CN110113160A - A kind of data communications method, device, equipment and medium - Google Patents
A kind of data communications method, device, equipment and medium Download PDFInfo
- Publication number
- CN110113160A CN110113160A CN201910375669.1A CN201910375669A CN110113160A CN 110113160 A CN110113160 A CN 110113160A CN 201910375669 A CN201910375669 A CN 201910375669A CN 110113160 A CN110113160 A CN 110113160A
- Authority
- CN
- China
- Prior art keywords
- key
- communication
- data communication
- target data
- update
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of data communications method, device, equipment and media.The step of this method includes: to obtain to generate the incoming update communication key in end by key;Whether existing with the destinations traffic key for updating communication key and matching judge in target data communication ends;It knows together if it is, reaching with target data communication ends using the key for updating communication key, and data communication is carried out based on update communication key and target data communication ends;Otherwise, data communication is carried out based on original communication key and target data communication ends.Present method ensures the global reliabilities of data communication process.In addition, the present invention also provides a kind of data communication equipment, equipment and medium, beneficial effect is same as above.
Description
Technical field
The present invention relates to data communication fields, more particularly to a kind of data communications method, device, equipment and medium.
Background technique
The new communication mode of one kind that data communication is the communication technology and computer technology combines and generates.It will be in two places
Between transmission information must have transmission channel, according to the difference of transmission media, there are wired data communication and wireless data communication it
Point, but purpose is all by transmission channel by data terminal and computer link, and keep the data terminal of different location real
Existing soft and hardware and information resources it is shared.
In order to ensure the safety of data communication, currently generallys use the mode based on communication key and communicate, communicating pair
The encryption data that encryption generation is carried out by being transferred through cipher key pair communication data, guarantees that the communication data of communicating pair exists with this
It is not stolen or cracks in communication process.A kind of data communication schematic diagram under the prior art as shown in Figure 1, there is currently
In a kind of data communication scene, the key of data communication end both sides generates end and is generated used in data communication process through consultation
Communication key, the communication key of the data communication end both sides of data communication generate end by respective key respectively and provide, into
And data communication is carried out based on communication key between data communication end.In order to ensure the data communication under above-mentioned data communication scene
Safety, communication key often regularly update, but since each key generates the link between end and corresponding data communication ends
State has differences, therefore the communication key that update is got between data communication end is poor there are the regular hour, and then herein
Under the scene that communication key updates, it is difficult to ensure used communication key matches when being communicated between data communication end,
And then it is difficult to ensure the reliability of data communication process.
It can be seen that providing a kind of data communications method, ensure to be adopted when being communicated between data communication end with opposite
Communication key matches, and then guarantees the global reliability of data communication process, is that those skilled in the art need to solve
The problem of.
Summary of the invention
The object of the present invention is to provide a kind of data communications method, device, equipment and media, ensure data communication with opposite
Used communication key matches when being communicated between end, and then guarantees the global reliability of data communication process.
In order to solve the above technical problems, the present invention provides a kind of data communications method, it is applied to data communication end, comprising:
It obtains and the incoming update communication key in end is generated by key;
Whether existing with the destinations traffic key for updating communication key and matching judge in target data communication ends;
It knows together if it is, reaching with target data communication ends using the key for updating communication key, and logical based on updating
Believe that key and target data communication ends carry out data communication;
Otherwise, data communication is carried out based on original communication key and target data communication ends.
Preferably, judge whether the existing destinations traffic to match with update communication key is close in target data communication ends
Key, comprising:
Judged according to the check code for updating communication key whether existing with identical check code in target data communication ends
Destinations traffic key.
Preferably, judged according to the check code for updating communication key whether existing with identical in target data communication ends
The destinations traffic key of check code, comprising:
Judged according to the Hash check code for updating communication key whether existing with identical in target data communication ends
The destinations traffic key of Hash check code.
Preferably, when the quantity for updating communication key is multiple, reach with target data communication ends using more new traffic
The key of key is known together, and carries out data communication with target data communication ends based on communication key is updated, comprising:
Reach to target data communication ends and know together when transmitting each data packet using the corresponding key for updating communication key, and base
The data communication of corresponding data packet is carried out in each update communication key and target data communication ends.
Preferably, after obtaining by the incoming update communication key in key generation end, method further include:
Communication key will be updated to cache to cipher key list.
Preferably, updating communication key is specially quantum key.
In addition, the present invention also provides a kind of data communication equipments, comprising:
Key Acquisition Module is updated, the incoming update communication key in end is generated by key for obtaining;
Matching judgment module, for judge in target data communication ends whether it is existing with update what communication key matched
Destinations traffic key updates cipher key communication module if it is, calling, and otherwise, calls primary key communication module;
Cipher key communication module is updated, is known together for reaching with target data communication ends using the key for updating communication key,
And data communication is carried out with target data communication ends based on communication key is updated;
Primary key communication module, for carrying out data communication based on original communication key and target data communication ends.
In addition, the present invention also provides a kind of data communication end equipments, comprising:
Memory, for storing computer program;
Processor is realized when for executing computer program such as the step of above-mentioned data communications method.
In addition, being stored with meter on computer readable storage medium the present invention also provides a kind of computer readable storage medium
Calculation machine program is realized when computer program is executed by processor such as the step of above-mentioned data communications method.
Data communications method provided by the present invention generates the incoming more new traffic in end by key when data communication end is obtained
After key, judge whether have existed and the update communication key phase in the target data communication ends communicated with data communication end
Matched destinations traffic key if so, then reaching the common recognition using the update communication key with target data communication ends, and is adopted
Data communication is carried out with the update communication key and target data communication ends, if not yet existed and this in target data communication ends
The destinations traffic key that communication key matches is updated, then it is logical to carry out data based on original communication key and target data communication ends
Letter.Since this method is before using communication key and target data communication ends progress data communication is updated, target data is first judged
Communication ends it is whether existing with update the corresponding destinations traffic key of communication key, with this ensure based on the update communication key with
When target data communication ends carry out data communication, target data communication ends have the communication key to match to guarantee data communication
Be normally carried out, it is ensured that the global reliability of data communication process.In addition, the present invention also provides a kind of data communication equipment,
Equipment and medium, beneficial effect are same as above.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly, attached drawing needed in the embodiment will be done simply below
It introduces, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill people
For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of data communication schematic diagram under the prior art;
Fig. 2 is a kind of flow chart of the data communications method applied to data communication end provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another data communications method for being applied to data communication end provided in an embodiment of the present invention;
Fig. 4 is a kind of structure chart of data communication equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, those of ordinary skill in the art are without making creative work, obtained every other
Embodiment belongs to the scope of the present invention.
In order to ensure the safety of data communication, currently generallys use the mode based on communication key and communicate, communicating pair
The encryption data that encryption generation is carried out by being transferred through cipher key pair communication data, guarantees that the communication data of communicating pair exists with this
It is not stolen or cracks in communication process.Data communication schematic diagram as shown in Figure 1, there is currently a kind of data communication scene
In, the key of data communication end both sides generates end and generates communication key used in data communication process through consultation, and data are logical
The communication key of the data communication end both sides of letter generates end by respective key respectively and provides, and then between data communication end
Data communication is carried out based on communication key.In order to ensure the data communications security under above-mentioned data communication scene, communication key
It often regularly updates, but is had differences since each key generates the link state between end and corresponding data communication ends, because
The communication key that update is got between this data communication end is poor there are the regular hour, and then in the field that this communication key updates
Under scape, it is difficult to ensure used communication key matches when being communicated between data communication end, and then is difficult to ensure data
The reliability of communication process.
Core of the invention is to provide a kind of data communications method, when ensuring to be communicated between data communication end relatively
Used communication key matches, and then guarantees the global reliability of data communication process.In addition, the present invention also provides one kind
Data communication equipment, equipment and medium, beneficial effect are same as above.
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.
Fig. 2 is a kind of flow chart of the data communications method applied to data communication end provided in an embodiment of the present invention.Please
With reference to Fig. 2, the specific steps of data communications method include:
Step S10: it obtains and the incoming update communication key in end is generated by key.
It should be noted that the update communication key that this step obtains, is to generate end by key according to week regular hour
Phase, or the communication key for generating and being passed in data communication end after original communication key access times reach certain threshold value, more
The purpose for changing communication key used in data communication end is communicated in order to avoid identical communication key is used for multiple times
The case where key is cracked, so that it is guaranteed that the safety of communication key.
Step S11: whether existing with the destinations traffic for updating communication key and matching judge in target data communication ends
Otherwise key, executes step S13 if so, thening follow the steps S12.
Step S12: reach with target data communication ends and know together using the key for updating communication key, and be based on more new traffic
Key and target data communication ends carry out data communication.
Step S13: data communication is carried out based on original communication key and target data communication ends.
After receiving update communication key, first determine whether to have existed in target data communication ends logical with update
The destinations traffic key that matches of letter key, herein it is signified judge in target data communication ends it is whether existing with more new traffic
The destinations traffic key that key matches specifically judges that target data is logical under the data communication scene based on symmetric cryptography
Believe end in whether it is existing with update the consistent destinations traffic key of communication key;And in the data communication based on asymmetric encryption
Under scene, specifically judge in target data communication ends whether it is existing with update the mesh that communication key is in unsymmetrical key relationship
Mark communication key.
When the destinations traffic key existed in target data communication ends and update communication key matches, then can be based on should
It updates communication key and target data communication ends carries out data communication, reach with target data communication ends using update communication key
Key common recognition purpose be inform target data communication ends by currently used communication key be changed to update communication key
Matched destinations traffic key, target data communication ends are based on updating communication key progress with this normal response data communication ends
Data communication;When not there is no and update communication key the destinations traffic key to match in target data communication ends, then still
Data communication is carried out based on original communication key and target data communication ends, ensures being normally carried out for data communication substantially with this.
Data communications method provided by the present invention generates the incoming more new traffic in end by key when data communication end is obtained
After key, judge whether have existed and the update communication key phase in the target data communication ends communicated with data communication end
Matched destinations traffic key if so, then reaching the common recognition using the update communication key with target data communication ends, and is adopted
Data communication is carried out with the update communication key and target data communication ends, if not yet existed and this in target data communication ends
The destinations traffic key that communication key matches is updated, then it is logical to carry out data based on original communication key and target data communication ends
Letter.Since this method is before using communication key and target data communication ends progress data communication is updated, target data is first judged
Communication ends it is whether existing with update the corresponding destinations traffic key of communication key, with this ensure based on the update communication key with
When target data communication ends carry out data communication, target data communication ends have the communication key to match to guarantee data communication
Be normally carried out, it is ensured that the global reliability of data communication process.
On the basis of the above embodiments, the present invention also provides a series of preferred embodiments.
Fig. 3 is the flow chart of another data communications method for being applied to data communication end provided in an embodiment of the present invention.
Referring to FIG. 3, the specific steps of data communications method include:
Step S20: it obtains and the incoming update communication key in end is generated by key.
Step S21: judged according to the check code for updating communication key whether existing with phase in target data communication ends
With the destinations traffic key of check code, if so, thening follow the steps S22, otherwise, step S23 is executed.
Step S22: reach with target data communication ends and know together using the key for updating communication key, and be based on more new traffic
Key and target data communication ends carry out data communication.
Step S23: data communication is carried out based on original communication key and target data communication ends.
It should be noted that data communication scene of the present embodiment based on symmetric cryptography, it is preferred that emphasis is according to more new traffic
The check code of key is as the foundation for judging to whether there is destinations traffic key in target data communication ends, since check code is pair
Update communication key and carry out the character string that generates after feature extraction, thus can not reveal update communication key under the premise of,
The identity for updating communication key is uniquely characterized in relatively succinct mode, the present embodiment is sentenced according to the check code for updating communication key
In disconnected target data communication ends whether the existing destinations traffic key with identical check code, when update communication key and target
When the check code of communication key is identical, then it is believed that the destinations traffic key of target data communication ends and local data communication end more
New traffic key agreement, can be based on the number updated between communication key progress local data communication end and target data communication ends
According to communication.The present embodiment can reduce the integral operation expense in deterministic process relatively, and opposite raising deterministic process is whole
Body efficiency.
On the basis of the above embodiments, as a preferred embodiment, according to the check code for updating communication key
Judge in target data communication ends whether the existing destinations traffic key with identical check code, comprising:
Judged according to the Hash check code for updating communication key whether existing with identical in target data communication ends
The destinations traffic key of Hash check code.
Check code is particularly limited as Hash check code by present embodiment, Hash check code be substantially to communication key into
Hash value caused by row Hash operation is a kind of method for creating small number " fingerprint " from any kind of data.Specifically
It is message or data compression by hash function into abstract, so that data volume becomes smaller, and the format of data is fixed up and is produced
Raw result.Hash check code is usually represented with a short random letters and the character string of number composition, in brief introduction
While can further avoid the identical situation of Hash check code between different data, further ensure that judgement deterministic process
Overall accuracy.
As a preferred embodiment, when the quantity for updating communication key is multiple, with target data communication ends
Reach and know together using the key for updating communication key, and data are carried out based on update communication key and target data communication ends and are led to
Letter, comprising:
Reach to target data communication ends and know together when transmitting each data packet using the corresponding key for updating communication key, and base
The data communication of corresponding data packet is carried out in each update communication key and target data communication ends.
It should be noted that the present embodiment be directed to local data communication end receive in a short time it is multiple update it is logical
The scene for believing key, since the essence of data communication is the interaction of data packet, and needs during transmitting data packet
Encryption and decryption is carried out to its data by communication key, therefore in the above scenario, local data communication terminal and target data are logical
Letter end is reached using the key common recognition for updating communication key, is specifically refined as, local data communication terminal is carried out each number
According to packet communication when the update communication key that accordingly uses and target data communication ends reach key common recognition, target is informed with this
Which kind of corresponding update communication key data communication end should use in the data transmission for carrying out different data packet, opposite to ensure
When there are multiple update communication keys, the order in communication key use, and local data communication end are being updated
The global reliability of data communication between target data communication ends.
On the basis of the above embodiments, as a preferred embodiment, generating what end was passed to by key obtaining
After updating communication key, method further include:
Communication key will be updated to cache to cipher key list.
Due to consideration that being received in multiple scenes for updating communication key in a short time, each update communication key holds
The case where easily going out active, therefore communication key will be updated and cache to cipher key list and guarantee can update the whole of communication key relatively
Body integrality, it is ensured that update overall usability of the communication key in data communication process.
On the basis of a series of above-mentioned embodiments, as a preferred embodiment, update communication key is specially
Quantum key.
It should be noted that the present embodiment is that the scene of data communication is limited to quantum communications scene, quantum key is
Based on quantum mechanics characteristic, generates the both sides of communication and share at random, safe key.Quantum key generate when
One most important property is that the measurement of any pair of quantized system all can generate interference to system, so if there is third party's examination
Figure eavesdropping key, the then both sides communicated will discover.Therefore quantum key safety with higher, the opposite data that improve are led to
The whole confidentiality of letter.
Fig. 4 is a kind of structure chart of data communication equipment provided in an embodiment of the present invention.Number provided in an embodiment of the present invention
According to communication device, comprising:
Key Acquisition Module 10 is updated, the incoming update communication key in end is generated by key for obtaining;
Matching judgment module 11, for judge in target data communication ends whether it is existing with update communication key and match
Destinations traffic key, if it is, call update cipher key communication module 12, otherwise, call primary key communication module 13;
Cipher key communication module 12 is updated, it is total using the key for updating communication key for reaching with target data communication ends
Know, and carries out data communication with target data communication ends based on communication key is updated;
Primary key communication module 13, for carrying out data communication based on original communication key and target data communication ends.
Data communication equipment provided by the present invention generates the incoming more new traffic in end by key when data communication end is obtained
After key, judge whether have existed and the update communication key phase in the target data communication ends communicated with data communication end
Matched destinations traffic key if so, then reaching the common recognition using the update communication key with target data communication ends, and is adopted
Data communication is carried out with the update communication key and target data communication ends, if not yet existed and this in target data communication ends
The destinations traffic key that communication key matches is updated, then it is logical to carry out data based on original communication key and target data communication ends
Letter.Since the present apparatus is before using communication key and target data communication ends progress data communication is updated, target data is first judged
Communication ends it is whether existing with update the corresponding destinations traffic key of communication key, with this ensure based on the update communication key with
When target data communication ends carry out data communication, target data communication ends have the communication key to match to guarantee data communication
Be normally carried out, it is ensured that the global reliability of data communication process.
The present invention also provides a kind of data communication end equipments, comprising:
Memory, for storing computer program;
Processor is realized when for executing computer program such as the step of above-mentioned data communications method.
Data communication end equipment provided by the present invention is led to when data communication end is obtained by the incoming update in key generation end
After believing key, judge whether have existed and the update communication key in the target data communication ends communicated with data communication end
The destinations traffic key to match, if so, then reach the common recognition using the update communication key with target data communication ends, and
Carry out data communication using the update communication key and target data communication ends, if not yet exist in target data communication ends with
The destinations traffic key that the update communication key matches then carries out data based on original communication key and target data communication ends
Communication.Since this equipment is before using communication key and target data communication ends progress data communication is updated, number of targets is first judged
According to the whether existing destinations traffic key corresponding with communication key is updated of communication ends, ensured with this based on the update communication key
When carrying out data communication with target data communication ends, target data communication ends have the communication key to match to guarantee that data are logical
Letter is normally carried out, it is ensured that the global reliability of data communication process.
The present invention also provides a kind of computer readable storage medium, computer journey is stored on computer readable storage medium
Sequence is realized when computer program is executed by processor such as the step of above-mentioned data communications method.
Computer readable storage medium provided by the present invention is passed to more when data communication end is obtained by key generation end
After new traffic key, judge whether have existed and the more new traffic in the target data communication ends communicated with data communication end
The destinations traffic key that key matches, if so, then reaching being total to using the update communication key with target data communication ends
Know, and data communication is carried out using the update communication key and target data communication ends, if in target data communication ends not yet
In the presence of the destinations traffic key to match with the update communication key, then based on original communication key and target data communication ends into
Row data communication.Since this computer readable storage medium is carrying out data using update communication key and target data communication ends
Before communication, the whether existing destinations traffic key corresponding with communication key is updated of target data communication ends is first judged, really with this
It protects when carrying out data communication based on the update communication key and target data communication ends, target data communication ends, which have, to match
Communication key is to guarantee being normally carried out for data communication, it is ensured that the global reliability of data communication process.
A kind of data communications method provided by the present invention, device, equipment and medium are described in detail above.It says
Each embodiment is described in a progressive manner in bright book, and the highlights of each of the examples are the differences with other embodiments
Place, the same or similar parts in each embodiment may refer to each other.For the device disclosed in the embodiment, due to its with
Method disclosed in embodiment is corresponding, so being described relatively simple, reference may be made to the description of the method.It should refer to
It out, for those skilled in the art, without departing from the principle of the present invention, can also be to the present invention
Some improvement and modification can also be carried out, and these improvements and modifications also fall within the scope of protection of the claims of the present invention.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Claims (9)
1. a kind of data communications method, which is characterized in that be applied to data communication end, comprising:
It obtains and the incoming update communication key in end is generated by key;
Judge in target data communication ends whether the existing destinations traffic key to match with the update communication key;
It knows together if it is, reaching with the target data communication ends using the key for updating communication key, and is based on institute
It states and updates communication key and target data communication ends progress data communication;
Otherwise, data communication is carried out based on original communication key and the target data communication ends.
2. data communications method according to claim 1, which is characterized in that it is described judge in target data communication ends whether
The existing destinations traffic key to match with the update communication key, comprising:
Judged according to the check code for updating communication key whether existing with identical institute in the target data communication ends
State the destinations traffic key of check code.
3. data communications method according to claim 2, which is characterized in that described according to the school for updating communication key
Test code judge in the target data communication ends whether the existing destinations traffic key with the identical check code, packet
It includes:
Judged according to the Hash check code for updating communication key whether existing with phase in the target data communication ends
With the destinations traffic key of the Hash check code.
4. data communications method according to claim 1, which is characterized in that when the quantity for updating communication key is more
When a, the described and target data communication ends are reached knows together using the key for updating communication key, and based on described in more
New traffic key and the target data communication ends carry out data communication, comprising:
Reach when transmitting each data packet to the target data communication ends using the corresponding key for updating communication key
Common recognition, and it is logical based on each data for updating the communication key data packet corresponding to the target data communication ends progress
Letter.
5. data communications method according to claim 4, which is characterized in that generate what end was passed to by key in described obtain
After updating communication key, the method also includes:
The update communication key is cached to cipher key list.
6. according to claim 1 to data communications method described in 5 any one, which is characterized in that the update communication key
Specially quantum key.
7. a kind of data communication equipment characterized by comprising
Key Acquisition Module is updated, the incoming update communication key in end is generated by key for obtaining;
Whether matching judgment module existing matches for judging in target data communication ends with the update communication key
Destinations traffic key updates cipher key communication module if it is, calling, and otherwise, calls primary key communication module;
The update cipher key communication module updates the close of communication key using described for reaching with the target data communication ends
Key common recognition, and data communication is carried out based on the update communication key and the target data communication ends;
The primary key communication module, it is logical for carrying out data based on original communication key and the target data communication ends
Letter.
8. a kind of data communication end equipment characterized by comprising
Memory, for storing computer program;
Processor realizes such as data communications method as claimed in any one of claims 1 to 6 when for executing the computer program
The step of.
9. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program is realized when the computer program is executed by processor such as data communications method as claimed in any one of claims 1 to 6
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910375669.1A CN110113160A (en) | 2019-05-07 | 2019-05-07 | A kind of data communications method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910375669.1A CN110113160A (en) | 2019-05-07 | 2019-05-07 | A kind of data communications method, device, equipment and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110113160A true CN110113160A (en) | 2019-08-09 |
Family
ID=67488548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910375669.1A Pending CN110113160A (en) | 2019-05-07 | 2019-05-07 | A kind of data communications method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113160A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103023579A (en) * | 2012-12-07 | 2013-04-03 | 安徽问天量子科技股份有限公司 | Method for conducting quantum secret key distribution on passive optical network and passive optical network |
CN104660603A (en) * | 2015-02-14 | 2015-05-27 | 山东量子科学技术研究院有限公司 | Method and system for extended use of quantum keys in IPSec VPN (internet protocol security-virtual private network) |
CN104660602A (en) * | 2015-02-14 | 2015-05-27 | 山东量子科学技术研究院有限公司 | Quantum key transmission control method and system |
CN105337726A (en) * | 2015-04-06 | 2016-02-17 | 安徽问天量子科技股份有限公司 | End-to-end hand-held device encryption method based on quantum cryptography and system |
CN106301769A (en) * | 2015-06-08 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Quantum key output intent, storage consistency verification method, Apparatus and system |
CN107086907A (en) * | 2016-02-15 | 2017-08-22 | 阿里巴巴集团控股有限公司 | Key synchronization, encapsulation transmission method and device for quantum key distribution process |
CN108667607A (en) * | 2018-05-18 | 2018-10-16 | 国网信息通信产业集团有限公司 | A kind of quantum key synchronous method with electric terminal |
-
2019
- 2019-05-07 CN CN201910375669.1A patent/CN110113160A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103023579A (en) * | 2012-12-07 | 2013-04-03 | 安徽问天量子科技股份有限公司 | Method for conducting quantum secret key distribution on passive optical network and passive optical network |
CN104660603A (en) * | 2015-02-14 | 2015-05-27 | 山东量子科学技术研究院有限公司 | Method and system for extended use of quantum keys in IPSec VPN (internet protocol security-virtual private network) |
CN104660602A (en) * | 2015-02-14 | 2015-05-27 | 山东量子科学技术研究院有限公司 | Quantum key transmission control method and system |
CN105337726A (en) * | 2015-04-06 | 2016-02-17 | 安徽问天量子科技股份有限公司 | End-to-end hand-held device encryption method based on quantum cryptography and system |
CN106301769A (en) * | 2015-06-08 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Quantum key output intent, storage consistency verification method, Apparatus and system |
CN107086907A (en) * | 2016-02-15 | 2017-08-22 | 阿里巴巴集团控股有限公司 | Key synchronization, encapsulation transmission method and device for quantum key distribution process |
CN108667607A (en) * | 2018-05-18 | 2018-10-16 | 国网信息通信产业集团有限公司 | A kind of quantum key synchronous method with electric terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106101068B (en) | Terminal communicating method and system | |
CN103916244B (en) | Verification method and device | |
CN103124266B (en) | Mobile terminal and carry out the method, system and the cloud server that log in by it | |
CN108292994B (en) | Method and device for message verification | |
CN108141364B (en) | Method and apparatus for message authentication | |
CN106340087A (en) | Intelligent switch lock system based on intelligent mobile terminal | |
RU2683853C1 (en) | Method for improving gprs key, sgsn device, user device, hlr / hss and gprs system | |
CN105471845B (en) | Prevent the communication means and system of man-in-the-middle attack | |
CN106960166A (en) | A kind of smart jack management system and its method based on distributed general ledger technology | |
CN105873042A (en) | Lightweight class 5G access authentication method | |
CN108430092A (en) | Obtain, provide method, equipment and the medium of wireless access point access information | |
CN102984335B (en) | Dial the identity identifying method of landline telephone, equipment and system | |
US20210143985A1 (en) | Method and protocol for triple-blind identity mapping. | |
CN110351316A (en) | A kind of remote software upgrade method and device | |
CN109040060A (en) | Terminal-Matching and system, computer equipment | |
CN103401686B (en) | A kind of user's OTP WEB Authentication System and application process thereof | |
Huang et al. | Human interactive secure ID management in body sensor networks | |
CN105162592B (en) | A kind of method and system of certification wearable device | |
CN102420852B (en) | Server, mobile terminal and data synchronizing method | |
Monteiro et al. | A hybrid NFC–Bluetooth secure protocol for Credit Transfer among mobile phones | |
CN109327475B (en) | Multi-layer identity authentication method, device, equipment and storage medium | |
CN107124407A (en) | Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system | |
CN110113160A (en) | A kind of data communications method, device, equipment and medium | |
CN113795023B (en) | Bluetooth data transmission encryption method based on chaotic sequence and packet encryption | |
CN103595855A (en) | Handset business-card system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190809 |
|
RJ01 | Rejection of invention patent application after publication |