CN111131204A - Information security transmission method and system - Google Patents

Information security transmission method and system Download PDF

Info

Publication number
CN111131204A
CN111131204A CN201911277267.4A CN201911277267A CN111131204A CN 111131204 A CN111131204 A CN 111131204A CN 201911277267 A CN201911277267 A CN 201911277267A CN 111131204 A CN111131204 A CN 111131204A
Authority
CN
China
Prior art keywords
key
security gateway
cloud service
service platform
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911277267.4A
Other languages
Chinese (zh)
Inventor
吴治平
顾荣杰
肖容
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN201911277267.4A priority Critical patent/CN111131204A/en
Publication of CN111131204A publication Critical patent/CN111131204A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and a system for information security transmission, which belong to the technical field of communication security, and the method comprises the following steps: step S1, the cloud service platform generates a first key; step S2, storing the private key and sending the public key to the corresponding security gateway; step S3, writing the public key into the national password chip; step S4, generating a second key, and encrypting the second key by using the public key; step S5, transmitting the encrypted second key to a cloud service platform; step S6, obtaining and storing a second key through private key decryption; step S7, performing encryption and decryption operation through the second key; the system comprises: the device comprises a first receiving module, a generating module, a storage module, a first sending module, an encryption and decryption module, a second receiving module, a writing module and a second sending module; the beneficial effects are that: the encryption algorithm is independently controllable, the authority of the certification authority is guaranteed to be credible, the safety and the reliability of information transmission are improved, and the communication safety is guaranteed.

