CN101877849A - Communication method between wireless module and external equipment - Google Patents

Communication method between wireless module and external equipment Download PDF

Info

Publication number
CN101877849A
CN101877849A CN2009101115783A CN200910111578A CN101877849A CN 101877849 A CN101877849 A CN 101877849A CN 2009101115783 A CN2009101115783 A CN 2009101115783A CN 200910111578 A CN200910111578 A CN 200910111578A CN 101877849 A CN101877849 A CN 101877849A
Authority
CN
China
Prior art keywords
wireless module
external equipment
communication
party
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101115783A
Other languages
Chinese (zh)
Inventor
张利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Star Net Communication Co Ltd
Original Assignee
Fujian Star Net Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Star Net Communication Co Ltd filed Critical Fujian Star Net Communication Co Ltd
Priority to CN2009101115783A priority Critical patent/CN101877849A/en
Publication of CN101877849A publication Critical patent/CN101877849A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to a communication method between a wireless module and external equipment, i.e. the communication data between the wireless module and the external equipment is transmitted after encryption which uses a symmetric mode or an asymmetric mode and is realized by using an AT command. The communication method between the wireless module and the external equipment has the advantages of effectively improving the security of the wireless module, supporting an AT instruction interface to transmit keys, data and instructions for communication, having good commonality and convenient transplant, encrypting communication data and not increasing hardware cost of wireless modules.

Description

The method of communication between wireless module and the external equipment
[technical field]
The invention relates to field of wireless communication, be meant the method for communication between a kind of wireless module and the external equipment especially.
[background technology]
In field of wireless communication, along with the application of wireless module more and more widely.The fail safe of the communication data of wireless module and external equipment is also more and more important.But existing wireless module and external equipment are (as PC, what communication was adopted MCU etc.) is communication modes expressly, illegality equipment can pass through the communication line of monitoring wireless module and external equipment (such as serial ports, USB, SPI etc.) obtain the content of communication, make the fail safe of wireless module reduce greatly.The AT order is one of the most frequently used interface of wireless module and external equipment communication.
In field of wireless communication, the legitimacy that needs to identify the communication two party identity is often arranged.Such as, PC need identify the legitimacy of wireless module, identifies the legitimacy of the SIM card of inserting etc.But adopt mode expressly to transmit relevant command operation, the possibility that makes communication data be cracked increases greatly.
The current data cryptographic algorithm is through years development, and is quite ripe, can be divided three classes encryption by the relative program type of key and encryption:
1, hash-coding is promptly obtained the process of the hashed value of certain message, common cryptographic algorithm such as MD5, SHA, MAC, CRC etc. with hashing algorithm.In the hash-coding, can increase encryption key as required.
2, symmetric cryptography only carries out encryption and decryption with a cipher key pair information.The characteristics of symmetric encipherment algorithm are that algorithm is open, amount of calculation is little, enciphering rate is fast, encryption efficiency is high.Weak point is, both parties use same key, and fail safe can not get guaranteeing.Common algorithm has DES, 3DES, IDEA, RC2, RC4, RC5.
3, asymmetric encryption, i.e. public key encryption.Compare symmetric cryptography following some advantages are arranged: it is very little to carry out the required cipher key combinations quantity of security information transmission between many people; PKI does not have special issue requirement, can disclose on the net; Can realize digital signature, shortcoming be speed slowly many.Common symmetric encipherment algorithm has: RSA, DSA, elliptic curve cryptography, Diffe Hellman etc.
To sum up, existing wireless module does not have encipherment protection to the data of communication, identifies the legitimacy of communication two party identity if desired, usually comes the legitimacy of identity between the identification module by command interaction repeatedly, has following shortcoming:
1, communication data is not encrypted, and is monitored easily and analyzes, and cracks;
2, the fail safe of module can't be improved, the high product design needs of safety requirements can not be satisfied;
3, the data of communication are forged by illegality equipment easily.
[summary of the invention]
Technical problem to be solved by this invention is to provide the method for communication between a kind of wireless module and the external equipment, and the communication data between encrypting module and the external equipment adopts the ciphertext transmission, the fail safe that effectively improves wireless module between the external equipment.
The present invention solves the problems of the technologies described above by the following technical programs: the method for communication between a kind of wireless module and the external equipment, promptly the communication data between wireless module and the external equipment transmitted by encrypting afterwards.
This invention further is specially:
Described encryption adopts symmetric mode to encrypt, preset encryption key in wireless module inside, external equipment adopts the encryption key inner same with wireless module, and when carrying out communication between wireless module and the external equipment both sides, adopting in advance, the key of agreement carries out encrypting and decrypting.When needs were revised encryption key, external equipment was revised encryption key by the AT order of wireless module.
Described encryption also can be adopted asymmetric encryption, the generation side that at first arranges PKI and private key is a first party, the generation of described PKI and private key can be to be wireless module, it also can be external equipment, then an other side of communication is a second party, and promptly when first party was wireless module, second party was an external equipment, when first party is external equipment, second party is a wireless module, produces at random PKI and private key by first party, and PKI is transferred to second party, first party sends data if desired, with private key data are encrypted, the ciphertext after encrypting is transferred to second party, second party receives the ciphertext after the encryption, with PKI data are deciphered, second party sends data if desired, with PKI data is encrypted, and the ciphertext after encrypting is transferred to first party, after first party is received enciphered data, data are decrypted with private key.Described wireless module can preset PKI when producing in wireless module.
Described encryption also can be adopted hash-coding, when wireless module is produced, at first select a kind of hashing algorithm and key, the username and password hashing algorithm that will be used for authentication, be calculated to be corresponding hashed value and write wireless module, external equipment before communication with corresponding hashing algorithm and password, calculate the hashed value of the username and password of user's input, result of calculation is transferred to wireless module, whether wireless module is consistent with the data contrast of data that receive and preservation, and whether promptly judge external equipment legal.
Described encryption adopts the AT order to realize.
The advantage of the method for communication is between wireless module of the present invention and the external equipment:
1, effectively improve the fail safe of wireless module, and encryption strength is good, can selects the cryptographic algorithm of varying strength as required;
2, support key, data and the instruction that the AT command interface comes transmission communication, versatility is good, the convenient transplanting;
3, encryption communication data do not increase the wireless module hardware cost.
[embodiment]
The communication data of wireless module and external equipment comprises the AT order, by encrypting transmission afterwards, guarantees the fail safe of communication data.
Illustrate below the concrete grammar that communication data is encrypted.
Embodiment one:
Symmetric mode is encrypted: preset encryption key in wireless module inside, external equipment adopts same encryption key, and when carrying out communication between wireless module and the external equipment both sides, adopting in advance, the key of agreement carries out encrypting and decrypting.Key not be used in the communication and transmits, fast operation, and the complexity of realization is little.After being provided with the encryption enabled communication function, wireless module adopts identical cryptographic algorithm and key that data are carried out the encrypting and decrypting communication with external equipment.
Can adopt following step to carry out symmetric cryptography, but be not limited to this a kind of implementation.
1, the initial encryption key presets, and when wireless module generates, presets encryption key in wireless module, and external equipment adopts and the same encryption key of wireless module;
2, when needs are revised encryption key, external equipment can be revised encryption key by the AT order of wireless module;
3, transmission and recipient are by the ciphertext transmission communication.
Embodiment two:
Asymmetric encryption: the side (wireless module or external equipment) by communication, abbreviate A as, produce at random PKI and private key, and PKI is transferred to the other side of communication, abbreviate B (wireless module or external equipment) as.In the subsequent communications process, A encrypts communication data with private key, and the ciphertext after encrypting is transferred to B.B receives the ciphertext after the encryption, with PKI data is deciphered.B sends data if desired, with PKI data is encrypted, and after A receives enciphered data, with private key data is decrypted.
Can adopt following step to carry out asymmetric encryption, but be not limited to this a kind of implementation.
1, generate PKI and private key, generation side's (can be wireless module, also can be external equipment) of agreement PKI and private key is A, and an other side of communication is B;
2, PKI notice change, A passes to B by the mode of order with PKI, also can preset PKI when wireless module is produced in wireless module;
3, A encrypts data with private key, sends to B, and B deciphers data with PKI;
4, B encrypts data with PKI, sends to A, and A deciphers data with private key.
Embodiment three:
Hash-coding: when wireless module is produced, at first select a kind of hashing algorithm and key.The username and password hashing algorithm that will be used for authentication is calculated to be corresponding hashed value and writes wireless module.External equipment before communication with corresponding hashing algorithm and password, calculate the hashed value of the username and password of user's input, result of calculation is transferred to wireless module, and whether wireless module is consistent with the data contrast of data that receive and preservation, and whether can judge external equipment legal.
In this example:
The username and password of user input transmission the time standby hashed value mode transmit.Do not expose original clear data, fail safe is good.
2. if in the transmission course, data are modified.Data that wireless module is received value inevitable and that preserve is inconsistent, played data and prevented the effect of being distorted.
The foregoing description, the AT in all available following form orders and realizes, but is not limited only to the definition of following AT order, also can adopt the mode that has other now key to be set, to enable and to close the data encryption pattern, and encrypted data transmission.
The AT order Functional description
??AT+KEY Encrypted secret key is set, and can be the PKI of symmetric key and unsymmetrical key
??AT+ENCY Enable and close the data encryption pattern
??AT+DATA Encrypted data transmission
In the present invention, can select relevant algorithm according to actual product to the fail safe of encryption and the characteristics of application, as above-mentioned hash-coding, symmetric cryptography, and asymmetric encryption etc., support of the present invention includes but are not limited to above algorithm.
Though more than described the specific embodiment of the present invention; but being familiar with those skilled in the art is to be understood that; our described specific embodiment is illustrative; rather than be used for qualification to scope of the present invention; those of ordinary skill in the art are in the modification and the variation of the equivalence of doing according to spirit of the present invention, all should be encompassed in the scope that claim of the present invention protects.

Claims (7)

1. the method for communication between wireless module and the external equipment is characterized in that: the communication data between wireless module and the external equipment, and by encrypting transmission afterwards.
2. the method for communication between wireless module as claimed in claim 1 and the external equipment, it is characterized in that: described encryption adopts symmetric mode to encrypt, preset encryption key in wireless module inside, external equipment adopts the encryption key inner same with wireless module, when carrying out communication between wireless module and the external equipment both sides, adopting in advance, the key of agreement carries out encrypting and decrypting.
3. the method for communication between wireless module as claimed in claim 2 and the external equipment is characterized in that: when needs were revised encryption key, external equipment was revised encryption key by the AT order of wireless module.
4. the method for communication between wireless module as claimed in claim 1 and the external equipment, it is characterized in that: asymmetric encryption is adopted in described encryption, the generation side that at first arranges PKI and private key is a first party, the generation of described PKI and private key can be to be wireless module, it also can be external equipment, then an other side of communication is a second party, promptly when first party is wireless module, second party is an external equipment, and when first party was external equipment, second party was a wireless module, by first party generation PKI and private key at random, and PKI is transferred to second party, first party sends data if desired, with private key data is encrypted, ciphertext after encrypting is transferred to second party, second party receives the ciphertext after the encryption, with PKI data is deciphered, and second party sends data if desired, with PKI data are encrypted, ciphertext after encrypting is transferred to first party, after first party is received enciphered data, data is decrypted with private key.
5. the method for communication between wireless module as claimed in claim 4 and the external equipment is characterized in that: described wireless module presets PKI in wireless module when producing.
6. the method for communication between wireless module as claimed in claim 1 and the external equipment, it is characterized in that: hash-coding is adopted in described encryption, when wireless module is produced, at first select a kind of hashing algorithm and key, the username and password hashing algorithm that will be used for authentication, be calculated to be corresponding hashed value and write wireless module, external equipment before communication with corresponding hashing algorithm and password, calculate the hashed value of the username and password of user's input, result of calculation is transferred to wireless module, whether wireless module is consistent with the data contrast of data that receive and preservation, and whether promptly judge external equipment legal.
7. as the method for communication between claim 2,4 or 6 each described wireless modules and the external equipment, it is characterized in that: described encryption adopts the AT order to realize.
CN2009101115783A 2009-04-28 2009-04-28 Communication method between wireless module and external equipment Pending CN101877849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101115783A CN101877849A (en) 2009-04-28 2009-04-28 Communication method between wireless module and external equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101115783A CN101877849A (en) 2009-04-28 2009-04-28 Communication method between wireless module and external equipment

Publications (1)

Publication Number Publication Date
CN101877849A true CN101877849A (en) 2010-11-03

Family

ID=43020292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101115783A Pending CN101877849A (en) 2009-04-28 2009-04-28 Communication method between wireless module and external equipment

Country Status (1)

Country Link
CN (1) CN101877849A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016184183A1 (en) * 2015-10-10 2016-11-24 中兴通讯股份有限公司 Wireless communication base station, data transmission and reception method, terminal and storage medium
CN108601016A (en) * 2017-09-26 2018-09-28 深圳普创天信科技发展有限公司 A kind of production of soft SIM card, use, processing method and processing device
CN109408421A (en) * 2017-08-15 2019-03-01 上海锆智电子科技有限公司 A kind of data communication apparatus
CN110012468A (en) * 2019-06-06 2019-07-12 成都鼎桥通信技术有限公司 A kind of secure access authentication method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016184183A1 (en) * 2015-10-10 2016-11-24 中兴通讯股份有限公司 Wireless communication base station, data transmission and reception method, terminal and storage medium
CN106572061A (en) * 2015-10-10 2017-04-19 中兴通讯股份有限公司 Wireless communication base station and data sending method thereof, and terminal and data reception thereof
CN109408421A (en) * 2017-08-15 2019-03-01 上海锆智电子科技有限公司 A kind of data communication apparatus
CN108601016A (en) * 2017-09-26 2018-09-28 深圳普创天信科技发展有限公司 A kind of production of soft SIM card, use, processing method and processing device
CN108601016B (en) * 2017-09-26 2019-07-02 深圳普创天信科技发展有限公司 A kind of production of soft SIM card, use, processing method and processing device
CN110012468A (en) * 2019-06-06 2019-07-12 成都鼎桥通信技术有限公司 A kind of secure access authentication method and system

Similar Documents

Publication Publication Date Title
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN104821944A (en) Hybrid encrypted network data security method and system
CN102025505A (en) Advanced encryption standard (AES) algorithm-based encryption/decryption method and device
CN105447407A (en) Off-line data encryption method and decryption method and corresponding apparatus and system
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
GB2442546B (en) Authenticated encryption method and apparatus
CN105281909A (en) Encryption and decryption mechanism and internet of things lock system using encryption and decryption mechanism
WO2016058404A1 (en) Entity authentication method and device based on pre-shared key
CN102387152A (en) Preset-key-based symmetric encryption communication method
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN113285959A (en) Mail encryption method, decryption method and encryption and decryption system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN114826656A (en) Trusted data link transmission method and system
CN102111416A (en) Real time data encryption transmission method for voice over internet protocol (VoIP)
CN113312608B (en) Electric power metering terminal identity authentication method and system based on time stamp
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN102833260A (en) Password authentication method for internet of things by adopting security one-key management technology
CN102404120A (en) Encryption method and encryption system for electronic documents
CN102903226B (en) Data transmission method for communication of intelligent electric meters
CN113300842B (en) Method for improving security of symmetric encryption algorithm
CN102916810A (en) Method, system and apparatus for authenticating sensor
CN111049738A (en) E-mail data security protection method based on hybrid encryption
CN101877849A (en) Communication method between wireless module and external equipment
CN102281303A (en) Data exchange method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101103