CN111049652A - Data transmission method and device, electronic equipment and computer readable storage medium - Google Patents

Data transmission method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN111049652A
CN111049652A CN201911340879.3A CN201911340879A CN111049652A CN 111049652 A CN111049652 A CN 111049652A CN 201911340879 A CN201911340879 A CN 201911340879A CN 111049652 A CN111049652 A CN 111049652A
Authority
CN
China
Prior art keywords
mounted terminal
superlattice
password
symmetric key
vehicle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911340879.3A
Other languages
Chinese (zh)
Inventor
安鹏
孙加光
王志海
喻波
王志华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201911340879.3A priority Critical patent/CN111049652A/en
Publication of CN111049652A publication Critical patent/CN111049652A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Abstract

The invention provides a data transmission method, a data transmission device, electronic equipment and a computer readable storage medium, which utilize the characteristic that superlattice devices with the same batch have the same password reconstruction characteristic, the superlattice password devices with the same version are respectively deployed at the source vehicle-mounted terminal and the target vehicle-mounted terminal, the same pseudorandom sequence and the password are utilized to reconstruct the sequence, generating a first reconstruction symmetric key stream and a second reconstruction symmetric key stream which are matched at a source vehicle-mounted terminal and a target vehicle-mounted terminal, encrypting and decrypting data to be encrypted by using the first reconstruction symmetric key stream and the second reconstruction symmetric key stream to realize data encryption and decryption transmission between vehicles, the method reduces the complexity and the time delay of the data transmission process while ensuring the data encryption and decryption transmission safety, meets the requirements of low time delay and high bandwidth required by stream data transmission, and is convenient for stream data transmission.

Description

Data transmission method and device, electronic equipment and computer readable storage medium
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a data transmission method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the development and landing application of the car networking technology, the requirement for the communication safety between car networking terminals is increasingly urgent. V2X (Vehicle to X, wireless communication technology for vehicles) is a key technology of future intelligent transportation systems, and can realize mutual communication between vehicles, between vehicles and base stations, between base stations, so as to obtain a series of traffic information such as real-time road conditions, road information, pedestrian information and the like, improve driving safety, reduce congestion, improve traffic efficiency, provide Vehicle-mounted entertainment information and the like.
However, in the current V2X (Vehicle to X) technology, link transmission encryption is based on a conventional Public Key Infrastructure (PKI) system, which has a large communication overhead and is not favorable for streaming data transmission.
Disclosure of Invention
The invention provides a data transmission method, a data transmission device, electronic equipment and a computer readable storage medium, and aims to solve the problems of high data transmission delay and low safety between vehicles in a V2X system in the prior art.
In order to solve the above problems, the present invention is realized by:
in a first aspect, an embodiment of the present invention provides a data transmission method, which is applied to a data transmission system, where the data transmission system includes a source vehicle-mounted terminal and a target vehicle-mounted terminal, and the method includes:
a source vehicle-mounted terminal generates a pseudo-random sequence and sends the pseudo-random sequence to a target vehicle-mounted terminal;
the source vehicle-mounted terminal generates a first original symmetric key stream according to a first superlattice password device deployed by the source vehicle-mounted terminal and the pseudorandom sequence;
the target vehicle-mounted terminal generates a second original symmetric key stream according to a second superlattice password device deployed by the target vehicle-mounted terminal and the pseudorandom sequence, wherein the first superlattice password device and the second superlattice password device belong to the same production batch;
a first superlattice password device deployed by the source vehicle-mounted terminal generates a password reconstruction sequence according to a first original symmetric key stream;
the source vehicle-mounted terminal carries out password reconstruction processing on the first original symmetric key stream according to the password reconstruction sequence to obtain a first reconstructed symmetric key stream, and sends the password reconstruction sequence to the target vehicle-mounted terminal;
the target vehicle-mounted terminal carries out password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
the source vehicle-mounted terminal encrypts the stream data to be sent according to the first reestablished symmetric key stream to obtain an encrypted data stream, and sends the encrypted data stream to the target vehicle-mounted terminal;
and the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
Optionally, the generating, by the source vehicle-mounted terminal, a first original symmetric key stream according to the self-deployed first superlattice cryptographic device and the pseudorandom sequence includes:
the first superlattice password device takes the pseudorandom sequence as an excitation signal to obtain an output signal;
the first superlattice cryptographic device generates a first original symmetric key stream in accordance with the output signal.
Optionally, the data transmission system further includes a superlattice cryptography device management server, and the method further includes:
the superlattice password device management server distributes target codes for a first superlattice password device deployed by the source vehicle-mounted terminal and a second superlattice password device deployed by the target vehicle-mounted terminal;
the superlattice password device management server acquires first user information and first vehicle information corresponding to the source vehicle-mounted terminal, and acquires second user information and second vehicle information corresponding to the target vehicle-mounted terminal;
and the superlattice password device management server registers the source vehicle-mounted terminal according to the target code, the first user information and the first vehicle information, and registers the target vehicle-mounted terminal according to the target code, the second user information and the second vehicle information.
Optionally, under the condition that the first superlattice password device deployed by the source vehicle-mounted terminal and/or the second superlattice password device deployed by the target vehicle-mounted terminal fail, the first superlattice password device deployed by the source vehicle-mounted terminal and the second superlattice password device deployed by the target vehicle-mounted terminal are replaced, wherein the replaced first superlattice password device and the replaced second superlattice password device belong to the same production batch.
In a second aspect, an embodiment of the present invention provides a data transmission method, which is applied to a source vehicle-mounted terminal in a data transmission system, where the data transmission system further includes a target vehicle-mounted terminal, and the method includes:
generating a pseudo-random sequence;
generating a first original symmetric key stream according to the pseudo-random sequence and a first superlattice password device deployed by the pseudo-random sequence;
sending the pseudo-random sequence to a target vehicle-mounted terminal so that the target vehicle-mounted terminal generates a second original symmetric key stream according to the pseudo-random sequence and a second superlattice password device deployed by the target vehicle-mounted terminal, wherein the first superlattice password device and the second superlattice password device belong to the same production batch;
generating a cipher reconstruction sequence according to the first original symmetric key stream and the first superlattice cipher device;
according to the password reconstruction sequence, performing password reconstruction processing on the first original symmetric key stream to obtain a first reconstructed symmetric key stream;
sending the password reconstruction sequence to the target vehicle-mounted terminal so that the target vehicle-mounted terminal performs password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
according to the first reestablished symmetric key stream, carrying out encryption processing on stream data to be sent to obtain an encrypted data stream;
and sending the encrypted data stream to the target vehicle-mounted terminal so that the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain the data stream to be sent.
In a third aspect, an embodiment of the present invention provides a data transmission method, which is applied to a target vehicle-mounted terminal in a data transmission system, where the data transmission system further includes a source vehicle-mounted terminal, and the method includes:
receiving a pseudo-random sequence sent by the source vehicle-mounted terminal;
generating a second original symmetric key stream according to a second superlattice password device deployed by the device and the pseudorandom sequence, wherein the first superlattice password device and the superlattice password device deployed by the source vehicle-mounted terminal belong to the same production batch;
receiving a password reconstruction sequence sent by the source vehicle-mounted terminal;
according to the password reconstruction sequence, performing password reconstruction processing on the second original symmetric key stream to obtain a second reconstructed symmetric key stream;
receiving an encrypted data stream sent by the source vehicle-mounted terminal;
and decrypting the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
In a fourth aspect, an embodiment of the present invention provides a data transmission device, which is applied to a source vehicle-mounted terminal, and the device includes:
a first generating module for generating a pseudo-random sequence;
the second generation module is used for generating a first original symmetric key stream according to the pseudo-random sequence and a first superlattice password device deployed by the second generation module;
the first sending module is used for sending the pseudo-random sequence to a target vehicle-mounted terminal so that the target vehicle-mounted terminal generates a second original symmetric key stream according to the pseudo-random sequence and a second superlattice password device deployed by the target vehicle-mounted terminal, wherein the first superlattice password device and the second superlattice password device belong to the same production batch;
a third generation module, configured to generate a cipher reconstruction sequence according to the first original symmetric key stream and the first superlattice cipher device;
the first reconstruction module is used for carrying out password reconstruction processing on the first original symmetric key stream according to the password reconstruction sequence to obtain a first reconstructed symmetric key stream;
the second sending module is used for sending the password reconstruction sequence to the target vehicle-mounted terminal so that the target vehicle-mounted terminal performs password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
the encryption module is used for encrypting the stream data to be sent according to the first reconstructed symmetric key stream to obtain an encrypted data stream;
and the third sending module is used for sending the encrypted data stream to the target vehicle-mounted terminal so that the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain the stream data to be sent.
In a fifth aspect, an embodiment of the present invention provides a data transmission device, which is applied to a target vehicle-mounted terminal, and the device includes:
the first receiving module is used for receiving the pseudorandom sequence sent by the source vehicle-mounted terminal;
the fourth generation module is used for generating a second original symmetric key stream according to a second superlattice password device deployed by the fourth generation module and the pseudorandom sequence, wherein the first superlattice password device and the superlattice password device deployed by the source vehicle-mounted terminal belong to the same production batch;
the second receiving module is used for receiving the password reconstruction sequence sent by the source vehicle-mounted terminal;
a second reconstruction module, configured to perform cipher reconstruction processing on the second original symmetric key stream according to the cipher reconstruction sequence to obtain a second reconstructed symmetric key stream;
the third receiving module is used for receiving the encrypted data stream sent by the source vehicle-mounted terminal;
and the decryption module is used for decrypting the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
In a sixth aspect, an embodiment of the present invention provides an electronic device, including: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the data transmission method of any of the above.
In a seventh aspect, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when being executed by a processor, the computer program implements the steps of the data transmission method described in any one of the above.
Compared with the prior art, the invention has the following advantages:
the method utilizes the characteristic that superlattice devices with the same batch have the same password reconstruction characteristic, the superlattice password devices with the same version are respectively deployed at a source vehicle-mounted terminal and a target vehicle-mounted terminal, a first reconstruction symmetric key stream and a second reconstruction symmetric key stream which are matched are generated at the source vehicle-mounted terminal and the target vehicle-mounted terminal by utilizing the same pseudorandom sequence and the password reconstruction sequence, and the data to be encrypted are encrypted and decrypted by utilizing the first reconstruction symmetric key stream and the second reconstruction symmetric key stream, so that the data encryption and decryption transmission between vehicles is realized, compared with the data encryption and decryption transmission process between vehicles realized based on the traditional PKI system, the method can avoid using a complex key distribution protocol while ensuring the security of the data encryption and decryption transmission, save the communication overhead of the protocol, and reduce the complexity and time delay of the data transmission process, the requirements of low time delay and high bandwidth required by stream data transmission are met, and the stream data transmission is facilitated.
Drawings
FIG. 1 is a schematic diagram of an implementation environment provided by embodiments of the invention;
fig. 2 is a flowchart illustrating a data transmission method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating a process for replacing a superlattice password device according to an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating a data transmission principle provided by an embodiment of the present invention;
fig. 5 is a flowchart illustrating a data transmission method according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating a data transmission method according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a data transmission apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
FIG. 1 is a schematic diagram of an implementation environment shown in an embodiment of the present application. In fig. 1, a vehicle a is equipped with an active vehicle-mounted terminal, and a vehicle B is equipped with a target vehicle-mounted terminal, in practice, the active vehicle-mounted terminal may perform streaming data transmission with the target vehicle-mounted terminal, so as to realize interaction between the vehicle a and the vehicle B, for example, the vehicle a shares a position, shares a video, and the like with the vehicle B, where the position data and the video are both streaming data.
The application provides a V2X link data transmission method based on a superlattice technology, which utilizes the twinborn characteristic of a superlattice device, provides a superlattice key distribution technology, avoids using a complex key distribution protocol, saves the communication overhead of a safety protocol, realizes the encryption and decryption of high-speed link data, can be applied to vehicle-mounted terminal equipment, and ensures the safety of stream data transmission between two vehicle-mounted terminals.
The present application first provides a data transmission method, as shown in fig. 2. Fig. 2 is a flowchart illustrating a data transmission method according to an embodiment of the present application. Referring to fig. 2, the data transmission method of the present application is applied to a data transmission system, where the data transmission system includes a source vehicle-mounted terminal and a target vehicle-mounted terminal, and the method specifically includes the following steps:
step S11, the source vehicle-mounted terminal generates a pseudo-random sequence and sends the pseudo-random sequence to the target vehicle-mounted terminal.
In this embodiment, the source vehicle-mounted terminal and the target vehicle-mounted terminal include various common smart devices such as a PC, a smart phone, and a tablet computer applied to an automobile. The source vehicle-mounted terminal and the target vehicle-mounted terminal are opposite, the vehicle-mounted terminal which actively sends data is the source vehicle-mounted terminal, the terminal which passively receives data is the target vehicle-mounted terminal, and with reference to fig. 1, it is assumed that a vehicle a needs to send data to a vehicle B, namely, the vehicle-mounted terminal installed on the vehicle a needs to send data to the vehicle-mounted terminal installed on the vehicle B, at this moment, the terminal on the vehicle a first sends data to the vehicle-mounted terminal installed on the vehicle B, at this moment, the vehicle-mounted terminal installed on the vehicle a is the source vehicle-mounted terminal, and the vehicle-mounted terminal installed on the vehicle B is.
The vehicle-mounted terminal is provided with a superlattice password device. The superlattice password is a password mechanism based on intrinsic safety factors of hardware of a semiconductor superlattice, and belongs to the field of information safety research of deep fusion of cryptography and microelectronics. Semiconductor superlattices are formed by alternating growth of complex material growth techniques, forming a very complex random process due to quantum well effects. Therefore, the data encryption and decryption transmission between vehicles by using the superlattice password device has high safety.
In this embodiment, when the source vehicle-mounted terminal needs to send data to the target vehicle-mounted terminal, the source vehicle-mounted terminal first generates a pseudorandom sequence, and sends the generated pseudorandom sequence to the target vehicle-mounted terminal through a public letter.
In this embodiment, stream data may be transmitted between the source vehicle-mounted terminal and the target vehicle-mounted terminal, and when the stream data is transmitted between the source vehicle-mounted terminal and the target vehicle-mounted terminal, the source vehicle-mounted terminal may continuously generate the pseudorandom sequence and continuously send the generated pseudorandom sequence to the target vehicle-mounted terminal until the data transmission is completed.
And step S12, the source vehicle-mounted terminal generates a first original symmetric key stream according to the first superlattice password device deployed by the source vehicle-mounted terminal and the pseudorandom sequence.
And step S13, the target vehicle-mounted terminal generates a second original symmetric key stream according to a second superlattice password device deployed by the target vehicle-mounted terminal and the pseudorandom sequence.
The first superlattice password device and the second superlattice password device belong to the same production batch.
In this embodiment, the source vehicle-mounted terminal is equipped with a first superlattice password device, the target vehicle-mounted terminal is equipped with a second superlattice password device, and the first superlattice password device and the second superlattice password device belong to the same batch, that is, belong to the same version. The same version of the superlattice password device has the same password reconstruction characteristics (i.e., the output values are the same when the same excitation signal is input, and the positions where errors occur are also the same). Therefore, in order to ensure that the target vehicle-mounted terminal can decrypt the encrypted data stream generated by the source vehicle-mounted terminal, the target vehicle-mounted terminal needs to be pre-installed with a superlattice password device with the same version as that of the source vehicle-mounted terminal.
In one embodiment, step S12 may specifically include the following steps:
and step S121, the first superlattice password device takes the pseudorandom sequence as an excitation signal to obtain an output signal.
Step S122, the first superlattice password device generates a first original symmetric key stream according to the output signal.
In this embodiment, a first superlattice password device installed on a source vehicle-mounted terminal uses a pseudo-random sequence as a generation excitation signal of a stream password, that is, the pseudo-random sequence is input into the first superlattice password device, an output signal is obtained first, and the first superlattice password device processes the output signal to generate a first original symmetric key stream, where the first symmetric key stream is in a character string format.
Similarly, after receiving the pseudo-random sequence continuously sent by the source vehicle-mounted terminal, the target vehicle-mounted terminal also generates a second original symmetric key stream according to the second superlattice cipher device and the pseudo-random sequence, and the method for generating the second original symmetric key stream is similar to the method for generating the first original symmetric key stream, and is not repeated here.
And step S14, the first superlattice password device deployed by the source vehicle-mounted terminal generates a password reconstruction sequence according to the first original symmetric key stream.
In this embodiment, due to the characteristics of the superlattice password device, the first superlattice password device may have a part of the excitation signal that is in error or invalid in the process of generating the first original symmetric key stream by using the pseudorandom sequence as the excitation signal, so that the generated first original symmetric key stream may have an error or invalid position, and after the first superlattice password device generates the first original symmetric key stream, the first superlattice password device may verify the error or invalid position of the excitation signal in the first original symmetric key stream, so as to generate a password reconstruction sequence, where the password reconstruction sequence records a specific position of an invalid character in the first original symmetric key stream. For example, the cipher reconstruction sequence is 1569 (the cipher reconstruction sequence may have other types of formats, and is only an example here), and the characters of the 1 st, 5 th, 6 th, and 9 th bits in the first original symmetric key stream are invalid characters according to the cipher reconstruction sequence.
In this embodiment, the superlattice password devices of the source vehicle-mounted terminal and the target vehicle-mounted terminal may both generate the password reconstruction sequence, and the generated password reconstruction sequences are the same because of the superlattice password devices in the same batch, but in order to increase the speed of the target vehicle-mounted terminal generating the second reconstructed symmetric key stream, the source vehicle-mounted terminal may directly send the password reconstruction sequence obtained through self-verification to the target vehicle-mounted terminal, so that the target vehicle-mounted terminal does not need to generate the password reconstruction sequence through self-verification.
And step S15, the source vehicle-mounted terminal carries out password reconstruction processing on the first original symmetric key stream according to the password reconstruction sequence to obtain a first reconstructed symmetric key stream, and sends the password reconstruction sequence to the target vehicle-mounted terminal.
And step S16, the target vehicle-mounted terminal carries out password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream.
In this embodiment, since an error or invalid character in the first original symmetric key stream may cause uncertainty in the first original symmetric key stream, and an error or invalid character in the second original symmetric key stream may cause uncertainty in the second original symmetric key stream, so that the symmetric key stream generated by the source vehicle-mounted terminal is different from the symmetric key stream generated by the target vehicle-mounted terminal, in order to ensure that the first reconstructed symmetric key stream is the same as the second reconstructed symmetric key stream, and further ensure that the target vehicle-mounted terminal can successfully decrypt the encrypted data stream sent by the source vehicle-mounted terminal, the source vehicle-mounted terminal needs to perform the password reconstruction processing using the first original symmetric key stream of the password reconstruction sequence, that is, to remove the invalid character or the error character in the first original symmetric key stream to obtain the first reconstructed symmetric key stream, and the target vehicle-mounted terminal needs to perform the password reconstruction processing using the second original symmetric key stream of the password reconstruction sequence, i.e., invalid characters or erroneous characters in the second original symmetric key stream are removed to obtain a second reconstructed symmetric key stream.
And step S17, the source vehicle-mounted terminal encrypts the stream data to be sent according to the first reconstructed symmetric key stream to obtain an encrypted data stream, and sends the encrypted data stream to the target vehicle-mounted terminal.
In this embodiment, after the source vehicle-mounted terminal obtains the first reconstructed symmetric key stream, the source vehicle-mounted terminal may encrypt the stream data to be sent by using the first reconstructed symmetric key stream, so as to obtain encrypted stream data.
And step S18, the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
In this embodiment, after the target vehicle-mounted terminal receives the encrypted data stream sent by the source vehicle-mounted terminal, the encrypted data stream may be decrypted by using the second reconstructed symmetric key stream, so as to obtain data to be sent.
In this embodiment, the process of encrypting the data to be sent by using the first reconstructed symmetric key stream to obtain the encrypted stream data may specifically be an exclusive-or process, for example, assuming that the first reconstructed symmetric key stream is a and the data to be encrypted is B, the exclusive-or operation is performed on a and B to obtain the encrypted data stream C.
Similarly, the process of decrypting the encrypted data stream by using the second reconstructed symmetric key stream to obtain the data to be transmitted may also be an exclusive-or process, and still taking the above as an example, assuming that the first reconstructed symmetric key stream is a and the encrypted data stream is C, the exclusive-or operation is performed on a and C to obtain the data B to be encrypted.
The method utilizes the characteristic that superlattice devices with the same batch have the same password reconstruction characteristic, the superlattice password devices with the same version are respectively deployed at a source vehicle-mounted terminal and a target vehicle-mounted terminal, a first reconstruction symmetric key stream and a second reconstruction symmetric key stream which are matched are generated at the source vehicle-mounted terminal and the target vehicle-mounted terminal by utilizing the same pseudorandom sequence and the password reconstruction sequence, and the data to be encrypted are encrypted and decrypted by utilizing the first reconstruction symmetric key stream and the second reconstruction symmetric key stream, so that the data encryption and decryption transmission between vehicles is realized, compared with the data encryption and decryption transmission process between vehicles realized based on the traditional PKI system, the method can avoid using a complex key distribution protocol while ensuring the security of the data encryption and decryption transmission, save the communication overhead of the protocol, and reduce the complexity and time delay of the data transmission process, the requirements of low time delay and high bandwidth required by stream data transmission are met, and the stream data transmission is facilitated.
Of course, it should be understood that the data transmission method provided by the embodiment of the present application is not limited to encryption and decryption transmission of stream data, but is also applicable to encryption and decryption transmission of data packets.
In one embodiment, in consideration of the characteristics of the superlattice password devices, the superlattice password devices in the same batch have the same password reconstruction characteristics, and therefore, if a device or equipment is damaged, the devices in the same batch need to be updated uniformly, and therefore, in order to ensure that the data transmission system is normal, the data transmission system further includes a superlattice password device management server, and the data transmission method of the present application may further include the following steps:
step S21, the management server of the superlattice password device distributes target codes for a first superlattice password device deployed by the source vehicle-mounted terminal and a second superlattice password device deployed by the target vehicle-mounted terminal;
step S22, the management server of the superlattice password device acquires first user information and first vehicle information corresponding to the source vehicle-mounted terminal, and acquires second user information and second vehicle information corresponding to the target vehicle-mounted terminal;
step S23, the superlattice password device management server registers the source vehicle-mounted terminal according to the target code, the first user information, and the first vehicle information, and registers the target vehicle-mounted terminal according to the target code, the second user information, and the second vehicle information.
In this embodiment, in order to facilitate maintenance and management of vehicles equipped with superlattice password devices, all vehicles equipped with superlattice password devices need to be registered in the superlattice password device management server. During registration, the superlattice password device management server allocates a target code for a first superlattice password device deployed by a source vehicle-mounted terminal in advance according to the batch of the superlattice password devices, and allocates a target code for a second superlattice password device deployed by a target vehicle-mounted terminal, the target codes of the superlattice password devices in the same batch are the same, for example, the target code of the first superlattice password device is 5, and the target code of the second superlattice password device is also 5, namely, the first superlattice password device and the second superlattice password device are represented as 5 batches; then, first user information and first vehicle information corresponding to the source vehicle-mounted terminal and second user information and second vehicle information corresponding to the target vehicle-mounted terminal are obtained; and finally, establishing an association relation among the target code, the first user information and the first vehicle information and storing the association relation in a superlattice password device management server, namely, completing the registration of the source vehicle-mounted terminal, and establishing an association relation among the target code, the second user information and the second vehicle information and storing the association relation in the superlattice password device management server, namely, completing the registration of the target vehicle-mounted terminal.
In this embodiment, the vehicle-mounted terminal is registered, so that the superlattice password devices in the same batch can be managed conveniently, and the security of the data transmission method is improved.
In one embodiment, the superlattice password device has not only the target code but also an identity code, for example, the identity code of the first superlattice password device is a, the identity code of the first superlattice password device is b, and the identity codes are used for distinguishing different superlattice password devices in the same batch.
In one embodiment, the superlattice password device in the same batch has the same password reconstruction characteristics in consideration of the replacement of the superlattice password device, so that if the superlattice password device is damaged, the devices in the same batch need to be replaced uniformly, and therefore, after the step S23, the following steps can be further included:
step S14, in a case where the first superlattice password device deployed by the source vehicle-mounted terminal itself and/or the second superlattice password device deployed by the target vehicle-mounted terminal itself are/is invalid, replacing the first superlattice password device deployed by the source vehicle-mounted terminal itself and the second superlattice password device deployed by the target vehicle-mounted terminal itself, where the replaced first superlattice password device and the replaced second superlattice password device belong to the same production batch.
In this embodiment, the failure of the superlattice password device means that the superlattice password device is damaged or lost, for example, a vehicle on which the superlattice password device is mounted is lost, and for the security of the whole data transmission system, the superlattice password device needs to be replaced for vehicles on which the superlattice password devices of the same batch are mounted.
With reference to the foregoing embodiments, as shown in fig. 3, fig. 3 is a schematic diagram illustrating a replacement process of a superlattice password device according to an embodiment of the present application.
As shown in fig. 3, the superlattice crypto devices in all production batches need to be uniformly encoded and registered by the superlattice crypto device management server, and the superlattice crypto device management server is provided with records to facilitate tracing in the hardware maintenance process. When a superlattice password device is installed on a vehicle, personal user information, vehicle information and target coding information of a device batch need to be registered in a superlattice password device management server, only the superlattice password device used after registration can be replaced, and personal private replacement of the device is not allowed, if the vehicle or the superlattice password device is lost, the superlattice password device management server needs to destroy the superlattice password device in the same batch, and simultaneously informs a vehicle user of using the new superlattice password device.
Fig. 4 is a schematic diagram illustrating a data transmission principle according to an embodiment of the present application. The data transmission method of the present application will be described in its entirety with reference to fig. 4:
the vehicle A and the vehicle B are provided with the same version of superlattice password devices. When the vehicle a needs to transmit the streaming data to the vehicle B, the vehicle a may stream-encrypt the communication link data and transmit the encrypted stream of data to the vehicle B. The specific process is as follows:
1. the vehicle A generates a pseudo-random sequence R as a generated excitation signal of the stream cipher, the excitation signal is sent to a superlattice cipher device of the vehicle A, and meanwhile the pseudo-random sequence R is sent to the vehicle B through a public channel.
2. Vehicle B uses the received pseudorandom sequence R as an excitation signal for the symmetric key stream.
3. The superlattice cryptographic device in vehicle a may generate a cryptographic reconstruction sequence H during the process of producing the symmetric key stream, where the cryptographic reconstruction sequence H identifies invalid data locations in the symmetric key stream, and the data needs to be sent to vehicle B via a public channel.
4. Vehicle a performs cryptographic reconstruction using the keystream generated by the superlattice cryptographic device to generate a symmetric keystream K that may be used for data link encryption.
5. And after receiving the password reconstruction sequence H, the vehicle B reconstructs the symmetric key stream generated by the vehicle to generate a symmetric key stream K matched with the vehicle A.
6. The vehicle a encrypts the link data X (stream data) using the symmetric key stream K, while transmitting the encrypted link data Y (encrypted data stream) to the vehicle B.
7. And after receiving the link encrypted data Y sent by the vehicle A, the vehicle B decrypts the encrypted data by using the symmetric key stream K reconstructed by the vehicle B.
8. The vehicle B acquires the decrypted link data X.
The present application further provides a data transmission method, as shown in fig. 5. Fig. 5 is a flowchart of a data transmission method according to an embodiment of the present application, and is applied to the source vehicle-mounted terminal in fig. 1. Referring to fig. 5, the data transmission method of the present application may include the steps of:
in step S31, a pseudo random sequence is generated.
And step S32, generating a first original symmetric key stream according to the pseudo-random sequence and the self-deployed first superlattice password device.
Step S33, the pseudo-random sequence is sent to a target vehicle-mounted terminal, so that the target vehicle-mounted terminal generates a second original symmetric key stream according to the pseudo-random sequence and a second superlattice password device deployed by the target vehicle-mounted terminal, wherein the first superlattice password device and the second superlattice password device belong to the same production batch.
Step S34, generating a cipher reconstruction sequence according to the first original symmetric key stream and the first superlattice cipher device.
Step S35, according to the cipher rebuilding sequence, performing cipher rebuilding processing on the first original symmetric key stream to obtain a first rebuilt symmetric key stream.
And step S36, sending the password reconstruction sequence to the target vehicle-mounted terminal, so that the target vehicle-mounted terminal performs password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream.
And step S37, according to the first reconstructed symmetric key stream, encrypting the stream data to be sent to obtain an encrypted data stream.
Step S38, sending the encrypted data stream to the target vehicle-mounted terminal, so that the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream, and obtains the to-be-sent stream data.
For the above description of steps S31-S38, reference is made to the above description, which is not repeated herein.
The present application further provides a data transmission method, as shown in fig. 6. Fig. 6 is a flowchart of a data transmission method according to an embodiment of the present application, and is applied to the target vehicle-mounted terminal in fig. 1. Referring to fig. 6, the data transmission method of the present application may include the steps of:
and step S41, receiving the pseudo-random sequence sent by the source vehicle-mounted terminal.
And step S42, generating a second original symmetric key stream according to a second superlattice password device deployed by the device and the pseudorandom sequence, wherein the first superlattice password device and the superlattice password device deployed by the source vehicle-mounted terminal belong to the same production batch.
And step S43, receiving the password reconstruction sequence sent by the source vehicle-mounted terminal.
And step S44, according to the password reconstruction sequence, performing password reconstruction processing on the second original symmetric key stream to obtain a second reconstructed symmetric key stream.
And step S45, receiving the encrypted data stream sent by the source vehicle-mounted terminal.
Step S46, performing decryption processing on the encrypted data stream according to the second reconstructed symmetric key stream, to obtain stream data to be sent.
For the above description of steps S41-S46, reference is made to the above description, which is not repeated herein.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Based on the same technical concept, please refer to fig. 7, fig. 7 shows a block diagram of a data transmission apparatus 700 according to an embodiment of the present invention, the data transmission apparatus is applied to a source vehicle-mounted terminal, as shown in fig. 7, the data transmission apparatus of the present application includes:
a first generating module 701, configured to generate a pseudo-random sequence;
a second generating module 702, configured to generate a first original symmetric key stream according to the pseudorandom sequence and a first superlattice cryptographic device deployed by itself;
a first sending module 703, configured to send the pseudorandom sequence to a target vehicle-mounted terminal, so that the target vehicle-mounted terminal generates a second original symmetric key stream according to the pseudorandom sequence and a second superlattice cryptographic device deployed by the target vehicle-mounted terminal, where the first superlattice cryptographic device and the second superlattice cryptographic device belong to the same production batch;
a third generating module 704, configured to generate a cryptographic reconstruction sequence according to the first original symmetric key stream and the first superlattice cryptographic device;
a first reconstructing module 705, configured to perform cipher reconstruction processing on the first original symmetric key stream according to the cipher reconstruction sequence to obtain a first reconstructed symmetric key stream;
a second sending module 706, configured to send the password reconstruction sequence to the target vehicle-mounted terminal, so that the target vehicle-mounted terminal performs password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
an encryption module 707, configured to encrypt, according to the first reconstructed symmetric key stream, stream data to be sent to obtain an encrypted data stream;
a third sending module 708, configured to send the encrypted data stream to the target vehicle-mounted terminal, so that the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream, to obtain the to-be-sent stream data.
Based on the same technical concept, please refer to fig. 8, fig. 8 shows a block diagram of a data transmission apparatus 800 according to an embodiment of the present invention, which is applied to a target vehicle-mounted terminal, as shown in fig. 8, the data transmission apparatus of the present application includes:
a first receiving module 801, configured to receive a pseudorandom sequence sent by the source vehicle-mounted terminal;
a fourth generating module 802, configured to generate a second original symmetric key stream according to a second superlattice cryptographic device deployed by the fourth generating module and the pseudorandom sequence, where the first superlattice cryptographic device and the superlattice cryptographic device deployed by the source vehicle-mounted terminal belong to the same production batch;
a second receiving module 803, configured to receive a password reconstruction sequence sent by the source vehicle-mounted terminal;
the second reconstruction modeling block 804 is configured to perform cipher reconstruction processing on the second original symmetric key stream according to the cipher reconstruction sequence to obtain a second reconstructed symmetric key stream;
a third receiving module 805, configured to receive an encrypted data stream sent by the source vehicle-mounted terminal;
a decryption module 806, configured to decrypt the encrypted data stream according to the second reconstructed symmetric key stream to obtain data to be sent.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
An embodiment of the present invention further provides an electronic device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, where the computer program, when executed by the processor, implements each process of the data transmission method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the data transmission method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Various implementation modes of the embodiments in the present specification are described in a progressive manner, each implementation mode focuses on differences from other implementation modes, and the same and similar parts among the implementation modes can be referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, apparatus or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus, electronic devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing electronic device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing electronic device, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing electronic devices to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing electronic device to cause a series of operational steps to be performed on the computer or other programmable electronic device to produce a computer implemented process such that the instructions which execute on the computer or other programmable electronic device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or electronic device that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or electronic device. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or electronic device that comprises the element.
The data transmission method, the data transmission device, the electronic device and the computer-readable storage medium provided by the present invention are described in detail, and a specific example is applied in the text to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A data transmission method is applied to a data transmission system, wherein the data transmission system comprises a source vehicle-mounted terminal and a target vehicle-mounted terminal, and the method comprises the following steps:
a source vehicle-mounted terminal generates a pseudo-random sequence and sends the pseudo-random sequence to a target vehicle-mounted terminal;
the source vehicle-mounted terminal generates a first original symmetric key stream according to a first superlattice password device deployed by the source vehicle-mounted terminal and the pseudorandom sequence;
the target vehicle-mounted terminal generates a second original symmetric key stream according to a second superlattice password device deployed by the target vehicle-mounted terminal and the pseudorandom sequence, wherein the first superlattice password device and the second superlattice password device belong to the same production batch;
a first superlattice password device deployed by the source vehicle-mounted terminal generates a password reconstruction sequence according to a first original symmetric key stream;
the source vehicle-mounted terminal carries out password reconstruction processing on the first original symmetric key stream according to the password reconstruction sequence to obtain a first reconstructed symmetric key stream, and sends the password reconstruction sequence to the target vehicle-mounted terminal;
the target vehicle-mounted terminal carries out password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
the source vehicle-mounted terminal encrypts the stream data to be sent according to the first reestablished symmetric key stream to obtain an encrypted data stream, and sends the encrypted data stream to the target vehicle-mounted terminal;
and the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
2. The method according to claim 1, wherein the source vehicle-mounted terminal generates a first original symmetric key stream according to the self-deployed first superlattice cryptographic device and the pseudo-random sequence, and comprises:
the first superlattice password device takes the pseudorandom sequence as an excitation signal to obtain an output signal;
the first superlattice cryptographic device generates a first original symmetric key stream in accordance with the output signal.
3. The method of claim 1, wherein the data transmission system further comprises a superlattice cryptographic device management server, the method further comprising:
the superlattice password device management server distributes target codes for a first superlattice password device deployed by the source vehicle-mounted terminal and a second superlattice password device deployed by the target vehicle-mounted terminal;
the superlattice password device management server acquires first user information and first vehicle information corresponding to the source vehicle-mounted terminal, and acquires second user information and second vehicle information corresponding to the target vehicle-mounted terminal;
and the superlattice password device management server registers the source vehicle-mounted terminal according to the target code, the first user information and the first vehicle information, and registers the target vehicle-mounted terminal according to the target code, the second user information and the second vehicle information.
4. The method of claim 3, further comprising:
and under the condition that the first superlattice password device deployed by the source vehicle-mounted terminal and/or the second superlattice password device deployed by the target vehicle-mounted terminal fail, replacing the first superlattice password device deployed by the source vehicle-mounted terminal and the second superlattice password device deployed by the target vehicle-mounted terminal, wherein the replaced first superlattice password device and the replaced second superlattice password device belong to the same production batch.
5. A data transmission method is applied to a source vehicle-mounted terminal in a data transmission system, the data transmission system further comprises a target vehicle-mounted terminal, and the method comprises the following steps:
generating a pseudo-random sequence;
generating a first original symmetric key stream according to the pseudo-random sequence and a first superlattice password device deployed by the pseudo-random sequence;
sending the pseudo-random sequence to a target vehicle-mounted terminal so that the target vehicle-mounted terminal generates a second original symmetric key stream according to the pseudo-random sequence and a second superlattice password device deployed by the target vehicle-mounted terminal, wherein the first superlattice password device and the second superlattice password device belong to the same production batch;
generating a cipher reconstruction sequence according to the first original symmetric key stream and the first superlattice cipher device;
according to the password reconstruction sequence, performing password reconstruction processing on the first original symmetric key stream to obtain a first reconstructed symmetric key stream;
sending the password reconstruction sequence to the target vehicle-mounted terminal so that the target vehicle-mounted terminal performs password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
according to the first reestablished symmetric key stream, carrying out encryption processing on stream data to be sent to obtain an encrypted data stream;
and sending the encrypted data stream to the target vehicle-mounted terminal so that the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain the data stream to be sent.
6. A data transmission method is applied to a target vehicle-mounted terminal in a data transmission system, the data transmission system further comprises a source vehicle-mounted terminal, and the method comprises the following steps:
receiving a pseudo-random sequence sent by the source vehicle-mounted terminal;
generating a second original symmetric key stream according to a second superlattice password device deployed by the device and the pseudorandom sequence, wherein the first superlattice password device and the superlattice password device deployed by the source vehicle-mounted terminal belong to the same production batch;
receiving a password reconstruction sequence sent by the source vehicle-mounted terminal;
according to the password reconstruction sequence, performing password reconstruction processing on the second original symmetric key stream to obtain a second reconstructed symmetric key stream;
receiving an encrypted data stream sent by the source vehicle-mounted terminal;
and decrypting the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
7. A data transmission apparatus, applied to a source vehicle-mounted terminal, the apparatus comprising:
a first generating module for generating a pseudo-random sequence;
the second generation module is used for generating a first original symmetric key stream according to the pseudo-random sequence and a first superlattice password device deployed by the second generation module;
the first sending module is used for sending the pseudo-random sequence to a target vehicle-mounted terminal so that the target vehicle-mounted terminal generates a second original symmetric key stream according to the pseudo-random sequence and a second superlattice password device deployed by the target vehicle-mounted terminal, wherein the first superlattice password device and the second superlattice password device belong to the same production batch;
a third generation module, configured to generate a cipher reconstruction sequence according to the first original symmetric key stream and the first superlattice cipher device;
the first reconstruction module is used for carrying out password reconstruction processing on the first original symmetric key stream according to the password reconstruction sequence to obtain a first reconstructed symmetric key stream;
the second sending module is used for sending the password reconstruction sequence to the target vehicle-mounted terminal so that the target vehicle-mounted terminal performs password reconstruction processing on the second original symmetric key stream according to the password reconstruction sequence to obtain a second reconstructed symmetric key stream;
the encryption module is used for encrypting the stream data to be sent according to the first reconstructed symmetric key stream to obtain an encrypted data stream;
and the third sending module is used for sending the encrypted data stream to the target vehicle-mounted terminal so that the target vehicle-mounted terminal decrypts the encrypted data stream according to the second reconstructed symmetric key stream to obtain the stream data to be sent.
8. A data transmission device is characterized by being applied to a target vehicle-mounted terminal, and comprising:
the first receiving module is used for receiving the pseudorandom sequence sent by the source vehicle-mounted terminal;
the fourth generation module is used for generating a second original symmetric key stream according to a second superlattice password device deployed by the fourth generation module and the pseudorandom sequence, wherein the first superlattice password device and the superlattice password device deployed by the source vehicle-mounted terminal belong to the same production batch;
the second receiving module is used for receiving the password reconstruction sequence sent by the source vehicle-mounted terminal;
a second reconstruction module, configured to perform cipher reconstruction processing on the second original symmetric key stream according to the cipher reconstruction sequence to obtain a second reconstructed symmetric key stream;
the third receiving module is used for receiving the encrypted data stream sent by the source vehicle-mounted terminal;
and the decryption module is used for decrypting the encrypted data stream according to the second reconstructed symmetric key stream to obtain stream data to be sent.
9. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when being executed by the processor, carries out the steps of the data transmission method according to one of claims 1 to 6.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the data transmission method according to one of claims 1 to 6.
CN201911340879.3A 2019-12-23 2019-12-23 Data transmission method and device, electronic equipment and computer readable storage medium Pending CN111049652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911340879.3A CN111049652A (en) 2019-12-23 2019-12-23 Data transmission method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911340879.3A CN111049652A (en) 2019-12-23 2019-12-23 Data transmission method and device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111049652A true CN111049652A (en) 2020-04-21

Family

ID=70237415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911340879.3A Pending CN111049652A (en) 2019-12-23 2019-12-23 Data transmission method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111049652A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311763A (en) * 2022-06-24 2022-11-08 北京电子科技学院 Identity recognition method and system
CN116756729A (en) * 2023-08-22 2023-09-15 中电科网络安全科技股份有限公司 Method, device, equipment and medium for providing secure messaging service

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8515058B1 (en) * 2009-11-10 2013-08-20 The Board Of Trustees Of The Leland Stanford Junior University Bootstrappable homomorphic encryption method, computer program and apparatus
CN105007159A (en) * 2015-07-24 2015-10-28 苏州矗联电子技术有限公司 Secret key distribution device based on chaotic synchronization
CN106453410A (en) * 2016-11-28 2017-02-22 上海摩软通讯技术有限公司 Data transmission method and data transmission apparatus
CN109361512A (en) * 2018-10-11 2019-02-19 深圳市捷恩斯威科技有限公司 Data transmission method
CN110519036A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 The application method of data encryption and transmission method, terminal device and superlattices chaos device
CN110519210A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 Cryptographic key distribution method and terminal device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8515058B1 (en) * 2009-11-10 2013-08-20 The Board Of Trustees Of The Leland Stanford Junior University Bootstrappable homomorphic encryption method, computer program and apparatus
CN105007159A (en) * 2015-07-24 2015-10-28 苏州矗联电子技术有限公司 Secret key distribution device based on chaotic synchronization
CN106453410A (en) * 2016-11-28 2017-02-22 上海摩软通讯技术有限公司 Data transmission method and data transmission apparatus
CN110519036A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 The application method of data encryption and transmission method, terminal device and superlattices chaos device
CN110519210A (en) * 2018-05-22 2019-11-29 中国科学院苏州纳米技术与纳米仿生研究所 Cryptographic key distribution method and terminal device
CN109361512A (en) * 2018-10-11 2019-02-19 深圳市捷恩斯威科技有限公司 Data transmission method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WEI LIU ET-AL: "A secret key distribution technique based on semiconductor superlattice chaos devices", 《SCIENCE BULLETIN》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115311763A (en) * 2022-06-24 2022-11-08 北京电子科技学院 Identity recognition method and system
CN116756729A (en) * 2023-08-22 2023-09-15 中电科网络安全科技股份有限公司 Method, device, equipment and medium for providing secure messaging service

Similar Documents

Publication Publication Date Title
KR101936080B1 (en) Ksi-based authentication and communication method for secure smart home environment and system therefor
CN113572767B (en) System and method for encrypting vehicle data service exchanges
WO2019079770A1 (en) Cryptographic methods and systems for managing digital certificates
CA2377292C (en) System and method for providing secure communications between wireless units using a common key
Kumar et al. Binary hash tree based certificate access management for connected vehicles
CN108781164B (en) Communication network system, vehicle, counter value notification node, and counter value sharing method
KR20070029864A (en) Method and apparatus for securely transmitting and receiving data in peer to peer
CN108075879B (en) Data encryption and decryption method, device and system
CN104219663A (en) A method and system for certificating vehicle identity
CN110753321A (en) Safe communication method for vehicle-mounted TBOX and cloud server
JP2013157693A (en) Encryption communication system, communication device, key distribution device, and encryption communication method
CN116471587B (en) Method for generating and updating intra-train communication key under V2V communication
CN111917538B (en) Key derivation method and device based on vehicle-mounted equipment and vehicle-mounted equipment
CN105792190A (en) Data encryption, decryption and transmission method in communication system
CN114697122B (en) Data transmission method, device, electronic equipment and storage medium
CN113852632B (en) SM9 algorithm-based vehicle identity authentication method, system, device and storage medium
CN111049652A (en) Data transmission method and device, electronic equipment and computer readable storage medium
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN105959281A (en) File encrypted transmission method and device
CN112383897A (en) Information transmission method, device, medium and electronic equipment based on intelligent network connection
CN103167494A (en) Information sending method and information sending system
CN1649295A (en) Device and its method for end-to-end enciphering and deenciphering in clony system
US20220191045A1 (en) Implementation of a butterfly key expansion scheme
CN111225358B (en) Identity recognition method and device, electronic equipment and storage medium
CN116389098A (en) Cross-domain ciphertext access control method supporting multi-receiver authorization in Internet of vehicles environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421