Supercharge Your Innovation With Domain-Expert AI Agents!

Data transmission security control method and device, computer equipment and Internet of Things system

A technology of data transmission security and control method, which is applied in the field of data transmission security control method and device, computer equipment and Internet of Things system, can solve the problem of low security of data encryption or decryption, and improve anti-cracking ability and security Effect

Active Publication Date: 2019-11-08
深圳数联天下智能科技有限公司
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a data transmission security control method and device, computer equipment and an Internet of Things system for the problem of low data encryption or decryption security in traditional technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission security control method and device, computer equipment and Internet of Things system
  • Data transmission security control method and device, computer equipment and Internet of Things system
  • Data transmission security control method and device, computer equipment and Internet of Things system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to facilitate the understanding of the present invention, the present invention will be described more fully below with reference to the associated drawings. A preferred embodiment of the invention is shown in the drawings. However, the present invention can be embodied in many different forms and is not limited to the embodiments described herein. Rather, these embodiments are provided so that the disclosure of the present invention will be thorough and complete.

[0078] It should be noted that when an element is considered to be "connected" to another element, it may be directly connected to and integrally integrated with the other element, or there may be an intervening element at the same time. The terms "mounted", "one end", "the other end" and similar expressions are used herein for the purpose of description only.

[0079] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data transmission security control method and device, computer equipment and an Internet of Things system. The data transmission security control method applied to a targetnetwork node terminal comprises the steps of obtaining a dynamic code sent by a server; generating a key seed according to the dynamic code, the configuration information of the target network node terminal and a key seed generation algorithm; inputting the key seed into a symmetric key generator, and obtaining a first key generated by the symmetric key generator; and performing data encryption ordecryption by adopting the first key. A dynamically changing key seed is obtained through dynamic and static combination, so that the data transmission security of the target network node terminal isimproved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a data transmission security control method and device, computer equipment, and an Internet of Things system. Background technique [0002] The statements herein merely provide background information related to the present application and do not necessarily constitute prior art. [0003] The AIoT (Artificial Internet of Thing) is booming, and the number of smart terminals (Smart Terminal) is increasing sharply, with great security risks and a low proportion of security links in the IoT industry chain. The Internet of Things business penetrates into many industries and affects people's lives in all aspects. The corresponding security issues will also pose serious threats, even including life and property safety. Terminal security is getting more and more attention. Among them, data transmission security in the communication process is a key link in terminal s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/16H04L9/08
CPCH04L9/083H04L9/0861H04L9/16H04L63/0435H04L63/062H04L63/068
Inventor 刘滔
Owner 深圳数联天下智能科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More