CN108540475A - A kind of electronic communication system based on DSP - Google Patents
A kind of electronic communication system based on DSP Download PDFInfo
- Publication number
- CN108540475A CN108540475A CN201810322891.0A CN201810322891A CN108540475A CN 108540475 A CN108540475 A CN 108540475A CN 201810322891 A CN201810322891 A CN 201810322891A CN 108540475 A CN108540475 A CN 108540475A
- Authority
- CN
- China
- Prior art keywords
- module
- dsp
- information
- communication network
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/044—Network management architectures or arrangements comprising hierarchical management structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention belongs to technical field of electronic communication, disclose a kind of electronic communication system based on DSP, and the electronic communication system based on DSP includes:MIM message input module, DSP control module, wireless communication module, data encryption module, data memory module, alarm module, display module, wireless base station, server, intelligent movable end.The present invention is encrypted electronic communication by data encryption module, greatly improves the safety of communication, avoids the generation of the safety problems such as leakage sensitive information;Fault-signal can be detected by fault alarm module in time simultaneously, and staff is notified to carry out safeguard procedures.
Description
Technical field
The invention belongs to technical field of electronic communication more particularly to a kind of electronic communication systems based on DSP.
Background technology
DSP Digital Signal Processing is that research is analyzed signal with digital method, converts, filters, detects, modulates, solved
A special kind of skill subject of tune and fast algorithm.But many people think that:Digital Signal Processing mainly studies related digital filtering
Technology, discrete transform fast algorithm and spectral analysis method.With the development of digital circuit and systems technology and computer technology,
Digital Signal Processing is also correspondingly made available development, and application field is very extensive.Digital control, answering in terms of motion control
With mainly having disk drive control, engine control, laser printer control, spray drawing machine control, motor control, electric system control
System, robot control, high accuracy servo system control, numerically-controlled machine tool etc..It is answered towards low-power consumption, handheld device, wireless terminal
With mainly having:Mobile phone, PDA, GPS, data radio station etc..However, existing be easy based on the electronic communication system of DSP in communication process
Information leakage event occurs, safety is not high;If electronic communication process cannot notify work in time if there is failure simultaneously
Personnel.
In actual life, the attribute in attribute set can be divided into different levels, example according to their significance level
As taught this attribute, two levels of full professor and associate professor can be separated into, therefore just have the adding based on attribute of layering
Close (CP-HABE).In this encryption mechanism, each user is owned by the property set of a layering in systems.Encipherer to
Possess one message of user encryption of some property set in system, wherein ciphertext contains a kind of access structure of layering, only
When the layering of user property meets the layering of access structure, message could be decrypted.This CP-HABE can regard tradition as
A kind of form of CP-ABE schemes, i.e. all properties are all on same level.Current this CP-HABE schemes are proved to judging
It is safe under property (q-parallel) bilinear Diffie-Hellman index assumption.It is existing this based on hierarchical access knot
The safety of the CP-HABE schemes of structure has only reached false in prejudgementing character (q-parallel) bilinear Diffie-Hellman index
It is safe to set
In conclusion problem of the existing technology is:It is existing to be easy in communication process based on the electronic communication system of DSP
Information leakage event occurs, safety is not high;If electronic communication process cannot notify work in time if there is failure simultaneously
Personnel.
The present invention keeps operation times less more efficient by using the access structure of improved layering, also in encryption
The correspondence row insertion of the access structure of layering is entered for each attribute of layering, to realize that layering and fine granularity access
Structure is combined;Mixing rank Bilinear Groups element is added according further to dual system encryption technology;To be realized under master pattern
The encrypted overall safety rank of hierarchical attribute.And the prior art fails to solve.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of electronic communication systems based on DSP.
The invention is realized in this way a kind of electronic communication system based on DSP includes:
MIM message input module, DSP control module, wireless communication module, data encryption module, data memory module, alarm
Module, display module, wireless base station, server, intelligent movable end;
MIM message input module is connect with DSP control module, for data informations such as input video, picture and text, voices;
DSP control module, with MIM message input module, wireless communication module, data memory module, alarm module, display mould
Block connects, and data processing and inversion is carried out for the information to input;
Wireless communication module is connect with DSP control module, data encryption module, for translating the information into wireless signal
It is sent to server and intelligent movable end by wireless base station, realizes long-range acquisition information and control operation;
Data encryption module is connect with wireless communication module, for wireless signal to be encrypted;
Data memory module is connect with data encryption module, for being deposited to the data information that DSP control module is handled
Storage;
Alarm module is connect with DSP control module, if there is exception for DSP control module circuit, passes through alarm
Device is alarmed;
Display module is connect with DSP control module, the data information for showing DSP control module processing.
Further, the DSP control module includes:
Operating system determination unit determines current for the correspondence according to different communication network standard operating system
Communication network standard operating system corresponding to timeslice;
Memory part determination unit, for the memory quilt according to preset different communication network standard operating system and terminal
The correspondence of the memory part marked off determines the communication network standard operating system pair determined with operating system determination unit
The memory part answered;
Hardware driving unit, the memory part for being determined based on memory part determination unit, runs determining communication network
Network standard operating system, and according to the hardware driving journey for including in the system program of determining communication network standard operating system
Sequence drives corresponding digital signal processor DSP, communication network standard signal processing module, radiofrequency signal receiving-transmitting device, wherein
Communication network standard signal processing module supports the communication network standard that determining communication network standard operating system is supported;
Communication network signal generates control unit, at hardware driving unit driving DSP, communication network standard signal
After managing module, radiofrequency signal receiving-transmitting device, control communication network standard signal processing module reads the terminal authentication for including processor
Information, and control DSP and terminal authentication information progress protocol encapsulation is obtained according to communication protocol corresponding with communication network standard
Communication network signal, and communication network signal is transmitted to wireless communication module.
Further, it is a kind of internetworking security control that the communication network signal, which generates the communication protocol in control unit,
Agreement, information, authentication state information, signing messages including agreement is traced to the source, can be identified by security gateway and be subject to security control;
If internetworking security control protocol characteristic is expressed as:
P={ fi,fj,v,p}
Wherein, fi is source gateway address, and fj is purpose gateway address, and p describes for grouping feature, and v is the label for sign test
Name;V is a verification fiFunction, for verify packet whether be come from security gateway fi, rather than forge, it is expressed as:
V=vf (fi)
P simplification is expressed as:
P={ s, d, o }
Wherein, s is grouping source address, and d is grouping destination address, and o is option;
Block the operation of grouping p can be in security gateway fiOr fjUpper deployment is located at security gateway fiUpper deployment blocks grouping p
Operation d (fi, p) and it indicates, it provides a kind of blocking transfer operation and is expressed as:
d(fj,p)→d(fi, p)=0/1
The formula indicates that the operation of grouping p will be blocked from security gateway fjIt is transferred to fi;Wherein, it 0 indicates that transfer is blocked to fail, 1
It indicates to block and shift successfully;
Utilize internetworking security control agreement, security gateway fjIt traces to the source grouping p, is expressed as:
Wherein, it 0 indicates to trace to the source unsuccessfully, fiFor success of tracing to the source, and it is f to find source security gatewayi;Q indicates to block one in table
A grouping feature;
If f0For victim address, f1,f2,…,fnIt nearby is directly linked security gateway for victim, p is attack package, institute
The implementation procedure for stating mechanism is:
1. initial setting up i=0, j=1;
2. carrying out blocking operation;
If d (fi,p)→d(fj, p)=0, then j is set from increasing 1;If j≤n, turn d (fi,p)→d(fj, p)=0 hold
Otherwise row terminates and blocks operation;
3. while blocking, operation of tracing to the source is carried out;
It traces to the source grouping p, if S (fj, P, q)=0, then it terminates and traces to the source;
If S (fj, P, q) and=fk, then blocking instruction d (f are shiftedj,p)→d(fk,p)。
Further, described information input module includes:Video input module, picture and text input module, voice input module;
Video input module is used for input video image information;
Picture and text input module, for inputting picture text message;
Voice input module is used for input voice information.
Further, the encryption method of data encryption module includes:
1) algorithm is established in initialization:Input includes the attribute set U of all properties first, and attribute is in different layerings;
Then it is N=p to select a rank1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, G is enabledpiExpression rank is pi's
Subgroup, i=1,2,3;Then selection Stochastic a and α, random group elements g ∈ Gp1、X3∈Gp3, wherein a, α ∈ ZN, ZNIt indicates
1 to N-1 integer;For U property element in U, corresponding group element h is selected1,...,hU∈Gp1, then common parameter PK
It is respectively with master key MSK:
PK={ N, g, gα,e(g,g)a,h1,......,hU};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
2) it is the layering subset of attribute set U to enable attribute set S, according to attribute set S, common parameter PK, message M and one
A layering thresholding access structure (M generated in advanceV, ρ) attribute of attribute set U all levels is carried out with an expression formula
Encryption obtains ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable that attribute set S's is every
One layer of number of attributes is more than this layer of thresholding, and S is made to meet the access structure of layering;
3) by master key MSK and attribute set S, in conjunction with the subgroup G in step 1)p3Generate key SK;
4) pass through access structure MVThe corresponding key SKs of corresponding ciphertext CT and attribute set S restore outbound message.
Further, the layering thresholding access structure (MV, ρ) generation method it is specific as follows:
1) system initialization
The operation rule of defined function f is as follows:As soon as often carrying out time f operations, polynomial constant term is become 0, from change
The coefficient of amount is constant, and number subtracts 1, if a, b, c, d are determining normal real number, then has:
f(a+bx+cxd)=0+b+cxd-1;
f(1+2x+3x4)=0+2+3x3;
If (k, n) is the secret sharing systems of a layering, mainly by a secret distributor D and n patcicipant's gruop at,
Attribute set U is the set of n participant, and includes m level, i.e.,Wherein for i ≠ j, Ui∩Uj=φ;
It enablesIt is the 0 < k of integer sequence of a monotonic increase0< k1< ... < km, and km-1< km- 1, kiIt is each
The threshold value of layer, then the thresholding access structure that (k, n) is layered seek to as each secret letter of participant u distribution in attribute set U
A secret shadow σ (u) for ceasing s, makes it meet following access structure:
The participant's subset S for meeting the layering of access structure described in above formula is known as authorized subset, can restore main secret
It is close, and any user's subset for being unsatisfactory for above-mentioned access structure will be unable to obtain any information about main secret;
2) sub-secret is distributed
Secret distributor D arbitrarily chooses t-1 random number a1,...,at-1With a Big prime q, multinomial P is then constructed
(x)=s+a1x+...+at-1xt-1, wherein s is the main secret for needing to be shared;Inside each participant u corresponding domains in system
Element representation its identity, use ujIt indicates, level is of the D residing for participant calculates the secret shadow of participantWherein:
P0(x)=P (x);
P1(x)=f1(P (x))=f (P (x));
Pi(u)=f (Pi-1(u));
Representative polynomial P (x) passes through ki-1In field element u after secondary f operationsjThe value at place;ki-1It is (i-1)-th layer of door
Limit value and enable k-1=0, D are disclosedlmIndicate the number of elements for possessing attribute set S in m layers;
3) secret reconstruction
It enablesS indicates that number of elements possessed by S, setting meet:
…
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=S, and if only if for all
0≤i≤m, li≥ki, S is an authorized subset, that is, meets access structure, then, can group when participant's cooperation all in S
At coefficient matrix MV, wherein coefficient matrix by row be written as:
All participants in S can cooperate to solve following equation group:
I.e.:
As can be seen that if S meets access structure, so that it may to reconstruct multinomial P (x), to recover secret s;Into one
Step, this access structure can be equivalent to the access structure of the LSSS of hierarchical matrix, evenIt is defined as
I={ j:ρ (j) ∈ S }, if enabledIt is a sub-secret of secret s, then there is constant { ωj∈ZNSo that
∑j∈Iωjλj=s, whereinZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvGreatly
It can be always found in small polynomial time, so that it may to recover main secret.
Further, the wireless communication module includes:Shell, message recipient, information data editing machine, information data turn
Parallel operation, signal projector and locator;The outer surface of the shell is equipped with message recipient;The inside of the shell is equipped with
Information data editing machine, is electrically connected to message recipient;Described information data editors are electrically connected with information data converter;Institute
The side for stating shell is equipped with signal projector, is electrically connected to information data converter;Positioning is installed at the top of the shell
Device;When data information transfer, message recipient receives the data analysis of DSP control module transmission, through information data editing machine, letter
Breath data converter editor is converted to signal form, and is sent out by information transmitter;Locator can to electronic communication system into
Row positioning.
Further, the display module includes:Shell, display screen, scrambler, button, signal lamp;The inside of the shell
Display screen is installed;The bottom of the display screen is embedded with scrambler;The bottom key of the display screen is equipped with button;The display
The top of screen is embedded with several signal lamps;When using display screen, corresponding password is inputted by scrambler and opens display screen, display
Screen shows that corresponding signal lamp lights when corresponding data information, can intuitively observe display result;It can by the button of bottom
Input or preserve corresponding data information.
Advantages of the present invention and good effect are:The present invention adds electronic communication by data encryption module
It is close, the safety of communication is greatly improved, the generation of the safety problems such as leakage sensitive information is avoided;Pass through fault alarm module simultaneously
Fault-signal can be detected in time, and staff is notified to carry out safeguard procedures.
The present invention is corresponded to attribute in the generator matrix of access structure, using the access structure of layering according to attribute
Importance controls the number of f operations, and the f operation times that important attribute carries out are few, thus the secret for including is more, then will give birth to
At f operation results be mapped in generator matrix, to realize relative to existing hierarchical attribute encipherment scheme, operation times
It is less more efficient;
The correspondence row insertion of the access structure of layering is entered for each attribute of layering when encryption, is divided to realize
Layer and fine granularity access structure are combined;
0th layer of attribute is individually listed in ciphering process and is encrypted by traditional hierarchical attribute encipherment scheme, and
The attribute of all levels is encrypted with a kind of expression formula the present invention, simplifies ciphertext format;
Traditional hierarchical attribute encipherment scheme does not account for causing certain decryption unsuccessful comprehensively in decrypting process, and our
Case, which fully considers this point and reconfigures, understands close algorithm, and being obtained by verification can be with successful decryption all situations.
Description of the drawings
Fig. 1 is the electronic communication system structure diagram provided in an embodiment of the present invention based on DSP;
Fig. 2 is the structure diagram of the wireless communication module of the electronic communication system provided in an embodiment of the present invention based on DSP;
Fig. 3 is the display module structure diagram of the electronic communication system provided in an embodiment of the present invention based on DSP;
In figure:1, MIM message input module;2, DSP control module;3, wireless communication module;4, data encryption module;5, number
According to memory module;6, alarm module;7, display module;8, wireless base station;9, server;10, intelligent movable end;11, shell;
12, message recipient;13, information data editing machine;14, information data converter;15, signal projector;16, locator;17、
Shell;18, display screen;19, scrambler;20, button;21, signal lamp.
Specific implementation mode
In order to further understand the content, features and effects of the present invention, the following examples are hereby given, and coordinate attached drawing
Detailed description are as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in Figure 1, the electronic communication system provided in an embodiment of the present invention based on DSP includes:MIM message input module 1,
DSP control module 2, wireless communication module 3, data encryption module 4, data memory module 5, alarm module 6, display module 7, nothing
Line base station 8, server 9, intelligent movable end 10.
MIM message input module 1 is connect with DSP control module 2, for data informations such as input video, picture and text, voices;
DSP control module 2, with MIM message input module 1, wireless communication module 3, data memory module 5, alarm module 6, aobvious
Show that module 7 connects, data processing and inversion is carried out for the information to input;
Wireless communication module 3 is connect with DSP control module 2, data encryption module 4, for translating the information into wireless communication
Number server 9 and intelligent movable end 10 are sent to by wireless base station 8, realize and long-range obtain information and control operation;
Data encryption module 4 is connect with wireless communication module 3, for wireless signal to be encrypted;
Data memory module 5 is connect with data encryption module 4, the data information for handling to DSP control module 2 into
Row storage;
Alarm module 6 is connect with DSP control module 2, if there is exception for 2 circuit of DSP control module, is passed through
Alarm is alarmed;
Display module 7 is connect with DSP control module 2, the data information handled for showing DSP control module 2.
The DSP control module includes:
Operating system determination unit determines current for the correspondence according to different communication network standard operating system
Communication network standard operating system corresponding to timeslice;
Memory part determination unit, for the memory quilt according to preset different communication network standard operating system and terminal
The correspondence of the memory part marked off determines the communication network standard operating system pair determined with operating system determination unit
The memory part answered;
Hardware driving unit, the memory part for being determined based on memory part determination unit, runs determining communication network
Network standard operating system, and according to the hardware driving journey for including in the system program of determining communication network standard operating system
Sequence drives corresponding digital signal processor DSP, communication network standard signal processing module, radiofrequency signal receiving-transmitting device, wherein
Communication network standard signal processing module supports the communication network standard that determining communication network standard operating system is supported;
Communication network signal generates control unit, at hardware driving unit driving DSP, communication network standard signal
After managing module, radiofrequency signal receiving-transmitting device, control communication network standard signal processing module reads the terminal authentication for including processor
Information, and control DSP and terminal authentication information progress protocol encapsulation is obtained according to communication protocol corresponding with communication network standard
Communication network signal, and communication network signal is transmitted to wireless communication module.
It is a kind of internetworking security control agreement, packet that the communication network signal, which generates the communication protocol in control unit,
It traces to the source information, authentication state information, signing messages containing agreement, can be identified by security gateway and be subject to security control;
If internetworking security control protocol characteristic is expressed as:
P={ fi,fj,v,p}
Wherein, fi is source gateway address, and fj is purpose gateway address, and p describes for grouping feature, and v is the label for sign test
Name;V is a verification fiFunction, for verify packet whether be come from security gateway fi, rather than forge, it is expressed as:
V=vf (fi)
P simplification is expressed as:
P={ s, d, o }
Wherein, s is grouping source address, and d is grouping destination address, and o is option;
Block the operation of grouping p can be in security gateway fiOr fjUpper deployment is located at security gateway fiUpper deployment blocks grouping p
Operation d (fi, p) and it indicates, it provides a kind of blocking transfer operation and is expressed as:
d(fj,p)→d(fi, p)=0/1
The formula indicates that the operation of grouping p will be blocked from security gateway fjIt is transferred to fi;Wherein, it 0 indicates that transfer is blocked to fail, 1
It indicates to block and shift successfully;
Utilize internetworking security control agreement, security gateway fjIt traces to the source grouping p, is expressed as:
Wherein, it 0 indicates to trace to the source unsuccessfully, fiFor success of tracing to the source, and it is f to find source security gatewayi;Q indicates to block one in table
A grouping feature;
If f0For victim address, f1,f2,…,fnIt nearby is directly linked security gateway for victim, p is attack package, institute
The implementation procedure for stating mechanism is:
1. initial setting up i=0, j=1;
2. carrying out blocking operation;
If d (fi,p)→d(fj, p)=0, then j is set from increasing 1;If j≤n, turn d (fi,p)→d(fj, p)=0 hold
Otherwise row terminates and blocks operation;
3. while blocking, operation of tracing to the source is carried out;
It traces to the source grouping p, if S (fj, P, q)=0, then it terminates and traces to the source;
If S (fj, P, q) and=fk, then blocking instruction d (f are shiftedj,p)→d(fk,p)。
As shown in Fig. 2, the wireless communication module 3 includes:Shell 11, message recipient 12, information data editing machine 13,
Information data converter 14, signal projector 15 and locator 16.
As shown in figure 3, the display module 7 includes:Shell 17, display screen 18, scrambler 19, button 20, signal lamp 21.
MIM message input module 1 provided by the invention includes:Video input module, picture and text input module, voice input module;
Video input module is used for input video image information;
Picture and text input module, for inputting picture text message;
Voice input module is used for input voice information.
The outer surface of shell 11 of the present invention is equipped with message recipient 12;The inside of the shell 11 is equipped with information
Data editors 13 are electrically connected to message recipient 14;Described information data editors 13 are electrically connected with information data converter
14;The side of the shell 11 is equipped with signal projector 15, is electrically connected to information data converter 14;The top of the shell 11
Portion is equipped with locator 16.
The inside of shell 17 of the present invention is equipped with display screen 18;The bottom of the display screen 18 is embedded with scrambler
19;The bottom key of the display screen 18 is equipped with button 20;The top of the display screen 18 is embedded with several signal lamps 21.
As the preferred embodiment of the present invention, the encryption method of data encryption module includes:
1) algorithm is established in initialization:Input includes the attribute set U of all properties first, and attribute is in different layerings;
Then it is N=p to select a rank1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, G is enabledpiExpression rank is pi's
Subgroup, i=1,2,3;Then selection Stochastic a and α, random group elements g ∈ Gp1、X3∈Gp3, wherein a, α ∈ ZN, ZNIt indicates
1 to N-1 integer;For U property element in U, corresponding group element h is selected1,...,hU∈Gp1, then common parameter PK
It is respectively with master key MSK:
PK={ N, g, gα,e(g,g)a,h1,......,hU};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
2) it is the layering subset of attribute set U to enable attribute set S, according to attribute set S, common parameter PK, message M and one
A layering thresholding access structure (M generated in advanceV, ρ) attribute of attribute set U all levels is carried out with an expression formula
Encryption obtains ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable that attribute set S's is every
One layer of number of attributes is more than this layer of thresholding, and S is made to meet the access structure of layering;
3) by master key MSK and attribute set S, in conjunction with the subgroup G in step 1)p3Generate key SK;
4) pass through access structure MVThe corresponding key SKs of corresponding ciphertext CT and attribute set S restore outbound message.
As the preferred embodiment of the present invention, the layering thresholding access structure (MV, ρ) generation method it is specific as follows:
1) system initialization
The operation rule of defined function f is as follows:As soon as often carrying out time f operations, polynomial constant term is become 0, from change
The coefficient of amount is constant, and number subtracts 1, if a, b, c, d are determining normal real number, then has:
f(a+bx+cxd)=0+b+cxd-1;
f(1+2x+3x4)=0+2+3x3;
If (k, n) is the secret sharing systems of a layering, mainly by a secret distributor D and n patcicipant's gruop at,
Attribute set U is the set of n participant, and includes m level, i.e.,Wherein for i ≠ j, Ui∩Uj=φ;
It enablesIt is the 0 < k of integer sequence of a monotonic increase0< k1< ... < km, and km-1< km- 1, kiIt is each
The threshold value of layer, then the thresholding access structure that (k, n) is layered seek to as each secret letter of participant u distribution in attribute set U
A secret shadow σ (u) for ceasing s, makes it meet following access structure:
The participant's subset S for meeting the layering of access structure described in above formula is known as authorized subset, can restore main secret
It is close, and any user's subset for being unsatisfactory for above-mentioned access structure will be unable to obtain any information about main secret;
2) sub-secret is distributed
Secret distributor D arbitrarily chooses t-1 random number a1,...,at-1With a Big prime q, multinomial P is then constructed
(x)=s+a1x+...+at-1xt-1, wherein s is the main secret for needing to be shared;Inside each participant u corresponding domains in system
Element representation its identity, use ujIt indicates, level is of the D residing for participant calculates the secret shadow of participantWherein:
P0(x)=P (x);
P1(x)=f1(P (x))=f (P (x));
Pi(u)=f (Pi-1(u));
Representative polynomial P (x) passes through ki-1In field element u after secondary f operationsjThe value at place;ki-1It is (i-1)-th layer of door
Limit value and enable k-1=0, D are disclosedlmIndicate the number of elements for possessing attribute set S in m layers;
3) secret reconstruction
It enablesS indicates that number of elements possessed by S, setting meet:
…
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=S, and if only if for all
0≤i≤m, li≥ki, S is an authorized subset, that is, meets access structure, then, can group when participant's cooperation all in S
At coefficient matrix MV, wherein coefficient matrix by row be written as:
All participants in S can cooperate to solve following equation group:
I.e.:
As can be seen that if S meets access structure, so that it may to reconstruct multinomial P (x), to recover secret s;Into one
Step, this access structure can be equivalent to the access structure of the LSSS of hierarchical matrix, evenIt is defined as
I={ j:ρ (j) ∈ S }, if enabledIt is a sub-secret of secret s, then there is constant { ωj∈ZNSo that
∑j∈Iωjλj=s, whereinZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvGreatly
It can be always found in small polynomial time, so that it may to recover main secret.
When the present invention works, the data informations such as video, picture and text, voice are sent to DSP control module by MIM message input module 1
2 are handled and are analyzed;DSP control module 2 is by calling wireless communication module 3 to translate the information into wireless signal, data letter
When breath transmission, message recipient 12 receives the data analysis of DSP control module transmission 2, through information data editing machine 13, Information Number
According to converter 14, editor is converted to signal form, and is sent out by information transmitter 15;Locator 16 can be to electronic communication system
It is positioned;And wireless signal is encrypted by data encryption module 4, then 9 He of server is sent to through wireless base station 8
Long-range acquisition information and control operation are realized in intelligent movable end 10;DSP control module 2 is handled by data memory module 5
Data information is stored;If exception occurs in 2 circuit of DSP control module, alarmed by alarm module 6;Finally, lead to
It crosses display module 7 and shows the data information that DSP control module 2 is handled;When display module 7 is using display screen 18, pass through scrambler
The 19 corresponding passwords of input open display screen 18, and display screen 18 shows that corresponding signal lamp 21 lights when corresponding data information,
Display result can intuitively be observed;Corresponding data information can be inputted or preserve by the button 20 of bottom.
The above is only the preferred embodiments of the present invention, and is not intended to limit the present invention in any form,
Every any simple modification made to the above embodiment according to the technical essence of the invention, equivalent variations and modification, belong to
In the range of technical solution of the present invention.
Claims (8)
1. a kind of electronic communication system based on DSP, which is characterized in that the electronic communication system based on DSP includes:
MIM message input module, DSP control module, wireless communication module, data encryption module, data memory module, alarm module,
Display module, wireless base station, server, intelligent movable end;
MIM message input module is connect with DSP control module, for data informations such as input video, picture and text, voices;
DSP control module connects with MIM message input module, wireless communication module, data memory module, alarm module, display module
It connects, data processing and inversion is carried out for the information to input;
Wireless communication module is connect with DSP control module, data encryption module, is passed through for translating the information into wireless signal
Wireless base station is sent to server and intelligent movable end, realizes long-range acquisition information and control operation;
Data encryption module is connect with wireless communication module, for wireless signal to be encrypted;
Data memory module is connect with data encryption module, for being stored to the data information that DSP control module is handled;
Alarm module is connect with DSP control module, if occur for DSP control module circuit it is abnormal, by alarm into
Row alarm;
Display module is connect with DSP control module, the data information for showing DSP control module processing.
2. the electronic communication system based on DSP as described in claim 1, which is characterized in that the DSP control module includes:
Operating system determination unit determines current time for the correspondence according to different communication network standard operating system
Communication network standard operating system corresponding to piece;
Memory part determination unit, for being divided according to the memory of preset different communication network standard operating system and terminal
The correspondence of the memory part gone out, determination are corresponding with the communication network standard operating system that operating system determination unit determines
Memory part;
Hardware driving unit, the memory part for being determined based on memory part determination unit, runs determining communication network system
Formula operating system, and according to the hardware drive program for including in the system program of determining communication network standard operating system, drive
Move corresponding digital signal processor DSP, communication network standard signal processing module, radiofrequency signal receiving-transmitting device, wherein communication network
Network standard signal processing module supports the communication network standard that determining communication network standard operating system is supported;
Communication network signal generates control unit, for driving DSP, communication network standard signal to handle mould in hardware driving unit
After block, radiofrequency signal receiving-transmitting device, control communication network standard signal processing module reads the terminal authentication information for including processor,
And it controls DSP and communication network is obtained to terminal authentication information progress protocol encapsulation according to communication protocol corresponding with communication network standard
Network signal, and communication network signal is transmitted to wireless communication module.
3. the electronic communication system based on DSP as claimed in claim 2, which is characterized in that the communication network signal generates
Communication protocol in control unit is a kind of internetworking security control agreement, including agreement is traced to the source information, authentication state information,
Signing messages can be identified by security gateway and be subject to security control;
If internetworking security control protocol characteristic is expressed as:
P={ fi,fj,v,p}
Wherein, fi is source gateway address, and fj is purpose gateway address, and p describes for grouping feature, and v is the signature for sign test;v
It is a verification fiFunction, for verify packet whether be come from security gateway fi, rather than forge, it is expressed as:
V=vf (fi)
P simplification is expressed as:
P={ s, d, o }
Wherein, s is grouping source address, and d is grouping destination address, and o is option;
Block the operation of grouping p can be in security gateway fiOr fjUpper deployment is located at security gateway fiUpper deployment blocks the behaviour of grouping p
Act on d (fi, p) and it indicates, it provides a kind of blocking transfer operation and is expressed as:
d(fj,p)→d(fi, p)=0/1
The formula indicates that the operation of grouping p will be blocked from security gateway fjIt is transferred to fi;Wherein, it 0 indicates to block transfer failure, 1 indicates
Blocking is shifted successfully;
Utilize internetworking security control agreement, security gateway fjIt traces to the source grouping p, is expressed as:
Wherein, it 0 indicates to trace to the source unsuccessfully, fiFor success of tracing to the source, and it is f to find source security gatewayi;Q indicates to block one point in table
Group feature;
If f0For victim address, f1,f2,…,fnIt nearby is directly linked security gateway for victim, p is attack package, the mechanism
Implementation procedure be:
1. initial setting up i=0, j=1;
2. carrying out blocking operation;
If d (fi,p)→d(fj, p)=0, then j is set from increasing 1;If j≤n, turn d (fi,p)→d(fj, p)=0 execute, it is no
Then terminate blocking operation;
3. while blocking, operation of tracing to the source is carried out;
It traces to the source grouping p, if S (fj, P, q)=0, then it terminates and traces to the source;
If S (fj, P, q) and=fk, then blocking instruction d (f are shiftedj,p)→d(fk,p)。
4. the electronic communication system based on DSP as described in claim 1, which is characterized in that described information input module includes:
Video input module, picture and text input module, voice input module;
Video input module is used for input video image information;
Picture and text input module, for inputting picture text message;
Voice input module is used for input voice information.
5. the electronic communication system based on DSP as described in claim 1, which is characterized in that the data encryption module adds
Decryption method includes:
1) algorithm is established in initialization:Input includes the attribute set U of all properties first, and attribute is in different layerings;Then
It is N=p to select a rank1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, enableIndicate that rank is the son of pi
Group, i=1,2,3;Then selection Stochastic a and α, random group elementsWherein, a, α ∈ ZN, ZNTable
Show 1 to N-1 integer;For in U | U | a property element selects corresponding group element h1,...,h|U|∈Gp1, then public ginseng
Counting PK and master key MSK is respectively:
PK={ N, g, gα,e(g,g)a,h1,......,h|U|};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
2) it is the layering subset of attribute set U to enable attribute set S, is carried according to attribute set S, common parameter PK, message M and one
Previous existence at layering thresholding access structure (MV, ρ) attribute of attribute set U all levels is encrypted with an expression formula
Obtain ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable each layer of attribute set S
Number of attributes be more than this layer of thresholding, make S meet layering access structure;
3) by master key MSK and attribute set S, in conjunction with the subgroup G in step 1)p3Generate key SK;
4) pass through access structure MVThe corresponding key SKs of corresponding ciphertext CT and attribute set S restore outbound message.
6. the electronic communication system based on DSP as claimed in claim 4, which is characterized in that in step 2), the layering thresholding
Access structure (MV, ρ) generation method it is specific as follows:
1) system initialization
The operation rule of defined function f is as follows:As soon as often carrying out time f operations, polynomial constant term is become 0, independent variable
Coefficient is constant, and number subtracts 1, if a, b, c, d are determining normal real number, then has:
f(a+bx+cxd)=0+b+cxd-1;
f(1+2x+3x4)=0+2+3x3;
If (k, n) is the secret sharing systems of a layering, mainly by a secret distributor D and n patcicipant's gruop at attribute
Set U is the set of n participant, and includes m level, i.e.,Wherein for i ≠ j, Ui∩Uj=φ;It enablesIt is the 0 < k of integer sequence of a monotonic increase0< k1< ... < km, and km-1< km- 1, kiIt is each layer
Threshold value, then the thresholding access structure of (k, n) layering seek to as each participant u distribution secret information s in attribute set U
A secret shadow σ (u), so that it is met following access structure:
The participant's subset S for meeting the layering of access structure described in above formula is known as authorized subset, can restore main secret, and
Any user's subset for being unsatisfactory for above-mentioned access structure will be unable to obtain any information about main secret;
2) sub-secret is distributed
Secret distributor D arbitrarily chooses t-1 random number a1,...,at-1With a Big prime q, then construct multinomial P (x)=
s+a1x+...+at-1xt-1, wherein s is the main secret for needing to be shared;One inside each participant u corresponding domains in system
Its identity of a element representation, uses ujIt indicates, level is of the D residing for participant calculates the secret shadow of participantWherein:
P0(x)=P (x);
P1(x)=f1(P (x))=f (P (x));
Pi(u)=f (Pi-1(u));
Representative polynomial P (x) passes through ki-1In field element u after secondary f operationsjThe value at place;ki-1It is (i-1)-th layer of threshold value
And enable k-1=0, D are disclosedlmIndicate the number of elements for possessing attribute set S in m layers;
3) secret reconstruction
It enables| S | indicate that number of elements possessed by S, setting meet:
…
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=| S |, and if only if for all
0≤i≤m, li≥ki, S is an authorized subset, that is, meets access structure, then when participant's cooperation all in S, can form
Coefficient matrix MV, wherein coefficient matrix by row be written as:
All participants in S can cooperate to solve following equation group:
I.e.:
As can be seen that if S meets access structure, so that it may to reconstruct multinomial P (x), to recover secret s;Further, this
A access structure can be equivalent to the access structure of the LSSS of hierarchical matrix, evenIt is defined as I=
{j:ρ (j) ∈ S }, if enabledIt is a sub-secret of secret s, then there is constant { ωj∈ZNSo that ∑j∈I
ωjλj=s, whereinZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MνSize
It can be always found in polynomial time, so that it may to recover main secret.
7. the electronic communication system based on DSP as described in claim 1, which is characterized in that the wireless communication module includes:
Shell, message recipient, information data editing machine, information data converter, signal projector and locator;Outside the shell
Surface is equipped with message recipient;The inside of the shell is equipped with information data editing machine, is electrically connected to message recipient;Institute
It states information data editing machine and is electrically connected with information data converter;The side of the shell is equipped with signal projector, electrical connection
To information data converter;Locator is installed at the top of the shell;When data information transfer, message recipient receives DSP
The data analysis of control module transmission, is converted to signal form, and leads to through information data editing machine, information data converter editor
Information transmitter is crossed to send out;Locator can position electronic communication system.
8. the electronic communication system based on DSP as described in claim 1, which is characterized in that the display module includes:Outside
Shell, display screen, scrambler, button, signal lamp;The inside of the shell is equipped with display screen;The bottom of the display screen is embedded in
There is scrambler;The bottom key of the display screen is equipped with button;The top of the display screen is embedded with several signal lamps;Use display
When screen, corresponding password is inputted by scrambler and opens display screen, display screen shows corresponding signal when corresponding data information
Lamp lights, and can intuitively observe display result;Corresponding data information can be inputted or preserve by the button of bottom.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810322891.0A CN108540475B (en) | 2018-04-11 | 2018-04-11 | Electronic communication system based on DSP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810322891.0A CN108540475B (en) | 2018-04-11 | 2018-04-11 | Electronic communication system based on DSP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108540475A true CN108540475A (en) | 2018-09-14 |
CN108540475B CN108540475B (en) | 2021-04-30 |
Family
ID=63480891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810322891.0A Active CN108540475B (en) | 2018-04-11 | 2018-04-11 | Electronic communication system based on DSP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108540475B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109461065A (en) * | 2018-10-17 | 2019-03-12 | 浙江医药高等专科学校 | A kind of cross-border e-commerce video safety monitoring system and control method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100345410B1 (en) * | 2000-06-30 | 2002-07-24 | 주식회사 쎄스 | System for protecting informations and and method thereof |
CN105406967A (en) * | 2015-12-10 | 2016-03-16 | 西安电子科技大学 | Hierarchical attribute encryption method |
CN205882849U (en) * | 2016-07-05 | 2017-01-11 | 北京中科腾越科技发展有限公司 | A power distribution terminal platform for electric power industry DTU, FTU |
CN107294718A (en) * | 2017-08-09 | 2017-10-24 | 长安大学 | Voidable key strategy is based on encryption attribute method in a kind of master pattern |
CN107682326A (en) * | 2017-09-21 | 2018-02-09 | 北京邮电大学 | A kind of security gateway linked protection mechanism, agreement and module |
-
2018
- 2018-04-11 CN CN201810322891.0A patent/CN108540475B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100345410B1 (en) * | 2000-06-30 | 2002-07-24 | 주식회사 쎄스 | System for protecting informations and and method thereof |
CN105406967A (en) * | 2015-12-10 | 2016-03-16 | 西安电子科技大学 | Hierarchical attribute encryption method |
CN205882849U (en) * | 2016-07-05 | 2017-01-11 | 北京中科腾越科技发展有限公司 | A power distribution terminal platform for electric power industry DTU, FTU |
CN107294718A (en) * | 2017-08-09 | 2017-10-24 | 长安大学 | Voidable key strategy is based on encryption attribute method in a kind of master pattern |
CN107682326A (en) * | 2017-09-21 | 2018-02-09 | 北京邮电大学 | A kind of security gateway linked protection mechanism, agreement and module |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109461065A (en) * | 2018-10-17 | 2019-03-12 | 浙江医药高等专科学校 | A kind of cross-border e-commerce video safety monitoring system and control method |
Also Published As
Publication number | Publication date |
---|---|
CN108540475B (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105553951B (en) | Data transmission method and device | |
CN110519041B (en) | Attribute-based encryption method based on SM9 identification encryption | |
WO2019237570A1 (en) | Electronic contract signing method, device and server | |
US7095851B1 (en) | Voice and data encryption method using a cryptographic key split combiner | |
CN109672539A (en) | SM2 algorithm collaboration signature and decryption method, apparatus and system | |
JP2003536299A (en) | Method and apparatus for encrypting a message | |
JP4597784B2 (en) | Data processing device | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN106059757A (en) | Audio and video monitoring device, data encryption and decryption method, and audio and video display device | |
CN109951274B (en) | Anti-quantum computing point-to-point message transmission method and system based on private key pool | |
CN1777097A (en) | Enciphered data issuing method, enciphering device and programe, deciphering device and programe, | |
CN108197485A (en) | terminal data encryption method and system, terminal data decryption method and system | |
JPH0823330A (en) | Safe data communication | |
CN105897784B (en) | Internet-of-things terminal equipment encryption communication method and device | |
CN107948152A (en) | Information storage means, acquisition methods, device and equipment | |
CN104365127B (en) | Method for following the trail of mobile device in remote display unit | |
CN110084054A (en) | A kind of data privacy device, method, electronic equipment and storage medium | |
CN107483209A (en) | A kind of safe label decryption method based on heterogeneous system | |
CN108090370A (en) | Instant messaging encryption method and system based on index | |
CN106790037A (en) | The instant communication method and system of a kind of User space encryption | |
WO2001084766A2 (en) | System and method for encryption using transparent keys | |
CN109257176A (en) | Decruption key segmentation and decryption method, device and medium based on SM2 algorithm | |
WO1998036520A1 (en) | Cryptographic key split combiner | |
CN107770407B (en) | The image encryption method and device of joint zero watermarking insertion | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180914 Assignee: Changzhou magneto optic New Energy Technology Co.,Ltd. Assignor: Hunan City University Contract record no.: X2023980033083 Denomination of invention: An Electronic Communication System Based on DSP Granted publication date: 20210430 License type: Exclusive License Record date: 20230302 |