Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method, device and system for internet of things

A data encryption and key technology, applied in the field of information security

Active Publication Date: 2021-08-13
深圳数联天下智能科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide an encryption and decryption method, device and Internet of Things system for the contradiction between security protection capabilities and terminal processing capabilities in traditional technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, device and system for internet of things
  • Encryption and decryption method, device and system for internet of things
  • Encryption and decryption method, device and system for internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] In order to facilitate the understanding of the present invention, the present invention will be described more fully below with reference to the associated drawings. A preferred embodiment of the invention is shown in the drawings. However, the present invention can be embodied in many different forms and is not limited to the embodiments described herein. Rather, these embodiments are provided so that the disclosure of the present invention will be thorough and complete.

[0099] It should be noted that when an element is considered to be "connected" to another element, it may be directly connected to and integrally integrated with the other element, or there may be an intervening element at the same time. The terms "mounted", "one end", "the other end" and similar expressions are used herein for the purpose of description only.

[0100] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to an encryption and decryption method, device and Internet of Things system. The encryption and decryption method is applied to the server. The method obtains the configuration information of the target network node terminal, and judges whether the terminal is overloaded according to the obtained configuration information; when it is judged that the terminal is overloaded, a first Send the encryption-like pattern to the target network node terminal, instructing the terminal to perform data encryption or decryption according to the first preset rule; when it is determined that the target network node terminal is not overloaded, generate and send the second-type encryption pattern to the target network node terminal, The second type of encryption pattern instructs the target network node terminal to encrypt or decrypt data according to the second preset rule, and adaptively adjusts the method used by the terminal to encrypt or decrypt data, so as to reasonably allocate terminal resources and improve terminal operation speed and stability.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an encryption and decryption method, device and Internet of Things system. Background technique [0002] The statements herein merely provide background information related to the present application and do not necessarily constitute prior art. [0003] The AIoT (Artificial Internet of Thing) is booming, and the number of smart terminals (Smart Terminal) is increasing sharply, with great security risks and a low proportion of security links in the IoT industry chain. The Internet of Things business penetrates into many industries and affects people's lives in all aspects. The corresponding security issues will also pose serious threats, even including life and property safety. Terminal security is getting more and more attention. Terminal security includes physical security, access security, communication security, data security, and system security. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0869H04L9/0891H04L63/0435H04L67/1008H04L67/12
Inventor 刘滔
Owner 深圳数联天下智能科技有限公司