CN111131204A - Information security transmission method and system - Google Patents
Information security transmission method and system Download PDFInfo
- Publication number
- CN111131204A CN111131204A CN201911277267.4A CN201911277267A CN111131204A CN 111131204 A CN111131204 A CN 111131204A CN 201911277267 A CN201911277267 A CN 201911277267A CN 111131204 A CN111131204 A CN 111131204A
- Authority
- CN
- China
- Prior art keywords
- key
- security gateway
- cloud service
- service platform
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method and a system for information security transmission, which belong to the technical field of communication security, and the method comprises the following steps: step S1, the cloud service platform generates a first key; step S2, storing the private key and sending the public key to the corresponding security gateway; step S3, writing the public key into the national password chip; step S4, generating a second key, and encrypting the second key by using the public key; step S5, transmitting the encrypted second key to a cloud service platform; step S6, obtaining and storing a second key through private key decryption; step S7, performing encryption and decryption operation through the second key; the system comprises: the device comprises a first receiving module, a generating module, a storage module, a first sending module, an encryption and decryption module, a second receiving module, a writing module and a second sending module; the beneficial effects are that: the encryption algorithm is independently controllable, the authority of the certification authority is guaranteed to be credible, the safety and the reliability of information transmission are improved, and the communication safety is guaranteed.
Description
Technical Field
The present invention relates to the field of communication security technologies, and in particular, to a method and a system for secure transmission of information.
Background
With the rapid development of the internet and the internet of things technology, smart homes have come to the fore, and connect various devices (such as audio and video devices, lighting systems, curtain control, air conditioner control, security systems, digital cinema systems, audio and video servers, video cabinet systems, network home appliances and the like) in homes through the internet of things technology, so as to provide multiple functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environment monitoring, heating and ventilation control, infrared forwarding, programmable timing control and the like. Compared with the common home, the intelligent home has the traditional living function, integrates the functions of building, network communication, information household appliance and equipment automation, provides an all-around information interaction function, and even saves funds for various energy expenses.
The intelligent home is characterized in that a house is used as a platform, facilities related to home life are integrated by utilizing a comprehensive wiring technology, a network communication technology, a safety precaution technology, an automatic control technology and an audio and video technology, and an efficient management system for house facilities and family schedule affairs is constructed; the home gateway is the core part of the intelligent home local area network, mainly completes the conversion and information sharing between various different communication protocols of the home internal network and the data exchange function between the home gateway and the external communication network, and is also responsible for the management and control of the home intelligent equipment. The home gateway internally adopts ZigBee, RF485/433/315MHz and other Internet of things protocols or WiFi for interconnection communication, and needs to remotely interact with the cloud server externally.
In the prior art, the smart home has the following technical defects in the aspect of communication security authentication: firstly, the communication between the home gateway and the cloud server adopts a plaintext mode, which can seriously threaten the safety of the smart home; secondly, a non-national-secret low-strength software encryption algorithm is adopted, so that the safety cannot be guaranteed, autonomous controllability is not realized, and the absence of a back door cannot be guaranteed; thirdly, the existing traditional encryption mode enables each terminal to only use one key or only select the key in a limited space, so that the key is easy to crack; and fourthly, each intelligent home manufacturer establishes an authentication system by itself, an authority is lacked to provide a reliable identity authentication service, and the user safety has to be completely dependent on the integrity of the manufacturer.
Disclosure of Invention
According to the problems in the prior art, a method and a system for information secure transmission are provided, wherein a communication process between a security gateway and a cloud service platform is encrypted by using a national cryptographic chip and a national cryptographic algorithm, and a secret key is updated according to a preset condition, so that the encryption algorithm is independent and controllable, a certification authority is authoritative and credible, the security and the reliability of information transmission are greatly improved, and the communication security between an intelligent home and the cloud service platform is ensured.
The technical scheme specifically comprises the following steps:
the information security transmission method is applied to an intelligent home system and is characterized in that the intelligent home system comprises a cloud service platform and a plurality of security gateways, the cloud service platform is remotely connected with the plurality of security gateways, a national password chip is arranged in each security gateway, and the information security transmission method comprises the following steps:
step S1, the cloud service platform generates a first key corresponding to the security gateway after receiving a predetermined signal of the security gateway, the first key comprises a public key and a private key, and the first key is generated according to an asymmetric cryptographic algorithm;
step S2, the cloud service platform saves the private key and sends the public key to the corresponding security gateway;
step S3, after receiving the public key, the security gateway writes the public key into the national password chip;
step S4, the national password chip generates a second key according to a symmetric cryptographic algorithm, and encrypts the second key by using the public key;
step S5, the security gateway transmits the encrypted second key to the cloud service platform;
step S6, the cloud service platform decrypts the encrypted second key through the private key, and obtains and stores the second key corresponding to the security gateway;
step S7, the cloud service platform and the security gateway perform encryption and decryption operations on the data to be transmitted through the second key.
Preferably, in step S3, after the public key is written into the cryptographic chip, the security gateway sends a write receipt to the cloud service platform.
Preferably, the symmetric cryptographic algorithm is a domestic cryptographic algorithm SM1 or SM4, among others.
Preferably, the asymmetric cryptographic algorithm is a domestic cryptographic algorithm SM 2.
Preferably, the predetermined signal is a first predetermined signal generated and sent by the security gateway at initialization time, or a second predetermined signal sent by the security gateway for indicating to update the first key.
Preferably, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
An intelligent home system, characterized in that the information security transmission method according to claim 1 is applied, wherein the cloud service platform comprises:
the first receiving module is used for receiving a predetermined signal sent by the security gateway;
the generating module is connected with the first receiving module and used for generating the first key according to the preset signal;
the storage module is connected with the generation module and used for storing the private key;
the first sending module is connected with the generating module and used for sending the public key to the corresponding security gateway;
the encryption and decryption module is connected with the storage module and is used for carrying out encryption and decryption operations on the transmitted data;
the security gateway includes:
a second receiving module, configured to receive the public key;
the writing module is connected with the second receiving module and the national secret chip and used for writing the public key into the national secret chip;
and the second sending module is connected with the national secret chip and used for sending the encrypted second secret key to the cloud service platform.
Preferably, the security gateway further includes a third sending module connected to the writing module, the writing module writes the public key into the cryptographic chip and then generates a written receipt, and the third sending module sends the written receipt to the cloud service platform.
Preferably, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
Preferably, the predetermined signal is a first predetermined signal generated and sent by the security gateway at initialization time, or a second predetermined signal sent by the security gateway for indicating to update the first key.
The beneficial effects of the above technical scheme are that:
the communication process of the security gateway and the cloud service platform is encrypted by utilizing the national cryptographic chip and the national cryptographic algorithm, and the secret key is updated according to the preset conditions, so that the autonomous controllability of the encryption algorithm is ensured, the authority of a certificate authority is credible, the safety and the reliability of information transmission are greatly improved, and the communication safety of the smart home and the cloud service platform is ensured.
Drawings
FIG. 1 is a flow chart of a method for secure transmission of information in accordance with a preferred embodiment of the present invention;
FIG. 2 is a schematic diagram of a secure information transfer system according to a preferred embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a cloud service platform based on FIG. 2 according to a preferred embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security gateway based on fig. 2 in a preferred embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention is further described with reference to the following drawings and specific examples, which are not intended to be limiting.
An information security transmission method is applied to an intelligent home system, as shown in fig. 1, wherein the intelligent home system includes a cloud service platform 1 and a plurality of security gateways 2, the cloud service platform 1 is remotely connected to the plurality of security gateways 2, a national security chip 22 is disposed in each security gateway 2, and the information security transmission method includes:
step S1, the cloud service platform 1 generates a first key corresponding to the security gateway 2 after receiving a predetermined signal of the security gateway 2, the first key comprises a public key and a private key, and the first key is generated according to an asymmetric cryptographic algorithm;
step S2, the cloud service platform 1 stores the private key and sends the public key to the corresponding security gateway 2;
step S3, after receiving the public key, the security gateway 2 writes the public key into the national password chip 22;
step S4, the cryptographic chip 22 generates a second key according to the symmetric cryptographic algorithm, and encrypts the second key using the public key;
step S5, the security gateway 2 transmits the encrypted second key to the cloud service platform 1;
step S6, the cloud service platform 1 decrypts the encrypted second key through the private key, obtains the second key corresponding to the security gateway 2 and stores the second key;
in step S7, the cloud service platform 1 and the security gateway 2 perform encryption and decryption operations on the data to be transmitted through the second key.
As a preferred implementation, the national cipher, i.e. the domestic cryptographic algorithm identified by the national cryptology authority, belongs to the commercial cipher, and the national cryptographic algorithm is a series of algorithms specified by the national cryptology authority, including a symmetric encryption algorithm, an elliptic curve asymmetric encryption algorithm and a hash algorithm. In the invention, a secure transmission system between the cloud service platform 1 and the plurality of security gateways 2 is constructed by adopting a national cryptographic algorithm.
Firstly, a national cryptographic chip 22 capable of supporting a national cryptographic algorithm is required to be pre-embedded in each security gateway 2, wherein the cloud service platform 1 is an open system, any security gateway 2 embedded with the national cryptographic chip 22 can be connected with the cloud service platform 1 through the internet, and various services provided by the cloud service platform 1 are used, specifically, the invention adopts an asymmetric cryptographic algorithm to encrypt a first key, and adopts a symmetric cryptographic algorithm to encrypt service data between the security gateway 2 and the cloud service platform 1.
In the process of information transmission between the cloud service platform 1 and the security gateway 2, the security gateway 2 firstly sends a predetermined signal to the cloud service platform 1, and after receiving the predetermined signal, the cloud service platform 1 generates a first key associated with the security gateway 2 according to an asymmetric cryptographic algorithm in a national cryptographic algorithm, wherein the first key exists in a form of a pair of a public key and a private key. Subsequently, the cloud service platform 1 stores the private key in the generated first key in the cloud service platform 1, and sends the public key in the first key to the security gateways 2 associated with the first key, and after the process is completed, each security gateway 2 corresponds to a pair of public and private keys.
After receiving the public key sent by the cloud service platform 1, the security gateway 2 writes the public key into the national key chip 22, then the national key chip 22 in the security gateway 2 generates a second key according to a symmetric cryptographic algorithm, encrypts the generated second key with the public key in the first key, transmits the encrypted second key to the cloud service platform 1 through the internet, after receiving the encrypted second key data, the cloud service platform 1 calls the private key of the first key stored in the cloud service platform 1 and associated with the security gateway 2, decrypts the encrypted second key data through the private key to obtain the second key, similarly, the second key is also associated with the corresponding security gateway 2, after the process is completed, the same second key exists in the cloud service platform 1 and the security gateway 2, when the subsequent cloud service platform 1 and the security gateway 2 perform service data interaction, and carrying out encryption and decryption operation by using the second key to safely transmit data.
In a preferred embodiment of the present invention, in step S3, after the public key is written into the cryptographic chip 22, the security gateway 2 sends a write receipt to the cloud service platform 1.
Specifically, in this embodiment, the cloud service platform 1 sends the public key in the corresponding first key to the security gateway 2 through the internet, the security gateway 2 writes the public key into the cryptographic chip 22 after receiving the public key, and generates a write-in receipt after writing, and sends the write-in receipt back to the cloud service platform 1 to confirm that the public key has been received and stored to the cloud service platform 1, and then, the encryption and decryption operations of the second key can be performed through the public key and the private key.
In a preferred embodiment of the present invention, the symmetric cryptographic algorithm is a domestic cryptographic algorithm SM1 or SM 4.
In a preferred embodiment of the present invention, the asymmetric cryptographic algorithm is the domestic cryptographic algorithm SM 2.
In a preferred embodiment of the present invention, the predetermined signal is a first predetermined signal generated and transmitted by the security gateway 2 at initialization, or a second predetermined signal transmitted by the security gateway 2 to indicate updating of the first key.
Specifically, in this embodiment, the predetermined signal has two types, one is that when the security gateway 2 is started and requests to perform authentication connection with the cloud service platform 1, the security gateway 2 sends an initialization signal to the cloud service platform 1, and the cloud service platform 1 starts to perform subsequent steps of generating and exchanging the first key and the second key after receiving the initialization signal. The second type is a first key updating instruction sent by the security gateway 2, the security gateway 2 regenerates the first key after receiving the first key updating instruction, and sends a public key in the first key to the security gateway 2, the security gateway 2 writes the public key into the national key chip 22 and then sends a write-in receipt to the cloud service platform 1, the cloud service platform 1 confirms that the updating of the first key is completed after receiving the write-in receipt, and the whole updating process of the first key is finished.
In a preferred embodiment of the present invention, the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
Specifically, in the present embodiment, the information secure transmission method supports both the form of one-time pad and the form of periodic key exchange, that is, allows the second key of the security gateway 2 to be exchanged after or before each traffic operation (e.g., data transmission), or sets the second key of the security gateway 2 to be exchanged after a predetermined time (e.g., 5 minutes) has elapsed. In a specific embodiment, after receiving an instruction that the cloud service platform 1 requests a new second key, the security gateway 2 sends an instruction (i.e., a key update triggering instruction) to generate the second key to the national cryptographic chip 22, the national cryptographic chip 22 calls the key generator located inside the chip to regenerate the second key, and encrypts the newly generated second key using the public key stored inside the national cryptographic chip 22, then the security gateway 2 sends the encrypted new second key to the cloud service platform 1, the cloud service platform 1 receives the encrypted data and decrypts the encrypted data by using the private key corresponding to the security gateway 2 to obtain the new second key and store the new second key, and subsequent service data interaction between the cloud service platform 1 and the security gateway 2 performs encryption and decryption operations using the new second key.
An information security transmission system, to which the above information security transmission method is applied, is shown in fig. 2, where the information security transmission system includes a cloud service platform 1 and a plurality of security gateways 2;
as shown in fig. 3, the cloud service platform 1 further includes:
a first receiving module 10, configured to receive a predetermined signal sent by the security gateway 2;
a generating module 11, connected to the first receiving module 10, for generating a first key according to a predetermined signal;
the storage module 12 is connected with the generation module 11 and used for storing the private key;
the first sending module 13 is connected to the generating module 11 and is used for sending the public key to the corresponding security gateway 2;
the encryption and decryption module 14 is connected with the storage module 12 and is used for carrying out encryption and decryption operations on the transmitted data;
as shown in fig. 4, the security gateway 2 further includes:
a second receiving module 20, configured to receive a public key;
the writing module 21 is connected with the second receiving module 20 and the national cryptographic chip 22 and is used for writing the public key into the national cryptographic chip 22;
the second sending module 23 is connected to the cryptographic chip 22, and is configured to send the encrypted second key to the cloud service platform 1.
As a preferred embodiment, the information security transmission system is disposed in an intelligent home system, wherein the first receiving module 10 and the first sending module 13 are further configured to receive and send encrypted service data transmitted between the cloud service platform 1 and the security gateway 2, respectively, in this case, the encryption/decryption module 14 is connected to the first receiving module 10 and the first sending module 13 at the same time and is configured to perform encryption/decryption operation on the transmitted service data, and similarly, the second sending module 23 and the second receiving module 20 are also configured to receive and send encrypted service data transmitted between the cloud service platform 1 and the security gateway 2 at the same time, in this case, the cryptographic chip 22 is connected to the second sending module 23 and the second receiving module 20 at the same time.
In a preferred embodiment of the present invention, the security gateway 2 further includes a third sending module 24, which is connected to the writing module 21, the writing module 21 writes the public key into the cryptographic chip 22 to generate a written receipt, and the third sending module 24 sends the written receipt to the cloud service platform 1.
Specifically, in this embodiment, the third sending module 24 and the second sending module 23 may be separately configured, and in another embodiment of the present invention, the third sending module 24 and the second sending module 23 are integrated into the same sending functional unit.
In a preferred embodiment of the present invention, the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
In a preferred embodiment of the present invention, the predetermined signal is a first predetermined signal generated and transmitted by the security gateway 2 at initialization, or a second predetermined signal transmitted by the security gateway 2 to indicate updating of the first key.
The beneficial effects of the above technical scheme are that:
the communication process of the security gateway and the cloud service platform is encrypted by utilizing the national cryptographic chip and the national cryptographic algorithm, and the secret key is updated according to the preset conditions, so that the autonomous controllability of the encryption algorithm is ensured, the authority of a certificate authority is credible, the safety and the reliability of information transmission are greatly improved, and the communication safety of the smart home and the cloud service platform is ensured.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
Claims (10)
1. The information security transmission method is applied to an intelligent home system and is characterized in that the intelligent home system comprises a cloud service platform and a plurality of security gateways, the cloud service platform is remotely connected with the plurality of security gateways, a national password chip is arranged in each security gateway, and the information security transmission method comprises the following steps:
step S1, the cloud service platform generates a first key corresponding to the security gateway after receiving a predetermined signal of the security gateway, the first key comprises a public key and a private key, and the first key is generated according to an asymmetric cryptographic algorithm;
step S2, the cloud service platform saves the private key and sends the public key to the corresponding security gateway;
step S3, after receiving the public key, the security gateway writes the public key into the national password chip;
step S4, the national password chip generates a second key according to a symmetric cryptographic algorithm, and encrypts the second key by using the public key;
step S5, the security gateway transmits the encrypted second key to the cloud service platform;
step S6, the cloud service platform decrypts the encrypted second key through the private key, and obtains and stores the second key corresponding to the security gateway;
step S7, the cloud service platform and the security gateway perform encryption and decryption operations on the data to be transmitted through the second key.
2. The method according to claim 1, wherein in step S3, after the public key is written into the cryptographic chip, the security gateway sends a write receipt to the cloud service platform.
3. The method for securely transmitting information according to claim 1, wherein the symmetric cryptographic algorithm is a domestic cryptographic algorithm SM1 or SM 4.
4. The method for securely transmitting information according to claim 1, wherein the asymmetric cryptographic algorithm is a domestic cryptographic algorithm SM 2.
5. The method for securely transmitting information according to claim 1, wherein the predetermined signal is a first predetermined signal generated and transmitted by the security gateway at initialization time, or a second predetermined signal transmitted by the security gateway and used for indicating updating of the first key.
6. The method for securely transmitting information according to claim 1, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
7. An information security transmission system, characterized in that the information security transmission method according to claim 1 is applied, wherein the information security transmission system comprises the cloud service platform and the plurality of security gateways;
the cloud service platform further comprises:
the first receiving module is used for receiving a predetermined signal sent by the security gateway;
the generating module is connected with the first receiving module and used for generating the first key according to the preset signal;
the storage module is connected with the generation module and used for storing the private key;
the first sending module is connected with the generating module and used for sending the public key to the corresponding security gateway;
the encryption and decryption module is connected with the storage module and is used for carrying out encryption and decryption operations on the transmitted data;
the security gateway further comprises:
a second receiving module, configured to receive the public key;
the writing module is connected with the second receiving module and the national secret chip and is used for writing the public key into the national secret chip;
and the second sending module is connected with the national secret chip and used for sending the encrypted second secret key to the cloud service platform.
8. The system according to claim 7, wherein the security gateway further includes a third sending module, connected to the writing module, the writing module writes the public key into the cryptographic chip to generate a written receipt, and the third sending module sends the written receipt to the cloud service platform.
9. The system according to claim 7, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
10. The system for securely transferring information according to claim 7, wherein the predetermined signal is a first predetermined signal generated and transmitted by the security gateway at initialization or a second predetermined signal transmitted by the security gateway for indicating updating of the first key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911277267.4A CN111131204A (en) | 2019-12-12 | 2019-12-12 | Information security transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911277267.4A CN111131204A (en) | 2019-12-12 | 2019-12-12 | Information security transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111131204A true CN111131204A (en) | 2020-05-08 |
Family
ID=70498549
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911277267.4A Pending CN111131204A (en) | 2019-12-12 | 2019-12-12 | Information security transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111131204A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333699A (en) * | 2020-11-03 | 2021-02-05 | 山东正中信息技术股份有限公司 | Internet of things communication protocol encryption method, equipment and storage medium |
CN112688945A (en) * | 2020-12-24 | 2021-04-20 | 联通物联网有限责任公司 | Transmission method and transmission system for terminal data of Internet of things |
CN114598482A (en) * | 2020-11-20 | 2022-06-07 | 福州数据技术研究院有限公司 | Encryption communication method and system for server and intelligent edge gateway |
CN114938304A (en) * | 2022-05-23 | 2022-08-23 | 贵州大学 | Method and system for safely transmitting data of industrial Internet of things |
CN116436710A (en) * | 2023-06-15 | 2023-07-14 | 烟台岸基网络科技有限公司 | Remote operation system for operation of port bridge type loading and unloading equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049401A (en) * | 2015-03-19 | 2015-11-11 | 浙江大学 | Secure communication method based on intelligent vehicle |
CN204759556U (en) * | 2015-07-09 | 2015-11-11 | 陕西昌大科技有限公司 | Access control ware |
CN108173822A (en) * | 2017-12-18 | 2018-06-15 | 惠州Tcl家电集团有限公司 | Intelligent door lock management-control method, intelligent door lock and computer readable storage medium |
CN109816831A (en) * | 2019-01-31 | 2019-05-28 | 公安部第三研究所 | A kind of authentication method and system of the smart lock based on national secret algorithm |
-
2019
- 2019-12-12 CN CN201911277267.4A patent/CN111131204A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049401A (en) * | 2015-03-19 | 2015-11-11 | 浙江大学 | Secure communication method based on intelligent vehicle |
CN204759556U (en) * | 2015-07-09 | 2015-11-11 | 陕西昌大科技有限公司 | Access control ware |
CN108173822A (en) * | 2017-12-18 | 2018-06-15 | 惠州Tcl家电集团有限公司 | Intelligent door lock management-control method, intelligent door lock and computer readable storage medium |
CN109816831A (en) * | 2019-01-31 | 2019-05-28 | 公安部第三研究所 | A kind of authentication method and system of the smart lock based on national secret algorithm |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112333699A (en) * | 2020-11-03 | 2021-02-05 | 山东正中信息技术股份有限公司 | Internet of things communication protocol encryption method, equipment and storage medium |
CN114598482A (en) * | 2020-11-20 | 2022-06-07 | 福州数据技术研究院有限公司 | Encryption communication method and system for server and intelligent edge gateway |
CN112688945A (en) * | 2020-12-24 | 2021-04-20 | 联通物联网有限责任公司 | Transmission method and transmission system for terminal data of Internet of things |
CN114938304A (en) * | 2022-05-23 | 2022-08-23 | 贵州大学 | Method and system for safely transmitting data of industrial Internet of things |
CN116436710A (en) * | 2023-06-15 | 2023-07-14 | 烟台岸基网络科技有限公司 | Remote operation system for operation of port bridge type loading and unloading equipment |
CN116436710B (en) * | 2023-06-15 | 2023-08-29 | 烟台岸基网络科技有限公司 | Remote operation system for operation of port bridge type loading and unloading equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111131204A (en) | Information security transmission method and system | |
CN104813685B (en) | The subscription informing mechanism of synchronization for distributions | |
US20200259667A1 (en) | Distributed management system for remote devices and methods thereof | |
EP1384346B1 (en) | Method for providing security on a powerline-modem network | |
CN107683601A (en) | Relay services for the communication between controller and annex | |
CN105580310A (en) | Security management method and security management device in home network system | |
JP2005520466A (en) | Home terminal device and communication system | |
CN109005185A (en) | Promote the multilayer authentication method communicated between intelligent home equipment and server based on cloud | |
CN103685323A (en) | Method for realizing intelligent home security networking based on intelligent cloud television gateway | |
CA2812906A1 (en) | Utility device management | |
KR20040012824A (en) | Electronic device control apparatus | |
CN107094138A (en) | A kind of smart home safe communication system and communication means | |
US20210111909A1 (en) | Fluid meter communicating with an electromechanical valve | |
CN110716441A (en) | Method for controlling intelligent equipment, intelligent home system, equipment and medium | |
CN112053477B (en) | Control system, method and device of intelligent door lock and readable storage medium | |
CN112019552B (en) | Internet of things secure communication method | |
CN112512064B (en) | Wireless distribution network method, wireless gateway and equipment to be accessed | |
KR100970318B1 (en) | Secrete key setting method of integrated?meter reading service based on power line?communication | |
KR20090002328A (en) | Method for joining new device in wireless sensor network | |
CN106936841B (en) | Safety protecting method and system in smart home | |
CN114640691A (en) | Equipment connection method and system and corresponding Internet of things equipment | |
CN101937584A (en) | Method for generating passwords of access control system | |
CN111143892A (en) | Data storage method and device based on block chain | |
CN112507301B (en) | Internet of things equipment control method, device, equipment and storage medium | |
CN104363219B (en) | A kind of three parts cipher key management method based on IEC62056 data transmission security standards |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |