CN114553511A - Data security transmission method, equipment and medium based on industrial production - Google Patents

Data security transmission method, equipment and medium based on industrial production Download PDF

Info

Publication number
CN114553511A
CN114553511A CN202210133816.6A CN202210133816A CN114553511A CN 114553511 A CN114553511 A CN 114553511A CN 202210133816 A CN202210133816 A CN 202210133816A CN 114553511 A CN114553511 A CN 114553511A
Authority
CN
China
Prior art keywords
key
ciphertext
characters
component
ascii
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210133816.6A
Other languages
Chinese (zh)
Inventor
王康利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN202210133816.6A priority Critical patent/CN114553511A/en
Publication of CN114553511A publication Critical patent/CN114553511A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The application discloses a data security transmission method, equipment and medium based on industrial production, which are used for solving the technical problem that the data security in the industrial production process is difficult to guarantee. The method comprises the following steps: determining component parameters of the component to be produced according to the work order task; performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values; acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to a plurality of characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments; splicing the multiple ciphertext sections to obtain ciphertexts corresponding to the component parameters; and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.

Description

Data security transmission method, equipment and medium based on industrial production
Technical Field
The application relates to the field of data security, in particular to a data security transmission method, equipment and medium based on industrial production.
Background
With the advent of the information-oriented era, the traditional industry gradually realizes the mutual fusion between the internet and the industry in the process of information-oriented innovation and digital construction, and the industrial internet also rises rapidly under the trend. However, with the access of more and more industrial devices, the industrial internet data security risk is increasingly prominent, especially the data security in industrial production cannot be well guaranteed, and the leakage and tampering of data are easy to occur, which brings loss to enterprises.
Disclosure of Invention
In order to solve the above problems, the present application provides a data security transmission method based on industrial production, including: determining component parameters of the component to be produced according to the work order task; performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values; acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to a plurality of characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments; splicing the multiple cipher text sections to obtain cipher texts corresponding to the component parameters; and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
In an implementation manner of the present application, before obtaining the preset first key and the preset second key, the method further includes: determining a system conversion rule for encrypting the ASCII value, and generating a first key for encrypting the ASCII value according to a system digit number corresponding to the system conversion rule; generating a second key according to the digit of the first key and the binary conversion rule, and encrypting the ASCII value by taking the second key as an encryption template; wherein, the plurality of characters contained in the second key are different.
In one implementation manner of the present application, after generating the second key, the method further includes: determining a communication party holding a first key and a second key, and constructing a local area communication network aiming at the communication party; wherein the first key and the second key are valid within the local area communication network.
In an implementation manner of the present application, encrypting ASCII values corresponding to a plurality of characters respectively to obtain a plurality of encrypted ciphertext fragments specifically includes: dividing the ASCII value by the carry digit to obtain a first quotient value which is used as the first digit of the ciphertext section; dividing the first remainder by the carry digit number and adding the obtained second quotient value to the first quotient value under the condition that the first remainder obtained by dividing the ASCII value by the carry digit number is larger than the carry digit number; in the case where the second remainder obtained by dividing the first remainder by the carry digit number is larger than the carry digit number, the second remainder is divided by the carry digit number, and the obtained third quotient value is added to the second quotient value.
In one implementation of the present application, the method further comprises: if the bit number of the ciphertext segment is smaller than the preset value, performing bit complementing before the first bit of the ciphertext segment so as to enable the bit number of the ciphertext segment after the bit complementing to reach the preset value.
In one implementation of the present application, the component parameters include at least any one or more of: application product, yield, production serial number and production size.
In an implementation manner of the present application, sending the compressed designated ciphertext to a target production line area corresponding to a component to be produced specifically includes: determining a plurality of production line areas for producing a component to be produced; and determining a corresponding target production line area from the plurality of production line areas according to the yield of the component to be produced, and sending the compressed designated ciphertext to the target production line area.
In an implementation manner of the present application, after sending the compressed designated ciphertext to the target production line area corresponding to the component to be produced, the method further includes: acquiring production state information of a target production line area; and encrypting the production state information, and returning the encrypted production state information to update the work order task.
The embodiment of the application provides a data security transmission equipment based on industrial production, and the equipment includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to a plurality of characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the multiple ciphertext sections to obtain ciphertexts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
An embodiment of the present application provides a non-volatile computer storage medium, which stores computer-executable instructions, and is characterized in that the computer-executable instructions are configured to:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to a plurality of characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the multiple cipher text sections to obtain cipher texts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
The data safety transmission method, equipment and medium based on industrial production provided by the embodiment of the application have the following beneficial effects at least:
the method has the advantages that a plurality of characters contained in the component parameters are analyzed and processed respectively, and the ASCII values obtained after the characters are analyzed and processed are encrypted and spliced, so that the redundancy of calculation is reduced, and the encryption efficiency is improved; the first key and the second key jointly determine an encryption rule, and the encryption and decryption of data can be realized only under the condition that the first key and the second key are obtained simultaneously, so that the security is higher; and the ciphertext is compressed and then transmitted, so that lossless compression of data is realized, and the data transmission quality in the industrial production process is ensured.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flow chart of a data secure transmission method based on industrial production according to an embodiment of the present application;
fig. 2 is a diagram of an example of an encryption process according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data security transmission device based on industrial production according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present application provides a data security transmission method based on industrial production, including:
s101: and determining the component parameters of the component to be produced according to the work order task.
A work order task is a production plan made up of one or more jobs, generated by a master device. The main control device is an entity device with data transceiving capacity and calculation processing capacity, and can generate work order tasks, acquire and distribute product information and the like.
After the staff sets the component parameters of the current component to be produced through the master control equipment, the server can determine the component parameters of the component to be produced according to the work order task generated by the master control equipment. The part parameters comprise application products, yield, production serial numbers and production sizes, for example, the part to be produced is steel, the part parameters are Yangtze river bridge cross beams, the yield is 1 piece, the serial numbers are 20220208-5, and the length is 10m, the width is 10cm, and the height is 30 m. It should be noted that, a parameter setting template exists in the main control device, and a worker can set component parameters through the parameter setting template, and finally, the generated component parameters exist in a character string form.
S102: and performing character splitting processing on the component parameters to obtain a plurality of characters contained in the component parameters, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values.
After obtaining the component parameters, the server needs to sequentially split the single characters included in the component parameters, so as to extract a plurality of characters. After the plurality of characters are extracted, each character is subjected to parsing processing (e.g., ord conversion) to convert each of the plurality of split characters into its corresponding ASCII value.
S103: and acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to the characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext fragments.
After the conversion between the characters and the ASCII values is completed, the converted ASCII values are required to be encrypted, so that the safe transmission of data is realized. In the embodiment of the application, a double-key mechanism is adopted for encryption, a first key and a second key are a group of key pairs, wherein the first key corresponds to a binary conversion rule, and the second key is an encryption template which can be randomly generated. Only on the basis of determining the key pair described above can secure encryption of the component parameters be achieved.
In one embodiment, the server may generate the first key and the second key for encrypting the ASCII value through an encryption tool. Specifically, a binary conversion rule corresponding to the component parameter is determined, and a first key is generated according to the number of bits of the binary conversion rule. Taking the 52-ary transformation rule as an example, the first key may be represented as n-52. The system conversion rule can be adjusted according to the actual network throughput, for example, when the network throughput is high, the current data transmission efficiency is high, and a low-digit system conversion rule can be selected to encrypt the ASCII value; when the network throughput is low, a high-order binary conversion rule is usually adopted, so that the transmitted data volume is reduced, and the transmission speed is increased. Of course, the binary conversion rule can also be customized according to both communication parties.
Further, according to the selected binary conversion rule, a data format after the binary conversion is completed is determined, and according to the data format, a character string containing a plurality of characters is generated to serve as a second key base. The string length of the second key is not less than the number of binary digits n, and the second key contains a plurality of characters which are different, for example, the second key may be expressed as base ═ 0123456789 abcdefghijklmnnopqrstwvwxzabcdefghijklmnopqrstwxyz'. The second key is an encryption template, and the encrypted ciphertext exists in the form of the encryption template.
After generating the key pair and completing distribution thereof, the server determines a correspondent having the first key and the second key, and constructs a local area communication network for the correspondent. The local area communication network adopts a point-to-point communication mechanism, only a communication party holding a first secret key and a second secret key can enter the local area communication network, and the first secret key and the second secret key are only effective in the local area communication network. Therefore, even if the third party maliciously steals the key pair and does not belong to the local area communication network, the key pair cannot take effect, and the data security is further ensured.
In one embodiment, the server obtains a first key and a second key generated in advance after converting all of a plurality of characters contained in the component parameter into ASCII values, and encrypts the ASCII value corresponding to each character through the obtained first key and second key to obtain an encrypted ciphertext fragment. Each ciphertext segment corresponds to a character in the component parameter.
Specifically, the ASCII value is denoted as a, and a first quotient obtained by dividing a by the carry digit n is used as the first digit of the encrypted ciphertext fragment. And after the quotient is finished, comparing the first remainder obtained after the quotient is finished with the carry digit, if the first remainder is still larger than the carry digit, continuously dividing the first remainder by the carry digit, and adding the obtained second quotient value to the first quotient value. After the second quotient is performed, the magnitude relation between the second remainder obtained after the second quotient and the carry digit is compared again, if the second remainder is still larger than the carry digit, the second remainder is divided by the carry digit, and a third quotient value obtained by performing the quotient is added to the second quotient value. Thus, the quotient string obtained through multiple iterations of quotient forms the final ciphertext segment. It should be noted that, in the iterative quotient-making process, once the remainder obtained after quotient-making is smaller than the carry digit number, the operation is stopped, and the obtained quotient value string is a ciphertext segment.
In one embodiment, to simplify the encryption process, the server needs to unify the format of the ciphertext fragments. If the digit of the ciphertext segment is smaller than the preset value, bit complementing is carried out before the first bit of the ciphertext segment, so that the digit of the ciphertext segment after bit complementing can reach a uniform preset value. In addition, when performing bit padding, a "0" padding method is generally used. Taking the first key n as 52 as an example, it can ensure that the number of bits of the ciphertext fragment does not exceed three bits when encrypting the ASCII value, and the transmission speed is faster. And under the condition that the digit of the ciphertext segment does not exceed three digits, 0 can be complemented before the first digit of the ciphertext segment.
S104: and splicing the plurality of ciphertext sections to obtain a ciphertext corresponding to the component parameter.
One ciphertext segment corresponds to one character in the component parameter, so after a plurality of ciphertext segments are obtained, the ciphertext segments need to be spliced to obtain a complete ciphertext corresponding to the plurality of characters contained in the component parameter.
S105: and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
In order to achieve lossless transmission of data, a preset compression algorithm (for example, a compression function zlib. compression ()) needs to be called to compress a ciphertext, so as to obtain a compressed designated ciphertext. And then sending the specified ciphertext to a target production line area in the local area communication network, decompressing the specified ciphertext by a decompression algorithm (such as zlib. uncompressions ()) after the specified ciphertext is received by the target production line area, splitting the decompressed ciphertext to obtain a plurality of ciphertext segments after decompression, decrypting the ciphertext segments sequentially by a second key and a first key, finally restoring the obtained ASCII value after decryption into corresponding characters, and splicing the characters according to the arrangement sequence, thereby obtaining the transmitted component parameters.
In the industrial production process, each part to be produced corresponds to a plurality of production line areas, and the production raw material amount of each production line area is different. Before ciphertext transmission, the server selects a production line area with sufficient raw materials as a target production line area according to the yield of the current part to be produced. After the target production line area is determined, the target production line area can receive and decrypt the component parameters, and accordingly, the corresponding component to be produced is produced.
After the target production line area finishes production, the production state information of the current produced part needs to be acquired, encrypted and returned to the main control equipment, and the main control equipment can update the work order task according to the returned production state information. It should be noted that the encryption and decryption process of the production state information is the same as the encryption and decryption process of the component parameter, and details thereof are not repeated. The production state information is used for reflecting the production condition of the component, including the produced quantity, the qualified product quantity and the like. If the raw materials of the current target production line area can not complete all production tasks, the master control equipment can update the work order task according to the fed-back incomplete production data, and simultaneously re-determine a new production line area from the plurality of production line areas so as to facilitate the production tasks of the incomplete parts. If defective products exist in the parts produced in the current target production line area, the main control equipment needs to add the production information of the defective products in the work order task after receiving the production state information, and secondary production of the defective products is carried out through the current target production line area again, so that the quality of the produced parts is ensured.
Fig. 2 is a diagram of an example of an encryption process according to an embodiment of the present application. As shown in FIG. 2, the part to be produced is steel, and the part parameters are 'Changjiang river bridge crossbeam, yield 1 piece, serial number 20220208-5, length 10m, width 10cm and height 30 m'. And carrying out character splitting processing on the component parameters to obtain a plurality of characters, and then carrying out analysis processing on different characters to convert the different characters into corresponding ASCII values. The converted ASCII values are encrypted (e.g., 52-ary conversion) according to the first and second keys, and the encrypted ciphertext fragments are complemented to obtain bit-aligned ciphertext fragments. And splicing the aligned ciphertext sections to obtain a complete transmission ciphertext, then compressing the complete ciphertext through a compression processing algorithm, and finally obtaining the designated ciphertext through compression processing, wherein the designated ciphertext is the data to be transmitted during data interaction.
The above is the method embodiment proposed by the present application. Based on the same idea, some embodiments of the present application further provide a device and a non-volatile computer storage medium corresponding to the above method.
Fig. 3 is a schematic structural diagram of a data security transmission device based on industrial production according to an embodiment of the present application. As shown in fig. 3, includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to a plurality of characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the multiple ciphertext sections to obtain ciphertexts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
An embodiment of the present application further provides a non-volatile computer storage medium, in which computer-executable instructions are stored, and the computer-executable instructions are configured to:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting ASCII values corresponding to a plurality of characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the multiple ciphertext sections to obtain ciphertexts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A data security transmission method based on industrial production is characterized by comprising the following steps:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting the ASCII values corresponding to the characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the plurality of ciphertext sections to obtain ciphertexts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
2. The method for data secure transmission based on industrial production according to claim 1, wherein before acquiring the preset first key and the preset second key, the method further comprises:
determining a system conversion rule for encrypting the ASCII value, and generating a first key for encrypting the ASCII value according to a system bit number corresponding to the system conversion rule;
generating a second key according to the digit of the first key and the binary conversion rule, and encrypting the ASCII value by taking the second key as an encryption template; wherein the second key comprises a plurality of characters which are different.
3. The method for securely transmitting data based on industrial production according to claim 2, wherein after generating the second key, the method further comprises:
determining a communication party holding the first key and the second key, and constructing a local area communication network aiming at the communication party; wherein the first key and the second key are valid within the local area communication network.
4. The industrial production-based data secure transmission method according to claim 2, wherein the encrypting the ASCII values corresponding to the characters to obtain a plurality of encrypted ciphertext fragments comprises:
dividing the ASCII value by the carry digit to obtain a first quotient value serving as a first digit of the cipher text segment;
dividing a first remainder obtained by dividing the ASCII value by the carry digit and adding a second quotient value obtained after the first remainder is larger than the carry digit;
and under the condition that a second remainder obtained by dividing the first remainder by the carry digit is larger than the carry digit, dividing the second remainder by the carry digit, and adding a third quotient value obtained after the second quotient value.
5. The industrial production-based data secure transmission method according to claim 4, characterized in that the method further comprises:
and if the digit of the encrypted text segment is smaller than a preset value, performing bit padding before the head of the encrypted text segment so as to enable the digit of the encrypted text segment after bit padding to reach the preset value.
6. The industrial production-based data secure transmission method according to claim 1, wherein the component parameters at least include any one or more of the following: application product, yield, production serial number and production size.
7. The data secure transmission method based on industrial production according to claim 6, wherein sending the compressed designated ciphertext to the target production line area corresponding to the component to be produced specifically includes:
determining a plurality of production line areas for producing the component to be produced;
and determining a corresponding target production line area from the plurality of production line areas according to the yield of the part to be produced, and sending the compressed designated ciphertext to the target production line area.
8. The data secure transmission method based on industrial production according to claim 1, wherein after sending the compressed designated ciphertext to the target production line area corresponding to the component to be produced, the method further comprises:
acquiring production state information of the target production line area;
and encrypting the production state information, and returning the encrypted production state information to update the work order task.
9. An industrial production-based data secure transmission device, characterized in that the device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting the ASCII values corresponding to the characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the plurality of ciphertext sections to obtain ciphertexts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
10. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
determining component parameters of the component to be produced according to the work order task;
performing character splitting processing on the component parameter to obtain a plurality of characters contained in the component parameter, and performing analysis processing on the plurality of characters to respectively convert the plurality of characters into corresponding American Standard Code for Information Interchange (ASCII) values;
acquiring a preset first key and a preset second key, and encrypting the ASCII values corresponding to the characters respectively according to the first key and the second key to obtain a plurality of encrypted ciphertext segments;
splicing the plurality of ciphertext sections to obtain ciphertexts corresponding to the component parameters;
and compressing the ciphertext, and sending the compressed designated ciphertext to a target production line area corresponding to the part to be produced so as to complete the production of the part to be produced according to the designated ciphertext.
CN202210133816.6A 2022-02-14 2022-02-14 Data security transmission method, equipment and medium based on industrial production Pending CN114553511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210133816.6A CN114553511A (en) 2022-02-14 2022-02-14 Data security transmission method, equipment and medium based on industrial production

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210133816.6A CN114553511A (en) 2022-02-14 2022-02-14 Data security transmission method, equipment and medium based on industrial production

Publications (1)

Publication Number Publication Date
CN114553511A true CN114553511A (en) 2022-05-27

Family

ID=81673054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210133816.6A Pending CN114553511A (en) 2022-02-14 2022-02-14 Data security transmission method, equipment and medium based on industrial production

Country Status (1)

Country Link
CN (1) CN114553511A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
US9806741B1 (en) * 2016-10-10 2017-10-31 International Business Machines Corporation Character conversion
CN110019075A (en) * 2018-08-09 2019-07-16 苏州科达科技股份有限公司 Log encryption method and decryption method and device
CN110933063A (en) * 2019-11-25 2020-03-27 中国联合网络通信集团有限公司 Data encryption method, data decryption method and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
US9806741B1 (en) * 2016-10-10 2017-10-31 International Business Machines Corporation Character conversion
CN110019075A (en) * 2018-08-09 2019-07-16 苏州科达科技股份有限公司 Log encryption method and decryption method and device
CN110933063A (en) * 2019-11-25 2020-03-27 中国联合网络通信集团有限公司 Data encryption method, data decryption method and equipment

Similar Documents

Publication Publication Date Title
CN110391900B (en) Private key processing method based on SM2 algorithm, terminal and key center
CN106817358B (en) Encryption and decryption method and device for user resources
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
CN112468532B (en) Credit data reporting method, device, system, equipment and computer storage medium
CN110505218B (en) Grid data self-adaptive compression transmission method based on JSON and computer storage medium
CN109462475B (en) Data encryption method, data decryption method and related devices
US20220209945A1 (en) Method and device for storing encrypted data
CN114186264A (en) Data random encryption and decryption method, device and system
CN108737353B (en) Data encryption method and device based on data analysis system
CN111797411A (en) 3D model encryption method, decryption method and transmission method
CN112839013A (en) Key transmission method, device and computer readable storage medium
CN111552938B (en) File encryption method and device
CN111798236B (en) Transaction data encryption and decryption methods, devices and equipment
CN112235101B (en) Coding method and device based on hybrid coding mechanism, decoding method and device
CN114553511A (en) Data security transmission method, equipment and medium based on industrial production
CN114124469B (en) Data processing method, device and equipment
CN108111469B (en) Method and device for establishing security channel in cluster
CN113051587B (en) Privacy protection intelligent transaction recommendation method, system and readable medium
CN115001869A (en) Encryption transmission method and system
CN115426111A (en) Data encryption method and device, electronic equipment and storage medium
CN113938270A (en) Data encryption method and device capable of flexibly reducing complexity
CN114374518A (en) PSI intersection information acquisition method and device with intersection counting function
CN114679324B (en) Data exchange method, tool, system, equipment and medium
CN112491838B (en) Method and system for safely sending message through industrial internet
CN110266488B (en) Key generation method based on position combination and data encryption transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination