AU2021102898A4 - Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data - Google Patents

Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data Download PDF

Info

Publication number
AU2021102898A4
AU2021102898A4 AU2021102898A AU2021102898A AU2021102898A4 AU 2021102898 A4 AU2021102898 A4 AU 2021102898A4 AU 2021102898 A AU2021102898 A AU 2021102898A AU 2021102898 A AU2021102898 A AU 2021102898A AU 2021102898 A4 AU2021102898 A4 AU 2021102898A4
Authority
AU
Australia
Prior art keywords
function
desdata
value
transmission
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021102898A
Inventor
Xin Chen
Junwei Huang
Ming Huang
Zhongyang LI
Zhiying LU
Xiule XIE
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang East Star Software Development Co Ltd
Original Assignee
Zhejiang East Star Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang East Star Software Development Co Ltd filed Critical Zhejiang East Star Software Development Co Ltd
Priority to AU2021102898A priority Critical patent/AU2021102898A4/en
Application granted granted Critical
Publication of AU2021102898A4 publication Critical patent/AU2021102898A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/05Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
    • H03M13/09Error detection only, e.g. using cyclic redundancy check [CRC] codes or single parity bit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Abstract

of Descriptions The invention discloses a function parameter data transmission encryption method, which includes obtaining the function to be transmitted, and encrypting the parameters except the last bit in the function to obtain the desData value. In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced and combined to obtain the transmission string. After the transmission is completed, the data receiver receives the function to be transmitted, and splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The invention can uniformly encrypt all parameters, and complete all parameter encryption at one time. Drawings of Descriptions Get the function to be transmitted, and encrypt the parameters except the last bit in the function to S100 obtain the desData value. The desData value is arranged based on the verification code, timestamp and digital signature In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced S200 and combined to obtain the transmission string. The transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver After the transmission is completed, the data receiver receives the function to be transmitted, and S300 splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value Figure 1 The first 100 processing module Data 20 0 transmission module 300 Receive processing module 400 Decryption / verification module Figure 2

Description

Drawings of Descriptions
Get the function to be transmitted, and encrypt the parameters except the last bit in the function to S100 obtain the desData value. The desData value is arranged based on the verification code, timestamp and digital signature
In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced S200 and combined to obtain the transmission string. The transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver
After the transmission is completed, the data receiver receives the function to be transmitted, and S300 splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value
Figure 1
The first 100 processing module
Data 20 0 transmission module
300 Receive processing module
400 Decryption /
verification module
Figure 2
Descriptions
Transmission Encryption Method, System, Device and Readable Storage Medium of Function Parameter Data
Technical Field The present invention relates to the field of data transmission technology, in particular to a transmission encryption method, system, device and readable storage medium of function parameter data.
Background Technology At present, when the function parameters are transmitted, it is generally necessary to encrypt the function parameters. In the prior art, all parameters are encrypted one by one when encrypting. Not only the process is cumbersome, but also the data is easily tampered with in the process of encrypting one by one. In addition, since the encryption process is relatively cumbersome, it will also affect the efficiency of data transmission. Furthermore, in the encryption process, most of the algorithms may adopt the same encryption method, and the encryption strength is not strong enough, which makes the encryption algorithm easy to be cracked and the data will be changed, etc., which causes the transmitted data to be altered or stolen.
Utility Model Contents Aiming at the shortcomings in the prior art, the present invention provides an encryption method, system, device and readable storage medium for function parameter data transmission. In order to solve the above technical problems, the present invention is solved by the following technical solutions: A method for encrypting function parameter data transmission includes the following steps: Get the function to be transmitted, and encrypt the parameters except the last bit in the function to obtain the desData value. The desData value is arranged based on the verification code, timestamp and digital signature. In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced and combined to obtain the transmission string. The transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver. After the transmission is completed, the data receiver receives the function to be transmitted, and splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value. Due to the adoption of the above technical scheme, the present invention can uniformly encrypt all parameters and complete all parameter encryption at one time. If any parameter is tampered with, the data legality verification will fail and be quickly discovered.
Descriptions
Cyclic redundancy check + timestamp and digital signature encryption are adopted, and symmetric encryption algorithm is adopted. The encryption speed is fast. The number of bytes of ciphertext and plaintext data is similar, which does not affect the efficiency of data transmission. The encryption algorithm involved in the method is not limited to the encryption method, that is, the encryption algorithm is dynamically matched, and the encryption algorithm used for each data transmission can be different, the encryption strength is stronger, and it is not easy to be cracked.
Brief Description of Drawings Figure 1 is a schematic diagram of the overall flow of the method of the present invention; Figure 2 is a schematic diagram of the overall structure of the system of the present invention.
Detailed Description of the Presently Preferred Embodiments Embodiment 1: A method for encrypting function parameter data transmission includes the following steps: Si00, Get the function to be transmitted, and encrypt the parameters except the last bit in the function to obtain the desData value. The desData value is arranged based on the verification code, timestamp and digital signature. S200, In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced and combined to obtain the transmission string. The transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver. S300, After the transmission is completed, the data receiver receives the function to be transmitted, and splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value. The parameters except the last digit in the function are encrypted to obtain the desData value, and the specific steps are as follows: All parameters in the function except the last one are concatenated into strings in turn. The hexadecimal code conversion of the character string is performed and a cyclic redundancy check is performed to obtain a check code. Among them, all characters in the string are regarded as Chinese characters. Perform hexadecimal conversion operations on all Chinese characters in turn. Each Chinese character is converted into a 4-digit hexadecimal character, and all 4-digit hexadecimal characters are superimposed to obtain a hexadecimal string. Arrange based on the timestamp, digital signature and verification code to get the desData value. In this embodiment, the digital signature is encrypted data obtained through an encryption algorithm. There are no restrictions on the encryption algorithm here, and it can be achieved by using any encryption algorithm to obtain a digital signature. In order to verify whether the transmitted function is correct, after the transmission is
Descriptions
completed, a decryption verification step is also included: Perform encryption processing based on the received function to obtain the second desData value. The ciphertext is decrypted to obtain the decrypted desData value, and the decrypted desData value is compared with the second desData value. If they are the same, the transmitted function is correct, and if they are different, the transmitted function is incorrect. Embodiment 2: A function parameter data transmission encryption system includes a first processing module 100, a data transmission module 200, and a receiving processing module 300. The first processing module 100 is used to obtain the function to be transmitted, and encrypt the parameters other than the last digit in the function to obtain the desData value. The desData value is arranged based on the verification code, time stamp and digital signature. In the data transmission module 200, in the process of parameter data transmission, the data sender transmits all the parameters of the function based on the last parameter of the function. When transmitting, the last bit of parameter is spliced and combined to obtain the transmission string. Among them, the transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver. In the receiving processing module 300, after the transmission is completed, the data receiver receives the function to be transmitted based on the transmission string, and splits and decrypts the transmission string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value. It also includes a decryption verification module 400, and the decryption verification module 400 is configured to: Perform encryption processing based on the received function to obtain the second desData value. The ciphertext is decrypted to obtain the decrypted des Data value, and the decrypted desData value is compared with the second desData value. If they are the same, the transmitted function is correct, if they are different, the transmitted function is incorrect. The first processing module 100 is configured to: in addition to the last parameter, all the parameters in the function are sequentially spliced into a string. The character string is converted into hexadecimal codes and a cyclic redundancy check is performed to obtain a check code. Arrange based on the timestamp, digital signature and the verification code to obtain the desData value. The first processing module 100 is configured to: the hexadecimal encoding conversion of the character string is specifically: All characters in the string are regarded as Chinese characters. Perform hexadecimal conversion operations on all Chinese characters in turn. Each Chinese character is converted into a 4-digit hexadecimal character, and all 4-digit hexadecimal characters are superimposed to obtain a hexadecimal string. The receiving processing module 300 is configured to split the transmission string into a
Descriptions
symmetric encryption algorithm identifier agreed upon by the data sender and the data receiver, a public key, and a cipher text that encrypts the desData value based on the symmetric encryption algorithm. Embodiment 3: A computer-readable storage medium, the computer-readable storage medium stores a computer program. When the computer program is executed by a processor, the following method steps are implemented: Get the function to be transmitted, and encrypt the parameters except the last bit in the function to obtain the desData value. The desData value is arranged based on the verification code, timestamp and digital signature. In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced and combined to obtain the transmission string. The transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver. After the transmission is completed, the data receiver receives the function to be transmitted, and splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value. In one embodiment, when the processor executes the computer program, the process of encrypting parameters other than the last digit in the function is implemented to obtain the desData value, and the specific steps are as follows: In addition to the last parameter, all the parameters in the function are sequentially spliced into a string. The character string is converted into hexadecimal codes and a cyclic redundancy check is performed to obtain a check code. Arrange based on the timestamp, digital signature and the verification code to obtain the desData value. In one embodiment, when the processor executes the computer program, the implementation of the hexadecimal encoding conversion of the character string is specifically: All characters in the string are regarded as Chinese characters. Perform hexadecimal conversion operations on all Chinese characters in turn; Each Chinese character is converted into a 4-digit hexadecimal character, and all 4-digit hexadecimal characters are superimposed to obtain a hexadecimal string. In one embodiment, when the processor executes the computer program, the implementation of the split and decryption processing on the transmission character string is specifically as follows: Splitting the transmission string into a symmetric encryption algorithm identifier agreed upon by the data sender and the data receiver, a public key, and a ciphertext that encrypts the desData value based on the symmetric encryption algorithm. In an embodiment, when the processor executes the computer program, the implementation further includes a decryption verification step:
Descriptions
Perform encryption processing based on the received function to obtain the second desData value. The ciphertext is decrypted to obtain the decrypted des Data value, and the decrypted desData value is compared with the second desData value. If they are the same, the transmitted function is correct, if they are different, the transmitted function is incorrect. Embodiment 4: A device for encrypting function parameter data transmission provides a device for encrypting function parameter data transmission. The function parameter data transmission encryption device can be a server or a mobile terminal. The function parameter data transmission encryption device includes a processor, a memory, a network interface and a database connected through a system bus. The memory of the device for encrypting function parameter data transmission includes a non-volatile storage medium and an internal memory.
EDITORIAL NOTE 2021102898
There are 8 claims only.

Claims (8)

Claims
1. A method for encrypting function parameter data transmission, which is characterized in that it includes the following steps: Get the function to be transmitted, and encrypt the parameters except the last bit in the function to obtain the desData value. The desData value is arranged based on the verification code, timestamp and digital signature. In the parameter data transmission process, the data sender transmits all the parameters of the function based on the last parameter of the function. During transmission, the last bit of parameters is spliced and combined to obtain the transmission string. The transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver. After the transmission is completed, the data receiver receives the function to be transmitted, and splits and decrypts the transmitted string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value.
2. The method for encrypting function parameter data transmission according to Claim 1, which is characterized in that the parameters except the last digit in the function are encrypted to obtain the desData value, and the specific steps are as follows: All parameters in the function except the last one are concatenated into strings in turn; Convert the character string to hexadecimal code and do cyclic redundancy check to get the check code. Arrange based on the timestamp, digital signature and verification code to get the desData value.
3. The method for encrypting function parameter data transmission according to Claim 2, which is characterized in that the hexadecimal encoding conversion of the character string is specifically: Treat all characters in the string as Chinese characters. Perform hexadecimal conversion operations on all Chinese characters in turn. Each Chinese character is converted into a 4-digit hexadecimal character, and all 4-digit hexadecimal characters are superimposed to obtain a hexadecimal string.
4. The method for encrypting function parameter data transmission according to Claim 1, which is characterized in that splitting and decrypting the transmitted character string is specifically: Split the transmission string into the symmetric encryption algorithm identifier and public key agreed upon by the data sender and the data receiver, and the ciphertext based on the symmetric encryption algorithm to encrypt the desData value; Among them, the symmetric encryption algorithm identification refers to the unique identification of multiple symmetric encryption algorithms, a symmetric encryption algorithm is randomly selected during transmission to encrypt the desData value, and the corresponding symmetric encryption algorithm identifier is sent to the data receiver as part of the transmission string.
5. The method for encrypting function parameter data transmission according to any one of Claims 1-4, which is characterized in that it further comprises a decryption verification step: Perform encryption processing based on the received function to obtain the second desData
Claims
value. The ciphertext is decrypted to obtain the decrypted desData value, and the decrypted desData value is compared with the second desData value. If they are the same, the transmitted function is correct, and if they are different, the transmitted function is incorrect.
6. The method for encrypting function parameter data transmission according to Claim 1, which is characterized in that the digital signature is encrypted data obtained by an encryption algorithm.
7. The method for encrypting function parameter data transmission according to claim 1, which is characterized in that it comprises a first processing module, a data transmission module, and a receiving processing module. A first processing module is used to obtain the function to be transmitted, and encrypt the parameters other than the last digit in the function to obtain the desData value. The desData value is arranged based on the verification code, time stamp and digital signature. In a data transmission module, in the process of parameter data transmission, the data sender transmits all the parameters of the function based on the last parameter of the function. When transmitting, the last bit of parameter is spliced and combined to obtain the transmission string. Among them, the transmission string is formed by concatenating the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value agreed upon by the data sender and the data receiver. In a receiving processing module, after the transmission is completed, the data receiver receives the function to be transmitted based on the transmission string, and splits and decrypts the transmission string to obtain the last parameter after the split and decryption. The last parameter includes the symmetric encryption algorithm identifier, the public key, and the ciphertext formed based on the desData value.
8. The function parameter data transmission encryption system according to Claim 7, which is characterized in that it further comprises a decryption verification module, and the decryption verification module is configured to: Perform encryption processing based on the received function to obtain the second desData value; The ciphertext is decrypted to obtain the decrypted desData value, and the decrypted desData value is compared with the second desData value. If they are the same, the transmitted function is correct, and if they are different, the transmitted function is incorrect.
AU2021102898A 2021-05-27 2021-05-27 Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data Ceased AU2021102898A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021102898A AU2021102898A4 (en) 2021-05-27 2021-05-27 Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021102898A AU2021102898A4 (en) 2021-05-27 2021-05-27 Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data

Publications (1)

Publication Number Publication Date
AU2021102898A4 true AU2021102898A4 (en) 2021-07-15

Family

ID=76785367

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021102898A Ceased AU2021102898A4 (en) 2021-05-27 2021-05-27 Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data

Country Status (1)

Country Link
AU (1) AU2021102898A4 (en)

Similar Documents

Publication Publication Date Title
CN110493197B (en) Login processing method and related equipment
US5568554A (en) Method for improving the processing and storage performance of digital signature schemes
US9537657B1 (en) Multipart authenticated encryption
CN109347627B (en) Data encryption and decryption method and device, computer equipment and storage medium
US7827408B1 (en) Device for and method of authenticated cryptography
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN109921894B (en) Data transmission encryption method and device, storage medium and server
CN107395368B (en) Digital signature method, decapsulation method and decryption method in media-free environment
CN111555872B (en) Communication data processing method, device, computer system and storage medium
CN110572828B (en) Internet of things security authentication method, system and terminal based on state cryptographic algorithm
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
CN101282222A (en) Digital signature method based on CSK
CN112383522B (en) Function parameter data transmission encryption method, system, device and readable storage medium
JPH0934356A (en) High-bandwidth cryptographic system with low-bandwidth cryptographic module
CN102594842A (en) Device-fingerprint-based network management message authentication and encryption scheme
CN107809311A (en) The method and system that a kind of unsymmetrical key based on mark is signed and issued
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN112738051A (en) Data information encryption method, system and computer readable storage medium
CN114448641A (en) Privacy encryption method, electronic equipment, storage medium and chip
CN117278324B (en) Message encryption transmission method and system
CN112532384B (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
AU2021102898A4 (en) Transmission Encryption Method, System, Device And Readable Storage Medium Of Function Parameter Data
CN104038337A (en) Data encryption method based on AES128
CN111800784A (en) Block chain cloud service system based on cloud computing
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry