Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of Internet of things communication encryption method and device

A communication encryption and Internet of Things technology, applied in the field of Internet of Things communication encryption methods and devices, to reduce the risk of information leakage, reduce the possibility of loss, and increase the difficulty

Active Publication Date: 2018-09-28
SHENZHEN BENMAI TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of the Internet of Everything, the terminal that needs to be controlled by the sensor network may be very important in the future, so very careful and strict control commands are required
Under this condition, it is far from enough to just use the communication protocol
Although the communication protocol can play the role of message identification and terminal identification, the final transmitted message is transparent
Once hackers or criminals crack the communication protocol, it will bring incalculable consequences to the system that uses terminal identification as monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of Internet of things communication encryption method and device
  • A kind of Internet of things communication encryption method and device
  • A kind of Internet of things communication encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Example 1, such as figure 1 A flow chart of a communication encryption method for the Internet of Things is shown, including the following steps: A. The monitoring platform sends a sensor terminal control command to the control terminal, and the message of the command includes a frame header, a frame length, a message identification byte, and a destination terminal ID, specific control command and frame tail; B. The control terminal processes the sensor terminal control command by using random bytes, generates an encrypted request control command message and sends it to the terminal; C. The terminal uses a random secret key to request the control command message The text is encrypted, and the response request key message is generated and sent to the control terminal; D. The control terminal encrypts the response request key message through the random key and the static key storehouse, generates the final key and sends it to the terminal .

[0022] The monitoring platfo...

Embodiment 2

[0041] Example 2, such as Figure 4 As shown, a schematic flow diagram of a communication encryption method combined with an Internet of Things device.

[0042] Among them, the IoT monitoring platform is actually what we call the human-computer interaction part; the IoT control terminal is the part that sends control information; the IoT terminal is the part that controls the actual arrival of information and executes commands; the control terminal receives The processing process of the initial command sent from the platform is also the initial part of this encryption algorithm.

[0043] Step 1, the terminal receives the request control command; Step 2, the terminal processes the request control command; Step 3, the terminal generates a random secret key and generates a request command response message; Step 4, the terminal encrypts the response message; Step 5, the control terminal Receive and process the response message; step 6, the control terminal obtains the terminal ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for encrypting Internet of things communication. The method comprises steps: a monitoring platform sends a sensor terminal control command to a control end; the control end uses a random byte to process the sensor terminal control command, and an encrypted request control command message is generated and sent to the terminal; the terminal uses a random key to carry out encryption processing on the request control command message, and a response request key message is generated and sent to the control end; and the control end carries out encryption processing on the response request key message via the random key and a static key library, and a final key is generated and sent to the terminal. The device is used for executing the corresponding method. Through carrying out encryption processing on the command message, safety of the Internet of things is improved through multiple validations, and risks are reduced.

Description

technical field [0001] The present invention relates to the communication field, in particular to a communication encryption method and device for the Internet of Things. Background technique [0002] Today, the development of the Internet of Things is in full swing, and the momentum is unstoppable. With the development of the Internet of Things, the mutual communication between wireless sensor network terminals has become more and more important. The current sensing technology of the Internet of Things is mainly RFID. Products implanted with this chip have such a system for the owner of the product, which can be conveniently managed. However, it also has a huge problem. Others can also perceive it, such as competitors of the product, so how to make these valuable information available to me in the process of perception, transmission and application, but not to be used by others? Used by others, especially not by competitors. This requires hard work on security to form a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06F21/60
CPCG06F21/602H04L9/0861H04L9/0869H04L63/0428
Inventor 李大帅
Owner SHENZHEN BENMAI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products