CN112995190A - Internet of things data security method and device based on security authentication - Google Patents
Internet of things data security method and device based on security authentication Download PDFInfo
- Publication number
- CN112995190A CN112995190A CN202110265654.7A CN202110265654A CN112995190A CN 112995190 A CN112995190 A CN 112995190A CN 202110265654 A CN202110265654 A CN 202110265654A CN 112995190 A CN112995190 A CN 112995190A
- Authority
- CN
- China
- Prior art keywords
- data
- authentication
- security
- unit
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000013499 data model Methods 0.000 claims abstract description 46
- 230000008447 perception Effects 0.000 claims abstract description 32
- 230000005540 biological transmission Effects 0.000 claims abstract description 13
- 230000015654 memory Effects 0.000 claims description 14
- 230000004927 fusion Effects 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 5
- 230000003993 interaction Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 abstract description 7
- 238000013461 design Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a security authentication-based Internet of things data security method and device, which comprises the steps of sending an identity authentication request to a local security authentication database and a security authentication layer of a cloud when a data use terminal needs to acquire data; acquiring sensing data of the sensing node after the sensing node passes the data; and the data use terminal acquires a data model from a data processing center and brings the perception data into the data model to acquire result data. The method is suitable for avoiding the untrusted data using terminal from acquiring the data of the sensing node through local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node; the user terminal can not directly process the sensing data, needs to process the sensing data by the data model, and needs to perform identity authentication before the data user terminal obtains the data model, so that the data security is improved.
Description
Technical Field
The invention belongs to the field of safe Internet of things, and particularly relates to a method and a device for Internet of things data security based on security authentication.
Background
The internet of things is an important component of a new generation of information technology, and as the name suggests, the internet of things is the internet with connected objects, which has two meanings: firstly, the core and the foundation of the internet of things are the internet, and the internet is an extended and expanded network on the basis of the internet; secondly, the user end extends and expands to any object to carry out information exchange and communication, therefore, the definition of the internet of things is as follows: any object is connected with the Internet according to an agreed protocol through information sensing equipment such as radio frequency identification, an infrared sensor, a global positioning system, a laser scanner and the like to carry out information exchange and communication, so that a network for intelligently identifying, positioning, tracking, monitoring and managing the object is realized.
With the development of information communication technology, security threats faced by communication networks are increasingly diversified, security problems such as important information leakage and stealing are very prominent, the internet of things also faces huge potential safety hazards, and problems such as illegal stealing of sensing data and leakage of important data do not have good solutions.
Disclosure of Invention
The invention aims to provide a method and a device for the data security of the Internet of things based on security authentication; the problems of illegal stealing of sensing data and leakage of important data are solved.
In a first aspect, the invention provides an internet of things data security method based on security authentication, which comprises the following steps:
when the data using terminal needs to acquire data, identity authentication is carried out on a local security authentication database, and meanwhile an identity authentication request is sent to a security authentication layer at the cloud end;
the data use terminal firstly receives identity authentication passing information of a local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit;
the security authentication layer judges whether the data use terminal passes authentication or not; after passing the authentication, establishing a secure transmission channel with a data processing center at the cloud end;
and the data use terminal acquires a data model from a data processing center and brings the perception data into the data model to acquire result data.
According to the technical content, the method is suitable for acquiring the data of the sensing node only after local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node, so that the situation that the data using terminal is not trusted to acquire the data of the sensing node can be well avoided, and the security of the sensing data is improved; in addition, the sensing data are processed by acquiring the data model corresponding to the sensing data at the cloud end, so that on one hand, the data model can be ensured to be up-to-date, on the other hand, the data use terminal cannot directly output the sensing data and needs to process the sensing data by the data model, and the security of the sensing data is further improved; moreover, the data use terminal also needs to perform identity authentication before acquiring the data model, so that the data security is further improved.
In one possible design, the method for the security authentication layer to determine whether the data usage terminal is authenticated is as follows: the safety authentication layer judges whether the data use terminal successfully receives the sensing node, and if so, the data use terminal passes the authentication; if not, the primary identity authentication is carried out on the data use terminal; the authentication of the primary identity comprises identification code authentication or password authentication.
In one possible design, after the data use terminal obtains the perception data, the data use terminal also transmits the perception data to a data processing center, and the data processing center trains the data model by using the perception data as basic data. Data processing center is given through data transmission with data use terminal uses, and under the more condition of quantity, data processing center is used for training basic data of data model can be abundanter for data module is more perfect, and is more accurate practical.
In one possible design, the data processing center also directly receives sensing data of other sensing nodes networked as basic data to train the data model.
In one possible design, the sensing data is data subjected to data fusion through a local security authentication database and subjected to public key encryption when being sent to the data use terminal.
The invention provides a data control device of the internet of things based on security authentication, which comprises an identity authentication request unit, a security authentication database unit, a perception data acquisition unit, a storage unit transceiving unit, a data model acquisition unit and a result data calculation unit, wherein,
the identity authentication request unit is used for performing identity authentication to the local security authentication database unit and simultaneously sending an identity authentication request to the security authentication layer of the cloud when the data using terminal needs to acquire data;
the safety certification database unit is used for receiving the identity certification information sent by the identity certification request unit and carrying out identity certification;
the sensing data acquisition unit is used for acquiring sensing data of the sensing node;
the storage unit is used for storing the perception data acquired by the perception data acquisition unit;
the receiving and transmitting unit is used for carrying out data interaction with the sensing node and a data processing center of the cloud;
the data model acquisition unit is used for acquiring a data model from the data processing center;
and the result data calculation unit is used for bringing the perception data into the data model to obtain result data.
In one possible design, the security authentication database unit comprises an identification code authentication unit and/or a password authentication unit, and the identification code authentication unit is used for performing primary identity authentication on the data use terminal through an identification code; and the password authentication unit is used for authenticating the initial identity of the data using terminal through a password.
In one possible design, the data usage terminal further transmits the perception data to the data processing center, and the data processing center trains the data model by using the perception data as basic data.
In one possible design, the security authentication database unit includes a data fusion unit, a data encryption unit and a data sending unit, the data fusion unit is configured to perform data fusion on the sensing number, the data encryption unit is configured to encrypt the fused data, and the data sending unit is configured to send the encrypted data to the data using terminal.
The invention provides a security authentication-based data security device of the internet of things, which comprises a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for transceiving messages, and the processor is used for reading the computer program and executing the security authentication-based data security method of the internet of things according to any one of the first aspect and the first aspect.
Has the advantages that:
1. the method is suitable for acquiring the data of the sensing node only after local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node, so that the data using terminal which is not trusted can be well prevented from acquiring the data of the sensing node, and the security of the sensing data is improved; in addition, the sensing data are processed by acquiring the data model corresponding to the sensing data at the cloud end, so that on one hand, the data model can be ensured to be up-to-date, on the other hand, the data use terminal cannot directly output the sensing data and needs to process the sensing data by the data model, and the security of the sensing data is further improved; moreover, the data use terminal also needs to perform identity authentication before acquiring the data model, so that the data security is further improved, and in conclusion, the problems of illegal stealing of sensing data and leakage of important data can be solved;
2. data processing center is given through data transmission with data use terminal uses, and under the more condition of quantity, data processing center is used for training basic data of data model can be abundanter for data module is more perfect, and is more accurate practical.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow diagram of a data security method of the internet of things based on security authentication provided by the invention.
Fig. 2 is a schematic diagram of unit modules of an internet of things data security device based on security authentication provided by the invention.
Detailed Description
The invention is further described with reference to the following figures and specific embodiments. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. Specific structural and functional details disclosed herein are merely illustrative of example embodiments of the invention. This invention may, however, be embodied in many alternate forms and should not be construed as limited to the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that, for the term "and/or" as may appear herein, it is merely an associative relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, B exists alone, and A and B exist at the same time; for the term "/and" as may appear herein, which describes another associative object relationship, it means that two relationships may exist, e.g., a/and B, may mean: a exists independently, and A and B exist independently; in addition, for the character "/" that may appear herein, it generally means that the former and latter associated objects are in an "or" relationship.
It will be understood that when an element is referred to herein as being "connected," "connected," or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Conversely, if a unit is referred to herein as being "directly connected" or "directly coupled" to another unit, it is intended that no intervening units are present. In addition, other words used to describe the relationship between elements should be interpreted in a similar manner (e.g., "between … …" versus "directly between … …", "adjacent" versus "directly adjacent", etc.).
It is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, numbers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative designs, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
It should be understood that specific details are provided in the following description to facilitate a thorough understanding of example embodiments. However, it will be understood by those of ordinary skill in the art that the example embodiments may be practiced without these specific details. For example, systems may be shown in block diagrams in order not to obscure the examples in unnecessary detail. In other instances, well-known processes, structures and techniques may be shown without unnecessary detail in order to avoid obscuring example embodiments.
As shown in fig. 1, the internet of things data security method based on security authentication provided in the first aspect of this embodiment includes the following steps:
when the data using terminal needs to acquire data, identity authentication is carried out on a local security authentication database, and meanwhile an identity authentication request is sent to a security authentication layer at the cloud end;
the data use terminal firstly receives identity authentication passing information of a local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit;
the security authentication layer judges whether the data use terminal passes authentication or not; after passing the authentication, establishing a secure transmission channel with a data processing center at the cloud end;
and the data use terminal establishes a safe transmission channel and brings the sensing data into the data model to obtain result data.
According to the technical content, the method is suitable for acquiring the data of the sensing node only after local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node, so that the situation that the data using terminal is not trusted to acquire the data of the sensing node can be well avoided, and the security of the sensing data is improved; in addition, the sensing data are processed by acquiring the data model corresponding to the sensing data at the cloud end, so that on one hand, the data model can be ensured to be up-to-date, on the other hand, the data use terminal cannot directly output the sensing data and needs to process the sensing data by the data model, and the security of the sensing data is further improved; moreover, the data use terminal also needs to perform identity authentication before acquiring the data model, so that the data security is further improved.
During specific implementation, the data use terminal can be a mobile phone, for example, in the field of home internet of things, use perception data in the household appliance with the internet of things function can be obtained, and personal living habits can be obtained through corresponding perception data and a data model special for a cloud.
In specific implementation, the method for the security authentication layer to judge whether the data use terminal passes the authentication is as follows: the safety authentication layer judges whether the data use terminal successfully receives the sensing node, and if so, the data use terminal passes the authentication; if not, the primary identity authentication is carried out on the data use terminal; the authentication of the primary identity comprises identification code authentication or password authentication.
In a possible implementation manner, after the data usage terminal obtains the perception data, the data usage terminal further transmits the perception data to a data processing center, and the data processing center trains the data model by using the perception data as basic data. Data processing center is given through data transmission with data use terminal uses, and under the more condition of quantity, data processing center is used for training basic data of data model can be abundanter for data module is more perfect, and is more accurate practical.
In one possible implementation, the data processing center also directly receives sensing data of other sensing nodes networked as basic data to train the data model.
In a possible implementation manner, the sensing data is data subjected to data fusion through the local security authentication database and subjected to public key encryption when being sent to the data use terminal.
A second aspect of the present embodiment provides an internet of things data control apparatus based on security authentication, as shown in fig. 2, including an identity authentication request unit, a security authentication database unit, a sensing data obtaining unit, a storage unit, a transceiving unit, a data model obtaining unit, and a result data calculating unit, wherein,
the identity authentication request unit is used for performing identity authentication to the local security authentication database unit and simultaneously sending an identity authentication request to the security authentication layer of the cloud when the data using terminal needs to acquire data;
the safety certification database unit is used for receiving the identity certification information sent by the identity certification request unit and carrying out identity certification;
the sensing data acquisition unit is used for acquiring sensing data of the sensing node;
the storage unit is used for storing the perception data acquired by the perception data acquisition unit;
the receiving and transmitting unit is used for carrying out data interaction with the sensing node and a data processing center of the cloud;
the data model acquisition unit is used for acquiring a data model from the data processing center;
and the result data calculation unit is used for bringing the perception data into the data model to obtain result data.
In a possible implementation manner, the security authentication database unit comprises an identification code authentication unit and/or a password authentication unit, wherein the identification code authentication unit is used for performing primary identity authentication on the data use terminal through an identification code; and the password authentication unit is used for authenticating the initial identity of the data using terminal through a password.
In a possible implementation manner, the data usage terminal further transmits perception data to the data processing center, and the data processing center trains the data model by using the perception data as basic data.
In a possible implementation manner, the security authentication database unit includes a data fusion unit, a data encryption unit, and a data transmission unit, where the data fusion unit is configured to perform data fusion on the sensing number, the data encryption unit is configured to encrypt the fused data, and the data transmission unit is configured to transmit the encrypted data to the data using terminal.
The invention provides a security authentication-based data security device of the internet of things, which comprises a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for transceiving messages, and the processor is used for reading the computer program and executing the security authentication-based data security method of the internet of things according to any one of the first aspect and the first aspect.
For example, the Memory may include, but is not limited to, a Random-Access Memory (RAM), a Read-Only Memory (ROM), a Flash Memory (Flash Memory), a First-in First-out (FIFO), and/or a First-in Last-out (FILO), and the like; the processor may not be limited to the use of a microprocessor model number STM32F105 family; the transceiver may be, but is not limited to, a Wireless Fidelity (WiFi) Wireless transceiver, a bluetooth Wireless transceiver, a General Packet Radio Service (GPRS) Wireless transceiver, a ZigBee Wireless transceiver (ieee 802.15.4 standard-based low power local area network protocol), and/or a ZigBee Wireless transceiver. In addition, the internet of things data security device based on security authentication can also comprise, but is not limited to, a power supply module, a display screen and other necessary components.
A fourth aspect of the present embodiment provides a computer-readable storage medium storing instructions that include any one of the possible designs of the method for securing data of the internet of things based on security certification in the first aspect, and that is, the computer-readable storage medium stores instructions that, when executed on a computer, perform the method for controlling data of the internet of things based on security certification in the first aspect. The computer-readable storage medium refers to a carrier for storing data, and may include, but is not limited to, floppy disks, optical disks, hard disks, flash memories, flash disks and/or Memory sticks (Memory sticks), etc., and the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
For a working process, working details, and technical effects of the foregoing computer-readable storage medium provided in the fourth aspect of this embodiment, reference may be made to the interaction method in any one of the above first aspect or the first aspect, which is not described herein again.
A fifth aspect of the present embodiment provides a computer program product containing instructions, which when executed on a computer, cause the computer to execute a method for controlling data of an internet of things based on security certification as described in the first aspect or any one of the possible designs of the first aspect. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices.
The embodiments described above are merely illustrative, and may or may not be physically separate, if referring to units illustrated as separate components; if reference is made to a component displayed as a unit, it may or may not be a physical unit, and may be located in one place or distributed over a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: modifications may be made to the embodiments described above, or equivalents may be substituted for some of the features described. And such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Finally, it should be noted that the present invention is not limited to the above alternative embodiments, and that various other forms of products can be obtained by anyone in light of the present invention. The above detailed description should not be taken as limiting the scope of the invention, which is defined in the claims, and which the description is intended to be interpreted accordingly.
Claims (10)
1. A data security method of the Internet of things based on security authentication is characterized by comprising the following steps:
when the data using terminal needs to acquire data, identity authentication is carried out on a local security authentication database, and meanwhile an identity authentication request is sent to a security authentication layer at the cloud end;
the data use terminal firstly receives identity authentication passing information of a local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit;
the security authentication layer judges whether the data use terminal passes authentication or not; after passing the authentication, establishing a secure transmission channel with a data processing center at the cloud end;
and the data use terminal acquires a data model from a data processing center and brings the perception data into the data model to acquire result data.
2. The internet of things data security method based on security authentication as claimed in claim 1, wherein the method for the security authentication layer to determine whether the data using terminal passes authentication is as follows: the safety authentication layer judges whether the data use terminal successfully receives the sensing node, and if so, the data use terminal passes the authentication; if not, the primary identity authentication is carried out on the data use terminal; the authentication of the primary identity comprises identification code authentication or password authentication.
3. The Internet of things data security method based on security certification as claimed in claim 1, wherein the data using terminal further transmits the perception data to a data processing center after obtaining the perception data, and the data processing center trains the data model by using the perception data as basic data.
4. The Internet of things data security method based on security certification as claimed in claim 3, wherein the data processing center also directly receives perception data of other perception nodes in the Internet as basic data to train the data model.
5. The Internet of things data control method based on security authentication as claimed in claim 1, wherein the sensing data is data subjected to data fusion by a local security authentication database and encrypted by a public key when being sent to the data use terminal.
6. An Internet of things data control device based on security authentication is characterized by comprising an identity authentication request unit, a security authentication database unit, a sensing data acquisition unit, a storage unit transceiving unit, a data model acquisition unit and a result data calculation unit, wherein,
the identity authentication request unit is used for performing identity authentication to the local security authentication database unit and simultaneously sending an identity authentication request to the security authentication layer of the cloud when the data using terminal needs to acquire data;
the safety certification database unit is used for receiving the identity certification information sent by the identity certification request unit and carrying out identity certification;
the sensing data acquisition unit is used for acquiring sensing data of the sensing node;
the storage unit is used for storing the perception data acquired by the perception data acquisition unit;
the receiving and transmitting unit is used for carrying out data interaction with the sensing node and a data processing center of the cloud;
the data model acquisition unit is used for acquiring a data model from the data processing center;
and the result data calculation unit is used for bringing the perception data into the data model to obtain result data.
7. The Internet of things data control device based on security authentication as claimed in claim 6, wherein the security authentication database unit comprises an identification code authentication unit and/or a password authentication unit, the identification code authentication unit is used for authenticating the initial identity of the data use terminal through an identification code; and the password authentication unit is used for authenticating the initial identity of the data using terminal through a password.
8. The Internet of things data control device based on the security certification as claimed in claim 6, wherein the data usage terminal further transmits perception data to the data processing center, and the data processing center trains the data model by using the perception data as basic data.
9. The Internet of things data control device based on security authentication as claimed in claim 6, wherein the security authentication database unit comprises a data fusion unit, a data encryption unit and a data sending unit, the data fusion unit is used for performing data fusion on the sensing number, the data encryption unit is used for encrypting the fused data, and the data sending unit is used for sending the encrypted data to the data using terminal.
10. An internet of things data security device based on security authentication is characterized by comprising a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for receiving and sending messages, and the processor is used for reading the computer program and executing the internet of things data security method based on security authentication as claimed in any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110265654.7A CN112995190A (en) | 2021-03-11 | 2021-03-11 | Internet of things data security method and device based on security authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110265654.7A CN112995190A (en) | 2021-03-11 | 2021-03-11 | Internet of things data security method and device based on security authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112995190A true CN112995190A (en) | 2021-06-18 |
Family
ID=76336354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110265654.7A Pending CN112995190A (en) | 2021-03-11 | 2021-03-11 | Internet of things data security method and device based on security authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112995190A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102281285A (en) * | 2011-06-17 | 2011-12-14 | 程旭 | Method and device for establishing safe and efficient Internet of Things |
CN103067171A (en) * | 2012-12-14 | 2013-04-24 | 无锡华御信息技术有限公司 | Internet of things data security method based on security certificate |
CN105471815A (en) * | 2014-08-11 | 2016-04-06 | 无锡市嘉邦电力管道厂 | Internet-of-things data security method and Internet-of-things data security device based on security authentication |
CN107770263A (en) * | 2017-10-16 | 2018-03-06 | 电子科技大学 | A kind of internet-of-things terminal safety access method and system based on edge calculations |
US10581865B1 (en) * | 2019-02-20 | 2020-03-03 | Xage Security, Inc. | Inline filtering to secure access and data between user and application to device and between device to device |
-
2021
- 2021-03-11 CN CN202110265654.7A patent/CN112995190A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102281285A (en) * | 2011-06-17 | 2011-12-14 | 程旭 | Method and device for establishing safe and efficient Internet of Things |
CN103067171A (en) * | 2012-12-14 | 2013-04-24 | 无锡华御信息技术有限公司 | Internet of things data security method based on security certificate |
CN105471815A (en) * | 2014-08-11 | 2016-04-06 | 无锡市嘉邦电力管道厂 | Internet-of-things data security method and Internet-of-things data security device based on security authentication |
CN107770263A (en) * | 2017-10-16 | 2018-03-06 | 电子科技大学 | A kind of internet-of-things terminal safety access method and system based on edge calculations |
US10581865B1 (en) * | 2019-02-20 | 2020-03-03 | Xage Security, Inc. | Inline filtering to secure access and data between user and application to device and between device to device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110263936B (en) | Horizontal federal learning method, device, equipment and computer storage medium | |
CN106851632B (en) | A kind of method and device of smart machine access WLAN | |
EP2405622A1 (en) | Device communication | |
CN109391634A (en) | Establish method, terminal and the computer readable storage medium of communication | |
CN112788042B (en) | Method for determining device identifier of Internet of things and device of Internet of things | |
CN102143492B (en) | Method for establishing virtual private network (VPN) connection, mobile terminal and server | |
CN114071452B (en) | Method and device for acquiring user subscription data | |
KR20170125381A (en) | GPRS system key enforcement method, SGSN device, UE, HLR / HSS, and GPRS system | |
KR101807523B1 (en) | Apparatus and method for identifying wireless network provider in wireless communication system | |
CN104619040A (en) | Method and system for quickly connecting WIFI equipment | |
CN106879048A (en) | Smart machine networking method, system and smart machine | |
CN112566113B (en) | Key generation and terminal network distribution method, device and equipment | |
CN110022374A (en) | Method for connecting network, device, communication equipment and storage medium based on Internet of Things | |
CN109729000A (en) | A kind of instant communicating method and device | |
CN107211265A (en) | The safety interacting method and device of a kind of terminal room | |
CN109861947A (en) | A kind of network abduction processing method and processing device, electronic equipment | |
CN107026857B (en) | Information processing method and gateway equipment | |
CN110278077B (en) | Method, device, equipment and storage medium for acquiring data information of electric energy meter | |
CN110167191A (en) | A kind of communication means and device | |
CN112995190A (en) | Internet of things data security method and device based on security authentication | |
Heins | NB-IoT Use Cases and Devices | |
CN116347656A (en) | Bluetooth encryption connection method and device and electronic equipment | |
CN102487505B (en) | Access authentication method of sensor node, apparatus thereof and system thereof | |
CN105142098A (en) | Data sharing method and device | |
CN106656581A (en) | Router configuration method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210618 |
|
RJ01 | Rejection of invention patent application after publication |