CN108881276A - Data encryption and transmission method - Google Patents
Data encryption and transmission method Download PDFInfo
- Publication number
- CN108881276A CN108881276A CN201810749259.4A CN201810749259A CN108881276A CN 108881276 A CN108881276 A CN 108881276A CN 201810749259 A CN201810749259 A CN 201810749259A CN 108881276 A CN108881276 A CN 108881276A
- Authority
- CN
- China
- Prior art keywords
- encryption
- data
- color image
- algorithm
- piecemeals
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention relates to technical field of data transmission, and in particular to a kind of data encryption and transmission method, encryption device is blocking by data cutting, forms multiple piecemeals;Multiple piecemeals are encrypted;Multiple encrypted piecemeals are hidden in color image;Encryption mapping table is generated in encryption device, encryption mapping table records the information of multiple encrypted piecemeals;Encryption mapping table is encrypted;Will encryption mapping table and picture transfer to decrypting device;It decrypts device and decrypts the encryption mapping table, according to the piecemeal hidden in mapping relations also original picture in the encryption mapping table;It decrypts device and decrypts multiple piecemeals;Merge piecemeal, restoring data.Compared with the prior art the beneficial effects of the present invention are:Using the data encryption and transmission method, the Information Security during intelligent robot correspondence with foreign country can be improved;Using the data encryption and transmission method, it can prevent the third party from intercepting the important information such as core algorithm, information bank from network.
Description
Technical field
The present invention relates to technical field of data transmission, and in particular to a kind of data encryption and transmission method.
Background technique
It is well known that the softwares such as the operating system of computer, function program, database are to be unlikely to be perfect,
They are needed periodically to be safeguarded, is upgraded, to reach the demand to grow with each passing hour.Although the core of intelligent robot is also to calculate
Machine system, but the upgrading and update of intelligent robot are more complicated than computer system, are unique in that, intelligence machine
The typically no interactive interface of people, it is to identify request by the sensor device and actuation means of a lot of complexity and imitate very
Manually make to replacement.In brief, there is no the input such as the keyboard of computer, mouse, display, outputs etc. for intelligent robot
Equipment is so easy to operate.
Therefore, because lacking Input/Output Device, in intelligent robot, significant data is lacked safely in upgrading renewal process
Weary effective monitoring.If using existing data transmission method, so that the third party intercepts core algorithm, information bank from network
Etc. important information be very easy to, and intercept behavior cannot timely early warning, also make intelligent robot be easy by network
Attack.
To sum up, the weights such as a kind of suitable intelligent robot transmission core algorithm, information bank, operating system, function program are designed
The encrypted transmission method for the information wanted is very necessary, and very urgent.
In view of the above drawbacks, creator of the present invention obtains the present invention by prolonged research and practice finally.
Summary of the invention
To solve above-mentioned technological deficiency, the technical solution adopted by the present invention is, the present invention provides a kind of data encryption biography
Transmission method, it includes following steps:
Step S300, encryption device is blocking by data cutting, forms multiple piecemeals;
Step S301 encrypts multiple piecemeals;
Multiple encrypted piecemeals are hidden in color image by step S302;
Step S303, generates encryption mapping table in encryption device, and encryption mapping table records multiple encrypted piecemeals
Data type and size of data and multiple encrypted piecemeals are hidden in the position on color image;
Step S304 encrypts encryption mapping table;
Step S305, will encryption mapping table and picture transfer to decrypting device;
Step S306, decryption device are decrypted the encryption mapping table, are restored according to mapping relations in the encryption mapping table
The piecemeal hidden in picture;
Multiple piecemeals are individually decrypted in step S307, decryption device continuation;
Step S308 merges piecemeal, restoring data according to the mapping relations of encryption mapping table.
Preferably, the block data size in step S300 is no more than 10KB.
Preferably, in step S301, it is right using different passwords or different cipher modes when being encrypted to multiple piecemeals
Each block encryption.
Preferably, multiple encrypted piecemeals to be hidden in the different location of same picture, or different in step S302
On picture.
Preferably, multiple encrypted piecemeals are hidden on different pictures, and every picture is only hidden in step S302
One piecemeal.
Preferably, in step S301, the Encryption Algorithm that multiple piecemeals are encrypted be DES algorithm or 3DES algorithm or
DESX algorithm or IDEA algorithm or aes algorithm or RSA Algorithm or Diffie-He l lman algorithm.
Preferably, multiple encrypted piecemeals, which are hidden in the method in picture, is in executing step S302:
Color image is converted practical bitmap data by step S310;
Step S311, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data
Number;
Step S312 replaces with last bit information of each byte of the color image bitmap data after interception point
The bit information of block number evidence;
Step S313, the color image after saving change are completed block data and are hidden.
Preferably, multiple encrypted piecemeals, which are hidden in the method in picture, is in executing step S302:
Color image is converted practical bitmap data by step S360;
Step S361, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data
Number;
Step S362, individually by the n-th bit information of each byte of the color image bitmap data after interception
The bit information of block data is replaced with, N value 1-8 forms 8 new color images altogether;
Step S363 compares original color image with 8 new color images respectively;
Step S364 filters out the new color image closest to original color image;
Step S365, determines the optimal value of N, and is saved in encryption mapping table;
Step S366 saves the new color image after screening, completes block data and hides.
Compared with the prior art the beneficial effects of the present invention are:
The present invention provides a kind of data encryption and transmission method, using multi-enciphering mode, uses the Data Encryption Transmission side
Method can be improved the Information Security during intelligent robot correspondence with foreign country;Use the data encryption and transmission method, Neng Goufang
Only the third party intercepts the important information such as core algorithm, information bank from network.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of intelligent robot in the embodiment of the present invention 1;
Fig. 2 is a kind of structural schematic diagram of the update auxiliary device for intelligent robot in the embodiment of the present invention 1;
Fig. 3 is a kind of update flow chart of intelligent robot in the embodiment of the present invention 1;
Fig. 4 is the update method flow chart of the operating system in the embodiment of the present invention 1 in operating system module;
Fig. 5 is the update method flow chart of the function program in the embodiment of the present invention 1 on functional program module;
Fig. 6 is information bank update method flow chart in information repository in the embodiment of the present invention 1;
Fig. 7 is the update method flow chart of the core algorithm in the embodiment of the present invention 1 in core algorithm module;
Fig. 8 is the safe early warning monitoring method flow chart of early warning and monitoring device in the embodiment of the present invention 1;
Fig. 9 is the method for monitoring operation states flow chart of early warning and monitoring device in the embodiment of the present invention 1;
Figure 10 is the work flow diagram in the embodiment of the present invention 1 for the update auxiliary device of intelligent robot;
Figure 11 is core algorithm generation method flow chart in 1 algorithm updating device of the embodiment of the present invention;
Figure 12 is operating system generation method flow chart in 1 operating system update device of the embodiment of the present invention;
Figure 13 is function program generation method flow chart in 1 function program updating device of the embodiment of the present invention;
Figure 14 is information library generating method flow chart in 1 information bank updating device of the embodiment of the present invention;
Figure 15 is a kind of flow chart of the data encryption and transmission method provided in the embodiment of the present invention 1;
Figure 16 is that piecemeal hidden method flow chart is encrypted in the embodiment of the present invention 1;
Figure 17 is that piecemeal hidden method flow chart is encrypted in the embodiment of the present invention 2.
Appended drawing reference:
Central control system 1, decryption device 5, task transfer system 6, early warning and monitoring device 7, compare confirmation system 8, behaviour
Control device 9, maintenance system 10, cloud center control platform 12, version repository 15, download platform 16, encryption device 18, core algorithm mould
Block 21, operating system module 22, functional program module 23, information repository 25, local learning system 31, sensor device 32,
Algorithm updating device 100, core algorithm generate system 110, custom algorithm development system 120, machine algorithm generate system 130,
Tranining database 150, operating system update device 200, block transmission device 210, operating system testing module 220, operation system
System development module 230, function program updating device 300, Hardware match taxis system 310, function program test macro 320, function
It can program development system 330, information bank updating device 500, information bank synthesis system 510, information analysis processing system 520, letter
Cease acquisition system 530 and the artificial acceptance system 550 of information bank.
Specific embodiment
Below in conjunction with attached drawing, the forgoing and additional technical features and advantages are described in more detail.
In the description of the present invention, it is to be understood that, term " center ", " longitudinal direction ", " transverse direction ", " length ", " width ",
" thickness ", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom" "inner", "outside", " up time
The orientation or positional relationship of the instructions such as needle ", " counterclockwise ", " axial direction ", " radial direction ", " circumferential direction " be orientation based on the figure or
Positional relationship, be merely for convenience of description the present invention, rather than the device or element of indication or suggestion meaning must have it is specific
Orientation, be constructed and operated in a specific orientation, therefore be not considered as limiting the invention.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, unless otherwise clear
It is specific to limit.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or integral;It can be mechanical connect
It connects, is also possible to be electrically connected or can communicate each other;It can be directly connected, can also indirectly connected through an intermediary, it can be with
It is the interaction relationship of the connection or two elements inside two elements, unless otherwise restricted clearly.For this field
For those of ordinary skill, the specific meanings of the above terms in the present invention can be understood according to specific conditions.
In the present invention unless specifically defined or limited otherwise, fisrt feature in the second feature " on " or " down " can be with
It is that the first and second features directly contact or the first and second features pass through intermediary mediate contact.Moreover, fisrt feature exists
Second feature " on ", " top " and " above " but fisrt feature be directly above or diagonally above the second feature, or be merely representative of
First feature horizontal height is higher than second feature.Fisrt feature can be under the second feature " below ", " below " and " below "
One feature is directly under or diagonally below the second feature, or is merely representative of first feature horizontal height less than second feature.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
Embodiment 1
As shown in Figure 1, for a kind of structural schematic diagram of intelligent robot in the embodiment of the present invention 1.The embodiment of the present invention 1 mentions
A kind of intelligent robot supplied comprising central control system 1, task transfer system 6, compare confirmation system 8, core algorithm mould
Block 21, operating system module 22, functional program module 23 and information repository 25.Central control system 1 is transferred with task respectively
System 6, core algorithm module 21, operating system module 22, functional program module 23 and information repository 25 connect.Core algorithm
Module 21 is for storing, updating core algorithm.Operating system module 22 is for storing, updating operating system.Functional program module
23 for storing, updating function program.Information repository 25 is for storing, updating intelligent robot knowledge base.Compare confirmation system
System 8 is for parsing mapping relations, fit version information.
Central control system 1 is transferred system 6 by task and is connect with cloud center control platform 12, cloud center control platform 12
Also it is connect with download platform 16.Confirmation system 8 is compared to connect with central control system 1 and version repository 15 respectively.Version repository 15 is also
It is connect with cloud center control platform 12, cloud center control platform 12 calculates the information repository or core that update in download platform 16
Each version information of method program or function program or operating system extracts, and stores into version repository 15, shape in version repository 15
At version information mapping table.It compares confirmation system 8 and identifies information repository or core algorithm program or function in fit version library 15
The version information of energy program or operating system, with the clearly required version downloaded.Confirmation system 8 identification of comparison needs to download interior
Rong Hou is passed the information on to central control system 1.
Central control system 1 is by the information repository obtained from download platform 16, core algorithm program, function program, behaviour
Make system and is loaded into information repository 25, core algorithm module 21, functional program module 23, operating system module 22 respectively.Finally
So that intelligent robot is able to upgrading and updates.
As shown in figure 3, for a kind of update flow chart of intelligent robot in the present embodiment.Specific update method:
Step S1, task transfer system 6 and initiate downloading task request to cloud center control platform 12;
Step S2 compares confirmation system 8 by version repository 15 and obtains map listing;
Step S3, the map listing that comparing confirmation system 8 will acquire are compared with original map listing, and identification needs
The content of downloading;
Step S4, the downloading content that central control system 1 is identified according to confirmation system 8 is compared calculate optimal service device,
It is downloaded by optimal service device;
Step S5, central control system 1 by the information bank downloaded from download platform 16, core algorithm, function program and
Operating system is updated respectively in information repository 25, core algorithm module 21, functional program module 23, operating system module 22
It is interior;
Step S6 completes to update.
Wherein it is preferred to which task scheduling system 6 can initiate to download from trend cloud center control platform 12 at regular intervals
Task requests.Download platform 16 is preferably server cluster, and the address list of server cluster can be controlled flat by cloud center
Platform 12 passes to central control system 1, mapping relations, each server comprising new more new data and server on address list
Corresponding duration and each server process performance parameter.Address list enables central control system 1 quickly to select
Optimal service device out.
New updated data package includes but is not limited to information repository, core algorithm program, function program, operating system.
The update method, is advantageous in that, being capable of the update automatic, quickly, intelligent that complete robot.It is difficult to reduce operation
Degree promotes the efficiency that upgrading updates, and reduces human input.
Intelligent robot can carry out automatic upgrading operation system by remote upgrade, backup, recovery.
As shown in figure 4, for the update method flow chart of the operating system in operating system module in the embodiment of the present invention 1.
When executing step S5, the specific update method of operating system in operating system module 22 is:
Step S11, spare auxiliary operation system in wake operation system module 22;
Step S12, the original operating system of backup operation system module 22;
Step S13 downloads each piecemeal of new operating system;
Step S14 merges new operating system piecemeal, synthesizes new operating system;
Step S15 installs new operating system, such as successfully installs, then end operation system update, continues if install failure
Execute step S16;
Step S16 downloads the original operating system of operating system module 22 being backed up;
Step S17 restores original operating system in operating system module 22.
It is preferred that can also continue to execute step S18:
Step S18, operating system module 22 send error log, end operation system update to maintenance system 10.
Maintenance system 10 is connect with operating system module 22.Maintenance system 10 is for receiving and handling error log and early warning
Information.
The cumbersome and extremely inconvenient thing of operating system update inherently process.In addition, due to system upgrading and band
The problem of use habit come, many inconvenience can be brought to people, new operating system is adapted to and needs the regular hour, the talent can connect
By.But the upgrading of operating system is significant for robot, it can make computing capability and with better function, more convenient for
People.Robot is the equipment without display screen, its operating system can not design flawless at the very start, it is impossible to
Do not upgrade always.A kind of robot provided by the invention can make the operating system of its own under steady, safe, unmanned intervene
Complete upgrading.
The specific works of robot are all based on the function program that operates on intelligent robot to realize, these programs
Automatic upgrading can bring very big convenience to the application of robot.And some robots manually programmed are far from passing through
It is so convenient that cloud center control platform 12 and download platform 16 are automatically mounted into newest function program in robot.
Intelligent robot can be automatically downloaded into function program by cloud center control platform 12 and download platform 16
Robot functional program module 23, in functional program module 23, new function program can execute installation operation.Newest function
Energy program is automatically installed in robot system, and robot is made functionally to keep newest, most complete, most stable.
As shown in figure 5, for the update method flow chart of the function program on functional program module in the embodiment of the present invention 1.
When executing step S5, the specific update method of function program on functional program module 23 is:
Step S21, functional program module 23 identify the version of new function program;
New function program is downloaded in buffer storage by step S22, functional program module 23;
Step S23,23 backup original function program of functional program module;
Step S24, functional program module 23 unload original function program;
Step S25, functional program module 23 install new function program, such as install successfully, then terminate, if install failure after
It is continuous to execute step S26;
Step S26 downloads the original function program being backed up;
Step S27 restores original function program in functional program module 23.
In intelligent robot learning process, the storage and replacement of information and knowledge are particularly important in information repository 25.
Information repository 25 needs continuous expanding and updating.
As shown in fig. 6, for information bank update method flow chart in information repository in the embodiment of the present invention 1.Executing step
When rapid S5, the specific information bank update method of information repository 25 is:
Step S31, information repository 25 judge information bank updating type, update if dilatation, then continue to execute step
S32 updates if replacement, then continues to execute step S33;
Step S32, information repository 25 merge new information library and original information library, if merging successfully, terminate,
If merging is unsuccessful, step S37 is continued to execute;
New information library is downloaded in buffer storage by step S33, information repository 25;
Step S34,25 backup original information library of information repository;
Step S35, information repository 25 delete original information library;
Step S36, information repository 25 are loaded into new information library, are such as loaded into successfully, then terminate, continue to hold if being loaded into failure
Row step S37;
Step S37 removes new information library information, restores original information library and uses for intelligent robot.
Core algorithm is the core of machine person to person interaction, wherein acquisition, identification, analysis, composite signal, feedback information are
The committed step of robot work, acquisition and feedback are determined by physical equipment, such as image, sound collection sensing device
It the sensing devices such as presents with robotic arm, face and can complete and acquire and feedback operation, and identify, analyze and composite signal is then
It is to be embodied by core algorithm.The update of core algorithm is depended merely on robot itself and can not be fast implemented automatically.
As shown in fig. 7, for the update method flow chart of the core algorithm in core algorithm module in the embodiment of the present invention 1.
When executing step S5, the specific update method of core algorithm in core algorithm module 21 is:
Step S51, core algorithm module 21 identify the version of new core algorithm;
New core algorithm is downloaded in buffer storage by step S52, core algorithm module 21;
Step S53, core algorithm module 21 back up original core algorithm;
Step S54, core algorithm module 21 delete original core algorithm;
Step S55, core algorithm module 21 are loaded into new core algorithm, such as is loaded into successfully, then terminate, if loading unsuccessfully if after
It is continuous to execute step S56;
Step S56 downloads the original core algorithm being backed up;
Step S57 restores original core algorithm in core algorithm module 21.
The data that intelligent robot learns and uses according to user's habit are the private datas of user, should guard against this
A little information are uploaded on any network.So the privacy of user data safety needs in intelligent robot are paid attention to.Although
May will be installed the security systems such as firewall, loophole inspection, antivirus protection inside intelligent robot, but these security systems without
Method sufficiently carries out security audit, protection for local backdoor programs.
A kind of intelligent robot provided by the invention avoids the leakage of privacy of user data by local isolation method.This hair
It further includes sensor device 32 and local learning system 31 to a kind of intelligence machine of bright offer, local learning system 31 respectively with
Sensor device 32 and central control system 1 connect.Sensor device 32 and center can be controlled by local learning system 31
System 1 processed is isolated, thus the data for avoiding cam device, recording device or other sensors device from directly obtaining sensor
Be transferred to central control system 1, further avoid equipment by networking mode directly access cam device, recording device or
Other sensors, or directly acquire sensor related data.
The data obtained from sensor device 32 are analyzed and processed by local learning system 31, formed local information library and
Local algorithm, local information library is applicable in be merged with the information in information repository 25.Local algorithm is applicable in and core algorithm module
Core algorithm in 21 merges.By networking leakage, winner also can not be direct for even local algorithm or local information library
The private data at family must be taken.The buffer action of local learning system 31, can be such that the private data of local user obtains very well
Guarantee.
A kind of intelligent robot provided by the invention further includes early warning and monitoring device 7, early warning and monitoring device 7 respectively with maintenance
System 10 and central control system 1 connect.Early warning and monitoring device 7 for monitoring center's control system 1 network access trace or
Log, including the access trace of network caused by access cloud center control platform 12 or other Internet Server ends or log.
As shown in figure 8, for the safe early warning monitoring method flow chart of early warning and monitoring device in the embodiment of the present invention 1.Early warning
The safe early warning monitoring method of monitoring device 7 is:
Step S61, the Internet protocol address that early warning and monitoring device 7 accesses central control system 1 outward check,
If monitoring strange Internet protocol address, step S62 is continued to execute, if not monitoring exception, is monitored always;
Strange Internet protocol address is transmitted to maintenance system 10 by step S62;
Strange Internet protocol address is compared with the white and black list of calling for step S63, maintenance system 10,
It is screened, is not present if threatening, continues to execute step S61, threatened then follow the steps S64 if it exists;
Step S64 exists with the Internet protocol address threatened, sounds an alarm.
Any program in operation and escalation process all can not without any error may, software itself upgrading, transmission,
It is abnormal more inevitable during operation etc..
The present invention passes through the operating status of 7 complete monitoring intelligent robot of early warning and monitoring device, to ensure that robot is transporting
In row, intelligence learning and automatic escalation process can safely, it is quiet, successfully carry out.In addition, early warning and monitoring device 7 is also used to
It monitors intelligent robot and upgrades more new state.
It as described in Figure 9, is the method for monitoring operation states flow chart of early warning and monitoring device in the embodiment of the present invention 1.Early warning
The method for monitoring operation states of monitoring device 7 is:
Step S71, early warning and monitoring device 7 pass through 1 recalls information repository 25 of central control system or core algorithm module
21 or functional program module 23 or operating system module 22 in running log and upgrading Update log;
Step S72, early warning and monitoring device 7 judge information repository 25 or core algorithm module 21 or functional program module 23
Or whether exception thens follow the steps S71 and continues if without exception for the running log in operating system module 22 and upgrading Update log
Monitoring, if there is abnormal execution step S73;
Step S73, judges Exception Type, if information repository 25 or core algorithm module 21 or functional program module 23 or
Running log in operating system module 22 is abnormal, then step S74 is continued to execute, if information repository 25 or core algorithm module
21 or functional program module 23 or operating system module 22 in upgrading Update log it is abnormal, then continue to execute step S75;
Step S74 restarts load information repository 25 or core algorithm module 21 or functional program module 23 or behaviour
Make system module 22, and executes step S76;
Step S75, termination message repository 25 or core algorithm module 21 or functional program module 23 or operating system mould
The upgrading of block 22 updates, and restores state before upgrading, and execute step S76;
Step S76, early warning and monitoring device 7 issue early warning to maintenance system 10.
Although a kind of intelligent robot provided by the invention can carry out unmanned intervention ground intelligence learning and automatic upgrading,
Be people be it is complicated, changeable, upgrade every time and the information bank, operating system, the function program that update etc. be not necessarily what user liked.
User needs intelligent robot that can return the information bank at certain former moment, operating system, the version of function program.
A kind of intelligent robot provided by the invention further includes control device 9, control device 9 and central control system 1
Connection, control device 9 send upgrading to central control system 1 and update selection instruction.User can control intelligence by control device 9
The upgrading and update of energy robot.The log of upgrading and update that user may browse through by control device 9.
Therefore, intelligent robot both can control by control device 9 and has stopped automatic upgrading, update, and also can control intelligence
Robot restores original information bank or operating system or function program.
It is preferred that control device 9 and central control system 1 are using being wirelessly connected, further control device 9 can be long-range hand
Holding equipment.Function on control device 9 can be realized by software program.
As shown in Fig. 2, for the structural representation of the update auxiliary device for intelligent robot a kind of in the embodiment of the present invention 1
Figure.The embodiment of the present invention 1 also provides a kind of intelligent robot update auxiliary device comprising cloud center control platform 12, version
Library 15, download platform 16, encryption device 18, algorithm updating device 100, operating system update device 200, function program more new clothes
Set 300 and information bank updating device 500.Cloud center control platform 12 respectively with version repository 15, encryption device 18 and download platform
16 connections.Cloud center control platform 12 updates auxiliary device internal data communication and correspondence with foreign country for controlling.Download platform 16
For storing the core algorithm of the generation of algorithm updating device 100, download platform 16 is raw for storage program area updating device 200
At operating system, download platform 16 is used to store the information bank of the generation of information bank updating device 500, and download platform 16 is for depositing
Store up the function program that function program updating device 300 generates.
Algorithm updating device 100, operating system update device 200, function program updating device 300 and information bank more new clothes
It sets 500 to connect with encryption device 18, encryption device 18 will be to algorithm updating device 100, operating system update device 200, function
Core algorithm, operating system, function program and the information bank that energy program renewing device 300 and information bank updating device 500 generate
It is encrypted, after core algorithm, operating system, function program and information bank are encrypted in storage to download platform 16.
It as shown in Figure 10, is the work flow diagram in the embodiment of the present invention 1 for the update auxiliary device of intelligent robot;
It updates auxiliary device and is able to carry out following steps:
Step S101 passes through algorithm updating device 100, operating system update device 200, function program updating device 300
Core algorithm, operating system, function program and information bank are updated respectively with information bank updating device 500;
Step S102 is divided core algorithm or operating system or function program or the data of information bank by encryption device 18
Block, every block size are no more than 10KB;
Step S103, by encryption device 18, using different passwords or different cipher modes, to each block encryption;
Encrypted piecemeal is hidden in color image by step S104 by encryption device 18;
Step S105 stores the picture for being concealed with piecemeal into download platform 16;
Step S106, cloud center control platform 12 calls the picture in download platform 16, and color image is sent to intelligence
It can robot.
In intelligent robot one end, then the picture for being concealed with data is decrypted by decrypting device 5.After decryption,
Each piecemeal is merged, to extract the core algorithm for the update of being upgraded, operating system, function program and information
Library.
Into this time encrypted transmission is crossed, it is advantageous in that, can prevents the third party from intercepting core algorithm, information bank from network
Etc. important information.
Preferably, in step S104, every picture only stores the data of a piecemeal, and each block data is hidden in pair
After answering any position on picture, block data to be hidden in corresponding picture, it is further formed encryption mapping table, encryption mapping table note
Carry type, size and the stowed position of the data hidden in corresponding picture.
Algorithm updating device 100 includes that core algorithm generates system 110, custom algorithm development system 120, machine algorithm life
At system 130 and tranining database 150.Machine algorithm generates system 130 and connect with tranining database 150, and core algorithm generates
System 110 generates system 130 with custom algorithm development system 120 and machine algorithm respectively and connect.
It as shown in figure 11, is core algorithm generation method flow chart in 1 algorithm updating device of the embodiment of the present invention.Algorithm is more
Core algorithm generation method is in new equipment 100:
Step S111, machine algorithm generate system 130 and are trained and learn according to the data in tranining database 150,
Form machine algorithm;
Step S112, custom algorithm development system 120 transfer the algorithm manually compiled and edited;
Step S113, core algorithm generate system 110 and compile and edit algorithm by machine algorithm and manually and merge to form core
Algorithm.
Machine algorithm generates system 130 and is trained to mass data in tranining database 150, raw after long-time learns
At machine algorithm.The number that data, artificial receipts data, third party in tranining database 150 including web crawlers are called
According to.It researches and develops simultaneously, program the field that people from group is directed to specific, important, high preparation, be customized exploitation algorithm routine.
Core algorithm update method is advantageous in that:The core calculation for adapting to intelligent robot can be accurately and timely provided
Method.
Operating system update device 200 includes block transmission device 210, operating system testing module 220 and operating system
Development module 230.Operating system testing module 220 connects with block transmission device 210 and operating system development module 230 respectively
It connects.Block transmission device 210 is also connect with encryption device 18.
It as shown in figure 12, is operating system generation method flow chart in 1 operating system update device of the embodiment of the present invention.Behaviour
Making operating system generation method in system updating device 200 is:
Step S121, operating system development module 230 call the operating system of customized development, and are sent to operating system survey
Die trial block 220;
Step S122, operating system testing module 220 test the operating system of customized development, operating system testing
The operating system data that test passes through are sent to block transmission device 210 by module 220;
Step S123, the operating system data that block transmission device 210 passes through test carry out preliminary piecemeal.
Function program updating device 300 includes Hardware match taxis system 310, function program test macro 320 and function
Program development system 330.Function program test macro 320 is developed with Hardware match taxis system 310 and function program respectively
330 connection of system.Hardware match taxis system 310 is also connect with encryption device 18.
It as shown in figure 13, is function program generation method flow chart in 1 function program updating device of the embodiment of the present invention.Function
Function program generation method in energy program renewing device 300:
Step S131, function program development system 330 call the function program of customized development, and are sent to function program survey
Test system 320;
Step S132, function program test macro 320 test function program, and function program test macro 320 will
It tests the function program passed through and is sent to Hardware match taxis system 310;
Step S133, the hardware of function program and intelligent robot that Hardware match taxis system 310 passes through test into
Row matching and classification.
Function program generation method is advantageous in that:By Hardware match, the quick-downloading function of intelligent robot can be made
Program improves the efficiency of the downloading of function program.By function program test macro 320, the compatibility of function program is avoided
Property problem.
Information bank updating device 500 includes information bank synthesis system 510, information analysis processing system 520, information collection system
System 530 and the artificial acceptance system 550 of information bank.Information analysis processing system 520 is connect with information acquisition system 530, information bank
Synthesis system 510 is connect with the artificial acceptance system 550 of information bank and information analysis processing system 520 respectively.
It as shown in figure 14, is information library generating method flow chart in 1 information bank updating device of the embodiment of the present invention.Information bank
Information library generating method is in updating device 500:
Step S151, information acquisition system 530 acquires internet data by web crawlers, and data are transferred to information
Analysis process system 520;
Step S152, information analysis processing system 520 acquire internet data according to web crawlers and form first information library,
And first information library is sent to information bank synthesis system 510;
Step S153, information bank synthesis system 510 first information library and the artificial acceptance system 550 of information bank are included the
Two information banks mutually merge, and form new information bank.
It as shown in figure 15, is a kind of flow chart of the data encryption and transmission method provided in the embodiment of the present invention 1;The present invention
Embodiment 1 also provides a kind of data encryption and transmission method, the specific steps are that:
Step S300, encryption device 18 is blocking by data cutting, forms multiple piecemeals;
Step S301 encrypts multiple piecemeals;
Multiple encrypted piecemeals are hidden in color image by step S302;
Step S303, generates encryption mapping table in encryption device 18, and encryption mapping table records multiple encrypted piecemeals
Data type and size of data and multiple encrypted piecemeals be hidden in the position on color image;
Step S304 encrypts encryption mapping table;
Step S305, by encryption mapping table and picture transfer extremely decryption device 5;
Step S306, decryption device 5 are decrypted the encryption mapping table, are restored according to mapping relations in the encryption mapping table
The piecemeal hidden in picture;
Step S307, decryption device 5 continue individually to decrypt multiple piecemeals;
Step S308 merges piecemeal, restoring data according to the mapping relations of encryption mapping table.
It is advantageous in that:By encrypting and hiding double-security measure, avoids other people and intercept or obtain on network
The significant datas such as core algorithm data and information base data.
Preferably, the piecemeal size in step S300 is no more than 10KB.
Preferably, right using different passwords or different cipher modes when being encrypted to multiple piecemeals in step S301
Each block encryption.
Preferably, in step S302, multiple encrypted piecemeals are hidden in the different location of same picture, or different
On picture.
Preferably, in step S302, multiple encrypted piecemeals are hidden on different pictures, and every picture is only hidden
One piecemeal.
It preferably, as shown in figure 16, is encryption piecemeal hidden method flow chart in the embodiment of the present invention 1;Executing step
In S302 or step S104, multiple encrypted piecemeals, which are hidden in the method in picture, is:
Color image is converted practical bitmap data by step S310;
Step S311, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data
Number;
Step S312 replaces with last bit information of each byte of the color image bitmap data after interception point
The bit information of block number evidence;
Step S313, the color image after saving change are completed block data and are hidden.
Preferably, in step S301 or step S103, the Encryption Algorithm that multiple piecemeals are encrypted be DES algorithm or
3DES algorithm or DESX algorithm or IDEA algorithm or aes algorithm or RSA Algorithm or Diffie-Hel lman algorithm.
Embodiment 2
This embodiment differs from embodiment 1 in that being that encryption piecemeal is hidden in the embodiment of the present invention 1 as shown in figure 17
Hide method flow diagram.Preferably, in executing step S302 or step S104, multiple encrypted piecemeals are hidden in picture
Method can also be:
Color image is converted practical bitmap data by step S360;
Step S361, according to by the digit of binary block data, equivalent intercepts the byte of color image bitmap data
Number;
Step S362, individually by the n-th bit information of each byte of the color image bitmap data after interception
The bit information of block data is replaced with, N value 1-8 forms 8 new color images altogether;
Step S363 compares original color image with 8 new color images respectively;
Step S364 filters out the new color image closest to original color image;
Step S365, determines the optimal value of N, and is saved in encryption mapping table;
Step S366 saves the new color image after screening, completes block data and hides.
The foregoing is merely a prefered embodiment of the invention, is merely illustrative for the purpose of the present invention, and not restrictive.This
The structure and connection type etc. of each component may be changed in invention, it is all based on the technical solution of the present invention
The equivalents and improvement of progress, should not exclude except protection scope of the present invention.
Claims (8)
1. a kind of data encryption and transmission method, which is characterized in that it includes following steps:
Step S300, encryption device is blocking by data cutting, forms multiple piecemeals;
Step S301 encrypts multiple piecemeals;
Multiple encrypted piecemeals are hidden in color image by step S302;
Step S303, generates encryption mapping table in encryption device, and encryption mapping table records the data of multiple encrypted piecemeals
Type and size of data and multiple encrypted piecemeals are hidden in the position on color image;
Step S304 encrypts encryption mapping table;
Step S305, will encryption mapping table and picture transfer to decrypting device;
Step S306, decryption device decrypts the encryption mapping table, according to mapping relations also original picture in the encryption mapping table
In hide piecemeal;
Multiple piecemeals are individually decrypted in step S307, decryption device continuation;
Step S308 merges piecemeal, restoring data according to the mapping relations of encryption mapping table.
2. a kind of data encryption and transmission method as described in claim 1, which is characterized in that the block data in step S300 is big
It is small to be no more than 10KB.
3. a kind of data encryption and transmission method as described in claim 1, which is characterized in that in step S301, to multiple piecemeals
When being encrypted, using different passwords or different cipher modes, to each block encryption.
4. a kind of data encryption and transmission method as described in claim 1, which is characterized in that in step S302, by multiple through adding
Close piecemeal is hidden on the different location of same picture, or different pictures.
5. a kind of data encryption and transmission method as claimed in claim 4, which is characterized in that in step S302, by multiple through adding
Close piecemeal is hidden on different pictures, and every picture only hides a piecemeal.
6. a kind of data encryption and transmission method as described in claim 1, which is characterized in that in step S301, to multiple points
The Encryption Algorithm that block is encrypted is DES algorithm or 3DES algorithm or DESX algorithm or IDEA algorithm or aes algorithm or RSA Algorithm
Or Diffie-Hellman algorithm.
7. a kind of data encryption and transmission method as described in claim 1-6 is any, which is characterized in that executing step S302
In, multiple encrypted piecemeals, which are hidden in the method in picture, is:
Color image is converted practical bitmap data by step S310;
Step S311, according to by the digit of binary block data, equivalent intercepts the byte number of color image bitmap data;
Last bit information of each byte of color image bitmap data after interception is replaced with block count by step S312
According to bit information;
Step S313, the color image after saving change are completed block data and are hidden.
8. a kind of data encryption and transmission method as described in claim 1-6 is any, which is characterized in that executing step S302
In, multiple encrypted piecemeals, which are hidden in the method in picture, is:
Color image is converted practical bitmap data by step S360;
Step S361, according to by the digit of binary block data, equivalent intercepts the byte number of color image bitmap data;
Step S362 individually replaces the n-th bit information of each byte of the color image bitmap data after interception
For the bit information of block data, N value 1-8 forms 8 new color images altogether;
Step S363 compares original color image with 8 new color images respectively;
Step S364 filters out the new color image closest to original color image;
Step S365, determines the optimal value of N, and is saved in encryption mapping table;
Step S366 saves the new color image after screening, completes block data and hides.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810749259.4A CN108881276A (en) | 2018-07-10 | 2018-07-10 | Data encryption and transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810749259.4A CN108881276A (en) | 2018-07-10 | 2018-07-10 | Data encryption and transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108881276A true CN108881276A (en) | 2018-11-23 |
Family
ID=64300366
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810749259.4A Pending CN108881276A (en) | 2018-07-10 | 2018-07-10 | Data encryption and transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881276A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688289A (en) * | 2018-12-25 | 2019-04-26 | 秒针信息技术有限公司 | A kind of transmission of image encryption, image decryption method and device |
CN110099064A (en) * | 2019-05-08 | 2019-08-06 | 广州创想云科技有限公司 | A kind of document handling method based on Internet of Things, device, equipment and storage medium |
CN112134914A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Distributed secure storage strategy based on cryptography |
US10990382B2 (en) | 2018-07-05 | 2021-04-27 | Alibaba Group Holding Limited | Encryption machine upgrade, data import and request migration method, apparatus and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101267293A (en) * | 2008-04-18 | 2008-09-17 | 清华大学 | Stream media hidden communication method based on hierarchical model |
CN101577605A (en) * | 2008-05-08 | 2009-11-11 | 吴志军 | Speech LPC hiding and extraction algorithm based on filter similarity |
CN104052658A (en) * | 2014-07-05 | 2014-09-17 | 中国科学技术大学 | Privacy protection system and method based on social network |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN104484851A (en) * | 2014-12-23 | 2015-04-01 | 西华大学 | Self-adaptive high-capacity image information hiding method |
CN104993923A (en) * | 2015-07-02 | 2015-10-21 | 武汉大学 | Radar data protection method based on combination of information hiding and encryption techniques |
-
2018
- 2018-07-10 CN CN201810749259.4A patent/CN108881276A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101267293A (en) * | 2008-04-18 | 2008-09-17 | 清华大学 | Stream media hidden communication method based on hierarchical model |
CN101577605A (en) * | 2008-05-08 | 2009-11-11 | 吴志军 | Speech LPC hiding and extraction algorithm based on filter similarity |
CN104052658A (en) * | 2014-07-05 | 2014-09-17 | 中国科学技术大学 | Privacy protection system and method based on social network |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN104484851A (en) * | 2014-12-23 | 2015-04-01 | 西华大学 | Self-adaptive high-capacity image information hiding method |
CN104993923A (en) * | 2015-07-02 | 2015-10-21 | 武汉大学 | Radar data protection method based on combination of information hiding and encryption techniques |
Non-Patent Citations (2)
Title |
---|
印润远: "《信息安全导论》", 31 March 2011 * |
张仕斌 等: "《应用密码学-卓越工程师计划》", 31 January 2017 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10990382B2 (en) | 2018-07-05 | 2021-04-27 | Alibaba Group Holding Limited | Encryption machine upgrade, data import and request migration method, apparatus and device |
CN109688289A (en) * | 2018-12-25 | 2019-04-26 | 秒针信息技术有限公司 | A kind of transmission of image encryption, image decryption method and device |
CN109688289B (en) * | 2018-12-25 | 2021-05-25 | 秒针信息技术有限公司 | Image encryption transmission method, image decryption method and device |
CN110099064A (en) * | 2019-05-08 | 2019-08-06 | 广州创想云科技有限公司 | A kind of document handling method based on Internet of Things, device, equipment and storage medium |
CN110099064B (en) * | 2019-05-08 | 2021-07-09 | 广州创想云科技有限公司 | File processing method, device, equipment and storage medium based on Internet of things |
CN112134914A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Distributed secure storage strategy based on cryptography |
CN112134914B (en) * | 2020-02-10 | 2021-08-06 | 北京天德科技有限公司 | Distributed secure storage strategy based on cryptography |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881276A (en) | Data encryption and transmission method | |
CN105283852B (en) | A kind of method and system of fuzzy tracking data | |
CN108919680A (en) | Update auxiliary device for intelligent robot | |
US9217998B2 (en) | Management and development of an industrial environment | |
CN106991035A (en) | A kind of Host Supervision System based on micro services framework | |
CN105103147B (en) | With work load distributor come the method and system that track | |
US9182755B2 (en) | Automated operator interface generation in a control system | |
CN104272787B (en) | Technology for independently reverting to behavior checkpoint | |
CN107409126A (en) | System and method for protecting enterprise computing environment safety | |
US8869132B2 (en) | Method and system for executing and undoing distributed server change operations | |
CN102033897B (en) | Dynamic hyperlink for Process Control System | |
US20020174422A1 (en) | Software distribution system | |
US20120310906A1 (en) | Building Information Tracking System and Method of Use | |
CN109478057A (en) | Method and system for industrial Internet of Things | |
CN105706469A (en) | Managing machine to machine devices | |
CN105593870A (en) | Complex scoring for malware detection | |
CN1866283B (en) | System and method for implementing regular system triggering | |
CA3171582A1 (en) | Decentralized governance regulatory compliance (d-grc) controller | |
JP2008033751A (en) | Update method and update system | |
CN105930725A (en) | Signature-independent system behavior-based malware detection | |
WO1999011018A1 (en) | Distributed computing architecture | |
CN208992712U (en) | Intelligent robot | |
US11461691B2 (en) | Performance manager to autonomously evaluate replacement algorithms | |
JP6712781B2 (en) | Information processing method | |
CN111177708A (en) | PLC credibility measuring method, system and measuring device based on TCM chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181123 |