Supercharge Your Innovation With Domain-Expert AI Agents!

Information security transmission method and system

A technology of information security and transmission method, which is applied in the direction of transmission system, digital transmission system, secure communication device, etc. It can solve the problems that the key is easy to be cracked, the security cannot be guaranteed, and the lack of identity authentication services of authoritative institutions, etc., to ensure communication Safety and the effect of improving safety

Pending Publication Date: 2020-05-08
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing technology, the smart home has the following technical defects in communication security authentication: first, the home gateway communicates with the cloud server in plain text, which will pose a serious threat to the security of the smart home; second, it uses non-national secret low-intensity The security of the software encryption algorithm cannot be guaranteed, it is not self-controllable, and there is no guarantee that there will be no backdoor; the third is that the existing traditional encryption method only uses one key for each terminal or only selects the key in a limited space. The key is easy to be cracked; Fourth, all smart home manufacturers have built their own certification systems, lacking authoritative organizations to provide reliable identity certification services, and user security has to rely entirely on the integrity of manufacturers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security transmission method and system
  • Information security transmission method and system
  • Information security transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0043] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0044] A method for secure information transmission, applied to smart home systems, such as figure 1 As shown, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security transmission method and system, and belongs to the technical field of communication security. The method comprises the steps that S1, generating a firstsecret key via a cloud service platform; S2, storing the private key, and sending the public key to the corresponding security gateway; S3, writing the public key into the state secret chip; S4, generating a second secret key, and encrypting the second secret key by using the public key; S5, transmitting the encrypted second secret key to the cloud service platform; S6, decrypting through the private key to obtain a second secret key, and storing the second secret key; S7, performing encryption and decryption operation through the second secret key; the system comprises a first receiving module, a generation module, a storage module, a first sending module, an encryption and decryption module, a second receiving module, a write-in module and a second sending module. The method has the beneficial effects that the encryption algorithm is ensured to be autonomous and controllable, the certification authority is authoritative and credible, the security and reliability of information transmission are improved, and the communication security is ensured.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular to an information security transmission method and system. Background technique [0002] With the rapid development of the Internet and Internet of Things technology, smart homes have emerged as the times require. Smart homes use Internet of Things technology to integrate various devices in the home (such as audio and video equipment, lighting systems, curtain control, air conditioning control, security systems, digital cinema systems, etc.) , audio-visual server, shadow cabinet system, network appliances, etc.) are connected together to provide home appliance control, lighting control, telephone remote control, indoor and outdoor remote control, anti-theft alarm, environmental monitoring, HVAC control, infrared forwarding and programmable timing control, etc. functions and means. Compared with ordinary homes, smart homes not only have traditional residential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0891H04L63/0435H04L63/045
Inventor 吴治平顾荣杰肖容
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More