CN101741629A - Communication encryption method supporting remote monitoring system - Google Patents

Communication encryption method supporting remote monitoring system Download PDF

Info

Publication number
CN101741629A
CN101741629A CN200810172745A CN200810172745A CN101741629A CN 101741629 A CN101741629 A CN 101741629A CN 200810172745 A CN200810172745 A CN 200810172745A CN 200810172745 A CN200810172745 A CN 200810172745A CN 101741629 A CN101741629 A CN 101741629A
Authority
CN
China
Prior art keywords
data
cutting
test
encrypted
order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810172745A
Other languages
Chinese (zh)
Inventor
孙振宝
宋平
陈玄同
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Corp
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CN200810172745A priority Critical patent/CN101741629A/en
Publication of CN101741629A publication Critical patent/CN101741629A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a communication encryption method supporting a remote monitoring system. A communication network is arranged between a server end and a remote host computer so as to encrypt the transmitted/received data and test terminal equipment connected with the remote host computer. The communication method comprises the following steps that: the server end cuts the test data, a compression program and encryption programs in sequence to generate multiple first cutting data, the compressed data and multiple encrypted data respectively; the encrypted data is sent to the remote host computer; the remote host computer executes the encryption programs in sequence and restores the encrypted data to the second cutting data; the second cutting data are combined into the compressed data, the compressed data are decompressed by a decompression program, so that the compressed data are restored into the first cutting data; and the first cutting data are recombined, so that the first cutting data are restored into the test data; and the test data is sent to the terminal equipment for testing.

Description

Support the communication encrypting method of remote monitoring and controlling system
Technical field
A kind of communication means is particularly to a kind of communication encrypting method of supporting remote monitoring and controlling system, sets up communication network between server end and distance host, and the terminal equipment that distance host connects is encrypted and tested to the data of transmission/reception.
Background technology
Along with the fast development of electronic product, many upstream manufacturers are in order to alleviate the burden made from test, so the work how will test is distributed to other downstream manufacturers.But be not neighbour and occupy between manufacturer, in order to reduce the time of dispatching test data.So can utilize world-wide web to carry out remote-controlled test between manufacturer.Please refer to shown in Figure 1ly, it is the schematic diagram of known technology.The method of testing of known technology has comprised following steps: the server end of upstream manufacturer provides the distance host of test data to downstream manufacturers (step S110).Distance host is after the acceptance test data, and distance host carries out test terminal equipment (step S120) according to test data.Distance host is after finishing test program, and the repayment test result is given server end (step S130).
Except avoiding being monitored, also has upstream manufacturer simultaneously to demands such as maintaining secrecy of the intellectual property of downstream manufacturers by the third party.In other words, upstream manufacturer's Data transmission and recovery test result data must be handled by specific encryption method, avoided important test data to be stolen.
Summary of the invention
In view of above problem, technical problem to be solved by this invention is to provide a kind of communication encrypting method of supporting remote monitoring and controlling system, between server end and distance host, set up communication network, and transmit test data to distance host, in order to the test terminal equipment that distance host connected.
For achieving the above object, the communication encrypting method of support remote monitoring and controlling system disclosed in this invention may further comprise the steps: by server end cutting test data, produce a plurality of first cutting datas; In regular turn first cutting data is carried out condensing routine, will produce packed data after its result combinations; Cut packed data, produce a plurality of second cutting datas; Second cutting data is carried out encipheror, in order to produce a plurality of encrypted datas; Transmit encrypted data to distance host; Be decrypted program by distance host, in order to encrypted data being reduced into second cutting data; Second cutting data is carried out combinator, in order to be reduced into packed data; Packed data is carried out gunzip, it is reduced into first cutting data; According to first cutting data, be reduced into test data; Send test data to terminal equipment, in order to test.
Server end is before providing test data to distance host, and server end can compress test data respectively and encrypt.Server end is sent to distance host with encrypted data by communication network again.Distance host reduces processing to the encrypted data that is received, in order to fetch test data.At last, distance host according to test data in order to terminal equipment is carried out test program.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the schematic diagram of known technology;
Fig. 2 is a structural representation of the present invention;
Fig. 3 is a workflow schematic diagram of the present invention;
Fig. 4 A is the transfer structure figure of a kind of embodiment of the present invention;
Fig. 4 B is for producing the schematic diagram of first cutting data;
Fig. 4 C produces the schematic diagram of packed data;
Fig. 4 D is for producing the schematic diagram of second cutting data;
Fig. 4 E is the form schematic diagram that second cutting data adds the first information and second information;
Fig. 4 F is for producing the schematic diagram of encrypted data;
Fig. 4 G is the schematic diagram of reduction second cutting data;
Fig. 4 H is reduced to the schematic diagram of packed data;
Fig. 4 I is the schematic diagram that is reduced to first cutting data;
Fig. 4 J is the schematic diagram of reduction test data.
Wherein, Reference numeral
210 server ends
211 test datas
212 condensing routines
213 encipherors
214 first compressed buffers
215 encrypt buffering area
220 distance hosts
212 gunzips
222 decrypted programs
223 decrypted buffers
224 second compressed buffers
225 test programs
230 terminal equipments
Embodiment
Please refer to shown in Figure 2ly, it is a structural representation of the present invention.Include in the present invention: server end 210, distance host 220 and terminal equipment 230.Store test data 211, condensing routine 212, encipheror 213, first compressed buffer 214 in the server end 210 and encrypt buffering area 215.220 transmission of carrying out test data 211 by a communication network of server end 210 and distance host.Wherein, communication network can be virtual private networks (virtual private network, VPN) or the network configuration of escape way.Store gunzip 212, decrypted program 222, decrypted buffer 223, second compressed buffer 224 and test program 225 in the distance host 220.Distance host 220 electrically connects terminal equipment 230, and wherein terminal equipment 230 can be chip, peripheral interface card (Interface Card) or peripheral device etc.
Please refer to shown in Figure 3ly, it is a workflow schematic diagram of the present invention.Communication means of the present invention may further comprise the steps: by server end cutting test data, produce a plurality of first cutting datas (step S310).Wherein, according to the length of the first fixed data amount cutting test data 211, produce first cutting data, and cutting data is deposited to first compressed buffer 214 in order to equivalent.In regular turn first cutting data is carried out condensing routine, will produce packed data (step S320) after its result combinations.Cut packed data, produce a plurality of second cutting datas (step S330).Wherein, in order to the cutting of equivalent packed data, produce second cutting data according to the length of the first fixed data amount.Server end will more add the first information and second information (step S340) in second cutting data.Wherein, the first information has passed through encryption in order to write down this one second cutting data; Second information is in order to write down the effective length of packed data.Second cutting data is carried out encipheror, in order to produce a plurality of encrypted datas (step S350).Wherein, encrypted data is deposited encryption buffering area 215.
Transmit encrypted data to distance host (step S360), and encrypted data is deposited to decrypted buffer 223.Be decrypted program by distance host, in order to encrypted data being reduced into second cutting data (step S370).It should be noted that and when the data volume of encrypted data reaches the second fixed data amount, then encrypted data is decrypted program 222, in order to obtain second cutting data.
Second cutting data is carried out gunzip, in order to be reduced into packed data (step S380).Packed data is carried out gunzip, it is reduced into first cutting data (step S390).Specifically, when the data volume of being exported when gunzip 212 meets the first fixed data amount, then it is saved as first cutting data.Then, first cutting data of recombinating is reduced into test data (step S400).According to test data, carry out test program in order to terminal equipment is tested (step S410) by distance host.Distance host is more in order to the test report of receiving terminal apparatus, and test report is returned to server end (step S420).
For clearly demonstrating the course of work of the present invention, below state bright conduct and explain, but do not limit wherein parameter, only chat bright earlier at this.Please refer to shown in Fig. 4 A, it is the transfer structure figure of a kind of embodiment of the present invention.Left at Fig. 4 A is a server end 210; Right-hand is distance host 220.
Server end 210 produces a plurality of first cutting datas according to the length of the first fixed data amount cutting test data 211 in order to equivalent.Suppose that at this first fixed data amount is 1024Kbytes.So server end 210 produces test data 211 respectively first cutting data of a plurality of 1024Kbytes.Please cooperate shown in Fig. 4 B, it is for producing the schematic diagram of first cutting data.Server end 210 carries out condensing routine 212 to each first cutting data, and its output result combinations is packed data, and the general packed data deposited to first compressed buffer 214.Please cooperate shown in Fig. 4 C, it is to produce the schematic diagram of packed data.
When the packed data in first compressed buffer 214 reached the first fixed data amount, server end 210 was understood second cutting data that is cut into of packed data segmentation, and second cutting data is deposited to encrypting buffering area 215.Please cooperate shown in Fig. 4 D, it is for producing the schematic diagram of second cutting data.At this of particular note, server end 210 can will more add the first information and second information in second cutting data.Length at this hypothesis first information is 4kbytes; The length of second information is 4Kbytes.Please cooperate shown in Fig. 4 E, it is the form schematic diagram that second cutting data adds the first information and second information.When second cutting data in encrypting buffering area 215 reached the first fixed data amount, server end 210 can carry out the processing of encipheror 213 with second cutting data, in order to produce encrypted data.Please cooperate shown in Fig. 4 F, it is for producing the schematic diagram of encrypted data.
Then, server end 210 can be sent to distance host 220 with encrypted data.Distance host 220 can be deposited encrypted data to decrypted buffer 223.When the capacity of encrypted data reached the second fixed data amount, 220 of distance hosts were decrypted encrypted data program 222 and revert back second cutting data.Because more added the first information and second information in the encrypted data, therefore the second fixed data amount is set at 1032Kbytes.Please cooperate shown in Fig. 4 G, it is the schematic diagram of reduction second cutting data.
Distance host 220 meetings combination second cutting data in regular turn reverts back packed data with it.Please cooperate shown in Fig. 4 H, it is to be reduced to the schematic diagram of packed data.Then, packed data carries out gunzip 212.It should be noted that especially when the data volume of being exported whenever gunzip 212 meets the first fixed data amount, then it is saved as first cutting data to the second compressed buffer 224.Please cooperate shown in Fig. 4 I, it is the schematic diagram that is reduced to first cutting data.This is that the data volume of the packed data that is produced not is a unanimity after carrying out condensing routine 212 because of first cutting data.Yet the data volume size of first cutting data is 1024Kbytes.In other words, when the data volume of exporting whenever gunzip meets the first fixed data amount, finished one first cutting data exactly.Distance host 220 first cutting data of recombinating in regular turn is in order to reduction test data 211.Please cooperate shown in Fig. 4 J, it is the schematic diagram of reduction test data.
After distance host 220 was finished the reduction processing of encrypted data again, distance host 220 can be carried out test program 225 according to test data 211.The terminal equipment 230 that distance host 220 begins it is connected is tested.After finishing test program 225, distance host 220 is understood the test report of receiving terminal apparatus 230, and test report is returned to server end 210.
Server end 210 is before providing test data 211 to distance host 220, and server end 210 can compress test data 211 respectively and encrypt.Server end 210 is sent to distance host 220 with encrypted data by communication network again.220 pairs of encrypted datas that received of distance host reduce processing, in order to fetch test data 211.At last, distance host 220 according to test data 211 in order to terminal equipment 230 is carried out test program 225.So, when can guarantee that server end 210 sends test data 211 again, can not eavesdropped, so as to reaching secret purpose by the third party.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (6)

1. a communication encrypting method of supporting remote monitoring and controlling system transmits a test data between a server end and a distance host, it is characterized in that this encryption method may further comprise the steps:
According to the length of one first fixed data amount this test data of cutting, produce a plurality of first cutting datas in order to equivalent;
In regular turn described first cutting data is carried out a condensing routine, will produce a packed data after its result combinations, and described packed data is deposited to one first compressed buffer;
Described packed data is cut into a plurality of second cutting datas of many fixed data length, and described second cutting data is deposited one encrypt buffering area;
Described second cutting data is carried out this encipheror, in order to produce a plurality of encrypted datas;
Transmit described encrypted data to this distance host, and described encrypted data is deposited to a decrypted buffer;
Carry out a decrypted program by this distance host, in order to described encrypted data is reduced into this second cutting data;
Make up described second cutting data, in order to be reduced into this packed data;
To this packed data carry out this gunzip, it is reduced into described first cutting data, and described first cutting data is deposited to one second compressed buffer;
Described first cutting data of recombinating is reduced into this test data; And
According to this test data, carry out a test program in order to described terminal equipment is tested by this distance host.
2. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, it is preceding further comprising the steps of that this server end transmits this encrypted data:
A first information and one second information will more be added in this encrypted data.
3. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, this communication network is a virtual private networks.
4. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, and is further comprising the steps of in being reduced into this second cutting data:
When the capacity of this encrypted data reaches one second fixed data amount, then this encrypted data is carried out this decrypted program, in order to obtain this second cutting data.
5. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, this is further comprising the steps of in process of packed data being reduced into:
When the data volume of exporting when this gunzip meets one first fixed data amount, then it is saved as this first cutting data.
6. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, this terminal equipment is finished after the described test data further comprising the steps of again:
This distance host is also in order to receiving a test report of described terminal equipment, and described test report is returned to this server end.
CN200810172745A 2008-11-11 2008-11-11 Communication encryption method supporting remote monitoring system Pending CN101741629A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810172745A CN101741629A (en) 2008-11-11 2008-11-11 Communication encryption method supporting remote monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810172745A CN101741629A (en) 2008-11-11 2008-11-11 Communication encryption method supporting remote monitoring system

Publications (1)

Publication Number Publication Date
CN101741629A true CN101741629A (en) 2010-06-16

Family

ID=42464563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810172745A Pending CN101741629A (en) 2008-11-11 2008-11-11 Communication encryption method supporting remote monitoring system

Country Status (1)

Country Link
CN (1) CN101741629A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957504A (en) * 2014-04-21 2014-07-30 百度在线网络技术(北京)有限公司 Positioning service assessment method, device and system
CN104734723A (en) * 2015-03-10 2015-06-24 中国人民解放军信息工程大学 Data conversion method based on compression and scrambling
CN106817367A (en) * 2017-01-03 2017-06-09 深圳市沃特玛电池有限公司 A kind of data transmission method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957504A (en) * 2014-04-21 2014-07-30 百度在线网络技术(北京)有限公司 Positioning service assessment method, device and system
CN103957504B (en) * 2014-04-21 2018-05-04 百度在线网络技术(北京)有限公司 Positioning service appraisal procedure, apparatus and system
CN104734723A (en) * 2015-03-10 2015-06-24 中国人民解放军信息工程大学 Data conversion method based on compression and scrambling
CN106817367A (en) * 2017-01-03 2017-06-09 深圳市沃特玛电池有限公司 A kind of data transmission method and system

Similar Documents

Publication Publication Date Title
JP2019537871A5 (en)
CN105791245B (en) A kind of data sending, receiving method and device
CN110287041B (en) Service data sending method, device, equipment and storage medium
CN105634737A (en) Data transmission method, terminals and system thereof
CN105025102B (en) The network storage call method and storage system of a kind of 3D printing model file
CN103716056B (en) Data compression method, uncompressing data and equipment
CN107070942A (en) A kind of data security method and related system
CN106789876A (en) The authentication method and its device of a kind of cloud terminal server
CN104219298A (en) Cluster system and data backup method thereof
CN105354505A (en) Image adaption method and electronic device
CN108833443A (en) A kind of method for message transmission and system, computer equipment
CN101741629A (en) Communication encryption method supporting remote monitoring system
CN104123244A (en) USB redirection system and method
CN104113510A (en) Virtual desktop system and message data transmitting method thereof
CN109710502A (en) Log transmission method, apparatus and storage medium
CN110598427B (en) Data processing method, system and storage medium
CN103220260B (en) The more method of new data, server, client and system
CN106790359A (en) A kind of distributed multiterminal data transmission synchronization system and method
CN104079368B (en) A kind of the test data transmission method and server of application software
KR102425039B1 (en) Apparatus and method for compressing data in distributed deep-learning environment
CN115277684A (en) File transmission method, device, equipment and storage medium
CN106060801B (en) Data communication method, device and system based on Wi-Fi device
CN111506913B (en) Audio encryption method and device, storage medium and electronic device
CN107707599A (en) A kind of method and device of Internet of Things communication equipment transmission file
CN113626848A (en) Sample data generation method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100616