | The detection method and relevant apparatus of Brute Force attack | |
CN105323222B (en) | Login validation method and system | |
CN106453303A (en) | Method and system for storing user login status for IOS client | |
CN107508672A (en) | A kind of cipher key synchronization method and key synchronization device based on pool of symmetric keys, key synchronization system | |
CN107360131A (en) | A kind of method, server and the system of the control of service request legitimacy | |
CN106571907A (en) | Method and system for securely transmitting data between upper computer and USB flash disk | |
CN107483459A (en) | The interface protection method of anti-replay-attack | |
US8014406B2 (en) | System and method of inserting a node into a virtual ring | |
CN108650261A (en) | Mobile terminal system software method for burn-recording based on remote encryption interaction | |
EP2961204A1 (en) | Method and device for implementing instant messaging of mobile user equipment | |
EP1903740A1 (en) | Method for implementing a state tracking mechanism in a communications session between a server and a client system | |
US20100067695A1 (en) | Message processing apparatus and processing method thereof | |
CN107959930A (en) | Terminal access method, device, Lora servers and Lora terminals | |
CN104394064A (en) | Novel method and system for limiting forwarding in email transfer | |
CN112291296B (en) | Internet of things equipment access system for urban fire-fighting remote monitoring system and method thereof | |
CN110309645A (en) | A kind of couple of API carries out the method, apparatus and system of security protection | |
US20130227173A1 (en) | Information notification apparatus, method, and program product | |
CN111935176B (en) | Anti-cheating system and method for network security CTF competition | |
CN104270346B (en) | The methods, devices and systems of two-way authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |