CN109802974A - A kind of unidirectional safe transmission method of data based on public key cryptography - Google Patents

A kind of unidirectional safe transmission method of data based on public key cryptography Download PDF

Info

Publication number
CN109802974A
CN109802974A CN201910256107.5A CN201910256107A CN109802974A CN 109802974 A CN109802974 A CN 109802974A CN 201910256107 A CN201910256107 A CN 201910256107A CN 109802974 A CN109802974 A CN 109802974A
Authority
CN
China
Prior art keywords
data
key
module
host
acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910256107.5A
Other languages
Chinese (zh)
Other versions
CN109802974B (en
Inventor
王坤庆
韩文聪
杨恺
张全新
谭毓安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Publication of CN109802974A publication Critical patent/CN109802974A/en
Application granted granted Critical
Publication of CN109802974B publication Critical patent/CN109802974B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of unidirectional safe transmission method of data based on public key cryptography, belongs to public-key cryptosystem and data security transmission technical field.The method is on the basis of public key encryption, pre-arranged public is in data acquisition equipment, data acquisition equipment after data acquisition equipment and service main equipment configuration, is configured to data collection point log-on data acquisition mode and carries out data collection task by preset private key in service main equipment;Main equipment is serviced to transmit and receive mode with the networking of the data acquisition equipment of data collection point, data acquisition equipment log-on data within the maximum time that data acquisition equipment works and upload the data to service main equipment.Present method solves AES fixed key is used merely, all encryption datas are all risks caused by the same key encryption;Improve efficiency;Effectively prevent the risk of key exposure;Using the security mechanism of one-time pad, the data for sending host and encryption key is made to obtain secure storage and safe transmission.

Description

A kind of unidirectional safe transmission method of data based on public key cryptography
Technical field
The present invention relates to a kind of unidirectional safe transmission methods of the data based on public key cryptography, belong to data security transmission technology Field.
Background technique
With increasing for sensor device, intelligent wearable device and its attached corollary equipment number of species, usage scenario Complexity increases, the increasing of data collection capacity, and the randomness that function is opened increases, and connect uncertainty with service master network Increase, storing data is all acquired safely to above equipment, safely and fast transmits data to service main equipment, bring higher want It asks.To make data collection station entrained by above equipment just utilize symmetric encryption method to the number of acquisition since data acquisition According to encrypting, and can on-line normalization when service main equipment be capable of the reception and ciphertext data of safety, need effective benefit The data encryption key of data collection station is protected with the realization of public key cryptography method.It is simultaneously elimination data collection station Encryption key is fixed in the form of plaintext to be easy to extract the risk decoded by the methods of reverse-engineering in a program, is needed abundant Using the random randomness and concealment for generating key, increase the uncertainty of data encryption key, and then realizes that homogeneous is not adopted The data of collection use different data encryption keys (abbreviation one-time pad).
The data one-way safety from source local area network to target LAN realized in the prior art based on unidirectional GAP Technology Transmission, the data one-way transmission that the optical-unidirectional transmission technology being to rely in unidirectional gateway technical principle is realized are to rely on to set The method for preventing data and inversely transmitting that the physical characteristic of standby one-way transmission is realized, has the requirement for meeting real-time, is suitable for Data are transmitted between Different LANs, which needs additional hardware tools and corollary system equipment to support.In contrast, this hair Bright realized in the application layer of network, the unidirectional transmission technology of data for making full use of Cryptography Principles to realize, it is only necessary to match The support for covering software, had not both needed the support of additional external hardware device, special also not dependent on the physics of equipment one-way transmission Property, application field is more extensive.
The identity identifying technology realized before session based on authentication protocol in the prior art is to be exchanged before session using key The method of agreement generation session key.The technology is with both sides while can to interconnect online and know mutual public key mutually Premised on identity, the session key of generation is used by real time communication in online situation.It is finished with the present invention in device configuration Afterwards, it is distributed to data collection point offline, after acquiring a period of time data, data, receiving host are uploaded according to network condition at random Realize that data receiver and decryption have the difference of essence.
Number is realized using the one-way of different data transport protocol conversion setting in data transmission procedure in the prior art According to one-way safety transmission, such as between USB communication protocol and SPI communication agreement alternating conversion.This protocol conversion is realized One-way, but in practical applications there is still a need for increase isolating device on physical layer ensure data flow it is unidirectional Property, to ensure to realize the unidirectional safe transmission of data.Its isolating device is a kind of list of data realized using photoelectric signal transformation To transmission.
Although above-mentioned transmission technology can be realized data safety one-way transmission, but with the present invention compared to use environment with Use condition is different, and the requirement to hardware device is also different, and it is impossible to meet the requirements of above equipment.The purpose of the present invention It is under conditions of not increasing external hardware device, cryptography method to be made full use of to realize data on the basis of existing hardware condition It is transmitted to the one-way safety of receiving host.
Summary of the invention
It is an object of the invention to solve sensor device, intelligent wearable device and its attached corollary equipment etc. to realize data It acquires and into the service unidirectional safe transmission of main equipment data, the prior art, which cannot achieve, acquires safely data under the conditions of offline And encrypted stored data under conditions of no external uni-directional physical transmission device is supported, is completely dependent on close when network condition meets Code learns the technological deficiency that method realizes the unidirectional safe transmission of data, proposes a kind of data one-way safety biography based on public key cryptography Transmission method.
The unidirectional safe transmission method of data be on the basis of public key encryption, pre-arranged public in data acquisition equipment, Preset private key is realized the acquisition of data under data acquisition scheme by data acquisition equipment, is sent out by data in service main equipment Send the safety transmitting that data are realized under reception pattern from transmission host to receiving host.
Wherein, the private key in the public key in data acquisition equipment and service main equipment is known as public private key pair, the public private key pair Generation and storing process, include the following steps:
Step A1) third party's trust authority generates public key file and private key file;
Step A2) base64 transcoding operation is carried out to public key file and private key file by transcoding tool after generate binary system shape The public key P and private key S of formula;
Step A3) public key P is placed in advance in data acquisition equipment respectively and is placed in private key S in advance in service main equipment.
Wherein, data acquisition equipment is to send host under data transmitting and receiving mode;Main equipment is serviced to send out in data It send and is known as receiving host under reception pattern;Function realizes that module includes command reception processing module, key under data acquisition scheme Generation module, RSA realize that cipher key encryption block, data acquisition module, AES realize that data encryption module and data store mould Block;
Wherein, function realizes that module includes command process module, the data sent in host under data transmitting and receiving mode Data reception module, data assembling module, RSA in read module, data transmission blocks and receiving host realize key solution Close module, AES realize data decryption module, data assembling module;
Wherein, it sends instruction receiving processing module response instruction in host and enters different operating modes;
Wherein, it sends key production module in host and generates the AES key that length is greater than 256 bits;
Wherein, it sends RSA in host and realizes that cipher key encryption block carries out the key of generation using the public key of receiving host Encryption obtains the ciphertext that length is 1024 bits or 2048 bit lengths;
Wherein, it sends AES in host and realizes that data encryption module was transmitted using the data key acquisition module of generation The data come are encrypted;
Wherein, send host in data memory module realize key ciphertext and acquire data ciphertext be combined storage to In designated position;
Wherein, it sends the data acquisition module in host and sends host under data acquisition scheme, utilize self-sensor device The data record of realization;
Wherein, data assembling module is combined to the data that host sends over are sent in receiving host, is convenient for key The correspondence of ciphertext and data ciphertext;
Wherein, data assembling module carries out assembling to the data decrypted in transmission host and forms third in receiving host The data file for the specific format that can be read.
After data acquisition equipment and service main equipment configuration, data acquisition equipment is configured to data collection point and is opened Dynamic data acquisition scheme carries out data collection task;Service main equipment within the maximum time that data acquisition equipment work with The data acquisition equipment of data collection point is networked, and data acquisition equipment log-on data transmits and receives mode and upload the data to service Main equipment, this completes the acquisition of data and uploading operations.
Wherein, data acquisition scheme specific work steps is as follows:
Step B1: after data acquisition equipment starting, command reception processing module receives No. 5 return key instructions of continuous input Turn-on data acquisition mode afterwards;
Step B2: key production module generates the AES dynamic key that length is greater than 256 bits, and by AES dynamic key It is transmitted to AES and realizes that data encryption module and RSA realize cipher key encryption block, be that step B3 encryption key and step B4 are encrypted Data are prepared;
Step B3: RSA realizes cipher key encryption block using the public key for the service main equipment being placed in advance in data acquisition equipment P encrypts AES dynamic key to obtain 1024 ratios after receiving the AES dynamic key that key production module passes over Special or 2048 bits AES dynamic key ciphertexts, and AES dynamic key ciphertext is transmitted to data memory module;
Step B4: data acquisition module obtains the acquisition data and AES key length phase of sensor in data acquisition equipment Meanwhile passing data to AES and realizing data encryption module, AES realizes that data encryption module is receiving step B2 and transmitting AES dynamic key after, the continuous acquisition data clear text that sensor obtains is carried out encryption, and to obtain continuous acquisition data close Continuous acquisition data ciphertext is transmitted to data memory module after obtaining continuous acquisition data ciphertext by text;
Step B5: the data memory module in data acquisition equipment is receiving AES dynamic key ciphertext and is continuously adopting After collecting data ciphertext, realizes and AES dynamic key ciphertext and continuous acquisition data ciphertext are combined storage, it is dynamic to form AES State key ciphertext acquired data storage block corresponding with continuous acquisition data ciphertext, shuts down or restarts in data acquisition equipment The continuous acquisition data ciphertext generated before stopping data acquisition scheme all will be regarded as the acquisition data that this operation generates and deposit Store up block;
Step B6, after data acquisition equipment shuts down or restart data acquisition operations of completion, selection is again introduced into number According to acquisition mode, the operation of step B1 to step B5 is repeated, new data acquisition operations are opened, forms new acquired data storage Block;
Data transmit and receive what mode was completed jointly by transmission host and receiving host, and the specific implementation steps are as follows:
Step C1: sending continuously to input 5 secondary source keys after host booting and enter data and transmit and receive mode, at this time etc. waiting The connection request of host is received, if stopped without connection request in this step;If there is connection request, step C2 is skipped to;
Step C2: input sends host IP address after receiving host starting, realizes receiving host and sends host interconnection;
Step C3: it sends after host connect foundation with receiving host, data read module is from memory space in transmission host In continuously read data, and pass data to data transmission blocks, sent acquired data storage block by data transmission blocks To receiving host;
Step C4: data reception module, which receives, in receiving host sends the acquired data storage block that host is sent, and will count According to data assembling module is transmitted to, data assembling module assembles the data received, forms complete AES dynamic key ciphertext With acquired data storage block corresponding to continuous acquisition data ciphertext;
Step C5: after receiving an acquired data storage block in receiving host, RSA realizes that cipher key decryption block is used at this time AES dynamic key ciphertext is decrypted to obtain AES dynamic key in the data block that private key S receives step C4, and by AES Dynamic key is transmitted to AES and realizes that data decryption module, AES realize that data decryption module realizes cipher key decryption block solution with RSA Data ciphertext is acquired in the data block that close obtained AES dynamic key decryption step C4 is received, and obtains step B5 acquisition data The continuous acquisition data clear text of the acquisition of step B4 corresponding to data ciphertext is continuously acquired in memory block;
Step C6: after the reception and decryption for completing an acquired data storage block, data assembling module in receiving host The data that decryption obtains are fixed with the assembling of formatted file, obtains the data file for the specific format that third party can be read.
Beneficial effect
The unidirectional safe transmission method of a kind of data based on public key cryptography of the invention, with available data unidirectional transmission method phase Than having the following beneficial effects:
1. present invention employs international public key cryptography means to have done encipherment protection to data encryption key, fully ensure that The safety of data encryption key;
2. the present invention does not need the support of additional hardware, the safety of data transmission of the present invention is dependent on existing widely used Cryptography supports, and has stringent theoretical foundation, and usage scenario and mode are more versatile and flexible;
3. the present invention generates key using dynamical fashion in data acquisition equipment, effectively prevent artificially inputting key Various limitations of insecurity and terminal device input condition expand the use scope and use environment of data acquisition equipment, Also extend this method uses field and range;
4. the present invention mentions the key that acquisition data encryption uses dynamic random to generate, data encryption is effectively prevented Plaintext version exists key in a program, and program is cracked the risk that rear data encryption key is found by reverse-engineering;
5. the present invention realizes the one-time pad to acquired data encryption, i.e., number used in each data acquisition storage It is different from according to encryption key, effectively increases the safety of acquisition data;
6. the present invention takes full advantage of the high efficiency of symmetrical encryption and decryption, improve acquisition data ciphertext storage safety and The high efficiency that data ciphertext is decrypted in receiving host, shortens the time to data manipulation.
Detailed description of the invention
Fig. 1 is in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment from transmission host To the module composition and data flow diagram of receiving host;
Fig. 2 is the acquisition data in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment Memory block schematic diagram;
Fig. 3 is continuously adopting in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment Collect data clear text schematic diagram;
Fig. 4 is that the third party in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment can The data file schematic diagram of the specific format of reading;
Fig. 5 is trusted third party in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment Public private key pair generates and configuration diagram;
Fig. 6 is the transmission host in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment Program flow diagram in a data recording mode;
Fig. 7 is the double hairs of transmitting-receiving in a kind of unidirectional safe transmission method of data based on public key cryptography of the invention and embodiment Program flow diagram under data transmitting and receiving mode.
Specific embodiment
A kind of present invention unidirectional safe transmission method of data based on public key cryptography is done with reference to the accompanying drawings and examples It further illustrates and is described in detail.
Embodiment 1
The present embodiment illustrates a kind of work of the unidirectional safe transmission method of data based on public key cryptography of the invention Make process.
Specific in the present embodiment, parameter setting is as follows:
RSA program encryption and decryption block length are 1024 bits, and AES program encryption and decryption block length are 256 ratios It is special.
As shown in Figure 1, being a kind of mould of the unidirectional safe transmission method of data based on public key cryptography proposed by the invention Block composition and data flow diagram.Wherein, left dashed box is to send host machine part, and right dashed box is receiving host part, and single arrow is Bit data flow direction, double-head arrow are block data flow direction, and dotted line is continuous operation data flow direction.
From figure 1 it appears that key production module, which generates 256 bit A ES dynamic key, is transmitted to RSA realization key Encrypting module encrypts the AES dynamic key ciphertext to form 1024 bits, is transmitted to AES and realizes that data encryption module is that the module adds The acquisition data that the transmitting of ciphertext data acquisition module comes provide data encryption key, and the acquisition of 256 bits is formed after data are encrypted Data ciphertext;The dynamic key ciphertext of 1024 bits and the acquisition data ciphertext of several 256 bits form an acquisition data Memory block, such as Fig. 2;Data read module read data transfer is connect to data transmission blocks by its data for being sent to receiving host Receive module;Data reception module, which receives, to be transmitted to data assembling module after data and is assembled into acquired data storage block;RSA is realized The AES dynamic key ciphertext that cipher key decryption block extracts 1024 bits from acquired data storage block is decrypted to obtain 256 ratios Special AES dynamic key in plain text, and passes to AES and realizes data decryption module;AES realizes data decryption module according to every 256 Bit data is one group and continuously extracts acquisition data ciphertext from acquired data storage block, is decrypted to obtain the continuous of this block Acquire data clear text, such as Fig. 3;Data assembling module carries out assembling to continuous acquisition data clear text and forms what third party can be read The data file of specific format, such as Fig. 4.
Fig. 5 is public and private key to configuration process schematic diagram is generated, and specific generation configuration process is as follows:
D1 OpenSSL) is carried using linux system, inputs openssl genrsa-out rsa_ respectively in terminal Private_key_1024.pem 1024 and openssl rsa-in rsa_private_key_1024.pem-out rsa_ Public_key_1024.pem-pubout obtains 1024 public and private key certificate files;
It D2) is to be easy to implement the branch that system library can not be depended on transplantability, this method of this method between different devices It holds, complete independently needs to carry out transcoding operation to certificate file to the read operation of certificate file, on first step success basis On, openssl base64-d-in rsa_private_key_1024.pem-out private.pem is inputted under terminal respectively Obtain public key P, the openssl base64-d-in rsa_public_key_1024.pem-out of binary file form Public.pem obtains the private key S of binary file form;
D3) on the basis of second step is completed, public key P is placed in sends host respectively, private key S is placed in receiving host.
Fig. 6 is a kind of unidirectional safe transmission method of data based on public key cryptography proposed by the invention in data acquisition module Under formula, program flow diagram is independently performed by data acquisition equipment, detailed process is as follows:
E1) after data acquisition equipment booting, No. the 5 return keys instruction that the response of command reception processing module continuously inputs, into Enter data acquisition scheme;
E2) after data acquisition scheme starting, it is close that 256 bit length AES dynamics are randomly generated first by key production module Key Kn, and realize that public-key encryption module and AES realize that data encryption module is transmitted to RSA respectively;
E3) RSA realizes that cipher key encryption block reads preset public key P, is produced using rsa encryption program to key production module Raw AES dynamic key KnIt is encrypted to obtain AES dynamic key ciphertext On
E4) after E2 process, data acquisition module obtains acquisition data clear text, and collected data are transmitted to AES realizes data encryption module, and AES realizes that data encryption module carries out encrypt to data using AES dynamic key Kn To acquisition data ciphertext Dn
E5) data memory module is by AES dynamic key ciphertext OnWith continuous acquisition data ciphertext DnStore specific bit It sets, obtains acquired data storage block BLOCKKn
E6) during above-mentioned E1 to E5, user enters repeatedly according to use demand, forms multiple acquired data storages Block, until the space of data acquisition equipment uses or battery is used and is limited.
Fig. 7 is that a kind of unidirectional safe transmission method of data based on public key cryptography proposed by the invention connects in data transmission Under receipts mode, the program flow diagram completed jointly by transmission host and receiving host, detailed process is as follows:
F1) host is sent after powering, the power key instruction that the continuous input of command reception processing module response is 5 times enters Data transmit and receive mode, wait the communication connection request of receiving host;
F2) receiving host starts after powering receives program, and input sends host IP address, completes and send the logical of host Letter is established;
F3 host) is sent after communication connection is established, by transmission host data read module by BLOCKKnData are read, by This is sent receiving host by data transmission blocks, and receiving host data reception module is by BLOCKKnIt, will after the completion of receiving data Data are transmitted to receiving host data assembling module, and data assembling module assembly forms BLOCKKn, RSA realization cipher key decryption block Local preset private key S is read to decrypt to obtain the AES dynamic key K of the block using RSA decryption programn, and with this KnFor AES dynamic Key realizes that data decryption module decrypts C with AESnIt obtains continuously acquiring data clear text Dn, complete BLOCKKnLater, it sends Host initially enters next piece of BLOCKKn+1It reads and sends work, receiving host starts to initially enter BLOCKKn+1Receive journey Sequence;
F4) receiving host is after completing the data receiver decryption of a BLOCK, by the data assembling module pair of receiving host BLOCK data carry out the data file that assembling forms the specific format that third party can be read;
F5) receiving host is after completing the reception assembling of all data, according to user demand selectivity to original number According to being retransmited or data null clear operation, to guarantee to send the continuity that hosting space uses and the repetition that the present invention uses Property.
It should be noted last that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting.The present invention It should not be limited to the embodiment and attached drawing disclosure of that.It is all not depart from the lower change completed of spirit disclosed in this invention Change and improve, without departure from the spirit and scope of technical solution of the present invention, should all cover and work as in scope of the presently claimed invention In.

Claims (5)

1. a kind of unidirectional safe transmission method of data using public key cryptography, it is characterised in that: preset on the basis of public key encryption For public key in data acquisition equipment, preset private key is real under data acquisition scheme by data acquisition equipment in service main equipment The acquisition of existing data, from data transmitting and receiving mode under realize safety transmitting of the data from transmission host to receiving host;
Wherein, the private key in the public key in data acquisition equipment and service main equipment is known as public private key pair, the production of the public private key pair Raw and storing process, includes the following steps:
Step A1) third party's trust authority generates public key file and private key file;
Step A2) base64 transcoding operation is carried out to public key file and private key file by transcoding tool after generate binary form Public key P and private key S;
Step A3) public key P is placed in advance in data acquisition equipment respectively and is placed in private key S in advance in service main equipment;
Wherein, data acquisition equipment is to send host under data transmitting and receiving mode;Service main equipment connects in data transmission It is known as receiving host under receipts mode;
Function under the data acquisition scheme realizes that module includes command reception processing module, key production module, RSA realization Cipher key encryption block, data acquisition module, AES realize data encryption module and data memory module;
Wherein, function realizes that module includes command process module, the reading data sent in host under data transmitting and receiving mode Data reception module, data assembling module, RSA in module, data transmission blocks and receiving host realize that key decrypts mould Block, AES realize data decryption module, data assembling module;
Wherein, data acquisition scheme specific work steps is as follows:
Step B1: after data acquisition equipment starting, command reception processing module is opened after receiving No. 5 return key instructions of continuous input Open data acquisition scheme;
Step B2: key production module generates the AES dynamic key that length is greater than 256 bits, and AES dynamic key is transmitted to AES realizes that data encryption module and RSA realize cipher key encryption block, does standard for step B3 encryption key and step B4 encryption data It is standby;
Step B3: RSA realizes that cipher key encryption block utilizes the public key P for the service main equipment being placed in advance in data acquisition equipment, After receiving the AES dynamic key that key production module passes over, to AES dynamic key encrypted to obtain 1024 bits or The AES dynamic key ciphertext of 2048 bits, and AES dynamic key ciphertext is transmitted to data memory module;
Step B4: when the acquisition data of data acquisition module acquisition sensor are identical with AES key length in data acquisition equipment, It passes data to AES and realizes data encryption module, AES realizes that data encryption module is receiving the next AES of step B2 transmitting After dynamic key, the continuous acquisition data clear text that sensor obtains is subjected to encryption and obtains continuous acquisition data ciphertext, After obtaining continuous acquisition data ciphertext, continuous acquisition data ciphertext is transmitted to data memory module;
Step B5: the data memory module in data acquisition equipment is receiving AES dynamic key ciphertext and continuous acquisition number After ciphertext, realizes and AES dynamic key ciphertext and continuous acquisition data ciphertext are combined storage, it is close to form AES dynamic Key ciphertext acquired data storage block corresponding with continuous acquisition data ciphertext, in data acquisition equipment shutdown or restarts stopping The continuous acquisition data ciphertext generated before data acquisition scheme all will be regarded as the acquired data storage block that this operation generates;
Step B6, after data acquisition equipment shuts down or restart data acquisition operations of completion, selection is again introduced into data and adopts Integrated mode repeats the operation of step B1 to step B5, opens new data acquisition operations, forms new acquired data storage block;
Data transmit and receive what mode was completed jointly by transmission host and receiving host, and the specific implementation steps are as follows:
Step C1: sending continuously to input 5 secondary source keys after host booting and enter data and transmit and receive mode, the master to be received such as at this time The connection request of machine, if stopped without connection request in this step;If there is connection request, step C2 is skipped to;
Step C2: input sends host IP address after receiving host starting, realizes receiving host and sends host interconnection;
Step C3: it after transmission host connects foundation with receiving host, sends data read module in host and connects from memory space It resumes studies evidence of fetching, and passes data to data transmission blocks, sent acquired data storage block to by data transmission blocks and connect Receive host;
Step C4: data reception module, which receives, in receiving host sends the acquired data storage block that host is sent, and data are passed It is delivered to data assembling module, data assembling module assembles the data received, forms complete AES dynamic key ciphertext and continuous Acquisition data ciphertext corresponding to acquired data storage block;
Step C5: after receiving an acquired data storage block in receiving host, RSA realizes cipher key decryption block private key at this time AES dynamic key ciphertext is decrypted to obtain AES dynamic key in the data block that S receives step C4, and AES dynamic is close Key is transmitted to AES and realizes that data decryption module, AES realize that data decryption module realizes that cipher key decryption block decrypts to obtain with RSA The data block that receives of AES dynamic key decryption step C4 in acquire data ciphertext, obtain step B5 acquired data storage block In continuously acquire step B4 corresponding to data ciphertext acquisition continuous acquisition data clear text;
Step C6: after the reception and decryption for completing an acquired data storage block, data assembling module is to solution in receiving host The assembling of formatted file is fixed in close obtained data, obtains the data file for the specific format that third party can be read.
2. the unidirectional safe transmission method of a kind of data using public key cryptography according to claim 1, it is characterised in that: hair It send and receiving processing module response instruction is instructed to enter different operating modes in host;Key production module in host is sent to generate Length is greater than the AES key of 256 bits.
3. the unidirectional safe transmission method of a kind of data using public key cryptography according to claim 1, it is characterised in that: hair RSA in host is sent to realize that cipher key encryption block encrypts the key of generation using the public key of receiving host, obtaining length is The ciphertext of 1024 bits or 2048 bit lengths.
4. the unidirectional safe transmission method of a kind of data using public key cryptography according to claim 1, it is characterised in that: hair AES in host is sent to realize that data encryption module is added using the data that the data key acquisition module of generation passes over It is close;It sends data memory module in host and realizes that key ciphertext and acquisition data ciphertext are combined storage into designated position; The data acquisition module in host is sent in the case where being data acquisition scheme, the data record for utilizing self-sensor device to realize.
5. the unidirectional safe transmission method of a kind of data using public key cryptography according to claim 1, it is characterised in that: connect It receives data assembling module in host to be combined to the data that send over of host are sent, convenient for key ciphertext and data ciphertext It is corresponding;Data assembling module carries out assembling and forms third party can be read to sending the data decrypted in host in receiving host Specific format data file;
After data acquisition equipment and service main equipment configuration, data acquisition equipment is configured to data collection point starting number Data collection task is carried out according to acquisition mode;Main equipment is serviced within the maximum time that data acquisition equipment works and data The data acquisition equipment of collection point is networked, and data acquisition equipment log-on data transmitting and receiving mode upload the data to service master and sets Standby, this completes the acquisition of data and uploading operations.
CN201910256107.5A 2018-12-21 2019-04-01 One-way safe data transmission method based on public key cryptography Active CN109802974B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2018115710285 2018-12-21
CN201811571028 2018-12-21

Publications (2)

Publication Number Publication Date
CN109802974A true CN109802974A (en) 2019-05-24
CN109802974B CN109802974B (en) 2021-01-01

Family

ID=66564436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910256107.5A Active CN109802974B (en) 2018-12-21 2019-04-01 One-way safe data transmission method based on public key cryptography

Country Status (1)

Country Link
CN (1) CN109802974B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756690A (en) * 2020-05-19 2020-10-09 北京明略软件系统有限公司 Data processing system, method and server
CN112822177A (en) * 2020-12-30 2021-05-18 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN114978769A (en) * 2022-07-19 2022-08-30 济南慧天云海信息技术有限公司 Unidirectional lead-in device, method, medium, and apparatus
CN115664841A (en) * 2022-11-14 2023-01-31 济南大学 Data acquisition system and method with network isolation and one-way encryption transmission functions

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
US20140068251A1 (en) * 2012-08-31 2014-03-06 Motorola Solutions, Inc. Method and device for dynamically updating and maintaining certificate path data across remote trust domains
CN104270751A (en) * 2014-04-19 2015-01-07 湘潭大学 Security protocol based on received signal intensity in wireless sensor network
CN106453391A (en) * 2016-11-13 2017-02-22 北海和思科技有限公司 Long repeating data encryption and transmission method and system
CN107466454A (en) * 2017-06-15 2017-12-12 深圳市汇顶科技股份有限公司 Security processing, device, sensor and the terminal device of biological attribute data
CN107645488A (en) * 2017-05-27 2018-01-30 安徽师范大学 Web data storage and data transmission method based on U-shield

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
US20140068251A1 (en) * 2012-08-31 2014-03-06 Motorola Solutions, Inc. Method and device for dynamically updating and maintaining certificate path data across remote trust domains
CN104270751A (en) * 2014-04-19 2015-01-07 湘潭大学 Security protocol based on received signal intensity in wireless sensor network
CN106453391A (en) * 2016-11-13 2017-02-22 北海和思科技有限公司 Long repeating data encryption and transmission method and system
CN107645488A (en) * 2017-05-27 2018-01-30 安徽师范大学 Web data storage and data transmission method based on U-shield
CN107466454A (en) * 2017-06-15 2017-12-12 深圳市汇顶科技股份有限公司 Security processing, device, sensor and the terminal device of biological attribute data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张启坤等: "基于身份的可认证非对称群组密钥协商协议", 《计算机研究与发展》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111756690A (en) * 2020-05-19 2020-10-09 北京明略软件系统有限公司 Data processing system, method and server
CN112822177A (en) * 2020-12-30 2021-05-18 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN112822177B (en) * 2020-12-30 2023-09-19 中国长城科技集团股份有限公司 Data transmission method, device, equipment and storage medium
CN114978769A (en) * 2022-07-19 2022-08-30 济南慧天云海信息技术有限公司 Unidirectional lead-in device, method, medium, and apparatus
CN114978769B (en) * 2022-07-19 2023-08-18 济南慧天云海信息技术有限公司 Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment
CN115664841A (en) * 2022-11-14 2023-01-31 济南大学 Data acquisition system and method with network isolation and one-way encryption transmission functions

Also Published As

Publication number Publication date
CN109802974B (en) 2021-01-01

Similar Documents

Publication Publication Date Title
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
CN109802974A (en) A kind of unidirectional safe transmission method of data based on public key cryptography
US20140325225A1 (en) Self-authenticated method with timestamp
CN104023013A (en) Data transmission method, server side and client
CN102333093A (en) Data encryption transmission method and system
CN106549939B (en) Data processing method and device for intelligent access control system
CN101707767B (en) Data transmission method and devices
CN109976948B (en) Private information backup method and recovery method and system
CN104158880A (en) User-end cloud data sharing solution
CN111769937A (en) Two-party authentication key agreement protocol oriented to advanced measurement system of smart grid
CN108206738B (en) Quantum key output method and system
CN114513327B (en) Block chain-based Internet of things private data rapid sharing method
CN109995785B (en) Quantum password-based method for safely unlocking files in local area network
CN101931623A (en) Safety communication method suitable for remote control with limited capability at controlled end
CN111415252A (en) Privacy transaction processing method and device based on block chain
CN107104888B (en) Safe instant messaging method
KR100789354B1 (en) Method and apparatus for mataining data security on network camera, home gateway and home automation
CN115118458B (en) Data processing method, device, computer equipment and storage medium
CN113364803B (en) Block chain-based security authentication method for power distribution Internet of things
CN101895878A (en) Dynamic password configuration based mobile communication method and system
KR20170083359A (en) Method for encryption and decryption of IoT(Internet of Things) devices using AES algorithm
AU2019381522A1 (en) Encryption system and method employing permutation group-based encryption technology
CN114124369B (en) Multi-group quantum key cooperation method and system
CN111130796B (en) Secure online cloud storage method in instant messaging
CN116112916B (en) Unmanned aerial vehicle data safe sharing method, intelligent base and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant