CN102694753A - Gateway equipment capable of carrying out encryption transmission on data, system and method thereof - Google Patents
Gateway equipment capable of carrying out encryption transmission on data, system and method thereof Download PDFInfo
- Publication number
- CN102694753A CN102694753A CN2011100736384A CN201110073638A CN102694753A CN 102694753 A CN102694753 A CN 102694753A CN 2011100736384 A CN2011100736384 A CN 2011100736384A CN 201110073638 A CN201110073638 A CN 201110073638A CN 102694753 A CN102694753 A CN 102694753A
- Authority
- CN
- China
- Prior art keywords
- gateway equipment
- intended
- address
- data
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
An encryption key table and a decryption key table are stored in gateway equipment capable of carrying out encryption transmission on data. When the gateway equipment outputs data to the target gateway equipment, an IP address of the target gateway equipment is acquired from the data. When the IP address of the target gateway equipment is determined to be in the encryption key table, an encryption key corresponding to the IP address is acquired from the encryption key table and the acquired encryption key is used to carry out the encryption on the data, after that the data is transmitted to the target gateway equipment. When the gateway equipment receives the data transmitted by source gateway equipment, the IP address of the source gateway equipment is acquired from the transmitted data. When the IP address of the source gateway equipment is determined to be in the decryption key table, the decryption key corresponding to the IP address is acquired to carry out the decryption on the received data. Simultaneously, the invention provides a system which carries out encryption transmission on the data and a method thereof. By using the equipment, the system and the method of the invention, the data passing through the source gateway equipment is automatically encrypted and the data transmitted to the target gateway equipment is automatically decrypted.
Description
Technical field
The present invention relates to a kind of gateway device, system and method that data is carried out encrypted transmission.
Background technology
Generally, the transfer of data between the heterogeneous networks need be changed through gateway device, and is encrypted if some data does not have at the terminal, can be not encrypted through the gateway device time yet, so, can't guarantee transmit safety of data.
Summary of the invention
In view of this, data are carried out gateway device, the system and method for encrypted transmission, during through source gateway equipment, can encrypt automatically, when transferring to intended gateway equipment, decipher automatically in data so need provide a kind of.
This system that data are carried out encrypted transmission comprises source gateway equipment and at least one intended gateway equipment; This source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet; This source gateway equipment is with transfer of data to intended gateway equipment; This source gateway device storage one encryption key table, the encryption key of having stored the IP address of at least one intended gateway equipment in this encryption key table and the data that transfer to this at least one intended gateway equipment being encrypted, receive the data that need transmission when source gateway equipment after; From these data, obtain the IP address of intended gateway equipment; Whether the IP address of confirming this intended gateway equipment then is present in this encryption key table, if exist, then from this encryption key table, obtains the corresponding encryption key in this IP address; And utilize the encryption key that is obtained that these data are encrypted, and data encrypted is transferred to intended gateway equipment; This intended gateway device storage one decruption key table; The IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered have been stored in this decruption key table; When intended gateway equipment received the data of source gateway device transmission, the IP address that from the data of being transmitted, obtains source gateway equipment earlier confirmed then whether the IP address of this source gateway equipment is present in this decruption key table; If exist; Then obtain the corresponding decruption key in this IP address the data that received are deciphered,, then do not receive these data if do not exist.
Between gateway device, carry out in the method for data encryption transmission; Comprise source gateway equipment and at least one intended gateway equipment in this gateway device; This source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet, and this source gateway equipment is with transfer of data to intended gateway equipment
This source gateway device storage one encryption key table has been stored the IP address of a plurality of intended gateway equipment and the encryption key that the data that transfer to an intended gateway equipment are encrypted in this encryption key table; This intended gateway device storage one decruption key table has been stored the IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered in this decruption key table; This method comprises: receive the data of needs transmission when source gateway equipment after, and the IP address that from these data, obtains intended gateway equipment; Whether the IP address of confirming this intended gateway equipment is present in this encryption key table; If exist, then from this encryption key table, obtain the corresponding encryption key in this IP address, and utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment; When intended gateway equipment receives the data of source gateway device transmission, obtain the IP address of source gateway equipment in the data of being transmitted; Whether the IP address of confirming this source gateway equipment is present in this decruption key table, if exist, then obtains the corresponding decruption key in this IP address the data that received are deciphered.
This gateway device that data are carried out encrypted transmission is connected between local area network (LAN) and the internet; This gateway device comprises a memory cell and a processing unit; This cell stores one encryption key and a decruption key table have been stored the IP address of a plurality of gateway devices and the encryption key that the data that transfer to each gateway device are encrypted in this encryption key table; The IP address of a plurality of gateway devices and decruption key have been stored in this decruption key table to deciphering from the data that this gateway device transmitted; This processing unit is when receiving needs through this gateway device dateout to intended gateway equipment; Obtain the IP address of intended gateway equipment in from these data, obtaining; Whether the IP address of confirming this intended gateway equipment then is present in this encryption key table, if exist, then from this encryption key table, obtains the corresponding encryption key in this IP address; And utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment; When this intended gateway equipment receives the data of a source gateway device transmission; The IP address that earlier from the data of being transmitted, obtains source gateway equipment; Whether the IP address of confirming this source gateway equipment then is present in this decruption key table; If exist, then obtain the corresponding decruption key in this IP address the data that received are deciphered.
Compared to prior art, the present invention encrypts and decipher function through gateway device is provided with, and makes through the data of source gateway equipment and encrypts automatically, and the data that transfer to intended gateway equipment are deciphered automatically.
Description of drawings
Fig. 1 is for carrying out the sketch map of transfer of data between the gateway device.
Fig. 2 is for carrying out the calcspar of the gateway device of encrypted transmission to data.
Sketch map when Fig. 3 carries out encrypted key exchange for source gateway equipment and intended gateway equipment.
The flow chart of the method when Fig. 4 encrypts the packet of output for source gateway equipment.
The flow chart of the method the when packet that Fig. 5 receives for the intended gateway equipment interconnection is deciphered.
The main element symbol description
Local area network (LAN) | 1 |
The |
2 |
|
3 |
|
31 |
Intended |
32 |
|
311 |
|
312 |
|
321 |
|
322 |
Following embodiment will combine above-mentioned accompanying drawing to further specify the present invention.
Embodiment
As shown in Figure 1, between local area network (LAN) 1 and internet 2, be provided with gateway device 3, this local area network (LAN) 1 and internet 2 carry out the transmission of data between the heterogeneous networks through this gateway device 3.
Has the process of carrying out the data encryption transmission between the gateway device of data encryption transfer function below in conjunction with Fig. 2 explanation.Describe for ease, the gateway device 3 of data receiver is designated as source gateway equipment 31, data receiver's gateway device 3 is designated as intended gateway equipment 32.This source gateway equipment 31 comprise one first processing unit 311 and one first memory cell 312.This intended gateway equipment 32 comprises one second processing unit 321 and one second memory cell 322.All store an encryption key table and a decruption key table in this first memory cell 312 and second memory cell 322.Write down in this encryption key table for the IP address of other gateway devices and when transferring to the data encryption of this gateway device used key, write down in this decruption key table for the IP address of other gateway devices and to key used when the data of this gateway device transmission are deciphered.
When first processing unit 311 of this source gateway equipment 31 receives the data of terminal equipment (not shown) transmission; To the data based predetermined rule packing that is received; Produce a packet; The IP address that includes intended gateway equipment 32 in this packet, this first processing unit 311 obtains the IP address of this intended gateway equipment 31 from this packet, and confirms whether this IP address is present in the encryption key table that is stored in this first memory cell 312; When this IP address is present in this encryption key table; This first processing unit 311 obtains the corresponding encryption key in this IP address, and utilizes this close encryption key that this packet is encrypted, and the data encrypted bag is transferred to intended gateway equipment 32.
When this IP address is not present in this encryption key table; 311 of this first processing units carry out the exchange (concrete exchange process please refer to Fig. 3) of encryption key with intended gateway equipment 32; Obtain the encryption key of intended gateway equipment 32, and the encryption key and the IP address of intended gateway equipment 32 is recorded in the encryption key table of this source gateway equipment 31.Simultaneously with the encryption key and IP address transfer to the intended gateway equipment 32 of source gateway equipment 31, and be stored in the encryption key table of intended gateway equipment 32.This first processing unit 311 utilizes the encryption key that is exchanged that this packet is encrypted then, and the data encrypted bag is transferred to intended gateway equipment 32.
As shown in Figure 3; Sketch map when carrying out encrypted key exchange for source gateway equipment 31 and intended gateway equipment 32; At first, when first processing unit 311 judged that the IP address of intended gateway equipment 32 is not present in the encryption key table of first memory cell 312, this first processing unit 311 produced a pair of PKI Ka and private key Kpa at random; Then this PKI Ka is transferred to intended gateway equipment 32; Then when receiving the PKI that source gateway equipment 31 sends, also produce a pair of PKI Kb and private key Kpb at random, and in the decruption key table that the IP address and the private key Kpa of source gateway equipment 31 is recorded in intended gateway equipment.Use the PKI Ka that is received that PKI Kb in the intended gateway equipment 32 and private key Kpb are encrypted then; And the PKI Kb after will encrypting and private key Kpb transfer to source gateway equipment 31; When source gateway equipment 31 receives this PKI Kb and private key Kpb; With the PKI Ka in the source gateway equipment 31 the PKI Kb and the private key Kpb of 32 transmission of intended gateway equipment are deciphered; And the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table that first memory cell 312 stored, and the IP address and the private key in the source gateway equipment of intended gateway equipment is recorded in the decruption key table of source gateway equipment.With this PKI Kb the private key Kpa in the source gateway equipment 31 is encrypted then; And the Kpa after will encrypting transfers to intended gateway equipment 32; After this intended gateway equipment 32 receives the private key Kpa after the encryption; With private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of intended gateway equipment 32.
When this intended gateway equipment 32 receives this packet; At first from this packet, obtain the IP address of source gateway equipment; Confirm then whether this IP address is present in the decruption key table in this intended gateway equipment 32; If exist, then obtain the corresponding decruption key in this IP address, the packet that is received is deciphered.When not existing, then do not receive this packet.
As shown in Figure 4, the flow chart of the method when encrypting for the packet of 31 pairs of outputs of source gateway equipment.
At first, when first processing unit 311 of this source gateway equipment 31 received the data of terminal equipment (not shown) transmission, the data based predetermined rule packing to being received produced a packet (step S401).
This first processing unit 311 obtains the IP address (step S402) of this intended gateway equipment 32 from this packet.
This first processing unit 311 confirms whether this IP address is present in the encryption key table that is stored in this first memory cell 312 (step S403).
When this IP address is present in this encryption key table; This first processing unit 311 obtains the corresponding encryption key in this IP address; And utilize this close encryption key that this packet is encrypted, and the data encrypted bag is transferred to intended gateway equipment 32 (step S404).
When this IP address is not present in this encryption key table; 311 of this first processing units carry out the exchange of encryption key with intended gateway equipment 32; Obtain the encryption key of intended gateway equipment 32; And in the encryption key table that the encryption key and the IP address of intended gateway equipment 32 is recorded to this source gateway equipment 31 (step S405), return then and carry out this step S404.
As shown in Figure 5, the flow chart of the method when deciphering for the packet of 32 pairs of receptions of intended gateway equipment.
At first, when this intended gateway equipment 32 received this packet, this second processing unit 321 obtained the IP address (step S501) of source gateway equipment from this packet.
This second processing unit 321 confirms whether this IP address is present in the decruption key table of being stored in this second memory cell 322 (step S502).
If exist, then obtain the corresponding decruption key in this IP address, the packet that is received is deciphered (step S503).When not existing, then do not receive this packet.Process ends.
Claims (10)
1. system that data is carried out encrypted transmission; This system comprises source gateway equipment and at least one intended gateway equipment, and this source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet, and this source gateway equipment is with transfer of data to intended gateway equipment; It is characterized in that
This source gateway device storage one encryption key table; The IP address of at least one intended gateway equipment and the encryption key that the data that transfer to this at least one intended gateway equipment are encrypted have been stored in this encryption key table; Receive the data of needs transmission when source gateway equipment after, the IP address that from these data, obtains intended gateway equipment confirms then whether the IP address of this intended gateway equipment is present in this encryption key table; If exist; Then from this encryption key table, obtain the corresponding encryption key in this IP address, and utilize the encryption key that is obtained that these data are encrypted, and data encrypted is transferred to intended gateway equipment;
This intended gateway device storage one decruption key table; The IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered have been stored in this decruption key table; When intended gateway equipment received the data of source gateway device transmission, the IP address that from the data of being transmitted, obtains source gateway equipment earlier confirmed then whether the IP address of this source gateway equipment is present in this decruption key table; If exist; Then obtain the corresponding decruption key in this IP address the data that received are deciphered,, then do not receive these data if do not exist.
2. as claimed in claim 1 data are carried out the system of encrypted transmission, it is characterized in that, also store the decruption key table in this source gateway equipment, also store encryption key table in this intended gateway equipment.
3. the system that data is carried out encrypted transmission as claimed in claim 2; It is characterized in that; When this source gateway equipment judged that the IP address of intended gateway equipment is not present in this encryption key table, this source gateway equipment then carried out the exchange of encryption key with intended gateway equipment, obtain the encryption key of intended gateway equipment; And the encryption key and the IP address of intended gateway equipment be recorded in the encryption key table of this source gateway equipment; Simultaneously with the encryption key and IP address transfer to the intended gateway equipment of source gateway equipment, and be stored in the encryption key table of intended gateway equipment, then; The encryption key that this source gateway equipment utilization is exchanged is encrypted this packet, and the data encrypted bag is transferred to intended gateway equipment.
4. the system that data is carried out encrypted transmission as claimed in claim 3; It is characterized in that; The process that source gateway equipment and intended gateway equipment carry out key change is: when source gateway equipment judges that the IP address of intended gateway equipment is not present in the encryption key table of source gateway equipment; This source gateway equipment produces a pair of PKI Ka and private key Kpa at random; Then this PKI Ka is transferred to intended gateway equipment; When intended gateway equipment also has the function of data encryption transmission, then when receiving the PKI of source gateway equipment transmission, also produce a pair of PKI Kb and private key Kpb at random; And the IP address of source gateway equipment and the private key Kpb of intended gateway equipment be recorded in the decruption key table of intended gateway equipment; Use the source gateway equipment PKI Ka that is received that PKI Kb in the intended gateway equipment and private key Kpb are encrypted then, and the PKI Kb after will encrypting and private key Kpb transfer to source gateway equipment, when source gateway equipment receives this PKI Kb and private key Kpb; With the PKI Ka in the source gateway equipment PKI Kb and the private key Kpb of intended gateway device transmission are deciphered; And the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table of source gateway equipment, and the IP address and the private key in the source gateway equipment of intended gateway equipment is recorded in the decruption key table of source gateway equipment, with this PKI Kb the private key Kpa in the source gateway equipment encrypted then; And the Kpa after will encrypting transfers to intended gateway equipment; After this intended gateway equipment receives the private key Kpa after the encryption, with private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of intended gateway equipment.
5. one kind is carried out the method that data encryption is transmitted between gateway device; Comprise a source gateway equipment and at least one intended gateway equipment in this gateway device; This source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet, and this source gateway equipment is with transfer of data to intended gateway equipment
This source gateway device storage one encryption key table has been stored the IP address of a plurality of intended gateway equipment and the encryption key that the data that transfer to an intended gateway equipment are encrypted in this encryption key table;
This intended gateway device storage one decruption key table has been stored the IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered in this decruption key table; It is characterized in that this method comprises:
Receive the data of needs transmission when source gateway equipment after, the IP address that from these data, obtains intended gateway equipment;
Whether the IP address of confirming this intended gateway equipment is present in this encryption key table;
If exist, then from this encryption key table, obtain the corresponding encryption key in this IP address, and utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment;
When intended gateway equipment receives the data of source gateway device transmission, obtain the IP address of source gateway equipment in the data of being transmitted;
Whether the IP address of confirming this source gateway equipment is present in this decruption key table, if exist, then obtains the corresponding decruption key in this IP address the data that received are deciphered.
6. as claimed in claim 5ly it is characterized in that, also store the decruption key table in this source gateway equipment, also store encryption key table in this intended gateway equipment between gateway device, carrying out the method for data encryption transmission.
7. as claimed in claim 6 between gateway device, carrying out the method for data encryption transmission; It is characterized in that; When this source gateway equipment judges that the IP address of intended gateway equipment is not present in this encryption key table; Carry out the exchange of encryption key between source gateway equipment and the intended gateway equipment, use the key of the intended gateway equipment that is exchanged that data are encrypted then, and data encrypted is transferred to intended gateway equipment.
8. as claimed in claim 7 between gateway device, carrying out the method for data encryption transmission, it is characterized in that the process that source gateway equipment and intended gateway equipment carry out key change is:
When source gateway equipment judged that the IP address of intended gateway equipment is not present in the encryption key table of source gateway equipment, this source gateway equipment produced a pair of PKI Ka and private key Kpa at random;
Ka transfers to intended gateway equipment with this PKI,
Intended gateway equipment also produces a pair of PKI Kb and private key Kpb at random when receiving the PKI of source gateway equipment transmission;
The IP address of source gateway equipment and private key Kpb are recorded in the decruption key table of intended gateway equipment; Use the PKI Ka that is received that PKI Kb in the intended gateway equipment and private key Kpb are encrypted then, and the PKI Kb after will encrypting and private key Kpb transfer to source gateway equipment;
When source gateway equipment receives this PKI Kb and private key Kpb; With the PKI Ka in the source gateway equipment PKI Kb and the private key Kpb of intended gateway device transmission are deciphered; And the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table that source gateway equipment stored, and the IP address and the private key in the source gateway equipment of intended gateway equipment is recorded in the decruption key table of source gateway equipment;
With this PKI Kb the private key Kpa in the source gateway equipment is encrypted; And the Kpa after will encrypting transfers to intended gateway equipment; After this intended gateway equipment receives the private key Kpa after the encryption; With private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of intended gateway equipment.
9. one kind is carried out the gateway device of encrypted transmission to data, and this gateway device is connected between local area network (LAN) and the internet, and this gateway device comprises a memory cell and a processing unit, it is characterized in that,
This cell stores:
One encryption key table has been stored the IP address of a plurality of gateway devices and the encryption key that the data that transfer to each gateway device are encrypted in this encryption key table;
One decruption key table has been stored the IP address of a plurality of gateway devices and the decruption key to deciphering from the data that this gateway device transmitted in this decruption key table;
When needs pass through this gateway device dateout to intended gateway equipment; This processing unit obtains the IP address of intended gateway equipment from these data; Whether the IP address of confirming this intended gateway equipment then is present in this encryption key table, if exist, then from this encryption key table, obtains the corresponding encryption key in this IP address; And utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment;
When this gateway device receives the data of a source gateway device transmission; The IP address that earlier from the data of being transmitted, obtains source gateway equipment; Whether the IP address of confirming this source gateway equipment then is present in this decruption key table; If exist, then obtain the corresponding decruption key in this IP address the data that received are deciphered.
10. the gateway device that data is carried out encrypted transmission as claimed in claim 9; It is characterized in that; When needs pass through this gateway device dateout to intended gateway equipment; IP address confirming this intended gateway equipment is not present in this encryption key table, and this gateway device produces a pair of PKI Ka and private key Kpa at random; Ka transfers to intended gateway equipment with this PKI; When this intended gateway equipment receives the PKI Ka of this source gateway equipment transmission; Produce a pair of PKI Kb and private key Kpb at random; And in the decruption key table that the IP address and the private key Kpb of source gateway equipment is recorded in this intended gateway equipment; Use the PKI Ka that is received that PKI Kb in this gateway device and private key Kpb are encrypted then, and the PKI Kb after will encrypting and private key Kpb transfer to this gateway device; When this gateway device receives PKI Kb and the private key Kpb of this intended gateway device transmission; With the PKI Ka in this gateway device the PKI Kb and the private key Kpb of this intended gateway device transmission are deciphered, and the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table of this gateway device; The IP address and the private key Kpa in this gateway device of intended gateway equipment are recorded in the decruption key table of this gateway device, with this PKI Kb the private key Kpa in this gateway device is encrypted, and the Kpa after will encrypting transfer to intended gateway equipment; This intended gateway equipment receive the transmission of this gateway device private key Kpa after; With private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of this intended gateway equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100736384A CN102694753A (en) | 2011-03-25 | 2011-03-25 | Gateway equipment capable of carrying out encryption transmission on data, system and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100736384A CN102694753A (en) | 2011-03-25 | 2011-03-25 | Gateway equipment capable of carrying out encryption transmission on data, system and method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102694753A true CN102694753A (en) | 2012-09-26 |
Family
ID=46860042
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100736384A Pending CN102694753A (en) | 2011-03-25 | 2011-03-25 | Gateway equipment capable of carrying out encryption transmission on data, system and method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102694753A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107302538A (en) * | 2017-07-14 | 2017-10-27 | 深圳市盛路物联通讯技术有限公司 | Internet of Things AP receives the subset encryption method and device of data |
CN108737077A (en) * | 2017-04-13 | 2018-11-02 | 腾讯科技(深圳)有限公司 | Information processing method, device and system |
WO2018214061A1 (en) * | 2017-05-24 | 2018-11-29 | 深圳市乃斯网络科技有限公司 | Terminal-based network link encryption method and system |
CN109104699A (en) * | 2018-07-10 | 2018-12-28 | 神盾网络安全信息化中心股份有限公司 | A kind of secure internet connection method based on router |
WO2019015041A1 (en) * | 2017-07-19 | 2019-01-24 | 深圳市盛路物联通讯技术有限公司 | Time division encryption method and device for data of internet of things repeater |
WO2019019280A1 (en) * | 2017-07-24 | 2019-01-31 | 深圳市盛路物联通讯技术有限公司 | Method for internet of things terminal to encrypt data according to time periods, and apparatus |
CN111193730A (en) * | 2019-12-25 | 2020-05-22 | 上海沄界信息科技有限公司 | IoT trusted scene construction method and device |
CN112351422A (en) * | 2020-09-11 | 2021-02-09 | 深圳Tcl新技术有限公司 | Method, device and equipment for encrypting and decrypting data and computer storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050201564A1 (en) * | 2004-03-09 | 2005-09-15 | Naoshi Kayashima | Wireless communication system |
CN1698305A (en) * | 2003-02-03 | 2005-11-16 | 索尼株式会社 | Broadcast encryption key distribution system |
CN1881869A (en) * | 2005-11-01 | 2006-12-20 | 华为技术有限公司 | Method for realizing encryption communication |
CN101568110A (en) * | 2009-05-21 | 2009-10-28 | 中兴通讯股份有限公司 | Wireless data transmission method and system |
CN1336053B (en) * | 1999-11-01 | 2010-09-29 | 索尼公司 | Information transmission system and method, transmitter and receiver |
-
2011
- 2011-03-25 CN CN2011100736384A patent/CN102694753A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1336053B (en) * | 1999-11-01 | 2010-09-29 | 索尼公司 | Information transmission system and method, transmitter and receiver |
CN1698305A (en) * | 2003-02-03 | 2005-11-16 | 索尼株式会社 | Broadcast encryption key distribution system |
US20050201564A1 (en) * | 2004-03-09 | 2005-09-15 | Naoshi Kayashima | Wireless communication system |
CN1881869A (en) * | 2005-11-01 | 2006-12-20 | 华为技术有限公司 | Method for realizing encryption communication |
CN101568110A (en) * | 2009-05-21 | 2009-10-28 | 中兴通讯股份有限公司 | Wireless data transmission method and system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737077A (en) * | 2017-04-13 | 2018-11-02 | 腾讯科技(深圳)有限公司 | Information processing method, device and system |
CN108737077B (en) * | 2017-04-13 | 2020-11-06 | 腾讯科技(深圳)有限公司 | Information processing method, device and system |
WO2018214061A1 (en) * | 2017-05-24 | 2018-11-29 | 深圳市乃斯网络科技有限公司 | Terminal-based network link encryption method and system |
CN107302538A (en) * | 2017-07-14 | 2017-10-27 | 深圳市盛路物联通讯技术有限公司 | Internet of Things AP receives the subset encryption method and device of data |
WO2019010796A1 (en) * | 2017-07-14 | 2019-01-17 | 深圳市盛路物联通讯技术有限公司 | Sub-device encryption method and device for receiving data of internet of things ap |
CN107302538B (en) * | 2017-07-14 | 2020-07-03 | 深圳市盛路物联通讯技术有限公司 | Sub-equipment encryption method and device for data received by AP (Access Point) of Internet of things |
WO2019015041A1 (en) * | 2017-07-19 | 2019-01-24 | 深圳市盛路物联通讯技术有限公司 | Time division encryption method and device for data of internet of things repeater |
WO2019019280A1 (en) * | 2017-07-24 | 2019-01-31 | 深圳市盛路物联通讯技术有限公司 | Method for internet of things terminal to encrypt data according to time periods, and apparatus |
CN109104699A (en) * | 2018-07-10 | 2018-12-28 | 神盾网络安全信息化中心股份有限公司 | A kind of secure internet connection method based on router |
CN111193730A (en) * | 2019-12-25 | 2020-05-22 | 上海沄界信息科技有限公司 | IoT trusted scene construction method and device |
CN112351422A (en) * | 2020-09-11 | 2021-02-09 | 深圳Tcl新技术有限公司 | Method, device and equipment for encrypting and decrypting data and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102694753A (en) | Gateway equipment capable of carrying out encryption transmission on data, system and method thereof | |
US8953791B2 (en) | Key derivative function for network communications | |
WO2017185999A1 (en) | Method, apparatus and system for encryption key distribution and authentication | |
CN102088441B (en) | Data encryption transmission method and system for message-oriented middleware | |
CN107147666A (en) | The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform | |
CN102035845B (en) | Switching equipment for supporting link layer secrecy transmission and data processing method thereof | |
CN101917710A (en) | Method, system and related device for mobile internet encryption communication | |
CN1640093B (en) | Method and system for accelerating the conversion process between encryption schemes | |
CN103905180A (en) | Method for enabling classical application to have access to quantum communication network | |
CN107493150B (en) | A kind of data encryption and transmission method and device | |
CN112671710B (en) | Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method | |
CN101707767B (en) | Data transmission method and devices | |
WO2018042053A1 (en) | Secure data transmission | |
CN102088352B (en) | Data encryption transmission method and system for message-oriented middleware | |
CN109194473A (en) | Data transmission method, system, device, terminal and storage medium | |
KR20180130203A (en) | APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME | |
CN107666491B (en) | Data transmission method of air-ground integrated network based on symmetric encryption | |
CN103874059A (en) | Method, device and system for message processing | |
CN102271330A (en) | Terminal, network server and method for communication between terminal and network server | |
CN102045343B (en) | DC (Digital Certificate) based communication encrypting safety method, server and system | |
CN106330529A (en) | Hearing device with communication logging and related method | |
US9306946B1 (en) | Intelligent electronic cryptographic cloud computing system | |
US10630479B2 (en) | Network communication method having function of recovering terminal session | |
CN103813320A (en) | Grouping cluster and master key based key management method | |
CN114500064B (en) | Communication security verification method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120926 |