Secure communication method and terminal and cloud thereof

A secure communication and terminal technology, applied in the field of communication, can solve problems such as lack of system environment, digital certificate charges, poor computing power and networking capabilities of IoT devices, etc., achieve simple interaction process, ensure safety, and reduce operation and operation costs. Dimension cost effect

Inactive Publication Date: 2017-12-15
SHENZHEN SPOTMAU INFORMATION TECH CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the operating systems of terminals such as IoT devices are very simple, which is not suitable for installing root certificates, or does not have the system environment for installing root certificates
Secondly, terminals such as IoT devices have relatively poor computing and networking capabilities. The standard TLS process needs to interact with the server more than ten times, and also interacts with foreign servers, and its interaction performance is relatively poor.
In addition, the standard TLS process needs to go to the CA to apply for a digital certificate. The digital certificate is charged and has a valid period. It needs to be renewed regularly, which has a certain operating cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method and terminal and cloud thereof
  • Secure communication method and terminal and cloud thereof
  • Secure communication method and terminal and cloud thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0051] figure 1 The flow chart of the method provided by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure communication method and a terminal and a cloud thereof. The method comprises the following steps: transmitting a connection request to the cloud by the terminal, and transmitting a number corresponding to a public key to the cloud; receiving encrypted data from the cloud by the terminal, wherein the encrypted data are obtained by using a private key to encrypt a random string sign-rand by the cloud; decrypting the encrypted data by using the public key by the terminal, so as to enable the terminal to verify the cloud; if the verification is passed, calculating the random string sign-rand obtained by the terminal and a random string key-rand generated by the terminal by using an encryption algorithm, and generating symmetric keys, wherein the symmetric keys are keys for encrypting and decrypting transmitted data; encrypting the random string key-rand by using the public key by the terminal; transmitting the encrypted data to the cloud by the terminal, so as to enable the cloud to verify the terminal; and receiving a terminal verification result sent by the cloud which is used for representing whether the terminal and the cloud shake hands successfully by the terminal. The method, the terminal and the cloud provided by the invention reduce the operation and maintenance cost and reduce the number of times of network interactions.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a secure communication method and its terminal and cloud. Background technique [0002] In Internet or Internet of Things applications, in order to ensure the integrity and security of data between two communication applications, Transport Layer Security Protocol (TLS) is generally used to establish a secure data communication channel. The symmetric secret key negotiated by both parties will not be the same every time a communication channel is established, so malicious users can neither decrypt communication data nor capture packets on the network for replay attacks. Using the TLS protocol requires pre-installing the root certificate of a third-party authoritative certificate authority (Certificate Authority, CA) in the operating system of the IoT device and other terminals, and at the same time, the cloud needs to go to the CA to apply for a data certificate. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0435H04L63/06H04L63/08H04L67/10
Inventor 王涛伟刘朝晖林倩晖
Owner SHENZHEN SPOTMAU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products