CN110932843B - Data communication encryption method for embedded system - Google Patents
Data communication encryption method for embedded system Download PDFInfo
- Publication number
- CN110932843B CN110932843B CN201911130888.XA CN201911130888A CN110932843B CN 110932843 B CN110932843 B CN 110932843B CN 201911130888 A CN201911130888 A CN 201911130888A CN 110932843 B CN110932843 B CN 110932843B
- Authority
- CN
- China
- Prior art keywords
- frame
- equipment
- communication
- random number
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000008569 process Effects 0.000 claims description 8
- 238000012545 processing Methods 0.000 claims description 7
- 238000005336 cracking Methods 0.000 abstract description 6
- 230000004044 response Effects 0.000 description 5
- 238000013497 data interchange Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a data communication encryption method for an embedded system, and belongs to the technical field of communication encryption. The invention realizes the uniqueness of time and space of coding and decoding of any one communication by introducing methods such as random number, equipment unique ID, connection handle and the like by taking a non-deterministic equipment event as a seed. The encryption method has the advantages that the RSA asymmetric encryption algorithm is used for transmitting the key, the advanced encryption standards such as AES256 and the like are used for realizing data encryption, the decryption complexity of the communication protocol is high, and the interception playback cracking method is effectively prevented.
Description
Technical Field
The invention belongs to the technical field of communication encryption, and particularly relates to a data communication encryption method for an embedded system.
Background
An Embedded system (Embedded system) is a "special purpose computer system designed for a specific application, completely Embedded inside a controlled device". The embedded system is widely applied to the Internet of things, industrial control, fast-moving products and medical equipment.
In order to ensure that the embedded system is not easily copied and cracked, various encryption means are adopted for matching. For example, the encryption is performed by adopting a CPU or CPLD chip, and a special encryption chip is adopted. The methods have higher encryption strength, but the communication between chips in the system is not encrypted generally or is simply subjected to ciphertext transformation, so that the following three problems exist, and the method is easy to crack. 1. The communication protocol cannot guarantee the uniqueness of each communication, does not have time uniqueness, is easy to record and then decipher by a method of simulating response communication.
2. The encryption system does not strictly authenticate the client, and does not provide a method for preventing the communication sharer embedded in the communication sharer shown in the figure 1 from being cracked, so that the spatial uniqueness of the encryption device cannot be guaranteed.
As shown in fig. 1, encryption systems often achieve spatial uniqueness by limiting the ability of a master device to communicate with only one slave device. By the method of fig. 1, two master devices can communicate with the same slave device through the communication sharer, so that only one slave device can be purchased to serve an unlimited master device, and the uniqueness limitation of the communication space of the device is avoided.
3. The encryption algorithm is not complex enough and can be directly cracked.
Disclosure of Invention
The invention realizes the uniqueness of time and space of coding and decoding of any one communication by introducing methods such as random number, equipment unique ID, connection handle and the like by taking a non-deterministic equipment event as a seed. The symmetric block cipher algorithm AES256 is a well-known and un-breakable algorithm at present, has high execution speed and is easy to realize by hardware, but the algorithm key needs to be known by both parties through a reliable way before transmission. Therefore, the invention uses RSA asymmetric encryption algorithm to transmit the key, uses advanced encryption standards such as AES256 and the like to realize data encryption, has high decryption complexity of the communication protocol, and effectively prevents interception playback cracking method.
In order to achieve the purpose, the invention provides the technical scheme that: a data communication encryption method for an embedded system comprises the following steps:
step 1, establishing communication between master equipment and slave equipment, including establishing a master equipment communication sending frame flow and establishing a slave equipment communication answering frame flow; the process of establishing the communication sending frame of the main equipment comprises the following steps: generating a random number, calculating to obtain the time of the main equipment, filling in a frame plaintext according to a connection establishing frame format, encrypting the frame according to an RSA algorithm, and finishing the sending of the connection establishing frame, wherein the connection establishing frame format comprises the random number, the current time of the main equipment, the unique ID of the slave equipment, an RSA2048 symmetric encryption password, a connection establishing command, a command parameter and a frame CRC;
the process of establishing the slave equipment communication answer frame comprises the following steps: decrypting according to an RSA algorithm, obtaining a data frame decryption key from a decryption frame, generating a connection handle, generating a random number, calculating to obtain the time of a slave device, filling a frame plaintext according to a connection establishment answer frame format, encrypting the frame according to the RSA algorithm, completing the sending of the connection establishment answer frame, wherein the connection establishment answer frame format comprises the random number, the current time of the slave device, the unique ID of a master device, the unique ID of the slave device, the connection handle and the frame CRC;
step 2, the main device data sending processing flow includes: generating a random number, calculating to obtain the time of main equipment, filling in a frame plaintext according to a command frame format, encrypting the frame plaintext according to an AES256 algorithm, and finishing sending a command frame, wherein the command frame format comprises the random number, the current time of the main equipment, the unique ID of slave equipment, a command parameter, a connection handle and frame CRC;
step 3, the slave device data receiving and processing flow comprises:
step 1, waiting for receiving a data frame;
step 2, reading a random number field in the frame;
step 3, decrypting the non-random number field by XOR of the random number field;
step 4, reading the password data area, and decrypting through an RSA algorithm to obtain a communication password;
step 5, decrypting the rest fields through a communication password and an AES algorithm;
step 6, checking whether the protocol CRC check is correct, and returning to the step 1 if the protocol CRC check is incorrect;
7, if the frame is a connection frame, executing the step 15;
step 8, checking whether the ID section of the protocol slave equipment is correct, and returning to the step 1 if the ID section of the protocol slave equipment is incorrect;
step 9, checking whether the ID section of the protocol master equipment is correct, and returning to the step 1 if the ID section of the protocol master equipment is incorrect;
step 10, checking whether the command is correct, and returning to the step 1 if the command is incorrect;
step 11, executing the command;
and 12, filling a command answer frame, wherein the format of the command answer frame comprises: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, command execution result, result parameter and frame CRC;
step 13, sending a command reply frame;
step 14, returning to the step 1;
step 15, recording the ID of the master device;
step 16, establishing a connection reply frame to fill in the ID of the slave device;
step 17, establishing a connection reply frame to fill in a connection handle;
step 18, sending a connection establishment reply frame;
and step 19, returning to the step 1.
Further, the connection handle is a random number generated by the slave device when establishing the connection.
Further, RSA2048 symmetric encryption cipher is a random number generated by the host device.
Further, the frame CRC is equal to the result of CRC checking all data from the beginning of the frame to the front of the frame CRC.
Compared with the prior art, the invention has the following advantages and beneficial effects:
compared with the prior art, the method has the following advantages:
1. by connecting handles, the coding and decoding of any one-time communication have spatial uniqueness.
2. By introducing a non-deterministic device event as a random number of a seed, the random change of the coding and decoding of the communication along with the time is realized. The communication data has time uniqueness.
3. By adopting the RSA asymmetric encryption advanced algorithm to transmit the key, the encryption code decryption complexity in the connection frame establishment is improved.
4. The AES256 advanced encryption standard is adopted to realize data encryption, and the data frame decryption complexity is improved.
Has the advantages that: effectively prevents three main communication cracking methods,
1. the method adopts RSA and AES256 encryption algorithms which are widely adopted by systems such as banks and the like, and the encryption algorithms are not easy to crack for a long time, so that the problem of encryption strength of an encryption system is solved.
2. The method has space uniqueness, and avoids the condition that a plurality of encryption terminals are simulated through one effective encryption terminal.
3. The method has time uniqueness, and effectively prevents the cracking method of simulating the response by using the fake terminal according to the recording frame.
Drawings
Fig. 1 is a structural diagram for decoding a communication password by using a communication sharer.
Fig. 2 is a block diagram of data communication.
Fig. 3 is a flow of sending frames for establishing communication.
Fig. 4 shows a flow of establishing a communication reply frame.
Fig. 5 is a flow chart of a process for the primary station to transmit data.
Fig. 6 is a flow chart of a process of receiving data from a station.
Detailed Description
The technical solution of the present invention is further explained with reference to the drawings and the embodiments.
The embodiment of the invention provides an embedded system data communication encryption method, which realizes communication and data interchange between a master device and a slave device, and needs to establish the communication between the master device and the slave device firstly and then perform the data interchange; the method specifically comprises the following steps:
step 1, establishing communication between master equipment and slave equipment, including establishing a master equipment communication sending frame flow and establishing a slave equipment communication answering frame flow; the process of establishing the communication sending frame of the main equipment comprises the following steps: generating a random number, calculating to obtain the time of the main equipment, filling in a frame plaintext according to a connection establishing frame format, encrypting the frame according to an RSA algorithm, and finishing the sending of the connection establishing frame, wherein the connection establishing frame format comprises the random number, the current time of the main equipment, the unique ID of the slave equipment, an RSA2048 symmetric encryption password, a connection establishing command, a command parameter and a frame CRC;
the process of establishing the slave equipment communication answer frame comprises the following steps: decrypting according to RSA algorithm, obtaining data frame decryption key from the decrypted frame, generating connection handle, generating random number, calculating to obtain slave equipment time, filling frame plaintext according to the format of establishing connection answer frame, encrypting frame according to RSA algorithm, completing the sending of establishing connection answer frame, the format of establishing connection answer frame includes: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, connection handle and frame CRC;
step 2, the main device data sending processing flow includes: generating a random number, calculating to obtain the time of main equipment, filling in a frame plaintext according to a command frame format, encrypting the frame plaintext according to an AES256 algorithm, and finishing sending a command frame, wherein the command frame format comprises the random number, the current time of the main equipment, the unique ID of slave equipment, a command parameter, a connection handle and frame CRC;
step 3, the slave device data receiving and processing flow comprises:
step 1, waiting for receiving a data frame;
step 2, reading a random number field in the frame;
step 3, decrypting the non-random number field by XOR of the random number field;
step 4, reading the password data area, and decrypting through an RSA algorithm to obtain a communication password;
step 5, decrypting the rest fields through a communication password and an AES algorithm;
step 6, checking whether the protocol CRC check is correct, and returning to the step 1 if the protocol CRC check is incorrect;
7, if the frame is a connection frame, executing the step 15;
step 8, checking whether the ID section of the protocol slave equipment is correct, and returning to the step 1 if the ID section of the protocol slave equipment is incorrect;
step 9, checking whether the ID section of the protocol master equipment is correct, and returning to the step 1 if the ID section of the protocol master equipment is incorrect;
step 10, checking whether the command is correct, and returning to the step 1 if the command is incorrect;
step 11, executing the command;
and 12, filling a command answer frame, wherein the format of the command answer frame comprises: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, command execution result, result parameter and frame CRC;
step 13, sending a command reply frame;
step 14, returning to the step 1;
step 15, recording the ID of the master device;
step 16, establishing a connection reply frame to fill in the ID of the slave device;
step 17, establishing a connection reply frame to fill in a connection handle;
step 18, sending a frame of establishing connection reply frame;
and step 19, returning to the step 1.
For a clearer understanding, some basic principles of the invention are explained below.
1. Generation of random numbers: in order to increase the randomness of the communication system and increase the cracking difficulty, random numbers with hardware noise are adopted in many places. Specifically, a system event pool is maintained, information such as system time, system interrupt times, internal function call times, IO call response time and the like is collected continuously, and the information is used as a new seed generated by random numbers.
2. Frame plaintext format: the frame formats are divided into four categories, namely connection establishment, connection response establishment, command frames and command response frames, and the specific formats are shown in tables 1 to 4;
table 1 establish connection frame format
Table 2 establish connection reply frame format
TABLE 3 Command frame Format
Table 4 command reply frame format
Wherein the connection handle is a random number generated by the slave device when establishing the connection; the RSA2048 symmetric encryption password is a random number generated by the main equipment, both the main equipment and the auxiliary equipment generate a random number in real time in communication, subsequent data are all subjected to equipment verification according to the random password encryption and decryption and the random connection handle, and the combination of the two random numbers is an astronomical number, so that the method for cracking by a recording mode is not feasible.
The frame CRC is equal to the result of CRC checking all data from the beginning of the frame to before the frame CRC.
The connection establishment frame contains a master unique ID and a slave unique ID. The two IDs come from the unique ID in an encryption chip of a CPU (Central processing Unit) of the equipment, and if the equipment does not have the unique ID information, the two IDs can be generated by manual sequential coding during equipment production, and the IDs ensure the spatial uniqueness of the equipment.
The device unique ID and the connection handle ensure spatial uniqueness of the communication frame.
The frame format contains the current time, so that the time uniqueness of the frame is ensured.
3. Frame encryption: after the plaintext frame is established, the plaintext frame needs to be encrypted before being sent out. The specific encryption method is as follows:
first, all the fields within the frame except the random number itself are xor encrypted with the random number at the beginning of each frame.
And secondly, if the connection frame format is established, encrypting the frame by using a 2048-bit RSA algorithm and a public password. If the frame is other frame, the symmetric encryption cipher and 256-bit AES algorithm inside the connection frame are used for encryption.
4. Frame decryption: after receiving the ciphertext frame, the frame decryption is carried out according to the following steps:
in the first step, if the connection frame format is established, the full frame is decrypted by using a2048 bit RSA algorithm and a private cipher. If the frame is other frame, the full frame is decrypted by using the symmetric encryption cipher and 256-bit AES algorithm in the connection frame.
And secondly, carrying out exclusive-OR decryption on all fields except the random number of the frame by using the random number at the beginning of each frame.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.
Claims (4)
1. A data communication encryption method for an embedded system is characterized by comprising the following steps:
step 1, establishing communication between master equipment and slave equipment, including establishing a master equipment communication sending frame flow and establishing a slave equipment communication answering frame flow; the process of establishing the communication sending frame of the main equipment comprises the following steps: generating a random number, calculating to obtain the time of the main equipment, filling in a frame plaintext according to a connection establishing frame format, encrypting the frame according to an RSA algorithm, and finishing the sending of the connection establishing frame, wherein the connection establishing frame format comprises the random number, the current time of the main equipment, the unique ID of the slave equipment, an RSA2048 symmetric encryption password, a connection establishing command, a command parameter and a frame CRC;
the process of establishing the slave equipment communication answer frame comprises the following steps: decrypting according to an RSA algorithm, obtaining a data frame decryption key from a decryption frame, generating a connection handle, generating a random number, calculating to obtain the time of a slave device, filling a frame plaintext according to a connection establishment answer frame format, encrypting the frame according to the RSA algorithm, completing the sending of the connection establishment answer frame, wherein the connection establishment answer frame format comprises the random number, the current time of the slave device, the unique ID of a master device, the unique ID of the slave device, the connection handle and the frame CRC;
step 2, the main device data sending processing flow includes: generating a random number, calculating to obtain the time of main equipment, filling in a frame plaintext according to a command frame format, encrypting the frame plaintext according to an AES256 algorithm, and finishing sending a command frame, wherein the command frame format comprises the random number, the current time of the main equipment, the unique ID of slave equipment, a command parameter, a connection handle and frame CRC;
step 3, the slave device data receiving and processing flow comprises:
step 1, waiting for receiving a data frame;
step 2, reading a random number field in the frame;
step 3, decrypting the non-random number field by XOR of the random number field;
step 4, reading the password data area, and decrypting through an RSA algorithm to obtain a communication password;
step 5, decrypting the rest fields through a communication password and an AES algorithm;
step 6, checking whether the protocol CRC check is correct, and returning to the step 1 if the protocol CRC check is incorrect;
7, if the frame is a connection frame, executing the step 15;
step 8, checking whether the ID section of the protocol slave equipment is correct, and returning to the step 1 if the ID section of the protocol slave equipment is incorrect;
step 9, checking whether the ID section of the protocol master equipment is correct, and returning to the step 1 if the ID section of the protocol master equipment is incorrect;
step 10, checking whether the command is correct, and returning to the step 1 if the command is incorrect;
step 11, executing the command;
and 12, filling a command answer frame, wherein the format of the command answer frame comprises: random number, current time of slave equipment, unique ID of master equipment, unique ID of slave equipment, command execution result, result parameter and frame CRC;
step 13, sending a command reply frame;
step 14, returning to the step 1;
step 15, recording the ID of the master device;
step 16, establishing a connection reply frame to fill in the ID of the slave device;
step 17, establishing a connection reply frame to fill in a connection handle;
step 18, sending a connection establishment reply frame;
step 19, returning to the step 1;
by introducing a non-deterministic device event as a random number, the coding and decoding of communication are randomly changed along with time, and communication data have time uniqueness.
2. The data communication encryption method of the embedded system according to claim 1, wherein: the connection handle is a random number generated by the slave device when establishing a connection.
3. The data communication encryption method of the embedded system according to claim 1, wherein: RSA2048 symmetric encryption ciphers are random numbers generated by a host device.
4. The data communication encryption method of the embedded system according to claim 1, wherein: the frame CRC is equal to the result of CRC checking all data from the beginning of the frame to before the frame CRC.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911130888.XA CN110932843B (en) | 2019-11-19 | 2019-11-19 | Data communication encryption method for embedded system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911130888.XA CN110932843B (en) | 2019-11-19 | 2019-11-19 | Data communication encryption method for embedded system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110932843A CN110932843A (en) | 2020-03-27 |
CN110932843B true CN110932843B (en) | 2022-04-29 |
Family
ID=69854214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911130888.XA Active CN110932843B (en) | 2019-11-19 | 2019-11-19 | Data communication encryption method for embedded system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110932843B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114928816B (en) * | 2022-04-24 | 2023-06-23 | 深圳数马电子技术有限公司 | Device connection method, system, terminal device, detection apparatus, and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0381523A2 (en) * | 1989-02-02 | 1990-08-08 | Kabushiki Kaisha Toshiba | Server-aided computation method and distributed information processing unit |
CN101770386A (en) * | 2010-03-08 | 2010-07-07 | 北京飞天诚信科技有限公司 | Safe startup method for Linux embedded system |
CN103812648A (en) * | 2014-03-13 | 2014-05-21 | 深圳数字电视国家工程实验室股份有限公司 | PSA key generating method and device |
CN103905183A (en) * | 2014-03-05 | 2014-07-02 | 北京深思数盾科技有限公司 | Method for improving safety of communication transmission of embedded encryption chip |
CN105637523A (en) * | 2013-10-16 | 2016-06-01 | 思杰系统有限公司 | Secure client drive mapping and file storage system for mobile device management type security |
CN106921638A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of safety device based on asymmetric encryption |
CN107070863A (en) * | 2016-01-29 | 2017-08-18 | 谷歌公司 | Local device certification |
-
2019
- 2019-11-19 CN CN201911130888.XA patent/CN110932843B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0381523A2 (en) * | 1989-02-02 | 1990-08-08 | Kabushiki Kaisha Toshiba | Server-aided computation method and distributed information processing unit |
CN101770386A (en) * | 2010-03-08 | 2010-07-07 | 北京飞天诚信科技有限公司 | Safe startup method for Linux embedded system |
CN105637523A (en) * | 2013-10-16 | 2016-06-01 | 思杰系统有限公司 | Secure client drive mapping and file storage system for mobile device management type security |
CN103905183A (en) * | 2014-03-05 | 2014-07-02 | 北京深思数盾科技有限公司 | Method for improving safety of communication transmission of embedded encryption chip |
CN103812648A (en) * | 2014-03-13 | 2014-05-21 | 深圳数字电视国家工程实验室股份有限公司 | PSA key generating method and device |
CN106921638A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of safety device based on asymmetric encryption |
CN107070863A (en) * | 2016-01-29 | 2017-08-18 | 谷歌公司 | Local device certification |
Non-Patent Citations (3)
Title |
---|
Vehicle Detection Technology Based on Cascading Classifiers of Multi-Feature Integration;Xinyu Hu;《Journal》;20171015;全文 * |
一种适用于嵌入式终端的可信安全方案;王镇道等;《计算机应用与软件》;20160115;全文 * |
低信噪比图像子像素细匹配方法分析;胡新宇等;《计算机仿真》;20180515;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110932843A (en) | 2020-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105553951B (en) | Data transmission method and device | |
CN105162772B (en) | A kind of internet of things equipment certifiede-mail protocol method and apparatus | |
AU2018352026B2 (en) | System and method for generating and depositing keys for multi-point authentication | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
CN107172056A (en) | A kind of channel safety determines method, device, system, client and server | |
CN109391468A (en) | A kind of authentication method and system | |
WO2015024426A1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN108964893A (en) | A kind of cipher key processing method, device, equipment and medium | |
TW201537937A (en) | Unified identity authentication platform and authentication method thereof | |
CN111884802B (en) | Media stream encryption transmission method, system, terminal and electronic equipment | |
CN109104278A (en) | A kind of encrypting and decrypting method | |
JP2002508892A (en) | Two-way authentication and encryption system | |
CN114499857A (en) | Method for realizing data correctness and consistency in big data quantum encryption and decryption | |
CN110932843B (en) | Data communication encryption method for embedded system | |
CN111901335B (en) | Block chain data transmission management method and system based on middle station | |
CN117675285A (en) | Identity verification method, chip and equipment | |
CN100464337C (en) | Method and equipment for carrying out safety communication between USB device and host | |
CN114978769B (en) | Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment | |
US20230027010A1 (en) | Secret code verification protocol | |
CN113545004A (en) | Authentication system with reduced attack surface | |
JPH0231290A (en) | Ic card device | |
CN114186998A (en) | Privacy communication method based on block chain | |
CN114282254A (en) | Encryption and decryption method and device, and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20200327 Assignee: Hubei Lijian Intelligent Equipment Co.,Ltd. Assignor: HUBEI University OF TECHNOLOGY Contract record no.: X2024980000523 Denomination of invention: A Data Communication Encryption Method for Embedded Systems Granted publication date: 20220429 License type: Common License Record date: 20240110 |
|
OL01 | Intention to license declared | ||
OL01 | Intention to license declared |