CN110932843B - Data communication encryption method for embedded system - Google Patents

Data communication encryption method for embedded system Download PDF

Info

Publication number
CN110932843B
CN110932843B CN201911130888.XA CN201911130888A CN110932843B CN 110932843 B CN110932843 B CN 110932843B CN 201911130888 A CN201911130888 A CN 201911130888A CN 110932843 B CN110932843 B CN 110932843B
Authority
CN
China
Prior art keywords
frame
equipment
communication
random number
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911130888.XA
Other languages
Chinese (zh)
Other versions
CN110932843A (en
Inventor
张道德
张�杰
张楚鹏
胡新宇
唐郁轩
孙传有
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Technology
Original Assignee
Hubei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Technology filed Critical Hubei University of Technology
Priority to CN201911130888.XA priority Critical patent/CN110932843B/en
Publication of CN110932843A publication Critical patent/CN110932843A/en
Application granted granted Critical
Publication of CN110932843B publication Critical patent/CN110932843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a data communication encryption method for an embedded system, and belongs to the technical field of communication encryption. The invention realizes the uniqueness of time and space of coding and decoding of any one communication by introducing methods such as random number, equipment unique ID, connection handle and the like by taking a non-deterministic equipment event as a seed. The encryption method has the advantages that the RSA asymmetric encryption algorithm is used for transmitting the key, the advanced encryption standards such as AES256 and the like are used for realizing data encryption, the decryption complexity of the communication protocol is high, and the interception playback cracking method is effectively prevented.

Description

Data communication encryption method for embedded system
Technical Field
The invention belongs to the technical field of communication encryption, and particularly relates to a data communication encryption method for an embedded system.
Background
An Embedded system (Embedded system) is a "special purpose computer system designed for a specific application, completely Embedded inside a controlled device". The embedded system is widely applied to the Internet of things, industrial control, fast-moving products and medical equipment.
In order to ensure that the embedded system is not easily copied and cracked, various encryption means are adopted for matching. For example, the encryption is performed by adopting a CPU or CPLD chip, and a special encryption chip is adopted. The methods have higher encryption strength, but the communication between chips in the system is not encrypted generally or is simply subjected to ciphertext transformation, so that the following three problems exist, and the method is easy to crack. 1. The communication protocol cannot guarantee the uniqueness of each communication, does not have time uniqueness, is easy to record and then decipher by a method of simulating response communication.
2. The encryption system does not strictly authenticate the client, and does not provide a method for preventing the communication sharer embedded in the communication sharer shown in the figure 1 from being cracked, so that the spatial uniqueness of the encryption device cannot be guaranteed.
As shown in fig. 1, encryption systems often achieve spatial uniqueness by limiting the ability of a master device to communicate with only one slave device. By the method of fig. 1, two master devices can communicate with the same slave device through the communication sharer, so that only one slave device can be purchased to serve an unlimited master device, and the uniqueness limitation of the communication space of the device is avoided.
3. The encryption algorithm is not complex enough and can be directly cracked.
Disclosure of Invention
The invention realizes the uniqueness of time and space of coding and decoding of any one communication by introducing methods such as random number, equipment unique ID, connection handle and the like by taking a non-deterministic equipment event as a seed. The symmetric block cipher algorithm AES256 is a well-known and un-breakable algorithm at present, has high execution speed and is easy to realize by hardware, but the algorithm key needs to be known by both parties through a reliable way before transmission. Therefore, the invention uses RSA asymmetric encryption algorithm to transmit the key, uses advanced encryption standards such as AES256 and the like to realize data encryption, has high decryption complexity of the communication protocol, and effectively prevents interception playback cracking method.
In order to achieve the purpose, the invention provides the technical scheme that: a data communication encryption method for an embedded system comprises the following steps:
step 1, establishing communication between master equipment and slave equipment, including establishing a master equipment communication sending frame flow and establishing a slave equipment communication answering frame flow; the process of establishing the communication sending frame of the main equipment comprises the following steps: generating a random number, calculating to obtain the time of the main equipment, filling in a frame plaintext according to a connection establishing frame format, encrypting the frame according to an RSA algorithm, and finishing the sending of the connection establishing frame, wherein the connection establishing frame format comprises the random number, the current time of the main equipment, the unique ID of the slave equipment, an RSA2048 symmetric encryption password, a connection establishing command, a command parameter and a frame CRC;
the process of establishing the slave equipment communication answer frame comprises the following steps: decrypting according to an RSA algorithm, obtaining a data frame decryption key from a decryption frame, generating a connection handle, generating a random number, calculating to obtain the time of a slave device, filling a frame plaintext according to a connection establishment answer frame format, encrypting the frame according to the RSA algorithm, completing the sending of the connection establishment answer frame, wherein the connection establishment answer frame format comprises the random number, the current time of the slave device, the unique ID of a master device, the unique ID of the slave device, the connection handle and the frame CRC;
step 2, the main device data sending processing flow includes: generating a random number, calculating to obtain the time of main equipment, filling in a frame plaintext according to a command frame format, encrypting the frame plaintext according to an AES256 algorithm, and finishing sending a command frame, wherein the command frame format comprises the random number, the current time of the main equipment, the unique ID of slave equipment, a command parameter, a connection handle and frame CRC;
step 3, the slave device data receiving and processing flow comprises:
step 1, waiting for receiving a data frame;
step 2, reading a random number field in the frame;
step 3, decrypting the non-random number field by XOR of the random number field;
step 4, reading the password data area, and decrypting through an RSA algorithm to obtain a communication password;
step 5, decrypting the rest fields through a communication password and an AES algorithm;
step 6, checking whether the protocol CRC check is correct, and returning to the step 1 if the protocol CRC check is incorrect;
7, if the frame is a connection frame, executing the step 15;
step 8, checking whether the ID section of the protocol slave equipment is correct, and returning to the step 1 if the ID section of the protocol slave equipment is incorrect;
step 9, checking whether the ID section of the protocol master equipment is correct, and returning to the step 1 if the ID section of the protocol master equipment is incorrect;
step 10, checking whether the command is correct, and returning to the step 1 if the command is incorrect;
step 11, executing the command;
and 12, filling a command answer frame, wherein the format of the command answer frame comprises: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, command execution result, result parameter and frame CRC;
step 13, sending a command reply frame;
step 14, returning to the step 1;
step 15, recording the ID of the master device;
step 16, establishing a connection reply frame to fill in the ID of the slave device;
step 17, establishing a connection reply frame to fill in a connection handle;
step 18, sending a connection establishment reply frame;
and step 19, returning to the step 1.
Further, the connection handle is a random number generated by the slave device when establishing the connection.
Further, RSA2048 symmetric encryption cipher is a random number generated by the host device.
Further, the frame CRC is equal to the result of CRC checking all data from the beginning of the frame to the front of the frame CRC.
Compared with the prior art, the invention has the following advantages and beneficial effects:
compared with the prior art, the method has the following advantages:
1. by connecting handles, the coding and decoding of any one-time communication have spatial uniqueness.
2. By introducing a non-deterministic device event as a random number of a seed, the random change of the coding and decoding of the communication along with the time is realized. The communication data has time uniqueness.
3. By adopting the RSA asymmetric encryption advanced algorithm to transmit the key, the encryption code decryption complexity in the connection frame establishment is improved.
4. The AES256 advanced encryption standard is adopted to realize data encryption, and the data frame decryption complexity is improved.
Has the advantages that: effectively prevents three main communication cracking methods,
1. the method adopts RSA and AES256 encryption algorithms which are widely adopted by systems such as banks and the like, and the encryption algorithms are not easy to crack for a long time, so that the problem of encryption strength of an encryption system is solved.
2. The method has space uniqueness, and avoids the condition that a plurality of encryption terminals are simulated through one effective encryption terminal.
3. The method has time uniqueness, and effectively prevents the cracking method of simulating the response by using the fake terminal according to the recording frame.
Drawings
Fig. 1 is a structural diagram for decoding a communication password by using a communication sharer.
Fig. 2 is a block diagram of data communication.
Fig. 3 is a flow of sending frames for establishing communication.
Fig. 4 shows a flow of establishing a communication reply frame.
Fig. 5 is a flow chart of a process for the primary station to transmit data.
Fig. 6 is a flow chart of a process of receiving data from a station.
Detailed Description
The technical solution of the present invention is further explained with reference to the drawings and the embodiments.
The embodiment of the invention provides an embedded system data communication encryption method, which realizes communication and data interchange between a master device and a slave device, and needs to establish the communication between the master device and the slave device firstly and then perform the data interchange; the method specifically comprises the following steps:
step 1, establishing communication between master equipment and slave equipment, including establishing a master equipment communication sending frame flow and establishing a slave equipment communication answering frame flow; the process of establishing the communication sending frame of the main equipment comprises the following steps: generating a random number, calculating to obtain the time of the main equipment, filling in a frame plaintext according to a connection establishing frame format, encrypting the frame according to an RSA algorithm, and finishing the sending of the connection establishing frame, wherein the connection establishing frame format comprises the random number, the current time of the main equipment, the unique ID of the slave equipment, an RSA2048 symmetric encryption password, a connection establishing command, a command parameter and a frame CRC;
the process of establishing the slave equipment communication answer frame comprises the following steps: decrypting according to RSA algorithm, obtaining data frame decryption key from the decrypted frame, generating connection handle, generating random number, calculating to obtain slave equipment time, filling frame plaintext according to the format of establishing connection answer frame, encrypting frame according to RSA algorithm, completing the sending of establishing connection answer frame, the format of establishing connection answer frame includes: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, connection handle and frame CRC;
step 2, the main device data sending processing flow includes: generating a random number, calculating to obtain the time of main equipment, filling in a frame plaintext according to a command frame format, encrypting the frame plaintext according to an AES256 algorithm, and finishing sending a command frame, wherein the command frame format comprises the random number, the current time of the main equipment, the unique ID of slave equipment, a command parameter, a connection handle and frame CRC;
step 3, the slave device data receiving and processing flow comprises:
step 1, waiting for receiving a data frame;
step 2, reading a random number field in the frame;
step 3, decrypting the non-random number field by XOR of the random number field;
step 4, reading the password data area, and decrypting through an RSA algorithm to obtain a communication password;
step 5, decrypting the rest fields through a communication password and an AES algorithm;
step 6, checking whether the protocol CRC check is correct, and returning to the step 1 if the protocol CRC check is incorrect;
7, if the frame is a connection frame, executing the step 15;
step 8, checking whether the ID section of the protocol slave equipment is correct, and returning to the step 1 if the ID section of the protocol slave equipment is incorrect;
step 9, checking whether the ID section of the protocol master equipment is correct, and returning to the step 1 if the ID section of the protocol master equipment is incorrect;
step 10, checking whether the command is correct, and returning to the step 1 if the command is incorrect;
step 11, executing the command;
and 12, filling a command answer frame, wherein the format of the command answer frame comprises: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, command execution result, result parameter and frame CRC;
step 13, sending a command reply frame;
step 14, returning to the step 1;
step 15, recording the ID of the master device;
step 16, establishing a connection reply frame to fill in the ID of the slave device;
step 17, establishing a connection reply frame to fill in a connection handle;
step 18, sending a frame of establishing connection reply frame;
and step 19, returning to the step 1.
For a clearer understanding, some basic principles of the invention are explained below.
1. Generation of random numbers: in order to increase the randomness of the communication system and increase the cracking difficulty, random numbers with hardware noise are adopted in many places. Specifically, a system event pool is maintained, information such as system time, system interrupt times, internal function call times, IO call response time and the like is collected continuously, and the information is used as a new seed generated by random numbers.
2. Frame plaintext format: the frame formats are divided into four categories, namely connection establishment, connection response establishment, command frames and command response frames, and the specific formats are shown in tables 1 to 4;
table 1 establish connection frame format
Figure BDA0002278250160000051
Table 2 establish connection reply frame format
Figure BDA0002278250160000052
TABLE 3 Command frame Format
Figure BDA0002278250160000053
Table 4 command reply frame format
Figure BDA0002278250160000054
Wherein the connection handle is a random number generated by the slave device when establishing the connection; the RSA2048 symmetric encryption password is a random number generated by the main equipment, both the main equipment and the auxiliary equipment generate a random number in real time in communication, subsequent data are all subjected to equipment verification according to the random password encryption and decryption and the random connection handle, and the combination of the two random numbers is an astronomical number, so that the method for cracking by a recording mode is not feasible.
The frame CRC is equal to the result of CRC checking all data from the beginning of the frame to before the frame CRC.
The connection establishment frame contains a master unique ID and a slave unique ID. The two IDs come from the unique ID in an encryption chip of a CPU (Central processing Unit) of the equipment, and if the equipment does not have the unique ID information, the two IDs can be generated by manual sequential coding during equipment production, and the IDs ensure the spatial uniqueness of the equipment.
The device unique ID and the connection handle ensure spatial uniqueness of the communication frame.
The frame format contains the current time, so that the time uniqueness of the frame is ensured.
3. Frame encryption: after the plaintext frame is established, the plaintext frame needs to be encrypted before being sent out. The specific encryption method is as follows:
first, all the fields within the frame except the random number itself are xor encrypted with the random number at the beginning of each frame.
And secondly, if the connection frame format is established, encrypting the frame by using a 2048-bit RSA algorithm and a public password. If the frame is other frame, the symmetric encryption cipher and 256-bit AES algorithm inside the connection frame are used for encryption.
4. Frame decryption: after receiving the ciphertext frame, the frame decryption is carried out according to the following steps:
in the first step, if the connection frame format is established, the full frame is decrypted by using a2048 bit RSA algorithm and a private cipher. If the frame is other frame, the full frame is decrypted by using the symmetric encryption cipher and 256-bit AES algorithm in the connection frame.
And secondly, carrying out exclusive-OR decryption on all fields except the random number of the frame by using the random number at the beginning of each frame.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.

Claims (4)

1. A data communication encryption method for an embedded system is characterized by comprising the following steps:
step 1, establishing communication between master equipment and slave equipment, including establishing a master equipment communication sending frame flow and establishing a slave equipment communication answering frame flow; the process of establishing the communication sending frame of the main equipment comprises the following steps: generating a random number, calculating to obtain the time of the main equipment, filling in a frame plaintext according to a connection establishing frame format, encrypting the frame according to an RSA algorithm, and finishing the sending of the connection establishing frame, wherein the connection establishing frame format comprises the random number, the current time of the main equipment, the unique ID of the slave equipment, an RSA2048 symmetric encryption password, a connection establishing command, a command parameter and a frame CRC;
the process of establishing the slave equipment communication answer frame comprises the following steps: decrypting according to an RSA algorithm, obtaining a data frame decryption key from a decryption frame, generating a connection handle, generating a random number, calculating to obtain the time of a slave device, filling a frame plaintext according to a connection establishment answer frame format, encrypting the frame according to the RSA algorithm, completing the sending of the connection establishment answer frame, wherein the connection establishment answer frame format comprises the random number, the current time of the slave device, the unique ID of a master device, the unique ID of the slave device, the connection handle and the frame CRC;
step 2, the main device data sending processing flow includes: generating a random number, calculating to obtain the time of main equipment, filling in a frame plaintext according to a command frame format, encrypting the frame plaintext according to an AES256 algorithm, and finishing sending a command frame, wherein the command frame format comprises the random number, the current time of the main equipment, the unique ID of slave equipment, a command parameter, a connection handle and frame CRC;
step 3, the slave device data receiving and processing flow comprises:
step 1, waiting for receiving a data frame;
step 2, reading a random number field in the frame;
step 3, decrypting the non-random number field by XOR of the random number field;
step 4, reading the password data area, and decrypting through an RSA algorithm to obtain a communication password;
step 5, decrypting the rest fields through a communication password and an AES algorithm;
step 6, checking whether the protocol CRC check is correct, and returning to the step 1 if the protocol CRC check is incorrect;
7, if the frame is a connection frame, executing the step 15;
step 8, checking whether the ID section of the protocol slave equipment is correct, and returning to the step 1 if the ID section of the protocol slave equipment is incorrect;
step 9, checking whether the ID section of the protocol master equipment is correct, and returning to the step 1 if the ID section of the protocol master equipment is incorrect;
step 10, checking whether the command is correct, and returning to the step 1 if the command is incorrect;
step 11, executing the command;
and 12, filling a command answer frame, wherein the format of the command answer frame comprises: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, command execution result, result parameter and frame CRC;
step 13, sending a command reply frame;
step 14, returning to the step 1;
step 15, recording the ID of the master device;
step 16, establishing a connection reply frame to fill in the ID of the slave device;
step 17, establishing a connection reply frame to fill in a connection handle;
step 18, sending a connection establishment reply frame;
step 19, returning to the step 1;
by introducing a non-deterministic device event as a random number, the coding and decoding of communication are randomly changed along with time, and communication data have time uniqueness.
2. The data communication encryption method of the embedded system according to claim 1, wherein: the connection handle is a random number generated by the slave device when establishing a connection.
3. The data communication encryption method of the embedded system according to claim 1, wherein: RSA2048 symmetric encryption ciphers are random numbers generated by a host device.
4. The data communication encryption method of the embedded system according to claim 1, wherein: the frame CRC is equal to the result of CRC checking all data from the beginning of the frame to before the frame CRC.
CN201911130888.XA 2019-11-19 2019-11-19 Data communication encryption method for embedded system Active CN110932843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911130888.XA CN110932843B (en) 2019-11-19 2019-11-19 Data communication encryption method for embedded system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911130888.XA CN110932843B (en) 2019-11-19 2019-11-19 Data communication encryption method for embedded system

Publications (2)

Publication Number Publication Date
CN110932843A CN110932843A (en) 2020-03-27
CN110932843B true CN110932843B (en) 2022-04-29

Family

ID=69854214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911130888.XA Active CN110932843B (en) 2019-11-19 2019-11-19 Data communication encryption method for embedded system

Country Status (1)

Country Link
CN (1) CN110932843B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114928816B (en) * 2022-04-24 2023-06-23 深圳数马电子技术有限公司 Device connection method, system, terminal device, detection apparatus, and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0381523A2 (en) * 1989-02-02 1990-08-08 Kabushiki Kaisha Toshiba Server-aided computation method and distributed information processing unit
CN101770386A (en) * 2010-03-08 2010-07-07 北京飞天诚信科技有限公司 Safe startup method for Linux embedded system
CN103812648A (en) * 2014-03-13 2014-05-21 深圳数字电视国家工程实验室股份有限公司 PSA key generating method and device
CN103905183A (en) * 2014-03-05 2014-07-02 北京深思数盾科技有限公司 Method for improving safety of communication transmission of embedded encryption chip
CN105637523A (en) * 2013-10-16 2016-06-01 思杰系统有限公司 Secure client drive mapping and file storage system for mobile device management type security
CN106921638A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of safety device based on asymmetric encryption
CN107070863A (en) * 2016-01-29 2017-08-18 谷歌公司 Local device certification

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0381523A2 (en) * 1989-02-02 1990-08-08 Kabushiki Kaisha Toshiba Server-aided computation method and distributed information processing unit
CN101770386A (en) * 2010-03-08 2010-07-07 北京飞天诚信科技有限公司 Safe startup method for Linux embedded system
CN105637523A (en) * 2013-10-16 2016-06-01 思杰系统有限公司 Secure client drive mapping and file storage system for mobile device management type security
CN103905183A (en) * 2014-03-05 2014-07-02 北京深思数盾科技有限公司 Method for improving safety of communication transmission of embedded encryption chip
CN103812648A (en) * 2014-03-13 2014-05-21 深圳数字电视国家工程实验室股份有限公司 PSA key generating method and device
CN106921638A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of safety device based on asymmetric encryption
CN107070863A (en) * 2016-01-29 2017-08-18 谷歌公司 Local device certification

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Vehicle Detection Technology Based on Cascading Classifiers of Multi-Feature Integration;Xinyu Hu;《Journal》;20171015;全文 *
一种适用于嵌入式终端的可信安全方案;王镇道等;《计算机应用与软件》;20160115;全文 *
低信噪比图像子像素细匹配方法分析;胡新宇等;《计算机仿真》;20180515;全文 *

Also Published As

Publication number Publication date
CN110932843A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
CN105553951B (en) Data transmission method and device
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
AU2018352026B2 (en) System and method for generating and depositing keys for multi-point authentication
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
US6640303B1 (en) System and method for encryption using transparent keys
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN109391468A (en) A kind of authentication method and system
WO2015024426A1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN108964893A (en) A kind of cipher key processing method, device, equipment and medium
TW201537937A (en) Unified identity authentication platform and authentication method thereof
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
CN109104278A (en) A kind of encrypting and decrypting method
JP2002508892A (en) Two-way authentication and encryption system
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN110932843B (en) Data communication encryption method for embedded system
CN111901335B (en) Block chain data transmission management method and system based on middle station
CN117675285A (en) Identity verification method, chip and equipment
CN100464337C (en) Method and equipment for carrying out safety communication between USB device and host
CN114978769B (en) Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment
US20230027010A1 (en) Secret code verification protocol
CN113545004A (en) Authentication system with reduced attack surface
JPH0231290A (en) Ic card device
CN114186998A (en) Privacy communication method based on block chain
CN114282254A (en) Encryption and decryption method and device, and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200327

Assignee: Hubei Lijian Intelligent Equipment Co.,Ltd.

Assignor: HUBEI University OF TECHNOLOGY

Contract record no.: X2024980000523

Denomination of invention: A Data Communication Encryption Method for Embedded Systems

Granted publication date: 20220429

License type: Common License

Record date: 20240110

OL01 Intention to license declared
OL01 Intention to license declared