Data transmission, message analysis method, device and equipment

A data transmission method and message technology, applied in the communication field

Active Publication Date: 2021-02-26
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of IoT terminal attack protection, after the IoT terminal is attacked, although the attack can be detected, since the terminal has been controlled by the attacker, how to securely transmit data to the IoT control device has become a technical problem that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission, message analysis method, device and equipment
  • Data transmission, message analysis method, device and equipment
  • Data transmission, message analysis method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0067] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a data transmission and message analysis method, apparatus and device. A message is generated through a secret channel so that alarm data is not perceived by an attack side, the secret channel can transform check code fields and can employ a private rule to generate check codes; the attack side receives the message and can generate a condition of failed checking according to the checking rule of a predetermined communication protocol, so that the attack side can consider that a wrong message is received and cannot perceive the alarm data emitted by an IoT terminal, and for an IoT control device, the private rule can be employed to analyze the alarm data in the message to achieve secrete transmission of the alarm data.

Description

technical field [0001] This specification relates to the field of communications, and in particular to methods, devices, and equipment for data transmission and message analysis. Background technique [0002] At present, IoT (Internet of things, Internet of Things) devices such as routers, home cameras, smart watches or smart bracelets, etc., are becoming more and more important in people's work or life. However, the attack research and attempts on IoT terminals It is also becoming more and more popular. Therefore, IoT terminals need to improve the corresponding security protection capabilities. From the perspective of IoT terminal attack protection, after the IoT terminal is attacked, although the attack can be detected, since the terminal has been controlled by the attacker, how to securely transmit data to the IoT control device has become a technical problem that needs to be solved urgently. Contents of the invention [0003] In order to overcome the problems existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L29/08H04L1/00
CPCH04L1/0061H04L41/0631H04L63/18H04L67/12
Inventor 赵豪
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products