[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112995190A - Internet of things data security method and device based on security authentication - Google Patents

Internet of things data security method and device based on security authentication Download PDF

Info

Publication number
CN112995190A
CN112995190A CN202110265654.7A CN202110265654A CN112995190A CN 112995190 A CN112995190 A CN 112995190A CN 202110265654 A CN202110265654 A CN 202110265654A CN 112995190 A CN112995190 A CN 112995190A
Authority
CN
China
Prior art keywords
data
authentication
security
unit
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110265654.7A
Other languages
Chinese (zh)
Inventor
王清杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Defeng New Journey Technology Co ltd
Original Assignee
Beijing Defeng New Journey Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Defeng New Journey Technology Co ltd filed Critical Beijing Defeng New Journey Technology Co ltd
Priority to CN202110265654.7A priority Critical patent/CN112995190A/en
Publication of CN112995190A publication Critical patent/CN112995190A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a security authentication-based Internet of things data security method and device, which comprises the steps of sending an identity authentication request to a local security authentication database and a security authentication layer of a cloud when a data use terminal needs to acquire data; acquiring sensing data of the sensing node after the sensing node passes the data; and the data use terminal acquires a data model from a data processing center and brings the perception data into the data model to acquire result data. The method is suitable for avoiding the untrusted data using terminal from acquiring the data of the sensing node through local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node; the user terminal can not directly process the sensing data, needs to process the sensing data by the data model, and needs to perform identity authentication before the data user terminal obtains the data model, so that the data security is improved.

Description

Internet of things data security method and device based on security authentication
Technical Field
The invention belongs to the field of safe Internet of things, and particularly relates to a method and a device for Internet of things data security based on security authentication.
Background
The internet of things is an important component of a new generation of information technology, and as the name suggests, the internet of things is the internet with connected objects, which has two meanings: firstly, the core and the foundation of the internet of things are the internet, and the internet is an extended and expanded network on the basis of the internet; secondly, the user end extends and expands to any object to carry out information exchange and communication, therefore, the definition of the internet of things is as follows: any object is connected with the Internet according to an agreed protocol through information sensing equipment such as radio frequency identification, an infrared sensor, a global positioning system, a laser scanner and the like to carry out information exchange and communication, so that a network for intelligently identifying, positioning, tracking, monitoring and managing the object is realized.
With the development of information communication technology, security threats faced by communication networks are increasingly diversified, security problems such as important information leakage and stealing are very prominent, the internet of things also faces huge potential safety hazards, and problems such as illegal stealing of sensing data and leakage of important data do not have good solutions.
Disclosure of Invention
The invention aims to provide a method and a device for the data security of the Internet of things based on security authentication; the problems of illegal stealing of sensing data and leakage of important data are solved.
In a first aspect, the invention provides an internet of things data security method based on security authentication, which comprises the following steps:
when the data using terminal needs to acquire data, identity authentication is carried out on a local security authentication database, and meanwhile an identity authentication request is sent to a security authentication layer at the cloud end;
the data use terminal firstly receives identity authentication passing information of a local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit;
the security authentication layer judges whether the data use terminal passes authentication or not; after passing the authentication, establishing a secure transmission channel with a data processing center at the cloud end;
and the data use terminal acquires a data model from a data processing center and brings the perception data into the data model to acquire result data.
According to the technical content, the method is suitable for acquiring the data of the sensing node only after local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node, so that the situation that the data using terminal is not trusted to acquire the data of the sensing node can be well avoided, and the security of the sensing data is improved; in addition, the sensing data are processed by acquiring the data model corresponding to the sensing data at the cloud end, so that on one hand, the data model can be ensured to be up-to-date, on the other hand, the data use terminal cannot directly output the sensing data and needs to process the sensing data by the data model, and the security of the sensing data is further improved; moreover, the data use terminal also needs to perform identity authentication before acquiring the data model, so that the data security is further improved.
In one possible design, the method for the security authentication layer to determine whether the data usage terminal is authenticated is as follows: the safety authentication layer judges whether the data use terminal successfully receives the sensing node, and if so, the data use terminal passes the authentication; if not, the primary identity authentication is carried out on the data use terminal; the authentication of the primary identity comprises identification code authentication or password authentication.
In one possible design, after the data use terminal obtains the perception data, the data use terminal also transmits the perception data to a data processing center, and the data processing center trains the data model by using the perception data as basic data. Data processing center is given through data transmission with data use terminal uses, and under the more condition of quantity, data processing center is used for training basic data of data model can be abundanter for data module is more perfect, and is more accurate practical.
In one possible design, the data processing center also directly receives sensing data of other sensing nodes networked as basic data to train the data model.
In one possible design, the sensing data is data subjected to data fusion through a local security authentication database and subjected to public key encryption when being sent to the data use terminal.
The invention provides a data control device of the internet of things based on security authentication, which comprises an identity authentication request unit, a security authentication database unit, a perception data acquisition unit, a storage unit transceiving unit, a data model acquisition unit and a result data calculation unit, wherein,
the identity authentication request unit is used for performing identity authentication to the local security authentication database unit and simultaneously sending an identity authentication request to the security authentication layer of the cloud when the data using terminal needs to acquire data;
the safety certification database unit is used for receiving the identity certification information sent by the identity certification request unit and carrying out identity certification;
the sensing data acquisition unit is used for acquiring sensing data of the sensing node;
the storage unit is used for storing the perception data acquired by the perception data acquisition unit;
the receiving and transmitting unit is used for carrying out data interaction with the sensing node and a data processing center of the cloud;
the data model acquisition unit is used for acquiring a data model from the data processing center;
and the result data calculation unit is used for bringing the perception data into the data model to obtain result data.
In one possible design, the security authentication database unit comprises an identification code authentication unit and/or a password authentication unit, and the identification code authentication unit is used for performing primary identity authentication on the data use terminal through an identification code; and the password authentication unit is used for authenticating the initial identity of the data using terminal through a password.
In one possible design, the data usage terminal further transmits the perception data to the data processing center, and the data processing center trains the data model by using the perception data as basic data.
In one possible design, the security authentication database unit includes a data fusion unit, a data encryption unit and a data sending unit, the data fusion unit is configured to perform data fusion on the sensing number, the data encryption unit is configured to encrypt the fused data, and the data sending unit is configured to send the encrypted data to the data using terminal.
The invention provides a security authentication-based data security device of the internet of things, which comprises a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for transceiving messages, and the processor is used for reading the computer program and executing the security authentication-based data security method of the internet of things according to any one of the first aspect and the first aspect.
Has the advantages that:
1. the method is suitable for acquiring the data of the sensing node only after local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node, so that the data using terminal which is not trusted can be well prevented from acquiring the data of the sensing node, and the security of the sensing data is improved; in addition, the sensing data are processed by acquiring the data model corresponding to the sensing data at the cloud end, so that on one hand, the data model can be ensured to be up-to-date, on the other hand, the data use terminal cannot directly output the sensing data and needs to process the sensing data by the data model, and the security of the sensing data is further improved; moreover, the data use terminal also needs to perform identity authentication before acquiring the data model, so that the data security is further improved, and in conclusion, the problems of illegal stealing of sensing data and leakage of important data can be solved;
2. data processing center is given through data transmission with data use terminal uses, and under the more condition of quantity, data processing center is used for training basic data of data model can be abundanter for data module is more perfect, and is more accurate practical.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flow diagram of a data security method of the internet of things based on security authentication provided by the invention.
Fig. 2 is a schematic diagram of unit modules of an internet of things data security device based on security authentication provided by the invention.
Detailed Description
The invention is further described with reference to the following figures and specific embodiments. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. Specific structural and functional details disclosed herein are merely illustrative of example embodiments of the invention. This invention may, however, be embodied in many alternate forms and should not be construed as limited to the embodiments set forth herein.
It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments of the present invention.
It should be understood that, for the term "and/or" as may appear herein, it is merely an associative relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, B exists alone, and A and B exist at the same time; for the term "/and" as may appear herein, which describes another associative object relationship, it means that two relationships may exist, e.g., a/and B, may mean: a exists independently, and A and B exist independently; in addition, for the character "/" that may appear herein, it generally means that the former and latter associated objects are in an "or" relationship.
It will be understood that when an element is referred to herein as being "connected," "connected," or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Conversely, if a unit is referred to herein as being "directly connected" or "directly coupled" to another unit, it is intended that no intervening units are present. In addition, other words used to describe the relationship between elements should be interpreted in a similar manner (e.g., "between … …" versus "directly between … …", "adjacent" versus "directly adjacent", etc.).
It is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments of the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, numbers, steps, operations, elements, components, and/or groups thereof.
It should also be noted that, in some alternative designs, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed substantially concurrently, or the figures may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
It should be understood that specific details are provided in the following description to facilitate a thorough understanding of example embodiments. However, it will be understood by those of ordinary skill in the art that the example embodiments may be practiced without these specific details. For example, systems may be shown in block diagrams in order not to obscure the examples in unnecessary detail. In other instances, well-known processes, structures and techniques may be shown without unnecessary detail in order to avoid obscuring example embodiments.
As shown in fig. 1, the internet of things data security method based on security authentication provided in the first aspect of this embodiment includes the following steps:
when the data using terminal needs to acquire data, identity authentication is carried out on a local security authentication database, and meanwhile an identity authentication request is sent to a security authentication layer at the cloud end;
the data use terminal firstly receives identity authentication passing information of a local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit;
the security authentication layer judges whether the data use terminal passes authentication or not; after passing the authentication, establishing a secure transmission channel with a data processing center at the cloud end;
and the data use terminal establishes a safe transmission channel and brings the sensing data into the data model to obtain result data.
According to the technical content, the method is suitable for acquiring the data of the sensing node only after local identity authentication under the condition that the data using terminal can selectively perform data output transmission with the sensing node, so that the situation that the data using terminal is not trusted to acquire the data of the sensing node can be well avoided, and the security of the sensing data is improved; in addition, the sensing data are processed by acquiring the data model corresponding to the sensing data at the cloud end, so that on one hand, the data model can be ensured to be up-to-date, on the other hand, the data use terminal cannot directly output the sensing data and needs to process the sensing data by the data model, and the security of the sensing data is further improved; moreover, the data use terminal also needs to perform identity authentication before acquiring the data model, so that the data security is further improved.
During specific implementation, the data use terminal can be a mobile phone, for example, in the field of home internet of things, use perception data in the household appliance with the internet of things function can be obtained, and personal living habits can be obtained through corresponding perception data and a data model special for a cloud.
In specific implementation, the method for the security authentication layer to judge whether the data use terminal passes the authentication is as follows: the safety authentication layer judges whether the data use terminal successfully receives the sensing node, and if so, the data use terminal passes the authentication; if not, the primary identity authentication is carried out on the data use terminal; the authentication of the primary identity comprises identification code authentication or password authentication.
In a possible implementation manner, after the data usage terminal obtains the perception data, the data usage terminal further transmits the perception data to a data processing center, and the data processing center trains the data model by using the perception data as basic data. Data processing center is given through data transmission with data use terminal uses, and under the more condition of quantity, data processing center is used for training basic data of data model can be abundanter for data module is more perfect, and is more accurate practical.
In one possible implementation, the data processing center also directly receives sensing data of other sensing nodes networked as basic data to train the data model.
In a possible implementation manner, the sensing data is data subjected to data fusion through the local security authentication database and subjected to public key encryption when being sent to the data use terminal.
A second aspect of the present embodiment provides an internet of things data control apparatus based on security authentication, as shown in fig. 2, including an identity authentication request unit, a security authentication database unit, a sensing data obtaining unit, a storage unit, a transceiving unit, a data model obtaining unit, and a result data calculating unit, wherein,
the identity authentication request unit is used for performing identity authentication to the local security authentication database unit and simultaneously sending an identity authentication request to the security authentication layer of the cloud when the data using terminal needs to acquire data;
the safety certification database unit is used for receiving the identity certification information sent by the identity certification request unit and carrying out identity certification;
the sensing data acquisition unit is used for acquiring sensing data of the sensing node;
the storage unit is used for storing the perception data acquired by the perception data acquisition unit;
the receiving and transmitting unit is used for carrying out data interaction with the sensing node and a data processing center of the cloud;
the data model acquisition unit is used for acquiring a data model from the data processing center;
and the result data calculation unit is used for bringing the perception data into the data model to obtain result data.
In a possible implementation manner, the security authentication database unit comprises an identification code authentication unit and/or a password authentication unit, wherein the identification code authentication unit is used for performing primary identity authentication on the data use terminal through an identification code; and the password authentication unit is used for authenticating the initial identity of the data using terminal through a password.
In a possible implementation manner, the data usage terminal further transmits perception data to the data processing center, and the data processing center trains the data model by using the perception data as basic data.
In a possible implementation manner, the security authentication database unit includes a data fusion unit, a data encryption unit, and a data transmission unit, where the data fusion unit is configured to perform data fusion on the sensing number, the data encryption unit is configured to encrypt the fused data, and the data transmission unit is configured to transmit the encrypted data to the data using terminal.
The invention provides a security authentication-based data security device of the internet of things, which comprises a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for transceiving messages, and the processor is used for reading the computer program and executing the security authentication-based data security method of the internet of things according to any one of the first aspect and the first aspect.
For example, the Memory may include, but is not limited to, a Random-Access Memory (RAM), a Read-Only Memory (ROM), a Flash Memory (Flash Memory), a First-in First-out (FIFO), and/or a First-in Last-out (FILO), and the like; the processor may not be limited to the use of a microprocessor model number STM32F105 family; the transceiver may be, but is not limited to, a Wireless Fidelity (WiFi) Wireless transceiver, a bluetooth Wireless transceiver, a General Packet Radio Service (GPRS) Wireless transceiver, a ZigBee Wireless transceiver (ieee 802.15.4 standard-based low power local area network protocol), and/or a ZigBee Wireless transceiver. In addition, the internet of things data security device based on security authentication can also comprise, but is not limited to, a power supply module, a display screen and other necessary components.
A fourth aspect of the present embodiment provides a computer-readable storage medium storing instructions that include any one of the possible designs of the method for securing data of the internet of things based on security certification in the first aspect, and that is, the computer-readable storage medium stores instructions that, when executed on a computer, perform the method for controlling data of the internet of things based on security certification in the first aspect. The computer-readable storage medium refers to a carrier for storing data, and may include, but is not limited to, floppy disks, optical disks, hard disks, flash memories, flash disks and/or Memory sticks (Memory sticks), etc., and the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
For a working process, working details, and technical effects of the foregoing computer-readable storage medium provided in the fourth aspect of this embodiment, reference may be made to the interaction method in any one of the above first aspect or the first aspect, which is not described herein again.
A fifth aspect of the present embodiment provides a computer program product containing instructions, which when executed on a computer, cause the computer to execute a method for controlling data of an internet of things based on security certification as described in the first aspect or any one of the possible designs of the first aspect. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices.
The embodiments described above are merely illustrative, and may or may not be physically separate, if referring to units illustrated as separate components; if reference is made to a component displayed as a unit, it may or may not be a physical unit, and may be located in one place or distributed over a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: modifications may be made to the embodiments described above, or equivalents may be substituted for some of the features described. And such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Finally, it should be noted that the present invention is not limited to the above alternative embodiments, and that various other forms of products can be obtained by anyone in light of the present invention. The above detailed description should not be taken as limiting the scope of the invention, which is defined in the claims, and which the description is intended to be interpreted accordingly.

Claims (10)

1. A data security method of the Internet of things based on security authentication is characterized by comprising the following steps:
when the data using terminal needs to acquire data, identity authentication is carried out on a local security authentication database, and meanwhile an identity authentication request is sent to a security authentication layer at the cloud end;
the data use terminal firstly receives identity authentication passing information of a local security authentication database, acquires sensing data of a sensing node, and temporarily stores the sensing data in a local storage unit;
the security authentication layer judges whether the data use terminal passes authentication or not; after passing the authentication, establishing a secure transmission channel with a data processing center at the cloud end;
and the data use terminal acquires a data model from a data processing center and brings the perception data into the data model to acquire result data.
2. The internet of things data security method based on security authentication as claimed in claim 1, wherein the method for the security authentication layer to determine whether the data using terminal passes authentication is as follows: the safety authentication layer judges whether the data use terminal successfully receives the sensing node, and if so, the data use terminal passes the authentication; if not, the primary identity authentication is carried out on the data use terminal; the authentication of the primary identity comprises identification code authentication or password authentication.
3. The Internet of things data security method based on security certification as claimed in claim 1, wherein the data using terminal further transmits the perception data to a data processing center after obtaining the perception data, and the data processing center trains the data model by using the perception data as basic data.
4. The Internet of things data security method based on security certification as claimed in claim 3, wherein the data processing center also directly receives perception data of other perception nodes in the Internet as basic data to train the data model.
5. The Internet of things data control method based on security authentication as claimed in claim 1, wherein the sensing data is data subjected to data fusion by a local security authentication database and encrypted by a public key when being sent to the data use terminal.
6. An Internet of things data control device based on security authentication is characterized by comprising an identity authentication request unit, a security authentication database unit, a sensing data acquisition unit, a storage unit transceiving unit, a data model acquisition unit and a result data calculation unit, wherein,
the identity authentication request unit is used for performing identity authentication to the local security authentication database unit and simultaneously sending an identity authentication request to the security authentication layer of the cloud when the data using terminal needs to acquire data;
the safety certification database unit is used for receiving the identity certification information sent by the identity certification request unit and carrying out identity certification;
the sensing data acquisition unit is used for acquiring sensing data of the sensing node;
the storage unit is used for storing the perception data acquired by the perception data acquisition unit;
the receiving and transmitting unit is used for carrying out data interaction with the sensing node and a data processing center of the cloud;
the data model acquisition unit is used for acquiring a data model from the data processing center;
and the result data calculation unit is used for bringing the perception data into the data model to obtain result data.
7. The Internet of things data control device based on security authentication as claimed in claim 6, wherein the security authentication database unit comprises an identification code authentication unit and/or a password authentication unit, the identification code authentication unit is used for authenticating the initial identity of the data use terminal through an identification code; and the password authentication unit is used for authenticating the initial identity of the data using terminal through a password.
8. The Internet of things data control device based on the security certification as claimed in claim 6, wherein the data usage terminal further transmits perception data to the data processing center, and the data processing center trains the data model by using the perception data as basic data.
9. The Internet of things data control device based on security authentication as claimed in claim 6, wherein the security authentication database unit comprises a data fusion unit, a data encryption unit and a data sending unit, the data fusion unit is used for performing data fusion on the sensing number, the data encryption unit is used for encrypting the fused data, and the data sending unit is used for sending the encrypted data to the data using terminal.
10. An internet of things data security device based on security authentication is characterized by comprising a memory, a processor and a transceiver which are connected in sequence, wherein the memory is used for storing a computer program, the transceiver is used for receiving and sending messages, and the processor is used for reading the computer program and executing the internet of things data security method based on security authentication as claimed in any one of claims 1 to 5.
CN202110265654.7A 2021-03-11 2021-03-11 Internet of things data security method and device based on security authentication Pending CN112995190A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110265654.7A CN112995190A (en) 2021-03-11 2021-03-11 Internet of things data security method and device based on security authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110265654.7A CN112995190A (en) 2021-03-11 2021-03-11 Internet of things data security method and device based on security authentication

Publications (1)

Publication Number Publication Date
CN112995190A true CN112995190A (en) 2021-06-18

Family

ID=76336354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110265654.7A Pending CN112995190A (en) 2021-03-11 2021-03-11 Internet of things data security method and device based on security authentication

Country Status (1)

Country Link
CN (1) CN112995190A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281285A (en) * 2011-06-17 2011-12-14 程旭 Method and device for establishing safe and efficient Internet of Things
CN103067171A (en) * 2012-12-14 2013-04-24 无锡华御信息技术有限公司 Internet of things data security method based on security certificate
CN105471815A (en) * 2014-08-11 2016-04-06 无锡市嘉邦电力管道厂 Internet-of-things data security method and Internet-of-things data security device based on security authentication
CN107770263A (en) * 2017-10-16 2018-03-06 电子科技大学 A kind of internet-of-things terminal safety access method and system based on edge calculations
US10581865B1 (en) * 2019-02-20 2020-03-03 Xage Security, Inc. Inline filtering to secure access and data between user and application to device and between device to device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281285A (en) * 2011-06-17 2011-12-14 程旭 Method and device for establishing safe and efficient Internet of Things
CN103067171A (en) * 2012-12-14 2013-04-24 无锡华御信息技术有限公司 Internet of things data security method based on security certificate
CN105471815A (en) * 2014-08-11 2016-04-06 无锡市嘉邦电力管道厂 Internet-of-things data security method and Internet-of-things data security device based on security authentication
CN107770263A (en) * 2017-10-16 2018-03-06 电子科技大学 A kind of internet-of-things terminal safety access method and system based on edge calculations
US10581865B1 (en) * 2019-02-20 2020-03-03 Xage Security, Inc. Inline filtering to secure access and data between user and application to device and between device to device

Similar Documents

Publication Publication Date Title
CN110263936B (en) Horizontal federal learning method, device, equipment and computer storage medium
CN106851632B (en) A kind of method and device of smart machine access WLAN
EP2405622A1 (en) Device communication
CN109391634A (en) Establish method, terminal and the computer readable storage medium of communication
CN112788042B (en) Method for determining device identifier of Internet of things and device of Internet of things
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN114071452B (en) Method and device for acquiring user subscription data
KR20170125381A (en) GPRS system key enforcement method, SGSN device, UE, HLR / HSS, and GPRS system
KR101807523B1 (en) Apparatus and method for identifying wireless network provider in wireless communication system
CN104619040A (en) Method and system for quickly connecting WIFI equipment
CN106879048A (en) Smart machine networking method, system and smart machine
CN112566113B (en) Key generation and terminal network distribution method, device and equipment
CN110022374A (en) Method for connecting network, device, communication equipment and storage medium based on Internet of Things
CN109729000A (en) A kind of instant communicating method and device
CN107211265A (en) The safety interacting method and device of a kind of terminal room
CN109861947A (en) A kind of network abduction processing method and processing device, electronic equipment
CN107026857B (en) Information processing method and gateway equipment
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN110167191A (en) A kind of communication means and device
CN112995190A (en) Internet of things data security method and device based on security authentication
Heins NB-IoT Use Cases and Devices
CN116347656A (en) Bluetooth encryption connection method and device and electronic equipment
CN102487505B (en) Access authentication method of sensor node, apparatus thereof and system thereof
CN105142098A (en) Data sharing method and device
CN106656581A (en) Router configuration method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210618

RJ01 Rejection of invention patent application after publication