CN114255530A - Communication safety guarantee method and system for intelligent lock of power supply equipment - Google Patents

Communication safety guarantee method and system for intelligent lock of power supply equipment Download PDF

Info

Publication number
CN114255530A
CN114255530A CN202111475703.6A CN202111475703A CN114255530A CN 114255530 A CN114255530 A CN 114255530A CN 202111475703 A CN202111475703 A CN 202111475703A CN 114255530 A CN114255530 A CN 114255530A
Authority
CN
China
Prior art keywords
management server
random number
intelligent lock
unlocking
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111475703.6A
Other languages
Chinese (zh)
Other versions
CN114255530B (en
Inventor
何亮
伍炜卫
范泳华
安希成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Co ltd
Original Assignee
Shenzhen Power Supply Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Co ltd filed Critical Shenzhen Power Supply Co ltd
Priority to CN202111475703.6A priority Critical patent/CN114255530B/en
Publication of CN114255530A publication Critical patent/CN114255530A/en
Application granted granted Critical
Publication of CN114255530B publication Critical patent/CN114255530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a communication safety guarantee method for an intelligent lock of power supply equipment, which comprises the following steps: step S10, the management server receives an unlocking request of the selected intelligent lock from the mobile terminal; step S11, the management server and the intelligent lock perform a key negotiation process, and both sides obtain a key for the unlocking operation; step S12, the management server encrypts the unlocking instruction by the key and transmits the encrypted unlocking instruction to the intelligent lock through the NB-IOT network; step S13, the intelligent lock decrypts the unlocking instruction by adopting the negotiated secret key, and carries out unlocking operation according to the unlocking instruction; and step S14, the intelligent lock feeds back the unlocking result to the management server. The invention also provides a corresponding system. By implementing the intelligent lockset, the safety of the intelligent lockset in the communication process can be improved.

Description

Communication safety guarantee method and system for intelligent lock of power supply equipment
Technical Field
The invention relates to an electric power safety protection monitoring technology, in particular to a communication safety guarantee method and system for an intelligent lock of power supply equipment.
Background
On some electrical devices, locks are required. In the existing lockset, the intelligent lockset has a plurality of advantages in use. The intelligent lock is an improved lock on the basis of being different from the traditional mechanical lock, and is more intelligent and simpler in the aspects of user safety, identification and manageability.
But the intelligent lockset in the existing market has the defects of uneven quality and poor intelligence. Meanwhile, due to the fact that application occasions of various electric power equipment are very complicated, for example, the positions of some electric power equipment are very remote, the network environment is not good, meanwhile, for how to guarantee the safety of communication between the intelligent lock and the server, a very reliable scheme does not exist in the prior art, and the hidden danger of replay attack by a hacker exists.
Disclosure of Invention
The invention aims to solve the technical problem that the invention provides a communication safety guarantee method and system for an intelligent lock of power supply equipment, which can improve the safety of the intelligent lock in the communication process.
In order to solve the above technical problem, as an aspect of the present invention, a communication security guaranteeing method for an intelligent lock of a power supply device is provided, which includes the following steps:
step S10, the management server receives an unlocking request of the selected intelligent lock from the mobile terminal; the unlocking request carries an identification number of the intelligent lock;
step S11, the management server and the intelligent lock perform a key negotiation process, and both sides obtain a key for the unlocking operation;
step S12, the management server encrypts the unlocking instruction by the key and transmits the encrypted unlocking instruction to the intelligent lock through the NB-IOT network;
step S13, the intelligent lock decrypts the unlocking instruction by adopting the negotiated secret key, and carries out unlocking operation according to the unlocking instruction;
and step S14, the intelligent lock feeds back the unlocking result to the management server.
Preferably, the step S11 further includes:
after the management server is connected with the intelligent lock for the first time or the management server controls the intelligent lock to unlock, the same current secret key is stored in both the management server and the intelligent lock;
the management server generates a first random number A, encrypts the first random number A by using the current secret key and sends the encrypted first random number A to the intelligent lockset;
the intelligent lockset receives the encrypted first random number and decrypts by adopting a current secret key to obtain the first random number A;
the intelligent lockset generates a second random number B, encrypts the second random number B by adopting the first random number A and sends the encrypted second random number B to the management server;
the management server decrypts the encrypted second random number by using the first random number A to obtain a second random number B;
and both the management server and the intelligent lock replace the second random number B with a current secret key.
Preferably, further comprising:
after the management server is connected with the intelligent lock for the first time, the management server generates a random number and sends the random number to the intelligent lock;
and the management server and the intelligent lock determine the random number as a current secret key.
Preferably, further comprising:
and the management server forwards the unlocking result to the mobile terminal.
Preferably, https communication is adopted between the mobile terminal and the management server, and when the mobile terminal and the management server establish communication, handshake negotiation is performed first, and https bidirectional authentication is performed.
Accordingly, in another aspect of the present invention, a communication security guarantee system for an intelligent lock of a power supply device is further provided, which at least includes a plurality of intelligent locks arranged at the power supply device, a management server and a mobile terminal, where the intelligent locks directly communicate with the management server, where:
the mobile terminal is used for generating an unlocking request for the intelligent lock to be unlocked, sending the unlocking request to the management server and receiving the unlocking result forwarded by the management server; the unlocking request carries an identification number of the intelligent lock;
the management server is used for carrying out key negotiation with the intelligent lock after receiving the unlocking request, encrypting the unlocking instruction by adopting the negotiated current key and sending the current key to the intelligent lock through an NB-IOT network; the intelligent lock is used for receiving the unlocking result from the intelligent lock and forwarding the unlocking result to the mobile terminal;
the intelligent lock is used for carrying out key negotiation with the management server, decrypting the encrypted unlocking instruction sent by the management server by adopting the negotiated current key, carrying out unlocking operation and feeding back an unlocking result to the management server after unlocking.
Preferably, the management server and the intelligent lock perform key agreement by using the following method:
after the management server is connected with the intelligent lock for the first time or the management server controls the intelligent lock to unlock, the same current secret key is stored in both the management server and the intelligent lock;
the management server generates a first random number A, encrypts the first random number A by using the current secret key and sends the encrypted first random number A to the intelligent lockset;
the intelligent lockset receives the encrypted first random number and decrypts by adopting a current secret key to obtain the first random number A;
the intelligent lockset generates a second random number B, encrypts the second random number B by adopting the first random number A and sends the encrypted second random number B to the management server;
the management server decrypts the encrypted second random number by using the first random number A to obtain a second random number B;
and both the management server and the intelligent lock replace the second random number B with a current secret key.
Preferably, after the management server is connected with the intelligent lock for the first time, the management server is used for generating a random number and sending the random number to the intelligent lock; and the random number is determined as a current secret key by the management server and the intelligent lock.
Preferably, https communication is adopted between the mobile terminal and the management server, and when the mobile terminal and the management server establish communication, handshake negotiation is performed first, and https bidirectional authentication is performed.
The embodiment of the invention has the following beneficial effects:
the invention provides a communication safety guarantee method and a system for an intelligent lock of power supply equipment.A management server and the intelligent lock negotiate a latest secret key before an unlocking instruction is sent each time; replay attacks by hackers can be prevented;
meanwhile, https communication is adopted between the management server and the mobile terminal, and a bidirectional identity authentication mechanism is adopted, so that deception attack by a man in the middle can be prevented, the safety of the intelligent lock in the application process is further improved, and the safety of the power supply equipment can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is within the scope of the present invention for those skilled in the art to obtain other drawings based on the drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of an embodiment of a communication security system for an intelligent lock of a power supply device according to the present invention;
fig. 2 is a schematic diagram of the management server and the smart lock involved in fig. 1 performing key agreement;
fig. 3 is a main flow diagram illustrating an embodiment of a communication security method for an intelligent lock of a power supply device according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings.
The invention is described in further detail below with reference to specific embodiments and with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram illustrating an embodiment of a communication security system for an intelligent lock of a power supply device according to the present invention. Referring to fig. 2 together, in this embodiment, the system at least includes a plurality of intelligent locks 1 disposed at a power supply device, a management server 2 and a mobile terminal 3, where the intelligent locks 1 directly communicate with the management server 2, for example, communicate in an NB-IOT network manner, where:
the mobile terminal 3 is used for generating an unlocking request for the intelligent lock to be unlocked, sending the unlocking request to the management server, and receiving the unlocking result forwarded by the management server; the unlocking request carries an identification number of the intelligent lock;
the management server 2 is used for performing key negotiation with the intelligent lock after receiving the unlocking request, encrypting the unlocking instruction by adopting the negotiated current key, and sending the encrypted unlocking instruction to the intelligent lock through an NB-IOT network; the intelligent lock is used for receiving the unlocking result from the intelligent lock and forwarding the unlocking result to the mobile terminal;
the intelligent lock 1 is used for carrying out key negotiation with the management server, decrypting the encrypted unlocking instruction sent by the management server by adopting the negotiated current key, carrying out unlocking operation, and feeding back an unlocking result to the management server after unlocking.
It is understood that in the prior art, encryption algorithms are mainly classified into two types, symmetric encryption algorithms and asymmetric encryption algorithms. The symmetric encryption algorithm uses the same secret key in the encryption and decryption processes, has the characteristics of quick encryption and decryption, high efficiency and high safety, and mainly comprises DES, AES and SM 1; the common asymmetric encryption algorithms mainly include RSA algorithm and ECC algorithm. Different keys are used in the encryption and decryption processes of the asymmetric encryption algorithm, and the characteristics of long key length, complex algorithm and the like enable the encryption and decryption speed to be low, but the security is high. In addition, the key length of AES is larger than DES, it is difficult to be exhausted and solved, it is safer, it can also be set as any multiple of 32 bits, the minimum is 128 bits, the maximum is 256 bits; and DES is a block cipher algorithm, the block length is 64 bits, suitable for the encryption of a large amount of data. Therefore, the AES is suitable for 8-bit small single-chip microcomputers or common 32-bit microprocessors, and has very low requirements and high operation speed compared with DES memories. SM1 is comparable to AES performance, but needs the proprietary encryption chip, and is costly, and the smart lock small-size equipment space is limited, and the introduction has the limitation.
Because the intelligent lockset needs to meet the requirements of low power consumption and low cost, is not suitable for independently deploying an encryption module with complex calculation and deploying a lightweight security communication module to encrypt, store and access control equipment terminal data, and a security communication protocol which occupies less resources, is relatively safe and has high calculation efficiency is preferably adopted in consideration of the requirements of data storage, calculation performance and power consumption on the terminal, the AES symmetric encryption algorithm is selected to encrypt transmission data in the invention.
As shown in fig. 2, the management server 2 and the intelligent lock 1 perform key agreement by the following method:
after the management server is connected with the intelligent lock for the first time or the management server controls the intelligent lock to unlock, the same current secret key K is stored in both the management server and the intelligent lock;
the management server generates a first random number A, encrypts the first random number A by using the current secret key and sends the encrypted first random number A to the intelligent lock, wherein the first random number A is K (A) in the figure;
the intelligent lockset receives the encrypted first random number and decrypts by adopting a current secret key to obtain the first random number A;
the intelligent lockset generates a second random number B, the first random number A is adopted to encrypt the second random number B, and the second random number B is sent to the management server, wherein A (B) is shown in the figure;
the management server decrypts the encrypted second random number by using the first random number A to obtain a second random number B;
and both the management server and the intelligent lock replace the second random number B with a current secret key.
More specifically, after the management server is connected with the intelligent lock for the first time, the management server is used for generating a random number K and sending the random number to the intelligent lock; and the random number is determined as a current secret key K by the management server and the intelligent lock. This step is only performed once, and subsequently, the key for the current unlocking operation is generated by performing negotiation again on the basis of the current key (i.e., the key negotiated by the previous unlocking operation).
It can be understood that the keys encrypted during each unlocking are different, and when an attacker intercepts data therein and performs replay attack, the intelligent lock cannot decrypt the data due to the absence of the key negotiation process, so that the replay attack can be invalidated.
More particularly, to further improve the communication security of the present system. Https communication is adopted between the mobile terminal 3 and the management server 2, and when the communication is established between the mobile terminal and the management server, handshake negotiation is performed first, and https bidirectional identity authentication is performed.
In the invention, https bidirectional authentication is adopted, the management server performs certificate authentication on the client in the mobile terminal requesting it, and the client in the mobile terminal also performs certificate authentication on the management server requested by itself. Once the management server verifies that the client requesting itself is untrustworthy, the management server refuses to continue communication. The client also suspends communication if the management server is found to be untrusted. Therefore, data transmitted by the App and the server can be prevented from being stolen and utilized by a man-in-the-middle, and deception handshake operation is carried out.
Fig. 3 is a main flow diagram illustrating an embodiment of a communication security method for an intelligent lock of a power supply device according to the present invention. In this embodiment, the method includes the steps of:
step S10, the management server receives an unlocking request of the selected intelligent lock from the mobile terminal; the unlocking request carries an identification number of the intelligent lock;
step S11, the management server and the intelligent lock perform a key negotiation process, and both sides obtain a key for the unlocking operation;
step S12, the management server encrypts the unlocking instruction by the key and transmits the encrypted unlocking instruction to the intelligent lock through the NB-IOT network;
step S13, the intelligent lock decrypts the unlocking instruction by adopting the negotiated secret key, and carries out unlocking operation according to the unlocking instruction;
step S14, the intelligent lock feeds back the unlocking result to the management server; and the management server forwards the unlocking result to the mobile terminal.
More specifically, as shown in fig. 2, the step S11 further includes:
after the management server is connected with the intelligent lock for the first time or the management server controls the intelligent lock to unlock, the same current secret key K is stored in both the management server and the intelligent lock;
the management server generates a first random number A, encrypts the first random number A by using the current secret key and sends the encrypted first random number A to the intelligent lock, wherein the first random number A is K (A) in the figure;
the intelligent lockset receives the encrypted first random number and decrypts by adopting a current secret key to obtain the first random number A;
the intelligent lockset generates a second random number B, the first random number A is adopted to encrypt the second random number B, and the second random number B is sent to the management server, wherein A (B) is shown in the figure;
the management server decrypts the encrypted second random number by using the first random number A to obtain a second random number B;
and both the management server and the intelligent lock replace the second random number B with a current secret key.
More specifically, after the management server is connected with the intelligent lock for the first time, the management server is used for generating a random number K and sending the random number to the intelligent lock; and the random number is determined as a current secret key K by the management server and the intelligent lock. This step is only performed once, and subsequently, the key for the current unlocking operation is generated by performing negotiation again on the basis of the current key (i.e., the key negotiated by the previous unlocking operation).
More specifically, https communication is adopted between the mobile terminal and the management server, and when the mobile terminal and the management server establish communication, handshake negotiation is performed first, and https bidirectional authentication is performed.
For more details, reference may be made to and combined with the foregoing description of fig. 1 and 2, which are not repeated herein.
The embodiment of the invention has the following beneficial effects:
the invention provides a communication safety guarantee method and a system for an intelligent lock of power supply equipment.A management server and the intelligent lock negotiate a latest secret key before an unlocking instruction is sent each time; replay attacks by hackers can be prevented;
meanwhile, https communication is adopted between the management server and the mobile terminal, and a bidirectional identity authentication mechanism is adopted, so that deception attack by a man in the middle can be prevented, the safety of the intelligent lock in the application process is further improved, and the safety of the power supply equipment can be improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (9)

1. A communication safety guarantee method for an intelligent lock of power supply equipment is characterized by comprising the following steps:
step S10, the management server receives an unlocking request of the selected intelligent lock from the mobile terminal; the unlocking request carries an identification number of the intelligent lock;
step S11, the management server and the intelligent lock perform a key negotiation process, and both sides obtain a key for the unlocking operation;
step S12, the management server encrypts the unlocking instruction by the key and transmits the encrypted unlocking instruction to the intelligent lock through the NB-IOT network;
step S13, the intelligent lock decrypts the unlocking instruction by adopting the negotiated secret key, and carries out unlocking operation according to the unlocking instruction;
and step S14, the intelligent lock feeds back the unlocking result to the management server.
2. The method of claim 1, wherein the step S11 further comprises:
after the management server is connected with the intelligent lock for the first time or the management server controls the intelligent lock to unlock, the same current secret key is stored in both the management server and the intelligent lock;
the management server generates a first random number A, encrypts the first random number A by using the current secret key and sends the encrypted first random number A to the intelligent lockset;
the intelligent lockset receives the encrypted first random number and decrypts by adopting a current secret key to obtain the first random number A;
the intelligent lockset generates a second random number B, encrypts the second random number B by adopting the first random number A and sends the encrypted second random number B to the management server;
the management server decrypts the encrypted second random number by using the first random number A to obtain a second random number B;
and both the management server and the intelligent lock replace the second random number B with a current secret key.
3. The method of claim 2, further comprising:
after the management server is connected with the intelligent lock for the first time, the management server generates a random number and sends the random number to the intelligent lock;
and the management server and the intelligent lock determine the random number as a current secret key.
4. The method of claim 3, further comprising:
and the management server forwards the unlocking result to the mobile terminal.
5. The method of any of claims 1 to 4, wherein:
the mobile terminal and the management server adopt https communication, and when the mobile terminal and the management server establish communication, handshake negotiation is performed first, and https bidirectional identity authentication is performed.
6. The utility model provides a communication safety guarantee system for power supply unit's intelligent tool to lock, includes a plurality of intelligent tool to lock that set up in power supply unit department at least, management server and mobile terminal, intelligent tool to lock directly with management server communicates, its characterized in that, wherein:
the mobile terminal is used for generating an unlocking request for the intelligent lock to be unlocked, sending the unlocking request to the management server and receiving the unlocking result forwarded by the management server; the unlocking request carries an identification number of the intelligent lock;
the management server is used for carrying out key negotiation with the intelligent lock after receiving the unlocking request, encrypting the unlocking instruction by adopting the negotiated current key and sending the current key to the intelligent lock through an NB-IOT network; the intelligent lock is used for receiving the unlocking result from the intelligent lock and forwarding the unlocking result to the mobile terminal;
the intelligent lock is used for carrying out key negotiation with the management server, decrypting the encrypted unlocking instruction sent by the management server by adopting the negotiated current key, carrying out unlocking operation and feeding back an unlocking result to the management server after unlocking.
7. The system of claim 6, wherein the management server performs key agreement with the smart lock using the following method:
after the management server is connected with the intelligent lock for the first time or the management server controls the intelligent lock to unlock, the same current secret key is stored in both the management server and the intelligent lock;
the management server generates a first random number A, encrypts the first random number A by using the current secret key and sends the encrypted first random number A to the intelligent lockset;
the intelligent lockset receives the encrypted first random number and decrypts by adopting a current secret key to obtain the first random number A;
the intelligent lockset generates a second random number B, encrypts the second random number B by adopting the first random number A and sends the encrypted second random number B to the management server;
the management server decrypts the encrypted second random number by using the first random number A to obtain a second random number B;
and both the management server and the intelligent lock replace the second random number B with a current secret key.
8. The system of claim 7, wherein after the management server is connected to the intelligent lock for the first time, the management server is configured to generate a random number and send the random number to the intelligent lock; and the random number is determined as a current secret key by the management server and the intelligent lock.
9. The system according to any one of claims 6 to 8, wherein https communication is used between the mobile terminal and the management server, and when the communication is established, handshake negotiation is performed first to perform https bidirectional authentication.
CN202111475703.6A 2021-12-06 2021-12-06 Communication security guarantee method and system for intelligent lockset of power supply equipment Active CN114255530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111475703.6A CN114255530B (en) 2021-12-06 2021-12-06 Communication security guarantee method and system for intelligent lockset of power supply equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111475703.6A CN114255530B (en) 2021-12-06 2021-12-06 Communication security guarantee method and system for intelligent lockset of power supply equipment

