Unlock instant, AI-driven research and patent intelligence for your innovation.

A data transmission encryption device based on the Internet of Things

A technology for data transmission and encryption equipment, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve problems such as data distortion detection, data security cannot be guaranteed, data abnormality, etc., to improve encryption security, The effect of increasing the difficulty of stealing and reducing the degree of interference

Active Publication Date: 2022-05-17
广东悦思科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of the Internet of Things technology, it has provided a lot of convenience and improved people's life and work. However, due to the openness and diversity of the network, when data is transmitted between devices, The security of the data is not guaranteed, which damages the integrity of the transmitted data and reduces the security of the transmitted data
[0003] When communicating between devices, once the transmitted data is stolen, the transmitted data will be abnormal, and even cause serious consequences. Data encryption is used to improve the security and confidentiality of information transmission and data, and prevent secret data from being stolen by the outside world. Deciphering, the existing commonly used encryption method adopts overall encryption processing, which cannot perform decentralized encryption processing on the transmitted data and cannot judge the encryption level of the transmitted data, and cannot automatically encrypt according to the encryption level of the data to be transmitted At the same time, it is impossible to perform distortion detection on the encrypted transmitted data to determine whether the encrypted transmitted data is abnormal, and it is impossible to self-destruct the abnormal data to reduce the impact or damage of the encrypted transmitted abnormal data on the receiving device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data transmission encryption device based on the Internet of Things
  • A data transmission encryption device based on the Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0046] see figure 1 and 2 As shown, a data transmission encryption device based on the Internet of Things includes a data encryption processing module, an encryption index analysis module, a feedback analysis module, a data calibration module, a data transmission module, a decryption analysis device, a data receiving module and a data storage module.

[0047] The data receiving module sends the transmission data information to the sending device communicating with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data transmission encryption device based on the Internet of Things, including a data encryption processing module, an encryption index analysis module, a feedback analysis module, a data calibration module, a data transmission module, a decryption analysis device, a data receiving module and a data storage module. The present invention uses the encryption index analysis module, the data calibration module and the data encryption processing module in combination with the encrypted data to be encrypted, and decrypts and compares the transmitted encrypted sub-packages to determine whether the data in each sub-package is Loss and statistics of the comprehensive untrustworthiness coefficient of the data file to be encrypted and the untrustworthiness coefficient of each sub-package, through the comparison and judgment of the untrustworthy coefficient to determine whether to send a data self-destruct command to self-destruct the sub-package with lost or increased data, so as to ensure The integrity of the data in the subpackage reduces the information interference and damage of the entire data file to be encrypted by abnormal subpackage data, and improves the encryption security of the data file to be encrypted.

Description

technical field [0001] The invention belongs to the technical field of data transmission encryption, and relates to a data transmission encryption device based on the Internet of Things. Background technique [0002] With the rapid development of the Internet of Things technology, it has provided a lot of convenience and improved people's life and work. However, due to the openness and diversity of the network, when data is transmitted between devices, The security of the data is not guaranteed, which damages the integrity of the transmitted data and reduces the security of the transmitted data. [0003] When communicating between devices, once the transmitted data is stolen, the transmitted data will be abnormal, and even cause serious consequences. Data encryption is used to improve the security and confidentiality of information transmission and data, and prevent secret data from being stolen by the outside world. Deciphering, the existing commonly used encryption method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0428H04L63/0464
Inventor 邓嘉明侯跃恩容爱琼廖勇军张海鑫曾祥煜
Owner 广东悦思科技有限公司