CN111698229A - GPS data transmission encryption method - Google Patents

GPS data transmission encryption method Download PDF

Info

Publication number
CN111698229A
CN111698229A CN202010479861.8A CN202010479861A CN111698229A CN 111698229 A CN111698229 A CN 111698229A CN 202010479861 A CN202010479861 A CN 202010479861A CN 111698229 A CN111698229 A CN 111698229A
Authority
CN
China
Prior art keywords
data
gps
algorithm
key
feature code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010479861.8A
Other languages
Chinese (zh)
Inventor
王长军
张�浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wanwei Digital Technology Co ltd
Original Assignee
Shanghai Wanwei Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wanwei Digital Technology Co ltd filed Critical Shanghai Wanwei Digital Technology Co ltd
Priority to CN202010479861.8A priority Critical patent/CN111698229A/en
Publication of CN111698229A publication Critical patent/CN111698229A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Abstract

The invention provides a GPS data transmission encryption method, which comprises the following steps: the server side is provided with a first key pool, the first key pool comprises X key algorithms, and each key algorithm is provided with a unique corresponding first feature code; the GPS terminal is provided with a second key pool, the second key pool comprises Y key algorithms, each key algorithm is provided with a unique corresponding second feature code, Y is equal to X, and the algorithm in the first key pool is completely consistent with the algorithm in the second key pool; when the server establishes communication contact with the GPS terminal, the server selects an algorithm from the first key pool to encrypt data into first data and sends the first data to the GPS terminal; and the GPS terminal receives the first data, matches a decryption algorithm in the second key pool according to the first feature code in the first data, and analyzes the first data according to the decryption algorithm. The invention selects the technical scheme of the encryption mode according to the feature code, improves the effectiveness of GPS data transmission, and reduces the operation load of the server and the GPS terminal.

Description

GPS data transmission encryption method
Technical Field
The invention relates to the field of Internet of things, in particular to a GPS data transmission encryption method.
Background
With the continuous development and progress of encryption technology and the expansion of application range, various encryption algorithms and technologies for realizing the encryption algorithms are continuously researched and applied. In the vehicle GPS positioning system, information such as the position of a vehicle transmitted by a satellite is required to be encrypted and then transmitted to a system terminal through a wireless network, so that the vehicle can be monitored and managed conveniently, and meanwhile, the GPS information of the vehicle can be prevented from being intercepted illegally and tampered. However, improper selection of the data encryption algorithm may cause system efficiency deficiency, and the GPS data encryption cannot be efficiently completed.
Accordingly, those skilled in the art have endeavored to develop efficient encryption methods suitable for GPS data transmission.
Disclosure of Invention
In view of the above defects in the prior art, the technical problem to be solved by the present invention is how to reduce the computation amount between the server and the GPS terminal and improve the utilization efficiency of the device while ensuring the encryption effect.
In order to achieve the above object, the present invention provides a GPS data transmission encryption method, including the following steps: step S101, a server side is provided with a first key pool, the first key pool comprises X key algorithms, each key algorithm is provided with a unique corresponding first feature code, and the step S102 is switched to; step S102, a GPS terminal sets a second key pool, the second key pool comprises Y key algorithms, each key algorithm is provided with a unique corresponding second feature code, Y is equal to X, the algorithm in the first key pool is completely consistent with the algorithm in the second key pool, and the step S103 is switched to; s103, when the server establishes communication contact with the GPS terminal, the server selects an algorithm from the first key pool to encrypt data into first data and sends the first data to the GPS terminal, and the step S104 is switched to; step S104, the GPS terminal receives the first data, matches a decryption algorithm in the second key pool according to the first feature code in the first data, analyzes the first data according to the decryption algorithm, and goes to step S105.
Further, in step S105, when the GPS terminal communicates with the server, the GPS terminal selects an algorithm from the second key pool to encrypt the data into second data, and sends the second data to the server, and then the step S106 is performed; and step S106, the server receives the second data, matches the decryption algorithm in the first key pool according to the second characteristic code of the second data, and analyzes the second data according to the decryption algorithm.
Further, in step S103, when the server encrypts the first data, the encryption variable includes one or more of the following data: the system comprises a first feature code, a server feature code, a GPS terminal feature code, time and a system preset random number sequence.
Further, in step S105, when the GPS encrypts the second data, the encryption variable includes one or more of the following data: the second feature code, the server feature code, the GPS terminal feature code, the time and the system preset random number sequence.
Further, the shift number and the starting number of the encryption variables are randomly generated and transmitted in a agreed secret manner.
Further, the encryption variables and the first data or the second data are calculated in a bit logic operation in an encryption calculation, and each encryption variable of the transmitted data is circulated by at least one bit according to a preset scheme.
Further, the encryption variable is bitwise logically exclusive-ored with the first data or the second data.
Compared with the prior art, the invention has the advantages that:
1. the invention can help to encrypt the GPS system data without adopting random coding, thereby effectively reducing the operation load of the server and the GPS terminal;
2. the invention can reduce the interception, acquisition and analysis of the GPS positioning data by hackers, and ensure the safety and reliability of the GPS data transmission data;
3. the algorithm of the invention can realize the confidentiality of the user data and effectively ensure the safety of the user data.
The conception, the specific structure and the technical effects of the present invention will be further described with reference to the accompanying drawings to fully understand the objects, the features and the effects of the present invention.
Drawings
Fig. 1 is a schematic flow chart of a GPS data transmission encryption method according to the present invention.
Detailed Description
Example one
A GPS data transmission encryption method comprises the following steps:
step S101, a server side is provided with a first key pool, the first key pool comprises X key algorithms, each key algorithm is provided with a unique corresponding first feature code, and the step S102 is switched to;
step S102, a GPS terminal sets a second key pool, the second key pool comprises Y key algorithms, each key algorithm is provided with a unique corresponding second feature code, Y is equal to X, the algorithm in the first key pool is completely consistent with the algorithm in the second key pool, and the step S103 is switched to;
step S103, when the server establishes communication contact with the GPS terminal, the server selects an algorithm from the first key pool to encrypt the data into first data and sends the first data to the GPS terminal, and the encryption variable comprises one or more of the following data: the first feature code, the server feature code, the GPS terminal feature code, the time, and the system preset random number sequence are transferred to step S104.
Step S104, the GPS terminal receives the first data, matches a decryption algorithm in a second key pool according to a first feature code in the first data, analyzes the first data according to the decryption algorithm, and goes to step S105;
step S105, when the GPS terminal is communicated with the server, the GPS terminal selects an algorithm from the second key pool to encrypt the data into second data and sends the second data to the server, and the encryption variable comprises one or more of the following data: the second feature code, the server feature code, the GPS terminal feature code, the time and the system preset random number sequence are transferred to the step S106;
and step S106, the server receives the second data, matches the decryption algorithm in the first key pool according to the second characteristic code of the second data, and analyzes the second data according to the decryption algorithm.
The shift number and the starting number of the encryption variables are randomly generated and transmitted in a predetermined confidential mode. The encryption variables and the first data or the second data are calculated in a bit logic operation in an encryption calculation, and each encryption variable of the transmitted data is circulated by at least one bit according to a preset scheme. And carrying out logical exclusive-or operation on the encryption variable and the first data or the second data by using bits.
Example two
A GPS data transmission encryption method comprises the following steps:
step S101, a server side is provided with a first key pool, the first key pool comprises X key algorithms, X is 10, each key algorithm is provided with a unique corresponding first feature code, X1 and X2 … … X10 respectively, and the step S102 is switched to;
step S102, the GPS terminal sets a second key pool, the second key pool comprises Y key algorithms, Y is 10, each key algorithm is provided with a unique corresponding second feature code, Y1 and Y2 … … Y10 are respectively, Y is equal to X, the algorithm in the first key pool is completely consistent with the algorithm in the second key pool, and the step S103 is turned to;
step S103, when the server establishes communication with the GPS terminal, the server selects an algorithm corresponding to X2 from a first key pool to jointly operate data with a first feature code X2, a server feature code F1, a GPS terminal feature code Z1, system time T1 and a system preset random number sequence M1, encrypts the data into first data and sends the first data to the GPS terminal, wherein the server feature code F1 is a server MAC address, the GPS terminal feature code Z1 is a GPS terminal machine code, the format of the system time T1 is selected from one or more combinations of year, month, day, hour, minute and second according to the terminal feature code, the system preset random number sequence M1 is one part of a sequence generated by the system, and the step S104 is carried out.
Step S104, the GPS terminal receives the first data, the GPS terminal analyzes the first data, according to a first feature code X2 in the first data, a feature code matched with a decryption algorithm in a second key pool is Y3, the GPS terminal analyzes the first data according to the decryption algorithm, in the embodiment, the shift number of an encryption variable is 1, namely the shift number of a first feature code of the algorithm in the first key pool is 1 bit, the first feature code of the algorithm in the second key pool is a second feature code of the algorithm in the second key pool, the shift mode is adjusted randomly by the system after each data transmission, the adjusted data are transmitted to the server by the terminal in a secret transmission mode, and the step S105 is carried out.
Step S105, when the GPS terminal is communicated with the server, the GPS terminal selects an algorithm Y5 from a second key pool to jointly calculate data, a second feature code Y5, a server feature code F2, a GPS terminal feature code Z1 and a system preset random number sequence M1, encrypts the data into first data and sends the first data to the GPS terminal, wherein the server feature code F2 is a server MAC address, the GPS terminal feature code Z1 is a GPS terminal machine code and encrypts the second data into a server side, the server feature code F2 is the server MAC address, the GPS terminal feature code Z1 is the GPS terminal machine code, the system preset random number sequence M1 is one part of a sequence generated by the system, and the step S106 is carried out;
step S106, the server receives the second data, the GPS terminal analyzes the second data, according to a second feature code Y5 in the second data, the feature code matched with the decryption algorithm in the first key pool is X1, the GPS terminal analyzes the second data according to the decryption algorithm, in the embodiment, the shift number of the encryption variable is-4, namely the shift number of the second feature code of the algorithm in the second key pool is-4 bits, the shift number is the first feature code of the algorithm in the first key pool, after each data transmission, the system randomly adjusts the shift mode, the adjusted data are transmitted to the GPS terminal through secret transmission, the decryption algorithm is matched in the second key pool according to the first feature code of the first data, and the first data are analyzed according to the decryption algorithm.
The encryption variables and the first data or the second data are calculated in a bit logic operation in an encryption calculation, and each encryption variable of the transmitted data is circulated by at least one bit according to a preset scheme. And carrying out logical exclusive-or operation on the encryption variable and the first data or the second data by using bits.
The foregoing detailed description of the preferred embodiments of the invention has been presented. It should be understood that numerous modifications and variations could be devised by those skilled in the art in light of the present teachings without departing from the inventive concepts. Therefore, the technical solutions available to those skilled in the art through logic analysis, reasoning and limited experiments based on the prior art according to the concept of the present invention should be within the scope of protection defined by the claims.

Claims (7)

1. A GPS data transmission encryption method is characterized by comprising the following steps:
step S101, a server side is provided with a first key pool, the first key pool comprises X key algorithms, each key algorithm is provided with a unique corresponding first feature code, and the step S102 is switched to;
step S102, a GPS terminal sets a second key pool, the second key pool comprises Y key algorithms, each key algorithm is provided with a unique corresponding second feature code, Y is equal to X, the algorithm in the first key pool is completely consistent with the algorithm in the second key pool, and the step S103 is switched to;
s103, when the server establishes communication contact with the GPS terminal, the server selects an algorithm from the first key pool to encrypt data into first data and sends the first data to the GPS terminal, and the step S104 is switched to;
step S104, the GPS terminal receives the first data, matches a decryption algorithm in the second key pool according to the first feature code in the first data, analyzes the first data according to the decryption algorithm, and goes to step S105.
2. The GPS data transmission encryption method according to claim 1, wherein in step S105, when the GPS terminal communicates with the server, the GPS terminal selects an algorithm from the second key pool to encrypt the data into second data and sends the second data to the server, and then the step S106 is performed;
and step S106, the server receives the second data, matches the decryption algorithm in the first key pool according to the second characteristic code of the second data, and analyzes the second data according to the decryption algorithm.
3. The GPS data transmission encryption method according to claim 1, wherein in step S103, when the server encrypts the first data, the encryption variables include one or more of the following data: the system comprises a first feature code, a server feature code, a GPS terminal feature code, time and a system preset random number sequence.
4. The GPS data transmission encryption method according to claim 2, wherein in step S105, when the GPS encrypts the second data, the encryption variables include one or more of the following data: the second feature code, the server feature code, the GPS terminal feature code, the time and the system preset random number sequence.
5. The encryption method for GPS data transmission according to claim 3 or 4, wherein the shift number and the start number of the encryption variable are randomly generated and transmitted in a predetermined secret manner.
6. The GPS data transmission encryption method according to claim 1, wherein the encryption variables are calculated by bit logic in encryption with the first data or the second data, and each encryption variable for transmitting data is cycled by at least one bit according to a predetermined scheme.
7. The GPS data transmission encryption method of claim 6, wherein the encryption variable is logically XOR-ed with the first data or the second data by bits.
CN202010479861.8A 2020-05-29 2020-05-29 GPS data transmission encryption method Pending CN111698229A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010479861.8A CN111698229A (en) 2020-05-29 2020-05-29 GPS data transmission encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010479861.8A CN111698229A (en) 2020-05-29 2020-05-29 GPS data transmission encryption method

Publications (1)

Publication Number Publication Date
CN111698229A true CN111698229A (en) 2020-09-22

Family

ID=72479085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010479861.8A Pending CN111698229A (en) 2020-05-29 2020-05-29 GPS data transmission encryption method

Country Status (1)

Country Link
CN (1) CN111698229A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100842A (en) * 2016-06-22 2016-11-09 广西咪付网络技术有限公司 A kind of dynamic encryption and decryption method and system
CN108965302A (en) * 2018-07-24 2018-12-07 苏州科达科技股份有限公司 Media data transmission system, method, apparatus and storage medium
CN109151053A (en) * 2018-09-20 2019-01-04 如般量子科技有限公司 Anti- quantum calculation cloud storage method and system based on public asymmetric key pond
CN109412788A (en) * 2018-09-20 2019-03-01 如般量子科技有限公司 Cloud storage method of controlling security and system are acted on behalf of in anti-quantum calculation based on public keys pond
US20190087595A1 (en) * 2017-09-15 2019-03-21 Cyber Sphere Data, Inc. Object level encryption system including encryption key management system
CN109728902A (en) * 2018-06-01 2019-05-07 平安科技(深圳)有限公司 Key management method, equipment, storage medium and device
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN111191252A (en) * 2018-11-15 2020-05-22 航天信息股份有限公司 Encryption and decryption method and device for smart card operating system and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100842A (en) * 2016-06-22 2016-11-09 广西咪付网络技术有限公司 A kind of dynamic encryption and decryption method and system
US20190087595A1 (en) * 2017-09-15 2019-03-21 Cyber Sphere Data, Inc. Object level encryption system including encryption key management system
CN109728902A (en) * 2018-06-01 2019-05-07 平安科技(深圳)有限公司 Key management method, equipment, storage medium and device
CN108965302A (en) * 2018-07-24 2018-12-07 苏州科达科技股份有限公司 Media data transmission system, method, apparatus and storage medium
CN110768787A (en) * 2018-07-27 2020-02-07 中国移动通信集团吉林有限公司 Data encryption and decryption method and device
CN109151053A (en) * 2018-09-20 2019-01-04 如般量子科技有限公司 Anti- quantum calculation cloud storage method and system based on public asymmetric key pond
CN109412788A (en) * 2018-09-20 2019-03-01 如般量子科技有限公司 Cloud storage method of controlling security and system are acted on behalf of in anti-quantum calculation based on public keys pond
CN111191252A (en) * 2018-11-15 2020-05-22 航天信息股份有限公司 Encryption and decryption method and device for smart card operating system and storage medium
CN110266480A (en) * 2019-06-13 2019-09-20 腾讯科技(深圳)有限公司 Data transmission method, device and storage medium

Similar Documents

Publication Publication Date Title
CN101502039B (en) Encryption method for message authentication
EP1876748B1 (en) Privacy-preserving concatenation of strings
CN101202623B (en) Method of generating message authentication code, authentication/encryption and authentication/decryption methods
CN101859351B (en) System and method for ensuring safe read of data stored in storage
CN105450620A (en) Information processing method and device
KR101608815B1 (en) Method and system for providing service encryption in closed type network
CN112165443A (en) Multi-key information encryption and decryption method and device and storage medium
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN104660590A (en) Cloud storage scheme for file encryption security
CN102624520B (en) 192 bit key expansion system and method based on AES (Advanced Encryption Standard)
CN115065472B (en) Security chip encryption and decryption method and device based on multi-key encryption and decryption
CN101539977B (en) Method for protecting computer software
CN102238430A (en) Personalized whitebox descramblers
CN111884814B (en) Method and system for preventing intelligent terminal from being counterfeited
CN102724205B (en) A kind of method to the encryption of industrial circle communication process and data acquisition equipment
CN101867471A (en) Irrational number based DES authentication encryption algorithm
CN110198320B (en) Encrypted information transmission method and system
US7093126B1 (en) Encryption schemes with almost free integrity awareness
CN111224958A (en) Data transmission method and system
US20100158243A1 (en) Method of encryption in networked embedded systems
CN101539978B (en) Software protection method based on space
CN111698229A (en) GPS data transmission encryption method
CN113746642B (en) Method and system for communication between computers
CN103384233A (en) Agency conversion method, device and system
CN113452508B (en) Data encryption method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200922