CN108881276A - Data encryption and transmission method - Google Patents

Data encryption and transmission method Download PDF

Info

Publication number
CN108881276A
CN108881276A CN201810749259.4A CN201810749259A CN108881276A CN 108881276 A CN108881276 A CN 108881276A CN 201810749259 A CN201810749259 A CN 201810749259A CN 108881276 A CN108881276 A CN 108881276A
Authority
CN
China
Prior art keywords
encryption
data
color image
algorithm
piecemeals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810749259.4A
Other languages
Chinese (zh)
Inventor
陈丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhen Yu Technology Co Ltd
Original Assignee
Beijing Zhen Yu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhen Yu Technology Co Ltd filed Critical Beijing Zhen Yu Technology Co Ltd
Priority to CN201810749259.4A priority Critical patent/CN108881276A/en
Publication of CN108881276A publication Critical patent/CN108881276A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to technical field of data transmission, and in particular to a kind of data encryption and transmission method, encryption device is blocking by data cutting, forms multiple piecemeals;Multiple piecemeals are encrypted;Multiple encrypted piecemeals are hidden in color image;Encryption mapping table is generated in encryption device, encryption mapping table records the information of multiple encrypted piecemeals;Encryption mapping table is encrypted;Will encryption mapping table and picture transfer to decrypting device;It decrypts device and decrypts the encryption mapping table, according to the piecemeal hidden in mapping relations also original picture in the encryption mapping table;It decrypts device and decrypts multiple piecemeals;Merge piecemeal, restoring data.Compared with the prior art the beneficial effects of the present invention are:Using the data encryption and transmission method, the Information Security during intelligent robot correspondence with foreign country can be improved;Using the data encryption and transmission method, it can prevent the third party from intercepting the important information such as core algorithm, information bank from network.

Description

Data encryption and transmission method
Technical field
The present invention relates to technical field of data transmission, and in particular to a kind of data encryption and transmission method.
Background technique
It is well known that the softwares such as the operating system of computer, function program, database are to be unlikely to be perfect, They are needed periodically to be safeguarded, is upgraded, to reach the demand to grow with each passing hour.Although the core of intelligent robot is also to calculate Machine system, but the upgrading and update of intelligent robot are more complicated than computer system, are unique in that, intelligence machine The typically no interactive interface of people, it is to identify request by the sensor device and actuation means of a lot of complexity and imitate very Manually make to replacement.In brief, there is no the input such as the keyboard of computer, mouse, display, outputs etc. for intelligent robot Equipment is so easy to operate.
Therefore, because lacking Input/Output Device, in intelligent robot, significant data is lacked safely in upgrading renewal process Weary effective monitoring.If using existing data transmission method, so that the third party intercepts core algorithm, information bank from network Etc. important information be very easy to, and intercept behavior cannot timely early warning, also make intelligent robot be easy by network Attack.
To sum up, the weights such as a kind of suitable intelligent robot transmission core algorithm, information bank, operating system, function program are designed The encrypted transmission method for the information wanted is very necessary, and very urgent.
In view of the above drawbacks, creator of the present invention obtains the present invention by prolonged research and practice finally.
Summary of the invention
To solve above-mentioned technological deficiency, the technical solution adopted by the present invention is, the present invention provides a kind of data encryption biography Transmission method, it includes following steps:
Step S300, encryption device is blocking by data cutting, forms multiple piecemeals;
Step S301 encrypts multiple piecemeals;
Multiple encrypted piecemeals are hidden in color image by step S302;
Step S303, generates encryption mapping table in encryption device, and encryption mapping table records multiple encrypted piecemeals Data type and size of data and multiple encrypted piecemeals are hidden in the position on color image;
Step S304 encrypts encryption mapping table;
Step S305, will encryption mapping table and picture transfer to decrypting device;
Step S306, decryption device are decrypted the encryption mapping table, are restored according to mapping relations in the encryption mapping table The piecemeal hidden in picture;
Multiple piecemeals are individually decrypted in step S307, decryption device continuation;
Step S308 merges piecemeal, restoring data according to the mapping relations of encryption mapping table.
Preferably, the block data size in step S300 is no more than 10KB.
Preferably, in step S301, it is right using different passwords or different cipher modes when being encrypted to multiple piecemeals Each block encryption.
Preferably, multiple encrypted piecemeals to be hidden in the different location of same picture, or different in step S302 On picture.
Preferably, multiple encrypted piecemeals are hidden on different pictures, and every picture is only hidden in step S302 One piecemeal.
Preferably, in step S301, the Encryption Algorithm that multiple piecemeals are encrypted be DES algorithm or 3DES algorithm or DESX algorithm or IDEA algorithm or aes algorithm or RSA Algorithm or Diffie-He l lman algorithm.
Preferably, multiple encrypted piecemeals, which are hidden in the method in picture, is in executing step S302:
Color image is converted practical bitmap data by step S310;
Step S311, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data Number;
Step S312 replaces with last bit information of each byte of the color image bitmap data after interception point The bit information of block number evidence;
Step S313, the color image after saving change are completed block data and are hidden.
Preferably, multiple encrypted piecemeals, which are hidden in the method in picture, is in executing step S302:
Color image is converted practical bitmap data by step S360;
Step S361, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data Number;
Step S362, individually by the n-th bit information of each byte of the color image bitmap data after interception The bit information of block data is replaced with, N value 1-8 forms 8 new color images altogether;
Step S363 compares original color image with 8 new color images respectively;
Step S364 filters out the new color image closest to original color image;
Step S365, determines the optimal value of N, and is saved in encryption mapping table;
Step S366 saves the new color image after screening, completes block data and hides.
Compared with the prior art the beneficial effects of the present invention are:
The present invention provides a kind of data encryption and transmission method, using multi-enciphering mode, uses the Data Encryption Transmission side Method can be improved the Information Security during intelligent robot correspondence with foreign country;Use the data encryption and transmission method, Neng Goufang Only the third party intercepts the important information such as core algorithm, information bank from network.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of intelligent robot in the embodiment of the present invention 1;
Fig. 2 is a kind of structural schematic diagram of the update auxiliary device for intelligent robot in the embodiment of the present invention 1;
Fig. 3 is a kind of update flow chart of intelligent robot in the embodiment of the present invention 1;
Fig. 4 is the update method flow chart of the operating system in the embodiment of the present invention 1 in operating system module;
Fig. 5 is the update method flow chart of the function program in the embodiment of the present invention 1 on functional program module;
Fig. 6 is information bank update method flow chart in information repository in the embodiment of the present invention 1;
Fig. 7 is the update method flow chart of the core algorithm in the embodiment of the present invention 1 in core algorithm module;
Fig. 8 is the safe early warning monitoring method flow chart of early warning and monitoring device in the embodiment of the present invention 1;
Fig. 9 is the method for monitoring operation states flow chart of early warning and monitoring device in the embodiment of the present invention 1;
Figure 10 is the work flow diagram in the embodiment of the present invention 1 for the update auxiliary device of intelligent robot;
Figure 11 is core algorithm generation method flow chart in 1 algorithm updating device of the embodiment of the present invention;
Figure 12 is operating system generation method flow chart in 1 operating system update device of the embodiment of the present invention;
Figure 13 is function program generation method flow chart in 1 function program updating device of the embodiment of the present invention;
Figure 14 is information library generating method flow chart in 1 information bank updating device of the embodiment of the present invention;
Figure 15 is a kind of flow chart of the data encryption and transmission method provided in the embodiment of the present invention 1;
Figure 16 is that piecemeal hidden method flow chart is encrypted in the embodiment of the present invention 1;
Figure 17 is that piecemeal hidden method flow chart is encrypted in the embodiment of the present invention 2.
Appended drawing reference:
Central control system 1, decryption device 5, task transfer system 6, early warning and monitoring device 7, compare confirmation system 8, behaviour Control device 9, maintenance system 10, cloud center control platform 12, version repository 15, download platform 16, encryption device 18, core algorithm mould Block 21, operating system module 22, functional program module 23, information repository 25, local learning system 31, sensor device 32, Algorithm updating device 100, core algorithm generate system 110, custom algorithm development system 120, machine algorithm generate system 130, Tranining database 150, operating system update device 200, block transmission device 210, operating system testing module 220, operation system System development module 230, function program updating device 300, Hardware match taxis system 310, function program test macro 320, function It can program development system 330, information bank updating device 500, information bank synthesis system 510, information analysis processing system 520, letter Cease acquisition system 530 and the artificial acceptance system 550 of information bank.
Specific embodiment
Below in conjunction with attached drawing, the forgoing and additional technical features and advantages are described in more detail.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", " length ", " width ", " thickness ", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom" "inner", "outside", " up time The orientation or positional relationship of the instructions such as needle ", " counterclockwise ", " axial direction ", " radial direction ", " circumferential direction " be orientation based on the figure or Positional relationship, be merely for convenience of description the present invention, rather than the device or element of indication or suggestion meaning must have it is specific Orientation, be constructed and operated in a specific orientation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, unless otherwise clear It is specific to limit.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be mechanical connect It connects, is also possible to be electrically connected or can communicate each other;It can be directly connected, can also indirectly connected through an intermediary, it can be with It is the interaction relationship of the connection or two elements inside two elements, unless otherwise restricted clearly.For this field For those of ordinary skill, the specific meanings of the above terms in the present invention can be understood according to specific conditions.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below " One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Embodiment 1
As shown in Figure 1, for a kind of structural schematic diagram of intelligent robot in the embodiment of the present invention 1.The embodiment of the present invention 1 mentions A kind of intelligent robot supplied comprising central control system 1, task transfer system 6, compare confirmation system 8, core algorithm mould Block 21, operating system module 22, functional program module 23 and information repository 25.Central control system 1 is transferred with task respectively System 6, core algorithm module 21, operating system module 22, functional program module 23 and information repository 25 connect.Core algorithm Module 21 is for storing, updating core algorithm.Operating system module 22 is for storing, updating operating system.Functional program module 23 for storing, updating function program.Information repository 25 is for storing, updating intelligent robot knowledge base.Compare confirmation system System 8 is for parsing mapping relations, fit version information.
Central control system 1 is transferred system 6 by task and is connect with cloud center control platform 12, cloud center control platform 12 Also it is connect with download platform 16.Confirmation system 8 is compared to connect with central control system 1 and version repository 15 respectively.Version repository 15 is also It is connect with cloud center control platform 12, cloud center control platform 12 calculates the information repository or core that update in download platform 16 Each version information of method program or function program or operating system extracts, and stores into version repository 15, shape in version repository 15 At version information mapping table.It compares confirmation system 8 and identifies information repository or core algorithm program or function in fit version library 15 The version information of energy program or operating system, with the clearly required version downloaded.Confirmation system 8 identification of comparison needs to download interior Rong Hou is passed the information on to central control system 1.
Central control system 1 is by the information repository obtained from download platform 16, core algorithm program, function program, behaviour Make system and is loaded into information repository 25, core algorithm module 21, functional program module 23, operating system module 22 respectively.Finally So that intelligent robot is able to upgrading and updates.
As shown in figure 3, for a kind of update flow chart of intelligent robot in the present embodiment.Specific update method:
Step S1, task transfer system 6 and initiate downloading task request to cloud center control platform 12;
Step S2 compares confirmation system 8 by version repository 15 and obtains map listing;
Step S3, the map listing that comparing confirmation system 8 will acquire are compared with original map listing, and identification needs The content of downloading;
Step S4, the downloading content that central control system 1 is identified according to confirmation system 8 is compared calculate optimal service device, It is downloaded by optimal service device;
Step S5, central control system 1 by the information bank downloaded from download platform 16, core algorithm, function program and Operating system is updated respectively in information repository 25, core algorithm module 21, functional program module 23, operating system module 22 It is interior;
Step S6 completes to update.
Wherein it is preferred to which task scheduling system 6 can initiate to download from trend cloud center control platform 12 at regular intervals Task requests.Download platform 16 is preferably server cluster, and the address list of server cluster can be controlled flat by cloud center Platform 12 passes to central control system 1, mapping relations, each server comprising new more new data and server on address list Corresponding duration and each server process performance parameter.Address list enables central control system 1 quickly to select Optimal service device out.
New updated data package includes but is not limited to information repository, core algorithm program, function program, operating system.
The update method, is advantageous in that, being capable of the update automatic, quickly, intelligent that complete robot.It is difficult to reduce operation Degree promotes the efficiency that upgrading updates, and reduces human input.
Intelligent robot can carry out automatic upgrading operation system by remote upgrade, backup, recovery.
As shown in figure 4, for the update method flow chart of the operating system in operating system module in the embodiment of the present invention 1. When executing step S5, the specific update method of operating system in operating system module 22 is:
Step S11, spare auxiliary operation system in wake operation system module 22;
Step S12, the original operating system of backup operation system module 22;
Step S13 downloads each piecemeal of new operating system;
Step S14 merges new operating system piecemeal, synthesizes new operating system;
Step S15 installs new operating system, such as successfully installs, then end operation system update, continues if install failure Execute step S16;
Step S16 downloads the original operating system of operating system module 22 being backed up;
Step S17 restores original operating system in operating system module 22.
It is preferred that can also continue to execute step S18:
Step S18, operating system module 22 send error log, end operation system update to maintenance system 10.
Maintenance system 10 is connect with operating system module 22.Maintenance system 10 is for receiving and handling error log and early warning Information.
The cumbersome and extremely inconvenient thing of operating system update inherently process.In addition, due to system upgrading and band The problem of use habit come, many inconvenience can be brought to people, new operating system is adapted to and needs the regular hour, the talent can connect By.But the upgrading of operating system is significant for robot, it can make computing capability and with better function, more convenient for People.Robot is the equipment without display screen, its operating system can not design flawless at the very start, it is impossible to Do not upgrade always.A kind of robot provided by the invention can make the operating system of its own under steady, safe, unmanned intervene Complete upgrading.
The specific works of robot are all based on the function program that operates on intelligent robot to realize, these programs Automatic upgrading can bring very big convenience to the application of robot.And some robots manually programmed are far from passing through It is so convenient that cloud center control platform 12 and download platform 16 are automatically mounted into newest function program in robot.
Intelligent robot can be automatically downloaded into function program by cloud center control platform 12 and download platform 16 Robot functional program module 23, in functional program module 23, new function program can execute installation operation.Newest function Energy program is automatically installed in robot system, and robot is made functionally to keep newest, most complete, most stable.
As shown in figure 5, for the update method flow chart of the function program on functional program module in the embodiment of the present invention 1. When executing step S5, the specific update method of function program on functional program module 23 is:
Step S21, functional program module 23 identify the version of new function program;
New function program is downloaded in buffer storage by step S22, functional program module 23;
Step S23,23 backup original function program of functional program module;
Step S24, functional program module 23 unload original function program;
Step S25, functional program module 23 install new function program, such as install successfully, then terminate, if install failure after It is continuous to execute step S26;
Step S26 downloads the original function program being backed up;
Step S27 restores original function program in functional program module 23.
In intelligent robot learning process, the storage and replacement of information and knowledge are particularly important in information repository 25. Information repository 25 needs continuous expanding and updating.
As shown in fig. 6, for information bank update method flow chart in information repository in the embodiment of the present invention 1.Executing step When rapid S5, the specific information bank update method of information repository 25 is:
Step S31, information repository 25 judge information bank updating type, update if dilatation, then continue to execute step S32 updates if replacement, then continues to execute step S33;
Step S32, information repository 25 merge new information library and original information library, if merging successfully, terminate, If merging is unsuccessful, step S37 is continued to execute;
New information library is downloaded in buffer storage by step S33, information repository 25;
Step S34,25 backup original information library of information repository;
Step S35, information repository 25 delete original information library;
Step S36, information repository 25 are loaded into new information library, are such as loaded into successfully, then terminate, continue to hold if being loaded into failure Row step S37;
Step S37 removes new information library information, restores original information library and uses for intelligent robot.
Core algorithm is the core of machine person to person interaction, wherein acquisition, identification, analysis, composite signal, feedback information are The committed step of robot work, acquisition and feedback are determined by physical equipment, such as image, sound collection sensing device It the sensing devices such as presents with robotic arm, face and can complete and acquire and feedback operation, and identify, analyze and composite signal is then It is to be embodied by core algorithm.The update of core algorithm is depended merely on robot itself and can not be fast implemented automatically.
As shown in fig. 7, for the update method flow chart of the core algorithm in core algorithm module in the embodiment of the present invention 1. When executing step S5, the specific update method of core algorithm in core algorithm module 21 is:
Step S51, core algorithm module 21 identify the version of new core algorithm;
New core algorithm is downloaded in buffer storage by step S52, core algorithm module 21;
Step S53, core algorithm module 21 back up original core algorithm;
Step S54, core algorithm module 21 delete original core algorithm;
Step S55, core algorithm module 21 are loaded into new core algorithm, such as is loaded into successfully, then terminate, if loading unsuccessfully if after It is continuous to execute step S56;
Step S56 downloads the original core algorithm being backed up;
Step S57 restores original core algorithm in core algorithm module 21.
The data that intelligent robot learns and uses according to user's habit are the private datas of user, should guard against this A little information are uploaded on any network.So the privacy of user data safety needs in intelligent robot are paid attention to.Although May will be installed the security systems such as firewall, loophole inspection, antivirus protection inside intelligent robot, but these security systems without Method sufficiently carries out security audit, protection for local backdoor programs.
A kind of intelligent robot provided by the invention avoids the leakage of privacy of user data by local isolation method.This hair It further includes sensor device 32 and local learning system 31 to a kind of intelligence machine of bright offer, local learning system 31 respectively with Sensor device 32 and central control system 1 connect.Sensor device 32 and center can be controlled by local learning system 31 System 1 processed is isolated, thus the data for avoiding cam device, recording device or other sensors device from directly obtaining sensor Be transferred to central control system 1, further avoid equipment by networking mode directly access cam device, recording device or Other sensors, or directly acquire sensor related data.
The data obtained from sensor device 32 are analyzed and processed by local learning system 31, formed local information library and Local algorithm, local information library is applicable in be merged with the information in information repository 25.Local algorithm is applicable in and core algorithm module Core algorithm in 21 merges.By networking leakage, winner also can not be direct for even local algorithm or local information library The private data at family must be taken.The buffer action of local learning system 31, can be such that the private data of local user obtains very well Guarantee.
A kind of intelligent robot provided by the invention further includes early warning and monitoring device 7, early warning and monitoring device 7 respectively with maintenance System 10 and central control system 1 connect.Early warning and monitoring device 7 for monitoring center's control system 1 network access trace or Log, including the access trace of network caused by access cloud center control platform 12 or other Internet Server ends or log.
As shown in figure 8, for the safe early warning monitoring method flow chart of early warning and monitoring device in the embodiment of the present invention 1.Early warning The safe early warning monitoring method of monitoring device 7 is:
Step S61, the Internet protocol address that early warning and monitoring device 7 accesses central control system 1 outward check, If monitoring strange Internet protocol address, step S62 is continued to execute, if not monitoring exception, is monitored always;
Strange Internet protocol address is transmitted to maintenance system 10 by step S62;
Strange Internet protocol address is compared with the white and black list of calling for step S63, maintenance system 10, It is screened, is not present if threatening, continues to execute step S61, threatened then follow the steps S64 if it exists;
Step S64 exists with the Internet protocol address threatened, sounds an alarm.
Any program in operation and escalation process all can not without any error may, software itself upgrading, transmission, It is abnormal more inevitable during operation etc..
The present invention passes through the operating status of 7 complete monitoring intelligent robot of early warning and monitoring device, to ensure that robot is transporting In row, intelligence learning and automatic escalation process can safely, it is quiet, successfully carry out.In addition, early warning and monitoring device 7 is also used to It monitors intelligent robot and upgrades more new state.
It as described in Figure 9, is the method for monitoring operation states flow chart of early warning and monitoring device in the embodiment of the present invention 1.Early warning The method for monitoring operation states of monitoring device 7 is:
Step S71, early warning and monitoring device 7 pass through 1 recalls information repository 25 of central control system or core algorithm module 21 or functional program module 23 or operating system module 22 in running log and upgrading Update log;
Step S72, early warning and monitoring device 7 judge information repository 25 or core algorithm module 21 or functional program module 23 Or whether exception thens follow the steps S71 and continues if without exception for the running log in operating system module 22 and upgrading Update log Monitoring, if there is abnormal execution step S73;
Step S73, judges Exception Type, if information repository 25 or core algorithm module 21 or functional program module 23 or Running log in operating system module 22 is abnormal, then step S74 is continued to execute, if information repository 25 or core algorithm module 21 or functional program module 23 or operating system module 22 in upgrading Update log it is abnormal, then continue to execute step S75;
Step S74 restarts load information repository 25 or core algorithm module 21 or functional program module 23 or behaviour Make system module 22, and executes step S76;
Step S75, termination message repository 25 or core algorithm module 21 or functional program module 23 or operating system mould The upgrading of block 22 updates, and restores state before upgrading, and execute step S76;
Step S76, early warning and monitoring device 7 issue early warning to maintenance system 10.
Although a kind of intelligent robot provided by the invention can carry out unmanned intervention ground intelligence learning and automatic upgrading, Be people be it is complicated, changeable, upgrade every time and the information bank, operating system, the function program that update etc. be not necessarily what user liked. User needs intelligent robot that can return the information bank at certain former moment, operating system, the version of function program.
A kind of intelligent robot provided by the invention further includes control device 9, control device 9 and central control system 1 Connection, control device 9 send upgrading to central control system 1 and update selection instruction.User can control intelligence by control device 9 The upgrading and update of energy robot.The log of upgrading and update that user may browse through by control device 9.
Therefore, intelligent robot both can control by control device 9 and has stopped automatic upgrading, update, and also can control intelligence Robot restores original information bank or operating system or function program.
It is preferred that control device 9 and central control system 1 are using being wirelessly connected, further control device 9 can be long-range hand Holding equipment.Function on control device 9 can be realized by software program.
As shown in Fig. 2, for the structural representation of the update auxiliary device for intelligent robot a kind of in the embodiment of the present invention 1 Figure.The embodiment of the present invention 1 also provides a kind of intelligent robot update auxiliary device comprising cloud center control platform 12, version Library 15, download platform 16, encryption device 18, algorithm updating device 100, operating system update device 200, function program more new clothes Set 300 and information bank updating device 500.Cloud center control platform 12 respectively with version repository 15, encryption device 18 and download platform 16 connections.Cloud center control platform 12 updates auxiliary device internal data communication and correspondence with foreign country for controlling.Download platform 16 For storing the core algorithm of the generation of algorithm updating device 100, download platform 16 is raw for storage program area updating device 200 At operating system, download platform 16 is used to store the information bank of the generation of information bank updating device 500, and download platform 16 is for depositing Store up the function program that function program updating device 300 generates.
Algorithm updating device 100, operating system update device 200, function program updating device 300 and information bank more new clothes It sets 500 to connect with encryption device 18, encryption device 18 will be to algorithm updating device 100, operating system update device 200, function Core algorithm, operating system, function program and the information bank that energy program renewing device 300 and information bank updating device 500 generate It is encrypted, after core algorithm, operating system, function program and information bank are encrypted in storage to download platform 16.
It as shown in Figure 10, is the work flow diagram in the embodiment of the present invention 1 for the update auxiliary device of intelligent robot; It updates auxiliary device and is able to carry out following steps:
Step S101 passes through algorithm updating device 100, operating system update device 200, function program updating device 300 Core algorithm, operating system, function program and information bank are updated respectively with information bank updating device 500;
Step S102 is divided core algorithm or operating system or function program or the data of information bank by encryption device 18 Block, every block size are no more than 10KB;
Step S103, by encryption device 18, using different passwords or different cipher modes, to each block encryption;
Encrypted piecemeal is hidden in color image by step S104 by encryption device 18;
Step S105 stores the picture for being concealed with piecemeal into download platform 16;
Step S106, cloud center control platform 12 calls the picture in download platform 16, and color image is sent to intelligence It can robot.
In intelligent robot one end, then the picture for being concealed with data is decrypted by decrypting device 5.After decryption, Each piecemeal is merged, to extract the core algorithm for the update of being upgraded, operating system, function program and information Library.
Into this time encrypted transmission is crossed, it is advantageous in that, can prevents the third party from intercepting core algorithm, information bank from network Etc. important information.
Preferably, in step S104, every picture only stores the data of a piecemeal, and each block data is hidden in pair After answering any position on picture, block data to be hidden in corresponding picture, it is further formed encryption mapping table, encryption mapping table note Carry type, size and the stowed position of the data hidden in corresponding picture.
Algorithm updating device 100 includes that core algorithm generates system 110, custom algorithm development system 120, machine algorithm life At system 130 and tranining database 150.Machine algorithm generates system 130 and connect with tranining database 150, and core algorithm generates System 110 generates system 130 with custom algorithm development system 120 and machine algorithm respectively and connect.
It as shown in figure 11, is core algorithm generation method flow chart in 1 algorithm updating device of the embodiment of the present invention.Algorithm is more Core algorithm generation method is in new equipment 100:
Step S111, machine algorithm generate system 130 and are trained and learn according to the data in tranining database 150, Form machine algorithm;
Step S112, custom algorithm development system 120 transfer the algorithm manually compiled and edited;
Step S113, core algorithm generate system 110 and compile and edit algorithm by machine algorithm and manually and merge to form core Algorithm.
Machine algorithm generates system 130 and is trained to mass data in tranining database 150, raw after long-time learns At machine algorithm.The number that data, artificial receipts data, third party in tranining database 150 including web crawlers are called According to.It researches and develops simultaneously, program the field that people from group is directed to specific, important, high preparation, be customized exploitation algorithm routine.
Core algorithm update method is advantageous in that:The core calculation for adapting to intelligent robot can be accurately and timely provided Method.
Operating system update device 200 includes block transmission device 210, operating system testing module 220 and operating system Development module 230.Operating system testing module 220 connects with block transmission device 210 and operating system development module 230 respectively It connects.Block transmission device 210 is also connect with encryption device 18.
It as shown in figure 12, is operating system generation method flow chart in 1 operating system update device of the embodiment of the present invention.Behaviour Making operating system generation method in system updating device 200 is:
Step S121, operating system development module 230 call the operating system of customized development, and are sent to operating system survey Die trial block 220;
Step S122, operating system testing module 220 test the operating system of customized development, operating system testing The operating system data that test passes through are sent to block transmission device 210 by module 220;
Step S123, the operating system data that block transmission device 210 passes through test carry out preliminary piecemeal.
Function program updating device 300 includes Hardware match taxis system 310, function program test macro 320 and function Program development system 330.Function program test macro 320 is developed with Hardware match taxis system 310 and function program respectively 330 connection of system.Hardware match taxis system 310 is also connect with encryption device 18.
It as shown in figure 13, is function program generation method flow chart in 1 function program updating device of the embodiment of the present invention.Function Function program generation method in energy program renewing device 300:
Step S131, function program development system 330 call the function program of customized development, and are sent to function program survey Test system 320;
Step S132, function program test macro 320 test function program, and function program test macro 320 will It tests the function program passed through and is sent to Hardware match taxis system 310;
Step S133, the hardware of function program and intelligent robot that Hardware match taxis system 310 passes through test into Row matching and classification.
Function program generation method is advantageous in that:By Hardware match, the quick-downloading function of intelligent robot can be made Program improves the efficiency of the downloading of function program.By function program test macro 320, the compatibility of function program is avoided Property problem.
Information bank updating device 500 includes information bank synthesis system 510, information analysis processing system 520, information collection system System 530 and the artificial acceptance system 550 of information bank.Information analysis processing system 520 is connect with information acquisition system 530, information bank Synthesis system 510 is connect with the artificial acceptance system 550 of information bank and information analysis processing system 520 respectively.
It as shown in figure 14, is information library generating method flow chart in 1 information bank updating device of the embodiment of the present invention.Information bank Information library generating method is in updating device 500:
Step S151, information acquisition system 530 acquires internet data by web crawlers, and data are transferred to information Analysis process system 520;
Step S152, information analysis processing system 520 acquire internet data according to web crawlers and form first information library, And first information library is sent to information bank synthesis system 510;
Step S153, information bank synthesis system 510 first information library and the artificial acceptance system 550 of information bank are included the Two information banks mutually merge, and form new information bank.
It as shown in figure 15, is a kind of flow chart of the data encryption and transmission method provided in the embodiment of the present invention 1;The present invention Embodiment 1 also provides a kind of data encryption and transmission method, the specific steps are that:
Step S300, encryption device 18 is blocking by data cutting, forms multiple piecemeals;
Step S301 encrypts multiple piecemeals;
Multiple encrypted piecemeals are hidden in color image by step S302;
Step S303, generates encryption mapping table in encryption device 18, and encryption mapping table records multiple encrypted piecemeals Data type and size of data and multiple encrypted piecemeals be hidden in the position on color image;
Step S304 encrypts encryption mapping table;
Step S305, by encryption mapping table and picture transfer extremely decryption device 5;
Step S306, decryption device 5 are decrypted the encryption mapping table, are restored according to mapping relations in the encryption mapping table The piecemeal hidden in picture;
Step S307, decryption device 5 continue individually to decrypt multiple piecemeals;
Step S308 merges piecemeal, restoring data according to the mapping relations of encryption mapping table.
It is advantageous in that:By encrypting and hiding double-security measure, avoids other people and intercept or obtain on network The significant datas such as core algorithm data and information base data.
Preferably, the piecemeal size in step S300 is no more than 10KB.
Preferably, right using different passwords or different cipher modes when being encrypted to multiple piecemeals in step S301 Each block encryption.
Preferably, in step S302, multiple encrypted piecemeals are hidden in the different location of same picture, or different On picture.
Preferably, in step S302, multiple encrypted piecemeals are hidden on different pictures, and every picture is only hidden One piecemeal.
It preferably, as shown in figure 16, is encryption piecemeal hidden method flow chart in the embodiment of the present invention 1;Executing step In S302 or step S104, multiple encrypted piecemeals, which are hidden in the method in picture, is:
Color image is converted practical bitmap data by step S310;
Step S311, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data Number;
Step S312 replaces with last bit information of each byte of the color image bitmap data after interception point The bit information of block number evidence;
Step S313, the color image after saving change are completed block data and are hidden.
Preferably, in step S301 or step S103, the Encryption Algorithm that multiple piecemeals are encrypted be DES algorithm or 3DES algorithm or DESX algorithm or IDEA algorithm or aes algorithm or RSA Algorithm or Diffie-Hel lman algorithm.
Embodiment 2
This embodiment differs from embodiment 1 in that being that encryption piecemeal is hidden in the embodiment of the present invention 1 as shown in figure 17 Hide method flow diagram.Preferably, in executing step S302 or step S104, multiple encrypted piecemeals are hidden in picture Method can also be:
Color image is converted practical bitmap data by step S360;
Step S361, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data Number;
Step S362, individually by the n-th bit information of each byte of the color image bitmap data after interception The bit information of block data is replaced with, N value 1-8 forms 8 new color images altogether;
Step S363 compares original color image with 8 new color images respectively;
Step S364 filters out the new color image closest to original color image;
Step S365, determines the optimal value of N, and is saved in encryption mapping table;
Step S366 saves the new color image after screening, completes block data and hides.
The foregoing is merely a prefered embodiment of the invention, is merely illustrative for the purpose of the present invention, and not restrictive.This The structure and connection type etc. of each component may be changed in invention, it is all based on the technical solution of the present invention The equivalents and improvement of progress, should not exclude except protection scope of the present invention.

Claims (8)

1. a kind of data encryption and transmission method, which is characterized in that it includes following steps:
Step S300, encryption device is blocking by data cutting, forms multiple piecemeals;
Step S301 encrypts multiple piecemeals;
Multiple encrypted piecemeals are hidden in color image by step S302;
Step S303, generates encryption mapping table in encryption device, and encryption mapping table records the data of multiple encrypted piecemeals Type and size of data and multiple encrypted piecemeals are hidden in the position on color image;
Step S304 encrypts encryption mapping table;
Step S305, will encryption mapping table and picture transfer to decrypting device;
Step S306, decryption device decrypts the encryption mapping table, according to mapping relations also original picture in the encryption mapping table In hide piecemeal;
Multiple piecemeals are individually decrypted in step S307, decryption device continuation;
Step S308 merges piecemeal, restoring data according to the mapping relations of encryption mapping table.
2. a kind of data encryption and transmission method as described in claim 1, which is characterized in that the block data in step S300 is big It is small to be no more than 10KB.
3. a kind of data encryption and transmission method as described in claim 1, which is characterized in that in step S301, to multiple piecemeals When being encrypted, using different passwords or different cipher modes, to each block encryption.
4. a kind of data encryption and transmission method as described in claim 1, which is characterized in that in step S302, by multiple through adding Close piecemeal is hidden on the different location of same picture, or different pictures.
5. a kind of data encryption and transmission method as claimed in claim 4, which is characterized in that in step S302, by multiple through adding Close piecemeal is hidden on different pictures, and every picture only hides a piecemeal.
6. a kind of data encryption and transmission method as described in claim 1, which is characterized in that in step S301, to multiple points The Encryption Algorithm that block is encrypted is DES algorithm or 3DES algorithm or DESX algorithm or IDEA algorithm or aes algorithm or RSA Algorithm Or Diffie-Hellman algorithm.
7. a kind of data encryption and transmission method as described in claim 1-6 is any, which is characterized in that executing step S302 In, multiple encrypted piecemeals, which are hidden in the method in picture, is:
Color image is converted practical bitmap data by step S310;
Step S311, according to by the digit of binary block data, equivalent intercepts the byte number of color image bitmap data;
Last bit information of each byte of color image bitmap data after interception is replaced with block count by step S312 According to bit information;
Step S313, the color image after saving change are completed block data and are hidden.
8. a kind of data encryption and transmission method as described in claim 1-6 is any, which is characterized in that executing step S302 In, multiple encrypted piecemeals, which are hidden in the method in picture, is:
Color image is converted practical bitmap data by step S360;
Step S361, according to by the digit of binary block data, equivalent intercepts the byte number of color image bitmap data;
Step S362 individually replaces the n-th bit information of each byte of the color image bitmap data after interception For the bit information of block data, N value 1-8 forms 8 new color images altogether;
Step S363 compares original color image with 8 new color images respectively;
Step S364 filters out the new color image closest to original color image;
Step S365, determines the optimal value of N, and is saved in encryption mapping table;
Step S366 saves the new color image after screening, completes block data and hides.
CN201810749259.4A 2018-07-10 2018-07-10 Data encryption and transmission method Pending CN108881276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810749259.4A CN108881276A (en) 2018-07-10 2018-07-10 Data encryption and transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810749259.4A CN108881276A (en) 2018-07-10 2018-07-10 Data encryption and transmission method

Publications (1)

Publication Number Publication Date
CN108881276A true CN108881276A (en) 2018-11-23

Family

ID=64300366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810749259.4A Pending CN108881276A (en) 2018-07-10 2018-07-10 Data encryption and transmission method

Country Status (1)

Country Link
CN (1) CN108881276A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688289A (en) * 2018-12-25 2019-04-26 秒针信息技术有限公司 A kind of transmission of image encryption, image decryption method and device
CN110099064A (en) * 2019-05-08 2019-08-06 广州创想云科技有限公司 A kind of document handling method based on Internet of Things, device, equipment and storage medium
CN112134914A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Distributed secure storage strategy based on cryptography
US10990382B2 (en) 2018-07-05 2021-04-27 Alibaba Group Holding Limited Encryption machine upgrade, data import and request migration method, apparatus and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267293A (en) * 2008-04-18 2008-09-17 清华大学 Stream media hidden communication method based on hierarchical model
CN101577605A (en) * 2008-05-08 2009-11-11 吴志军 Speech LPC hiding and extraction algorithm based on filter similarity
CN104052658A (en) * 2014-07-05 2014-09-17 中国科学技术大学 Privacy protection system and method based on social network
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104484851A (en) * 2014-12-23 2015-04-01 西华大学 Self-adaptive high-capacity image information hiding method
CN104993923A (en) * 2015-07-02 2015-10-21 武汉大学 Radar data protection method based on combination of information hiding and encryption techniques

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267293A (en) * 2008-04-18 2008-09-17 清华大学 Stream media hidden communication method based on hierarchical model
CN101577605A (en) * 2008-05-08 2009-11-11 吴志军 Speech LPC hiding and extraction algorithm based on filter similarity
CN104052658A (en) * 2014-07-05 2014-09-17 中国科学技术大学 Privacy protection system and method based on social network
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104484851A (en) * 2014-12-23 2015-04-01 西华大学 Self-adaptive high-capacity image information hiding method
CN104993923A (en) * 2015-07-02 2015-10-21 武汉大学 Radar data protection method based on combination of information hiding and encryption techniques

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
印润远: "《信息安全导论》", 31 March 2011 *
张仕斌 等: "《应用密码学-卓越工程师计划》", 31 January 2017 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10990382B2 (en) 2018-07-05 2021-04-27 Alibaba Group Holding Limited Encryption machine upgrade, data import and request migration method, apparatus and device
CN109688289A (en) * 2018-12-25 2019-04-26 秒针信息技术有限公司 A kind of transmission of image encryption, image decryption method and device
CN109688289B (en) * 2018-12-25 2021-05-25 秒针信息技术有限公司 Image encryption transmission method, image decryption method and device
CN110099064A (en) * 2019-05-08 2019-08-06 广州创想云科技有限公司 A kind of document handling method based on Internet of Things, device, equipment and storage medium
CN110099064B (en) * 2019-05-08 2021-07-09 广州创想云科技有限公司 File processing method, device, equipment and storage medium based on Internet of things
CN112134914A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Distributed secure storage strategy based on cryptography
CN112134914B (en) * 2020-02-10 2021-08-06 北京天德科技有限公司 Distributed secure storage strategy based on cryptography

Similar Documents

Publication Publication Date Title
CN108881276A (en) Data encryption and transmission method
CN105283852B (en) A kind of method and system of fuzzy tracking data
CN108919680A (en) Update auxiliary device for intelligent robot
US9217998B2 (en) Management and development of an industrial environment
CN106991035A (en) A kind of Host Supervision System based on micro services framework
CN105103147B (en) With work load distributor come the method and system that track
US9182755B2 (en) Automated operator interface generation in a control system
CN104272787B (en) Technology for independently reverting to behavior checkpoint
CN107409126A (en) System and method for protecting enterprise computing environment safety
US8869132B2 (en) Method and system for executing and undoing distributed server change operations
CN102033897B (en) Dynamic hyperlink for Process Control System
US20020174422A1 (en) Software distribution system
US20120310906A1 (en) Building Information Tracking System and Method of Use
CN109478057A (en) Method and system for industrial Internet of Things
CN105706469A (en) Managing machine to machine devices
CN105593870A (en) Complex scoring for malware detection
CN1866283B (en) System and method for implementing regular system triggering
CA3171582A1 (en) Decentralized governance regulatory compliance (d-grc) controller
JP2008033751A (en) Update method and update system
CN105930725A (en) Signature-independent system behavior-based malware detection
WO1999011018A1 (en) Distributed computing architecture
CN208992712U (en) Intelligent robot
US11461691B2 (en) Performance manager to autonomously evaluate replacement algorithms
JP6712781B2 (en) Information processing method
CN111177708A (en) PLC credibility measuring method, system and measuring device based on TCM chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181123