CN109246695A - Data transmission method, device and computer readable storage medium - Google Patents

Data transmission method, device and computer readable storage medium Download PDF

Info

Publication number
CN109246695A
CN109246695A CN201811248379.2A CN201811248379A CN109246695A CN 109246695 A CN109246695 A CN 109246695A CN 201811248379 A CN201811248379 A CN 201811248379A CN 109246695 A CN109246695 A CN 109246695A
Authority
CN
China
Prior art keywords
key
data
receiving end
data transmission
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811248379.2A
Other languages
Chinese (zh)
Inventor
伊根生
陈俊杰
周占原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dingsheng Kaiyuan Science And Technology Co Ltd
Original Assignee
Shenzhen Dingsheng Kaiyuan Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Dingsheng Kaiyuan Science And Technology Co Ltd filed Critical Shenzhen Dingsheng Kaiyuan Science And Technology Co Ltd
Priority to CN201811248379.2A priority Critical patent/CN109246695A/en
Publication of CN109246695A publication Critical patent/CN109246695A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of data transmission method, the data transmission method is the following steps are included: obtain data to be transmitted and the corresponding receiving end of the data to be transmitted, and obtain the key of the receiving end;It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to the receiving end;The key of the receiving end being updated, when for sending data to the receiving end again, data encryption being carried out using the updated key.The invention also discloses a kind of data transmission device and computer readable storage mediums.The continuous variation of key, is followed so that hacker is irregular, and increase key cracks difficulty, even if the key of hack data transmission, also the key that can not know other data of subsequent transmission, the acquisition to follow-up data content improve the safety of data transmission.

Description

Data transmission method, device and computer readable storage medium
Technical field
The present invention relates to safety-security area more particularly to data transmission methods, device and computer readable storage medium.
Background technique
With the development of network technology, some emerging security protection enterprises start to carry out using less radio-frequency broadcast network system Communication.Generally all with forms of broadcasting signaling, all equipment within the scope of radio frequency reception can receive extensively less radio-frequency Broadcast the transmission data of coming.To guarantee that transferring content will not be revealed, when transmitting data, data are encrypted, only The data content of transmission data can be interpreted with the receiving end for being decrypted correctly key.
But existing various cipher modes crack risk in the presence of certain, for example, being generally acknowledged now using safety-security area Safest rolling code cipher mode, however it remains after being seized on both sides by the arms by exhaustion, crack the modes such as agreement and be decrypted.And rolling code Always there is one day that rolling is most, it is also possible to which having time overlapping can not be accomplished to be free from risk.In addition, radio frequency communication is using same Numeric data code is unlocked in future time instance, and hacker is easy to can receive the machine of numeric data code by placing within the scope of radio frequency reception, By recording all numeric data codes received in a period of time, decruption key, the data that decryption less radio-frequency is sent are obtained.
Therefore, when being encrypted using data of the existing encryption method to wireless radio frequency transmission, communication data is easy quilt It seizes on both sides by the arms or is cracked after monitoring, lead to the problem of information leakage.
Summary of the invention
The main purpose of the present invention is to provide a kind of data transmission method, device and computer readable storage medium, purports When solving to encrypt the data of wireless radio frequency transmission using existing encryption method, communication data is easy to be seized on both sides by the arms or supervised The technical issues of being cracked after listening, generating information leakage.
To achieve the above object, the present invention provides a kind of data transmission method, and the data transmission method includes following step It is rapid:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to institute State receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using described updated Key carries out data encryption.
Preferably, the data transmission method further include:
When receiving the key updating request that the receiving end is sent, the step of the key for updating the receiving end is executed Suddenly;
The step of key for updating the receiving end includes:
Regenerate the key of the receiving end, wherein after the receiving end receives the data to be transmitted, send institute State key updating request;
The key of the receiving end regenerated described in preservation.
Preferably, after the step of key of the receiving end regenerated described in the preservation, further includes:
The key of the receiving end regenerated is sent to the receiving end, for the receiving end more Xinmi City Key.
Preferably, the step of key for updating the receiving end further include:
When receiving the key that the receiving end is sent, the key that this is received replaces the previously stored reception The key at end.
Preferably, described to be encrypted using data to be transmitted described in the key pair, it will be encrypted described to be transmitted Data were sent to after the step of receiving end, further includes:
When the transmitting terminal of the data to be transmitted receives feedback information of the receiving end based on the data to be transmitted, It obtains feedback information described in the key pair of the transmitting terminal to be decrypted, wherein the receiving end is close using the transmitting terminal Key encrypts the feedback information.
In addition, to achieve the above object, the present invention also provides a kind of data transmission method, the data transmission method includes Following steps:
When receiving end receives data information, data information described in the key-parsing using the receiving end;
Key updating request is sent to server, receives the replacement key of the server feedback;
According to the key of receiving end described in the replacement key updating.
Preferably, after the step of key of the receiving end according to the replacement key updating, further includes:
Updated key is sent to the transmitting terminal of data transmission, so that the transmitting terminal updates the close of the receiving end Key.
Preferably, after the step of key of the receiving end according to the replacement key updating, further includes:
When sending feedback information to the transmitting terminal of the data information, feedback letter described in the key pair using the transmitting terminal Breath is encrypted.
In addition, to achieve the above object, the present invention also provides a kind of data transmission devices, which is characterized in that the data Transmitting device includes: that the data that can run on the memory and on the processor of memory, processor and being stored in pass The step of defeated program, the data distributing program realizes data transmission method as described above when being executed by the processor.
In addition, to achieve the above object, the present invention also provides a kind of computer readable storage mediums, which is characterized in that institute It states and is stored with data distributing program on computer readable storage medium, realized such as when the data distributing program is executed by processor Above the step of data transmission method.
The embodiment of the present invention propose a kind of data transmission method, device and computer readable storage medium, need into When row data are transmitted, data sending terminal obtains the content of data to be transmitted and the receiving end of data to be transmitted, and from storage In hunt out the key of the receiving end.Encrypted using the key pair data to be transmitted of receiving end, so by it is encrypted to Transmission data are sent to receiving end, so that receiving end can decrypt data to be transmitted using the key of itself, and in radio frequency reception Other equipment in range allow to get the data to be transmitted, can not also obtain the key of receiving end, can not obtain To data to be transmitted content.After data to be transmitted is sent to receiving end by transmitting terminal, the key of receiving end is updated, It when transmitting data to receiving end next time, is encrypted, is used using next data that updated key pair to be sent The mode of dynamic encryption, the constantly encryption key of variation transmission data.The continuous variation of key, is followed so that hacker is irregular, Increase key cracks difficulty, even if the key of hack data transmission, can not also know its of subsequent transmission The key of his data, the acquisition to follow-up data content improve the safety of data transmission.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of data transmission method first embodiment of the present invention;
Fig. 3 is the flow diagram of data transmission method second embodiment of the present invention;
Fig. 4 is the flow diagram of data transmission method 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of data transmission method fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the 5th embodiment of data transmission method of the present invention;
Fig. 7 is the flow diagram of data transmission method sixth embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to institute State receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using described updated Key carries out data encryption.
When being encrypted due to data of the encryption method in the prior art to wireless radio frequency transmission, communication data is easy quilt It seizes on both sides by the arms or is cracked after monitoring, lead to the problem of information leakage.
The present invention provides a solution, and when needing to carry out data transmission, data sending terminal obtains data to be transmitted Content and data to be transmitted receiving end, and hunt out from storage the key of the receiving end.Using the close of receiving end Key encrypts data to be transmitted, and then encrypted data to be transmitted is sent to receiving end, so that receiving end uses certainly The key of body can decrypt data to be transmitted, and the other equipment within the scope of radio frequency reception allow to get this it is to be transmitted Data can not also obtain the key of receiving end, can not get data to be transmitted content.Data to be transmitted is sent out in transmitting terminal After giving receiving end, the key of receiving end is updated, when transmitting data to receiving end next time, use is updated The key pair data next to be sent are encrypted, and by the way of dynamic encryption, the encryption of constantly variation transmission data is close Key.The continuous variation of key, is followed so that hacker is irregular, increase key cracks difficulty, even if hack is primary The key of data transmission, can not also know the key of other data of subsequent transmission, the acquisition to follow-up data content improves The safety of data transmission.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The terminal of that embodiment of the invention can be PC, be also possible to door sensor, infrared inductor, remote controler, signal input device, Smart phone, tablet computer etc. have the packaged type terminal device of data-transformation facility.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, communication bus 1002, radio-frequency device 1003, memory 1004.Wherein, communication bus 1002 is for realizing the connection communication between these components.Radio-frequency device 1003 send and receive module, such as RFID, radio-frequency card, reader including broadcast data code.Memory 1004 can be height Fast RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1004 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include operating system in a kind of memory 1004 of computer storage medium, wirelessly penetrating Frequency module and data distributing program.
In terminal shown in Fig. 1, radio-frequency device 1003 is mainly used for emitting radio frequency signal to reader, with And receive the vision signal of radio-frequency card transmission;And processor 1001 can be used for that the data stored in memory 1004 is called to transmit Program, and execute following operation:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to institute State receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using described updated Key carries out data encryption.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
When receiving the key updating request that the receiving end is sent, the step of the key for updating the receiving end is executed Suddenly;
The step of key for updating the receiving end includes:
Regenerate the key of the receiving end, wherein after the receiving end receives the data to be transmitted, send institute State key updating request;
The key of the receiving end regenerated described in preservation.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
The key of the receiving end regenerated is sent to the receiving end, for the receiving end more Xinmi City Key.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
When receiving the key that the receiving end is sent, the key that this is received replaces the previously stored reception The key at end.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
When the transmitting terminal of the data to be transmitted receives feedback information of the receiving end based on the data to be transmitted, It obtains feedback information described in the key pair of the transmitting terminal to be decrypted, wherein the receiving end is close using the transmitting terminal Key encrypts the feedback information.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
When receiving end receives data information, data information described in the key-parsing using the receiving end;
Key updating request is sent to server, receives the replacement key of the server feedback;
According to the key of receiving end described in the replacement key updating.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
Updated key is sent to the transmitting terminal of data transmission, so that the transmitting terminal updates the close of the receiving end Key.
Further, processor 1001 can call the data distributing program stored in memory 1004, also execute following Operation:
When sending feedback information to the transmitting terminal of the data information, feedback letter described in the key pair using the transmitting terminal Breath is encrypted.
Reference Fig. 2, data transmission method first embodiment of the present invention, the data transmission method include:
Step S10 obtains data to be transmitted and the corresponding receiving end of the data to be transmitted, and obtains the receiving end Key.
Step S20 is encrypted using data to be transmitted described in the key pair, by the encrypted data to be transmitted It is sent to the receiving end.
Generally all with forms of broadcasting signaling, all equipment within the scope of radio frequency reception can receive less radio-frequency The transmission data broadcast out.To guarantee that transferring content will not be revealed, when transmitting data, data are encrypted, only There is the data content that transmission data can be interpreted with the receiving end for being decrypted correctly key.
Therefore, when needing to carry out data transmission, data sending terminal obtains the content of data to be transmitted, and according to be passed The receiving end of the corresponding data transfer instruction exact figures evidence of transmission of data.Transmitting terminal finds the receiving end being previously stored in memory Key, and encrypted using the key pair data to be transmitted of receiving end, and then encrypted data to be transmitted is sent to Receiving end, other so that receiving end can decrypt data to be transmitted using the key of itself, and within the scope of radio frequency reception are set It is standby to allow to get the data to be transmitted, the key of receiving end can not be also obtained, can not be got in data to be transmitted Hold, has ensured the safety of data transmission.
Wherein, before transmitting terminal sends data to be transmitted, the close of the corresponding receiving end of data to be transmitted has been got Key, and by key storage, after receiving the instruction carried out data transmission to the receiving end, the key of storage is obtained, using this Data key is encrypted.
Step S30 updates the key of the receiving end, when for sending data to the receiving end again, using described Updated key carries out data encryption.
If the long-time between transmitting terminal and receiving end is carried out data transmission using the same key, it is easy to be cracked, one After denier cracks, other equipment can get hereafter all Data Transmission Contents between transmitting terminal and receiving end, be unfavorable for information Safeguard protection.Therefore, data transmission method provided by the present application, transmitting terminal by data to be transmitted be sent to receiving end it Afterwards, the key of receiving end is updated, it is following using updated key pair when transmitting data to receiving end next time The data to be sent are encrypted, and by the way of dynamic encryption, constantly change the encryption key of transmission data.Key it is continuous Variation, is followed so that hacker is irregular, and increase key cracks difficulty, even if data transmission of hack is close Key can not also know the key of other data of subsequent transmission, the acquisition to follow-up data content, improve the peace of data transmission Quan Xing.
In the present embodiment, when needing to carry out data transmission, data sending terminal obtain data to be transmitted content and The receiving end of data to be transmitted, and hunt out from storage the key of the receiving end.It is to be transmitted using the key pair of receiving end Data are encrypted, and then encrypted data to be transmitted is sent to receiving end, so that receiving end is using the key of itself Can decrypt data to be transmitted, and the other equipment within the scope of radio frequency reception allow to get the data to be transmitted, also without Method obtains the key of receiving end, can not get data to be transmitted content.Data to be transmitted is sent to reception in transmitting terminal After end, the key of receiving end is updated, when transmitting data to receiving end next time, is docked using updated key The data to be sent of getting off are encrypted, and by the way of dynamic encryption, constantly change the encryption key of transmission data.Key Constantly variation, is followed so that hacker is irregular, and increase key cracks difficulty, even if data transmission of hack Key can not also know the key of other data of subsequent transmission, the acquisition to follow-up data content, improve data transmission Safety.
Further, referring to Fig. 3, data transmission method second embodiment of the present invention is based on above-mentioned first embodiment, described After step S20, further includes:
Step S40 judges whether to receive the key updating request that the receiving end is sent.
Step S31 regenerates the close of the receiving end when receiving the key updating request that the receiving end is sent Key, wherein after the receiving end receives the data to be transmitted, send the key updating request.
Step S32, the key of the receiving end regenerated described in preservation.
The transmitting terminal and receiving end for sending the data to be transmitted may be server, host computer, it is also possible to keyboard, Other less radio-frequency accessories such as remote controler.When transmitting terminal is that there is key to generate and distribution function for server, host computer etc. When terminal, the method that transmitting terminal updates the key of receiving end is as follows: after receiving end receives data to be transmitted, sending out to transmitting terminal Key updating is sent to request, transmitting terminal regenerates the key of the receiving end, and will be new after receiving key updating request Key is sent to receiving end.At this point, transmitting terminal saves the key of the receiving end regenerated, the original close of receiving end is replaced Key realizes the key that receiving end is updated in transmitting terminal, when transmitting data to the receiving end next time, using updated close Key is to data encryption.
In addition, updated key is sent to receiving end, so that receiving end is in the number for receiving transmitting terminal transmission again According to when, can using updated data key decrypt.
In the present embodiment, after receiving end receives data to be transmitted, key updating request is sent to transmitting terminal.Data After transmitting terminal receives key updating request, the key of the receiving end is regenerated, and save the key regenerated, so as to When sending data to receiving end again, using the key for encrypting data regenerated, key is primary more using primary rear progress It changes, reaches the dynamic encryption in data transmission procedure, enhance the difficulty that cracks of key, ensure the safety of data transmission.
Further, referring to Fig. 4, data transmission method 3rd embodiment of the present invention is implemented based on the above-mentioned first or second Example, the step S30 further include:
Step S33, when receiving the key that the transmitting terminal is sent, the key replacement that this is received is previously stored The key of the receiving end.
When the transmitting terminal for sending the data to be transmitted is other less radio-frequency accessories such as keyboard, remote controler, transmitting terminal Therefore systematic function without key in receiving end to the terminals such as server or host computer application more new key, and obtains After updated key, updated key is sent to transmitting terminal, transmitting terminal is in the key for receiving receiving end transmission When, the key that this is received replaces the key of the previously stored receiving end, realizes to receiving end in data sending terminal Key updating, when so that sending data to receiving end again, using the key for encrypting data regenerated, key uses primary After once replaced, reach the dynamic encryption in data transmission procedure, enhance the difficulty that cracks of key, ensure data transmission Safety.
In the present embodiment, in receiving end to the terminals such as server or host computer application more new key, and update is obtained After key afterwards, updated key is sent to transmitting terminal, transmitting terminal, will when receiving the key of receiving end transmission This key received replaces the key of the previously stored receiving end, realizes to the key of receiving end in data sending terminal more When newly, so that sending data to receiving end again, using the key for encrypting data regenerated, key uses primary rear progress Primary replacement, reaches the dynamic encryption in data transmission procedure, enhances the difficulty that cracks of key, ensures the safety of data transmission.
Further, referring to Fig. 5, data transmission method fourth embodiment of the present invention is based on above-mentioned the first to three any reality Example is applied, after the step S20, further includes:
Step S50, the transmitting terminal of the data to be transmitted receive the receiving end based on the anti-of the data to be transmitted It when feedforward information, obtains feedback information described in the key pair of the transmitting terminal and is decrypted, wherein the receiving end uses the hair Feedback information described in the key pair of sending end is encrypted.
It is described in above-described embodiment, the key that receiving end is stored in the transmitting terminal of data transmission is similarly receiving The key of transmitting terminal can also be stored in end.Data to be transmitted is received in receiving end, needs to be directed to the data to be transmitted to hair When sending end carries out information feedback, receiving end generates feedback information, and the feedback information is encrypted using the key pair of transmitting terminal. When transmitting terminal receives the feedback information, it is decrypted using the key pair feedback information of itself, obtains the content of feedback information.
In short, transmitting terminal and receiving end are all made of other side's during data interaction in data transmission procedure The data of key pair transmission are encrypted.Meanwhile in the present embodiment, right after the data for receiving other side's transmission every time The key of itself is updated, and updated key is sent to other side, so that other side is when transmitting data next time, is used New data key is encrypted, and wireless radio frequency transmission data double-way dynamic encryption is realized.Between transmitting terminal and receiving end The transmission of all data encrypt, and the key that every data uses is different so that, the content of the data of less radio-frequency transmission The difficulty being stolen greatly increases, and safety is improved.
Further, since the more existing simple encryption of realization algorithm of dynamic encryption provided by the invention is more complicated, for drop Low production and follow-up maintenance cost, it is automatic for the receiving end of different safety class in data transmission method of the invention Select the decryption method of adaptation.Require low receiving end, such as door sensor, infrared sensor etc. to information processing for security performance Only with the accessory of simple feedback, data are transmitted using simple encryption mode;And the demanding recipient of energy new for safety, example Such as remote controler, keyboard have the accessory that instruction of withdrawing a garrison is issued to host, then need more advanced cipher mode, such as the present invention Cipher mode in the data transmission procedure of proposition.In data transmission, for the different safety requirements rank in receiving end, use Corresponding cipher mode encrypts transmission data, and ensureing reduces answering for programming while important information is not stolen Miscellaneous degree reduces program maintenance cost.
In the present embodiment, receive data to be transmitted in receiving end, need for the data to be transmitted to transmitting terminal into When row information is fed back, receiving end generates feedback information, and the feedback information is encrypted using the key pair of transmitting terminal.Transmitting terminal When receiving the feedback information, it is decrypted using the key pair feedback information of itself, obtains the content of feedback information.Transmitting terminal With receiving end during data interaction, the data for being all made of the key pair transmission of other side are encrypted.Meanwhile it connecing every time After the data for receiving other side's transmission, the key of itself is updated, and updated key is sent to other side, for right Side is encrypted when transmitting data next time using new data key, and it is dynamic to realize wireless radio frequency transmission data double-way State encryption.All data transmission between transmitting terminal and receiving end encrypts, and the key that every data uses is different, makes , the difficulty that the content of the data transmission of less radio-frequency is stolen greatly increases, and safety is improved.
In addition, the embodiment of the present invention also proposes a kind of data transmission method, referring to Fig. 6, data transmission method of the present invention the Five embodiments, the data transmission method include:
Step S60, when receiving end receives data information, data information described in the key-parsing using the receiving end.
Generally all with forms of broadcasting signaling, all equipment within the scope of radio frequency reception can receive less radio-frequency The transmission data broadcast out.To guarantee that transferring content will not be revealed, when transmitting data, data are encrypted, only There is the data content that transmission data can be interpreted with the receiving end for being decrypted correctly key.
In data transmission, when receiving end receives data information, it is decrypted using the data key information of itself, To obtain the particular content of data information, corresponding response is made according to the content of data information.Wherein, the data information is by counting According to transmitting terminal encrypted using the key of the receiving end, therefore, which is decrypted and can be solved using the key of itself Close success.
Step S70 sends key updating request to server, receives the replacement key of the server feedback.
Step S80, according to the key of receiving end described in the replacement key updating.
After receiving data information, receiving end is updated key to server request, anti-getting server After the new replacement key of feedback, the new key that key updating is receiving end will be replaced.During radio frequency data transmission, connect Receiving end replaces own key after receiving a data information, guarantees that same key is primary to using, next time It to when being connected to data information, is decrypted using updated key, wherein the data information transmitting terminal moment uses receiving end more Data key information encryption after new.The encryption key of continuous delta data information, follows so that hacker is irregular, increases Key cracks difficulty, even if the key of hack data transmission, can not also know other data of subsequent transmission Key, the acquisition to follow-up data content, improve data transmission safety.
It should be pointed out that when the transmitting terminal of data information is that there is key to generate and distribute for server, host computer etc. When the terminal of function, receiving end sends to transmitting terminal key updating and requests, transmitting terminal regenerating key, and will regenerate Key is sent to receiving end, and therefore, the updated new key in receiving end known to transmitting terminal can be about to new key replacement certainly and originally deposit The key of the receiving end of storage.When the transmitting terminal of data information is other less radio-frequency accessories such as keyboard, remote controler, transmitting terminal is not Systematic function with key, then need receiving end after the completion of key updating, and updated key is sent to data information Transmitting terminal, so that transmitting terminal updates the key of the receiving end, again to transmitting terminal send data information when, use is updated Key encryption.
In the present embodiment, after receiving data information, receiving end is updated key to server request, is obtaining After getting the new replacement key of server feedback, the new key that key updating is receiving end will be replaced.In wireless RF data In transmission process, own key is replaced after receiving a data information in receiving end, guarantees same key to use Once, it, to when being connected to data information, is decrypted using updated key, wherein when data information transmitting terminal next time It carves using the updated data key information encryption in receiving end.The encryption key of continuous delta data information so that hacker without Rule can be followed, and increase key cracks difficulty, even if the key of hack data transmission, can not also know subsequent The key of other data of transmission, the acquisition to follow-up data content improve the safety of data transmission.
Further, referring to Fig. 7, data transmission method sixth embodiment of the present invention is based on above-mentioned 5th embodiment, described After step S80, further includes:
Step S90, when sending feedback information to the transmitting terminal of the data information, using the key pair institute of the transmitting terminal Feedback information is stated to be encrypted.
The key that receiving end is stored in the transmitting terminal of data transmission similarly can also be stored with transmission in the receiving end The key at end.When receiving end sends feedback information for data information, carried out using the key pair of the transmitting terminal feedback information Encryption.When transmitting terminal receives the feedback information, it is decrypted using the key pair feedback information of itself, obtains feedback information Content.
In short, transmitting terminal and receiving end are all made of other side's during data interaction in data transmission procedure The data of key pair transmission are encrypted.Meanwhile after the data for receiving other side's transmission every time, the key of itself is carried out It updates, and updated key is sent to other side, so that other side is when transmitting data next time, using new data key It is encrypted, realizes wireless radio frequency transmission data double-way dynamic encryption.All data transmission between transmitting terminal and receiving end It encrypts, and the key that every data uses is different, so that, the difficulty that the content of the data transmission of less radio-frequency is stolen is big Big to increase, safety is improved.
Further, since the more existing simple encryption of realization algorithm of dynamic encryption provided by the invention is more complicated, for drop Low production and follow-up maintenance cost, it is automatic for the receiving end of different safety class in data transmission method of the invention Select the decryption method of adaptation.Require low receiving end, such as door sensor, infrared sensor etc. to information processing for security performance Only with the accessory of simple feedback, data are transmitted using simple encryption mode;And the demanding recipient of energy new for safety, example Such as remote controler, keyboard have the accessory that instruction of withdrawing a garrison is issued to host, then need more advanced cipher mode, such as the present invention Cipher mode in the data transmission procedure of proposition.In data transmission, for the different safety requirements rank in receiving end, use Corresponding cipher mode encrypts transmission data, and ensureing reduces answering for programming while important information is not stolen Miscellaneous degree reduces program maintenance cost.
In the present embodiment, the key of receiving end is stored in the transmitting terminal of data transmission, similarly, in the receiving end The key of transmitting terminal can be stored with.It, should using the key pair of transmitting terminal when receiving end sends feedback information for data information Feedback information is encrypted.When transmitting terminal receives the feedback information, it is decrypted, is obtained using the key pair feedback information of itself Negate the content of feedforward information.Transmitting terminal and receiving end are all made of the number of the key pair transmission of other side during data interaction According to being encrypted.Meanwhile after the data for receiving other side's transmission every time, the key of itself is updated, and will be updated Key afterwards is sent to other side, so that other side is when transmitting data next time, is encrypted, is realized using new data key Wireless radio frequency transmission data double-way dynamic encryption.All data transmission between transmitting terminal and receiving end encrypts, and every The key that data use is different, so that, the difficulty that the content of the data transmission of less radio-frequency is stolen greatly increases, safety It is improved.
In addition, the embodiment of the present invention also proposes a kind of data transmission device, the data transmission device include: memory, Processor and it is stored in the data distributing program that can be run on the memory and on the processor, the data transmit journey The step of data transmission method described in as above each embodiment is realized when sequence is executed by the processor.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium On be stored with data distributing program, as above number described in each embodiment is realized when the data distributing program is executed by processor The step of according to transmission method.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data transmission method, which is characterized in that the data transmission method the following steps are included:
Data to be transmitted and the corresponding receiving end of the data to be transmitted are obtained, and obtains the key of the receiving end;
It is encrypted using data to be transmitted described in the key pair, the encrypted data to be transmitted is sent to described connect Receiving end;
The key of the receiving end is updated, when for sending data to the receiving end again, using the updated key Carry out data encryption.
2. data transmission method as described in claim 1, which is characterized in that the data transmission method further include:
When receiving the key updating request that the receiving end is sent, the step of executing the key for updating the receiving end;
The step of key for updating the receiving end includes:
Regenerate the key of the receiving end, wherein after the receiving end receives the data to be transmitted, send described close Key updates request;
The key of the receiving end regenerated described in preservation.
3. data transmission method as claimed in claim 2, which is characterized in that the reception regenerated described in the preservation After the step of key at end, further includes:
The key of the receiving end regenerated is sent to the receiving end, for the receiving end more new key.
4. data transmission method as described in claim 1, which is characterized in that the step of the key for updating the receiving end Further include:
When receiving the key that the receiving end is sent, the key that this is received replaces the previously stored receiving end Key.
5. the data transmission method as described in claim 1-4 is any, which is characterized in that it is described using described in the key pair to After the step of transmission data are encrypted, the encrypted data to be transmitted are sent to the receiving end, further includes:
When the transmitting terminal of the data to be transmitted receives feedback information of the receiving end based on the data to be transmitted, obtain Feedback information described in the key pair of the transmitting terminal is decrypted, wherein the receiving end uses the key pair of the transmitting terminal The feedback information is encrypted.
6. a kind of data transmission method, which is characterized in that the data transmission method the following steps are included:
When receiving end receives data information, data information described in the key-parsing using the receiving end;
Key updating request is sent to server, receives the replacement key of the server feedback;
According to the key of receiving end described in the replacement key updating.
7. data transmission method as claimed in claim 6, which is characterized in that described to be connect according to the replacement key updating After the step of key of receiving end, further includes:
Updated key is sent to the transmitting terminal of data transmission, so that the transmitting terminal updates the key of the receiving end.
8. data transmission method as claimed in claims 6 or 7, which is characterized in that described according to replacement key updating institute After the step of stating the key of receiving end, further includes:
When sending feedback information to the transmitting terminal of the data information, feedback information described in the key pair using the transmitting terminal into Row encryption.
9. a kind of data transmission device, which is characterized in that the data transmission device includes: memory, processor and is stored in On the memory and the computer program that can run on the processor, the computer program are executed by the processor The step of Shi Shixian such as data transmission method described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with data biography on the computer readable storage medium Defeated program realizes that data described in any item of the claim 1 to 8 such as are transmitted when the data distributing program is executed by processor The step of method.
CN201811248379.2A 2018-10-24 2018-10-24 Data transmission method, device and computer readable storage medium Pending CN109246695A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811248379.2A CN109246695A (en) 2018-10-24 2018-10-24 Data transmission method, device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811248379.2A CN109246695A (en) 2018-10-24 2018-10-24 Data transmission method, device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109246695A true CN109246695A (en) 2019-01-18

Family

ID=65081959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811248379.2A Pending CN109246695A (en) 2018-10-24 2018-10-24 Data transmission method, device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109246695A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110247815A (en) * 2019-05-09 2019-09-17 深圳市迅雷网络技术有限公司 A kind of data transmission method, device, system and computer readable storage medium
CN110855628A (en) * 2019-10-21 2020-02-28 南京磐固信息科技有限公司 Data transmission method and system
CN115208570A (en) * 2022-09-16 2022-10-18 广州万协通信息技术有限公司 Encryption method and device based on dynamic replacement of secret key

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494252A (en) * 2002-10-31 2004-05-05 华为技术有限公司 Encryption communication method and device
CN102065135A (en) * 2010-12-15 2011-05-18 中国联合网络通信集团有限公司 Peer to peer data acquisition method, system and server
CN103051641A (en) * 2013-01-17 2013-04-17 中国银行股份有限公司 Method and system for updating multiple-client key, and information security transmission method
CN104618097A (en) * 2015-01-24 2015-05-13 刘勇 Data encryption sending method, data terminal and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494252A (en) * 2002-10-31 2004-05-05 华为技术有限公司 Encryption communication method and device
CN102065135A (en) * 2010-12-15 2011-05-18 中国联合网络通信集团有限公司 Peer to peer data acquisition method, system and server
CN103051641A (en) * 2013-01-17 2013-04-17 中国银行股份有限公司 Method and system for updating multiple-client key, and information security transmission method
CN104618097A (en) * 2015-01-24 2015-05-13 刘勇 Data encryption sending method, data terminal and server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110247815A (en) * 2019-05-09 2019-09-17 深圳市迅雷网络技术有限公司 A kind of data transmission method, device, system and computer readable storage medium
CN110855628A (en) * 2019-10-21 2020-02-28 南京磐固信息科技有限公司 Data transmission method and system
CN115208570A (en) * 2022-09-16 2022-10-18 广州万协通信息技术有限公司 Encryption method and device based on dynamic replacement of secret key

Similar Documents

Publication Publication Date Title
CN110365484B (en) Data processing method, device and system for equipment authentication
EP2667326B1 (en) Method for dynamic authentication between reader and tag, and device therefor
CN104852925B (en) Mobile intelligent terminal anti-data-leakage secure storage, backup method
EP3075096B1 (en) Method and system for encrypted communications
US11924635B2 (en) Security authentication method and apparatus thereof, and electronic device
EP3059919A1 (en) Method and system for facilitating network joining
CN102572815B (en) Method, system and device for processing terminal application request
CN110401527B (en) Data encryption and decryption method and device and storage medium
US20190116161A1 (en) Secure communication method and apparatus for vehicle, multimedia system for vehicle, and vehicle
CN108762791A (en) Firmware upgrade method and device
CN111355684B (en) Internet of things data transmission method, device and system, electronic equipment and medium
CN103095457A (en) Login and verification method for application program
CN106850664B (en) Internet of things terminal security control method and system based on intelligent mobile terminal
CN109246695A (en) Data transmission method, device and computer readable storage medium
CN104521213A (en) Manipulation and restoration of authentication challenge parameters in network authentication procedures
CN109729000B (en) Instant messaging method and device
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
US20210211293A1 (en) Systems and methods for out-of-band authenticity verification of mobile applications
CN105515757B (en) Security information exchange device based on credible performing environment
CN104796262A (en) Data encryption method and terminal system
CN105187479A (en) Method and system for controlling multiple intelligent devices, and controller
CN102158856B (en) Mobile terminal identification code authentication system and method, server and terminal
CN104883682A (en) WIFI hotspot connecting and selecting method, communication terminal and system
CN111787514B (en) Method and device for acquiring equipment control data, storage medium and electronic device
CN109451504A (en) Internet of Things mould group method for authenticating and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118