CN106572061A - Wireless communication base station and data sending method thereof, and terminal and data reception thereof - Google Patents

Wireless communication base station and data sending method thereof, and terminal and data reception thereof Download PDF

Info

Publication number
CN106572061A
CN106572061A CN201510653899.1A CN201510653899A CN106572061A CN 106572061 A CN106572061 A CN 106572061A CN 201510653899 A CN201510653899 A CN 201510653899A CN 106572061 A CN106572061 A CN 106572061A
Authority
CN
China
Prior art keywords
serial data
data
encryption
serial
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510653899.1A
Other languages
Chinese (zh)
Inventor
管连才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510653899.1A priority Critical patent/CN106572061A/en
Priority to PCT/CN2016/073851 priority patent/WO2016184183A1/en
Publication of CN106572061A publication Critical patent/CN106572061A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wireless communication base station and a data sending method thereof, and a terminal and a data reception thereof. Serial port data satisfying preset transmission conditions is cached, and the serial port data is the data which is emitted by a central processor and is transmitted out through a serial port; the serial port data after caching is encrypted; the encrypted serial port data is transmitted out through the serial port; the serial port data after encryption is received; the encrypted serial port data is decrypted, so the serial data transmitted between the wireless communication base station and the terminal is made to be safer and more stable, and serial port data transmission safety is improved. Risks caused by exposure of the serial port of the base station can be avoided, and safety problems generated in a wireless communication base station serial port data transmission process in the prior art are solved.

Description

Radio communication base station and its data transmission method for uplink, terminal and its data receiver method
Technical field
The present invention relates to the communications field, more particularly to a kind of radio communication base station and its data transmission method for uplink, end End and its data receiver method.
Background technology
With the high speed development of wireless communication technology, and the appearance band of substantial amounts of intelligent mobile phone terminal give people it is right In the demand of mobile high speed internet, Long Term Evolution (Long Term Evolution, LTE) conduct Forth generation mobile communication technology because its faster mobile broadband connection speed increasingly by global operator and The welcome and application popularization of mobile client.Mobile broadband connection is ubiquitous, and the thing followed is the peace of base station Full property receives more threats, in radio communication base station field, particularly with winged honeycomb (Femtocell) Such family's level base station products.From unlike Incumbent equipment, Femtocell is a client Equipment, is eventually placed in the family of user, and the uncontrollable user of operator disassembles to which or the behaviour such as reequips Make, this just increase Femtocell equipment itself by risk of attacks.
Femtocell withs a hook at the end base station transmitting serial port, port of the serial ports as a kind of single plate hardware more bottom And exist, while the data of Serial Port Transmission are direct plaintext transmissions, not through encryption.Go here and there base station Mouth outgoi8ng data is related with inside of base station relevant information, it might even be possible to log in the kernel of base station by serial ports , if utilized by crime of illegal collecting and supplying blood, will there are great security breaches in linux system.For example, using one After display terminal such as personal computer (personal computer, PC) connection serial ports, can just directly obtain This Serial Port Transmission data, is input into some commonly used commands, you can to obtain and change inside of base station information etc., peace Full property is very risky.
The content of the invention
The main technical problem to be solved in the present invention is to provide a kind of radio communication base station and its data sender Method, terminal and its data receiver method, solve serial data present in prior art in radio communication base station Safety problem and defect between terminal in transmitting procedure.
To solve above-mentioned technical problem, the present invention provides a kind of radio communication base station data transmission method for uplink, including: Serial data to meeting default transmission conditions is cached, serial data be sent by central processing unit and The data for wanting Jing serial ports to spread out of;Serial data after caching is encrypted;By the serial data Jing after encryption Serial ports spreads out of.
In an embodiment of the present invention, caching is carried out to serial data to be included after serial data cutting points Block is cached.
In an embodiment of the present invention, the method for cutting serial data includes any one in the following manner Kind:Cutting is carried out to serial data every certain time interval;Every certain data length to serial ports number According to carrying out cutting.
In an embodiment of the present invention, serial data is encrypted including:Encryption key is obtained, and The serial data piecemeal that piecemeal is cached is encrypted by encryption key.
In an embodiment of the present invention, public key of the encryption key for rivest, shamir, adelman.
In an embodiment of the present invention, the serial ports to meeting default transmission conditions carries out caching includes: Judge whether serial data meets default transmission conditions, the serial ports number to meeting the default transmission conditions Cached according to piecemeal;Default transmission conditions are:Central processing unit has serial data to spread out of, while serial ports Line has connected and electricity is gone up at two ends.
The present invention provides a kind of terminal data method of reseptance, including:Receive the serial data after encryption, serial ports Data are to be sent and wanted by central processing unit the data that Jing serial ports spreads out of;Serial data after encryption is solved It is close.
In an embodiment of the present invention, the serial data after encryption is decrypted including:Obtain decryption When key, serial data after block encryption is received, serial data piecemeal is carried out by decruption key Decryption;After being decrypted to serial data piecemeal, the serial data after also including decrypting piecemeal is merged.
In an embodiment of the present invention, private key of the decruption key for rivest, shamir, adelman.
The present invention provides a kind of radio communication base station, including:Cache module, cache module is for pre- to meeting If the serial data of transmission conditions cached, serial data is to be sent to need Jing serial ports to pass by central processing unit The data for going out;Encrypting module, encrypting module is for being encrypted to the serial data after caching;Sending module, The sending module is for the serial data Jing serial ports after encryption is spread out of.
In an embodiment of the present invention, encrypting module includes first key acquisition submodule and encryption submodule Block, first key acquisition submodule are used to obtain encryption key, and encryption submodule is used for when cache module piecemeal During caching serial data, serial data piecemeal is encrypted by encryption key.
In an embodiment of the present invention, cache module includes judging submodule and cache sub-module, judges Submodule is used to judge whether serial data meets default transmission conditions that cache sub-module to be for pre- to meeting If the serial data piecemeal of transmission conditions cached;Default transmission conditions are:Central processing unit has string Mouth data spread out of, while Serial Port Line has connected and electricity is gone up at two ends.
The present invention provides a kind of terminal, it is characterised in that include:Receiver module, receiver module are used to receive Serial data after encryption;Deciphering module, deciphering module is for being decrypted to the serial data after encryption.
In an embodiment of the present invention, deciphering module includes the second key acquisition submodule and decryption submodule Block, the second key acquisition submodule are used to obtain decruption key, and decryption submodule is used to receive when receiver module During the serial data to after block encryption, serial data piecemeal is decrypted by decruption key;Eventually End also includes processing module, and processing module is merged for the serial data after piecemeal is decrypted.
The invention has the beneficial effects as follows:The present invention provide a kind of radio communication base station and its data transmission method for uplink, Terminal and its data receiver method, are encrypted to communication base station serial data before transmission, and terminal is received Again which is decrypted after serial data after encryption, has reached the transmission of communication base station serial data safer more Stable effect, improves the safety of serial data transmission, it is to avoid produce because base station serial ports exposes Risk leak.
Description of the drawings
Radio communication base station data transmission method for uplink flow charts of the Fig. 1 for the embodiment of the present invention one;
Radio communication base station data receiver method flow charts of the Fig. 2 for the embodiment of the present invention two;
Radio communication base station schematic diagrams of the Fig. 3 for the embodiment of the present invention three;
Fig. 4 is cache module schematic diagram in the embodiment of the present invention three;
Fig. 5 is encrypting module schematic diagram in the embodiment of the present invention three;
Fig. 6 is terminal schematic diagram in the embodiment of the present invention four;
Fig. 7 is another terminal schematic diagram in the embodiment of the present invention four.
Specific embodiment
Accompanying drawing is combined below by specific embodiment to be described in further detail the present invention.
Embodiment one:
The present embodiment provides a kind of radio communication base station data transmission method for uplink, refer to Fig. 1, specifically includes as follows Several steps:
Step S101:Serial data to meeting default transmission conditions is cached, and the serial data is The data for being sent and wanted by central processing unit Jing serial ports to spread out of;
Before being encrypted to serial data, the serial data to meeting default transmission conditions is needed to cache, Serial data is to be sent and wanted by central processing unit the data that Jing serial ports spreads out of;Default transmission conditions are:In Central processor has serial data to spread out of, while Serial Port Line has connected and electricity is gone up at two ends;Specially real-time monitoring Whether base station single-board central processing unit (Central Processing Unit, CPU) sends out serial data, If monitoring, base station single-board CPU has sent out serial data, and now base station serial port data line connects And electricity has all been gone up at two ends, it is considered as the serial data that base station single-board CPU sends and wants Jing serial ports to spread out of, now delay Deposit the serial data.
During caching serial data, piecemeal after serial data cutting can be cached, its specific cutting side Method can according to the time cutting is carried out to the serial data every certain time interval, it is preferred that to exempt from Spatial cache takes the encryption of excessive or a large amount of serial datas affects efficiency, can be with per second to serial ports number According to carrying out a cutting, it is also possible to the serial data is carried out every certain data length according to data length Cutting.It is during caching serial data, corresponding, the serial data piecemeal after piecemeal is cached, it is preferred that To caching by the serial data piecemeal of cutting per second, above-mentioned caching is all temporal cache.It should be understood that It is that slit mode is not limited in above two slit mode.
Step S102:Serial data after caching is encrypted;
After having cached the serial data that will be spread out of, the serial data is encrypted, corresponding to aforementioned serial ports The cache way of data, is encrypted to the serial data piecemeal of piecemeal caching when encrypting serial data, can be with To being encrypted every the serial data of caching every certain time interval piecemeal, and can be to every certain The serial data of data length piecemeal caching is encrypted.Serial data is encrypted close including encryption is obtained Key, and the serial data piecemeal that piecemeal is cached is encrypted by encryption key.The mode of encryption can be It is encrypted using rivest, shamir, adelman, the encryption key of acquisition is the public key of rivest, shamir, adelman; The present embodiment combines the less feature of serial data speed, peak transfer rate in 100KBps or so, preferably The safer rivest, shamir, adelman of use, RSA Algorithm decrypted by public key encryption, private key, mutually compared Claim AES safer, it more difficult to crack;Additionally, due to serial data data volume itself it is little the characteristics of, adopt Rivest, shamir, adelman realizes encryption and the efficiency difference nothing decrypted compared with using both symmetric encipherment algorithms It is several.Specially obtain the public key of asymmetric arithmetic RSA and store, serial data is carried out adding using the public key It is close, during encryption can to it is per second it is data cached be encrypted, after the completion of encryption, by the serial ports number after encryption Spread out of according to Jing serial ports.It should be appreciated that cipher mode is not limited in above-mentioned cipher mode.
It should be noted that the public key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces, Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is used to encrypt serial data, and private key is used Serial data after decryption encryption.
In addition, in order to avoid the situation that encryption key is invalid or loses, can preferably regularly update encryption close Key, can periodically change the encryption key manually, it is also possible to arrange intervalometer so as to which self-timing updates.
Step S103:Serial data Jing serial ports after encryption is spread out of;
Serial data Jing serial ports after encryption spreads out of, and outwards spreads out of specifically by Serial Port Line.
Using the radio communication base station data transmission method for uplink in the present embodiment, fundamentally ensure base station serial ports number According to the safety in transmitting procedure, serial data passes through public key value encryption before outwards spreading out of, even if Cracker can obtain the serial data of base station, but because there is no the private key value that can be decrypted, can not Obtain the related information of any inside of base station.
Embodiment two:
The present embodiment provides a kind of terminal data method of reseptance, refer to Fig. 2, specifically includes following several steps:
Step S201:Receive encryption after serial data, the serial data be sent by central processing unit and The data for wanting Jing serial ports to spread out of;
Receive the serial data after encryption and specially receive the serial data Jing after the block encryption that serial ports spreads out of.
Step S202:Serial data after encryption is decrypted;
Serial data after encryption is decrypted including the decruption key obtained needed for decryption, it is close by decrypting Key piecemeal is decrypted to serial data, and the decruption key is corresponding with encryption key;Corresponding to embodiment One, the present embodiment is preferably decrypted using rivest, shamir, adelman RSA Algorithm, specially obtains non-right Claim the private key of algorithm RSA and store, then the serial data piecemeal after the private key pair encryption is decrypted. After serial data piecemeal is decrypted, the serial data after also including decrypting piecemeal is merged, and will be closed And after serial data be displayed in terminal.
It should be noted that the private key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces, Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is used to encrypt serial data, and private key is used Serial data after decryption encryption.
In addition, in order to avoid the situation that encryption key is invalid or loses, it is close with encryption is regularly updated accordingly Key, it is also desirable to regularly update decruption key, can equally be periodically to change the decruption key manually, it is also possible to Intervalometer is set so as to which self-timing updates.
It is especially noted that the storage of private key is paid particular attention to during use, prevent and divulge a secret Accident.
Using the terminal data method of reseptance in the present embodiment, fundamentally ensure base station serial data in transmission Safety to terminal during, serial data pass through public key value encryption before transmission, even if illegally Effractor can obtain the serial data of base station, but because not having the private key value that can be decrypted, can not obtain The related information of any inside of base station.
Embodiment three:
The present embodiment provides a kind of radio communication base station, refer to Fig. 3, specifically includes such as lower module:Caching mould Block 301 and encrypting module 302 and sending module 303.
Cache module 301 is cached for the serial data to meeting default transmission conditions, the serial ports number According to for the data for needing Jing serial ports to spread out of are sent by central processing unit, default transmission conditions are:Central processing unit There is serial data to spread out of, while Serial Port Line has connected and electricity is gone up at two ends;Refer to Fig. 4, cache module 301 Also include judging submodule 3011 and cache sub-module 3012, judging submodule 3011 is used to judge serial ports number According to whether the default transmission conditions are met, cache sub-module 3012 is for meeting the default transmission The serial data of condition is cached.Specially 3011 real-time monitoring base station single-board of judging submodule central authorities are processed Whether device sends out serial data, if monitoring, base station single-board CPU has sent out serial data, and Now base station serial port data line has connected and electricity has all been gone up at two ends, is considered as the serial ports that base station single-board CPU sends Data want Jing serial ports to spread out of.Association judging submodule 3011 and cache sub-module 3012, work as judging submodule 3011 detect the serial data that base station single-board CPU sends when wanting Jing serial ports to spread out of, and notify cache sub-module 3012 cache the serial data.
During caching serial data, piecemeal after serial data cutting can be cached, its specific cutting side Method can according to the time cutting is carried out to the serial data every certain time interval, it is preferred that to exempt from Spatial cache takes the encryption of excessive or a large amount of serial datas affects efficiency, can be with per second to serial ports number According to carrying out a cutting, it is also possible to the serial data is carried out every certain data length according to data length Cutting.During caching serial data, corresponding, cache sub-module 3012 is entered to the serial data piecemeal after cutting Row caching, it is preferred that to caching by the serial data piecemeal of cutting per second, above-mentioned caching is all interim Caching.It should be appreciated that slit mode is not limited in above two slit mode.
Encrypting module 302 for being encrypted to the serial data piecemeal after caching, corresponding to aforementioned serial ports number According to cache way, encrypt serial data when to piecemeal caching serial data piecemeal be encrypted, can be right Serial data every certain time interval piecemeal caching is encrypted, and can be to every certain data The serial data of length piecemeal caching is encrypted.Fig. 5 is referred to, encrypting module 302 includes that first key is obtained Submodule 3021 and encryption submodule 3022 are taken, it is close that first key acquisition submodule 3021 is used for acquisition encryption Key, encrypting submodule 3022 is used for by the encryption key of the acquisition of first key acquisition submodule 3021 to string Mouth deblocking is encrypted;Specially cache sub-module is encrypted to the serial data piecemeal after caching After 3012 piecemeals have cached the serial data that will be spread out of, encryption submodule 3022 pairs of serial datas point are notified Block is encrypted.The mode that encryption submodule 3022 is encrypted to serial data can be added using asymmetric Close algorithm for encryption, is encrypted to serial data by encryption key, and the encryption key is asymmetric encryption The public key of algorithm;The present embodiment combines the less feature of serial data speed, and peak transfer rate is in 100KBps Left and right, preferably using safer rivest, shamir, adelman, RSA Algorithm, by public key encryption, private key solution It is close, compare symmetric encipherment algorithm safer, it more difficult to crack;It is little additionally, due to serial data data volume itself Feature, using rivest, shamir, adelman compared with using both symmetric encipherment algorithms, realizes what is encrypted and decrypt Efficiency is very nearly the same.Specifically, first key acquisition submodule 3021 obtains rivest, shamir, adelman RSA In for encryption public key and store, encryption submodule 3022 serial data is encrypted using the public key, Preferably to being encrypted by the serial data piecemeal of caching per second during encryption, after the completion of encryption, after encrypting Serial data Jing serial ports spread out of.It should be appreciated that cipher mode is not limited in above-mentioned cipher mode.
It should be noted that the public key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces, Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is imported encrypting module, and private key is imported Deciphering module, public key are used to encrypt serial data, the serial data that private key is used for after decrypting encryption, to string Before mouthful data are encrypted, the private key in the public key and deciphering module in initialization encryption module is needed.
In addition, in order to avoid the situation that encryption key is invalid or loses, can preferably regularly update encryption close Key, can periodically change the encryption key manually, it is also possible to arrange intervalometer so as to which self-timing updates.
Sending module 303 for the serial data Jing serial ports after encryption is spread out of, specially sending module 303 Serial data after encryption is outwards spread out of by Serial Port Line.
Using the radio communication base station in the present embodiment, fundamentally ensure base station serial data in transmitting procedure In safety, serial data pass through before transmission public key value encryption, even if cracker can obtain The serial data of base station is taken, but because there is no the private key value that can be decrypted, any inside of base station can not be obtained Related information.
Example IV:
The present embodiment provides a kind of terminal, refer to Fig. 6, specifically includes receiver module 601 and deciphering module 602。
The serial data that receiver module 601 is used for after receiving encryption, the serial data is by central processing unit The data for sending and wanting Jing serial ports to spread out of;Serial data Jing after the encryption that serial ports spreads out of is received specially.
Deciphering module 602 refers to Fig. 7, deciphering module for being decrypted to the serial data after encryption 602 include the second key acquisition submodule 6021 and decryption submodule 6022, the second key acquisition submodule 6021 decrypt required decruption key, the decryption for obtaining before being decrypted to the serial data after encryption Key is corresponding with encryption key, and corresponding to embodiment one, the present embodiment is preferably calculated using asymmetric encryption Method RSA is decrypted, and specially the second key acquisition submodule 6021 obtains rivest, shamir, adelman RSA Private key and store, then decrypt submodule 6022 by the private key to the serial data piecemeal after block encryption It is decrypted.The terminal that the present embodiment is provided, also including processing module 603, processing module 603 is used to divide Serial data after block decryption is merged, and serial data is normally displayed in terminal after merging.
It should be noted that the private key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces, Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is used to encrypt serial data, and private key is used Serial data after decryption encryption.
In addition, in order to avoid the situation that encryption key is invalid or loses, it is close with encryption is regularly updated accordingly Key, it is also desirable to regularly update decruption key, can equally be periodically to change the decruption key manually, it is also possible to Intervalometer is set so as to which self-timing updates.
It is especially noted that the storage of private key is paid particular attention to during use, prevent and divulge a secret Accident.
Using the terminal in the present embodiment, fundamentally ensure peace of the base station serial data when terminal is transferred to Quan Xing, serial data pass through public key value encryption before transmission, even if cracker can obtain base station Serial data, but because there is no the private key value that can decrypt, any inside of base station can not be obtained related Information.
Above content is with reference to specific embodiment further description made for the present invention, it is impossible to recognized Being embodied as of the fixed present invention is confined to these explanations.For the ordinary skill of the technical field of the invention For personnel, without departing from the inventive concept of the premise, some simple deduction or replace can also be made, Protection scope of the present invention should be all considered as belonging to.

Claims (14)

1. a kind of radio communication base station data transmission method for uplink, it is characterised in that include:
Serial data to meeting default transmission conditions is cached, and the serial data is by central authorities' process Device sends and wants the data that Jing serial ports spreads out of;
The serial data after to caching is encrypted;
The serial data Jing serial ports after by encryption spreads out of.
2. radio communication base station data transmission method for uplink as claimed in claim 1, it is characterised in that right The serial data carries out caching to be included being cached piecemeal after the serial data cutting.
3. radio communication base station data transmission method for uplink as claimed in claim 2, it is characterised in that cut The method of point serial data includes any one in the following manner:
Cutting is carried out to the serial data every certain time interval;
Cutting is carried out to the serial data every certain data length.
4. radio communication base station data transmission method for uplink as claimed in claim 2 or claim 3, it is characterised in that The serial data is encrypted including:Encryption key is obtained, and it is slow to piecemeal by the encryption key The serial data piecemeal deposited is encrypted.
5. radio communication base station data transmission method for uplink as claimed in claim 4, it is characterised in that institute State the public key that encryption key is rivest, shamir, adelman.
6. the radio communication base station data transmission method for uplink as described in any one of claim 1-3, its feature It is that the described pair of serial data for meeting default transmission conditions carries out caching to be included:Judge the serial ports number According to whether meeting the default transmission conditions, the serial data to meeting the default transmission conditions Piecemeal is cached;The default transmission conditions are:Central processing unit has the serial data to spread out of, together When Serial Port Line connected and electricity is gone up at two ends.
7. a kind of terminal data method of reseptance, it is characterised in that include:
The serial data after encryption is received, the serial data is to be sent by central processing unit and want Jing serial ports to pass The data for going out;
The serial data after to encryption is decrypted.
8. terminal data method of reseptance as claimed in claim 7, it is characterised in that described pair of encryption The serial data afterwards be decrypted including:Decruption key is obtained, described in after block encryption is received During serial data, the serial data piecemeal is decrypted by the decruption key;By the serial ports number After being decrypted according to piecemeal, the serial data after also including decrypting piecemeal is merged.
9. terminal data method of reseptance as claimed in claim 8, it is characterised in that the decryption is close Private key of the key for rivest, shamir, adelman.
10. a kind of radio communication base station, it is characterised in that include:
Cache module, the cache module are cached for the serial data to meeting default transmission conditions, The serial data is that the data for needing Jing serial ports to spread out of are sent by central processing unit;
Encrypting module, the encrypting module are encrypted for the serial data after to caching;
Sending module, the sending module are spread out of for the serial data Jing serial ports after by encryption.
11. radio communication base stations as claimed in claim 10, it is characterised in that the encrypting module bag First key acquisition submodule and encryption submodule are included, the first key acquisition submodule is used to obtain encryption Key, the encryption submodule for when the cache module piecemeal cache the serial data when, by institute State encryption key to be encrypted the serial data piecemeal.
12. radio communication base stations as described in claim 10 or 11, it is characterised in that the caching Module includes judging submodule and cache sub-module, and the judging submodule is used to judge that the serial data is No to meet the default transmission conditions, the cache sub-module is for meeting the default transmission conditions The serial data piecemeal cached;The default transmission conditions are:Central processing unit has the string Mouth data spread out of, while Serial Port Line has connected and electricity is gone up at two ends.
13. a kind of terminals, it is characterised in that include:
Receiver module, the serial data that the receiver module is used for after receiving encryption, the serial data are served as reasons Central processing unit sends and wants the data that Jing serial ports spreads out of;
Deciphering module, the deciphering module are decrypted for the serial data after to encryption.
14. terminals as claimed in claim 13, it is characterised in that the deciphering module includes that second is close Key acquisition submodule and decryption submodule, the second key acquisition submodule are used to obtain decruption key, institute Decryption submodule is stated for when the receiver module receives the serial data after block encryption, passing through The decruption key is decrypted to the serial data piecemeal;The terminal also includes processing module, described Processing module is merged for the serial data after piecemeal is decrypted.
CN201510653899.1A 2015-10-10 2015-10-10 Wireless communication base station and data sending method thereof, and terminal and data reception thereof Pending CN106572061A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510653899.1A CN106572061A (en) 2015-10-10 2015-10-10 Wireless communication base station and data sending method thereof, and terminal and data reception thereof
PCT/CN2016/073851 WO2016184183A1 (en) 2015-10-10 2016-02-16 Wireless communication base station, data transmission and reception method, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510653899.1A CN106572061A (en) 2015-10-10 2015-10-10 Wireless communication base station and data sending method thereof, and terminal and data reception thereof

Publications (1)

Publication Number Publication Date
CN106572061A true CN106572061A (en) 2017-04-19

Family

ID=57319402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510653899.1A Pending CN106572061A (en) 2015-10-10 2015-10-10 Wireless communication base station and data sending method thereof, and terminal and data reception thereof

Country Status (2)

Country Link
CN (1) CN106572061A (en)
WO (1) WO2016184183A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1541016A (en) * 2003-10-24 2004-10-27 海信集团有限公司 Method of encrypting mobile terminals
EP2056542A1 (en) * 2007-10-29 2009-05-06 Panasonic Corporation Transmission power mask for fast access requests
CN101877849A (en) * 2009-04-28 2010-11-03 福建星网锐捷通讯股份有限公司 Communication method between wireless module and external equipment
CN102036232A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Method and device for transmitting and receiving base station data

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464337C (en) * 2006-09-05 2009-02-25 北京飞天诚信科技有限公司 Method and equipment for carrying out safety communication between USB device and host
CN101442739B (en) * 2007-11-20 2011-01-19 展讯通信(上海)有限公司 Method for protecting AT instruction
CN101494684A (en) * 2008-01-24 2009-07-29 北京汉潮大成科技孵化器有限公司 Mobile phone data backup device capable of communicating with serial encipher mobile phone
US9160974B2 (en) * 2009-08-26 2015-10-13 Sling Media, Inc. Systems and methods for transcoding and place shifting media content

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1541016A (en) * 2003-10-24 2004-10-27 海信集团有限公司 Method of encrypting mobile terminals
EP2056542A1 (en) * 2007-10-29 2009-05-06 Panasonic Corporation Transmission power mask for fast access requests
CN101877849A (en) * 2009-04-28 2010-11-03 福建星网锐捷通讯股份有限公司 Communication method between wireless module and external equipment
CN102036232A (en) * 2010-12-17 2011-04-27 中兴通讯股份有限公司 Method and device for transmitting and receiving base station data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张青凤等: "《信息存储安全理论与应用》", 30 September 2012 *

Also Published As

Publication number Publication date
WO2016184183A1 (en) 2016-11-24

Similar Documents

Publication Publication Date Title
US11025414B2 (en) Key exchange method and apparatus
KR102592873B1 (en) Quantum Key Distribution Node Apparatus and Method for Quantum Key Distribution thereof
US11316671B2 (en) Accelerated encryption and decryption of files with shared secret and method therefor
CN105610789B (en) A kind of data ciphering method for chatting instant messaging suitable for more crowds
CN107425970A (en) A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks
WO2015195497A1 (en) Method and apparatus for enforcing storage encryption for data stored in a cloud
CN102869013A (en) Secure communication system based on wireless channel characteristic
CN104202158A (en) Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing
CN108777677A (en) cloud storage data security protection method and device, storage medium, camera, computing device
CN106375306A (en) Mobile phone application data transmission encrypting method and system
CN104753953A (en) Access control system
CN105025472B (en) A kind of WIFI access points enciphering hiding and the method and its system of discovery
CN108810022A (en) A kind of encryption method, decryption method and device
EP3843438A1 (en) Key generation method, device, and system
CN107483639A (en) The method, apparatus and equipment converted between serial data and wireless network data
CN104732614A (en) Access device for encrypting wiegand protocol signal and encryption and decryption method thereof
CN116405320B (en) Data transmission method and device
CN104796411A (en) Method for safely transmitting, storing and utilizing data in cloud and mobile terminal
CN103235907B (en) A kind of method and system using smart card device protection software
CN106385423A (en) Data encrypting transmission method and system
CN105827601A (en) Data encryption application method and system of mobile device
CN106572061A (en) Wireless communication base station and data sending method thereof, and terminal and data reception thereof
CN103986640A (en) Instant messaging method and system capable of guaranteeing safety of user communication content
CN106357390A (en) Dynamic encryption method and device
KR101262791B1 (en) Encryption control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170419