Data interaction method and device based on Internet of Things

A data interaction and Internet of Things technology, applied in the field of data interaction based on the Internet of Things, can solve the problems of complex terminal key management and high development costs, and achieve the effect of reducing the complexity of key management and the cost of key management

Active Publication Date: 2020-06-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a data interaction method and device based on the Internet of Things to at least solve the technology of complex terminal key management and high development cost due to the need to rely on product keys when managing terminal keys through cloud technology question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0036] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data interaction method and device based on the Internet of Things. The method comprises the following steps: acquiring a first identity identifier and first encrypted data of first terminal equipment sent by the first terminal equipment, searching a first data set in a multi-order query table according to a first index position, searching a first decryption key in the first storage table according to the first storage position information under the condition that the first data set is searched in the multi-order query table, and under the condition that the first decryption key is found in the first storage table, decrypting the first encrypted data in the first data packet by using the first decryption key to obtain the original data. According to the invention,the technical problems of complex terminal key management and high development cost caused by dependence on a product key when the terminal key is managed through a cloud technology are solved.

Description

technical field [0001] The present invention relates to the field of computer internet of things, in particular, to a data interaction method and device based on internet of things. Background technique [0002] Cloud technology refers to a hosting technology that unifies a series of resources such as hardware, software, and network in a wide area network or a local area network to realize data calculation, storage, processing, and sharing. Cloud technology can be applied to medical cloud, cloud IoT, cloud security, cloud calling, cloud gaming, cloud education, cloud conference, cloud social networking, etc. [0003] Cloud Security refers to the general term for secure software, hardware, users, institutions, and secure cloud platforms based on cloud computing business model applications. The keys of a large number of terminals can be managed through the secure cloud platform. Use the same set of basic keys for all terminals of the same IoT product as one type, one secret....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/08
CPCH04L9/0894H04L67/10H04L67/12
Inventor 高树磊郑冬冬汪礼超戴胜冬王辉郑宗清
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products