Description

Information security transmission method and system
Technical Field
The present invention relates to the field of communication security technologies, and in particular, to a method and a system for secure transmission of information.
Background
With the rapid development of the internet and the internet of things technology, smart homes have come to the fore, and connect various devices (such as audio and video devices, lighting systems, curtain control, air conditioner control, security systems, digital cinema systems, audio and video servers, video cabinet systems, network home appliances and the like) in homes through the internet of things technology, so as to provide multiple functions and means such as home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environment monitoring, heating and ventilation control, infrared forwarding, programmable timing control and the like. Compared with the common home, the intelligent home has the traditional living function, integrates the functions of building, network communication, information household appliance and equipment automation, provides an all-around information interaction function, and even saves funds for various energy expenses.
The intelligent home is characterized in that a house is used as a platform, facilities related to home life are integrated by utilizing a comprehensive wiring technology, a network communication technology, a safety precaution technology, an automatic control technology and an audio and video technology, and an efficient management system for house facilities and family schedule affairs is constructed; the home gateway is the core part of the intelligent home local area network, mainly completes the conversion and information sharing between various different communication protocols of the home internal network and the data exchange function between the home gateway and the external communication network, and is also responsible for the management and control of the home intelligent equipment. The home gateway internally adopts ZigBee, RF485/433/315MHz and other Internet of things protocols or WiFi for interconnection communication, and needs to remotely interact with the cloud server externally.
In the prior art, the smart home has the following technical defects in the aspect of communication security authentication: firstly, the communication between the home gateway and the cloud server adopts a plaintext mode, which can seriously threaten the safety of the smart home; secondly, a non-national-secret low-strength software encryption algorithm is adopted, so that the safety cannot be guaranteed, autonomous controllability is not realized, and the absence of a back door cannot be guaranteed; thirdly, the existing traditional encryption mode enables each terminal to only use one key or only select the key in a limited space, so that the key is easy to crack; and fourthly, each intelligent home manufacturer establishes an authentication system by itself, an authority is lacked to provide a reliable identity authentication service, and the user safety has to be completely dependent on the integrity of the manufacturer.
Disclosure of Invention
According to the problems in the prior art, a method and a system for information secure transmission are provided, wherein a communication process between a security gateway and a cloud service platform is encrypted by using a national cryptographic chip and a national cryptographic algorithm, and a secret key is updated according to a preset condition, so that the encryption algorithm is independent and controllable, a certification authority is authoritative and credible, the security and the reliability of information transmission are greatly improved, and the communication security between an intelligent home and the cloud service platform is ensured.
The technical scheme specifically comprises the following steps:
the information security transmission method is applied to an intelligent home system and is characterized in that the intelligent home system comprises a cloud service platform and a plurality of security gateways, the cloud service platform is remotely connected with the plurality of security gateways, a national password chip is arranged in each security gateway, and the information security transmission method comprises the following steps:
step S1, the cloud service platform generates a first key corresponding to the security gateway after receiving a predetermined signal of the security gateway, the first key comprises a public key and a private key, and the first key is generated according to an asymmetric cryptographic algorithm;
step S2, the cloud service platform saves the private key and sends the public key to the corresponding security gateway;
step S3, after receiving the public key, the security gateway writes the public key into the national password chip;
step S4, the national password chip generates a second key according to a symmetric cryptographic algorithm, and encrypts the second key by using the public key;
step S5, the security gateway transmits the encrypted second key to the cloud service platform;
step S6, the cloud service platform decrypts the encrypted second key through the private key, and obtains and stores the second key corresponding to the security gateway;
step S7, the cloud service platform and the security gateway perform encryption and decryption operations on the data to be transmitted through the second key.
Preferably, in step S3, after the public key is written into the cryptographic chip, the security gateway sends a write receipt to the cloud service platform.
Preferably, the symmetric cryptographic algorithm is a domestic cryptographic algorithm SM1 or SM4, among others.
Preferably, the asymmetric cryptographic algorithm is a domestic cryptographic algorithm SM 2.
Preferably, the predetermined signal is a first predetermined signal generated and sent by the security gateway at initialization time, or a second predetermined signal sent by the security gateway for indicating to update the first key.
Preferably, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
An intelligent home system, characterized in that the information security transmission method according to claim 1 is applied, wherein the cloud service platform comprises:
the first receiving module is used for receiving a predetermined signal sent by the security gateway;
the generating module is connected with the first receiving module and used for generating the first key according to the preset signal;
the storage module is connected with the generation module and used for storing the private key;
the first sending module is connected with the generating module and used for sending the public key to the corresponding security gateway;
the encryption and decryption module is connected with the storage module and is used for carrying out encryption and decryption operations on the transmitted data;
the security gateway includes:
a second receiving module, configured to receive the public key;
the writing module is connected with the second receiving module and the national secret chip and used for writing the public key into the national secret chip;
and the second sending module is connected with the national secret chip and used for sending the encrypted second secret key to the cloud service platform.
Preferably, the security gateway further includes a third sending module connected to the writing module, the writing module writes the public key into the cryptographic chip and then generates a written receipt, and the third sending module sends the written receipt to the cloud service platform.
Preferably, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
Preferably, the predetermined signal is a first predetermined signal generated and sent by the security gateway at initialization time, or a second predetermined signal sent by the security gateway for indicating to update the first key.
The beneficial effects of the above technical scheme are that:
the communication process of the security gateway and the cloud service platform is encrypted by utilizing the national cryptographic chip and the national cryptographic algorithm, and the secret key is updated according to the preset conditions, so that the autonomous controllability of the encryption algorithm is ensured, the authority of a certificate authority is credible, the safety and the reliability of information transmission are greatly improved, and the communication safety of the smart home and the cloud service platform is ensured.
Drawings
FIG. 1 is a flow chart of a method for secure transmission of information in accordance with a preferred embodiment of the present invention;
FIG. 2 is a schematic diagram of a secure information transfer system according to a preferred embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a cloud service platform based on FIG. 2 according to a preferred embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security gateway based on fig. 2 in a preferred embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention is further described with reference to the following drawings and specific examples, which are not intended to be limiting.
An information security transmission method is applied to an intelligent home system, as shown in fig. 1, wherein the intelligent home system includes a cloud service platform 1 and a plurality of security gateways 2, the cloud service platform 1 is remotely connected to the plurality of security gateways 2, a national security chip 22 is disposed in each security gateway 2, and the information security transmission method includes:
step S1, the cloud service platform 1 generates a first key corresponding to the security gateway 2 after receiving a predetermined signal of the security gateway 2, the first key comprises a public key and a private key, and the first key is generated according to an asymmetric cryptographic algorithm;
step S2, the cloud service platform 1 stores the private key and sends the public key to the corresponding security gateway 2;
step S3, after receiving the public key, the security gateway 2 writes the public key into the national password chip 22;
step S4, the cryptographic chip 22 generates a second key according to the symmetric cryptographic algorithm, and encrypts the second key using the public key;
step S5, the security gateway 2 transmits the encrypted second key to the cloud service platform 1;
step S6, the cloud service platform 1 decrypts the encrypted second key through the private key, obtains the second key corresponding to the security gateway 2 and stores the second key;
in step S7, the cloud service platform 1 and the security gateway 2 perform encryption and decryption operations on the data to be transmitted through the second key.
As a preferred implementation, the national cipher, i.e. the domestic cryptographic algorithm identified by the national cryptology authority, belongs to the commercial cipher, and the national cryptographic algorithm is a series of algorithms specified by the national cryptology authority, including a symmetric encryption algorithm, an elliptic curve asymmetric encryption algorithm and a hash algorithm. In the invention, a secure transmission system between the cloud service platform 1 and the plurality of security gateways 2 is constructed by adopting a national cryptographic algorithm.
Firstly, a national cryptographic chip 22 capable of supporting a national cryptographic algorithm is required to be pre-embedded in each security gateway 2, wherein the cloud service platform 1 is an open system, any security gateway 2 embedded with the national cryptographic chip 22 can be connected with the cloud service platform 1 through the internet, and various services provided by the cloud service platform 1 are used, specifically, the invention adopts an asymmetric cryptographic algorithm to encrypt a first key, and adopts a symmetric cryptographic algorithm to encrypt service data between the security gateway 2 and the cloud service platform 1.
In the process of information transmission between the cloud service platform 1 and the security gateway 2, the security gateway 2 firstly sends a predetermined signal to the cloud service platform 1, and after receiving the predetermined signal, the cloud service platform 1 generates a first key associated with the security gateway 2 according to an asymmetric cryptographic algorithm in a national cryptographic algorithm, wherein the first key exists in a form of a pair of a public key and a private key. Subsequently, the cloud service platform 1 stores the private key in the generated first key in the cloud service platform 1, and sends the public key in the first key to the security gateways 2 associated with the first key, and after the process is completed, each security gateway 2 corresponds to a pair of public and private keys.
After receiving the public key sent by the cloud service platform 1, the security gateway 2 writes the public key into the national key chip 22, then the national key chip 22 in the security gateway 2 generates a second key according to a symmetric cryptographic algorithm, encrypts the generated second key with the public key in the first key, transmits the encrypted second key to the cloud service platform 1 through the internet, after receiving the encrypted second key data, the cloud service platform 1 calls the private key of the first key stored in the cloud service platform 1 and associated with the security gateway 2, decrypts the encrypted second key data through the private key to obtain the second key, similarly, the second key is also associated with the corresponding security gateway 2, after the process is completed, the same second key exists in the cloud service platform 1 and the security gateway 2, when the subsequent cloud service platform 1 and the security gateway 2 perform service data interaction, and carrying out encryption and decryption operation by using the second key to safely transmit data.
In a preferred embodiment of the present invention, in step S3, after the public key is written into the cryptographic chip 22, the security gateway 2 sends a write receipt to the cloud service platform 1.
Specifically, in this embodiment, the cloud service platform 1 sends the public key in the corresponding first key to the security gateway 2 through the internet, the security gateway 2 writes the public key into the cryptographic chip 22 after receiving the public key, and generates a write-in receipt after writing, and sends the write-in receipt back to the cloud service platform 1 to confirm that the public key has been received and stored to the cloud service platform 1, and then, the encryption and decryption operations of the second key can be performed through the public key and the private key.
In a preferred embodiment of the present invention, the symmetric cryptographic algorithm is a domestic cryptographic algorithm SM1 or SM 4.
In a preferred embodiment of the present invention, the asymmetric cryptographic algorithm is the domestic cryptographic algorithm SM 2.
In a preferred embodiment of the present invention, the predetermined signal is a first predetermined signal generated and transmitted by the security gateway 2 at initialization, or a second predetermined signal transmitted by the security gateway 2 to indicate updating of the first key.
Specifically, in this embodiment, the predetermined signal has two types, one is that when the security gateway 2 is started and requests to perform authentication connection with the cloud service platform 1, the security gateway 2 sends an initialization signal to the cloud service platform 1, and the cloud service platform 1 starts to perform subsequent steps of generating and exchanging the first key and the second key after receiving the initialization signal. The second type is a first key updating instruction sent by the security gateway 2, the security gateway 2 regenerates the first key after receiving the first key updating instruction, and sends a public key in the first key to the security gateway 2, the security gateway 2 writes the public key into the national key chip 22 and then sends a write-in receipt to the cloud service platform 1, the cloud service platform 1 confirms that the updating of the first key is completed after receiving the write-in receipt, and the whole updating process of the first key is finished.
In a preferred embodiment of the present invention, the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
Specifically, in the present embodiment, the information secure transmission method supports both the form of one-time pad and the form of periodic key exchange, that is, allows the second key of the security gateway 2 to be exchanged after or before each traffic operation (e.g., data transmission), or sets the second key of the security gateway 2 to be exchanged after a predetermined time (e.g., 5 minutes) has elapsed. In a specific embodiment, after receiving an instruction that the cloud service platform 1 requests a new second key, the security gateway 2 sends an instruction (i.e., a key update triggering instruction) to generate the second key to the national cryptographic chip 22, the national cryptographic chip 22 calls the key generator located inside the chip to regenerate the second key, and encrypts the newly generated second key using the public key stored inside the national cryptographic chip 22, then the security gateway 2 sends the encrypted new second key to the cloud service platform 1, the cloud service platform 1 receives the encrypted data and decrypts the encrypted data by using the private key corresponding to the security gateway 2 to obtain the new second key and store the new second key, and subsequent service data interaction between the cloud service platform 1 and the security gateway 2 performs encryption and decryption operations using the new second key.
An information security transmission system, to which the above information security transmission method is applied, is shown in fig. 2, where the information security transmission system includes a cloud service platform 1 and a plurality of security gateways 2;
as shown in fig. 3, the cloud service platform 1 further includes:
a first receiving module 10, configured to receive a predetermined signal sent by the security gateway 2;
a generating module 11, connected to the first receiving module 10, for generating a first key according to a predetermined signal;
the storage module 12 is connected with the generation module 11 and used for storing the private key;
the first sending module 13 is connected to the generating module 11 and is used for sending the public key to the corresponding security gateway 2;
the encryption and decryption module 14 is connected with the storage module 12 and is used for carrying out encryption and decryption operations on the transmitted data;
as shown in fig. 4, the security gateway 2 further includes:
a second receiving module 20, configured to receive a public key;
the writing module 21 is connected with the second receiving module 20 and the national cryptographic chip 22 and is used for writing the public key into the national cryptographic chip 22;
the second sending module 23 is connected to the cryptographic chip 22, and is configured to send the encrypted second key to the cloud service platform 1.
As a preferred embodiment, the information security transmission system is disposed in an intelligent home system, wherein the first receiving module 10 and the first sending module 13 are further configured to receive and send encrypted service data transmitted between the cloud service platform 1 and the security gateway 2, respectively, in this case, the encryption/decryption module 14 is connected to the first receiving module 10 and the first sending module 13 at the same time and is configured to perform encryption/decryption operation on the transmitted service data, and similarly, the second sending module 23 and the second receiving module 20 are also configured to receive and send encrypted service data transmitted between the cloud service platform 1 and the security gateway 2 at the same time, in this case, the cryptographic chip 22 is connected to the second sending module 23 and the second receiving module 20 at the same time.
In a preferred embodiment of the present invention, the security gateway 2 further includes a third sending module 24, which is connected to the writing module 21, the writing module 21 writes the public key into the cryptographic chip 22 to generate a written receipt, and the third sending module 24 sends the written receipt to the cloud service platform 1.
Specifically, in this embodiment, the third sending module 24 and the second sending module 23 may be separately configured, and in another embodiment of the present invention, the third sending module 24 and the second sending module 23 are integrated into the same sending functional unit.
In a preferred embodiment of the present invention, the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
In a preferred embodiment of the present invention, the predetermined signal is a first predetermined signal generated and transmitted by the security gateway 2 at initialization, or a second predetermined signal transmitted by the security gateway 2 to indicate updating of the first key.
The beneficial effects of the above technical scheme are that:
the communication process of the security gateway and the cloud service platform is encrypted by utilizing the national cryptographic chip and the national cryptographic algorithm, and the secret key is updated according to the preset conditions, so that the autonomous controllability of the encryption algorithm is ensured, the authority of a certificate authority is credible, the safety and the reliability of information transmission are greatly improved, and the communication safety of the smart home and the cloud service platform is ensured.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.

Claims (10)

1. The information security transmission method is applied to an intelligent home system and is characterized in that the intelligent home system comprises a cloud service platform and a plurality of security gateways, the cloud service platform is remotely connected with the plurality of security gateways, a national password chip is arranged in each security gateway, and the information security transmission method comprises the following steps:
step S1, the cloud service platform generates a first key corresponding to the security gateway after receiving a predetermined signal of the security gateway, the first key comprises a public key and a private key, and the first key is generated according to an asymmetric cryptographic algorithm;
step S2, the cloud service platform saves the private key and sends the public key to the corresponding security gateway;
step S3, after receiving the public key, the security gateway writes the public key into the national password chip;
step S4, the national password chip generates a second key according to a symmetric cryptographic algorithm, and encrypts the second key by using the public key;
step S5, the security gateway transmits the encrypted second key to the cloud service platform;
step S6, the cloud service platform decrypts the encrypted second key through the private key, and obtains and stores the second key corresponding to the security gateway;
step S7, the cloud service platform and the security gateway perform encryption and decryption operations on the data to be transmitted through the second key.
2. The method according to claim 1, wherein in step S3, after the public key is written into the cryptographic chip, the security gateway sends a write receipt to the cloud service platform.
3. The method for securely transmitting information according to claim 1, wherein the symmetric cryptographic algorithm is a domestic cryptographic algorithm SM1 or SM 4.
4. The method for securely transmitting information according to claim 1, wherein the asymmetric cryptographic algorithm is a domestic cryptographic algorithm SM 2.
5. The method for securely transmitting information according to claim 1, wherein the predetermined signal is a first predetermined signal generated and transmitted by the security gateway at initialization time, or a second predetermined signal transmitted by the security gateway and used for indicating updating of the first key.
6. The method for securely transmitting information according to claim 1, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
7. An information security transmission system, characterized in that the information security transmission method according to claim 1 is applied, wherein the information security transmission system comprises the cloud service platform and the plurality of security gateways;
the cloud service platform further comprises:
the first receiving module is used for receiving a predetermined signal sent by the security gateway;
the generating module is connected with the first receiving module and used for generating the first key according to the preset signal;
the storage module is connected with the generation module and used for storing the private key;
the first sending module is connected with the generating module and used for sending the public key to the corresponding security gateway;
the encryption and decryption module is connected with the storage module and is used for carrying out encryption and decryption operations on the transmitted data;
the security gateway further comprises:
a second receiving module, configured to receive the public key;
the writing module is connected with the second receiving module and the national secret chip and is used for writing the public key into the national secret chip;
and the second sending module is connected with the national secret chip and used for sending the encrypted second secret key to the cloud service platform.
8. The system according to claim 7, wherein the security gateway further includes a third sending module, connected to the writing module, the writing module writes the public key into the cryptographic chip to generate a written receipt, and the third sending module sends the written receipt to the cloud service platform.
9. The system according to claim 7, wherein the second key is updated before each data transmission; or
The second key is updated after a predetermined time interval.
10. The system for securely transferring information according to claim 7, wherein the predetermined signal is a first predetermined signal generated and transmitted by the security gateway at initialization or a second predetermined signal transmitted by the security gateway for indicating updating of the first key.
CN201911277267.4A 2019-12-12 2019-12-12 Information security transmission method and system Pending CN111131204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911277267.4A CN111131204A (en) 2019-12-12 2019-12-12 Information security transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911277267.4A CN111131204A (en) 2019-12-12 2019-12-12 Information security transmission method and system

Publications (1)

Publication Number Publication Date
CN111131204A true CN111131204A (en) 2020-05-08

Family

ID=70498549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911277267.4A Pending CN111131204A (en) 2019-12-12 2019-12-12 Information security transmission method and system

Country Status (1)

Country Link
CN (1) CN111131204A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333699A (en) * 2020-11-03 2021-02-05 山东正中信息技术股份有限公司 Internet of things communication protocol encryption method, equipment and storage medium
CN112688945A (en) * 2020-12-24 2021-04-20 联通物联网有限责任公司 Transmission method and transmission system for terminal data of Internet of things
CN114598482A (en) * 2020-11-20 2022-06-07 福州数据技术研究院有限公司 Encryption communication method and system for server and intelligent edge gateway
CN114938304A (en) * 2022-05-23 2022-08-23 贵州大学 Method and system for safely transmitting data of industrial Internet of things
CN116436710A (en) * 2023-06-15 2023-07-14 烟台岸基网络科技有限公司 Remote operation system for operation of port bridge type loading and unloading equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049401A (en) * 2015-03-19 2015-11-11 浙江大学 Secure communication method based on intelligent vehicle
CN204759556U (en) * 2015-07-09 2015-11-11 陕西昌大科技有限公司 Access control ware
CN108173822A (en) * 2017-12-18 2018-06-15 惠州Tcl家电集团有限公司 Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN109816831A (en) * 2019-01-31 2019-05-28 公安部第三研究所 A kind of authentication method and system of the smart lock based on national secret algorithm

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049401A (en) * 2015-03-19 2015-11-11 浙江大学 Secure communication method based on intelligent vehicle
CN204759556U (en) * 2015-07-09 2015-11-11 陕西昌大科技有限公司 Access control ware
CN108173822A (en) * 2017-12-18 2018-06-15 惠州Tcl家电集团有限公司 Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
CN109816831A (en) * 2019-01-31 2019-05-28 公安部第三研究所 A kind of authentication method and system of the smart lock based on national secret algorithm

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333699A (en) * 2020-11-03 2021-02-05 山东正中信息技术股份有限公司 Internet of things communication protocol encryption method, equipment and storage medium
CN114598482A (en) * 2020-11-20 2022-06-07 福州数据技术研究院有限公司 Encryption communication method and system for server and intelligent edge gateway
CN112688945A (en) * 2020-12-24 2021-04-20 联通物联网有限责任公司 Transmission method and transmission system for terminal data of Internet of things
CN114938304A (en) * 2022-05-23 2022-08-23 贵州大学 Method and system for safely transmitting data of industrial Internet of things
CN116436710A (en) * 2023-06-15 2023-07-14 烟台岸基网络科技有限公司 Remote operation system for operation of port bridge type loading and unloading equipment
CN116436710B (en) * 2023-06-15 2023-08-29 烟台岸基网络科技有限公司 Remote operation system for operation of port bridge type loading and unloading equipment

Similar Documents

Publication Publication Date Title
CN111131204A (en) Information security transmission method and system
CN104813685B (en) The subscription informing mechanism of synchronization for distributions
US20200259667A1 (en) Distributed management system for remote devices and methods thereof
EP1384346B1 (en) Method for providing security on a powerline-modem network
CN107683601A (en) Relay services for the communication between controller and annex
CN105580310A (en) Security management method and security management device in home network system
JP2005520466A (en) Home terminal device and communication system
CN109005185A (en) Promote the multilayer authentication method communicated between intelligent home equipment and server based on cloud
CN103685323A (en) Method for realizing intelligent home security networking based on intelligent cloud television gateway
CA2812906A1 (en) Utility device management
KR20040012824A (en) Electronic device control apparatus
CN107094138A (en) A kind of smart home safe communication system and communication means
US20210111909A1 (en) Fluid meter communicating with an electromechanical valve
CN110716441A (en) Method for controlling intelligent equipment, intelligent home system, equipment and medium
CN112053477B (en) Control system, method and device of intelligent door lock and readable storage medium
CN112019552B (en) Internet of things secure communication method
CN112512064B (en) Wireless distribution network method, wireless gateway and equipment to be accessed
KR100970318B1 (en) Secrete key setting method of integrated?meter reading service based on power line?communication
KR20090002328A (en) Method for joining new device in wireless sensor network
CN106936841B (en) Safety protecting method and system in smart home
CN114640691A (en) Equipment connection method and system and corresponding Internet of things equipment
CN101937584A (en) Method for generating passwords of access control system
CN111143892A (en) Data storage method and device based on block chain
CN112507301B (en) Internet of things equipment control method, device, equipment and storage medium
CN104363219B (en) A kind of three parts cipher key management method based on IEC62056 data transmission security standards

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination