CN102694753A - Gateway equipment capable of carrying out encryption transmission on data, system and method thereof - Google Patents

Gateway equipment capable of carrying out encryption transmission on data, system and method thereof Download PDF

Info

Publication number
CN102694753A
CN102694753A CN2011100736384A CN201110073638A CN102694753A CN 102694753 A CN102694753 A CN 102694753A CN 2011100736384 A CN2011100736384 A CN 2011100736384A CN 201110073638 A CN201110073638 A CN 201110073638A CN 102694753 A CN102694753 A CN 102694753A
Authority
CN
China
Prior art keywords
gateway equipment
intended
address
data
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100736384A
Other languages
Chinese (zh)
Inventor
林文广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ambit Microsystems Shanghai Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Ambit Microsystems Shanghai Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ambit Microsystems Shanghai Ltd, Hon Hai Precision Industry Co Ltd filed Critical Ambit Microsystems Shanghai Ltd
Priority to CN2011100736384A priority Critical patent/CN102694753A/en
Publication of CN102694753A publication Critical patent/CN102694753A/en
Pending legal-status Critical Current

Links

Images

Abstract

An encryption key table and a decryption key table are stored in gateway equipment capable of carrying out encryption transmission on data. When the gateway equipment outputs data to the target gateway equipment, an IP address of the target gateway equipment is acquired from the data. When the IP address of the target gateway equipment is determined to be in the encryption key table, an encryption key corresponding to the IP address is acquired from the encryption key table and the acquired encryption key is used to carry out the encryption on the data, after that the data is transmitted to the target gateway equipment. When the gateway equipment receives the data transmitted by source gateway equipment, the IP address of the source gateway equipment is acquired from the transmitted data. When the IP address of the source gateway equipment is determined to be in the decryption key table, the decryption key corresponding to the IP address is acquired to carry out the decryption on the received data. Simultaneously, the invention provides a system which carries out encryption transmission on the data and a method thereof. By using the equipment, the system and the method of the invention, the data passing through the source gateway equipment is automatically encrypted and the data transmitted to the target gateway equipment is automatically decrypted.

Description

Data are carried out gateway device, the system and method for encrypted transmission
Technical field
The present invention relates to a kind of gateway device, system and method that data is carried out encrypted transmission.
Background technology
Generally, the transfer of data between the heterogeneous networks need be changed through gateway device, and is encrypted if some data does not have at the terminal, can be not encrypted through the gateway device time yet, so, can't guarantee transmit safety of data.
Summary of the invention
In view of this, data are carried out gateway device, the system and method for encrypted transmission, during through source gateway equipment, can encrypt automatically, when transferring to intended gateway equipment, decipher automatically in data so need provide a kind of.
This system that data are carried out encrypted transmission comprises source gateway equipment and at least one intended gateway equipment; This source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet; This source gateway equipment is with transfer of data to intended gateway equipment; This source gateway device storage one encryption key table, the encryption key of having stored the IP address of at least one intended gateway equipment in this encryption key table and the data that transfer to this at least one intended gateway equipment being encrypted, receive the data that need transmission when source gateway equipment after; From these data, obtain the IP address of intended gateway equipment; Whether the IP address of confirming this intended gateway equipment then is present in this encryption key table, if exist, then from this encryption key table, obtains the corresponding encryption key in this IP address; And utilize the encryption key that is obtained that these data are encrypted, and data encrypted is transferred to intended gateway equipment; This intended gateway device storage one decruption key table; The IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered have been stored in this decruption key table; When intended gateway equipment received the data of source gateway device transmission, the IP address that from the data of being transmitted, obtains source gateway equipment earlier confirmed then whether the IP address of this source gateway equipment is present in this decruption key table; If exist; Then obtain the corresponding decruption key in this IP address the data that received are deciphered,, then do not receive these data if do not exist.
Between gateway device, carry out in the method for data encryption transmission; Comprise source gateway equipment and at least one intended gateway equipment in this gateway device; This source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet, and this source gateway equipment is with transfer of data to intended gateway equipment
This source gateway device storage one encryption key table has been stored the IP address of a plurality of intended gateway equipment and the encryption key that the data that transfer to an intended gateway equipment are encrypted in this encryption key table; This intended gateway device storage one decruption key table has been stored the IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered in this decruption key table; This method comprises: receive the data of needs transmission when source gateway equipment after, and the IP address that from these data, obtains intended gateway equipment; Whether the IP address of confirming this intended gateway equipment is present in this encryption key table; If exist, then from this encryption key table, obtain the corresponding encryption key in this IP address, and utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment; When intended gateway equipment receives the data of source gateway device transmission, obtain the IP address of source gateway equipment in the data of being transmitted; Whether the IP address of confirming this source gateway equipment is present in this decruption key table, if exist, then obtains the corresponding decruption key in this IP address the data that received are deciphered.
This gateway device that data are carried out encrypted transmission is connected between local area network (LAN) and the internet; This gateway device comprises a memory cell and a processing unit; This cell stores one encryption key and a decruption key table have been stored the IP address of a plurality of gateway devices and the encryption key that the data that transfer to each gateway device are encrypted in this encryption key table; The IP address of a plurality of gateway devices and decruption key have been stored in this decruption key table to deciphering from the data that this gateway device transmitted; This processing unit is when receiving needs through this gateway device dateout to intended gateway equipment; Obtain the IP address of intended gateway equipment in from these data, obtaining; Whether the IP address of confirming this intended gateway equipment then is present in this encryption key table, if exist, then from this encryption key table, obtains the corresponding encryption key in this IP address; And utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment; When this intended gateway equipment receives the data of a source gateway device transmission; The IP address that earlier from the data of being transmitted, obtains source gateway equipment; Whether the IP address of confirming this source gateway equipment then is present in this decruption key table; If exist, then obtain the corresponding decruption key in this IP address the data that received are deciphered.
Compared to prior art, the present invention encrypts and decipher function through gateway device is provided with, and makes through the data of source gateway equipment and encrypts automatically, and the data that transfer to intended gateway equipment are deciphered automatically.
Description of drawings
Fig. 1 is for carrying out the sketch map of transfer of data between the gateway device.
Fig. 2 is for carrying out the calcspar of the gateway device of encrypted transmission to data.
Sketch map when Fig. 3 carries out encrypted key exchange for source gateway equipment and intended gateway equipment.
The flow chart of the method when Fig. 4 encrypts the packet of output for source gateway equipment.
The flow chart of the method the when packet that Fig. 5 receives for the intended gateway equipment interconnection is deciphered.
The main element symbol description
Local area network (LAN) 1
The internet 2
Gateway device 3
Source gateway equipment 31
Intended gateway equipment 32
First processing unit 311
First memory cell 312
Second processing unit 321
Second memory cell 322
Following embodiment will combine above-mentioned accompanying drawing to further specify the present invention.
Embodiment
As shown in Figure 1, between local area network (LAN) 1 and internet 2, be provided with gateway device 3, this local area network (LAN) 1 and internet 2 carry out the transmission of data between the heterogeneous networks through this gateway device 3.
Has the process of carrying out the data encryption transmission between the gateway device of data encryption transfer function below in conjunction with Fig. 2 explanation.Describe for ease, the gateway device 3 of data receiver is designated as source gateway equipment 31, data receiver's gateway device 3 is designated as intended gateway equipment 32.This source gateway equipment 31 comprise one first processing unit 311 and one first memory cell 312.This intended gateway equipment 32 comprises one second processing unit 321 and one second memory cell 322.All store an encryption key table and a decruption key table in this first memory cell 312 and second memory cell 322.Write down in this encryption key table for the IP address of other gateway devices and when transferring to the data encryption of this gateway device used key, write down in this decruption key table for the IP address of other gateway devices and to key used when the data of this gateway device transmission are deciphered.
When first processing unit 311 of this source gateway equipment 31 receives the data of terminal equipment (not shown) transmission; To the data based predetermined rule packing that is received; Produce a packet; The IP address that includes intended gateway equipment 32 in this packet, this first processing unit 311 obtains the IP address of this intended gateway equipment 31 from this packet, and confirms whether this IP address is present in the encryption key table that is stored in this first memory cell 312; When this IP address is present in this encryption key table; This first processing unit 311 obtains the corresponding encryption key in this IP address, and utilizes this close encryption key that this packet is encrypted, and the data encrypted bag is transferred to intended gateway equipment 32.
When this IP address is not present in this encryption key table; 311 of this first processing units carry out the exchange (concrete exchange process please refer to Fig. 3) of encryption key with intended gateway equipment 32; Obtain the encryption key of intended gateway equipment 32, and the encryption key and the IP address of intended gateway equipment 32 is recorded in the encryption key table of this source gateway equipment 31.Simultaneously with the encryption key and IP address transfer to the intended gateway equipment 32 of source gateway equipment 31, and be stored in the encryption key table of intended gateway equipment 32.This first processing unit 311 utilizes the encryption key that is exchanged that this packet is encrypted then, and the data encrypted bag is transferred to intended gateway equipment 32.
As shown in Figure 3; Sketch map when carrying out encrypted key exchange for source gateway equipment 31 and intended gateway equipment 32; At first, when first processing unit 311 judged that the IP address of intended gateway equipment 32 is not present in the encryption key table of first memory cell 312, this first processing unit 311 produced a pair of PKI Ka and private key Kpa at random; Then this PKI Ka is transferred to intended gateway equipment 32; Then when receiving the PKI that source gateway equipment 31 sends, also produce a pair of PKI Kb and private key Kpb at random, and in the decruption key table that the IP address and the private key Kpa of source gateway equipment 31 is recorded in intended gateway equipment.Use the PKI Ka that is received that PKI Kb in the intended gateway equipment 32 and private key Kpb are encrypted then; And the PKI Kb after will encrypting and private key Kpb transfer to source gateway equipment 31; When source gateway equipment 31 receives this PKI Kb and private key Kpb; With the PKI Ka in the source gateway equipment 31 the PKI Kb and the private key Kpb of 32 transmission of intended gateway equipment are deciphered; And the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table that first memory cell 312 stored, and the IP address and the private key in the source gateway equipment of intended gateway equipment is recorded in the decruption key table of source gateway equipment.With this PKI Kb the private key Kpa in the source gateway equipment 31 is encrypted then; And the Kpa after will encrypting transfers to intended gateway equipment 32; After this intended gateway equipment 32 receives the private key Kpa after the encryption; With private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of intended gateway equipment 32.
When this intended gateway equipment 32 receives this packet; At first from this packet, obtain the IP address of source gateway equipment; Confirm then whether this IP address is present in the decruption key table in this intended gateway equipment 32; If exist, then obtain the corresponding decruption key in this IP address, the packet that is received is deciphered.When not existing, then do not receive this packet.
As shown in Figure 4, the flow chart of the method when encrypting for the packet of 31 pairs of outputs of source gateway equipment.
At first, when first processing unit 311 of this source gateway equipment 31 received the data of terminal equipment (not shown) transmission, the data based predetermined rule packing to being received produced a packet (step S401).
This first processing unit 311 obtains the IP address (step S402) of this intended gateway equipment 32 from this packet.
This first processing unit 311 confirms whether this IP address is present in the encryption key table that is stored in this first memory cell 312 (step S403).
When this IP address is present in this encryption key table; This first processing unit 311 obtains the corresponding encryption key in this IP address; And utilize this close encryption key that this packet is encrypted, and the data encrypted bag is transferred to intended gateway equipment 32 (step S404).
When this IP address is not present in this encryption key table; 311 of this first processing units carry out the exchange of encryption key with intended gateway equipment 32; Obtain the encryption key of intended gateway equipment 32; And in the encryption key table that the encryption key and the IP address of intended gateway equipment 32 is recorded to this source gateway equipment 31 (step S405), return then and carry out this step S404.
As shown in Figure 5, the flow chart of the method when deciphering for the packet of 32 pairs of receptions of intended gateway equipment.
At first, when this intended gateway equipment 32 received this packet, this second processing unit 321 obtained the IP address (step S501) of source gateway equipment from this packet.
This second processing unit 321 confirms whether this IP address is present in the decruption key table of being stored in this second memory cell 322 (step S502).
If exist, then obtain the corresponding decruption key in this IP address, the packet that is received is deciphered (step S503).When not existing, then do not receive this packet.Process ends.

Claims (10)

1. system that data is carried out encrypted transmission; This system comprises source gateway equipment and at least one intended gateway equipment, and this source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet, and this source gateway equipment is with transfer of data to intended gateway equipment; It is characterized in that
This source gateway device storage one encryption key table; The IP address of at least one intended gateway equipment and the encryption key that the data that transfer to this at least one intended gateway equipment are encrypted have been stored in this encryption key table; Receive the data of needs transmission when source gateway equipment after, the IP address that from these data, obtains intended gateway equipment confirms then whether the IP address of this intended gateway equipment is present in this encryption key table; If exist; Then from this encryption key table, obtain the corresponding encryption key in this IP address, and utilize the encryption key that is obtained that these data are encrypted, and data encrypted is transferred to intended gateway equipment;
This intended gateway device storage one decruption key table; The IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered have been stored in this decruption key table; When intended gateway equipment received the data of source gateway device transmission, the IP address that from the data of being transmitted, obtains source gateway equipment earlier confirmed then whether the IP address of this source gateway equipment is present in this decruption key table; If exist; Then obtain the corresponding decruption key in this IP address the data that received are deciphered,, then do not receive these data if do not exist.
2. as claimed in claim 1 data are carried out the system of encrypted transmission, it is characterized in that, also store the decruption key table in this source gateway equipment, also store encryption key table in this intended gateway equipment.
3. the system that data is carried out encrypted transmission as claimed in claim 2; It is characterized in that; When this source gateway equipment judged that the IP address of intended gateway equipment is not present in this encryption key table, this source gateway equipment then carried out the exchange of encryption key with intended gateway equipment, obtain the encryption key of intended gateway equipment; And the encryption key and the IP address of intended gateway equipment be recorded in the encryption key table of this source gateway equipment; Simultaneously with the encryption key and IP address transfer to the intended gateway equipment of source gateway equipment, and be stored in the encryption key table of intended gateway equipment, then; The encryption key that this source gateway equipment utilization is exchanged is encrypted this packet, and the data encrypted bag is transferred to intended gateway equipment.
4. the system that data is carried out encrypted transmission as claimed in claim 3; It is characterized in that; The process that source gateway equipment and intended gateway equipment carry out key change is: when source gateway equipment judges that the IP address of intended gateway equipment is not present in the encryption key table of source gateway equipment; This source gateway equipment produces a pair of PKI Ka and private key Kpa at random; Then this PKI Ka is transferred to intended gateway equipment; When intended gateway equipment also has the function of data encryption transmission, then when receiving the PKI of source gateway equipment transmission, also produce a pair of PKI Kb and private key Kpb at random; And the IP address of source gateway equipment and the private key Kpb of intended gateway equipment be recorded in the decruption key table of intended gateway equipment; Use the source gateway equipment PKI Ka that is received that PKI Kb in the intended gateway equipment and private key Kpb are encrypted then, and the PKI Kb after will encrypting and private key Kpb transfer to source gateway equipment, when source gateway equipment receives this PKI Kb and private key Kpb; With the PKI Ka in the source gateway equipment PKI Kb and the private key Kpb of intended gateway device transmission are deciphered; And the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table of source gateway equipment, and the IP address and the private key in the source gateway equipment of intended gateway equipment is recorded in the decruption key table of source gateway equipment, with this PKI Kb the private key Kpa in the source gateway equipment encrypted then; And the Kpa after will encrypting transfers to intended gateway equipment; After this intended gateway equipment receives the private key Kpa after the encryption, with private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of intended gateway equipment.
5. one kind is carried out the method that data encryption is transmitted between gateway device; Comprise a source gateway equipment and at least one intended gateway equipment in this gateway device; This source gateway equipment and intended gateway equipment are connected between local area network (LAN) and the internet, and this source gateway equipment is with transfer of data to intended gateway equipment
This source gateway device storage one encryption key table has been stored the IP address of a plurality of intended gateway equipment and the encryption key that the data that transfer to an intended gateway equipment are encrypted in this encryption key table;
This intended gateway device storage one decruption key table has been stored the IP address of multiple source gateway device and the decruption key that the data of being transmitted from source gateway equipment are deciphered in this decruption key table; It is characterized in that this method comprises:
Receive the data of needs transmission when source gateway equipment after, the IP address that from these data, obtains intended gateway equipment;
Whether the IP address of confirming this intended gateway equipment is present in this encryption key table;
If exist, then from this encryption key table, obtain the corresponding encryption key in this IP address, and utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment;
When intended gateway equipment receives the data of source gateway device transmission, obtain the IP address of source gateway equipment in the data of being transmitted;
Whether the IP address of confirming this source gateway equipment is present in this decruption key table, if exist, then obtains the corresponding decruption key in this IP address the data that received are deciphered.
6. as claimed in claim 5ly it is characterized in that, also store the decruption key table in this source gateway equipment, also store encryption key table in this intended gateway equipment between gateway device, carrying out the method for data encryption transmission.
7. as claimed in claim 6 between gateway device, carrying out the method for data encryption transmission; It is characterized in that; When this source gateway equipment judges that the IP address of intended gateway equipment is not present in this encryption key table; Carry out the exchange of encryption key between source gateway equipment and the intended gateway equipment, use the key of the intended gateway equipment that is exchanged that data are encrypted then, and data encrypted is transferred to intended gateway equipment.
8. as claimed in claim 7 between gateway device, carrying out the method for data encryption transmission, it is characterized in that the process that source gateway equipment and intended gateway equipment carry out key change is:
When source gateway equipment judged that the IP address of intended gateway equipment is not present in the encryption key table of source gateway equipment, this source gateway equipment produced a pair of PKI Ka and private key Kpa at random;
Ka transfers to intended gateway equipment with this PKI,
Intended gateway equipment also produces a pair of PKI Kb and private key Kpb at random when receiving the PKI of source gateway equipment transmission;
The IP address of source gateway equipment and private key Kpb are recorded in the decruption key table of intended gateway equipment; Use the PKI Ka that is received that PKI Kb in the intended gateway equipment and private key Kpb are encrypted then, and the PKI Kb after will encrypting and private key Kpb transfer to source gateway equipment;
When source gateway equipment receives this PKI Kb and private key Kpb; With the PKI Ka in the source gateway equipment PKI Kb and the private key Kpb of intended gateway device transmission are deciphered; And the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table that source gateway equipment stored, and the IP address and the private key in the source gateway equipment of intended gateway equipment is recorded in the decruption key table of source gateway equipment;
With this PKI Kb the private key Kpa in the source gateway equipment is encrypted; And the Kpa after will encrypting transfers to intended gateway equipment; After this intended gateway equipment receives the private key Kpa after the encryption; With private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of intended gateway equipment.
9. one kind is carried out the gateway device of encrypted transmission to data, and this gateway device is connected between local area network (LAN) and the internet, and this gateway device comprises a memory cell and a processing unit, it is characterized in that,
This cell stores:
One encryption key table has been stored the IP address of a plurality of gateway devices and the encryption key that the data that transfer to each gateway device are encrypted in this encryption key table;
One decruption key table has been stored the IP address of a plurality of gateway devices and the decruption key to deciphering from the data that this gateway device transmitted in this decruption key table;
When needs pass through this gateway device dateout to intended gateway equipment; This processing unit obtains the IP address of intended gateway equipment from these data; Whether the IP address of confirming this intended gateway equipment then is present in this encryption key table, if exist, then from this encryption key table, obtains the corresponding encryption key in this IP address; And utilize the encryption key that is obtained that this packet is encrypted, and data encrypted is transferred to intended gateway equipment;
When this gateway device receives the data of a source gateway device transmission; The IP address that earlier from the data of being transmitted, obtains source gateway equipment; Whether the IP address of confirming this source gateway equipment then is present in this decruption key table; If exist, then obtain the corresponding decruption key in this IP address the data that received are deciphered.
10. the gateway device that data is carried out encrypted transmission as claimed in claim 9; It is characterized in that; When needs pass through this gateway device dateout to intended gateway equipment; IP address confirming this intended gateway equipment is not present in this encryption key table, and this gateway device produces a pair of PKI Ka and private key Kpa at random; Ka transfers to intended gateway equipment with this PKI; When this intended gateway equipment receives the PKI Ka of this source gateway equipment transmission; Produce a pair of PKI Kb and private key Kpb at random; And in the decruption key table that the IP address and the private key Kpb of source gateway equipment is recorded in this intended gateway equipment; Use the PKI Ka that is received that PKI Kb in this gateway device and private key Kpb are encrypted then, and the PKI Kb after will encrypting and private key Kpb transfer to this gateway device; When this gateway device receives PKI Kb and the private key Kpb of this intended gateway device transmission; With the PKI Ka in this gateway device the PKI Kb and the private key Kpb of this intended gateway device transmission are deciphered, and the IP address of Kpb after will deciphering and intended gateway equipment is recorded in the encryption key table of this gateway device; The IP address and the private key Kpa in this gateway device of intended gateway equipment are recorded in the decruption key table of this gateway device, with this PKI Kb the private key Kpa in this gateway device is encrypted, and the Kpa after will encrypting transfer to intended gateway equipment; This intended gateway equipment receive the transmission of this gateway device private key Kpa after; With private key Kpb the private key Kpa after encrypting is deciphered, and the IP address of private key Kpa after will deciphering and source gateway equipment is recorded in the encryption key table of this intended gateway equipment.
CN2011100736384A 2011-03-25 2011-03-25 Gateway equipment capable of carrying out encryption transmission on data, system and method thereof Pending CN102694753A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100736384A CN102694753A (en) 2011-03-25 2011-03-25 Gateway equipment capable of carrying out encryption transmission on data, system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100736384A CN102694753A (en) 2011-03-25 2011-03-25 Gateway equipment capable of carrying out encryption transmission on data, system and method thereof

Publications (1)

Publication Number Publication Date
CN102694753A true CN102694753A (en) 2012-09-26

Family

ID=46860042

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100736384A Pending CN102694753A (en) 2011-03-25 2011-03-25 Gateway equipment capable of carrying out encryption transmission on data, system and method thereof

Country Status (1)

Country Link
CN (1) CN102694753A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302538A (en) * 2017-07-14 2017-10-27 深圳市盛路物联通讯技术有限公司 Internet of Things AP receives the subset encryption method and device of data
CN108737077A (en) * 2017-04-13 2018-11-02 腾讯科技(深圳)有限公司 Information processing method, device and system
WO2018214061A1 (en) * 2017-05-24 2018-11-29 深圳市乃斯网络科技有限公司 Terminal-based network link encryption method and system
CN109104699A (en) * 2018-07-10 2018-12-28 神盾网络安全信息化中心股份有限公司 A kind of secure internet connection method based on router
WO2019015041A1 (en) * 2017-07-19 2019-01-24 深圳市盛路物联通讯技术有限公司 Time division encryption method and device for data of internet of things repeater
WO2019019280A1 (en) * 2017-07-24 2019-01-31 深圳市盛路物联通讯技术有限公司 Method for internet of things terminal to encrypt data according to time periods, and apparatus
CN111193730A (en) * 2019-12-25 2020-05-22 上海沄界信息科技有限公司 IoT trusted scene construction method and device
CN112351422A (en) * 2020-09-11 2021-02-09 深圳Tcl新技术有限公司 Method, device and equipment for encrypting and decrypting data and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050201564A1 (en) * 2004-03-09 2005-09-15 Naoshi Kayashima Wireless communication system
CN1698305A (en) * 2003-02-03 2005-11-16 索尼株式会社 Broadcast encryption key distribution system
CN1881869A (en) * 2005-11-01 2006-12-20 华为技术有限公司 Method for realizing encryption communication
CN101568110A (en) * 2009-05-21 2009-10-28 中兴通讯股份有限公司 Wireless data transmission method and system
CN1336053B (en) * 1999-11-01 2010-09-29 索尼公司 Information transmission system and method, transmitter and receiver

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1336053B (en) * 1999-11-01 2010-09-29 索尼公司 Information transmission system and method, transmitter and receiver
CN1698305A (en) * 2003-02-03 2005-11-16 索尼株式会社 Broadcast encryption key distribution system
US20050201564A1 (en) * 2004-03-09 2005-09-15 Naoshi Kayashima Wireless communication system
CN1881869A (en) * 2005-11-01 2006-12-20 华为技术有限公司 Method for realizing encryption communication
CN101568110A (en) * 2009-05-21 2009-10-28 中兴通讯股份有限公司 Wireless data transmission method and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737077A (en) * 2017-04-13 2018-11-02 腾讯科技(深圳)有限公司 Information processing method, device and system
CN108737077B (en) * 2017-04-13 2020-11-06 腾讯科技(深圳)有限公司 Information processing method, device and system
WO2018214061A1 (en) * 2017-05-24 2018-11-29 深圳市乃斯网络科技有限公司 Terminal-based network link encryption method and system
CN107302538A (en) * 2017-07-14 2017-10-27 深圳市盛路物联通讯技术有限公司 Internet of Things AP receives the subset encryption method and device of data
WO2019010796A1 (en) * 2017-07-14 2019-01-17 深圳市盛路物联通讯技术有限公司 Sub-device encryption method and device for receiving data of internet of things ap
CN107302538B (en) * 2017-07-14 2020-07-03 深圳市盛路物联通讯技术有限公司 Sub-equipment encryption method and device for data received by AP (Access Point) of Internet of things
WO2019015041A1 (en) * 2017-07-19 2019-01-24 深圳市盛路物联通讯技术有限公司 Time division encryption method and device for data of internet of things repeater
WO2019019280A1 (en) * 2017-07-24 2019-01-31 深圳市盛路物联通讯技术有限公司 Method for internet of things terminal to encrypt data according to time periods, and apparatus
CN109104699A (en) * 2018-07-10 2018-12-28 神盾网络安全信息化中心股份有限公司 A kind of secure internet connection method based on router
CN111193730A (en) * 2019-12-25 2020-05-22 上海沄界信息科技有限公司 IoT trusted scene construction method and device
CN112351422A (en) * 2020-09-11 2021-02-09 深圳Tcl新技术有限公司 Method, device and equipment for encrypting and decrypting data and computer storage medium

Similar Documents

Publication Publication Date Title
CN102694753A (en) Gateway equipment capable of carrying out encryption transmission on data, system and method thereof
US8953791B2 (en) Key derivative function for network communications
WO2017185999A1 (en) Method, apparatus and system for encryption key distribution and authentication
CN102088441B (en) Data encryption transmission method and system for message-oriented middleware
CN107147666A (en) The method of data encrypting and deciphering between internet-of-things terminal and cloud data platform
CN102035845B (en) Switching equipment for supporting link layer secrecy transmission and data processing method thereof
CN101917710A (en) Method, system and related device for mobile internet encryption communication
CN1640093B (en) Method and system for accelerating the conversion process between encryption schemes
CN103905180A (en) Method for enabling classical application to have access to quantum communication network
CN107493150B (en) A kind of data encryption and transmission method and device
CN112671710B (en) Security encryption device based on national cryptographic algorithm, bidirectional authentication and encryption method
CN101707767B (en) Data transmission method and devices
WO2018042053A1 (en) Secure data transmission
CN102088352B (en) Data encryption transmission method and system for message-oriented middleware
CN109194473A (en) Data transmission method, system, device, terminal and storage medium
KR20180130203A (en) APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME
CN107666491B (en) Data transmission method of air-ground integrated network based on symmetric encryption
CN103874059A (en) Method, device and system for message processing
CN102271330A (en) Terminal, network server and method for communication between terminal and network server
CN102045343B (en) DC (Digital Certificate) based communication encrypting safety method, server and system
CN106330529A (en) Hearing device with communication logging and related method
US9306946B1 (en) Intelligent electronic cryptographic cloud computing system
US10630479B2 (en) Network communication method having function of recovering terminal session
CN103813320A (en) Grouping cluster and master key based key management method
CN114500064B (en) Communication security verification method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120926