CN101741629A - Communication encryption method supporting remote monitoring system - Google Patents
Communication encryption method supporting remote monitoring system Download PDFInfo
- Publication number
- CN101741629A CN101741629A CN200810172745A CN200810172745A CN101741629A CN 101741629 A CN101741629 A CN 101741629A CN 200810172745 A CN200810172745 A CN 200810172745A CN 200810172745 A CN200810172745 A CN 200810172745A CN 101741629 A CN101741629 A CN 101741629A
- Authority
- CN
- China
- Prior art keywords
- data
- cutting
- test
- encrypted
- order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a communication encryption method supporting a remote monitoring system. A communication network is arranged between a server end and a remote host computer so as to encrypt the transmitted/received data and test terminal equipment connected with the remote host computer. The communication method comprises the following steps that: the server end cuts the test data, a compression program and encryption programs in sequence to generate multiple first cutting data, the compressed data and multiple encrypted data respectively; the encrypted data is sent to the remote host computer; the remote host computer executes the encryption programs in sequence and restores the encrypted data to the second cutting data; the second cutting data are combined into the compressed data, the compressed data are decompressed by a decompression program, so that the compressed data are restored into the first cutting data; and the first cutting data are recombined, so that the first cutting data are restored into the test data; and the test data is sent to the terminal equipment for testing.
Description
Technical field
A kind of communication means is particularly to a kind of communication encrypting method of supporting remote monitoring and controlling system, sets up communication network between server end and distance host, and the terminal equipment that distance host connects is encrypted and tested to the data of transmission/reception.
Background technology
Along with the fast development of electronic product, many upstream manufacturers are in order to alleviate the burden made from test, so the work how will test is distributed to other downstream manufacturers.But be not neighbour and occupy between manufacturer, in order to reduce the time of dispatching test data.So can utilize world-wide web to carry out remote-controlled test between manufacturer.Please refer to shown in Figure 1ly, it is the schematic diagram of known technology.The method of testing of known technology has comprised following steps: the server end of upstream manufacturer provides the distance host of test data to downstream manufacturers (step S110).Distance host is after the acceptance test data, and distance host carries out test terminal equipment (step S120) according to test data.Distance host is after finishing test program, and the repayment test result is given server end (step S130).
Except avoiding being monitored, also has upstream manufacturer simultaneously to demands such as maintaining secrecy of the intellectual property of downstream manufacturers by the third party.In other words, upstream manufacturer's Data transmission and recovery test result data must be handled by specific encryption method, avoided important test data to be stolen.
Summary of the invention
In view of above problem, technical problem to be solved by this invention is to provide a kind of communication encrypting method of supporting remote monitoring and controlling system, between server end and distance host, set up communication network, and transmit test data to distance host, in order to the test terminal equipment that distance host connected.
For achieving the above object, the communication encrypting method of support remote monitoring and controlling system disclosed in this invention may further comprise the steps: by server end cutting test data, produce a plurality of first cutting datas; In regular turn first cutting data is carried out condensing routine, will produce packed data after its result combinations; Cut packed data, produce a plurality of second cutting datas; Second cutting data is carried out encipheror, in order to produce a plurality of encrypted datas; Transmit encrypted data to distance host; Be decrypted program by distance host, in order to encrypted data being reduced into second cutting data; Second cutting data is carried out combinator, in order to be reduced into packed data; Packed data is carried out gunzip, it is reduced into first cutting data; According to first cutting data, be reduced into test data; Send test data to terminal equipment, in order to test.
Server end is before providing test data to distance host, and server end can compress test data respectively and encrypt.Server end is sent to distance host with encrypted data by communication network again.Distance host reduces processing to the encrypted data that is received, in order to fetch test data.At last, distance host according to test data in order to terminal equipment is carried out test program.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the schematic diagram of known technology;
Fig. 2 is a structural representation of the present invention;
Fig. 3 is a workflow schematic diagram of the present invention;
Fig. 4 A is the transfer structure figure of a kind of embodiment of the present invention;
Fig. 4 B is for producing the schematic diagram of first cutting data;
Fig. 4 C produces the schematic diagram of packed data;
Fig. 4 D is for producing the schematic diagram of second cutting data;
Fig. 4 E is the form schematic diagram that second cutting data adds the first information and second information;
Fig. 4 F is for producing the schematic diagram of encrypted data;
Fig. 4 G is the schematic diagram of reduction second cutting data;
Fig. 4 H is reduced to the schematic diagram of packed data;
Fig. 4 I is the schematic diagram that is reduced to first cutting data;
Fig. 4 J is the schematic diagram of reduction test data.
Wherein, Reference numeral
210 server ends
211 test datas
212 condensing routines
213 encipherors
214 first compressed buffers
215 encrypt buffering area
220 distance hosts
212 gunzips
222 decrypted programs
223 decrypted buffers
224 second compressed buffers
225 test programs
230 terminal equipments
Embodiment
Please refer to shown in Figure 2ly, it is a structural representation of the present invention.Include in the present invention: server end 210, distance host 220 and terminal equipment 230.Store test data 211, condensing routine 212, encipheror 213, first compressed buffer 214 in the server end 210 and encrypt buffering area 215.220 transmission of carrying out test data 211 by a communication network of server end 210 and distance host.Wherein, communication network can be virtual private networks (virtual private network, VPN) or the network configuration of escape way.Store gunzip 212, decrypted program 222, decrypted buffer 223, second compressed buffer 224 and test program 225 in the distance host 220.Distance host 220 electrically connects terminal equipment 230, and wherein terminal equipment 230 can be chip, peripheral interface card (Interface Card) or peripheral device etc.
Please refer to shown in Figure 3ly, it is a workflow schematic diagram of the present invention.Communication means of the present invention may further comprise the steps: by server end cutting test data, produce a plurality of first cutting datas (step S310).Wherein, according to the length of the first fixed data amount cutting test data 211, produce first cutting data, and cutting data is deposited to first compressed buffer 214 in order to equivalent.In regular turn first cutting data is carried out condensing routine, will produce packed data (step S320) after its result combinations.Cut packed data, produce a plurality of second cutting datas (step S330).Wherein, in order to the cutting of equivalent packed data, produce second cutting data according to the length of the first fixed data amount.Server end will more add the first information and second information (step S340) in second cutting data.Wherein, the first information has passed through encryption in order to write down this one second cutting data; Second information is in order to write down the effective length of packed data.Second cutting data is carried out encipheror, in order to produce a plurality of encrypted datas (step S350).Wherein, encrypted data is deposited encryption buffering area 215.
Transmit encrypted data to distance host (step S360), and encrypted data is deposited to decrypted buffer 223.Be decrypted program by distance host, in order to encrypted data being reduced into second cutting data (step S370).It should be noted that and when the data volume of encrypted data reaches the second fixed data amount, then encrypted data is decrypted program 222, in order to obtain second cutting data.
Second cutting data is carried out gunzip, in order to be reduced into packed data (step S380).Packed data is carried out gunzip, it is reduced into first cutting data (step S390).Specifically, when the data volume of being exported when gunzip 212 meets the first fixed data amount, then it is saved as first cutting data.Then, first cutting data of recombinating is reduced into test data (step S400).According to test data, carry out test program in order to terminal equipment is tested (step S410) by distance host.Distance host is more in order to the test report of receiving terminal apparatus, and test report is returned to server end (step S420).
For clearly demonstrating the course of work of the present invention, below state bright conduct and explain, but do not limit wherein parameter, only chat bright earlier at this.Please refer to shown in Fig. 4 A, it is the transfer structure figure of a kind of embodiment of the present invention.Left at Fig. 4 A is a server end 210; Right-hand is distance host 220.
When the packed data in first compressed buffer 214 reached the first fixed data amount, server end 210 was understood second cutting data that is cut into of packed data segmentation, and second cutting data is deposited to encrypting buffering area 215.Please cooperate shown in Fig. 4 D, it is for producing the schematic diagram of second cutting data.At this of particular note, server end 210 can will more add the first information and second information in second cutting data.Length at this hypothesis first information is 4kbytes; The length of second information is 4Kbytes.Please cooperate shown in Fig. 4 E, it is the form schematic diagram that second cutting data adds the first information and second information.When second cutting data in encrypting buffering area 215 reached the first fixed data amount, server end 210 can carry out the processing of encipheror 213 with second cutting data, in order to produce encrypted data.Please cooperate shown in Fig. 4 F, it is for producing the schematic diagram of encrypted data.
Then, server end 210 can be sent to distance host 220 with encrypted data.Distance host 220 can be deposited encrypted data to decrypted buffer 223.When the capacity of encrypted data reached the second fixed data amount, 220 of distance hosts were decrypted encrypted data program 222 and revert back second cutting data.Because more added the first information and second information in the encrypted data, therefore the second fixed data amount is set at 1032Kbytes.Please cooperate shown in Fig. 4 G, it is the schematic diagram of reduction second cutting data.
After distance host 220 was finished the reduction processing of encrypted data again, distance host 220 can be carried out test program 225 according to test data 211.The terminal equipment 230 that distance host 220 begins it is connected is tested.After finishing test program 225, distance host 220 is understood the test report of receiving terminal apparatus 230, and test report is returned to server end 210.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (6)
1. a communication encrypting method of supporting remote monitoring and controlling system transmits a test data between a server end and a distance host, it is characterized in that this encryption method may further comprise the steps:
According to the length of one first fixed data amount this test data of cutting, produce a plurality of first cutting datas in order to equivalent;
In regular turn described first cutting data is carried out a condensing routine, will produce a packed data after its result combinations, and described packed data is deposited to one first compressed buffer;
Described packed data is cut into a plurality of second cutting datas of many fixed data length, and described second cutting data is deposited one encrypt buffering area;
Described second cutting data is carried out this encipheror, in order to produce a plurality of encrypted datas;
Transmit described encrypted data to this distance host, and described encrypted data is deposited to a decrypted buffer;
Carry out a decrypted program by this distance host, in order to described encrypted data is reduced into this second cutting data;
Make up described second cutting data, in order to be reduced into this packed data;
To this packed data carry out this gunzip, it is reduced into described first cutting data, and described first cutting data is deposited to one second compressed buffer;
Described first cutting data of recombinating is reduced into this test data; And
According to this test data, carry out a test program in order to described terminal equipment is tested by this distance host.
2. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, it is preceding further comprising the steps of that this server end transmits this encrypted data:
A first information and one second information will more be added in this encrypted data.
3. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, this communication network is a virtual private networks.
4. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, and is further comprising the steps of in being reduced into this second cutting data:
When the capacity of this encrypted data reaches one second fixed data amount, then this encrypted data is carried out this decrypted program, in order to obtain this second cutting data.
5. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, this is further comprising the steps of in process of packed data being reduced into:
When the data volume of exporting when this gunzip meets one first fixed data amount, then it is saved as this first cutting data.
6. the communication encrypting method of support remote monitoring and controlling system according to claim 1 is characterized in that, this terminal equipment is finished after the described test data further comprising the steps of again:
This distance host is also in order to receiving a test report of described terminal equipment, and described test report is returned to this server end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810172745A CN101741629A (en) | 2008-11-11 | 2008-11-11 | Communication encryption method supporting remote monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810172745A CN101741629A (en) | 2008-11-11 | 2008-11-11 | Communication encryption method supporting remote monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101741629A true CN101741629A (en) | 2010-06-16 |
Family
ID=42464563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810172745A Pending CN101741629A (en) | 2008-11-11 | 2008-11-11 | Communication encryption method supporting remote monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101741629A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957504A (en) * | 2014-04-21 | 2014-07-30 | 百度在线网络技术(北京)有限公司 | Positioning service assessment method, device and system |
CN104734723A (en) * | 2015-03-10 | 2015-06-24 | 中国人民解放军信息工程大学 | Data conversion method based on compression and scrambling |
CN106817367A (en) * | 2017-01-03 | 2017-06-09 | 深圳市沃特玛电池有限公司 | A kind of data transmission method and system |
-
2008
- 2008-11-11 CN CN200810172745A patent/CN101741629A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103957504A (en) * | 2014-04-21 | 2014-07-30 | 百度在线网络技术(北京)有限公司 | Positioning service assessment method, device and system |
CN103957504B (en) * | 2014-04-21 | 2018-05-04 | 百度在线网络技术(北京)有限公司 | Positioning service appraisal procedure, apparatus and system |
CN104734723A (en) * | 2015-03-10 | 2015-06-24 | 中国人民解放军信息工程大学 | Data conversion method based on compression and scrambling |
CN106817367A (en) * | 2017-01-03 | 2017-06-09 | 深圳市沃特玛电池有限公司 | A kind of data transmission method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2019537871A5 (en) | ||
CN105791245B (en) | A kind of data sending, receiving method and device | |
CN110287041B (en) | Service data sending method, device, equipment and storage medium | |
CN105634737A (en) | Data transmission method, terminals and system thereof | |
CN105025102B (en) | The network storage call method and storage system of a kind of 3D printing model file | |
CN103716056B (en) | Data compression method, uncompressing data and equipment | |
CN107070942A (en) | A kind of data security method and related system | |
CN106789876A (en) | The authentication method and its device of a kind of cloud terminal server | |
CN104219298A (en) | Cluster system and data backup method thereof | |
CN105354505A (en) | Image adaption method and electronic device | |
CN108833443A (en) | A kind of method for message transmission and system, computer equipment | |
CN101741629A (en) | Communication encryption method supporting remote monitoring system | |
CN104123244A (en) | USB redirection system and method | |
CN104113510A (en) | Virtual desktop system and message data transmitting method thereof | |
CN109710502A (en) | Log transmission method, apparatus and storage medium | |
CN110598427B (en) | Data processing method, system and storage medium | |
CN103220260B (en) | The more method of new data, server, client and system | |
CN106790359A (en) | A kind of distributed multiterminal data transmission synchronization system and method | |
CN104079368B (en) | A kind of the test data transmission method and server of application software | |
KR102425039B1 (en) | Apparatus and method for compressing data in distributed deep-learning environment | |
CN115277684A (en) | File transmission method, device, equipment and storage medium | |
CN106060801B (en) | Data communication method, device and system based on Wi-Fi device | |
CN111506913B (en) | Audio encryption method and device, storage medium and electronic device | |
CN107707599A (en) | A kind of method and device of Internet of Things communication equipment transmission file | |
CN113626848A (en) | Sample data generation method and device, electronic equipment and computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100616 |