CN110113159A - A kind of Internet of Things ciphering terminal - Google Patents

A kind of Internet of Things ciphering terminal Download PDF

Info

Publication number
CN110113159A
CN110113159A CN201910373712.0A CN201910373712A CN110113159A CN 110113159 A CN110113159 A CN 110113159A CN 201910373712 A CN201910373712 A CN 201910373712A CN 110113159 A CN110113159 A CN 110113159A
Authority
CN
China
Prior art keywords
outer cover
interface
internet
things
usb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910373712.0A
Other languages
Chinese (zh)
Other versions
CN110113159B (en
Inventor
孙守强
崔宪平
苏玉梅
李宗锋
刘燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Huanghai University
Original Assignee
Qingdao Huanghai University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Huanghai University filed Critical Qingdao Huanghai University
Priority to CN201910373712.0A priority Critical patent/CN110113159B/en
Publication of CN110113159A publication Critical patent/CN110113159A/en
Application granted granted Critical
Publication of CN110113159B publication Critical patent/CN110113159B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention relates to internet of things field more particularly to a kind of Internet of Things ciphering terminals.Including the end USB and key end, the end USB includes USB interface, outer cover, and the outer surface of outer cover is lock collar, and lock collar is divided into 3-6 fore shaft;A socket is equipped at each fore shaft, one of them or several sockets are connected with USB interface by route;The spigot not being connected with USB is equipped with locking mechanism, and the locking mechanism includes being located in the sliding slot of socket corresponding position with the worm screw in outer cover, worm screw, two sides are equipped with tooth, it is engaged respectively with the worm gear of two sides, worm gear is engaged with the tooth of briquetting, and worm gear center is fixed in outer cover by shaft;Key end is divided into interface, chip and shell.The present invention grasps tap position information and key end by special messenger, realizes encryption, and the information after avoiding key from losing is stolen, meanwhile, tap position is variable, and invalid socket has locking device, further improves level of encryption.

Description

A kind of Internet of Things ciphering terminal
Technical field
The present invention relates to internet of things field more particularly to a kind of Internet of Things ciphering terminals.
Background technique
Internet of Things (English: Internet of Things, abridge IoT) is the carrying of the information such as internet, conventional telecommunications net Body allows all common objects that can exercise standalone feature to realize the network to interconnect.Internet of Things is generally wireless network, and due to Equipment around everyone can achieve 1,000 to 5,000, so Internet of Things may include 500 million to one gigabit objects. On Internet of Things, everyone can applying electronic label by true object surf the Internet be coupled, can be found on Internet of Things Their specific location.Machine, equipment, personnel can be managed concentratedly with central computer, be controlled by Internet of Things, Household equipment, automobile can be remotely controlled and searching position, prevent article stolen etc., similar automation control system, together When through collect these minor matters data, can finally be gathered into big data, comprising redesign road to cut down traffic accidents, city It updates, the great change of hazard prediction and crime prevention and cure, epidemic disease control etc. society, realizes that object and object are connected.
Internet of Things digitizes real world, and application range is very extensive.Internet of Things furthers the information of dispersion, unite whole object with The digital information of object, the application field of Internet of Things mainly include following aspect: transport and logistics field, industry manufacture, health doctor Treat territory, intelligent environment (family, office, factory) field, individual and social field etc., with very wide market and Application prospect.
And the safety problem of Internet of Things is always current problem to be solved, once Internet of Things enters by external malice Invade, unlocking information or unlock data be trapped in the case where, be very easy to security risk occur, cause in entire Internet of Things There is data hidden danger, or even leakage user information in equipment;Traditional mode is to carry out safety by modes such as algorithm for encryption mostly Protection, all has ignored the safety of terminal structure, certificate and key are once stolen, and the safety of information just will receive huge It threatens.
Summary of the invention
It the technical problem to be solved by the present invention is to traditional mode is prevented safely by modes such as algorithm for encryption mostly Shield, all has ignored the safety of terminal structure, certificate and key are once stolen, and the safety of information just will receive huge prestige The side of body.
To achieve the above object, the application grasps tap position information and key end by special messenger, realizes encryption, avoids close Information after key is lost is stolen, meanwhile, tap position is variable, and invalid socket has locking device, further improves encryption Degree.
To solve the above problems, being encrypted transmission port, including USB the invention discloses a kind of Internet of Things ciphering terminal End and key end, the end USB include USB interface, outer cover, and the inside of outer cover is equipped with USB interface, is connected with terminal interface, When key is connected to correct socket, unlock is completed in route connection, and when being connected to the socket of mistake, route is not connected to, nothing Method completes unlock;The forms such as outer cover is fixedly connected with terminal, and connection type is such as, but not limited to welded, locked, will USB interface is enclosed in inside outer cover, prevents violence disassembly unlock;The outer surface of outer cover is lock collar, and lock collar is divided into 3-6 fore shaft, depending on Depending on encryption level and key number, fore shaft is more, and encryption level is higher, and the key that can be set can also be more;Each fore shaft Place is equipped with a socket, one of them or several sockets are connected with USB interface by route, can set only one and effectively insert Mouthful, effective socket is the socket that can be connected to terminal after connecting, and the people for possessing key must remember the position of effective socket It sets, key, which is inserted in effective socket just, can transmit certificate unlock, can also set multiple effective sockets, and more people possess key, Remember that everyone effective tap position can unlock;The spigot not being connected with USB is equipped with locking mechanism, the locking mechanism Including with the worm screw in outer cover, worm screw is located in the sliding slot of socket corresponding position, and two sides are equipped with tooth, and the worm gear with two sides is stung respectively Close, worm gear be engaged with the tooth of briquetting, and worm gear center is fixed in outer cover by shaft, when the invalid socket of key insertion (i.e. not with USB connected socket) when, it will push worm screw and inwardly move, drive worm gear rotation, briquetting is under the drive of worm gear to runner movement Key is squeezed, is realized locked;Key end is divided into interface, chip and shell, interface and socket grafting, and chip is fixedly connected on shell On interior circuit board, with certificate in chip, certificate only just can be read when chip is connect with terminal, realize solution Lock.
Further, with different certificates in several key ends, all certificates are all inserted into interface and computer is whole It can just be unlocked after the connection of end.At this point, can more people hold different keys, proprietary key is all inserted into read certificate after can just solve Lock, security classification is higher, any one key missing can not all unlock.
Further, shell is equipped with several heat release holes, convenient for heat dissipation.
Further, grafting between the inner surface and the outer surface of outer cover is equipped with lock at interface.It is invalid slotting in key insertion After mouth is locked, it can be unlocked by dismantling outer cover, be reused after unlock.
Further, it is connected between the USB interface and terminal by data line, data line is detachable, is convenient for Replacement.
Further, key end is equipped with lid, with interface grafting.Interface is avoided to damage.
The beneficial effects of the present invention are:
1. being maintained secrecy by way of double-encryption, first is that the certificate in key, computer can just be decrypted by possessing certificate Terminal;Second is that the position of effectively socket, it is necessary to, just can be complete when being inserted into certificate or more people in correct position while being inserted into certificate At the connection of key, information leakage caused by due to key loses is avoided.
2. having locking mechanism, it can be locked when key is inserted into invalid socket, key can not take out, and then protect information peace Entirely.
3. key flexible form is changeable, can more people hold same key, any individual can unlock, can also more people hold not Same certificate, it is necessary to which more people unlock simultaneously.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described.It is clear that the accompanying drawings in the following description is of the invention Some embodiments for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other attached drawings.
Fig. 1 is decomposition texture schematic diagram of the invention;
Fig. 2 is the front elevation of outer cover;
Fig. 3 is the cross sectional view of locking mechanism;
Fig. 4 is the cross sectional view of locking state;
In figure, the end USB 1, usb 11, outer cover 12, key end 2, interface 21, shell 23, lid 24, lock collar 3, fore shaft 31, Socket 32, briquetting 33, worm screw 34, worm gear 35.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.Obviously, described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Embodiment 1:
A kind of Internet of Things ciphering terminal is encrypted transmission port, including the end USB 1 and key end 2, the end USB include that USB connects The inside of mouth 11, outer cover 12, outer cover is equipped with USB interface, is connected with terminal interface, when key is connected to correct socket When, unlock is completed in route connection, and when being connected to the socket of mistake, route is not connected to, and is unable to complete unlock;Outer cover 12 and meter The forms such as calculation machine terminal is fixedly connected, and connection type is such as, but not limited to welded, locked, USB interface is enclosed in inside outer cover, Prevent violence disassembly unlock;The outer surface of outer cover is lock collar 3, and lock collar 3 is divided for 3-6 fore shaft 31, a depending on encryption level and key Depending on number, fore shaft is more, and encryption level is higher, and the key that can be set can also be more;A socket 32 is equipped at each fore shaft, One of them or several sockets are connected with USB interface by route, and the effective socket of only one can be set, and effective socket connects The socket that can be connected to afterwards with terminal, the people for possessing key must remember the position of effective socket, key to be inserted in effectively Certificate unlock can be just transmitted in socket, can also set multiple effective sockets, and more people possess key, remember that everyone effective inserts Mouth position can all unlock;The spigot not being connected with USB is equipped with locking mechanism, and the locking mechanism includes and the worm screw in outer cover 34, worm screw is located in the sliding slot of socket corresponding position, and two sides are equipped with tooth, is engaged respectively with the worm gear 35 of two sides, worm gear and briquetting 33 tooth occlusion, worm gear center are fixed in outer cover by shaft, and when key is inserted into invalid socket, (what is be not connected with USB is inserted Mouthful) when, it will push worm screw and inwardly move, drive worm gear rotation, briquetting squeezes key to runner movement under the drive of worm gear, real Now lock;Key end 2 is divided for interface 21, chip and shell 23, and interface 21 and 32 grafting of socket, chip are fixedly connected on shell 23 On interior circuit board, with certificate in chip, certificate only just can be read when chip is connect with terminal, realize solution Lock.
Embodiment 2:
With different certificates in several key ends, all certificates are all inserted into after interface is connect with terminal It can unlock.At this point, can more people hold different keys, proprietary key is all inserted into read certificate after can just unlock, security classification Higher, any one key missing can not all unlock.
Remaining is same as Example 1.
Embodiment 3:
Shell 23 is equipped with several heat release holes, convenient for heat dissipation.
Remaining is same as Example 1.
Embodiment 4:
Grafting between the inner surface and the outer surface of outer cover is equipped with lock at interface.Invalid socket is inserted into key to be locked Afterwards, it can be unlocked by dismantling outer cover, be reused after unlock.
Remaining is same as Example 1.
Embodiment 5:
It is connected between the USB interface and terminal by data line, data line is detachable, is conveniently replaceable.
Key end is equipped with lid 24, with interface grafting.Interface is avoided to damage.
Remaining is same as Example 1.

Claims (6)

1. a kind of Internet of Things ciphering terminal, it is characterised in that: be encrypted transmission port, including the end USB and key end, the end USB packet USB interface, outer cover are included, the inside of outer cover is equipped with USB interface, is connected with terminal interface;Outer cover and terminal are solid Fixed connection, the forms such as connection type such as, but not limited to welding, locking;The outer surface of outer cover is lock collar, and lock collar is divided into 3-6 Fore shaft;A socket is equipped at each fore shaft, one of them or several sockets are connected with USB interface by route;Not with USB phase Spigot even is equipped with locking mechanism, and the locking mechanism includes being located at socket corresponding position with the worm screw in outer cover, worm screw In sliding slot, two sides are equipped with tooth, are engaged respectively with the worm gear of two sides, and worm gear is engaged with the tooth of briquetting, and worm gear center is solid by shaft It is scheduled in outer cover;Key end is divided into interface, chip and shell, interface and socket grafting, and chip is fixedly connected on the intracorporal electricity of shell On the plate of road.
2. Internet of Things ciphering terminal according to claim 1, it is characterised in that: with different cards in several key ends Book, all certificates are all inserted into after interface is connect with terminal and can just unlock.
3. Internet of Things ciphering terminal according to claim 1, it is characterised in that: shell is equipped with several heat release holes.
4. Internet of Things ciphering terminal according to claim 1, it is characterised in that: the inner surface and the outer surface of outer cover interleaves It connects, lock is equipped at interface.
5. Internet of Things ciphering terminal according to claim 1, it is characterised in that: the USB interface and terminal it Between pass through data line connect.
6. Internet of Things ciphering terminal according to claim 1, it is characterised in that: key end is equipped with lid, with interface grafting.
CN201910373712.0A 2019-05-07 2019-05-07 Internet of things encryption terminal Expired - Fee Related CN110113159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910373712.0A CN110113159B (en) 2019-05-07 2019-05-07 Internet of things encryption terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910373712.0A CN110113159B (en) 2019-05-07 2019-05-07 Internet of things encryption terminal

Publications (2)

Publication Number Publication Date
CN110113159A true CN110113159A (en) 2019-08-09
CN110113159B CN110113159B (en) 2020-01-10

Family

ID=67488440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910373712.0A Expired - Fee Related CN110113159B (en) 2019-05-07 2019-05-07 Internet of things encryption terminal

Country Status (1)

Country Link
CN (1) CN110113159B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955303A (en) * 2019-11-14 2020-04-03 贵州电网有限责任公司 USB port locking device
CN113747387A (en) * 2021-08-30 2021-12-03 国网山东省电力公司电力科学研究院 Multi-mode input terminal based on Internet of things control and working method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100169660A1 (en) * 2008-12-30 2010-07-01 Motorola, Inc. Public key infrastructure-based first inserted subscriber identity module subsidy lock
CN101917275A (en) * 2010-04-23 2010-12-15 南京邮电大学 Safe and classified multiple locking method for wireless sensor nodes
US8255697B2 (en) * 2002-12-18 2012-08-28 Bware As Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks
CN105275278A (en) * 2015-08-27 2016-01-27 祁琳 Intelligent lock based on storage cabinet of Internet of Things and operation method of intelligent lock
WO2017101122A1 (en) * 2015-12-18 2017-06-22 深圳市振华微电子有限公司 Computer encryption lock having separating management and use
CN107404484A (en) * 2017-07-31 2017-11-28 上海爱优威软件开发有限公司 A kind of method, apparatus and system of mechanical release authority
CN109492370A (en) * 2017-09-11 2019-03-19 华为技术有限公司 Method for starting terminal, terminal and signature device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8255697B2 (en) * 2002-12-18 2012-08-28 Bware As Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks
US20100169660A1 (en) * 2008-12-30 2010-07-01 Motorola, Inc. Public key infrastructure-based first inserted subscriber identity module subsidy lock
CN101917275A (en) * 2010-04-23 2010-12-15 南京邮电大学 Safe and classified multiple locking method for wireless sensor nodes
CN105275278A (en) * 2015-08-27 2016-01-27 祁琳 Intelligent lock based on storage cabinet of Internet of Things and operation method of intelligent lock
WO2017101122A1 (en) * 2015-12-18 2017-06-22 深圳市振华微电子有限公司 Computer encryption lock having separating management and use
CN107404484A (en) * 2017-07-31 2017-11-28 上海爱优威软件开发有限公司 A kind of method, apparatus and system of mechanical release authority
CN109492370A (en) * 2017-09-11 2019-03-19 华为技术有限公司 Method for starting terminal, terminal and signature device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955303A (en) * 2019-11-14 2020-04-03 贵州电网有限责任公司 USB port locking device
CN113747387A (en) * 2021-08-30 2021-12-03 国网山东省电力公司电力科学研究院 Multi-mode input terminal based on Internet of things control and working method

Also Published As

Publication number Publication date
CN110113159B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
DE102016002792B4 (en) Biometric secret binding scheme with enhanced privacy protection
CN110113159A (en) A kind of Internet of Things ciphering terminal
DE102009061814B3 (en) Method, transmitter, receiver and system for a link and lane level packetization scheme for coding in serial links
DE69218335T2 (en) Method for identifying and exchanging cryptographic keys
DE69021936T2 (en) Method and system for data transmission.
CN108012580A (en) Electronic network device
CN106612220A (en) Flexible Ethernet lane management method and apparatus
CN104468090A (en) Chinese character password encoding method based on image pixel coordinates
CN110185338A (en) A kind of Packaging Bottle electric lock
DE212010000037U1 (en) MECHATRONIC LOCKING DEVICE
CN105976473A (en) Photoelectric cloud lock system and unlocking method thereof
CN109191616A (en) intelligent lock system
CN103281194A (en) Safe and lightweight class RFID ownership transferring method based on bilinear pairings
CN107342854A (en) The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN105808998A (en) Fingerprint identification device
CN207553776U (en) A kind of public affairs based on Internet of Things rent a house intelligent fingerprint identification door-locking system
CN102467774B (en) There is the cryptographic system of anti-side recording function
Kishore et al. Medical image watermarking: run through review
CN105336026B (en) A kind of method and system for supporting multi-brand electronic password lock
Rajesh et al. Secure communication across the internet by encrypting the data using cryptography and image steganography
CN105317294A (en) Handcuffs
CN208669151U (en) A kind of intelligence safe cabinet
CN104363098B (en) A kind of distributed monitoring end message safety protecting method based on digital encryption
CN113850933A (en) Storage cabinet system with cloud face recognition function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200110