Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure transmission method and system based on SM2 key agreement mechanism

A key negotiation and secure transmission technology, applied in the field of secure transmission methods and systems based on SM2 key negotiation mechanism, can solve the problems of SSLVPN terminal access performance limitation, complex SSLVPN process, slow terminal access speed, etc. The effect of network bandwidth resource consumption, small data volume, and simplified format

Active Publication Date: 2022-02-18
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are mainly: 1. SSLVPN needs to be bound with TCP connections one by one when IoT terminals access, which requires the server-side security access system to maintain a number of TCP connections equivalent to the number of online terminals, and these connections are all SSL encrypted connections. When a large number of encrypted heartbeat packets will cause a heavy burden, the terminal access performance using SSLVPN is greatly limited; 2. The SSLVPN connection establishment process is relatively complicated, and multiple groups of data packets need to be exchanged to complete the key negotiation. Therefore, the terminal access relatively slow entry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure transmission method and system based on SM2 key agreement mechanism
  • A secure transmission method and system based on SM2 key agreement mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0055] figure 1 A flowchart showing a secure transmission method based on the SM2 key agreement mechanism of the present invention.

[0056] Such as figure 1 As shown, a secure transmission method based on the SM2 key agreement mechanism of this embodiment includes:

[0057] Step 1: The IoT terminal and the IoT server negotiate a session key based on the national secret SM2 key negotiation mechanism;

[0058] Step 2: The Internet of Things terminal generates service reporting data, encrypts the service reporting data using the session key, and reports the encrypted service reporting data ciphertext to the Internet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure transmission method and system based on an SM2 key agreement mechanism. The method includes: the Internet of Things terminal and the Internet of Things server negotiate a session key; the Internet of Things terminal generates service report data, encrypts the data, and reports the encrypted service report data ciphertext to the Internet of Things server, and the Internet of Things service The terminal decrypts and reports the data ciphertext and performs business processing; after the IoT server performs business processing, it generates business delivery data, encrypts the data, and sends the encrypted business delivery data ciphertext to the IoT terminal. The IoT terminal decrypts the ciphertext of the service-delivered data to obtain the plaintext of the service-delivered data. On the premise that the terminal of the Internet of Things and the server can be safely accessed through identity authentication and the security of data communication is ensured, the present invention adopts a key negotiation mechanism based on the national secret SM2 algorithm to simplify the key negotiation interaction process between the terminal of the Internet of Things and the server , to reduce network resource consumption and delay problems.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a secure transmission method and system based on an SM2 key agreement mechanism. Background technique [0002] For massive IoT device communication scenarios, IoT terminals and servers need to perform frequent business interactions. It is necessary to ensure the credible identity of IoT terminals and prevent counterfeit and illegal IoT terminal access. At the same time, the data communication between the IoT terminal and the server needs to ensure the data leakage, eavesdropping and tamper-proof of the communication parties, and ensure the confidentiality and integrity of the data. [0003] Traditional terminal security access is mainly implemented based on SSLVPN technology. With the development of the Internet of Things technology, various types of Internet of Things terminals have emerged in large numbers, and the access demand has increased sharply. The tradi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40H04L67/12
CPCH04L9/3263H04L9/0838H04L63/0823H04L63/0435H04L67/12
Inventor 李汶昊孙晓鹏李鑫王德才袁朝阳卫志刚
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH