CN106572061A - Wireless communication base station and data sending method thereof, and terminal and data reception thereof - Google Patents
Wireless communication base station and data sending method thereof, and terminal and data reception thereof Download PDFInfo
- Publication number
- CN106572061A CN106572061A CN201510653899.1A CN201510653899A CN106572061A CN 106572061 A CN106572061 A CN 106572061A CN 201510653899 A CN201510653899 A CN 201510653899A CN 106572061 A CN106572061 A CN 106572061A
- Authority
- CN
- China
- Prior art keywords
- serial data
- data
- encryption
- serial
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004891 communication Methods 0.000 title claims abstract description 32
- 230000005540 biological transmission Effects 0.000 claims abstract description 51
- 238000012545 processing Methods 0.000 claims description 24
- 230000005611 electricity Effects 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 241001269238 Data Species 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000007774 longterm Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a wireless communication base station and a data sending method thereof, and a terminal and a data reception thereof. Serial port data satisfying preset transmission conditions is cached, and the serial port data is the data which is emitted by a central processor and is transmitted out through a serial port; the serial port data after caching is encrypted; the encrypted serial port data is transmitted out through the serial port; the serial port data after encryption is received; the encrypted serial port data is decrypted, so the serial data transmitted between the wireless communication base station and the terminal is made to be safer and more stable, and serial port data transmission safety is improved. Risks caused by exposure of the serial port of the base station can be avoided, and safety problems generated in a wireless communication base station serial port data transmission process in the prior art are solved.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of radio communication base station and its data transmission method for uplink, end
End and its data receiver method.
Background technology
With the high speed development of wireless communication technology, and the appearance band of substantial amounts of intelligent mobile phone terminal give people it is right
In the demand of mobile high speed internet, Long Term Evolution (Long Term Evolution, LTE) conduct
Forth generation mobile communication technology because its faster mobile broadband connection speed increasingly by global operator and
The welcome and application popularization of mobile client.Mobile broadband connection is ubiquitous, and the thing followed is the peace of base station
Full property receives more threats, in radio communication base station field, particularly with winged honeycomb (Femtocell)
Such family's level base station products.From unlike Incumbent equipment, Femtocell is a client
Equipment, is eventually placed in the family of user, and the uncontrollable user of operator disassembles to which or the behaviour such as reequips
Make, this just increase Femtocell equipment itself by risk of attacks.
Femtocell withs a hook at the end base station transmitting serial port, port of the serial ports as a kind of single plate hardware more bottom
And exist, while the data of Serial Port Transmission are direct plaintext transmissions, not through encryption.Go here and there base station
Mouth outgoi8ng data is related with inside of base station relevant information, it might even be possible to log in the kernel of base station by serial ports
, if utilized by crime of illegal collecting and supplying blood, will there are great security breaches in linux system.For example, using one
After display terminal such as personal computer (personal computer, PC) connection serial ports, can just directly obtain
This Serial Port Transmission data, is input into some commonly used commands, you can to obtain and change inside of base station information etc., peace
Full property is very risky.
The content of the invention
The main technical problem to be solved in the present invention is to provide a kind of radio communication base station and its data sender
Method, terminal and its data receiver method, solve serial data present in prior art in radio communication base station
Safety problem and defect between terminal in transmitting procedure.
To solve above-mentioned technical problem, the present invention provides a kind of radio communication base station data transmission method for uplink, including:
Serial data to meeting default transmission conditions is cached, serial data be sent by central processing unit and
The data for wanting Jing serial ports to spread out of;Serial data after caching is encrypted;By the serial data Jing after encryption
Serial ports spreads out of.
In an embodiment of the present invention, caching is carried out to serial data to be included after serial data cutting points
Block is cached.
In an embodiment of the present invention, the method for cutting serial data includes any one in the following manner
Kind:Cutting is carried out to serial data every certain time interval;Every certain data length to serial ports number
According to carrying out cutting.
In an embodiment of the present invention, serial data is encrypted including:Encryption key is obtained, and
The serial data piecemeal that piecemeal is cached is encrypted by encryption key.
In an embodiment of the present invention, public key of the encryption key for rivest, shamir, adelman.
In an embodiment of the present invention, the serial ports to meeting default transmission conditions carries out caching includes:
Judge whether serial data meets default transmission conditions, the serial ports number to meeting the default transmission conditions
Cached according to piecemeal;Default transmission conditions are:Central processing unit has serial data to spread out of, while serial ports
Line has connected and electricity is gone up at two ends.
The present invention provides a kind of terminal data method of reseptance, including:Receive the serial data after encryption, serial ports
Data are to be sent and wanted by central processing unit the data that Jing serial ports spreads out of;Serial data after encryption is solved
It is close.
In an embodiment of the present invention, the serial data after encryption is decrypted including:Obtain decryption
When key, serial data after block encryption is received, serial data piecemeal is carried out by decruption key
Decryption;After being decrypted to serial data piecemeal, the serial data after also including decrypting piecemeal is merged.
In an embodiment of the present invention, private key of the decruption key for rivest, shamir, adelman.
The present invention provides a kind of radio communication base station, including:Cache module, cache module is for pre- to meeting
If the serial data of transmission conditions cached, serial data is to be sent to need Jing serial ports to pass by central processing unit
The data for going out;Encrypting module, encrypting module is for being encrypted to the serial data after caching;Sending module,
The sending module is for the serial data Jing serial ports after encryption is spread out of.
In an embodiment of the present invention, encrypting module includes first key acquisition submodule and encryption submodule
Block, first key acquisition submodule are used to obtain encryption key, and encryption submodule is used for when cache module piecemeal
During caching serial data, serial data piecemeal is encrypted by encryption key.
In an embodiment of the present invention, cache module includes judging submodule and cache sub-module, judges
Submodule is used to judge whether serial data meets default transmission conditions that cache sub-module to be for pre- to meeting
If the serial data piecemeal of transmission conditions cached;Default transmission conditions are:Central processing unit has string
Mouth data spread out of, while Serial Port Line has connected and electricity is gone up at two ends.
The present invention provides a kind of terminal, it is characterised in that include:Receiver module, receiver module are used to receive
Serial data after encryption;Deciphering module, deciphering module is for being decrypted to the serial data after encryption.
In an embodiment of the present invention, deciphering module includes the second key acquisition submodule and decryption submodule
Block, the second key acquisition submodule are used to obtain decruption key, and decryption submodule is used to receive when receiver module
During the serial data to after block encryption, serial data piecemeal is decrypted by decruption key;Eventually
End also includes processing module, and processing module is merged for the serial data after piecemeal is decrypted.
The invention has the beneficial effects as follows:The present invention provide a kind of radio communication base station and its data transmission method for uplink,
Terminal and its data receiver method, are encrypted to communication base station serial data before transmission, and terminal is received
Again which is decrypted after serial data after encryption, has reached the transmission of communication base station serial data safer more
Stable effect, improves the safety of serial data transmission, it is to avoid produce because base station serial ports exposes
Risk leak.
Description of the drawings
Radio communication base station data transmission method for uplink flow charts of the Fig. 1 for the embodiment of the present invention one;
Radio communication base station data receiver method flow charts of the Fig. 2 for the embodiment of the present invention two;
Radio communication base station schematic diagrams of the Fig. 3 for the embodiment of the present invention three;
Fig. 4 is cache module schematic diagram in the embodiment of the present invention three;
Fig. 5 is encrypting module schematic diagram in the embodiment of the present invention three;
Fig. 6 is terminal schematic diagram in the embodiment of the present invention four;
Fig. 7 is another terminal schematic diagram in the embodiment of the present invention four.
Specific embodiment
Accompanying drawing is combined below by specific embodiment to be described in further detail the present invention.
Embodiment one:
The present embodiment provides a kind of radio communication base station data transmission method for uplink, refer to Fig. 1, specifically includes as follows
Several steps:
Step S101:Serial data to meeting default transmission conditions is cached, and the serial data is
The data for being sent and wanted by central processing unit Jing serial ports to spread out of;
Before being encrypted to serial data, the serial data to meeting default transmission conditions is needed to cache,
Serial data is to be sent and wanted by central processing unit the data that Jing serial ports spreads out of;Default transmission conditions are:In
Central processor has serial data to spread out of, while Serial Port Line has connected and electricity is gone up at two ends;Specially real-time monitoring
Whether base station single-board central processing unit (Central Processing Unit, CPU) sends out serial data,
If monitoring, base station single-board CPU has sent out serial data, and now base station serial port data line connects
And electricity has all been gone up at two ends, it is considered as the serial data that base station single-board CPU sends and wants Jing serial ports to spread out of, now delay
Deposit the serial data.
During caching serial data, piecemeal after serial data cutting can be cached, its specific cutting side
Method can according to the time cutting is carried out to the serial data every certain time interval, it is preferred that to exempt from
Spatial cache takes the encryption of excessive or a large amount of serial datas affects efficiency, can be with per second to serial ports number
According to carrying out a cutting, it is also possible to the serial data is carried out every certain data length according to data length
Cutting.It is during caching serial data, corresponding, the serial data piecemeal after piecemeal is cached, it is preferred that
To caching by the serial data piecemeal of cutting per second, above-mentioned caching is all temporal cache.It should be understood that
It is that slit mode is not limited in above two slit mode.
Step S102:Serial data after caching is encrypted;
After having cached the serial data that will be spread out of, the serial data is encrypted, corresponding to aforementioned serial ports
The cache way of data, is encrypted to the serial data piecemeal of piecemeal caching when encrypting serial data, can be with
To being encrypted every the serial data of caching every certain time interval piecemeal, and can be to every certain
The serial data of data length piecemeal caching is encrypted.Serial data is encrypted close including encryption is obtained
Key, and the serial data piecemeal that piecemeal is cached is encrypted by encryption key.The mode of encryption can be
It is encrypted using rivest, shamir, adelman, the encryption key of acquisition is the public key of rivest, shamir, adelman;
The present embodiment combines the less feature of serial data speed, peak transfer rate in 100KBps or so, preferably
The safer rivest, shamir, adelman of use, RSA Algorithm decrypted by public key encryption, private key, mutually compared
Claim AES safer, it more difficult to crack;Additionally, due to serial data data volume itself it is little the characteristics of, adopt
Rivest, shamir, adelman realizes encryption and the efficiency difference nothing decrypted compared with using both symmetric encipherment algorithms
It is several.Specially obtain the public key of asymmetric arithmetic RSA and store, serial data is carried out adding using the public key
It is close, during encryption can to it is per second it is data cached be encrypted, after the completion of encryption, by the serial ports number after encryption
Spread out of according to Jing serial ports.It should be appreciated that cipher mode is not limited in above-mentioned cipher mode.
It should be noted that the public key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces,
Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is used to encrypt serial data, and private key is used
Serial data after decryption encryption.
In addition, in order to avoid the situation that encryption key is invalid or loses, can preferably regularly update encryption close
Key, can periodically change the encryption key manually, it is also possible to arrange intervalometer so as to which self-timing updates.
Step S103:Serial data Jing serial ports after encryption is spread out of;
Serial data Jing serial ports after encryption spreads out of, and outwards spreads out of specifically by Serial Port Line.
Using the radio communication base station data transmission method for uplink in the present embodiment, fundamentally ensure base station serial ports number
According to the safety in transmitting procedure, serial data passes through public key value encryption before outwards spreading out of, even if
Cracker can obtain the serial data of base station, but because there is no the private key value that can be decrypted, can not
Obtain the related information of any inside of base station.
Embodiment two:
The present embodiment provides a kind of terminal data method of reseptance, refer to Fig. 2, specifically includes following several steps:
Step S201:Receive encryption after serial data, the serial data be sent by central processing unit and
The data for wanting Jing serial ports to spread out of;
Receive the serial data after encryption and specially receive the serial data Jing after the block encryption that serial ports spreads out of.
Step S202:Serial data after encryption is decrypted;
Serial data after encryption is decrypted including the decruption key obtained needed for decryption, it is close by decrypting
Key piecemeal is decrypted to serial data, and the decruption key is corresponding with encryption key;Corresponding to embodiment
One, the present embodiment is preferably decrypted using rivest, shamir, adelman RSA Algorithm, specially obtains non-right
Claim the private key of algorithm RSA and store, then the serial data piecemeal after the private key pair encryption is decrypted.
After serial data piecemeal is decrypted, the serial data after also including decrypting piecemeal is merged, and will be closed
And after serial data be displayed in terminal.
It should be noted that the private key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces,
Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is used to encrypt serial data, and private key is used
Serial data after decryption encryption.
In addition, in order to avoid the situation that encryption key is invalid or loses, it is close with encryption is regularly updated accordingly
Key, it is also desirable to regularly update decruption key, can equally be periodically to change the decruption key manually, it is also possible to
Intervalometer is set so as to which self-timing updates.
It is especially noted that the storage of private key is paid particular attention to during use, prevent and divulge a secret
Accident.
Using the terminal data method of reseptance in the present embodiment, fundamentally ensure base station serial data in transmission
Safety to terminal during, serial data pass through public key value encryption before transmission, even if illegally
Effractor can obtain the serial data of base station, but because not having the private key value that can be decrypted, can not obtain
The related information of any inside of base station.
Embodiment three:
The present embodiment provides a kind of radio communication base station, refer to Fig. 3, specifically includes such as lower module:Caching mould
Block 301 and encrypting module 302 and sending module 303.
Cache module 301 is cached for the serial data to meeting default transmission conditions, the serial ports number
According to for the data for needing Jing serial ports to spread out of are sent by central processing unit, default transmission conditions are:Central processing unit
There is serial data to spread out of, while Serial Port Line has connected and electricity is gone up at two ends;Refer to Fig. 4, cache module 301
Also include judging submodule 3011 and cache sub-module 3012, judging submodule 3011 is used to judge serial ports number
According to whether the default transmission conditions are met, cache sub-module 3012 is for meeting the default transmission
The serial data of condition is cached.Specially 3011 real-time monitoring base station single-board of judging submodule central authorities are processed
Whether device sends out serial data, if monitoring, base station single-board CPU has sent out serial data, and
Now base station serial port data line has connected and electricity has all been gone up at two ends, is considered as the serial ports that base station single-board CPU sends
Data want Jing serial ports to spread out of.Association judging submodule 3011 and cache sub-module 3012, work as judging submodule
3011 detect the serial data that base station single-board CPU sends when wanting Jing serial ports to spread out of, and notify cache sub-module
3012 cache the serial data.
During caching serial data, piecemeal after serial data cutting can be cached, its specific cutting side
Method can according to the time cutting is carried out to the serial data every certain time interval, it is preferred that to exempt from
Spatial cache takes the encryption of excessive or a large amount of serial datas affects efficiency, can be with per second to serial ports number
According to carrying out a cutting, it is also possible to the serial data is carried out every certain data length according to data length
Cutting.During caching serial data, corresponding, cache sub-module 3012 is entered to the serial data piecemeal after cutting
Row caching, it is preferred that to caching by the serial data piecemeal of cutting per second, above-mentioned caching is all interim
Caching.It should be appreciated that slit mode is not limited in above two slit mode.
Encrypting module 302 for being encrypted to the serial data piecemeal after caching, corresponding to aforementioned serial ports number
According to cache way, encrypt serial data when to piecemeal caching serial data piecemeal be encrypted, can be right
Serial data every certain time interval piecemeal caching is encrypted, and can be to every certain data
The serial data of length piecemeal caching is encrypted.Fig. 5 is referred to, encrypting module 302 includes that first key is obtained
Submodule 3021 and encryption submodule 3022 are taken, it is close that first key acquisition submodule 3021 is used for acquisition encryption
Key, encrypting submodule 3022 is used for by the encryption key of the acquisition of first key acquisition submodule 3021 to string
Mouth deblocking is encrypted;Specially cache sub-module is encrypted to the serial data piecemeal after caching
After 3012 piecemeals have cached the serial data that will be spread out of, encryption submodule 3022 pairs of serial datas point are notified
Block is encrypted.The mode that encryption submodule 3022 is encrypted to serial data can be added using asymmetric
Close algorithm for encryption, is encrypted to serial data by encryption key, and the encryption key is asymmetric encryption
The public key of algorithm;The present embodiment combines the less feature of serial data speed, and peak transfer rate is in 100KBps
Left and right, preferably using safer rivest, shamir, adelman, RSA Algorithm, by public key encryption, private key solution
It is close, compare symmetric encipherment algorithm safer, it more difficult to crack;It is little additionally, due to serial data data volume itself
Feature, using rivest, shamir, adelman compared with using both symmetric encipherment algorithms, realizes what is encrypted and decrypt
Efficiency is very nearly the same.Specifically, first key acquisition submodule 3021 obtains rivest, shamir, adelman RSA
In for encryption public key and store, encryption submodule 3022 serial data is encrypted using the public key,
Preferably to being encrypted by the serial data piecemeal of caching per second during encryption, after the completion of encryption, after encrypting
Serial data Jing serial ports spread out of.It should be appreciated that cipher mode is not limited in above-mentioned cipher mode.
It should be noted that the public key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces,
Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is imported encrypting module, and private key is imported
Deciphering module, public key are used to encrypt serial data, the serial data that private key is used for after decrypting encryption, to string
Before mouthful data are encrypted, the private key in the public key and deciphering module in initialization encryption module is needed.
In addition, in order to avoid the situation that encryption key is invalid or loses, can preferably regularly update encryption close
Key, can periodically change the encryption key manually, it is also possible to arrange intervalometer so as to which self-timing updates.
Sending module 303 for the serial data Jing serial ports after encryption is spread out of, specially sending module 303
Serial data after encryption is outwards spread out of by Serial Port Line.
Using the radio communication base station in the present embodiment, fundamentally ensure base station serial data in transmitting procedure
In safety, serial data pass through before transmission public key value encryption, even if cracker can obtain
The serial data of base station is taken, but because there is no the private key value that can be decrypted, any inside of base station can not be obtained
Related information.
Example IV:
The present embodiment provides a kind of terminal, refer to Fig. 6, specifically includes receiver module 601 and deciphering module
602。
The serial data that receiver module 601 is used for after receiving encryption, the serial data is by central processing unit
The data for sending and wanting Jing serial ports to spread out of;Serial data Jing after the encryption that serial ports spreads out of is received specially.
Deciphering module 602 refers to Fig. 7, deciphering module for being decrypted to the serial data after encryption
602 include the second key acquisition submodule 6021 and decryption submodule 6022, the second key acquisition submodule
6021 decrypt required decruption key, the decryption for obtaining before being decrypted to the serial data after encryption
Key is corresponding with encryption key, and corresponding to embodiment one, the present embodiment is preferably calculated using asymmetric encryption
Method RSA is decrypted, and specially the second key acquisition submodule 6021 obtains rivest, shamir, adelman RSA
Private key and store, then decrypt submodule 6022 by the private key to the serial data piecemeal after block encryption
It is decrypted.The terminal that the present embodiment is provided, also including processing module 603, processing module 603 is used to divide
Serial data after block decryption is merged, and serial data is normally displayed in terminal after merging.
It should be noted that the private key in the present embodiment generates small tool by RSA Algorithm public affairs private key value and produces,
Which is responsible for generating a pair of public private key pairs at random according to RSA Algorithm, and public key is used to encrypt serial data, and private key is used
Serial data after decryption encryption.
In addition, in order to avoid the situation that encryption key is invalid or loses, it is close with encryption is regularly updated accordingly
Key, it is also desirable to regularly update decruption key, can equally be periodically to change the decruption key manually, it is also possible to
Intervalometer is set so as to which self-timing updates.
It is especially noted that the storage of private key is paid particular attention to during use, prevent and divulge a secret
Accident.
Using the terminal in the present embodiment, fundamentally ensure peace of the base station serial data when terminal is transferred to
Quan Xing, serial data pass through public key value encryption before transmission, even if cracker can obtain base station
Serial data, but because there is no the private key value that can decrypt, any inside of base station can not be obtained related
Information.
Above content is with reference to specific embodiment further description made for the present invention, it is impossible to recognized
Being embodied as of the fixed present invention is confined to these explanations.For the ordinary skill of the technical field of the invention
For personnel, without departing from the inventive concept of the premise, some simple deduction or replace can also be made,
Protection scope of the present invention should be all considered as belonging to.
Claims (14)
1. a kind of radio communication base station data transmission method for uplink, it is characterised in that include:
Serial data to meeting default transmission conditions is cached, and the serial data is by central authorities' process
Device sends and wants the data that Jing serial ports spreads out of;
The serial data after to caching is encrypted;
The serial data Jing serial ports after by encryption spreads out of.
2. radio communication base station data transmission method for uplink as claimed in claim 1, it is characterised in that right
The serial data carries out caching to be included being cached piecemeal after the serial data cutting.
3. radio communication base station data transmission method for uplink as claimed in claim 2, it is characterised in that cut
The method of point serial data includes any one in the following manner:
Cutting is carried out to the serial data every certain time interval;
Cutting is carried out to the serial data every certain data length.
4. radio communication base station data transmission method for uplink as claimed in claim 2 or claim 3, it is characterised in that
The serial data is encrypted including:Encryption key is obtained, and it is slow to piecemeal by the encryption key
The serial data piecemeal deposited is encrypted.
5. radio communication base station data transmission method for uplink as claimed in claim 4, it is characterised in that institute
State the public key that encryption key is rivest, shamir, adelman.
6. the radio communication base station data transmission method for uplink as described in any one of claim 1-3, its feature
It is that the described pair of serial data for meeting default transmission conditions carries out caching to be included:Judge the serial ports number
According to whether meeting the default transmission conditions, the serial data to meeting the default transmission conditions
Piecemeal is cached;The default transmission conditions are:Central processing unit has the serial data to spread out of, together
When Serial Port Line connected and electricity is gone up at two ends.
7. a kind of terminal data method of reseptance, it is characterised in that include:
The serial data after encryption is received, the serial data is to be sent by central processing unit and want Jing serial ports to pass
The data for going out;
The serial data after to encryption is decrypted.
8. terminal data method of reseptance as claimed in claim 7, it is characterised in that described pair of encryption
The serial data afterwards be decrypted including:Decruption key is obtained, described in after block encryption is received
During serial data, the serial data piecemeal is decrypted by the decruption key;By the serial ports number
After being decrypted according to piecemeal, the serial data after also including decrypting piecemeal is merged.
9. terminal data method of reseptance as claimed in claim 8, it is characterised in that the decryption is close
Private key of the key for rivest, shamir, adelman.
10. a kind of radio communication base station, it is characterised in that include:
Cache module, the cache module are cached for the serial data to meeting default transmission conditions,
The serial data is that the data for needing Jing serial ports to spread out of are sent by central processing unit;
Encrypting module, the encrypting module are encrypted for the serial data after to caching;
Sending module, the sending module are spread out of for the serial data Jing serial ports after by encryption.
11. radio communication base stations as claimed in claim 10, it is characterised in that the encrypting module bag
First key acquisition submodule and encryption submodule are included, the first key acquisition submodule is used to obtain encryption
Key, the encryption submodule for when the cache module piecemeal cache the serial data when, by institute
State encryption key to be encrypted the serial data piecemeal.
12. radio communication base stations as described in claim 10 or 11, it is characterised in that the caching
Module includes judging submodule and cache sub-module, and the judging submodule is used to judge that the serial data is
No to meet the default transmission conditions, the cache sub-module is for meeting the default transmission conditions
The serial data piecemeal cached;The default transmission conditions are:Central processing unit has the string
Mouth data spread out of, while Serial Port Line has connected and electricity is gone up at two ends.
13. a kind of terminals, it is characterised in that include:
Receiver module, the serial data that the receiver module is used for after receiving encryption, the serial data are served as reasons
Central processing unit sends and wants the data that Jing serial ports spreads out of;
Deciphering module, the deciphering module are decrypted for the serial data after to encryption.
14. terminals as claimed in claim 13, it is characterised in that the deciphering module includes that second is close
Key acquisition submodule and decryption submodule, the second key acquisition submodule are used to obtain decruption key, institute
Decryption submodule is stated for when the receiver module receives the serial data after block encryption, passing through
The decruption key is decrypted to the serial data piecemeal;The terminal also includes processing module, described
Processing module is merged for the serial data after piecemeal is decrypted.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510653899.1A CN106572061A (en) | 2015-10-10 | 2015-10-10 | Wireless communication base station and data sending method thereof, and terminal and data reception thereof |
PCT/CN2016/073851 WO2016184183A1 (en) | 2015-10-10 | 2016-02-16 | Wireless communication base station, data transmission and reception method, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510653899.1A CN106572061A (en) | 2015-10-10 | 2015-10-10 | Wireless communication base station and data sending method thereof, and terminal and data reception thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106572061A true CN106572061A (en) | 2017-04-19 |
Family
ID=57319402
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510653899.1A Pending CN106572061A (en) | 2015-10-10 | 2015-10-10 | Wireless communication base station and data sending method thereof, and terminal and data reception thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106572061A (en) |
WO (1) | WO2016184183A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1541016A (en) * | 2003-10-24 | 2004-10-27 | 海信集团有限公司 | Method of encrypting mobile terminals |
EP2056542A1 (en) * | 2007-10-29 | 2009-05-06 | Panasonic Corporation | Transmission power mask for fast access requests |
CN101877849A (en) * | 2009-04-28 | 2010-11-03 | 福建星网锐捷通讯股份有限公司 | Communication method between wireless module and external equipment |
CN102036232A (en) * | 2010-12-17 | 2011-04-27 | 中兴通讯股份有限公司 | Method and device for transmitting and receiving base station data |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100464337C (en) * | 2006-09-05 | 2009-02-25 | 北京飞天诚信科技有限公司 | Method and equipment for carrying out safety communication between USB device and host |
CN101442739B (en) * | 2007-11-20 | 2011-01-19 | 展讯通信(上海)有限公司 | Method for protecting AT instruction |
CN101494684A (en) * | 2008-01-24 | 2009-07-29 | 北京汉潮大成科技孵化器有限公司 | Mobile phone data backup device capable of communicating with serial encipher mobile phone |
US9160974B2 (en) * | 2009-08-26 | 2015-10-13 | Sling Media, Inc. | Systems and methods for transcoding and place shifting media content |
-
2015
- 2015-10-10 CN CN201510653899.1A patent/CN106572061A/en active Pending
-
2016
- 2016-02-16 WO PCT/CN2016/073851 patent/WO2016184183A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1541016A (en) * | 2003-10-24 | 2004-10-27 | 海信集团有限公司 | Method of encrypting mobile terminals |
EP2056542A1 (en) * | 2007-10-29 | 2009-05-06 | Panasonic Corporation | Transmission power mask for fast access requests |
CN101877849A (en) * | 2009-04-28 | 2010-11-03 | 福建星网锐捷通讯股份有限公司 | Communication method between wireless module and external equipment |
CN102036232A (en) * | 2010-12-17 | 2011-04-27 | 中兴通讯股份有限公司 | Method and device for transmitting and receiving base station data |
Non-Patent Citations (1)
Title |
---|
张青凤等: "《信息存储安全理论与应用》", 30 September 2012 * |
Also Published As
Publication number | Publication date |
---|---|
WO2016184183A1 (en) | 2016-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11025414B2 (en) | Key exchange method and apparatus | |
KR102592873B1 (en) | Quantum Key Distribution Node Apparatus and Method for Quantum Key Distribution thereof | |
US11316671B2 (en) | Accelerated encryption and decryption of files with shared secret and method therefor | |
CN105610789B (en) | A kind of data ciphering method for chatting instant messaging suitable for more crowds | |
CN107425970A (en) | A kind of document transmission method, transmitting terminal, receiving terminal and the medium of P2P networks | |
WO2015195497A1 (en) | Method and apparatus for enforcing storage encryption for data stored in a cloud | |
CN102869013A (en) | Secure communication system based on wireless channel characteristic | |
CN104202158A (en) | Data symmetric and asymmetric hybrid encryption and decryption method based on cloud computing | |
CN108777677A (en) | cloud storage data security protection method and device, storage medium, camera, computing device | |
CN106375306A (en) | Mobile phone application data transmission encrypting method and system | |
CN104753953A (en) | Access control system | |
CN105025472B (en) | A kind of WIFI access points enciphering hiding and the method and its system of discovery | |
CN108810022A (en) | A kind of encryption method, decryption method and device | |
EP3843438A1 (en) | Key generation method, device, and system | |
CN107483639A (en) | The method, apparatus and equipment converted between serial data and wireless network data | |
CN104732614A (en) | Access device for encrypting wiegand protocol signal and encryption and decryption method thereof | |
CN116405320B (en) | Data transmission method and device | |
CN104796411A (en) | Method for safely transmitting, storing and utilizing data in cloud and mobile terminal | |
CN103235907B (en) | A kind of method and system using smart card device protection software | |
CN106385423A (en) | Data encrypting transmission method and system | |
CN105827601A (en) | Data encryption application method and system of mobile device | |
CN106572061A (en) | Wireless communication base station and data sending method thereof, and terminal and data reception thereof | |
CN103986640A (en) | Instant messaging method and system capable of guaranteeing safety of user communication content | |
CN106357390A (en) | Dynamic encryption method and device | |
KR101262791B1 (en) | Encryption control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170419 |