CN107147666A - The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform - Google Patents

The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform Download PDF

Info

Publication number
CN107147666A
CN107147666A CN201710424009.9A CN201710424009A CN107147666A CN 107147666 A CN107147666 A CN 107147666A CN 201710424009 A CN201710424009 A CN 201710424009A CN 107147666 A CN107147666 A CN 107147666A
Authority
CN
China
Prior art keywords
internet
things terminal
data
cloud platform
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710424009.9A
Other languages
Chinese (zh)
Inventor
赵超
孙杰
陈智也
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Sea Level Data Technology Co Ltd
Original Assignee
Jiangsu Sea Level Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Sea Level Data Technology Co Ltd filed Critical Jiangsu Sea Level Data Technology Co Ltd
Priority to CN201710424009.9A priority Critical patent/CN107147666A/en
Publication of CN107147666A publication Critical patent/CN107147666A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The method that the present invention transmits data encrypting and deciphering between internet-of-things terminal and cloud data platform is related to Internet of things system operation management, is managed collectively especially by cloud platform, the method that data encrypting and deciphering is carried out between internet-of-things terminal and cloud data platform.Device Key and Secret Key are used as including 1) reading on equipment of itself two unique No. ID before internet-of-things terminal communicates with cloud platform, registered;Internet-of-things terminal carries out registration upload;Pairing is entered into the security server of cloud platform;2)When cloud platform and internet-of-things terminal need to carry out encryption and decryption to transmission data;Enciphering and deciphering algorithm negotiation is carried out by internet-of-things terminal and cloud platform, after the random secret key that negotiating algorithm produces data transfer, carried out data transmission.A kind of safe, data transfer encryption and decryption and the method for management between internet-of-things terminal and cloud data platform are provided, effectively transmission encipher-decipher method is provided for Physical Network system, ensures service security operation.

Description

The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
Technical field
The method that the present invention transmits data encrypting and deciphering between internet-of-things terminal and cloud data platform is related to Internet of things system Operation management, is managed collectively especially by cloud platform, and data encrypting and deciphering is carried out between internet-of-things terminal and cloud data platform Method.
Background technology
With the development and the progress of science and technology in epoch, all things on earth interconnection has been trend of the times.On the basis of technological progress, one A little new application fast developments are got up.Such as car networking, industry networking, household networking, by internet-of-things terminal, by various equipment Information transfer to cloud data platform, and analyzed, calculated, managed, its economy and social value are very big.
Internet of things system, is related to life various aspects, and the security to business relies on very high.Internet-of-things terminal is flat with cloud , it is necessary to carry out encryption and decryption to significant data when platform is transmitted significant data, significant data is prevented to be stolen in transmitting procedure With distort.
But existing Internet of things system, it is inadequate to the security repeatability of business.Existing scheme or to transmission data Do not encrypt, or simple encryption carried out by static state, lack a kind of safe, cloud platform and terminal is simultaneously participated in, dynamic plus Decryption and management method.And internet-of-things terminal when carrying out important business, it is necessary to obtain a kind of safe, dynamic encryption and decryption Method, otherwise can not effective and safe guarantee business operation.
When internet-of-things terminal carries out important business, existing method is without effectively progress data encrypting and deciphering and pipe Reason, it is impossible to ensure the safe operation of business.
The content of the invention
The purpose of the present invention is to provide one kind number between internet-of-things terminal and cloud data platform for above-mentioned weak point It is effective to ensure that service security is carried out according to transmission encryption and decryption and the method for management.
The present invention takes following technical scheme to realize:
Data encrypting and deciphering and the method for management, comprise the following steps between internet-of-things terminal and cloud data platform:
1) before internet-of-things terminal and cloud platform registration;
1-1)It is used as Device Key and Secret by reading on equipment of itself two unique No. ID by internet-of-things terminal Key;Device Key are used as female key of encryption and decryption for this hardware device of unique mark, Secret Key;Hereafter use DKey represents Device Key, and SKey represents Secret Key;
1-2)Internet-of-things terminal is registered, by the register flow path arranged in advance, by step 1-1)In DKey and SKey upload To cloud platform;
1-3)DKey and SKey pairings are entered into the security server of cloud platform by cloud platform, subsequently carry out unique mark using DKey This hardware device, SKey is used as female key of this terminal data encryption and decryption;
2)When cloud platform and internet-of-things terminal need to carry out encryption and decryption to transmission data;
2-1)Enciphering and deciphering algorithm negotiation is carried out by internet-of-things terminal and cloud platform, internet-of-things terminal and cloud platform are reported through consultation Text, according to the form of agreement, a side sends enciphering and deciphering algorithm number, and the opposing party is confirmed, internet-of-things terminal and cloud platform are double Just consult the enciphering and deciphering algorithm that data are used next sent;
2-2)Internet-of-things terminal and cloud platform both sides are after negotiating algorithm, and internet-of-things terminal sends oneself to cloud platform DKey, to show the identity of oneself;
2-3) cloud platform receives the DKey of internet-of-things terminal transmission, and its corresponding SKey is found on the secure server;Yun Ping Platform produces a random number M1, is used as the random secret key of current data transfer by the randomizer of oneself;
2-4)SKey and M1 are done key by cloud platform using SKey, and by the AES 01 of prior protocol conventions, M1 is added It is close to calculate, obtain sequence number M2;
2-5)The M2 of generation is sent to internet-of-things terminal by cloud platform;
2-6)Internet-of-things terminal receiving step 2-5)The M2 transmitted, is decrypted using key SKey, obtains random number M1;So far Random secret key M1 is assigned to internet-of-things terminal;
2-7)Internet-of-things terminal is by step 2-6)In obtained M1 as key, to the data to be transmitted, according to prior agreement Algorithm 02 be encrypted, be transferred to cloud platform after the data encrypted;
2-8)Cloud platform is obtained after encryption data, is decrypted using random secret key M1, is obtained initial data;
2-9)When cloud platform sends data to internet-of-things terminal, first to the data to be transmitted, using random secret key M1 according to association The enciphering and deciphering algorithm 02 of view agreement is encrypted, and internet-of-things terminal is transferred to after the data after being encrypted;
2-10)Internet-of-things terminal is received after encryption data, is entered using random secret key M1 according to the enciphering and deciphering algorithm 02 of protocol conventions Row decryption;
2-11)When carrying out data transmission next time, 2-1 is repeated between internet-of-things terminal and cloud platform)To 2-10) between step Suddenly.
The AES of the prior protocol conventions be between cloud platform and internet terminal by communication protocol negotiation about Fixed AES.
Step 1-1)Described in No. ID can be wireless communication module(Such as 2G, 3G, 4G wireless communication module)'s IMEI number, or SIM card IMSI number, or SPI flash chips unique ID number, or MCU chip unique ID number, or network interface card thing Manage physical address number of chip etc.;When can also be internet-of-things terminal production, distribute and burning be in terminal storage equipment, It is unique No. ID;The corresponding ID differences of distinct device.
The inventive method when internet-of-things terminal carries out important business there is provided it is a kind of it is safe, in internet-of-things terminal and Data transfer encryption and decryption and the method for management between cloud data platform, effective transmission data encrypting and deciphering is provided for Physical Network system Method, ensures the safe operation of business.
Brief description of the drawings
Below with reference to accompanying drawing, the invention will be further described:
Fig. 1 is the transmission data encrypting and deciphering flow chart of the inventive method.
Fig. 2 is the inventive method step 1)Schematic flow sheet before internet-of-things terminal and cloud platform are registered.
Fig. 3 is the inventive method step 2)Part when cloud platform and internet-of-things terminal need to carry out encryption and decryption to transmission data Schematic flow sheet 1.
Fig. 4 is the inventive method step 2)Part when cloud platform and internet-of-things terminal need to carry out encryption and decryption to transmission data Schematic flow sheet 2.
Embodiment
Referring to the drawings 1 ~ 4, the present invention transmits the side of data encrypting and deciphering flow between internet-of-things terminal and cloud data platform Method, comprises the following steps:
1) before internet-of-things terminal communicates with cloud platform, registered;
1-1)It is used as Device Key and Secret by reading on equipment of itself two unique No. ID by internet-of-things terminal Key;Device Key are abbreviated as DKey for this hardware device of unique mark;Secret Key are used as the mother of encryption and decryption Key, is abbreviated as SKey;
1-2)Internet-of-things terminal is registered, by the register flow path arranged in advance, by step 1-1)Described in DKey and SKey Upload to cloud platform;
1-3)Cloud platform will be by step 1-1)Described in DKey and SKey match the security server for being entered into cloud platform, subsequently Carry out unique mark this hardware device using DKey, SKey is used as female key of this terminal data encryption and decryption;
2)When cloud platform and internet-of-things terminal need to carry out encryption and decryption to transmission data;
2-1)Enciphering and deciphering algorithm negotiation is carried out by internet-of-things terminal and cloud platform, internet-of-things terminal and cloud platform are reported through consultation Text, according to the form of agreement, a side sends enciphering and deciphering algorithm number, and the opposing party is confirmed, both sides consult what is next sent The enciphering and deciphering algorithm that data are used;
Citing:Both sides arrange enciphering and deciphering algorithm number 01 and represent algorithm one in advance, and 02 represents algorithm two, and report is consulted when a side sends Text, algorithm number therein is 01, after the opposing party is confirmed, the data of following both sides' transmission are carried out plus solved using algorithm one It is close;
2-2)Internet-of-things terminal and cloud platform both sides send oneself after negotiating algorithm from internet-of-things terminal to cloud platform DKey, to show the identity of oneself;
2-3) cloud platform receives the DKey of internet-of-things terminal transmission, and its corresponding SKey is found on the secure server;Yun Ping Platform produces a random number M1, is used as the random secret key of current data transfer by the randomizer of oneself;
2-4)Cloud platform does key using SKey, by step 2-3)In SKey and M1 press prior protocol conventions AES 01, calculating is encrypted, sequence number M2 is obtained;
2-5)The M2 of generation is sent to internet-of-things terminal by cloud platform;
2-6)Internet-of-things terminal receiving step 2-5)The M2 transmitted, is decrypted using key SKEY, obtains random number M1;So far Random secret key M1 is assigned to internet-of-things terminal;
2-7)Internet-of-things terminal is by step 2-6)In obtained M1 as key, to the data to be transmitted, according to prior agreement Algorithm 02 be encrypted, be transferred to cloud platform after the data encrypted;
2-8)Cloud platform is obtained after encryption data, is decrypted using random secret key M1, is obtained initial data;
2-9)When cloud platform sends data to internet-of-things terminal, first to the data to be transmitted, using random secret key M1 according to association The enciphering and deciphering algorithm 02 of view agreement is encrypted, and internet-of-things terminal is transferred to after the data after being encrypted;
2-10)Internet-of-things terminal is received after encryption data, is entered using random secret key M1 according to the enciphering and deciphering algorithm 02 of protocol conventions Row decryption;
2-11)When carrying out data transmission next time, 2-1 is repeated between internet-of-things terminal and cloud platform)To 2-10) between step Suddenly.
The AES of prior protocol conventions is to be arranged between cloud platform and internet terminal by communication protocol negotiation AES.

Claims (3)

1. a kind of data encrypting and deciphering between internet-of-things terminal and cloud data platform and the method for management, it is characterised in that including Following steps:
1) before internet-of-things terminal communicates with cloud platform, registered;
1-1)It is used as Device Key and Secret by reading on equipment of itself two unique No. ID by internet-of-things terminal Key;Device Key are used as female key of encryption and decryption for this hardware device of unique mark, Secret Key;Hereafter use DKey represents Device Key, and SKey represents Secret Key;
1-2)Internet-of-things terminal is registered, and by the register flow path arranged in advance, DKey and SKey are uploaded into cloud platform;
1-3)DKey and SKey pairings are entered into the security server of cloud platform by cloud platform, subsequently carry out unique mark using DKey This hardware device, SKey is used as female key of this terminal data encryption and decryption;
2)When cloud platform and internet-of-things terminal need to carry out encryption and decryption to transmission data;
2-1)Enciphering and deciphering algorithm negotiation is carried out by internet-of-things terminal and cloud platform, internet-of-things terminal and cloud platform are reported through consultation Text, according to the form of agreement, a side sends enciphering and deciphering algorithm number, and the opposing party is confirmed, both sides consult what is next sent The enciphering and deciphering algorithm that data are used;
2-2)Both sides are after negotiating algorithm, and internet-of-things terminal sends the DKEY of oneself to cloud platform, to show the identity of oneself;
2-3) cloud platform receives the DKEY of internet-of-things terminal transmission, and its corresponding SKEY is found on the secure server;Yun Ping Platform produces a random number M1, is used as the random secret key of current data transfer by the randomizer of oneself;
2-4)SKEY and M1 are done key by cloud platform using SKEY, and the AES 01 of prior protocol conventions is pressed to M1, is added It is close to calculate, obtain sequence number M2;
2-5)The M2 of generation is sent to internet-of-things terminal by cloud platform;
2-6)Internet-of-things terminal receiving step 2-5)The M2 transmitted, is decrypted using key SKEY, obtains random number M1;So far Random secret key M1 is assigned to internet-of-things terminal;
2-7)Internet-of-things terminal is by step 2-6)In obtained M1 as key, to the data to be transmitted, according to prior agreement Algorithm 02 be encrypted, be transferred to cloud platform after the data encrypted;
2-8)Cloud platform is obtained after encryption data, is decrypted using random secret key M1, is obtained initial data;
2-9)When cloud platform sends data to internet-of-things terminal, first to the data to be transmitted, using random secret key M1 according to association The enciphering and deciphering algorithm 02 of view agreement is encrypted, and internet-of-things terminal is transferred to after the data after being encrypted;
2-10)Internet-of-things terminal is received after encryption data, is entered using random secret key M1 according to the enciphering and deciphering algorithm 02 of protocol conventions Row decryption;
2-11)When carrying out data transmission next time, 2-1 is repeated between internet-of-things terminal and cloud platform)To 2-10) between step Suddenly.
2. a kind of side that data encrypting and deciphering is transmitted between internet-of-things terminal and cloud data platform according to claim 1 Method, it is characterised in that:The enciphering and deciphering algorithm of prior protocol conventions is to be assisted between cloud platform and internet terminal by communication protocol The fixed enciphering and deciphering algorithm of commercial treaty.
3. a kind of side that data encrypting and deciphering is transmitted between internet-of-things terminal and cloud data platform according to claim 1 Method, it is characterised in that:Step 1-1)Described in No. ID be wireless communication module IMEI number, or SIM card IMSI number, or The unique ID number of SPI flash chips, or MCU chip unique ID number, or network interface card phy chip physical address number;Or Internet of Things When network termination is produced, distribute and burning is in terminal storage equipment, unique No. ID.
CN201710424009.9A 2017-06-07 2017-06-07 The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform Pending CN107147666A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710424009.9A CN107147666A (en) 2017-06-07 2017-06-07 The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710424009.9A CN107147666A (en) 2017-06-07 2017-06-07 The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform

Publications (1)

Publication Number Publication Date
CN107147666A true CN107147666A (en) 2017-09-08

Family

ID=59780593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710424009.9A Pending CN107147666A (en) 2017-06-07 2017-06-07 The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform

Country Status (1)

Country Link
CN (1) CN107147666A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768635A (en) * 2018-06-01 2018-11-06 武汉珈港科技有限公司 A kind of cipher mark administrative model and method suitable for Internet of things system
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN109714307A (en) * 2018-06-12 2019-05-03 广东工业大学 A kind of cloud platform client data encrypting and deciphering system and method based on national secret algorithm
KR20190063193A (en) 2017-11-29 2019-06-07 고려대학교 산학협력단 METHOD AND SYSTEM FOR DATA SHARING FOR INTERNET OF THINGS(IoT) MANAGEMENT IN CLOUD COMPUTING
CN109922022A (en) * 2017-12-12 2019-06-21 中国电信股份有限公司 Internet of Things communication means, platform, terminal and system
CN110365785A (en) * 2019-07-18 2019-10-22 广东省新一代通信与网络创新研究院 Enter processing method, terminal device and the storage medium of cloud data
CN110856170A (en) * 2019-11-18 2020-02-28 中国联合网络通信集团有限公司 Data transmission method and device and communication system of Internet of things
CN110912680A (en) * 2019-11-26 2020-03-24 福建汉特云智能科技有限公司 Data transmission method for improving safety of vehicle condition data and storage medium
CN114285890A (en) * 2021-12-10 2022-04-05 西安广和通无线通信有限公司 Cloud platform connection method, device, equipment and storage medium
CN115225339A (en) * 2022-06-28 2022-10-21 国网电力科学研究院有限公司 Secure access and data transmission method and system for power transmission Internet of things sensing terminal
CN116542787A (en) * 2023-07-05 2023-08-04 北京码动摩登科技有限公司 Insurance business information query method, system, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882847A (en) * 2012-08-24 2013-01-16 山东省计算中心 Secure digital (SD)-password-card-based Internet of things healthcare service system and secure communication method thereof
CN103326849A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 Internet of Things secure transmission method
US20160087933A1 (en) * 2006-09-25 2016-03-24 Weaved, Inc. Techniques for the deployment and management of network connected devices
CN106506157A (en) * 2016-12-22 2017-03-15 天泽信息产业股份有限公司 The method authenticated between internet-of-things terminal and cloud data platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160087933A1 (en) * 2006-09-25 2016-03-24 Weaved, Inc. Techniques for the deployment and management of network connected devices
CN102882847A (en) * 2012-08-24 2013-01-16 山东省计算中心 Secure digital (SD)-password-card-based Internet of things healthcare service system and secure communication method thereof
CN103326849A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 Internet of Things secure transmission method
CN106506157A (en) * 2016-12-22 2017-03-15 天泽信息产业股份有限公司 The method authenticated between internet-of-things terminal and cloud data platform

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190063193A (en) 2017-11-29 2019-06-07 고려대학교 산학협력단 METHOD AND SYSTEM FOR DATA SHARING FOR INTERNET OF THINGS(IoT) MANAGEMENT IN CLOUD COMPUTING
CN109922022A (en) * 2017-12-12 2019-06-21 中国电信股份有限公司 Internet of Things communication means, platform, terminal and system
CN108768635A (en) * 2018-06-01 2018-11-06 武汉珈港科技有限公司 A kind of cipher mark administrative model and method suitable for Internet of things system
CN109714307B (en) * 2018-06-12 2024-04-12 广东工业大学 Cloud platform client data encryption and decryption system and method based on cryptographic algorithm
CN109714307A (en) * 2018-06-12 2019-05-03 广东工业大学 A kind of cloud platform client data encrypting and deciphering system and method based on national secret algorithm
CN109462477B (en) * 2018-12-28 2021-05-25 芯海科技(深圳)股份有限公司 White box encryption method based on Internet of things embedded equipment
CN109462477A (en) * 2018-12-28 2019-03-12 芯海科技(深圳)股份有限公司 Whitepack encryption method based on Internet of Things embedded device
CN110365785A (en) * 2019-07-18 2019-10-22 广东省新一代通信与网络创新研究院 Enter processing method, terminal device and the storage medium of cloud data
CN110856170A (en) * 2019-11-18 2020-02-28 中国联合网络通信集团有限公司 Data transmission method and device and communication system of Internet of things
CN110912680A (en) * 2019-11-26 2020-03-24 福建汉特云智能科技有限公司 Data transmission method for improving safety of vehicle condition data and storage medium
CN110912680B (en) * 2019-11-26 2023-06-27 福建汉特云智能科技有限公司 Data transmission method and storage medium for improving safety of vehicle condition data
CN114285890A (en) * 2021-12-10 2022-04-05 西安广和通无线通信有限公司 Cloud platform connection method, device, equipment and storage medium
CN114285890B (en) * 2021-12-10 2024-03-15 西安广和通无线通信有限公司 Cloud platform connection method, device, equipment and storage medium
CN115225339A (en) * 2022-06-28 2022-10-21 国网电力科学研究院有限公司 Secure access and data transmission method and system for power transmission Internet of things sensing terminal
CN115225339B (en) * 2022-06-28 2024-03-26 国网电力科学研究院有限公司 Safe access and data transmission method and system for sensing terminal of power transmission Internet of things
CN116542787A (en) * 2023-07-05 2023-08-04 北京码动摩登科技有限公司 Insurance business information query method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107147666A (en) The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN104158653B (en) A kind of safety communicating method based on the close algorithm of business
CN104754581B (en) A kind of safety certifying method of the LTE wireless networks based on public-key cryptosystem
WO2017114123A1 (en) Key configuration method and key management center, and network element
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
JP2019502206A5 (en)
CN101917710A (en) Method, system and related device for mobile internet encryption communication
CN102891848B (en) Ipsec security alliance is utilized to be encrypted the method for deciphering
WO2015164999A1 (en) Virtual card downloading method, terminal and intermediate device
CN104468126B (en) A kind of safe communication system and method
CN101707767B (en) Data transmission method and devices
CN112671710B (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
CN105577365A (en) Key consultation method and device for user' access to WLAN
KR20180130203A (en) APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME
WO2014146609A1 (en) Information processing method, trust server and cloud server
CN102694753A (en) Gateway equipment capable of carrying out encryption transmission on data, system and method thereof
CN105142134A (en) Parameter obtaining and transmission methods/devices
CN103167494A (en) Information sending method and information sending system
US9356931B2 (en) Methods and apparatuses for secure end to end communication
CN102271330A (en) Terminal, network server and method for communication between terminal and network server
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
CN108882233B (en) IMSI encryption method, core network and user terminal
CN102045343A (en) DC (Digital Certificate) based communication encrypting safety method, server and system
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170908