Data transmission method and apparatus, and fire fighting system

A data transmission method and data technology, applied in transmission systems and key distribution, can solve problems such as security accidents and a large number of low-power IoT terminals, and achieve the effect of improving data security and ensuring credibility and authority.

Inactive Publication Date: 2018-11-20
ZDST COMM TECH CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a data transmission method, device, and fire protection system to solve the problem of the large number of low-power IoT terminals in actual deployment in the prior art, and any tiny security loopholes may cause huge of security incidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method and apparatus, and fire fighting system
  • Data transmission method and apparatus, and fire fighting system
  • Data transmission method and apparatus, and fire fighting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] like figure 1 As shown, this embodiment provides a data transmission method, which can be applied to, for example, IoT terminals that include IoT detectors, low-power wireless communication modules, MCU modules, or other IoT terminals suitable for wireless IoT, or such as Wireless fire alarm controller, wireless IoT platform and other IoT terminals. The data transmission method provided in this embodiment includes:

[0058]S101. Generate a random character string, and convert the random character string into a first key.

[0059] In a specific application, the first IoT terminal generates a random string before data transmission, and converts the random string into an AES key, and uses the AES key as the key for subsequent encryption and decryption. When the random string is generated, The random string will not change during this data transmission. It should be noted that the user can set according to the actual situation, set each data transmission to generate a ne...

Embodiment 2

[0066] like figure 2 As shown, this embodiment is a further description of the method steps in the first embodiment. In this embodiment, after step S103, include:

[0067] S1031. Receive a monitoring instruction sent by the second IoT terminal, and acquire environmental monitoring data according to the monitoring instruction.

[0068] In a specific application, the first IoT terminal receives the monitoring instruction sent by the second IoT terminal, that is, obtains the monitoring data of the environment according to the monitoring instruction, wherein the monitoring instruction refers to controlling the first IoT terminal to monitor the first IoT terminal Instructions for monitoring the surrounding environment; monitoring data include but are not limited to smoke concentration, ambient temperature, sound and light values ​​or other environmental monitoring data obtained by smoke sensors or other sensors.

[0069] S1032. Encrypt the monitoring data and device status data ...

Embodiment 3

[0086] like image 3 As shown, this embodiment provides a data transmission method, which can be applied to IoT detectors, low-power wireless communication modules, MCU modules or other IoT terminals suitable for wireless IoT, or wireless fire alarms Alarm controller, wireless IoT platform and other IoT terminals. The data transmission method provided in this embodiment includes:

[0087] S201. Receive a first encrypted field and a device identifier sent by a first Internet of Things terminal, and verify whether the device identifier is a device identifier bound by a user.

[0088] In a specific application, when the second IoT terminal receives the first encrypted field and the device identifier sent by the first IoT terminal, it should verify whether the device identifier is the device identifier bound to the network access user, if the device identifier is the device identifier, it is determined that the first IoT terminal is a correct interactive IoT terminal for the cur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of fire fighting data transmission, and provides a data transmission method and apparatus, and a fire fighting system. The method comprises the following steps: generating a random character string, converting the random character string into a first key, encrypting the first key by using a preset public key to generate a first encryption field, and sending the first encryption field and a device identifier of a current device to a second Internet of Things terminal. According to the data transmission method and apparatus provided by the invention, the random character string is converted into the key, the data between the Internet of Things terminals are encrypted and decrypted through the preset public key and a corresponding private key, so that the data are not tampered, the data security is improved, and meanwhile the credibility and the authority of the fire fighting authority are guaranteed.

Description

technical field [0001] The invention belongs to the technical field of fire protection, and in particular relates to a data transmission method, device and fire protection system. Background technique [0002] With the rapid development of the Internet of Things industry, the scale of Internet of Things terminals is also expanding, and the number of terminals is increasing day by day. Low-power IoT devices have the characteristics of low power consumption, no need to charge for a long time, and low computing power. LoRa and NB-IOT are the main technical representatives of low-power IoT. NB-IOT technology and LoRa technology have gradually become low-power The research hotspots of the Internet of Things, the security problems it faces and the security technical means have become important research contents. [0003] However, in the actual deployment, the number of low-power IoT terminals is huge, and any tiny security hole may cause a huge security incident. The Internet of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04L29/08
Inventor 王元鹏
Owner ZDST COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products