CN107040536A - Data ciphering method, device and system - Google Patents

Data ciphering method, device and system Download PDF

Info

Publication number
CN107040536A
CN107040536A CN201710229931.2A CN201710229931A CN107040536A CN 107040536 A CN107040536 A CN 107040536A CN 201710229931 A CN201710229931 A CN 201710229931A CN 107040536 A CN107040536 A CN 107040536A
Authority
CN
China
Prior art keywords
data
random number
receiving terminal
key
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710229931.2A
Other languages
Chinese (zh)
Inventor
翟凡
刘国营
赵长兵
李慧勇
李增利
张鉴
刘兴昌
常亮
王敬仁
欧阳强
高龙集
常红旗
郝立鹏
蒋玉红
薛利民
侯红民
康颖
张嗣勇
李利霞
李兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING DEVOTE RELAY PROTECTION TECHNOLOGY Co Ltd
Original Assignee
BEIJING DEVOTE RELAY PROTECTION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING DEVOTE RELAY PROTECTION TECHNOLOGY Co Ltd filed Critical BEIJING DEVOTE RELAY PROTECTION TECHNOLOGY Co Ltd
Priority to CN201710229931.2A priority Critical patent/CN107040536A/en
Publication of CN107040536A publication Critical patent/CN107040536A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of data ciphering method, device and system.Wherein, this method includes:One or more first data are sent to the first receiving terminal, wherein, the first data pass through the first encrypted random number of asymmetric arithmetic including at least one;One or more second data of the first receiving terminal return are received, wherein, the second data pass through the second encrypted random number of asymmetric arithmetic including at least one;Key is constituted according to the first random number and the second random number.The present invention solves industrial switch in the prior art and energy control kind equipment transmits data by the way of plaintext transmission, causes the technical problem that security is relatively low.

Description

Data ciphering method, device and system
Technical field
The present invention relates to field of data transmission, in particular to a kind of data ciphering method, device and system.
Background technology
Under the framework of prior art, it industry and the energy control kind equipment, usually not encryption system such as can only switch, it is complete Carried out data transmission entirely with plaintext transmission to mode.Therefore only it is to be understood that the communication protocol of standard, as long as or even can be connected to Internal network, just can control device operation so that cause equipment be in unsafe state.
The problem of data safety in order to solve the said equipment, it is common practice on the basis of plaintext transmission, adopt The coded communication module of third party manufacturer production is purchased, to complete the requirement of communication encryption.The communication encryption module of third party manufacturer, Realize that the algorithm of encryption is different, method cuts both ways, it is impossible to weigh.And often it can not install effect additional with business matched It is bad.
If additionally from third part purchase encryption hardware, encryption hardware is independently responsible for encrypting incoming clear data, or By ciphertext data deciphering.Encryption process is unrelated with equipment, it is impossible to recognizes a complete data communications packets exactly, often cuts Disconnected packet, causes communication unstable.And extra encryption hardware expends extra purchase cost, causes the wasting of resources.
If industrial equipment be encrypted by the way of software cryptography, the Cipher Strength of prior art is not high, often One or a pair of communication keys are only used, disclosure risk is big.Once communication key is revealed, it will entirely to encrypt environmental disutility; And encryption communication key once comes into operation, it can not just update, this to remove non-replaceable encryption device after leakage, otherwise can not Recover security context.And same encryption key is used for a long time, there is a possibility that to be cracked by third party hacker's violence test, Hacker can be by the password cracking of equipment by hitting the modes such as storehouse.
Data are transmitted by the way of plaintext transmission for industrial switch in the prior art and energy control kind equipment, are led The problem of security is relatively low is caused, effective solution is not yet proposed at present.
The content of the invention
The embodiments of the invention provide a kind of data ciphering method, device and system, at least to solve work in the prior art Industry is switched and energy control kind equipment transmits data by the way of plaintext transmission, causes the technical problem that security is relatively low.
One side according to embodiments of the present invention there is provided a kind of data ciphering method, including:Sent out to the first receiving terminal One or more first data are sent, wherein, the first data comprise at least one by encrypted first random of asymmetric arithmetic Number;One or more second data of the first receiving terminal return are received, wherein, the second data comprise at least one by asymmetric The second random number that algorithm for encryption is crossed;Key is constituted according to the first random number and the second random number.
Other side according to embodiments of the present invention there is provided a kind of data ciphering method, including:Receiving end/sending end is sent out One or more first data sent, wherein, the first data at least include one by asymmetric arithmetic it is encrypted first with Machine number;One or more second data are sent to transmitting terminal, wherein, the second data are at least added including one by asymmetric arithmetic Second random number of close mistake;Key is constituted according to the first random number and the second random number.
Another aspect according to embodiments of the present invention, additionally provides a kind of data encryption system, including:Transmitting terminal, to One or more first data of one receiving terminal transmission, one or more second data that the first receiving terminal of reception is returned, and according to The second random number that the first random number and the second packet that first packet contains contain constitutes key, wherein, wherein, the first data At least include one and comprise at least one by the first encrypted random number of asymmetric arithmetic, the first data and the second data Pass through the second encrypted random number of asymmetric arithmetic;First receiving terminal, communicates with transmitting terminal, is sent for receiving end/sending end One or more first data, one or more second data are returned to transmitting terminal, and according to the first packet contain first with The second random number that machine number and the second packet contain constitutes key.
Another aspect according to embodiments of the present invention, additionally provides a kind of data encryption device, including:Sending module, is used In sending one or more first data to the first receiving terminal, wherein, the first data pass through asymmetric arithmetic including at least one The first encrypted random number;Receiving module, for receiving one or more second data that the first receiving terminal is returned, wherein, Second data pass through the second encrypted random number of asymmetric arithmetic including at least one;Constitute module, for according to first with Machine number and the second random number constitute key.
Another aspect according to embodiments of the present invention, additionally provides a kind of data encryption device, including:Receiving module, is used One or more first data sent in receiving end/sending end, wherein, the first data at least pass through asymmetric arithmetic including one The first encrypted random number;Sending module, for sending one or more second data to transmitting terminal, wherein, the second data At least pass through the second encrypted random number of asymmetric arithmetic including one;Module is constituted, for according to the first random number and the Two random numbers constitute key.
Another aspect according to embodiments of the present invention, additionally provides a kind of storage medium, including:Program including storage, Wherein, equipment performs above-mentioned data ciphering method where controlling storage medium when program is run.
Another aspect according to embodiments of the present invention, additionally provides a kind of processor, and processor is used for operation program, its In, program performs above-mentioned data ciphering method when running.
In embodiments of the present invention, equipment end have sent random number twice to the communication server, and the communication server is to equipment End returns a random number, and in fact, the generation of multiple random number can also be carried out and secret is sent, and send every time It is not limited to only send a random number.Any transmitting terminal and receiving terminal constitute data transfer by way of sending encrypted random number Required key, belongs to the scope that the application is protected.
Such scheme first by RSA Algorithm, using its secret grade it is high the characteristics of, exchange data in communicating pair and pass Key used in defeated.The foundation of the safe lane of data transfer is realized by the way of asymmetric arithmetic, due to exchanging information Data volume it is small, it is to avoid RSA Algorithm efficiency low shortcoming.After key, which is exchanged, to be completed, aes algorithm is switched to, using firm The random number key that has just generated, it is to avoid AES must wildcard shortcoming, it is therefore prevented that key is guessed, and to be follow-up Mass data provides the advantage of aes algorithm efficiency high.So as to solve industrial switch in the prior art and energy control class is set It is standby that data are transmitted by the way of plaintext transmission, cause the technical problem that security is relatively low.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this hair Bright schematic description and description is used to explain the present invention, does not constitute inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of data ciphering method according to embodiments of the present invention;
Fig. 2 is the flow chart of another data ciphering method according to embodiments of the present invention;
Fig. 3 is a kind of optional information exchange figure according to the embodiment of the present application;
Fig. 4 is a kind of structural representation of optional data encryption system according to the embodiment of the present application;
Fig. 5 is a kind of structural representation of optional data encryption device according to the embodiment of the present application;And
Fig. 6 is a kind of structural representation of optional data encryption device according to the embodiment of the present application.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the model that the present invention is protected Enclose.
It should be noted that term " first " in description and claims of this specification and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so using Data can exchange in the appropriate case, so as to embodiments of the invention described herein can with except illustrating herein or Order beyond those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Lid is non-exclusive to be included, for example, the process, method, system, product or the equipment that contain series of steps or unit are not necessarily limited to Those steps or unit clearly listed, but may include not list clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
For convenience to the understanding of following embodiments, below, the noun that following embodiments occur is explained:
RSA:A kind of rivest, shamir, adelman, algorithm is encrypted and decrypted using public key and private key.Public key is added Close, private key is decrypted, and public key can arbitrarily be distributed to anyone, i.e., anyone can generate is believed using the encryption of this public key Breath.But private key must be rested in securely in decryption human hand, and private key can export public key content, so private key must be strict Keeping, the failed encryption if private key exposes.Advantage is that Cipher Strength is high, is substantially not present crack possibility, and due to making With a pair of secret keys, possess certain anti-repudiation characteristic, but have the disadvantage that due to computationally intensive, performance is not high, is only suitable for encryption few Measure data.
AES:A kind of symmetric encipherment algorithm, algorithm uses same key in encryption side and decryption side, and key needs pre- Encryption and decryption processes could be completed by first sharing to both sides.This algorithm for encryption intensity is high, has a wide range of application, performance is good, is adapted to pin Encryption to mass data.But due to being symmetric encipherment algorithm, once Key Exposure, both sides are no longer safe.
https:Https is a kind of safe coded communication agreement, uses the cryptographic protocol based on certificate verification of safety, energy It is enough effectively to ensure that communication data is not decrypted eavesdropping in communication process.Even if midway data are tampered, data receiver The fact that can be tampered via credential discovery data, abandons the packet being tampered in time.
Embodiment 1
According to embodiments of the present invention there is provided a kind of embodiment of data ciphering method, it is necessary to illustrate, in accompanying drawing The step of flow is illustrated can perform in the computer system of such as one group computer executable instructions, and, although Logical order is shown in flow chart, but in some cases, can be to perform shown different from order herein or retouch The step of stating.
Fig. 1 is a kind of flow chart of data ciphering method according to embodiments of the present invention, as shown in figure 1, this method includes Following steps:
Step S102, one or more first data are sent to the first receiving terminal, wherein, the first data comprise at least one Pass through the first encrypted random number of asymmetric arithmetic.
Specifically, above-mentioned first data can be sent by equipment end, equipment end can be the equipment such as intelligent switch.Above-mentioned One receiving terminal can be the communication server in the cloud platform for remote control intelligent switch.Above-mentioned first random number can be by Equipment end is generated, and after equipment end generates the first random number, the public key in default rivest, shamir, adelman is to first Data encryption.
Herein it should be noted that rivest, shamir, adelman includes encryption pair, encryption to including public key and private key, wherein, Public key can arbitrarily be distributed to any equipment in system, i.e. the equipment in this communication system can use public key pair Data are encrypted, but in the default equipment of private key only in a communications system preserve, also only preserve private key equipment can pair plus Data after close are decrypted.
Step S104, receives one or more second data that the first receiving terminal is returned, wherein, the second data are comprised at least One passes through the second encrypted random number of asymmetric arithmetic.
Specifically, because equipment end and the communication server (i.e. the first receiving terminal) are in same communication system, therefore, on Stating the first receiving terminal can also apply known public key in the system that the second random number is encrypted.And by second after encryption Data return value transmitting terminal (i.e. the said equipment end).
Step S106, key is constituted according to the first random number and the second random number.
It is all random comprising the first random number and second in equipment end and the first receiving terminal by step S102 and step S104 Number, therefore the first random number and the second random number can be constituted key.The first random number generated due to key by equipment end Constituted with the second random number that the first receiving terminal is generated, therefore in time by the network residing for other-end access device end, also not The encryption data of equipment end can be obtained.
Herein it should be noted that above-mentioned steps are included to the random number included in the first data and in the second packet The quantity of random number is not limited, and sends the number of times of the first data, and the first receiving terminal to the first receiving terminal to equipment end The number of times for sending the second data to equipment end is also not particularly limited.
In a kind of optional embodiment, so that intelligent switch sends random number to the communication server as an example.Intelligent switch with The communication server sets up connection, and intelligent switch generates first random number, using known public key in the communication system to first Individual random number is encrypted, and the first random number after encryption is sent to the communication server;The communication server is included in reception After the first data for encrypting the first random number, it is used in the corresponding private key of public key and the first data is decrypted, obtains response knot Really, so as to obtain the first random number.
Then, the communication server generates the second random number, and the second random number is encrypted using public key, and the public key can The public key used during with intelligent switch to the first random number encryption is identical, can also be with intelligent switch to the first random number encryption When the public key that uses it is different.Intelligent switch is back to after the second random number is encrypted, intelligent switch uses this public key Corresponding private key is low, and data are decrypted, so as to obtain the second random number.
After intelligent switch gets the second random number, in order to increase the level of confidentiality of data, generation the 3rd can also continue to Random number, sends after data are encrypted by same mode to the communication server.To the public affairs of the 3rd random number encryption Key can with intelligent switch to the first random number encryption when the public key that uses it is identical, can also be with intelligent switch to the first random number The public key used during encryption is different.
Thus, intelligent switch and the communication server all be realised that three random numbers, be passed in follow-up intelligent switch to cloud platform During transmission of data, the data key constituted using these three random numbers is encrypted, and cloud platform also uses these three random number structures Into data key be decrypted, further, cloud platform to when sending instructions under intelligent switch can also using these three with Instruction is encrypted the key that machine number is constituted, and most director data bag is decrypted intelligent switch in the same way.
In the above-described embodiments, equipment end have sent random number twice to the communication server, and the communication server is to equipment end Return a random number, and in fact, the generation of multiple random number can also be carried out and secret is sent, and send also every time not It is limited to only to send a random number.Any transmitting terminal and receiving terminal constitute data transfer institute by way of sending encrypted random number The key needed, belongs to the scope that the application is protected.
Such scheme first by RSA Algorithm, using its secret grade it is high the characteristics of, exchange data in communicating pair and pass Key used in defeated.The foundation of the safe lane of data transfer is realized by the way of asymmetric arithmetic, due to exchanging information Data volume it is small, it is to avoid RSA Algorithm efficiency low shortcoming.After key, which is exchanged, to be completed, aes algorithm is switched to, using firm The random number key that has just generated, it is to avoid AES must wildcard shortcoming, it is therefore prevented that key is guessed, and to be follow-up Mass data provides the advantage of aes algorithm efficiency high.So as to solve industrial switch in the prior art and energy control class is set It is standby that data are transmitted by the way of plaintext transmission, cause the technical problem that security is relatively low.
Further, new key can also be regenerated according to default, to prevent from obtaining data by way of hitting storehouse Key used in transmission.
Optionally, in a kind of optional embodiment, before one or more first data are sent to the first receiving terminal, Method also includes:
Step S108, the 3rd data are sent to the second receiving terminal, wherein, the 3rd data are tested for the first receiving terminal Card, the 3rd data include:Facility information and AES inventory, AES inventory are used to record the encryption calculation allowed for Method.
Specifically, above-mentioned second receiving terminal can be cloud platform remote interface.In a kind of optional embodiment, setting up Before encryption channel, equipment end submits the facility information of oneself, and oneself subsidiary equipment to the cloud platform communication interface of distal end The AES inventory supported is verified to distal end cloud platform.This process occurs at https layers, and the information of submission can be with Guarantee is not stolen.
Step S1010, receives checking information that the second receiving terminal returns and the address information of the first receiving terminal, to determine the One receiving terminal, wherein, checking information is verified for the first receiving terminal to transmitting terminal.
In a kind of optional embodiment, inside cloud platform demonstrate equipment submission information after, generation one with Machine array into provisional communication shake hands token, and this token is transferred to the communication server and equipment end for being actually responsible for communication, This token is transferred to and is actually responsible for this process generation of the communication server of communication inside cloud platform;Equipment end receives cloud The provisional communication that service is returned is shaken hands token, and the communication server address that will actually communicate.Process is also used Https agreements are communicated, and can ensure the security of data transfer.
In above-mentioned steps, equipment end with the second receiving terminal by being communicated, so as to obtain the communication of the first receiving terminal Address.
Optionally, in a kind of optional embodiment, the same of one or more first data is being sent to the first receiving terminal When, the above method also includes:Checking information is sent to transmitting terminal.
Specifically, above-mentioned checking information can be back to the interim handshaking information of transmitting terminal, the first receiving terminal for cloud platform Checking information is received, and after being proved to be successful, returns to the second random number that " ok " simultaneously sends secret.
In this course, both sides close the communication process of https agreements, switch to use Socket sockets.Equipment end Set up and be connected with the communication server that just receives, the provisional communication received before transmission from cloud platform communication interface is shaken hands token.
Optionally, in a kind of optional embodiment, rivest, shamir, adelman includes:Up key pair and descending key It is right, wherein, up key is to for being encrypted or decrypting to sending to the data of the first receiving terminal, descending key is to receiving Data be encrypted or decrypt.
In a kind of optional embodiment, it is necessary to which clear and definite communicating pair needs to install two pairs in advance before communication starts, I.e. four RSA communication keys, this process must take place under secure and trusted environment.And each key is to the process in preservation In, learn two keys of cipher key pair simultaneously not in one end.
First pair of RSA communication key is up key pair, and the public key of cipher key pair is preserved by equipment, is preserved by cloud platform The private key of cipher key pair.Equipment to cloud platform when sending data, and using the public key encryption data that oneself is preserved, cloud platform is used The private key ciphertext data of preservation.
Second pair of RSA communication key is descending key pair, and the private key of cipher key pair is preserved by equipment, is preserved by cloud platform The public key of cipher key pair.Cloud platform to equipment when sending data, and using the public key encryption data that oneself is preserved, equipment uses guarantor The private key ciphertext data deposited.
Simultaneously using two RSA up-downgoing keys pair, it can entirely prevent after one of leakage, connection is controlled completely The possibility of system.And up key is to being only responsible for the data that slave unit is sent to cloud platform, and descending key is to being only responsible for from cloud Platform is sent to the data of equipment.There is no actual annexation between two pairs of keys, even if therefore a pair of secret keys be cracked, Whole random numbers can not be got, that is, follow the example of the key got eventually for data are encrypted.
Therefore cloud sample platform only has been broken through simultaneously, and has also broken through equipment, could intactly obtain two cipher key pairs All keys, and then control communication handshake flow.And this condition is generally difficult to complete, it can be ensured that security.Enter One step, because such scheme employs three layers of random number (can use other numbers of plies), and this three layers of random numbers are stored in In the internal memory of cloud platform and equipment, it is necessary to break through one of them, and internal storage data is obtained, can just take three layers of random number.Plus The content of random number be that completely random is uncertain, and be three layers of random numbers superposition, it is to avoid a wherein side calculates at random The predictable situation of method, so as to entirely eliminated the possibility of pseudo random number.
Optionally, in a kind of optional embodiment, the step of sending one or more first data to the first receiving terminal Including:First random number is encrypted by the public key of default up cipher key pair, the first random number after encryption is sent out Deliver to the first receiving terminal;The step of one or more second data for receiving the return of the first receiving terminal, includes:To the first receiving terminal The second data returned are decrypted by the private key in default descending key, obtain the second random number.
Optionally, in a kind of optional embodiment, after key is constituted according to the first random number and the second random number, The above method also includes:Data to be transmitted is encrypted or decrypted by symmetric encipherment algorithm according to key.
Specifically, above-mentioned data to be transmitted is, still so that equipment end is intelligent switch as an example, data to be transmitted can include: The instruction that the operational factor or cloud platform of intelligent switch are issued to intelligent switch.
Embodiment 2
According to embodiments of the present invention there is provided a kind of embodiment of data ciphering method, it is necessary to illustrate, in accompanying drawing The step of flow is illustrated can perform in the computer system of such as one group computer executable instructions, and, although Logical order is shown in flow chart, but in some cases, can be to perform shown different from order herein or retouch The step of stating.
Fig. 2 is the flow chart of another data ciphering method according to embodiments of the present invention, as shown in Fig. 2 this method bag Include following steps:
Step S202, one or more first data that receiving end/sending end is sent, wherein, the first data at least include one Pass through the first encrypted random number of asymmetric arithmetic.
Specifically, above-mentioned transmitting terminal can be equipment end, such as:The equipment such as intelligent switch.
Step S204, one or more second data are sent to transmitting terminal, wherein, the second data at least pass through including one The second encrypted random number of asymmetric arithmetic.
Step S206, key is constituted according to the first random number and the second random number.
Herein it should be noted that above-mentioned steps are included to the random number included in the first data and in the second packet The quantity of random number is not limited, and sends the number of times of the first data, and the first receiving terminal to the first receiving terminal to equipment end The number of times for sending the second data to equipment end is also not particularly limited.
In the above-described embodiments, equipment end have sent random number twice to the communication server, and the communication server is to equipment end Return a random number, and in fact, the generation of multiple random number can also be carried out and secret is sent, and send also every time not It is limited to only to send a random number.Any transmitting terminal and receiving terminal constitute data transfer institute by way of sending encrypted random number The key needed, belongs to the scope that the application is protected.
Such scheme first by RSA Algorithm, using its secret grade it is high the characteristics of, exchange data in communicating pair and pass Key used in defeated.The foundation of the safe lane of data transfer is realized by the way of asymmetric arithmetic, due to exchanging information Data volume it is small, it is to avoid RSA Algorithm efficiency low shortcoming.After key, which is exchanged, to be completed, aes algorithm is switched to, using firm The random number key that has just generated, it is to avoid AES must wildcard shortcoming, it is therefore prevented that key is guessed, and to be follow-up Mass data provides the advantage of aes algorithm efficiency high.So as to solve industrial switch in the prior art and energy control class is set It is standby that data are transmitted by the way of plaintext transmission, cause the technical problem that security is relatively low.
Optionally, according to the above embodiments of the present application, receiving end/sending end send one or more first data it is same When, the above method also includes:
Step S208, the checking information that receiving end/sending end is sent.
Shaken hands temporarily order to equipment end and communication server transmitting terminal specifically, above-mentioned checking information can be cloud platform Board.
Step S2010, is verified according to checking information to transmitting terminal.
In a kind of optional embodiment, inside cloud platform demonstrate equipment submission information after, generation one with Machine array into provisional communication shake hands token, and this token is transferred to the communication server and equipment end for being actually responsible for communication, This token is transferred to and is actually responsible for this process generation of the communication server of communication inside cloud platform;Equipment end receives cloud The provisional communication that service is returned is shaken hands token, and the communication server address that will actually communicate.Process is also used Https agreements are communicated, and can ensure the security of data transfer.
Fig. 3 is a kind of optional information exchange figure according to the embodiment of the present application, below, with reference to shown in Fig. 3, opened with intelligence Close as transmitting terminal, using the communication server in cloud platform as the first receiving terminal, the is used as using cloud platform remote communication interface A kind of two receiving terminals, optional embodiment to such scheme is described further.Wherein, cloud platform remote communication interface with The data interaction of the communication server of cloud platform occurs inside cloud platform.
Step S301, equipment end (transmitting terminal 40) submits equipment to believe to cloud platform remote communication interface (the second receiving terminal 44) The inventory for the communication encryption algorithm that breath and equipment are supported.
Step S302, cloud platform remote communication interface (the second receiving terminal 44) returns to checking knot to equipment end (transmitting terminal 40) The provisional communication of fruit and generation is shaken hands token, and the communication server of distribution address.
Step S303, to the communication server of distribution, (first receives cloud platform remote communication interface (the second receiving terminal 44) 42) end sends provisional communication and shakes hands token.
It should be noted that above-mentioned steps S301 to step S303 prevents data to be ravesdropping using https-secure channel.
Before step S304 is carried out, up RSA key pair is provided and descending to equipment end and the first receiving terminal first RSA key pair.
Step S304, sets up socket connection, and equipment end (transmitting terminal 40) sends provisional communication to the first receiving terminal 42 and held Personal order board, and first random number generated, wherein, first random number is entered using the public key of up RSA key centering Encryption is gone.
Step S305, the first receiving terminal 42 checking provisional communication is shaken hands token, and ok letters are returned to equipment end (transmitting terminal 40) Breath, and second random number, wherein, second random number is encrypted using the public key of descending RSA key centering.
Specifically, above-mentioned first receiving terminal return ok information after, also using the private key in up RSA key to first with Machine number is decrypted, so as to get the first random number.
Step S306, equipment end (transmitting terminal 40) generates the 3rd random number, and the 3rd random number is sent to the first reception End 42, wherein, the 3rd random number is encrypted using the public key of up RSA key centering.
Specifically, the said equipment end is after the second random number is received, also using the private key in descending RSA key to Two random numbers are decrypted, so as to get the second random number.
Step S307, the first receiving terminal 42 response successful handshake information of return communication, it is that AES is symmetrical to change cryptographic protocol AES.
Embodiment 3
According to embodiments of the present invention there is provided a kind of embodiment of data encryption system, Fig. 4 is according to the embodiment of the present application A kind of optional data encryption system structural representation, with reference to shown in Fig. 4, the system includes:
Transmitting terminal 40, one or more first data are sent to the first receiving terminal, receive one that the first receiving terminal is returned Or multiple second data, and the second random number composition that the first random number and the second packet contained according to the first packet contains is close Key, wherein, wherein, the first data at least include one by the first encrypted random number of asymmetric arithmetic, the first data and Second data pass through the second encrypted random number of asymmetric arithmetic including at least one.
First receiving terminal 42, communicates with transmitting terminal, one or more first data sent for receiving end/sending end, Xiang Fa Sending end returns to one or more second data, and the first random number and the second packet contained according to the first packet contain second Random number constitutes key.
In the above-described embodiments, equipment end have sent random number twice to the communication server, and the communication server is to equipment end Return a random number, and in fact, the generation of multiple random number can also be carried out and secret is sent, and send also every time not It is limited to only to send a random number.Any transmitting terminal and receiving terminal constitute data transfer institute by way of sending encrypted random number The key needed, belongs to the scope that the application is protected.
Such scheme first by RSA Algorithm, using its secret grade it is high the characteristics of, exchange data in communicating pair and pass Key used in defeated.The foundation of the safe lane of data transfer is realized by the way of asymmetric arithmetic, due to exchanging information Data volume it is small, it is to avoid RSA Algorithm efficiency low shortcoming.After key, which is exchanged, to be completed, aes algorithm is switched to, using firm The random number key that has just generated, it is to avoid AES must wildcard shortcoming, it is therefore prevented that key is guessed, and to be follow-up Mass data provides the advantage of aes algorithm efficiency high.So as to solve industrial switch in the prior art and energy control class is set It is standby that data are transmitted by the way of plaintext transmission, cause the technical problem that security is relatively low.
Further, new key can also be regenerated according to default, to prevent from obtaining data by way of hitting storehouse Key used in transmission.
Optionally, according to the above embodiments of the present application, said system also includes:
Second receiving terminal 44, the second receiving terminal communicates with transmitting terminal and the first receiving terminal respectively, for receiving end/sending end hair The 3rd data sent, and the address information of checking information and the first receiving terminal is returned to transmitting terminal, wherein, the 3rd data are used for first Receiving terminal is verified that the 3rd data include:Facility information and AES inventory, AES inventory are used to record transmitting terminal The AES allowed for, checking information is verified for the first receiving terminal to transmitting terminal.
Embodiment 4
According to embodiments of the present invention there is provided a kind of embodiment of data encryption device, Fig. 5 is according to the embodiment of the present application A kind of optional data encryption device structural representation, with reference to shown in Fig. 5, the system includes:
Sending module 50, for sending one or more first data to the first receiving terminal, wherein, the first data are at least wrapped Pass through the first encrypted random number of asymmetric arithmetic containing one.
Receiving module 52, for receiving one or more second data that the first receiving terminal is returned, wherein, the second data are extremely Pass through the second encrypted random number of asymmetric arithmetic comprising one less.
Module 54 is constituted, for constituting key according to the first random number and the second random number.
In the above-described embodiments, equipment end have sent random number twice to the communication server, and the communication server is to equipment end Return a random number, and in fact, the generation of multiple random number can also be carried out and secret is sent, and send also every time not It is limited to only to send a random number.Any transmitting terminal and receiving terminal constitute data transfer institute by way of sending encrypted random number The key needed, belongs to the scope that the application is protected.
From the foregoing, it will be observed that the above embodiments of the present application send one or more first numbers by sending module to the first receiving terminal According to, wherein, the first data comprise at least one by the first encrypted random number of asymmetric arithmetic, are received by receiving module One or more second data that first receiving terminal is returned, wherein, the second data are added including at least one by asymmetric arithmetic Second random number of close mistake, by constituting module according to the first random number and the second random number composition key.Such scheme is first Used RSA Algorithm, using its secret grade it is high the characteristics of, in key used in communicating pair switched data transmission.Using The mode of asymmetric arithmetic realizes the foundation of the safe lane of data transfer, because the data volume for exchanging information is small, it is to avoid RSA The low shortcoming of efficiency of algorithm.After key, which is exchanged, to be completed, aes algorithm is switched to, using the random number key just generated, is kept away The shortcoming of the necessary wildcards of AES is exempted from, it is therefore prevented that key is guessed, and provides aes algorithm for follow-up mass data The advantage of efficiency high.So as to solve industrial switch in the prior art and energy control kind equipment by the way of plaintext transmission Data are transmitted, cause the technical problem that security is relatively low.
Further, new key can also be regenerated according to default, to prevent from obtaining data by way of hitting storehouse Key used in transmission.
Embodiment 5
According to embodiments of the present invention there is provided a kind of embodiment of data encryption device, Fig. 6 is according to the embodiment of the present application A kind of optional data encryption device structural representation, with reference to shown in Fig. 6, the system includes:
Receiving module 60, one or more first data sent for receiving end/sending end, wherein, the first data are at least wrapped One is included by the first encrypted random number of asymmetric arithmetic.
Sending module 62, for sending one or more second data to transmitting terminal, wherein, the second data at least include one Individual second random number encrypted by asymmetric arithmetic.
Module 64 is constituted, for constituting key according to the first random number and the second random number.
From the foregoing, it will be observed that one or more first numbers that the above embodiments of the present application are sent by receiving module receiving end/sending end According to, wherein, the first data at least include one by the first encrypted random number of asymmetric arithmetic, by sending module to hair Sending end sends one or more second data, wherein, the second data at least include one by asymmetric arithmetic it is encrypted the Two random numbers, by constituting module according to the first random number and the second random number composition key.Such scheme is first by RSA Algorithm, using its secret grade it is high the characteristics of, in key used in communicating pair switched data transmission.Using asymmetric arithmetic Mode realize data transfer safe lane foundation, because the data volume for exchanging information is small, it is to avoid RSA Algorithm efficiency is low Shortcoming.After key, which is exchanged, to be completed, aes algorithm is switched to, use the random number key just generated, it is to avoid AES must The shortcoming of palpus wildcard, it is therefore prevented that key is guessed, and provides the excellent of aes algorithm efficiency high for follow-up mass data Point.So as to solve industrial switch in the prior art and energy control kind equipment transmits data by the way of plaintext transmission, Cause the technical problem that security is relatively low.
Further, new key can also be regenerated according to default, to prevent from obtaining data by way of hitting storehouse Key used in transmission.
Embodiment 6
According to embodiments of the present invention there is provided a kind of storage medium, storage medium includes the program of storage, wherein, in journey Equipment performs the data ciphering method of any one in embodiment 1 where controlling storage medium during sort run.
The embodiment of above-mentioned data ciphering method can as described in Example 1, and here is omitted.
Embodiment 7
According to embodiments of the present invention there is provided a kind of processor, processor is used for operation program, wherein, when program is run Perform the data ciphering method of any one in embodiment 1.
The embodiment of above-mentioned data ciphering method can as described in Example 1, and here is omitted.
Embodiment 8
According to embodiments of the present invention there is provided a kind of storage medium, storage medium includes the program of storage, wherein, in journey Equipment performs the data ciphering method of any one in embodiment 2 where controlling storage medium during sort run.
The embodiment of above-mentioned data ciphering method can as described in Example 2, and here is omitted.
Embodiment 9
According to embodiments of the present invention there is provided a kind of processor, processor is used for operation program, wherein, when program is run Perform the data ciphering method of any one in embodiment 2.
The embodiment of above-mentioned data ciphering method can as described in Example 1, and here is omitted.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment The part of detailed description, may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents, others can be passed through Mode is realized.Wherein, device embodiment described above is only schematical, such as division of described unit, Ke Yiwei A kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of unit or module by some interfaces Connect, can be electrical or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On unit.Some or all of unit therein can be selected to realize the purpose of this embodiment scheme according to the actual needs.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, it can be stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially The part contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are to cause a computer Equipment (can for personal computer, server or network equipment etc.) perform each embodiment methods described of the invention whole or Part steps.And foregoing storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with store program codes Medium.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (16)

1. a kind of data ciphering method, it is characterised in that including:
One or more first data are sent to the first receiving terminal, wherein, first data comprise at least one by non-right The first random number for claiming algorithm for encryption to cross;
One or more second data that first receiving terminal is returned are received, wherein, second data comprise at least one Pass through the second encrypted random number of asymmetric arithmetic;
Key is constituted according to first random number and second random number.
2. according to the method described in claim 1, it is characterised in that sending one or more first data to the first receiving terminal Before, methods described also includes:
The 3rd data are sent to the second receiving terminal, wherein, the 3rd data are verified for first receiving terminal, described 3rd data include:Facility information and AES inventory, the AES inventory are used to record the encryption calculation allowed for Method;
The checking information of the second receiving terminal return and the address information of first receiving terminal are received, to determine described first Receiving terminal, wherein, the checking information is verified for first receiving terminal to transmitting terminal.
3. method according to claim 2, it is characterised in that sending one or more first data to the first receiving terminal While, methods described also includes:The checking information is sent to the transmitting terminal.
4. according to the method described in claim 1, it is characterised in that the rivest, shamir, adelman includes:Up key pair and Descending key pair, wherein, the up key to for the data sent to first receiving terminal to be encrypted or decrypted, The descending key is encrypted or decrypted to the data received.
5. method according to claim 4, it is characterised in that
The step of sending one or more first data to first receiving terminal includes:First random number is passed through default The public key of up cipher key pair be encrypted, first random number after encryption is sent to first receiving terminal;
The step of one or more second data for receiving the first receiving terminal return, includes:First receiving terminal is returned Second data be decrypted by the private key in default descending key, obtain second random number.
6. method as claimed in any of claims 1 to 5, it is characterised in that according to first random number and Second random number is constituted after key, and methods described also includes:
Data to be transmitted is encrypted or decrypted by symmetric encipherment algorithm according to the key.
7. a kind of data ciphering method, it is characterised in that including:
One or more first data that receiving end/sending end is sent, wherein, first data at least include one by non-right The first random number for claiming algorithm for encryption to cross;
One or more second data are sent to the transmitting terminal, wherein, second data at least include one by non-right The second random number for claiming algorithm for encryption to cross;
Key is constituted according to first random number and second random number.
8. method according to claim 7, it is characterised in that one or more first data sent in receiving end/sending end While, methods described also includes:
Receive the checking information that the transmitting terminal is sent;
The transmitting terminal is verified according to the checking information.
9. a kind of data encryption system, it is characterised in that including:
Transmitting terminal, one or more first data are sent to the first receiving terminal, receive that first receiving terminal returns one or Multiple second data, and the second random number that the first random number contained according to first packet and second packet contain Key is constituted, wherein, wherein, first data at least include one by the first encrypted random number of asymmetric arithmetic, First data and second data pass through the second encrypted random number of asymmetric arithmetic including at least one;
First receiving terminal, communicates with the transmitting terminal, for receiving one or more first data that the transmitting terminal is sent, to The transmitting terminal returns to one or more second data, and the first random number contained according to first packet and described second The second random number that packet contains constitutes key.
10. system according to claim 9, it is characterised in that the system also includes:
Second receiving terminal, second receiving terminal communicates with the transmitting terminal and first receiving terminal respectively, for receiving The 3rd data of transmitting terminal transmission are stated, and the address information of checking information and first receiving terminal is returned to the transmitting terminal, its In, the 3rd data are verified for first receiving terminal, and the 3rd data include:Facility information and AES Inventory, the AES inventory is used to record the AES that the transmitting terminal is allowed for, and the checking information is used for institute The first receiving terminal is stated to verify the transmitting terminal.
11. a kind of data encryption device, it is characterised in that including:
Sending module, for sending one or more first data to the first receiving terminal, wherein, first data are comprised at least One passes through the first encrypted random number of asymmetric arithmetic;
Receiving module, for receiving one or more second data that first receiving terminal is returned, wherein, second data Pass through the second encrypted random number of asymmetric arithmetic including at least one;
Module is constituted, for constituting key according to first random number and second random number.
12. a kind of data encryption device, it is characterised in that including:
Receiving module, one or more first data sent for receiving end/sending end, wherein, first data at least include One passes through the first encrypted random number of asymmetric arithmetic;
Sending module, for sending one or more second data to the transmitting terminal, wherein, second data at least include One passes through the second encrypted random number of asymmetric arithmetic;
Module is constituted, for constituting key according to first random number and second random number.
13. a kind of storage medium, it is characterised in that the storage medium includes the program of storage, wherein, in described program operation When control the storage medium where data ciphering method in equipment perform claim requirement 1 to 6 described in any one.
14. a kind of processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the data ciphering method described in any one in 1 to 6.
15. a kind of storage medium, it is characterised in that the storage medium includes the program of storage, wherein, in described program operation When control the storage medium where data ciphering method in equipment perform claim requirement 7 or 8 described in any one.
16. a kind of processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the data ciphering method described in any one in 7 or 8.
CN201710229931.2A 2017-04-10 2017-04-10 Data ciphering method, device and system Pending CN107040536A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710229931.2A CN107040536A (en) 2017-04-10 2017-04-10 Data ciphering method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710229931.2A CN107040536A (en) 2017-04-10 2017-04-10 Data ciphering method, device and system

Publications (1)

Publication Number Publication Date
CN107040536A true CN107040536A (en) 2017-08-11

Family

ID=59534926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710229931.2A Pending CN107040536A (en) 2017-04-10 2017-04-10 Data ciphering method, device and system

Country Status (1)

Country Link
CN (1) CN107040536A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108111308A (en) * 2017-12-25 2018-06-01 北京康拓科技有限公司 One kind is based on the encrypted industry internet communication encryption method of dynamic random
CN109241759A (en) * 2018-09-14 2019-01-18 浙江鲸腾网络科技有限公司 Data processing method and device, storage medium, electronic equipment
CN110572261A (en) * 2019-08-23 2019-12-13 杭州来布科技有限公司 data encryption transmission method
CN110808969A (en) * 2019-10-28 2020-02-18 网御安全技术(深圳)有限公司 Data transmission method and system, electronic device and storage medium
CN113472780A (en) * 2021-06-30 2021-10-01 上海和数软件有限公司 Data encryption transmission method for block chain
CN113645614A (en) * 2021-07-26 2021-11-12 珠海格力电器股份有限公司 Data transmission method and device, electronic equipment and storage medium
CN113761542A (en) * 2020-05-18 2021-12-07 致伸科技股份有限公司 Wireless input device and information transmission method thereof
CN113950802A (en) * 2019-08-22 2022-01-18 华为技术有限公司 Gateway apparatus and method for performing site-to-site communication
CN115643113A (en) * 2022-12-23 2023-01-24 北京锘崴信息科技有限公司 Secure transmission method and device for private data and financial private data

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002087144A1 (en) * 2001-04-19 2002-10-31 Canal + Technologies Method for secure communication between two devices
CN1934821A (en) * 2004-03-22 2007-03-21 三星电子株式会社 Authentication between device and portable storage
US20080085005A1 (en) * 2006-09-29 2008-04-10 Samsung Electronics Co., Ltd. Method and apparatus for broadcast encryption using bilinear map
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN101707767A (en) * 2009-10-26 2010-05-12 中兴通讯股份有限公司 Data transmission method and devices
US20120189118A1 (en) * 2011-01-20 2012-07-26 International Business Machines Corporation Method and system for encryption of a datastream
CN102938696A (en) * 2011-08-15 2013-02-20 国民技术股份有限公司 Generating method of session key and module
CN103795545A (en) * 2014-02-14 2014-05-14 飞天诚信科技股份有限公司 Safety communication method and system
CN105530241A (en) * 2015-12-07 2016-04-27 广西咪付网络技术有限公司 Authentication method of mobile intelligent terminal and POS terminal
CN105871797A (en) * 2015-11-19 2016-08-17 乐视云计算有限公司 Handshake method, device and system of client and server

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002087144A1 (en) * 2001-04-19 2002-10-31 Canal + Technologies Method for secure communication between two devices
US20050033964A1 (en) * 2001-04-19 2005-02-10 Laurent Albanese Method for secure communication between two devices
CN1934821A (en) * 2004-03-22 2007-03-21 三星电子株式会社 Authentication between device and portable storage
US20080085005A1 (en) * 2006-09-29 2008-04-10 Samsung Electronics Co., Ltd. Method and apparatus for broadcast encryption using bilinear map
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN101707767A (en) * 2009-10-26 2010-05-12 中兴通讯股份有限公司 Data transmission method and devices
US20120189118A1 (en) * 2011-01-20 2012-07-26 International Business Machines Corporation Method and system for encryption of a datastream
CN102938696A (en) * 2011-08-15 2013-02-20 国民技术股份有限公司 Generating method of session key and module
CN103795545A (en) * 2014-02-14 2014-05-14 飞天诚信科技股份有限公司 Safety communication method and system
CN105871797A (en) * 2015-11-19 2016-08-17 乐视云计算有限公司 Handshake method, device and system of client and server
CN105530241A (en) * 2015-12-07 2016-04-27 广西咪付网络技术有限公司 Authentication method of mobile intelligent terminal and POS terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108111308A (en) * 2017-12-25 2018-06-01 北京康拓科技有限公司 One kind is based on the encrypted industry internet communication encryption method of dynamic random
CN109241759A (en) * 2018-09-14 2019-01-18 浙江鲸腾网络科技有限公司 Data processing method and device, storage medium, electronic equipment
CN109241759B (en) * 2018-09-14 2021-03-09 恒生电子股份有限公司 Data processing method and device, storage medium and electronic equipment
CN113950802A (en) * 2019-08-22 2022-01-18 华为技术有限公司 Gateway apparatus and method for performing site-to-site communication
CN113950802B (en) * 2019-08-22 2023-09-01 华为云计算技术有限公司 Gateway device and method for performing site-to-site communication
CN110572261A (en) * 2019-08-23 2019-12-13 杭州来布科技有限公司 data encryption transmission method
WO2021036952A1 (en) * 2019-08-23 2021-03-04 杭州来布科技有限公司 Method for encrypted transmission of data
CN110808969A (en) * 2019-10-28 2020-02-18 网御安全技术(深圳)有限公司 Data transmission method and system, electronic device and storage medium
CN113761542A (en) * 2020-05-18 2021-12-07 致伸科技股份有限公司 Wireless input device and information transmission method thereof
CN113472780A (en) * 2021-06-30 2021-10-01 上海和数软件有限公司 Data encryption transmission method for block chain
CN113645614A (en) * 2021-07-26 2021-11-12 珠海格力电器股份有限公司 Data transmission method and device, electronic equipment and storage medium
CN115643113A (en) * 2022-12-23 2023-01-24 北京锘崴信息科技有限公司 Secure transmission method and device for private data and financial private data
CN115643113B (en) * 2022-12-23 2023-03-14 北京锘崴信息科技有限公司 Secure transmission method and device for private data and financial private data

Similar Documents

Publication Publication Date Title
CN107040536A (en) Data ciphering method, device and system
CN104023013B (en) Data transmission method, server side and client
CN105553951B (en) Data transmission method and device
CN108234132A (en) The safe communication system and method for a kind of main control chip and encryption chip
CN106161402B (en) Encryption equipment key injected system, method and device based on cloud environment
CN105450406B (en) The method and apparatus of data processing
CN105610848B (en) Possess the centralized data security method and system of source data Security Assurance Mechanism
CN109088870A (en) A kind of method of new energy plant stand generator unit acquisition terminal secure accessing platform
CN108347419A (en) Data transmission method and device
CN101335615B (en) Method used in key consultation of USB KEY audio ciphering and deciphering device
CN106790090A (en) Communication means, apparatus and system based on SSL
CN111756529B (en) Quantum session key distribution method and system
CN108173644A (en) Data transfer encryption method, device, storage medium, equipment and server
CN106209883A (en) Based on link selection and the multi-chain circuit transmission method and system of broken restructuring
CN109891423A (en) It is controlled using the data encryption of multiple control mechanisms
CN109194656A (en) A kind of method of distribution wireless terminal secure accessing
CN107800675A (en) A kind of data transmission method, terminal and server
CN105119894B (en) Communication system and communication means based on hardware security module
CN111756528B (en) Quantum session key distribution method, device and communication architecture
TW201537937A (en) Unified identity authentication platform and authentication method thereof
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
CN110493162A (en) Identity identifying method and system based on wearable device
CN110519052A (en) Data interactive method and device based on Internet of Things operating system
CN105610872B (en) Internet-of-things terminal encryption method and internet-of-things terminal encryption device
CN114584386B (en) Global multistage encryption network communication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 101300 No. 17, Juyuan Middle Road, Mapo Juyuan Industrial Zone, Shunyi District, Beijing

Applicant after: Beijing DeWitt electric Polytron Technologies Inc

Address before: 101300 No. 17, Juyuan Middle Road, Mapo Juyuan Industrial Zone, Shunyi District, Beijing

Applicant before: Beijing Devote Relay Protection Technology Co., Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170811

RJ01 Rejection of invention patent application after publication