Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system of transmitting data safely

A technology of secure transmission and data, applied in the field of communication, can solve the problems that CoAP message conversion cannot be realized at the same time, CaAP protocol cannot be transmitted normally, and there is no guarantee of separate protection of CoAP protocol and HTTP protocol conversion information and message body transmission

Inactive Publication Date: 2013-06-19
HUAWEI TECH CO LTD
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, there is no effective method to ensure the separate protection of CoAP protocol and HTTP protocol conversion information and message body transmission, so that the encryption of CoAP messages and the conversion between CoAP and HTTP protocols cannot be realized at the same time, so that after adding the proxy device Proxy, the existing The CaAP protocol cannot be transmitted normally under the condition of ensuring encryption security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system of transmitting data safely
  • Method, device and system of transmitting data safely
  • Method, device and system of transmitting data safely

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In the embodiment of the method for obtaining resources provided by the present invention, the implementation process is specifically as follows:

[0048] S1001. The user terminal sends a resource access request carrying the first authentication header to the server.

[0049] Further, the first authentication header field may further include a first digest calculation parameter, and the first digest calculation parameter includes the user identification and the server identification, and also includes a random identification, a resource access path, and a negotiation key One or a combination of several of the parameters; the resource access request sent by the user terminal may further include calculating the first message digest algorithm according to one or more combinations of the user password and the first digest calculation parameter. Complete summary

[0050] The random identification is temporarily generated by the user terminal every time a resource access request me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method, a device and a system of transmitting data safely. The method of transmitting data safely is characterized by comprising that a user terminal sends a resource access request carrying a first authentication request header field to a server, wherein the first authentication request header field comprises user identification and server identification; a request response returned by the server is received, the request response comprises a second authentication request header field and a message body, and the second authentication request header field carries a third integrity summery; and after the server receives the resource access request, the third integrity summery is further obtained by calculation, wherein the calculation is carried out by using a third a message digest algorithm according to a user password and message contents and by using, and the message body carries the message contents encrypted by a shared key. The user password is obtained from the storage area of the server according to the user identification carried by the resource access request. The machine-to-machine (M2M) transmission based on a constrained application protocol (CoAP) is enabled to be carried out safely and reliably.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to a method, device and system for safe data transmission. Background technique [0002] The CoAP (Constrained Application Protocol) protocol is mainly used in machine-to-machine (M2M) scenarios, such as home controllers, building automation, smart energy, and sensor-end networks. In such an environment, the functions of these machines are relatively simple. Generally, the processing end is only 8 bits, the storage space is small, complex transmission protocols are not supported, and the data transmission rate is also low. CoAP provides a request / response interaction mode, supports embedded resource discovery, including key network concepts, such as Universal Resource Identifier (URI) and content type. CoAP can be easily translated to Hyper Text Transfer Protocol (HTTP) for integration into the network. [0003] In CoAP, security issues are very important, especially some sensor dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04W4/70
CPCH04L9/3273H04L63/0428H04L63/123H04L63/0435H04L63/083H04L63/0869H04W12/06H04L63/168H04L9/3226H04L9/3236H04W4/70H04L63/0876
Inventor 肖芳英卞永刚张永靖
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products