Communication method and device between Internet of Things devices
A technology of an Internet of Things device and a communication method, which is applied in the field of communication methods and devices between Internet of Things devices, and can solve problems such as low communication security and data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0125] refer to figure 1 , which shows a flow chart of a communication method between IoT devices according to an embodiment of the present application, and the specific steps include:
[0126] Step 101, establishing a communication connection between a first IoT device and a trusted device.
[0127] Since the trusted device is trusted, in order to enable both the first IoT device and the second IoT device to obtain the first communication key in a safe and reliable manner, reduce the possibility of the first communication key leaking, and then realize encryption Communication, to improve the security of communication, can establish a communication connection between the first IoT device and the trusted device.
[0128] The first IoT device and the trusted device can form a local area network through the router.
[0129] The communication connection between the first IoT device and the trusted device can be established through TCP ((Transmission Control Protocol, Transmission ...
Embodiment 2
[0143] refer to figure 2 , which shows a flow chart of a communication method between IoT devices according to an embodiment of the present application, and the specific steps include:
[0144] Step 201, respectively establish communication connections between the trusted device and the first IoT device and the second IoT device.
[0145] Since the trusted device is trusted, in order to enable both the first IoT device and the second IoT device to obtain the first communication key in a safe and reliable manner, thereby realizing encrypted communication and improving the security of communication, they can be respectively A communication connection between the trusted device and the first IoT device and the second IoT device is established.
[0146] The trusted device can determine the first IoT device and the second IoT device from the Internet of Things, for example, by receiving user designation, random selection, receiving cloud designation, etc., to determine the first ...
Embodiment 3
[0155] refer to image 3 , which shows a flow chart of a communication method between IoT devices according to an embodiment of the present application, and the specific steps include:
[0156] In step 301, the trusted device respectively establishes communication connections between the trusted device and a first IoT device and a second IoT device.
[0157] Wherein, the way in which the trusted device respectively establishes the communication connection with the first IoT device and the second IoT device can refer to the relevant description in the foregoing, and details will not be repeated here.
[0158] In this embodiment of the present application, optionally, in order to make the first IoT device or the second IoT device determine that the trusted device is credible, that is, ensure the reliability of the trusted device, and improve the security of subsequent acquisition of the first communication key and reliability, improve the security and reliability of encrypted c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