Publications (2)

Publication Number Publication Date
CN114255530A true CN114255530A (en) 2022-03-29
CN114255530B CN114255530B (en) 2024-01-16

Family

ID=80791693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111475703.6A Active CN114255530B (en) 2021-12-06 2021-12-06 Communication security guarantee method and system for intelligent lockset of power supply equipment

Country Status (1)

Country Link
CN (1) CN114255530B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things
WO2015010537A1 (en) * 2013-07-24 2015-01-29 Mu Datong Encrypted communications method and encrypted communications system
US20190253249A1 (en) * 2016-10-26 2019-08-15 Alibaba Group Holding Limited Data transmission method, apparatus and system
CN110445607A (en) * 2019-08-12 2019-11-12 北京百佑科技有限公司 Intelligent door lock key updating method, system and computer storage medium
CN110868298A (en) * 2019-11-22 2020-03-06 深圳供电局有限公司 Power grid communication encryption method
CN112002043A (en) * 2020-09-03 2020-11-27 云南电网有限责任公司信息中心 Intelligent lock control method and system based on NB-IOT
CN112184952A (en) * 2019-06-17 2021-01-05 中国电信股份有限公司 Intelligent lock control system, method and storage medium
CN112598827A (en) * 2020-12-25 2021-04-02 北京智芯微电子科技有限公司 Intelligent lock authentication method, security chip, intelligent lock and management system thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015010537A1 (en) * 2013-07-24 2015-01-29 Mu Datong Encrypted communications method and encrypted communications system
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things
US20190253249A1 (en) * 2016-10-26 2019-08-15 Alibaba Group Holding Limited Data transmission method, apparatus and system
CN112184952A (en) * 2019-06-17 2021-01-05 中国电信股份有限公司 Intelligent lock control system, method and storage medium
CN110445607A (en) * 2019-08-12 2019-11-12 北京百佑科技有限公司 Intelligent door lock key updating method, system and computer storage medium
CN110868298A (en) * 2019-11-22 2020-03-06 深圳供电局有限公司 Power grid communication encryption method
CN112002043A (en) * 2020-09-03 2020-11-27 云南电网有限责任公司信息中心 Intelligent lock control method and system based on NB-IOT
CN112598827A (en) * 2020-12-25 2021-04-02 北京智芯微电子科技有限公司 Intelligent lock authentication method, security chip, intelligent lock and management system thereof

Also Published As

Publication number Publication date
CN114255530B (en) 2024-01-16

Similar Documents

Publication Publication Date Title
CN104821874B (en) A kind of method that quantum key is applied to Internet of Things data encrypted transmission
CA2913444C (en) System and method for user authentication
US11075759B2 (en) Fingerprint data processing method and processing apparatus
CN113852460B (en) Implementation method and system for enhancing working key security based on quantum key
CN104253694A (en) Encrypting method for network data transmission
CN111600948B (en) Cloud platform application and data security processing method, system, storage medium and program based on identification password
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN108848107A (en) A kind of method of secure transmission web information
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN114282189A (en) Data security storage method, system, client and server
CN111988299A (en) Method for establishing trusted link between client and server
CN117081736A (en) Key distribution method, key distribution device, communication method, and communication device
CN208707655U (en) Distribution automation key negotiation system
WO2024139347A1 (en) Method, system and apparatus for securely acquiring sensitive information, and electronic device
CN113905359A (en) Bluetooth safety communication method, device, equipment and medium for bank peripheral
CN100464337C (en) Method and equipment for carrying out safety communication between USB device and host
CN112069530A (en) Special storage operating system based on Linux kernel
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN107172078B (en) Security management and control method and system of core framework platform based on application service
CN114255530B (en) Communication security guarantee method and system for intelligent lockset of power supply equipment
CN106972928B (en) Bastion machine private key management method, device and system
CN114928491A (en) Internet of things security authentication method, device and system based on identification cryptographic algorithm
CN106341424B (en) Video encryption system based on identity authentication and implementation method
CN112751668B (en) Low-cost Internet of things data encryption communication system
CN101539978A (en) Software protection method based on space

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant