CN115118490A - Data confidentiality transmission method and system based on Internet of things - Google Patents

Data confidentiality transmission method and system based on Internet of things Download PDF

Info

Publication number
CN115118490A
CN115118490A CN202210728266.2A CN202210728266A CN115118490A CN 115118490 A CN115118490 A CN 115118490A CN 202210728266 A CN202210728266 A CN 202210728266A CN 115118490 A CN115118490 A CN 115118490A
Authority
CN
China
Prior art keywords
transmission
data
channel
party
data set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210728266.2A
Other languages
Chinese (zh)
Inventor
祁勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northern Ordnance Technology (Liaoning) Co.,Ltd.
Original Assignee
Shenyang Yanxun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenyang Yanxun Technology Co ltd filed Critical Shenyang Yanxun Technology Co ltd
Priority to CN202210728266.2A priority Critical patent/CN115118490A/en
Publication of CN115118490A publication Critical patent/CN115118490A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Abstract

The invention provides a data confidentiality transmission method and a data confidentiality transmission system based on the Internet of things, which relate to the technical field of information confidentiality transmission, wherein the transmission environment information of the Internet of things is acquired based on a data acquisition module, a first transmission party and a second transmission party are accessed, the acquired transmission data set is subjected to confidentiality filtering based on a data filtering module to acquire a confidential data set and a non-confidential data set, double transmission channels are configured and comprise an encryption channel and a non-encryption channel, the data transmission state is obtained according to the closed state of the double transmission channels and is further sent to the first transmission party and/or the second transmission party, the problem that the data security transmission method in the prior art is insufficient in intelligence is solved, the safety problem in the data transmission process can not be guaranteed, and the technical problem that the transmission channel adaptability can not be autonomously identified and regulated is solved, so that the safe and stable data transmission state is realized.

Description

Data confidentiality transmission method and system based on Internet of things
Technical Field
The invention relates to the technical field of information confidentiality transmission, in particular to a data confidentiality transmission method and system based on the Internet of things.
Background
Along with the development and the perfection of the internet of things, the internet of things has been applied to the aspects of daily life, and the transmission of data is carried out to the commonly used internet of things, and simultaneously, the data transmission safety problem of the internet of things has also become the hotspot problem of public attention, however, the existing data transmission mode of the internet of things is not mature enough, and has certain limitation, and the safe and stable transmission of data can not be guaranteed.
The existing data secret transmission method has insufficient intelligence, cannot guarantee the safety problem in the data transmission process, cannot carry out autonomous identification regulation and control on the adaptability of a transmission channel, and further influences the final transmission result.
Disclosure of Invention
The application provides a data confidentiality transmission method and system based on the Internet of things, which are used for solving the technical problems that the data confidentiality transmission method in the prior art is not intelligent enough, the safety problem in the data transmission process cannot be guaranteed, autonomous identification regulation and control cannot be carried out on the adaptability of a transmission channel, and the final transmission result is influenced.
In view of the above problems, the present application provides a data confidentiality transmission method and system based on the internet of things.
In a first aspect, the application provides a data confidentiality transmission method based on the internet of things, and the method includes: acquiring transmission environment information of the Internet of things based on the data acquisition module; accessing a first transmission party and a second transmission party, wherein the first transmission party is a data sending object, and the second transmission party is a data receiving object; acquiring a transmission data set used by the first transmission party to send to the second transmission party; carrying out secret filtration on the transmission data set through the data filtration module to obtain a secret data set and a non-secret data set; configuring a double transmission channel according to the transmission environment information of the internet of things, wherein the double transmission channel comprises an encryption channel and a non-encryption channel, the encryption channel is used for transmitting the secret data set, and the non-encryption channel is used for transmitting the non-secret data set; and acquiring a data transmission state according to the closed state of the double transmission channels, and sending the data transmission state to the first transmission party and/or the second transmission party.
In a second aspect, the present application provides a data confidentiality transmission system based on the internet of things, the system including: the information acquisition module is used for acquiring the transmission environment information of the Internet of things based on the data acquisition module; the system comprises a transmitter access module, a receiver access module and a receiver access module, wherein the transmitter access module is used for accessing a first transmitter and a second transmitter, the first transmitter is a data sending object, and the second transmitter is a data receiving object; a data acquisition module, configured to acquire a transmission data set used by the first transmission party to send to the second transmission party; the data set filtering module is used for carrying out secret filtering on the transmission data set through the data filtering module to obtain a secret data set and a non-secret data set; the channel configuration module is used for configuring a double transmission channel according to the transmission environment information of the Internet of things, wherein the double transmission channel comprises an encryption channel and a non-encryption channel, the encryption channel is used for transmitting the secret data set, and the non-encryption channel is used for transmitting the non-secret data set; and the state acquisition module is used for acquiring a data transmission state according to the closed state of the double transmission channels and sending the data transmission state to the first transmission party and/or the second transmission party.
One or more technical solutions provided in the present application have at least the following technical effects or advantages:
according to the data confidentiality transmission method based on the Internet of things, the data acquisition module is used for acquiring the transmission environment information of the Internet of things and accessing the transmission environment information to a first transmission party and a second transmission party, wherein the first transmission party is a data sending object, the second transmission party is a data receiving object, and a transmission data set used by the first transmission party for sending the transmission data to the second transmission party is further acquired; performing security filtering on the transmission data set based on the data filtering module to obtain a security data set and a non-security data set; the method comprises the steps of configuring double transmission channels according to the transmission environment information of the Internet of things, wherein the double transmission channels comprise an encryption channel and a non-encryption channel, the encryption channel is used for transmitting the confidential data set, the non-encryption channel is used for transmitting the non-confidential data set, the data transmission state is further determined according to the closing state of the double transmission channels, and then the data transmission state is sent to the first transmission party and/or the second transmission party.
Drawings
Fig. 1 is a schematic flow chart of a data confidentiality transmission method based on the internet of things provided in the present application;
fig. 2 is a schematic diagram illustrating a setting flow of an encryption key in a data confidentiality transmission method based on the internet of things;
fig. 3 is a schematic diagram illustrating a generation flow of a preset transmission delay coefficient in a data confidentiality transmission method based on the internet of things;
fig. 4 is a schematic structural diagram of a data confidentiality transmission system based on the internet of things.
Description of reference numerals: the system comprises an information acquisition module a, a transmission party access module b, a data acquisition module c, a data set filtering module d, a channel configuration module e and a state acquisition module f.
Detailed Description
The application further classifies the acquired transmission data set, determines a transmission channel according to the data type, further relieves time delay in information transmission, and further receives and decrypts the information.
Example one
As shown in fig. 1, the present application provides a data confidentiality transmission method based on the internet of things, which is applied to a data confidentiality transmission system based on the internet of things, and the system is in communication connection with a data acquisition module and a data filtering module, and the method includes:
step S100: acquiring transmission environment information of the Internet of things based on the data acquisition module;
specifically, the data confidentiality transmission method based on the internet of things sets an encryption key, acquires and classifies a transmission data set, further relieves the time delay of transmission completed by different transmission channels in information transmission, further receives and decrypts information, the internet of things can be accessed through various networks, so that a plurality of independently addressed common objects are interconnected and communicated with an information carrier, the transmission environment information of the internet of things is acquired through the data acquisition module, the transmission environment information of the internet of things comprises communication types, transmission technologies, data receiving formats and the like, exemplarily, common 3G, 4G and 5G based on honeycomb belong to long-distance wireless communication, a wide area network transmission technology is mainly adopted, the method can be used for GPS navigation positioning, video monitoring and the like, and data interactive operation can be carried out in a binary form, the transmission environment information of the Internet of things is collected, the information is further integrated and processed, and the information is stored in a corresponding system, so that the extraction and calling are convenient, and a basic information source is provided for the subsequent analysis of the information structure.
Step S200: accessing a first transmission party and a second transmission party, wherein the first transmission party is a data sending object, and the second transmission party is a data receiving object;
step S300: acquiring a transmission data set used by the first transmission party to send to the second transmission party;
specifically, the first transmission party and the second transmission party are determined, the first transmission party is a data sending object, the second transmission party is a data receiving object, the first transmission party and the second transmission party are connected based on the internet of things to form a whole, information can be transmitted, further, a transmission data set sent by the first transmission party to the second transmission party is collected by taking an access position point of the first transmission party and the second transmission party as a positioning point, the transmission data set comprises specific expression types, content information, information quantity and the like of data, data transmission is further performed based on the planning of a data transmission route of the internet of things, encryption keys are set based on the first transmission party and the second transmission party to guarantee data security, and data security is guaranteed by determining the first transmission party, And the second transmitter and the transmission data set form a foundation for the subsequent transmission analysis of the data.
Further, as shown in fig. 2, step S200 of the present application further includes:
step S210: acquiring a first encryption key according to the first transmitter;
step S220: acquiring a second encryption key according to the second transmission party;
step S230: sending the first encryption key and the second encryption key to a third party platform, realizing secondary encryption of the keys and outputting a secondary encryption key;
step S240: and respectively sending the secondary encryption key to the first transmission party and the second transmission party for decrypting the secret data set transmitted by the encryption channel.
Specifically, the first encryption key is obtained based on the first transmission party, the first encryption key is a key set by a data transmission object, the second encryption key is obtained based on the second transmission party, the second encryption key is a key set by a data reception object, the first encryption key and the second encryption key are different in set channel and belong to an internet of things company, but cooperate with each other, further, the first encryption key and the second encryption key are transmitted to a third party platform, the third party platform can perform secondary encryption on a password based on the first encryption key and the second encryption key to obtain the secondary encryption key, the secondary encryption key is an encryption key set by the third party, further, the third party transmits the set secondary encryption key to the first transmission party and the second transmission party respectively, and based on the set three-party key, decrypting the confidential data set transmitted by the encryption channel to extract the confidential data set.
Further, step S230 of the present application further includes:
step S231: judging whether the first transmitter and the second transmitter are in an subordinate authority relationship;
step S232: if the first transmitter and the second transmitter are in a subordinate authority relationship, acquiring a superior authority transmitter and a subordinate authority transmitter;
step S233: acquiring an authority encryption key based on the superior authority transmitter;
step S234: and sending the authority encryption key to the lower authority transmitter for decrypting the secret data set transmitted by the encryption channel.
Specifically, the subordinate authority relationship of the key set point of the first transmission party and the second transmission party is judged, whether the first transmission party and the second transmission party belong to the upper and lower authority relationship is determined, if the first transmission party and the second transmission party belong to the subordinate authority relationship, the data transmission between the same company is realized, a third-party platform can be avoided, the key transmission between the upper and lower levels can be directly carried out, the key is sent to the lower level by the upper level, the first transmission party and the second transmission party are further judged, the upper level authority transmission party and the lower level authority transmission party are determined, the setting of a secondary encryption key is carried out based on the upper level authority transmission party so as to obtain the authority encryption key, the authority encryption key is further sent to the lower level authority transmission party, and the decryption of the confidential data set transmitted by the encryption channel is completed, corresponding secret data is obtained.
Step S400: carrying out secret filtration on the transmission data set through the data filtration module to obtain a secret data set and a non-secret data set;
step S500: configuring a double transmission channel according to the transmission environment information of the internet of things, wherein the double transmission channel comprises an encryption channel and a non-encryption channel, the encryption channel is used for transmitting the secret data set, and the non-encryption channel is used for transmitting the non-secret data set;
specifically, the acquired transmission data set is extracted and screened, the secrecy filtering of the transmission data set is performed based on the data filtering module, the data filtering module can perform autonomous identification and authentication on the transmission data set, the transmission data set is classified based on the identification and authentication result, the secrecy data set and the non-secrecy data set are acquired, further data integration is performed and system storage is performed, wherein the secrecy data set and the non-secrecy data set respectively perform data transmission based on respective specific transmission channels, further, a dual transmission channel is configured based on the transmission environment information of the internet of things, the dual transmission channels respectively correspond to the encryption channel and the non-encryption channel, and the encryption channel is used for transmitting the secrecy data set, the non-encryption channel is used for transmitting a non-secret data set, the secret data set and the non-secret data set are transmitted simultaneously based on the two channels, further, synchronous transmission of the two data sets is guaranteed to be completed as far as possible, the time point of the two channels in a data transmission completion state is determined, the time difference between the two data sets is obtained, whether the time difference belongs to a limit range or not is judged, and corresponding operation is required to be adjusted and controlled if the time difference does not belong to the limit range, so that the simultaneity of channel transmission is guaranteed.
Further, as shown in fig. 3, step S400 of the present application further includes:
step S410: acquiring a secret data ratio of the secret data set to the transmission data set;
step S420: acquiring the non-secret data ratio of the non-secret data set to the transmission data set;
step S430: comparing the confidential data ratio with the non-confidential data ratio to obtain a data difference;
step S440: and generating a preset transmission delay coefficient according to the data difference and the transmission environment information of the internet of things, wherein the preset transmission delay coefficient is a time difference required when the encrypted channel and the unencrypted channel are respectively marked to be in a transmission completion state.
Specifically, the classification analysis of the data types of the transmission data set is performed, the secret data set and the non-secret data set are obtained, the data ratio analysis is further performed, the secret data ratio of the secret data set in the transmission data set and the non-secret data ratio of the non-secret data set in the transmission data set are obtained, the numerical value comparison between the secret data ratio and the non-secret data ratio is further performed, the data difference between the secret data ratio and the non-secret data ratio is obtained, the preset transmission delay coefficient is further generated based on the data difference and the transmission environment information of the internet of things, the preset transmission delay coefficient indicates the time difference required when the encryption channel and the non-encryption channel are respectively in the transmission completion state, and the secret data and the non-secret data are transmitted through respective specific transmission channels, and the data transmission paths corresponding to the encrypted channel and the non-encrypted channel are different from the transmission speed, so that the time intervals corresponding to the completion of data transmission are different, and the delay which should be generated is calculated to obtain the preset delay coefficient, thereby carrying out the planned transmission of the data.
Further, step S440 of the present application further includes:
step S441: respectively acquiring time information of the non-encryption channel and the encryption channel in a transmission completion state;
step S442: calculating time difference based on the time information of the non-encrypted channel and the encrypted channel in the transmission completion state, and outputting a real-time transmission delay coefficient;
step S443: and judging whether the real-time transmission delay coefficient is in the preset transmission delay coefficient, and if not, generating delay reminding information.
Specifically, the time information that the non-encrypted channel and the encrypted channel are in the transmission completion state is collected, the time difference between two time points is further calculated based on the time information of the transmission completion state, after the transmission of the transmission information of the encrypted channel is completed, the transmission completion degree of the transmission information of the non-encrypted channel is judged, the transmission time difference value corresponding to the completion of the transmission of the two data is determined, the real-time transmission delay coefficient is generated based on the transmission time difference, the real-time transmission delay coefficient is further judged, whether the real-time transmission delay coefficient is in the preset transmission delay coefficient or not is determined, the preset transmission delay coefficient indicates the limited range of the time difference required when the encrypted channel and the non-encrypted channel are in the transmission completion state respectively, and when the real-time transmission delay coefficient is in the preset transmission delay coefficient, the delay degree limiting range can be ignored when the transmission delay degree limiting range is in the delay degree limiting range, when the transmission delay degree limiting range is not in the delay degree limiting range, the delay reminding information is generated for warning, and transmission adjustment can be carried out through the received delay reminding information so that the transmission delay degree limiting range is in the preset transmission delay coefficient range.
Further, step S443 of the present application further includes:
step S4431: if the real-time transmission delay coefficient is not in the preset transmission delay coefficient, acquiring an overtime delay coefficient;
step S4432: inputting the overtime delay coefficient into a channel expansion module, and judging whether a channel expansion instruction is activated or not according to the channel expansion module;
step S4433: and if the channel expansion instruction is activated, acquiring an expansion channel which is connected in parallel to a channel to be expanded, wherein the channel to be expanded is a channel with delayed transmission in the non-encryption channel and the encryption channel.
Specifically, by performing a comparison determination between the real-time transmission delay coefficient and the preset transmission delay coefficient, generating delay prompting information for the real-time transmission delay coefficient not within the range of the preset transmission delay coefficient, generating the timeout delay coefficient based on the received delay prompting information, the timeout delay coefficient being a difference between the real-time transmission delay coefficient and the preset transmission delay coefficient, inputting the timeout delay coefficient into the channel expansion module, expanding the transmission channel based on the expanded channel module, thereby increasing the transmission time of data, determining whether a channel expansion command needs to be activated according to the channel expansion module, acquiring the expanded channel when the channel expansion command is activated, and acquiring the delay channels in the encrypted channel and the unencrypted channel at the same time, and determining the channel to be expanded as the channel to be expanded, further associating the expanded channel with the expanded channel, and further regulating and controlling the real-time transmission delay coefficient of the channel to be expanded.
Step S600: and acquiring a data transmission state according to the closed state of the double transmission channels, and sending the data transmission state to the first transmission party and/or the second transmission party.
Specifically, the transmission states of the dual transmission channels are collected, if the dual transmission channels are in a closed state, it is indicated that the dual transmission channels are in a data transmission completion state, if the dual transmission channels are in an open state, it is indicated that the dual transmission channels are in a data transmission process, the transmission states of the dual transmission channels are determined and sent to the first transmission party and/or the second transmission party, and the first transmission party and/or the second transmission party can determine whether to receive and decrypt data based on the acquired transmission states of the dual transmission channels.
Example two
Based on the data confidentiality transmission method based on the internet of things and the same inventive concept as the data confidentiality transmission method based on the internet of things in the previous embodiment, as shown in fig. 4, the application provides a data confidentiality transmission system based on the internet of things, and the system comprises:
the information acquisition module a is used for acquiring the transmission environment information of the Internet of things based on the data acquisition module;
the access module b of the transmission party is used for accessing a first transmission party and a second transmission party, wherein the first transmission party is a data sending object, and the second transmission party is a data receiving object;
a data obtaining module c, configured to obtain a transmission data set used by the first transmission party to send to the second transmission party;
the data set filtering module d is used for carrying out secret filtering on the transmission data set through the data filtering module to obtain a secret data set and a non-secret data set;
a channel configuration module e, configured to configure a dual transmission channel according to the transmission environment information of the internet of things, where the dual transmission channel includes an encrypted channel and an unencrypted channel, the encrypted channel is used to transmit the secret data set, and the unencrypted channel is used to transmit the insecure data set;
and the state acquisition module f is used for acquiring a data transmission state according to the closed state of the double transmission channels and sending the data transmission state to the first transmission party and/or the second transmission party.
Further, the system further comprises:
a first encryption key obtaining module, configured to obtain a first encryption key according to the first transmission party;
a second encryption key obtaining module, configured to obtain a second encryption key according to the second transmission party;
the secondary encryption module is used for sending the first encryption key and the second encryption key to a third party platform, realizing secondary encryption of the keys and outputting a secondary encryption key;
and the data decryption module is used for respectively sending the secondary encryption key to the first transmission party and the second transmission party and decrypting the confidential data set transmitted by the encryption channel.
Further, the system further comprises:
the relation judging module is used for judging whether the first transmission party and the second transmission party are in a subordinate authority relation or not;
a transmitter acquiring module, configured to acquire a higher authority transmitter and a lower authority transmitter if the first transmitter and the second transmitter are in a subordinate authority relationship;
the key acquisition module is used for acquiring a permission encryption key based on the superior permission transmitter;
and the key sending module is used for sending the authority encryption key to the subordinate authority transmitter and decrypting the secret data set transmitted by the encryption channel.
Further, the system further comprises:
the secret data ratio acquisition module is used for acquiring the secret data ratio of the secret data set in the transmission data set;
the non-secret data ratio acquisition module is used for acquiring the non-secret data ratio of the non-secret data set to the transmission data set;
the data comparison module is used for comparing the confidential data ratio with the non-confidential data ratio to obtain a data difference;
and the delay coefficient generation module is used for generating a preset transmission delay coefficient according to the data difference and the transmission environment information of the internet of things, wherein the preset transmission delay coefficient is a time difference required by identifying that the encrypted channel and the unencrypted channel are respectively in a transmission completion state.
Further, the system further comprises:
the time information acquisition module is used for respectively acquiring the time information of the non-encrypted channel and the encrypted channel in a transmission completion state;
the delay coefficient output module is used for calculating time difference based on the time information of the non-encrypted channel and the encrypted channel in the transmission completion state and outputting a real-time transmission delay coefficient;
and the delay coefficient judgment module is used for judging whether the real-time transmission delay coefficient is in the preset transmission delay coefficient or not, and if not, generating delay reminding information.
Further, the system further comprises:
the overtime coefficient acquisition module is used for acquiring an overtime delay coefficient if the real-time transmission delay coefficient is not in the preset transmission delay coefficient;
the instruction judging module is used for inputting the overtime delay coefficient into a channel expansion module and judging whether a channel expansion instruction is activated or not according to the channel expansion module;
and the instruction activation module is used for acquiring an expansion channel and connecting the expansion channel to a channel to be expanded in parallel if a channel expansion instruction is activated, wherein the channel to be expanded is a channel with delayed transmission in the unencrypted channel and the encrypted channel.
In the present specification, through the foregoing detailed description of the data confidentiality transmission method based on the internet of things, those skilled in the art can clearly know that the data confidentiality transmission method and system based on the internet of things in the present embodiment are described in a simpler manner as the apparatus disclosed in the embodiment corresponds to the method disclosed in the embodiment, and reference may be made to the method for partial description for relevant points.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A data confidentiality transmission method based on the Internet of things is characterized by being applied to a data confidentiality transmission system based on the Internet of things, wherein the system is in communication connection with a data acquisition module and a data filtering module, and the method comprises the following steps:
acquiring transmission environment information of the Internet of things based on the data acquisition module;
accessing a first transmission party and a second transmission party, wherein the first transmission party is a data sending object, and the second transmission party is a data receiving object;
acquiring a transmission data set used by the first transmission party to send to the second transmission party;
carrying out security filtering on the transmission data set through the data filtering module to obtain a security data set and a non-security data set;
configuring a double transmission channel according to the transmission environment information of the internet of things, wherein the double transmission channel comprises an encryption channel and a non-encryption channel, the encryption channel is used for transmitting the secret data set, and the non-encryption channel is used for transmitting the non-secret data set;
and acquiring a data transmission state according to the closed state of the double transmission channels, and sending the data transmission state to the first transmission party and/or the second transmission party.
2. The method of claim 1, wherein the method further comprises:
acquiring a first encryption key according to the first transmitter;
acquiring a second encryption key according to the second transmitter;
sending the first encryption key and the second encryption key to a third party platform, realizing secondary encryption of the keys and outputting a secondary encryption key;
and respectively sending the secondary encryption key to the first transmission party and the second transmission party for decrypting the secret data set transmitted by the encryption channel.
3. The method of claim 2, wherein the method further comprises:
judging whether the first transmitter and the second transmitter are in an subordinate authority relationship;
if the first transmitter and the second transmitter are in a subordinate authority relationship, acquiring a superior authority transmitter and a subordinate authority transmitter;
acquiring an authority encryption key based on the superior authority transmitter;
and sending the authority encryption key to the lower authority transmitter for decrypting the secret data set transmitted by the encryption channel.
4. The method of claim 1, wherein the method further comprises:
acquiring a secret data ratio of the secret data set to the transmission data set;
acquiring the non-secret data ratio of the non-secret data set to the transmission data set;
comparing the confidential data ratio with the non-confidential data ratio to obtain a data difference;
and generating a preset transmission delay coefficient according to the data difference and the transmission environment information of the internet of things, wherein the preset transmission delay coefficient is a time difference required when the encrypted channel and the unencrypted channel are respectively marked to be in a transmission completion state.
5. The method of claim 4, wherein the method further comprises:
respectively acquiring time information of the non-encryption channel and the encryption channel in a transmission completion state;
calculating time difference based on the time information of the non-encrypted channel and the encrypted channel in the transmission completion state, and outputting a real-time transmission delay coefficient;
and judging whether the real-time transmission delay coefficient is in the preset transmission delay coefficient, and if not, generating delay reminding information.
6. The method of claim 5, wherein the method further comprises:
if the real-time transmission delay coefficient is not in the preset transmission delay coefficient, acquiring an overtime delay coefficient;
inputting the overtime delay coefficient into a channel expansion module, and judging whether a channel expansion instruction is activated or not according to the channel expansion module;
and if the channel expansion instruction is activated, acquiring an expansion channel which is connected in parallel to a channel to be expanded, wherein the channel to be expanded is a channel with delayed transmission in the non-encryption channel and the encryption channel.
7. The data confidentiality transmission system based on the Internet of things is characterized by being in communication connection with a data acquisition module and a data filtering module, and comprising:
the information acquisition module is used for acquiring the transmission environment information of the Internet of things based on the data acquisition module;
the system comprises a transmitter access module, a receiver access module and a receiver access module, wherein the transmitter access module is used for accessing a first transmitter and a second transmitter, the first transmitter is a data sending object, and the second transmitter is a data receiving object;
a data acquisition module, configured to acquire a transmission data set used by the first transmission party to send to the second transmission party;
the data set filtering module is used for carrying out secret filtering on the transmission data set through the data filtering module to obtain a secret data set and a non-secret data set;
the channel configuration module is used for configuring a double transmission channel according to the transmission environment information of the Internet of things, wherein the double transmission channel comprises an encryption channel and a non-encryption channel, the encryption channel is used for transmitting the secret data set, and the non-encryption channel is used for transmitting the non-secret data set;
and the state acquisition module is used for acquiring a data transmission state according to the closed state of the double transmission channels and sending the data transmission state to the first transmission party and/or the second transmission party.
CN202210728266.2A 2022-06-24 2022-06-24 Data confidentiality transmission method and system based on Internet of things Pending CN115118490A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210728266.2A CN115118490A (en) 2022-06-24 2022-06-24 Data confidentiality transmission method and system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210728266.2A CN115118490A (en) 2022-06-24 2022-06-24 Data confidentiality transmission method and system based on Internet of things

Publications (1)

Publication Number Publication Date
CN115118490A true CN115118490A (en) 2022-09-27

Family

ID=83328809

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210728266.2A Pending CN115118490A (en) 2022-06-24 2022-06-24 Data confidentiality transmission method and system based on Internet of things

Country Status (1)

Country Link
CN (1) CN115118490A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296935A (en) * 2022-10-08 2022-11-04 华诺网络科技有限公司 Information security data processing method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1743993A (en) * 2004-09-02 2006-03-08 国际商业机器公司 Method for reducing encrypt latency impact on standard traffic and system thereof
US20110150220A1 (en) * 2007-11-30 2011-06-23 Thales Method for Securing a Bi-Directional Communication Channel and Device for Implementing said Method
CN105992201A (en) * 2016-04-01 2016-10-05 努比亚技术有限公司 Data transmission terminal, method and system
CN107070881A (en) * 2017-02-20 2017-08-18 北京古盘创世科技发展有限公司 key management method, system and user terminal
CN108924121A (en) * 2018-06-28 2018-11-30 京信通信系统(中国)有限公司 Multichannel communication method and system
CN112564887A (en) * 2020-11-30 2021-03-26 北京百度网讯科技有限公司 Key protection processing method, device, equipment and storage medium
CN113835378A (en) * 2021-09-24 2021-12-24 宁波海特技术转移有限公司 Wisdom garden information security transmission system based on thing networking

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1743993A (en) * 2004-09-02 2006-03-08 国际商业机器公司 Method for reducing encrypt latency impact on standard traffic and system thereof
US20110150220A1 (en) * 2007-11-30 2011-06-23 Thales Method for Securing a Bi-Directional Communication Channel and Device for Implementing said Method
CN105992201A (en) * 2016-04-01 2016-10-05 努比亚技术有限公司 Data transmission terminal, method and system
CN107070881A (en) * 2017-02-20 2017-08-18 北京古盘创世科技发展有限公司 key management method, system and user terminal
CN108924121A (en) * 2018-06-28 2018-11-30 京信通信系统(中国)有限公司 Multichannel communication method and system
CN112564887A (en) * 2020-11-30 2021-03-26 北京百度网讯科技有限公司 Key protection processing method, device, equipment and storage medium
CN113835378A (en) * 2021-09-24 2021-12-24 宁波海特技术转移有限公司 Wisdom garden information security transmission system based on thing networking

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115296935A (en) * 2022-10-08 2022-11-04 华诺网络科技有限公司 Information security data processing method and system
CN115296935B (en) * 2022-10-08 2022-12-20 华诺网络科技有限公司 Information security data processing method and system

Similar Documents

Publication Publication Date Title
RU2147792C1 (en) Method for using encrypting server for encrypting messages
US7986940B2 (en) Automatic wireless network linking method with security configuration and device thereof
US7143436B2 (en) Device authentication management system
US5956406A (en) Method of setting up secure communications and associated encryption/decryption system
US20050071646A1 (en) Portable device and method for accessing data key actuated devices
CN1444362A (en) Distribution method of wireless local area network encrypted keys
CN101333892B (en) Safety processing method of RFID system for door lock
US8325926B2 (en) Method for providing a broadcast encryption based home security system
US20190260580A1 (en) System and method for controlling access to encrypted vehicular data
US20060056634A1 (en) Apparatus, system and method for setting security information on wireless network
CN115118490A (en) Data confidentiality transmission method and system based on Internet of things
KR102368333B1 (en) Medical institution data relay device, medical data application device, and medical data management system using block chain
CN115118419B (en) Data transmission method of security chip, security chip device, equipment and medium
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
EP2549784A1 (en) Wireless communication apparatus and method of preventing leakage of encrypted key
CN112383531A (en) Monitoring system and monitoring system configuration method
CN113268753B (en) Block chain-based data controlled circulation method
CN113240836A (en) Bluetooth lock connection method adopting two-dimensional code and related configuration system
US11297063B2 (en) Method for user administration of a field device
CN109885616B (en) Information security acquisition and important information identification method and device
CN114221826B (en) Distributed encryption system for Internet of things
CN110545263B (en) Decryption method, encryption method, terminal device, server and readable storage medium
KR101834632B1 (en) Security system of moving object information and security method of moving object information using the system
TWI622886B (en) Regional data sharing system and method
CN112507269B (en) Website background risk assessment system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240403

Address after: No. 861-3 (201), Shangshengou Village, Hunnan District, Shenyang City, Liaoning Province, 110167, E03-230-4

Applicant after: Northern Ordnance Technology (Liaoning) Co.,Ltd.

Country or region after: China

Address before: Room 411, No. 59-1, Minglian Road, Huanggu District, Shenyang City, Liaoning Province 110037

Applicant before: Shenyang Yanxun Technology Co.,Ltd.

Country or region before: China