CN109361753A - A kind of Internet of things system framework and encryption method - Google Patents
A kind of Internet of things system framework and encryption method Download PDFInfo
- Publication number
- CN109361753A CN109361753A CN201811301454.7A CN201811301454A CN109361753A CN 109361753 A CN109361753 A CN 109361753A CN 201811301454 A CN201811301454 A CN 201811301454A CN 109361753 A CN109361753 A CN 109361753A
- Authority
- CN
- China
- Prior art keywords
- certificate
- internet
- cluster
- equipment
- iot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Abstract
The invention discloses a kind of Internet of things system framework and encryption methods, load balancing connect software or hardware service for guaranteeing large-scale equipment access with internet of things equipment, Mqtt broker cluster connect the Mqtt connection for IOT service cluster and load balancing with load balancer, IOT service cluster and Mqtt broker cluster are connected to control centre, service database is connect with Mqtt broker cluster and IOT service cluster for recording portal/API Access Permissions, internet of things equipment essential information, subscription or publication permission of the internet of things equipment in Mqtt broker, IOT portal/api interface is connect with IOT service cluster for equipment, rule, data, log is managed, cert services cluster and IOT Service cluster connects for realizing certificate authority, certificate management and certificate sign test function.A machine one of the invention is close, highly-safe.
Description
Technical field
The present invention relates to a kind of system architecture and encryption method, especially a kind of Internet of things system framework and encryption method.
Background technique
It makes the transition, under the overall background of intelligence manufacture in digitlization, Internet of Things website is in the air port in epoch.Chip, sensor, mould
The entire industrial chain such as group, network, platform, terminal device, the system integration, application service constantly expands.It is illustrated in figure 4 typical
Based on cloud platform Internet of things system framework, Internet of Things cloud platform has the function such as equipment access, equipment management, data processing and forwarding
Can, it is each link participant hotly contested spot, the giants such as Amazon, Microsoft, Ali, Baidu as the core of whole system
Company releases the platform of internet of things of oneself one after another.
Compared with internet, Internet of Things increases sensing layer, and numerous internet of things equipment is brought just to people's lives
While sharp, how to guarantee the safety of equipment access also at the unavoidable problem of platform of internet of things.Each major company has
The scheme of oneself, such as Ali's cloud Iot (Internet of thing) external member pass through unidirectional TLS (Transport Layer
Security) connection ensures communication safety, and passes through Mqtt (Message Queuing Telemetry Transport) agreement
Username/password (being generated by backstage by certain rule, be burnt to equipment after generation) carries out authentication, this side
Method uses unidirectional TLS connection, and security level is lower, and equipment burning is relatively complicated;Amazon, which then passes through two-way TLS connection, to be protected
Equipment access safety is demonstrate,proved, but has no equipment identities authentication mechanism, however it remains security risk.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of Internet of things system framework and encryption methods, improve safety
Property.
In order to solve the above technical problems, the technical scheme adopted by the invention is that:
A kind of Internet of things system framework, it is characterised in that: include load balancing, Mqtt broker cluster, IOT services set
Group, service database, IOT portal/api interface and cert services cluster, load balancing are connect with internet of things equipment for guaranteeing
The software of large-scale equipment access or hardware service, Mqtt broker cluster are connect for realizing IOT service with load balancer
Cluster is connected with equipment by the Mqtt of load balancing, and IOT service cluster and Mqtt broker cluster are connected to service logic
Control centre, service database are connect for recording portal/API Access power with Mqtt broker cluster and IOT service cluster
The subscription or publication permission of limit, internet of things equipment essential information, internet of things equipment in Mqtt broker, IOT portal/api interface
It is connect with IOT service cluster for being managed to equipment, rule, data, log, cert services cluster and IOT service cluster
Connection is for realizing certificate authority, certificate management and certificate sign test function.
Further, the software of the load balancing includes Haproxy and LVS, and the hardware of load balancing is loaded comprising F5
Balanced device.
Further, the Iot service cluster receives internet of things equipment number by subscribing to the publication Topic of internet of things equipment
According to internet of things equipment receives the data of Iot service cluster by subscribing to the publication Topic of Iot service cluster.
Further, the software of the Mqtt broker cluster includes Emqtt and HiveMQ.
Further, the IOT service cluster is integrated with equipment management, regulation engine and journal function.
Further, the IOT portal/api interface includes creation/sweep equipment/rule, and checks journalizing.
Further, the certificate authority is to generate valid certificate based on certificate request, and certificate management is checked comprising certificate
And abolishment, certificate sign test are whether verifying certificate is effective.
A kind of encryption method of Internet of things system framework described in claim 1- wantonly 7 one, it is characterised in that comprising with
Lower step:
Step 1: user is internet of things equipment creation certification permission by IOT portal/api interface, registers device id, the ID
It is stored in service database;
Step 2: download system root certificate, activation certificate and activation key are simultaneously burnt to internet of things equipment, wherein activation card
Book and activation key the whole network are unified, can only be used to activation equipment;
Step 3: internet of things equipment is established two-way TLS with IOT service cluster and is connect using activation certificate and activation key,
By checking that the Subject CN of device certificate confirms that the equipment is connected using activation certificate, which only has IOT service cluster
Permission is issued in the subscription of standby activation correlation Topic;
Step 4: internet of things equipment locally generates the private key and certificate request for meeting PKCS standard, and wherein private key is locally protected
It deposits, the domain Subject CN of certificate request is set as the ID of the equipment, and IOT service cluster is determined according to the Subject CN of certificate
The permission of equipment;
Step 5: the certificate request that internet of things equipment is generated using device id and locally is activated to Mqttbroker cluster
The activation application of Topic sending device;
Step 6:IOT service cluster is subscribed to and receiving device activation application, and the effective certificate request of ID will be activated to be sent to
Cert services cluster application signature;
Step 7: cert services cluster is completed to sign using system root certificate to certificate request, generates effective device certificate
It is sent to IOT service cluster, IOT service cluster sends Internet of Things for certificate by Mqttbroker cluster and load balancing and sets
It is standby;
Step 8: Physical Network equipment sends activation success message to IOT service cluster after receiving certificate and disconnects two-way
TLS connection;
Step 9: internet of things equipment establishes new pair using root certificate, device certificate and device keys and IOT service cluster
To TLS connection, internet of things equipment only has the subscription/publication permission of sign test Topic at this time;
Step 10: internet of things equipment sends cert services cluster for device certificate abstract and carries out sign test, after sign test success
IOT service cluster is in the subscription/publication permission of database update internet of things equipment, and internet of things equipment can be ordered normally at this time
It reads/issues.
Further, whether it is specially to have to recognize to the querying service database equipment that ID is activated in the step 6 effectively
Demonstrate,prove permission.
Further, the certificate in the step 1-10 is the certificate for meeting X509 specification.
Compared with prior art, the present invention having the following advantages that and effect:
1, activate certificate and activation key only a set of for all devices, facilitating equipment end programming, (device id can be with
It is the information of equipment itself, such as MAC Address, is not necessarily to programming);
2, activation process is protected by two-way TLS, and safety is secure;
3, it is close that a machine one has been truly realized in equipment normal course of communications;It is kept away by way of preset activation certificates/keys
Exempt from the device certificate/key different for each equipment programming, facilitates equipment production flow;
4, device keys are locally generated by equipment, other Anywhere without copy, prevent what device keys batch was lost
Possibility;Device keys are that equipment locally generates, and will not be ensured in the mode that transmission over networks, device certificate are issued online each
A equipment is all that a machine one is close.
5, device id is preserved in device certificate, platform can confirm the connection, subscription, publication permission of equipment by certificate
Equipment subscription/publication, permission and certificate information are bound, and safety is higher.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of Internet of things system framework of the invention.
Fig. 2 is the activation process schematic diagram of encryption method of the invention.
Fig. 3 is the identifying procedure schematic diagram of encryption method of the invention.
Fig. 4 is the typical schematic diagram based on cloud platform Internet of things system framework of the prior art.
Specific embodiment
Below by specific embodiment, the present invention is described further, and following embodiment is explanation of the invention
And the invention is not limited to following embodiments.
As shown in Figure 1, a kind of Internet of things system framework of the invention, includes load balancing, Mqtt broker cluster, IOT
Service cluster, service database, IOT portal/api interface and cert services cluster.
Load balancing is connect with internet of things equipment, for guaranteeing software or the hardware service of large-scale equipment access.Load
Balanced software includes Haproxy, LVS etc., and the typical hardware of load balancing is F5 load balancer.
Mqtt broker cluster is connect with load balancer passes through load balancing for receiving IOT service cluster and equipment
Mqtt connection.Mqtt broker is the server of message queue telemetering transmission, and IOT service cluster may be implemented and equipment is logical
The Mqtt connection of overload equilibrium, Iot service by subscribe to (Mqtt term, Subscribe) equipment publication (Mqtt term,
Publish) Topic receiving device data, equipment receive the data of Iot by subscribing to the publication Topic of Iot service, typically
Software has Emqtt, HiveMQ etc..
IOT service cluster and Mqtt broker cluster are connected to service logic control centre, be integrated with equipment management,
The functions such as regulation engine, log.
Service database connect with Mqtt broker cluster and IOT service cluster for record portal/API Access Permissions,
Internet of things equipment essential information, internet of things equipment are in the subscription of Mqtt broker or publication permission etc..
IOT portal/api interface is connect for being managed to equipment, rule, data, log with IOT service cluster, is used
Family can be managed equipment, rule, data, log by portal or API, be typically include creation/sweep equipment/rule
Then, check that log etc. operates.
Cert services cluster is connect for realizing certificate authority, certificate management and certificate sign test function with IOT service cluster.
Certificate authority is that valid certificate is generated based on certificate request, and certificate management includes that certificate is checked and abolished, and certificate sign test is verifying
Whether certificate is effective.
A kind of encryption method of Internet of things system framework comprising the steps of:
Step 1: user is internet of things equipment creation certification permission by IOT portal/api interface, registers device id, the ID
It is stored in service database;
Step 2: download system root certificate, activation certificate and activation key are simultaneously burnt to internet of things equipment, wherein activation card
Book and activation key the whole network are unified, can only be used to activation equipment;
Step 3: internet of things equipment is established two-way TLS with IOT service cluster and is connect using activation certificate and activation key,
By checking that the Subject CN of device certificate confirms that the equipment is connected using activation certificate, which only has IOT service cluster
Permission is issued in the subscription of standby activation correlation Topic;
Step 4: internet of things equipment locally generates the private key and certificate request for meeting PKCS standard, and wherein private key is locally protected
It deposits, the domain Subject CN of certificate request is set as the ID of the equipment, and IOT service cluster is determined according to the Subject CN of certificate
The permission of equipment;
Step 5: the certificate request that internet of things equipment is generated using device id and locally is activated to Mqttbroker cluster
The activation application of Topic sending device;
Step 6:IOT service cluster is subscribed to and receiving device activation application, by activation ID effectively (to querying service database
Whether the equipment has certification permission) certificate request be sent to cert services cluster application signature;
Step 7: cert services cluster is completed to sign using system root certificate to certificate request, generates effective device certificate
It is sent to IOT service cluster, IOT service cluster sends Internet of Things for certificate by Mqttbroker cluster and load balancing and sets
It is standby;
Step 8: Physical Network equipment sends activation success message to IOT service cluster after receiving certificate and disconnects two-way
TLS connection;
Step 9: internet of things equipment uses root certificate, device certificate (certificate that step 7 receives) and device keys (step
4 keys locally generated) it is connect with the two-way TLS of IOT service cluster foundation newly, internet of things equipment only has sign test at this time
The subscription/publication permission of Topic;
Step 10: internet of things equipment sends cert services cluster for device certificate abstract and carries out sign test, after sign test success
IOT service cluster is in the subscription/publication permission of database update internet of things equipment, and internet of things equipment can be ordered normally at this time
It reads/issues.
Certificate in step 1-10 is the certificate for meeting X509 specification.
Wherein, step 1- step 8 is activation process, and activation process only occurs once in the life cycle of equipment, equipment end
Device private need to be kept properly, if device private is accidentally lost, equipment will be unable to network, and activation process is as shown in Figure 2.
Step 9-10 is identifying procedure, and every secondary device all needs to undergo primary certification back into net, to confirm that device certificate is held
Continuous to come into force, identifying procedure is as shown in Figure 3.
Above content is only illustrations made for the present invention described in this specification.Technology belonging to the present invention
The technical staff in field can make various modifications or additions to the described embodiments or by a similar method
Substitution, content without departing from description of the invention or beyond the scope defined by this claim should belong to this
The protection scope of invention.
Claims (10)
1. a kind of Internet of things system framework, it is characterised in that: comprising load balancing, Mqtt broker cluster, IOT service cluster,
Service database, IOT portal/api interface and cert services cluster, load balancing are connect for guaranteeing to advise greatly with internet of things equipment
The software or hardware service, Mqtt broker cluster of mould equipment access are connect for realizing IOT service cluster with load balancer
It is connected with equipment by the Mqtt of load balancing, IOT service cluster and Mqtt broker cluster are connected to service logic control
Center, service database are connect with Mqtt broker cluster and IOT service cluster for recording portal/API Access Permissions, object
The subscription or publication permission, IOT portal/api interface and IOT of networked devices essential information, internet of things equipment in Mqtt broker
Service cluster is connected for being managed to equipment, rule, data, log, and cert services cluster connect use with IOT service cluster
In realization certificate authority, certificate management and certificate sign test function.
2. a kind of Internet of things system framework described in accordance with the claim 1, it is characterised in that: the software of the load balancing includes
Haproxy and LVS, the hardware of load balancing include F5 load balancer.
3. a kind of Internet of things system framework described in accordance with the claim 1, it is characterised in that: the Iot service cluster is by ordering
The publication Topic for readding internet of things equipment receives internet of things equipment data, the publication that internet of things equipment passes through subscription Iot service cluster
The data of Topic reception Iot service cluster.
4. a kind of Internet of things system framework described in accordance with the claim 1, it is characterised in that: the Mqtt broker cluster
Software includes Emqtt and HiveMQ.
5. a kind of Internet of things system framework described in accordance with the claim 1, it is characterised in that: the IOT service cluster is integrated with
Equipment management, regulation engine and journal function.
6. a kind of Internet of things system framework described in accordance with the claim 1, it is characterised in that: the IOT portal/api interface packet
Creation/sweep equipment/rule is included, and checks journalizing.
7. a kind of Internet of things system framework described in accordance with the claim 1, it is characterised in that: the certificate authority is based on certificate
Request generates valid certificate, and certificate management includes that certificate is checked and abolished, and certificate sign test is whether verifying certificate is effective.
8. the encryption method of Internet of things system framework described in a kind of claim 1- wantonly 7 one, it is characterised in that comprising following
Step:
Step 1: user is internet of things equipment creation certification permission by IOT portal/api interface, registers device id, which saves
In service database;
Step 2: download system root certificate, activation certificate and activation key simultaneously be burnt to internet of things equipment, wherein activation certificate and
Activation key the whole network is unified, can only be used to activation equipment;
Step 3: internet of things equipment is established two-way TLS with IOT service cluster and is connect using activation certificate and activation key, IOT clothes
For business cluster by checking that the Subject CN of device certificate confirms that the equipment is connected using activation certificate, which only has activation
Permission is issued in the subscription of related Topic;
Step 4: internet of things equipment locally generates the private key and certificate request for meeting PKCS standard, and wherein private key locally saves, card
The domain Subject CN of book application is set as the ID of the equipment, and IOT service cluster determines equipment according to the Subject CN of certificate
Permission;
Step 5: the certificate request that internet of things equipment is generated using device id and locally activates Topic to Mqtt broker cluster
Sending device activation application;
Step 6:IOT service cluster is subscribed to and receiving device activation application, and the effective certificate request of ID will be activated to be sent to certificate
Service cluster application signature;
Step 7: cert services cluster is completed to sign using system root certificate to certificate request, generates effective device certificate and sends
To IOT service cluster, IOT service cluster sends internet of things equipment for certificate by Mqtt broker cluster and load balancing;
Step 8: Physical Network equipment, which sends activation success message to IOT service cluster after receiving certificate and disconnects two-way TLS, to be connected
It connects;
Step 9: internet of things equipment establishes new two-way TLS using root certificate, device certificate and device keys and IOT service cluster
Connection, internet of things equipment only has the subscription/publication permission of sign test Topic at this time;
Step 10: internet of things equipment sends cert services cluster for device certificate abstract and carries out sign test, and IOT takes after sign test success
Cluster be engaged in the subscription/publication permission of database update internet of things equipment, internet of things equipment can be subscribed to normally/be sent out at this time
Cloth.
9. encryption method according to claim 8, it is characterised in that: activating ID in the step 6 effectively is specially to industry
Whether business data base querying equipment has certification permission.
10. encryption method according to claim 8, it is characterised in that: the certificate in the step 1-10 is to meet
The certificate of X509 specification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811301454.7A CN109361753A (en) | 2018-11-02 | 2018-11-02 | A kind of Internet of things system framework and encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811301454.7A CN109361753A (en) | 2018-11-02 | 2018-11-02 | A kind of Internet of things system framework and encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109361753A true CN109361753A (en) | 2019-02-19 |
Family
ID=65344052
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811301454.7A Pending CN109361753A (en) | 2018-11-02 | 2018-11-02 | A kind of Internet of things system framework and encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109361753A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149378A (en) * | 2019-04-30 | 2019-08-20 | 冶金自动化研究设计院 | A kind of people's air defense data server cluster based on WLC algorithm |
CN111405021A (en) * | 2020-03-10 | 2020-07-10 | 中国建设银行股份有限公司 | Data transmission method, device, equipment and storage medium of peer-to-peer node |
CN111641587A (en) * | 2020-04-27 | 2020-09-08 | 河南省云安大数据安全防护产业技术研究院有限公司 | Internet of things equipment interconnection method and device |
CN113965399A (en) * | 2021-10-29 | 2022-01-21 | 重庆忽米网络科技有限公司 | Internet of things equipment data transmission method based on MQTT protocol |
CN114338037A (en) * | 2021-12-27 | 2022-04-12 | 浪潮云信息技术股份公司 | Method and device for dynamically generating certificate by MQTT service component |
CN114567650A (en) * | 2021-12-29 | 2022-05-31 | 西安天和防务技术股份有限公司 | Data processing method and Internet of things platform system |
CN114666131A (en) * | 2022-03-22 | 2022-06-24 | 阿里巴巴(中国)有限公司 | Certificate management system, certificate management method and certificate management system construction method |
CN114826710A (en) * | 2022-04-15 | 2022-07-29 | 杭州指令集智能科技有限公司 | MQTT-based Internet of things operating system and method |
CN116668201A (en) * | 2023-07-31 | 2023-08-29 | 北京小米移动软件有限公司 | System for allocating production resources, transmission method and equipment for production resources |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160065653A1 (en) * | 2014-08-26 | 2016-03-03 | Fujitsu Limited | Internet of things (iot) device configuration construction |
CN108055306A (en) * | 2017-12-06 | 2018-05-18 | 深圳市智物联网络有限公司 | Data processing method, relevant device and system in a kind of Internet of Things |
CN108696553A (en) * | 2017-04-06 | 2018-10-23 | 北京算云联科科技有限公司 | A kind of Internet of Things network control system based on mixed cloud |
-
2018
- 2018-11-02 CN CN201811301454.7A patent/CN109361753A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160065653A1 (en) * | 2014-08-26 | 2016-03-03 | Fujitsu Limited | Internet of things (iot) device configuration construction |
CN108696553A (en) * | 2017-04-06 | 2018-10-23 | 北京算云联科科技有限公司 | A kind of Internet of Things network control system based on mixed cloud |
CN108055306A (en) * | 2017-12-06 | 2018-05-18 | 深圳市智物联网络有限公司 | Data processing method, relevant device and system in a kind of Internet of Things |
Non-Patent Citations (3)
Title |
---|
IT_MONKEY_ALI: ""物联网云平台系统设计"", 《CSDN》 * |
SIJIGANG: ""工业物联网的云端协议将以MQTT+SSL/TLS为主,协议格式以JSON为主"", 《CSDN》 * |
马智: ""国内物联网平台(2)—阿里云物联网套件"", 《博客园》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110149378A (en) * | 2019-04-30 | 2019-08-20 | 冶金自动化研究设计院 | A kind of people's air defense data server cluster based on WLC algorithm |
CN111405021A (en) * | 2020-03-10 | 2020-07-10 | 中国建设银行股份有限公司 | Data transmission method, device, equipment and storage medium of peer-to-peer node |
CN111641587A (en) * | 2020-04-27 | 2020-09-08 | 河南省云安大数据安全防护产业技术研究院有限公司 | Internet of things equipment interconnection method and device |
CN113965399A (en) * | 2021-10-29 | 2022-01-21 | 重庆忽米网络科技有限公司 | Internet of things equipment data transmission method based on MQTT protocol |
CN114338037A (en) * | 2021-12-27 | 2022-04-12 | 浪潮云信息技术股份公司 | Method and device for dynamically generating certificate by MQTT service component |
CN114567650A (en) * | 2021-12-29 | 2022-05-31 | 西安天和防务技术股份有限公司 | Data processing method and Internet of things platform system |
CN114666131A (en) * | 2022-03-22 | 2022-06-24 | 阿里巴巴(中国)有限公司 | Certificate management system, certificate management method and certificate management system construction method |
CN114826710A (en) * | 2022-04-15 | 2022-07-29 | 杭州指令集智能科技有限公司 | MQTT-based Internet of things operating system and method |
CN114826710B (en) * | 2022-04-15 | 2023-09-26 | 杭州指令集智能科技有限公司 | Internet of Things operating system and method based on MQTT |
CN116668201A (en) * | 2023-07-31 | 2023-08-29 | 北京小米移动软件有限公司 | System for allocating production resources, transmission method and equipment for production resources |
CN116668201B (en) * | 2023-07-31 | 2023-10-20 | 北京小米移动软件有限公司 | System for allocating production resources, transmission method and equipment for production resources |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109361753A (en) | A kind of Internet of things system framework and encryption method | |
US11470086B2 (en) | Systems and methods for organizing devices in a policy hierarchy | |
US8621206B2 (en) | Authority-neutral certification for multiple-authority PKI environments | |
CN101873331B (en) | Safety authentication method and system | |
CN104054321B (en) | For the safety management of cloud service | |
CN108667612A (en) | A kind of trust service framework and method based on block chain | |
CN104954330B (en) | A kind of methods, devices and systems to be conducted interviews to data resource | |
CN105681470B (en) | Communication means, server based on hypertext transfer protocol, terminal | |
CN106453361B (en) | A kind of security protection method and system of the network information | |
KR20060100920A (en) | Trusted third party authentication for web services | |
CN105577639B (en) | Authentic device control message | |
CN112686668A (en) | Alliance chain cross-chain system and method | |
CN104767731A (en) | Identity authentication protection method of Restful mobile transaction system | |
CN106341428A (en) | Cross-domain access control method and system | |
CN108881309A (en) | Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform | |
CN110267270A (en) | A kind of substation's inner sensor terminal access Border Gateway authentication intelligence contract | |
CN110351258A (en) | A kind of distributed electronic mailbox system based on no coin block chain technology | |
CN109150800A (en) | Login access method, system and storage medium | |
CN103179099A (en) | Unified certification method for accessing to open website platforms and website platform | |
CN106713236A (en) | End-to-end identity authentication and encryption method based on CPK identifier authentication | |
CN103546290B (en) | Third Party Authentication system or method with user group | |
Dong et al. | Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT | |
CN107347073B (en) | A kind of resource information processing method | |
CN113901432A (en) | Block chain identity authentication method, equipment, storage medium and computer program product | |
CN112653664A (en) | High-safety and reliable data exchange system and method between networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |