CN105072098A - Internet of Things account information encryption method - Google Patents
Internet of Things account information encryption method Download PDFInfo
- Publication number
- CN105072098A CN105072098A CN201510436817.8A CN201510436817A CN105072098A CN 105072098 A CN105072098 A CN 105072098A CN 201510436817 A CN201510436817 A CN 201510436817A CN 105072098 A CN105072098 A CN 105072098A
- Authority
- CN
- China
- Prior art keywords
- internet
- party
- execution
- service device
- monitoring service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an Internet of Things account information encryption method. The method comprises the following steps that (1) communication between an execution subject and an execution object for Internet of Things information is converted and forwarded by a third party monitoring server; a first reading rule and a second reading rule are set in advance; (2) based on the first reading rule, an execution command sent by the execution subject to the execution object is converted by the third party monitoring server and then forwarded to the execution object; after receiving the execution command forwarded by the third party monitoring server, the execution object performs reading on the basis of the second reading rule; after the execution object performs corresponding motion on the basis of the read execution command, execution conditions are sent to the execution subject through the third party monitoring server in a feedback way. The Internet of Things account information encryption method can overcome defects existing in the prior art and characterized by low reliability, bad safety, narrow application range, etc. By means of the method, advantages characterized by high reliability, good safety and wide application range are achieved.
Description
Technical field
The present invention relates to field of computer technology, particularly, relate to a kind of Internet of Things account message encryption method.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development stage in " informationization " epoch.As its name suggests, Internet of Things is exactly the Internet that thing thing is connected.This has the two-layer meaning: one, and core and the basis of Internet of Things remain the Internet, is the network of extension on Internet basic and expansion; Its two, its user side extend and extend between any article and article, carry out information exchange and communicate, namely thing thing ceases mutually.
Internet of Things passes through Intellisense, recognition technology communicates cognition technology with general fit calculation etc., is widely used in the fusion of network, is also therefore called as the third wave of world information industry development after computer, the Internet.Utilize the communication technology such as localized network or the Internet that transducer, controller, machine, personnel and thing etc. are linked togather by new mode, formation people and thing, thing and thing are connected, and realize informationization, remote management and control and intelligentized network.Internet of Things is the extension of the Internet, and it comprises resources all on the Internet and the Internet, the application that compatible the Internet is all, but elements all in Internet of Things is all personalized and privatization.
Along with the decline of the costs such as processor, memory, the network bandwidth, manyly possess perception, the embedded system of networking and control ability is widely used in all kinds of physical equipment.Networking object due to Internet of Things relates to embedded system, electronic tag transducer and internet information physical system etc., and kind is comparatively various, may adopt different system platforms, have different communication protocol between different networking object.Therefore, how transmitting and process are carried out to the data from different object, solve the information exchange between Internet of Things heterogeneous platform, and then complete the fast Development of Internet of things system and deployment task becomes problem anxious to be resolved.
Realizing in process of the present invention, inventor finding at least to exist in prior art that reliability is low, poor stability and the defect such as the scope of application is little.
Summary of the invention
The object of the invention is to, for the problems referred to above, propose a kind of Internet of Things account message encryption method, to realize, reliability is high, fail safe good and advantage applied widely.
For achieving the above object, the technical solution used in the present invention is: a kind of Internet of Things account message encryption method, comprising:
(1) by the communication between the executive agent of Internet of Things message, execution object, changed by third party's monitoring service device and pass on, and pre-set and read first of message between executive agent and third party's monitoring service device and read rule, and perform and read second of message between object and third party's monitoring service device and read rule;
(2) read rule based on first, executive agent is sent to the fill order performing object, pass on to execution object after the conversion of third party's monitoring service device, perform after object receives the fill order that third party's monitoring service device passs on, read rule based on second and understand;
Execution object feeds back implementation status through third party's monitoring service device to executive agent after performing corresponding action based on deciphering gained fill order;
(3) third party's monitoring service device reads rule and second based on first and reads rule to exectorial transformation rule, needs to adjust in real time according to exectorial security protection grade, even if adjustment order should be pass on executive agent and perform object.
The Internet of Things account message encryption method of various embodiments of the present invention, owing to comprising: (1) by the communication between the executive agent of Internet of Things message, execution object, changed by third party's monitoring service device and pass on, and pre-setting the first reading rule, and second reads rule; (2) read rule based on first, executive agent is sent to the fill order performing object, pass on to execution object after the conversion of third party's monitoring service device, perform after object receives the fill order that third party's monitoring service device passs on, read rule based on second and understand; Execution object feeds back implementation status through third party's monitoring service device to executive agent after performing corresponding action based on deciphering gained fill order; Thus can overcome that reliability in prior art is low, poor stability and the little defect of the scope of application, to realize, reliability is high, fail safe good and advantage applied widely.
Other features and advantages of the present invention will be set forth in the following description, and, partly become apparent from specification, or understand by implementing the present invention.
Below by embodiment, technical scheme of the present invention is described in further detail.
Embodiment
Below the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the present invention, is not intended to limit the present invention.
According to the embodiment of the present invention, provide a kind of Internet of Things account message encryption method, comprising:
(1) by the communication between the executive agent of Internet of Things message, execution object, changed by third party's monitoring service device and pass on, and pre-set and read first of message between executive agent and third party's monitoring service device and read rule, and perform and read second of message between object and third party's monitoring service device and read rule;
(2) read rule based on first, executive agent is sent to the fill order performing object, pass on to execution object after the conversion of third party's monitoring service device, perform after object receives the fill order that third party's monitoring service device passs on, read rule based on second and understand;
Execution object feeds back implementation status through third party's monitoring service device to executive agent after performing corresponding action based on deciphering gained fill order;
(3) third party's monitoring service device reads rule and second based on first and reads rule to exectorial transformation rule, needs to adjust in real time according to exectorial security protection grade, even if adjustment order should be pass on executive agent and perform object.
Technical scheme of the present invention, the execution object in homologue networking message is safeguarded by real-time tracking, make executive agent more can use this Internet of Things message relievedly, also make the functional reliability of execution object and fail safe greatly improve, really realize efficient and reliably Internet of Things service.
Last it is noted that the foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, although with reference to previous embodiment to invention has been detailed description, for a person skilled in the art, it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (1)
1. an Internet of Things account message encryption method, is characterized in that, comprising:
(1) by the communication between the executive agent of Internet of Things message, execution object, changed by third party's monitoring service device and pass on, and pre-set and read first of message between executive agent and third party's monitoring service device and read rule, and perform and read second of message between object and third party's monitoring service device and read rule;
(2) read rule based on first, executive agent is sent to the fill order performing object, pass on to execution object after the conversion of third party's monitoring service device, perform after object receives the fill order that third party's monitoring service device passs on, read rule based on second and understand;
Execution object feeds back implementation status through third party's monitoring service device to executive agent after performing corresponding action based on deciphering gained fill order;
(3) third party's monitoring service device reads rule and second based on first and reads rule to exectorial transformation rule, needs to adjust in real time according to exectorial security protection grade, even if adjustment order should be pass on executive agent and perform object.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510436817.8A CN105072098A (en) | 2015-07-23 | 2015-07-23 | Internet of Things account information encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510436817.8A CN105072098A (en) | 2015-07-23 | 2015-07-23 | Internet of Things account information encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105072098A true CN105072098A (en) | 2015-11-18 |
Family
ID=54501379
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510436817.8A Pending CN105072098A (en) | 2015-07-23 | 2015-07-23 | Internet of Things account information encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105072098A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080188180A1 (en) * | 2005-02-22 | 2008-08-07 | Petri Rahja | Communication System And A Personal Communication Proxy |
CN101860978A (en) * | 2010-05-14 | 2010-10-13 | 南京邮电大学 | Internet of things system structure |
CN101951693A (en) * | 2010-08-03 | 2011-01-19 | 天津中启创科技有限公司 | Thing Internet gateway of heterogeneous wireless network and control method thereof |
CN102780698A (en) * | 2012-07-24 | 2012-11-14 | 南京邮电大学 | User terminal safety communication method in platform of Internet of Things |
CN103997497A (en) * | 2014-05-24 | 2014-08-20 | 上海新时达电气股份有限公司 | Communication method and protocol converter for internet of things of elevator |
CN104144200A (en) * | 2013-12-09 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Communication methods, communication side and user side for internet of things |
-
2015
- 2015-07-23 CN CN201510436817.8A patent/CN105072098A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080188180A1 (en) * | 2005-02-22 | 2008-08-07 | Petri Rahja | Communication System And A Personal Communication Proxy |
CN101860978A (en) * | 2010-05-14 | 2010-10-13 | 南京邮电大学 | Internet of things system structure |
CN101951693A (en) * | 2010-08-03 | 2011-01-19 | 天津中启创科技有限公司 | Thing Internet gateway of heterogeneous wireless network and control method thereof |
CN102780698A (en) * | 2012-07-24 | 2012-11-14 | 南京邮电大学 | User terminal safety communication method in platform of Internet of Things |
CN104144200A (en) * | 2013-12-09 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Communication methods, communication side and user side for internet of things |
CN103997497A (en) * | 2014-05-24 | 2014-08-20 | 上海新时达电气股份有限公司 | Communication method and protocol converter for internet of things of elevator |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102546267B (en) | Automatic configuration method of network device and management server | |
CN104753674B (en) | A kind of verification method and equipment of application identity | |
CN105897652A (en) | Standard protocol based heterogeneous terminal dynamic access method | |
CN105809817B (en) | A kind of ATM failure monitoring method and device | |
CN106330869A (en) | Data security protection system and method based on cloud application | |
CN104216761A (en) | Method for using shared device in device capable of operating two operation systems | |
CN105306605A (en) | Double host server system | |
CN105005252B (en) | A kind of power station intelligent power generation monitoring method and system | |
CN104076792A (en) | Frequency converter remote monitoring system based on internet | |
US20140136620A1 (en) | Protocol conversion apparatus and method | |
CN105072098A (en) | Internet of Things account information encryption method | |
CN104092655A (en) | IEC104 safe remote-control method based on scheduling number authentication | |
CN105450659A (en) | Security authentication system and authentication method for the Internet of things | |
CN101175315B (en) | Method and system for updating control mobile station | |
CN105187293A (en) | Method for storing Internet of Things temporary message | |
CN205354119U (en) | Intellectual property transaction platform | |
CN104778166A (en) | Page security identifier display method and device and network system | |
CN104346233B (en) | A kind of fault recovery method and device for computer system | |
DE102004044764B4 (en) | Data transmission method and automation system for using such a data transmission method | |
CN105141578A (en) | Message generation method of IOT (Internet of Things) | |
CN104581006A (en) | Video monitoring management method | |
CN105099939A (en) | Method and device for implementing flow control among different data centers | |
CN107959586A (en) | A kind of ship end Integrated navigation system network architecture based on cloud platform | |
CN109245934B (en) | Fault processing method, device, system, control equipment and management equipment | |
CN107306282B (en) | A kind of link keep-alive method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151118 |
|
RJ01 | Rejection of invention patent application after publication |