Encryption method and system for data transmission in Internet of Things
A technology of data transmission and encryption method, applied in the field of Internet of Things, can solve the problem of low security, achieve the effect of improving security, strengthening communication security, and reducing the risk of being stolen and decrypted
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 2
[0088] see image 3 , image 3 Another schematic flow diagram of the encryption method for Internet of Things data transmission disclosed in the embodiment of the present invention; image 3 As shown, an encryption method for data transmission in the Internet of Things may include:
[0089] 301. The access node receives the first encrypted instruction information and the second encrypted instruction information issued by the converging unit; the first encrypted instruction information includes the device type that the converging unit is interested in and first encrypted information, and the first encrypted information includes the device identification and the time point at which the data is reported; the second encrypted indication information includes the type of device that the converging unit is interested in and the second encrypted information, and the second encrypted information includes the node identifier; the aggregation information included in the first encrypted ...
Embodiment 3
[0101] see Figure 4 , Figure 4 It is a schematic structural diagram of an encryption system for Internet of Things data transmission disclosed in an embodiment of the present invention; Figure 4 As shown, an encryption system for Internet of Things data transmission may include:
[0102] The converging unit 410 is configured to issue the first encryption instruction information and the second encryption instruction information to the access node 420; the first encryption instruction information includes the device type and the first encryption information that the aggregation unit 410 is interested in, and the first encryption information includes The device identification and the time point of reporting data; the second encrypted indication information includes the device type and second encrypted information that the converging unit 410 is interested in, and the second encrypted information includes the node identification; the first encrypted indication information and ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


