CN114598482A - Encryption communication method and system for server and intelligent edge gateway - Google Patents

Encryption communication method and system for server and intelligent edge gateway Download PDF

Info

Publication number
CN114598482A
CN114598482A CN202011308938.1A CN202011308938A CN114598482A CN 114598482 A CN114598482 A CN 114598482A CN 202011308938 A CN202011308938 A CN 202011308938A CN 114598482 A CN114598482 A CN 114598482A
Authority
CN
China
Prior art keywords
server
edge gateway
keyy
key
key pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011308938.1A
Other languages
Chinese (zh)
Inventor
吴赟
连应华
陈孟铌
林军
林贞涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Institute Of Data Technology Co ltd
Original Assignee
Fuzhou Institute Of Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Institute Of Data Technology Co ltd filed Critical Fuzhou Institute Of Data Technology Co ltd
Priority to CN202011308938.1A priority Critical patent/CN114598482A/en
Publication of CN114598482A publication Critical patent/CN114598482A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A20/00Water conservation; Efficient water supply; Efficient water use
    • Y02A20/152Water filtration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the field of communication encryption, in particular to an encryption communication method and system for a server and an intelligent edge gateway. The encryption communication method between the server and the intelligent edge gateway comprises the following steps: the edge gateway generates a key pair KeyY; encrypting a public key of KeyY in the FPGA chip of the edge gateway through a preset public key to generate a ciphertext A, and sending the ciphertext A to a server; the server decrypts the ciphertext A through a preset private key to obtain a public key of the KeyY; and encrypting and decrypting communication data between the edge gateway and the server by using the key pair KeyY. Through the steps, the safety of the communication data between the edge gateway and the server is guaranteed.

Description

Encryption communication method and system for server and intelligent edge gateway
Technical Field
The invention relates to the field of communication encryption, in particular to an encryption communication method and system for a server and an intelligent edge gateway.
Background
The patent with publication number CN109787765A proposes an encryption method for a remote transmission gateway for online detection of water quality, which first performs chain encryption on data of a transmission frame by using elliptic curve encryption when transmitting data, then updates a signature according to the result of the chain encryption and writes the signature into the gateway, and the gateway checks the validity of the signature before powering on each time. The encryption technology ensures the configuration security of the remote gateway software.
Patent publication No. CN106941407A proposes a platform dynamic encryption method and apparatus, in which a key is generated into an instruction sequence by an encryption generator, and the instruction sequence encrypts a preprocessed plaintext according to the rule of an encryptor to obtain a final ciphertext. The secret key is generated by the sound card collecting the environmental noise data and the system time in a random corresponding mode, and the safety of the platform data is improved.
Patent publication No. CN109787765A discloses that the method directly sends out the public key and the private key after generating the key pair, and if the communication is attacked from outside, the public key and the private key can be stolen, and from this point of view, the security is not high.
The patent publication CN106941407A discloses that the algorithm for generating the key into the designated sequence is too complex, and requires first obtaining noise data by using a sound card, then constructing a full-rank matrix by using a random number, and then performing xor calculation with the system time, which has a high requirement on hardware performance of the device and may take a long time.
Disclosure of Invention
Therefore, it is necessary to provide an encryption communication method between a server and an intelligent edge gateway, so as to solve the problem of communication security between the server and the intelligent edge gateway in the prior art. The specific technical scheme is as follows:
an encryption communication method between a server and an intelligent edge gateway comprises the following steps:
the edge gateway generates a key pair KeyY;
encrypting a public key of KeyY in the FPGA chip of the edge gateway through a preset public key to generate a ciphertext A, and sending the ciphertext A to a server;
the server decrypts the ciphertext A through a preset private key to obtain a public key of the KeyY;
and encrypting and decrypting communication data between the edge gateway and the server by using the key pair KeyY.
Further, the "encrypting and decrypting the communication data between the edge gateway and the server by using key pair KeyY" specifically includes the steps of:
the server encrypts the first information to be sent by using a public key of KeyY, and sends the encrypted first information to be sent to the edge gateway;
the edge gateway decrypts the encrypted first information to be sent in the FPGA encryption chip through a KeyY private key to obtain the first information to be sent;
the edge gateway encrypts second information to be sent by using a private key of KeyY, and the edge gateway sends the encrypted second information to be sent to the server;
and the server decrypts the encrypted second information to be sent by using the public key of the KeyY to obtain the second information to be sent.
Further, the "edge gateway generates a key pair KeyY" specifically includes the steps of:
the edge gateway acquires information uploaded by the terminal equipment, and the edge gateway generates a key pair KeyY by using the uploaded information.
Further, the method also comprises the following steps:
and judging whether the key pair KeyY is generated from the edge gateway or not and the preset time for updating the key is reached, if the preset time for updating the key is reached, generating a new key pair KeyY, and encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY.
Further, the "encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY" specifically includes the steps of:
if the communication between the edge gateway and the server occurs in the valid period of the new key pair KeyY, encrypting the public key of the new KeyY by a preset public key in an FPGA chip of the edge gateway to generate a ciphertext A, and sending the ciphertext A to the server;
the server decrypts the ciphertext A through a preset private key to obtain a new public key of the KeyY;
and encrypting and decrypting communication data between the edge gateway and the server by using the new key pair KeyY.
Further, the "encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY" specifically includes the steps of:
and if the communication between the edge gateway and the server does not occur within the validity period of the new key pair KeyY, generating another new key pair KeyY again and destroying the previous new key pair KeyY.
Further, before the "edge gateway generates the key pair KeyY", the method further includes the steps of:
and the server generates a preset public and private key pair through a preset random number sequence, sends a preset public key to the edge gateway, and burns the preset public key into an FPGA chip of the edge gateway.
Furthermore, the preset public and private key pairs corresponding to each edge gateway are different;
and if a plurality of different preset public and private key pairs exist, establishing a public key and private key comparison table of the different preset public and private key pairs at the server side.
Further, the public key and private key comparison table also comprises a gateway label corresponding to each preset public and private key pair;
the gateway label is included in the set gateway protocol.
In order to solve the technical problem, the encryption communication system of the server and the intelligent edge gateway is further provided. The specific technical scheme is as follows:
an encrypted communication system of a server and an intelligent edge gateway, comprising: a server and an edge gateway;
the server corresponds to the above mentioned server;
the edge gateway corresponds to the edge gateway mentioned above.
The invention has the beneficial effects that: generating a key pair KeyY through the edge gateway; encrypting a public key of KeyY in the FPGA chip of the edge gateway through a preset public key to generate a ciphertext A, and sending the ciphertext A to a server; the server decrypts the ciphertext A through a preset private key to obtain a public key of the KeyY; and encrypting and decrypting communication data between the edge gateway and the server by using the key pair KeyY. The security of the communication data between the edge gateway and the server is guaranteed.
Drawings
Fig. 1 is a flowchart of an encrypted communication method between a server and an intelligent edge gateway according to an embodiment;
fig. 2 is a flowchart illustrating encryption and decryption of communication data between an edge gateway and a server by using key pair KeyY according to an embodiment;
fig. 3 is a schematic diagram illustrating an encrypted communication method between a server and an intelligent edge gateway according to an embodiment;
fig. 4 is a schematic diagram of an application scenario of an encryption communication method between a server and an intelligent edge gateway according to an embodiment;
fig. 5 is a schematic block diagram of an encrypted communication system between a server and an intelligent edge gateway according to an embodiment.
Description of reference numerals:
500. an encryption communication system of a server and an intelligent edge gateway,
501. the server is provided with a plurality of servers,
502. an edge gateway.
Detailed Description
To explain technical contents, structural features, and objects and effects of the technical solutions in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Referring to fig. 1 to 4, in this embodiment, an application scenario of an encryption communication method between a server and an intelligent edge gateway is shown in fig. 4, where a background server of the intelligent gateway is connected to the intelligent edge gateway through a network, the intelligent edge gateway has a bluetooth chip and is connected to a peripheral bluetooth bracelet through the bluetooth chip, and the bluetooth bracelet collects body data and a location of a wearer.
The following detailed description is made in conjunction with fig. 1 to 3:
step S101: the edge gateway generates a key pair KeyY.
Step S102: and encrypting the public key of the KeyY in the FPGA chip of the edge gateway through a preset public key to generate a ciphertext A, and sending the ciphertext A to a server.
Step S103: and the server decrypts the ciphertext A through a preset private key to obtain a public key of the KeyY.
Step S104: and encrypting and decrypting communication data between the edge gateway and the server by using the key pair KeyY.
Referring to fig. 2, the step S104 further includes the steps of:
step S201: the server encrypts the first information to be sent by using a public key of KeyY, and the server sends the encrypted first information to be sent to the edge gateway.
Step S202: and the edge gateway decrypts the encrypted first information to be sent in the FPGA encryption chip by a key of KeyY to obtain the first information to be sent.
Step S203: and the edge gateway encrypts the second information to be sent by using a private key of KeyY, and the edge gateway sends the encrypted second information to be sent to the server.
Step S204: and the server decrypts the encrypted second information to be sent by using the public key of the KeyY to obtain the second information to be sent.
Generating a key pair KeyY through the edge gateway; encrypting a public key of KeyY in the FPGA chip of the edge gateway through a preset public key to generate a ciphertext A, and sending the ciphertext A to a server; the server decrypts the ciphertext A through a preset private key to obtain a public key of the KeyY; and encrypting and decrypting communication data between the edge gateway and the server by using the key pair KeyY. The security of the communication data between the edge gateway and the server is guaranteed.
Further, the "edge gateway generates a key pair KeyY" specifically includes the steps of: the edge gateway acquires information uploaded by the terminal equipment, and the edge gateway generates a key pair KeyY by using the uploaded information. The method specifically comprises the following steps: the edge gateway collects data sent by the surrounding Bluetooth bracelets, so that the private key of the KeyY is generated by using the system time, the heart rate and the blood pressure in the data, as the data is less than 16 bits, the 16 bits are filled with random numbers, then the 16 numbers are randomly and disorderly arranged in sequence to serve as the private key of the KeyY, and the public key is generated by the private key. By generating the public and private key pair in this way, the calculation amount is small but the calculation amount is complex enough.
Referring to fig. 3, further, before the "edge gateway generates the key pair KeyY", the method further includes the steps of: and the server generates a preset public and private key pair through a preset random number sequence, sends a preset public key to the edge gateway, and burns the preset public key into an FPGA chip of the edge gateway. The preset public and private key pairs corresponding to each edge gateway are different; and if a plurality of different preset public and private key pairs exist, establishing a public key and private key comparison table of the different preset public and private key pairs at the server side.
Further, in order to speed up the decryption process. The public key and private key comparison table also comprises gateway labels corresponding to preset public and private key pairs of each team; the gateway label is included in the set gateway protocol. The method specifically comprises the following steps: when the server receives data of a certain edge gateway, the corresponding gateway label can be obtained, and the corresponding public and private key pair can be found according to the gateway label, so that the public and private key pair is prevented from being searched in a polling manner, and the decryption process is greatly accelerated.
As shown in fig. 3, further, the method further comprises the steps of: and judging whether the key pair KeyY is generated from the edge gateway or not and the preset time for updating the key is reached, if the preset time for updating the key is reached, generating a new key pair KeyY, and encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY. Namely, the key pair on the edge gateway is updated at intervals of updating the preset time, and even if the key in a certain period of time is stolen, the information security of subsequent communication can be ensured.
Further, the "encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY" specifically includes the steps of:
if the communication between the edge gateway and the server occurs in the valid period of the new key pair KeyY, encrypting the public key of the new KeyY by a preset public key in an FPGA chip of the edge gateway to generate a ciphertext A, and sending the ciphertext A to the server;
the server decrypts the ciphertext A through a preset private key to obtain a new public key of the KeyY;
and encrypting and decrypting communication data between the edge gateway and the server by using the new key pair KeyY.
If the server has data to send and uses the old secret key to encrypt before reporting the new secret key, that is, the edge gateway receives the information which can not be decrypted at the moment, the edge gateway sends a new key of KeyY encrypted by a preset public key, and then the server sends the information by using the encrypted public key. One point to be noted is that the encrypted public key of KeyY is only sent if the edge gateway updates the key pair and receives information that cannot be decrypted later. If the communication between the edge gateway and the server does not occur within the validity period of the new key pair KeyY, other new key pairs KeyY are generated again, and the last new key pair KeyY is destroyed.
In addition, the edge gateway is encrypted by using the FPGA chip, and the FPGA chip has strong data processing capacity and higher running speed, reduces data processing time delay and can timely send data and reply commands issued by the server.
Referring to fig. 3 to fig. 5, in the present embodiment, an embodiment of an encryption communication system 500 between a server and an intelligent edge gateway is as follows:
a server and intelligent edge gateway encrypted communication system 500, comprising: a server 501 and an edge gateway 502; wherein the edge gateway 502 is configured to generate a key pair KeyY;
encrypting a public key of the KeyY in the FPGA chip of the edge gateway 502 by a preset public key to generate a ciphertext a, and sending the ciphertext a to the server 501;
the server 501 decrypts the ciphertext a by using a preset private key to obtain a public key of KeyY;
the key pair KeyY is used to encrypt and decrypt the communication data between the edge gateway 502 and the server 501.
The encryption and decryption of the communication data between the edge gateway 502 and the server 501 by using the key pair KeyY may be specifically as follows:
the server 501 encrypts the first to-be-sent information by using a public key of KeyY, and the server 501 sends the encrypted first to-be-sent information to the edge gateway 502;
the edge gateway 502 decrypts the encrypted first information to be sent in the FPGA encryption chip by a key of KeyY to obtain the first information to be sent;
the edge gateway 502 encrypts the second information to be sent by using a key of KeyY, and the edge gateway 502 sends the encrypted second information to be sent to the server 501;
the server 501 decrypts the encrypted second information to be sent by using the public key of KeyY to obtain the second information to be sent.
Key pair KeyY is generated by edge gateway 502; encrypting a public key of the KeyY in the FPGA chip of the edge gateway 502 by a preset public key to generate a ciphertext a, and sending the ciphertext a to the server 501; the server 501 decrypts the ciphertext a by using a preset private key to obtain a public key of KeyY; the key pair KeyY is used to encrypt and decrypt the communication data between the edge gateway 502 and the server 501. The security of the communication data between the edge gateway 502 and the server 501 is guaranteed.
Further, the edge gateway 502 obtains information uploaded by the terminal device, and the edge gateway 502 generates a key pair KeyY by using the uploaded information. The method specifically comprises the following steps: the edge gateway 502 collects data sent by the surrounding bluetooth bracelet, so the private key of KeyY is generated by using the system time, the heart rate and the blood pressure in the data, and since the data is less than 16 bits, 16 bits are filled with random numbers, and then the 16 numbers are randomly and disorderly arranged in sequence to be used as the private key of KeyY, and the public key is generated by the private key. By generating the public and private key pair in this way, the calculation amount is small but the calculation amount is complex enough.
Referring to fig. 3, before the edge gateway 502 generates the key pair KeyY, the server 501 generates a preset public and private key pair by a preset random number sequence, sends a preset public key to the edge gateway 502, and burns the preset public key into the FPGA chip of the edge gateway 502. The preset public and private key pairs corresponding to each edge gateway 502 are different; if a plurality of different preset public and private key pairs exist, a public key and private key comparison table of the different preset public and private key pairs is established at the server 501.
Further, to speed up the decryption process. The public key and private key comparison table also comprises gateway labels corresponding to preset public and private key pairs of each team; the gateway label is included in the set gateway protocol. The method specifically comprises the following steps: when the server 501 receives data of a certain edge gateway 502, the corresponding gateway label can be obtained, and the corresponding public and private key pair can be found according to the gateway label, so that the public and private key pair is prevented from being searched in a polling manner, and the decryption process is greatly accelerated.
As shown in fig. 3, it is further determined whether the key pair KeyY is generated from the edge gateway 502 and the key update preset time is reached, and if the key update preset time is reached, a new key pair KeyY is generated and the new key pair KeyY is used to encrypt and decrypt the communication data between the edge gateway 502 and the server 501. That is, the key pair on the edge gateway 502 is updated every other preset time, so that even if the key in a certain period of time is stolen, the information security of subsequent communication can be ensured.
Further, in the validity period of the new key pair KeyY, if communication occurs between the edge gateway 502 and the server 501, the FPGA chip of the edge gateway 502 encrypts the public key of the new KeyY by a preset public key to generate a ciphertext a, and sends the ciphertext a to the server 501;
the server 501 decrypts the ciphertext a by using a preset private key to obtain a new public key of KeyY;
the new key pair KeyY is used to encrypt and decrypt the communication data between the edge gateway 502 and the server 501.
If the server 501 has data to send and uses the old key to encrypt before reporting the new key, that is, the edge gateway 502 receives the information that cannot be decrypted at this time, the edge gateway 502 sends a public key of the new KeyY encrypted by a preset public key, and then the server 501 sends the information encrypted by the public key. One point to note is that the encrypted public key of KeyY is only sent out after the edge gateway 502 updates the key pair and receives information that cannot be decrypted. If the communication between the edge gateway 502 and the server 501 does not occur within the validity period of the new key pair KeyY, another new key pair KeyY is generated again, and the last new key pair KeyY is destroyed.
In addition, the edge gateway 502 is encrypted by using an FPGA chip, and the FPGA chip has strong data processing capability and high operation speed, reduces data processing delay, and can timely send data and reply commands issued by the server 501.
It should be noted that, although the above embodiments have been described herein, the invention is not limited thereto. Therefore, based on the innovative concepts of the present invention, the technical solutions of the present invention can be directly or indirectly applied to other related technical fields by making changes and modifications to the embodiments described herein, or by using equivalent structures or equivalent processes performed in the content of the present specification and the attached drawings, which are included in the scope of the present invention.

Claims (10)

1. An encryption communication method between a server and an intelligent edge gateway is characterized by comprising the following steps:
the edge gateway generates a key pair KeyY;
encrypting a public key of KeyY in the FPGA chip of the edge gateway through a preset public key to generate a ciphertext A, and sending the ciphertext A to a server;
the server decrypts the ciphertext A through a preset private key to obtain a public key of the KeyY;
and encrypting and decrypting communication data between the edge gateway and the server by using the key pair KeyY.
2. The encryption communication method between the server and the intelligent edge gateway according to claim 1, wherein the encryption and decryption of the communication data between the edge gateway and the server by key pair KeyY further comprises the steps of:
the server encrypts the first information to be sent by using a public key of KeyY, and sends the encrypted first information to be sent to the edge gateway;
the edge gateway decrypts the encrypted first information to be sent in the FPGA encryption chip through a KeyY private key to obtain the first information to be sent;
the edge gateway encrypts second information to be sent by using a private key of KeyY, and the edge gateway sends the encrypted second information to be sent to the server;
and the server decrypts the encrypted second information to be sent by using the public key of the KeyY to obtain the second information to be sent.
3. The method for encrypted communication between a server and an intelligent edge gateway according to claim 1, wherein the step of generating a key pair KeyY by the edge gateway specifically includes the steps of:
the edge gateway acquires information uploaded by the terminal equipment, and the edge gateway generates a key pair KeyY by using the uploaded information.
4. The method for encrypted communication between a server and an intelligent edge gateway according to claim 1, further comprising the steps of:
and judging whether the key pair KeyY is generated from the edge gateway or not and the preset time for updating the key is reached, if the preset time for updating the key is reached, generating a new key pair KeyY, and encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY.
5. The encryption communication method between the server and the intelligent edge gateway according to claim 4, wherein the "encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY" further comprises the following steps:
if the communication between the edge gateway and the server occurs in the valid period of the new key pair KeyY, encrypting the public key of the new KeyY by a preset public key in an FPGA chip of the edge gateway to generate a ciphertext A, and sending the ciphertext A to the server;
the server decrypts the ciphertext A through a preset private key to obtain a new public key of the KeyY;
and encrypting and decrypting communication data between the edge gateway and the server by using the new key pair KeyY.
6. The encryption communication method between the server and the intelligent edge gateway according to claim 4, wherein the "encrypting and decrypting the communication data between the edge gateway and the server by using the new key pair KeyY" further comprises the following steps:
and if the communication between the edge gateway and the server does not occur within the validity period of the new key pair KeyY, generating another new key pair KeyY again and destroying the previous new key pair KeyY.
7. The method of claim 1, wherein before the "edge gateway generates the key pair KeyY", the method further comprises the steps of:
and the server generates a preset public and private key pair through a preset random number sequence, sends a preset public key to the edge gateway, and burns the preset public key into an FPGA chip of the edge gateway.
8. The method of claim 7, wherein the server is configured to perform the encrypted communication with the intelligent edge gateway,
the preset public and private key pairs corresponding to each edge gateway are different;
and if a plurality of different preset public and private key pairs exist, establishing a public key and private key comparison table of the different preset public and private key pairs at the server side.
9. The method of claim 8, wherein the server is further configured to perform the encryption communication with the intelligent edge gateway,
the public key and private key comparison table also comprises gateway labels corresponding to preset public and private key pairs of each team;
the gateway label is included in the set gateway protocol.
10. An encrypted communication system of a server and an intelligent edge gateway, comprising: a server and an edge gateway;
the server corresponds to the server in any one of claims 1 to 9;
the edge gateway corresponds to the edge gateway in any one of claims 1 to 9.
CN202011308938.1A 2020-11-20 2020-11-20 Encryption communication method and system for server and intelligent edge gateway Pending CN114598482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011308938.1A CN114598482A (en) 2020-11-20 2020-11-20 Encryption communication method and system for server and intelligent edge gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011308938.1A CN114598482A (en) 2020-11-20 2020-11-20 Encryption communication method and system for server and intelligent edge gateway

Publications (1)

Publication Number Publication Date
CN114598482A true CN114598482A (en) 2022-06-07

Family

ID=81813541

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011308938.1A Pending CN114598482A (en) 2020-11-20 2020-11-20 Encryption communication method and system for server and intelligent edge gateway

Country Status (1)

Country Link
CN (1) CN114598482A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454079A (en) * 2017-08-04 2017-12-08 西安电子科技大学 Lightweight device authentication and shared key machinery of consultation based on platform of internet of things
CN107493281A (en) * 2017-08-16 2017-12-19 海信集团有限公司 encryption communication method and device
CN107976973A (en) * 2016-10-24 2018-05-01 费希尔-罗斯蒙特系统公司 The process control communication of safety
CN110233795A (en) * 2019-07-09 2019-09-13 佳源科技有限公司 A kind of edge gateway of internet of things of encryption
CN110268690A (en) * 2017-02-06 2019-09-20 Pcms控股公司 Protect the equipment communication in Internet of Things
CN110324138A (en) * 2018-03-29 2019-10-11 阿里巴巴集团控股有限公司 Data encryption, decryption method and device
CN110768938A (en) * 2018-07-27 2020-02-07 上海汽车集团股份有限公司 Vehicle safety communication method and device
CN110784322A (en) * 2019-11-08 2020-02-11 北京金茂绿建科技有限公司 Method, system, equipment and medium for connecting gateway equipment and cloud platform
US20200134230A1 (en) * 2019-12-23 2020-04-30 Intel Corporation Protection of privacy and data on smart edge devices
CN111131204A (en) * 2019-12-12 2020-05-08 公安部第三研究所 Information security transmission method and system
CN111447067A (en) * 2020-03-19 2020-07-24 江苏方天电力技术有限公司 Encryption authentication method for power sensing equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107976973A (en) * 2016-10-24 2018-05-01 费希尔-罗斯蒙特系统公司 The process control communication of safety
CN110268690A (en) * 2017-02-06 2019-09-20 Pcms控股公司 Protect the equipment communication in Internet of Things
CN107454079A (en) * 2017-08-04 2017-12-08 西安电子科技大学 Lightweight device authentication and shared key machinery of consultation based on platform of internet of things
CN107493281A (en) * 2017-08-16 2017-12-19 海信集团有限公司 encryption communication method and device
CN110324138A (en) * 2018-03-29 2019-10-11 阿里巴巴集团控股有限公司 Data encryption, decryption method and device
CN110768938A (en) * 2018-07-27 2020-02-07 上海汽车集团股份有限公司 Vehicle safety communication method and device
CN110233795A (en) * 2019-07-09 2019-09-13 佳源科技有限公司 A kind of edge gateway of internet of things of encryption
CN110784322A (en) * 2019-11-08 2020-02-11 北京金茂绿建科技有限公司 Method, system, equipment and medium for connecting gateway equipment and cloud platform
CN111131204A (en) * 2019-12-12 2020-05-08 公安部第三研究所 Information security transmission method and system
US20200134230A1 (en) * 2019-12-23 2020-04-30 Intel Corporation Protection of privacy and data on smart edge devices
CN111447067A (en) * 2020-03-19 2020-07-24 江苏方天电力技术有限公司 Encryption authentication method for power sensing equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯?: "无线网络融合的安全技术研究" *

Similar Documents

Publication Publication Date Title
US8687800B2 (en) Encryption method for message authentication
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
JP2017063432A (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN106878016A (en) Data is activation, method of reseptance and device
US6640303B1 (en) System and method for encryption using transparent keys
CN110999202B (en) Computer-implemented system and method for highly secure, high-speed encryption and transmission of data
CN103986723B (en) A kind of secret communication control, secret communication method and device
CN111988299A (en) Method for establishing trusted link between client and server
CN110493124A (en) Protect the encryption instantaneous communication system and communication means of data safety
CN105099699A (en) Safe and high-efficiency communication method based on equipment of Internet of things and system
CN109218251B (en) Anti-replay authentication method and system
CN118540165A (en) Quantum security enhancement method for national security IPSec VPN protocol
CN112702332B (en) Chain key exchange method, client, server and system
Diallo et al. A secure authentication scheme for bluetooth connection
CN112907247A (en) Block chain authorization calculation control method
CN110149205B (en) Method for protecting Internet of things terminal by using block chain
CN114928503B (en) Method for realizing secure channel and data transmission method
CN114268441B (en) Quantum security application method, client device, server device and system
CN114285557B (en) Communication decryption method, system and device
CN114598482A (en) Encryption communication method and system for server and intelligent edge gateway
CN115834038A (en) Encryption method and device based on national commercial cryptographic algorithm
CN114928491A (en) Internet of things security authentication method, device and system based on identification cryptographic algorithm
CN111431846B (en) Data transmission method, device and system
CN111628872A (en) Safety authentication method for BACnet protocol equipment
CN110855628A (en) Data transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination