CN109246695A - Data transmission method, device and computer readable storage medium - Google Patents
Data transmission method, device and computer readable storage medium Download PDFInfo
- Publication number
- CN109246695A CN109246695A CN201811248379.2A CN201811248379A CN109246695A CN 109246695 A CN109246695 A CN 109246695A CN 201811248379 A CN201811248379 A CN 201811248379A CN 109246695 A CN109246695 A CN 109246695A
- Authority
- CN
- China
- Prior art keywords
- key
- data
- receiving end
- data transmission
- transmitted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of data transmission method, the data transmission method is the following steps are included: obtain data to be transmitted and the corresponding receiving end of the data to be transmitted, and obtain the key of the receiving end;It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to the receiving end;The key of the receiving end being updated, when for sending data to the receiving end again, data encryption being carried out using the updated key.The invention also discloses a kind of data transmission device and computer readable storage mediums.The continuous variation of key, is followed so that hacker is irregular, and increase key cracks difficulty, even if the key of hack data transmission, also the key that can not know other data of subsequent transmission, the acquisition to follow-up data content improve the safety of data transmission.
Description
Technical field
The present invention relates to safety-security area more particularly to data transmission methods, device and computer readable storage medium.
Background technique
With the development of network technology, some emerging security protection enterprises start to carry out using less radio-frequency broadcast network system
Communication.Generally all with forms of broadcasting signaling, all equipment within the scope of radio frequency reception can receive extensively less radio-frequency
Broadcast the transmission data of coming.To guarantee that transferring content will not be revealed, when transmitting data, data are encrypted, only
The data content of transmission data can be interpreted with the receiving end for being decrypted correctly key.
But existing various cipher modes crack risk in the presence of certain, for example, being generally acknowledged now using safety-security area
Safest rolling code cipher mode, however it remains after being seized on both sides by the arms by exhaustion, crack the modes such as agreement and be decrypted.And rolling code
Always there is one day that rolling is most, it is also possible to which having time overlapping can not be accomplished to be free from risk.In addition, radio frequency communication is using same
Numeric data code is unlocked in future time instance, and hacker is easy to can receive the machine of numeric data code by placing within the scope of radio frequency reception,
By recording all numeric data codes received in a period of time, decruption key, the data that decryption less radio-frequency is sent are obtained.
Therefore, when being encrypted using data of the existing encryption method to wireless radio frequency transmission, communication data is easy quilt
It seizes on both sides by the arms or is cracked after monitoring, lead to the problem of information leakage.
Summary of the invention
The main purpose of the present invention is to provide a kind of data transmission method, device and computer readable storage medium, purports
When solving to encrypt the data of wireless radio frequency transmission using existing encryption method, communication data is easy to be seized on both sides by the arms or supervised
The technical issues of being cracked after listening, generating information leakage.
To achieve the above object, the present invention provides a kind of data transmission method, and the data transmission method includes following step
It is rapid:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to institute
State receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using described updated
Key carries out data encryption.
Preferably, the data transmission method further include:
When receiving the key updating request that the receiving end is sent, the step of the key for updating the receiving end is executed
Suddenly;
The step of key for updating the receiving end includes:
Regenerate the key of the receiving end, wherein after the receiving end receives the data to be transmitted, send institute
State key updating request;
The key of the receiving end regenerated described in preservation.
Preferably, after the step of key of the receiving end regenerated described in the preservation, further includes:
The key of the receiving end regenerated is sent to the receiving end, for the receiving end more Xinmi City
Key.
Preferably, the step of key for updating the receiving end further include:
When receiving the key that the receiving end is sent, the key that this is received replaces the previously stored reception
The key at end.
Preferably, described to be encrypted using data to be transmitted described in the key pair, it will be encrypted described to be transmitted
Data were sent to after the step of receiving end, further includes:
When the transmitting terminal of the data to be transmitted receives feedback information of the receiving end based on the data to be transmitted,
It obtains feedback information described in the key pair of the transmitting terminal to be decrypted, wherein the receiving end is close using the transmitting terminal
Key encrypts the feedback information.
In addition, to achieve the above object, the present invention also provides a kind of data transmission method, the data transmission method includes
Following steps:
When receiving end receives data information, data information described in the key-parsing using the receiving end;
Key updating request is sent to server, receives the replacement key of the server feedback;
According to the key of receiving end described in the replacement key updating.
Preferably, after the step of key of the receiving end according to the replacement key updating, further includes:
Updated key is sent to the transmitting terminal of data transmission, so that the transmitting terminal updates the close of the receiving end
Key.
Preferably, after the step of key of the receiving end according to the replacement key updating, further includes:
When sending feedback information to the transmitting terminal of the data information, feedback letter described in the key pair using the transmitting terminal
Breath is encrypted.
In addition, to achieve the above object, the present invention also provides a kind of data transmission devices, which is characterized in that the data
Transmitting device includes: that the data that can run on the memory and on the processor of memory, processor and being stored in pass
The step of defeated program, the data distributing program realizes data transmission method as described above when being executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer readable storage mediums, which is characterized in that institute
It states and is stored with data distributing program on computer readable storage medium, realized such as when the data distributing program is executed by processor
Above the step of data transmission method.
The embodiment of the present invention propose a kind of data transmission method, device and computer readable storage medium, need into
When row data are transmitted, data sending terminal obtains the content of data to be transmitted and the receiving end of data to be transmitted, and from storage
In hunt out the key of the receiving end.Encrypted using the key pair data to be transmitted of receiving end, so by it is encrypted to
Transmission data are sent to receiving end, so that receiving end can decrypt data to be transmitted using the key of itself, and in radio frequency reception
Other equipment in range allow to get the data to be transmitted, can not also obtain the key of receiving end, can not obtain
To data to be transmitted content.After data to be transmitted is sent to receiving end by transmitting terminal, the key of receiving end is updated,
It when transmitting data to receiving end next time, is encrypted, is used using next data that updated key pair to be sent
The mode of dynamic encryption, the constantly encryption key of variation transmission data.The continuous variation of key, is followed so that hacker is irregular,
Increase key cracks difficulty, even if the key of hack data transmission, can not also know its of subsequent transmission
The key of his data, the acquisition to follow-up data content improve the safety of data transmission.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of data transmission method first embodiment of the present invention;
Fig. 3 is the flow diagram of data transmission method second embodiment of the present invention;
Fig. 4 is the flow diagram of data transmission method 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of data transmission method fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the 5th embodiment of data transmission method of the present invention;
Fig. 7 is the flow diagram of data transmission method sixth embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to institute
State receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using described updated
Key carries out data encryption.
When being encrypted due to data of the encryption method in the prior art to wireless radio frequency transmission, communication data is easy quilt
It seizes on both sides by the arms or is cracked after monitoring, lead to the problem of information leakage.
The present invention provides a solution, and when needing to carry out data transmission, data sending terminal obtains data to be transmitted
Content and data to be transmitted receiving end, and hunt out from storage the key of the receiving end.Using the close of receiving end
Key encrypts data to be transmitted, and then encrypted data to be transmitted is sent to receiving end, so that receiving end uses certainly
The key of body can decrypt data to be transmitted, and the other equipment within the scope of radio frequency reception allow to get this it is to be transmitted
Data can not also obtain the key of receiving end, can not get data to be transmitted content.Data to be transmitted is sent out in transmitting terminal
After giving receiving end, the key of receiving end is updated, when transmitting data to receiving end next time, use is updated
The key pair data next to be sent are encrypted, and by the way of dynamic encryption, the encryption of constantly variation transmission data is close
Key.The continuous variation of key, is followed so that hacker is irregular, increase key cracks difficulty, even if hack is primary
The key of data transmission, can not also know the key of other data of subsequent transmission, the acquisition to follow-up data content improves
The safety of data transmission.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The terminal of that embodiment of the invention can be PC, be also possible to door sensor, infrared inductor, remote controler, signal input device,
Smart phone, tablet computer etc. have the packaged type terminal device of data-transformation facility.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, communication bus 1002, radio-frequency device
1003, memory 1004.Wherein, communication bus 1002 is for realizing the connection communication between these components.Radio-frequency device
1003 send and receive module, such as RFID, radio-frequency card, reader including broadcast data code.Memory 1004 can be height
Fast RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory
1004 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include operating system in a kind of memory 1004 of computer storage medium, wirelessly penetrating
Frequency module and data distributing program.
In terminal shown in Fig. 1, radio-frequency device 1003 is mainly used for emitting radio frequency signal to reader, with
And receive the vision signal of radio-frequency card transmission;And processor 1001 can be used for that the data stored in memory 1004 is called to transmit
Program, and execute following operation:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to institute
State receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using described updated
Key carries out data encryption.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
When receiving the key updating request that the receiving end is sent, the step of the key for updating the receiving end is executed
Suddenly;
The step of key for updating the receiving end includes:
Regenerate the key of the receiving end, wherein after the receiving end receives the data to be transmitted, send institute
State key updating request;
The key of the receiving end regenerated described in preservation.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
The key of the receiving end regenerated is sent to the receiving end, for the receiving end more Xinmi City
Key.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
When receiving the key that the receiving end is sent, the key that this is received replaces the previously stored reception
The key at end.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
When the transmitting terminal of the data to be transmitted receives feedback information of the receiving end based on the data to be transmitted,
It obtains feedback information described in the key pair of the transmitting terminal to be decrypted, wherein the receiving end is close using the transmitting terminal
Key encrypts the feedback information.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
When receiving end receives data information, data information described in the key-parsing using the receiving end;
Key updating request is sent to server, receives the replacement key of the server feedback;
According to the key of receiving end described in the replacement key updating.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
Updated key is sent to the transmitting terminal of data transmission, so that the transmitting terminal updates the close of the receiving end
Key.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following
Operation:
When sending feedback information to the transmitting terminal of the data information, feedback letter described in the key pair using the transmitting terminal
Breath is encrypted.
Reference Fig. 2, data transmission method first embodiment of the present invention, the data transmission method include:
Step S10 obtains data to be transmitted and the corresponding receiving end of the data to be transmitted, and obtains the receiving end
Key.
Step S20 is encrypted using data to be transmitted described in the key pair, by the encrypted data to be transmitted
It is sent to the receiving end.
Generally all with forms of broadcasting signaling, all equipment within the scope of radio frequency reception can receive less radio-frequency
The transmission data broadcast out.To guarantee that transferring content will not be revealed, when transmitting data, data are encrypted, only
There is the data content that transmission data can be interpreted with the receiving end for being decrypted correctly key.
Therefore, when needing to carry out data transmission, data sending terminal obtains the content of data to be transmitted, and according to be passed
The receiving end of the corresponding data transfer instruction exact figures evidence of transmission of data.Transmitting terminal finds the receiving end being previously stored in memory
Key, and encrypted using the key pair data to be transmitted of receiving end, and then encrypted data to be transmitted is sent to
Receiving end, other so that receiving end can decrypt data to be transmitted using the key of itself, and within the scope of radio frequency reception are set
It is standby to allow to get the data to be transmitted, the key of receiving end can not be also obtained, can not be got in data to be transmitted
Hold, has ensured the safety of data transmission.
Wherein, before transmitting terminal sends data to be transmitted, the close of the corresponding receiving end of data to be transmitted has been got
Key, and by key storage, after receiving the instruction carried out data transmission to the receiving end, the key of storage is obtained, using this
Data key is encrypted.
Step S30 updates the key of the receiving end, when for sending data to the receiving end again, using described
Updated key carries out data encryption.
If the long-time between transmitting terminal and receiving end is carried out data transmission using the same key, it is easy to be cracked, one
After denier cracks, other equipment can get hereafter all Data Transmission Contents between transmitting terminal and receiving end, be unfavorable for information
Safeguard protection.Therefore, data transmission method provided by the present application, transmitting terminal by data to be transmitted be sent to receiving end it
Afterwards, the key of receiving end is updated, it is following using updated key pair when transmitting data to receiving end next time
The data to be sent are encrypted, and by the way of dynamic encryption, constantly change the encryption key of transmission data.Key it is continuous
Variation, is followed so that hacker is irregular, and increase key cracks difficulty, even if data transmission of hack is close
Key can not also know the key of other data of subsequent transmission, the acquisition to follow-up data content, improve the peace of data transmission
Quan Xing.
In the present embodiment, when needing to carry out data transmission, data sending terminal obtain data to be transmitted content and
The receiving end of data to be transmitted, and hunt out from storage the key of the receiving end.It is to be transmitted using the key pair of receiving end
Data are encrypted, and then encrypted data to be transmitted is sent to receiving end, so that receiving end is using the key of itself
Can decrypt data to be transmitted, and the other equipment within the scope of radio frequency reception allow to get the data to be transmitted, also without
Method obtains the key of receiving end, can not get data to be transmitted content.Data to be transmitted is sent to reception in transmitting terminal
After end, the key of receiving end is updated, when transmitting data to receiving end next time, is docked using updated key
The data to be sent of getting off are encrypted, and by the way of dynamic encryption, constantly change the encryption key of transmission data.Key
Constantly variation, is followed so that hacker is irregular, and increase key cracks difficulty, even if data transmission of hack
Key can not also know the key of other data of subsequent transmission, the acquisition to follow-up data content, improve data transmission
Safety.
Further, referring to Fig. 3, data transmission method second embodiment of the present invention is based on above-mentioned first embodiment, described
After step S20, further includes:
Step S40 judges whether to receive the key updating request that the receiving end is sent.
Step S31 regenerates the close of the receiving end when receiving the key updating request that the receiving end is sent
Key, wherein after the receiving end receives the data to be transmitted, send the key updating request.
Step S32, the key of the receiving end regenerated described in preservation.
The transmitting terminal and receiving end for sending the data to be transmitted may be server, host computer, it is also possible to keyboard,
Other less radio-frequency accessories such as remote controler.When transmitting terminal is that there is key to generate and distribution function for server, host computer etc.
When terminal, the method that transmitting terminal updates the key of receiving end is as follows: after receiving end receives data to be transmitted, sending out to transmitting terminal
Key updating is sent to request, transmitting terminal regenerates the key of the receiving end, and will be new after receiving key updating request
Key is sent to receiving end.At this point, transmitting terminal saves the key of the receiving end regenerated, the original close of receiving end is replaced
Key realizes the key that receiving end is updated in transmitting terminal, when transmitting data to the receiving end next time, using updated close
Key is to data encryption.
In addition, updated key is sent to receiving end, so that receiving end is in the number for receiving transmitting terminal transmission again
According to when, can using updated data key decrypt.
In the present embodiment, after receiving end receives data to be transmitted, key updating request is sent to transmitting terminal.Data
After transmitting terminal receives key updating request, the key of the receiving end is regenerated, and save the key regenerated, so as to
When sending data to receiving end again, using the key for encrypting data regenerated, key is primary more using primary rear progress
It changes, reaches the dynamic encryption in data transmission procedure, enhance the difficulty that cracks of key, ensure the safety of data transmission.
Further, referring to Fig. 4, data transmission method 3rd embodiment of the present invention is implemented based on the above-mentioned first or second
Example, the step S30 further include:
Step S33, when receiving the key that the transmitting terminal is sent, the key replacement that this is received is previously stored
The key of the receiving end.
When the transmitting terminal for sending the data to be transmitted is other less radio-frequency accessories such as keyboard, remote controler, transmitting terminal
Therefore systematic function without key in receiving end to the terminals such as server or host computer application more new key, and obtains
After updated key, updated key is sent to transmitting terminal, transmitting terminal is in the key for receiving receiving end transmission
When, the key that this is received replaces the key of the previously stored receiving end, realizes to receiving end in data sending terminal
Key updating, when so that sending data to receiving end again, using the key for encrypting data regenerated, key uses primary
After once replaced, reach the dynamic encryption in data transmission procedure, enhance the difficulty that cracks of key, ensure data transmission
Safety.
In the present embodiment, in receiving end to the terminals such as server or host computer application more new key, and update is obtained
After key afterwards, updated key is sent to transmitting terminal, transmitting terminal, will when receiving the key of receiving end transmission
This key received replaces the key of the previously stored receiving end, realizes to the key of receiving end in data sending terminal more
When newly, so that sending data to receiving end again, using the key for encrypting data regenerated, key uses primary rear progress
Primary replacement, reaches the dynamic encryption in data transmission procedure, enhances the difficulty that cracks of key, ensures the safety of data transmission.
Further, referring to Fig. 5, data transmission method fourth embodiment of the present invention is based on above-mentioned the first to three any reality
Example is applied, after the step S20, further includes:
Step S50, the transmitting terminal of the data to be transmitted receive the receiving end based on the anti-of the data to be transmitted
It when feedforward information, obtains feedback information described in the key pair of the transmitting terminal and is decrypted, wherein the receiving end uses the hair
Feedback information described in the key pair of sending end is encrypted.
It is described in above-described embodiment, the key that receiving end is stored in the transmitting terminal of data transmission is similarly receiving
The key of transmitting terminal can also be stored in end.Data to be transmitted is received in receiving end, needs to be directed to the data to be transmitted to hair
When sending end carries out information feedback, receiving end generates feedback information, and the feedback information is encrypted using the key pair of transmitting terminal.
When transmitting terminal receives the feedback information, it is decrypted using the key pair feedback information of itself, obtains the content of feedback information.
In short, transmitting terminal and receiving end are all made of other side's during data interaction in data transmission procedure
The data of key pair transmission are encrypted.Meanwhile in the present embodiment, right after the data for receiving other side's transmission every time
The key of itself is updated, and updated key is sent to other side, so that other side is when transmitting data next time, is used
New data key is encrypted, and wireless radio frequency transmission data double-way dynamic encryption is realized.Between transmitting terminal and receiving end
The transmission of all data encrypt, and the key that every data uses is different so that, the content of the data of less radio-frequency transmission
The difficulty being stolen greatly increases, and safety is improved.
Further, since the more existing simple encryption of realization algorithm of dynamic encryption provided by the invention is more complicated, for drop
Low production and follow-up maintenance cost, it is automatic for the receiving end of different safety class in data transmission method of the invention
Select the decryption method of adaptation.Require low receiving end, such as door sensor, infrared sensor etc. to information processing for security performance
Only with the accessory of simple feedback, data are transmitted using simple encryption mode;And the demanding recipient of energy new for safety, example
Such as remote controler, keyboard have the accessory that instruction of withdrawing a garrison is issued to host, then need more advanced cipher mode, such as the present invention
Cipher mode in the data transmission procedure of proposition.In data transmission, for the different safety requirements rank in receiving end, use
Corresponding cipher mode encrypts transmission data, and ensureing reduces answering for programming while important information is not stolen
Miscellaneous degree reduces program maintenance cost.
In the present embodiment, receive data to be transmitted in receiving end, need for the data to be transmitted to transmitting terminal into
When row information is fed back, receiving end generates feedback information, and the feedback information is encrypted using the key pair of transmitting terminal.Transmitting terminal
When receiving the feedback information, it is decrypted using the key pair feedback information of itself, obtains the content of feedback information.Transmitting terminal
With receiving end during data interaction, the data for being all made of the key pair transmission of other side are encrypted.Meanwhile it connecing every time
After the data for receiving other side's transmission, the key of itself is updated, and updated key is sent to other side, for right
Side is encrypted when transmitting data next time using new data key, and it is dynamic to realize wireless radio frequency transmission data double-way
State encryption.All data transmission between transmitting terminal and receiving end encrypts, and the key that every data uses is different, makes
, the difficulty that the content of the data transmission of less radio-frequency is stolen greatly increases, and safety is improved.
In addition, the embodiment of the present invention also proposes a kind of data transmission method, referring to Fig. 6, data transmission method of the present invention the
Five embodiments, the data transmission method include:
Step S60, when receiving end receives data information, data information described in the key-parsing using the receiving end.
Generally all with forms of broadcasting signaling, all equipment within the scope of radio frequency reception can receive less radio-frequency
The transmission data broadcast out.To guarantee that transferring content will not be revealed, when transmitting data, data are encrypted, only
There is the data content that transmission data can be interpreted with the receiving end for being decrypted correctly key.
In data transmission, when receiving end receives data information, it is decrypted using the data key information of itself,
To obtain the particular content of data information, corresponding response is made according to the content of data information.Wherein, the data information is by counting
According to transmitting terminal encrypted using the key of the receiving end, therefore, which is decrypted and can be solved using the key of itself
Close success.
Step S70 sends key updating request to server, receives the replacement key of the server feedback.
Step S80, according to the key of receiving end described in the replacement key updating.
After receiving data information, receiving end is updated key to server request, anti-getting server
After the new replacement key of feedback, the new key that key updating is receiving end will be replaced.During radio frequency data transmission, connect
Receiving end replaces own key after receiving a data information, guarantees that same key is primary to using, next time
It to when being connected to data information, is decrypted using updated key, wherein the data information transmitting terminal moment uses receiving end more
Data key information encryption after new.The encryption key of continuous delta data information, follows so that hacker is irregular, increases
Key cracks difficulty, even if the key of hack data transmission, can not also know other data of subsequent transmission
Key, the acquisition to follow-up data content, improve data transmission safety.
It should be pointed out that when the transmitting terminal of data information is that there is key to generate and distribute for server, host computer etc.
When the terminal of function, receiving end sends to transmitting terminal key updating and requests, transmitting terminal regenerating key, and will regenerate
Key is sent to receiving end, and therefore, the updated new key in receiving end known to transmitting terminal can be about to new key replacement certainly and originally deposit
The key of the receiving end of storage.When the transmitting terminal of data information is other less radio-frequency accessories such as keyboard, remote controler, transmitting terminal is not
Systematic function with key, then need receiving end after the completion of key updating, and updated key is sent to data information
Transmitting terminal, so that transmitting terminal updates the key of the receiving end, again to transmitting terminal send data information when, use is updated
Key encryption.
In the present embodiment, after receiving data information, receiving end is updated key to server request, is obtaining
After getting the new replacement key of server feedback, the new key that key updating is receiving end will be replaced.In wireless RF data
In transmission process, own key is replaced after receiving a data information in receiving end, guarantees same key to use
Once, it, to when being connected to data information, is decrypted using updated key, wherein when data information transmitting terminal next time
It carves using the updated data key information encryption in receiving end.The encryption key of continuous delta data information so that hacker without
Rule can be followed, and increase key cracks difficulty, even if the key of hack data transmission, can not also know subsequent
The key of other data of transmission, the acquisition to follow-up data content improve the safety of data transmission.
Further, referring to Fig. 7, data transmission method sixth embodiment of the present invention is based on above-mentioned 5th embodiment, described
After step S80, further includes:
Step S90, when sending feedback information to the transmitting terminal of the data information, using the key pair institute of the transmitting terminal
Feedback information is stated to be encrypted.
The key that receiving end is stored in the transmitting terminal of data transmission similarly can also be stored with transmission in the receiving end
The key at end.When receiving end sends feedback information for data information, carried out using the key pair of the transmitting terminal feedback information
Encryption.When transmitting terminal receives the feedback information, it is decrypted using the key pair feedback information of itself, obtains feedback information
Content.
In short, transmitting terminal and receiving end are all made of other side's during data interaction in data transmission procedure
The data of key pair transmission are encrypted.Meanwhile after the data for receiving other side's transmission every time, the key of itself is carried out
It updates, and updated key is sent to other side, so that other side is when transmitting data next time, using new data key
It is encrypted, realizes wireless radio frequency transmission data double-way dynamic encryption.All data transmission between transmitting terminal and receiving end
It encrypts, and the key that every data uses is different, so that, the difficulty that the content of the data transmission of less radio-frequency is stolen is big
Big to increase, safety is improved.
Further, since the more existing simple encryption of realization algorithm of dynamic encryption provided by the invention is more complicated, for drop
Low production and follow-up maintenance cost, it is automatic for the receiving end of different safety class in data transmission method of the invention
Select the decryption method of adaptation.Require low receiving end, such as door sensor, infrared sensor etc. to information processing for security performance
Only with the accessory of simple feedback, data are transmitted using simple encryption mode;And the demanding recipient of energy new for safety, example
Such as remote controler, keyboard have the accessory that instruction of withdrawing a garrison is issued to host, then need more advanced cipher mode, such as the present invention
Cipher mode in the data transmission procedure of proposition.In data transmission, for the different safety requirements rank in receiving end, use
Corresponding cipher mode encrypts transmission data, and ensureing reduces answering for programming while important information is not stolen
Miscellaneous degree reduces program maintenance cost.
In the present embodiment, the key of receiving end is stored in the transmitting terminal of data transmission, similarly, in the receiving end
The key of transmitting terminal can be stored with.It, should using the key pair of transmitting terminal when receiving end sends feedback information for data information
Feedback information is encrypted.When transmitting terminal receives the feedback information, it is decrypted, is obtained using the key pair feedback information of itself
Negate the content of feedforward information.Transmitting terminal and receiving end are all made of the number of the key pair transmission of other side during data interaction
According to being encrypted.Meanwhile after the data for receiving other side's transmission every time, the key of itself is updated, and will be updated
Key afterwards is sent to other side, so that other side is when transmitting data next time, is encrypted, is realized using new data key
Wireless radio frequency transmission data double-way dynamic encryption.All data transmission between transmitting terminal and receiving end encrypts, and every
The key that data use is different, so that, the difficulty that the content of the data transmission of less radio-frequency is stolen greatly increases, safety
It is improved.
In addition, the embodiment of the present invention also proposes a kind of data transmission device, the data transmission device include: memory,
Processor and it is stored in the data distributing program that can be run on the memory and on the processor, the data transmit journey
The step of data transmission method described in as above each embodiment is realized when sequence is executed by the processor.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium
On be stored with data distributing program, as above number described in each embodiment is realized when the data distributing program is executed by processor
The step of according to transmission method.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone,
Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of data transmission method, which is characterized in that the data transmission method the following steps are included:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to described connect
Receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using the updated key
Carry out data encryption.
2. data transmission method as described in claim 1, which is characterized in that the data transmission method further include:
When receiving the key updating request that the receiving end is sent, the step of executing the key for updating the receiving end;
The step of key for updating the receiving end includes:
Regenerate the key of the receiving end, wherein after the receiving end receives the data to be transmitted, send described close
Key updates request;
The key of the receiving end regenerated described in preservation.
3. data transmission method as claimed in claim 2, which is characterized in that the reception regenerated described in the preservation
After the step of key at end, further includes:
The key of the receiving end regenerated is sent to the receiving end, for the receiving end more new key.
4. data transmission method as described in claim 1, which is characterized in that the step of the key for updating the receiving end
Further include:
When receiving the key that the receiving end is sent, the key that this is received replaces the previously stored receiving end
Key.
5. the data transmission method as described in claim 1-4 is any, which is characterized in that it is described using described in the key pair to
After the step of transmission data are encrypted, the encrypted data to be transmitted are sent to the receiving end, further includes:
When the transmitting terminal of the data to be transmitted receives feedback information of the receiving end based on the data to be transmitted, obtain
Feedback information described in the key pair of the transmitting terminal is decrypted, wherein the receiving end uses the key pair of the transmitting terminal
The feedback information is encrypted.
6. a kind of data transmission method, which is characterized in that the data transmission method the following steps are included:
When receiving end receives data information, data information described in the key-parsing using the receiving end;
Key updating request is sent to server, receives the replacement key of the server feedback;
According to the key of receiving end described in the replacement key updating.
7. data transmission method as claimed in claim 6, which is characterized in that described to be connect according to the replacement key updating
After the step of key of receiving end, further includes:
Updated key is sent to the transmitting terminal of data transmission, so that the transmitting terminal updates the key of the receiving end.
8. data transmission method as claimed in claims 6 or 7, which is characterized in that described according to replacement key updating institute
After the step of stating the key of receiving end, further includes:
When sending feedback information to the transmitting terminal of the data information, feedback information described in the key pair using the transmitting terminal into
Row encryption.
9. a kind of data transmission device, which is characterized in that the data transmission device includes: memory, processor and is stored in
On the memory and the computer program that can run on the processor, the computer program are executed by the processor
The step of Shi Shixian such as data transmission method described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with data biography on the computer readable storage medium
Defeated program realizes that data described in any item of the claim 1 to 8 such as are transmitted when the data distributing program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811248379.2A CN109246695A (en) | 2018-10-24 | 2018-10-24 | Data transmission method, device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811248379.2A CN109246695A (en) | 2018-10-24 | 2018-10-24 | Data transmission method, device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246695A true CN109246695A (en) | 2019-01-18 |
Family
ID=65081959
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811248379.2A Pending CN109246695A (en) | 2018-10-24 | 2018-10-24 | Data transmission method, device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246695A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110247815A (en) * | 2019-05-09 | 2019-09-17 | 深圳市迅雷网络技术有限公司 | A kind of data transmission method, device, system and computer readable storage medium |
CN110855628A (en) * | 2019-10-21 | 2020-02-28 | 南京磐固信息科技有限公司 | Data transmission method and system |
CN115208570A (en) * | 2022-09-16 | 2022-10-18 | 广州万协通信息技术有限公司 | Encryption method and device based on dynamic replacement of secret key |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1494252A (en) * | 2002-10-31 | 2004-05-05 | 华为技术有限公司 | Encryption communication method and device |
CN102065135A (en) * | 2010-12-15 | 2011-05-18 | 中国联合网络通信集团有限公司 | Peer to peer data acquisition method, system and server |
CN103051641A (en) * | 2013-01-17 | 2013-04-17 | 中国银行股份有限公司 | Method and system for updating multiple-client key, and information security transmission method |
CN104618097A (en) * | 2015-01-24 | 2015-05-13 | 刘勇 | Data encryption sending method, data terminal and server |
-
2018
- 2018-10-24 CN CN201811248379.2A patent/CN109246695A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1494252A (en) * | 2002-10-31 | 2004-05-05 | 华为技术有限公司 | Encryption communication method and device |
CN102065135A (en) * | 2010-12-15 | 2011-05-18 | 中国联合网络通信集团有限公司 | Peer to peer data acquisition method, system and server |
CN103051641A (en) * | 2013-01-17 | 2013-04-17 | 中国银行股份有限公司 | Method and system for updating multiple-client key, and information security transmission method |
CN104618097A (en) * | 2015-01-24 | 2015-05-13 | 刘勇 | Data encryption sending method, data terminal and server |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110247815A (en) * | 2019-05-09 | 2019-09-17 | 深圳市迅雷网络技术有限公司 | A kind of data transmission method, device, system and computer readable storage medium |
CN110855628A (en) * | 2019-10-21 | 2020-02-28 | 南京磐固信息科技有限公司 | Data transmission method and system |
CN115208570A (en) * | 2022-09-16 | 2022-10-18 | 广州万协通信息技术有限公司 | Encryption method and device based on dynamic replacement of secret key |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110365484B (en) | Data processing method, device and system for equipment authentication | |
EP2667326B1 (en) | Method for dynamic authentication between reader and tag, and device therefor | |
CN104852925B (en) | Mobile intelligent terminal anti-data-leakage secure storage, backup method | |
EP3075096B1 (en) | Method and system for encrypted communications | |
US11924635B2 (en) | Security authentication method and apparatus thereof, and electronic device | |
EP3059919A1 (en) | Method and system for facilitating network joining | |
CN102572815B (en) | Method, system and device for processing terminal application request | |
CN110401527B (en) | Data encryption and decryption method and device and storage medium | |
US20190116161A1 (en) | Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle | |
CN108762791A (en) | Firmware upgrade method and device | |
CN111355684B (en) | Internet of things data transmission method, device and system, electronic equipment and medium | |
CN103095457A (en) | Login and verification method for application program | |
CN106850664B (en) | Internet of things terminal security control method and system based on intelligent mobile terminal | |
CN109246695A (en) | Data transmission method, device and computer readable storage medium | |
CN104521213A (en) | Manipulation and restoration of authentication challenge parameters in network authentication procedures | |
CN109729000B (en) | Instant messaging method and device | |
US20120166801A1 (en) | Mutual authentication system and method for mobile terminals | |
US20210211293A1 (en) | Systems and methods for out-of-band authenticity verification of mobile applications | |
CN105515757B (en) | Security information exchange device based on credible performing environment | |
CN104796262A (en) | Data encryption method and terminal system | |
CN105187479A (en) | Method and system for controlling multiple intelligent devices, and controller | |
CN102158856B (en) | Mobile terminal identification code authentication system and method, server and terminal | |
CN104883682A (en) | WIFI hotspot connecting and selecting method, communication terminal and system | |
CN111787514B (en) | Method and device for acquiring equipment control data, storage medium and electronic device | |
CN109451504A (en) | Internet of Things mould group method for authenticating and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |