CN112070926A - Data encryption and storage system and equipment with high standard protection - Google Patents

Data encryption and storage system and equipment with high standard protection Download PDF

Info

Publication number
CN112070926A
CN112070926A CN202010683980.5A CN202010683980A CN112070926A CN 112070926 A CN112070926 A CN 112070926A CN 202010683980 A CN202010683980 A CN 202010683980A CN 112070926 A CN112070926 A CN 112070926A
Authority
CN
China
Prior art keywords
data
board
bytes
encryption
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010683980.5A
Other languages
Chinese (zh)
Inventor
钟华
彭海辉
郑霄峰
王东宁
黄海剑
王波
王永明
谢海宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Huaqi Intelligent Technology Co ltd
Original Assignee
Suzhou Huaqi Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Huaqi Intelligent Technology Co ltd filed Critical Suzhou Huaqi Intelligent Technology Co ltd
Priority to CN202010683980.5A priority Critical patent/CN112070926A/en
Publication of CN112070926A publication Critical patent/CN112070926A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • G07C5/085Registering performance data using electronic data carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data encryption and storage system with high standard protection and equipment, wherein the system comprises a plurality of hardware board cards, a main control board, a reserved analog board, a digital board, a back board and a PCBA board card, wherein the hardware board cards are interconnected through a network through a switch board, the main control board is provided with 485 and CAN interfaces, data interaction CAN be realized through USB, the system CAN ensure data transmission through an IIC bus and a UART interface under the condition of network failure, receive various data and write the data into the storage board cards, and mutually confirm the online condition through two paths of Ethernet networks arranged outside through the switch in a network heartbeat signal sending mode. The invention records the parameter data of the vehicle in the driving process and encrypts and stores the data, thereby ensuring the confidentiality of the data and realizing the high standard protection level of data storage.

Description

Data encryption and storage system and equipment with high standard protection
Technical Field
The invention relates to the field of data encryption and storage, in particular to a data encryption and storage system and equipment with high standard protection, which are suitable for vehicles with higher data encryption and storage protection standards, such as trains, automobiles, airplanes and the like.
Background
Along with the scale development of domestic vehicles, along with the rapid increase of urban rail transit operation mileage, the continuous enlargement of wire network scale and the increasing of safe operation pressure, a system and equipment for data encryption and storage with high-standard protection are urgently needed to appear according to the principle of 'prevention as the first and prevention at the same time', so as to solve the reliability of data encryption and the high standard of storage.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a data encryption and storage system and equipment with high standard protection, which record the parameter data of a vehicle in the driving process and encrypt and store the data, ensure the confidentiality of the data and realize the high standard protection level of data storage.
In order to achieve the purpose, the technical scheme of the invention is as follows:
a data encryption and storage system with high standard protection comprises a plurality of hardware boards, a main control board, a reserved analog board, a digital board, a back board and a PCBA board, wherein the hardware boards are interconnected through a switch board by a network, the main control board is provided with a 485 and CAN interface, data interaction can be realized through USB, the reserved analog board and the digital board can receive external analog signals and digital quantity switch signals, the system can ensure the transmission of data through the IIC bus and the UART interface under the condition of network failure, receive various data and write the data into the storage board card, then the on-line condition is mutually confirmed by the exchanger through two paths of Ethernet networks arranged outside by the way of sending heartbeat signals through the network, the back board is provided with four paths of Ethernet signals for connecting the main control board, the MVB board, the reserved analog board and the digital board, and the MVB interface is converted into an Ethernet and UART communication interface through the MVB module.
Preferably, one path of the two paths of ethernet networks of the switch is used for receiving train ethernet data, and the other path is used for redundancy backup.
Preferably, the PCBA board card adopts a hardware architecture of MCU plus core module.
Preferably, the core module realizes the function of the MVB data link layer and is interconnected with the MCU through the UART.
Preferably, the MCU realizes system internal interactive docking through UART, IIC and Ethernet.
Preferably, the encryption algorithm of the system uses a modified 16-round TEA padding interleaving algorithm, which specifically includes:
1) performing an XOR operation on data to be encrypted
According to the formula: pDst = pSrc ^ pKey, and carrying out exclusive OR operation on plaintext to be encrypted according to bytes;
2) filling algorithm
Filling regardless of the length of the plaintext, so that N = an original character string +10+ the number N of filling bytes, wherein N is a multiple of 8, and N is less than 8 and is greater than or equal to 0 z;
the specific filling method comprises the following steps: the first byte is: (random () &0xf8) | n, followed by (n +2) bytes random () &0xff, followed by the original data, and finally 7 bytes 0x00, since different random numbers are used, the result of padding makes the result of the ciphertext different even for the same plaintext;
3) interleaving algorithm
The message is divided into a plurality of encryption units, each encryption unit is 8 bytes, TEA is used for encryption, the encryption result is subjected to XOR operation with the next encryption unit and then is used as a plaintext to be encrypted, and the specific encryption process is as follows:
r=code(v^tr,key)^to
the code function is 16 rounds of TEA encryption
v is encrypted 8-byte data
tr is the result of the previous encryption
to is the previously encrypted data, equal to v ^ r
For the first 8 bytes, 'tr' and 'to' are set to zero.
Preferably, the decryption algorithm of the system comprises:
1) the formula:
x = decipher(v[i:i+8] ^ prePlain, key) ^ preCyrpt
PerPlain is the first 8 bytes encrypted, noting that | he equals the first 8 bytes of data XOR the upper 8 bytes of preplan, not just the first 8 bytes;
perCrypt is the first 8 bytes of the encryption result;
2) after the original data is decrypted, padding bytes added during encryption must be removed, the data required for decryption is pos bytes, pos = strlen ($ v) -p &0x7-10, pos bytes are intercepted from strlen ($ v) -pos-7 in $ v, the obtained data is tail padding which is always 7 bytes of zero, and whether the tail padding is correct can be determined by testing that the last 7 bytes are zero, so r [ pos +1: -7] is returned;
3) pDst = pSrc ^ pKey, xoring the original plaintext in bytes.
The invention also provides data encryption and storage equipment with high standard protection, which comprises the system, a power supply module, an MVB module, a data communication module, a switch module and a core data storage module, wherein the modules are in communication connection through a main control board in the system.
Preferably, the core data storage module can provide voltage to maintain the data storage function when the power supply of the device is suddenly and unexpectedly powered off, and the implementation manner is as follows: when the voltage is reduced to a set fault voltage value, the chip of the power supply module has a power supply conversion mechanism at the same time of power failure to discharge the super capacitor, so that the parameter data storage record of the vehicle equipment after the power failure is maintained.
According to the technical scheme, the data encryption and storage system and the data encryption and storage equipment with high standard protection, provided by the invention, record parameter data of a vehicle in a driving process and encrypt and store the data, so that the confidentiality of the data is ensured, the high standard protection level of data storage is realized, meanwhile, the data can be conveniently restored after daily maintenance and traffic accidents occur, and the reasons are analyzed through data such as recording and driving parameters.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a block diagram of the present system;
FIG. 2 is a schematic view of the overall structure of the apparatus;
fig. 3 is a schematic structural diagram of the present apparatus.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
In this embodiment, as shown in fig. 1-3, a data encryption and storage system with high standard protection includes a plurality of hardware boards, a main control board, a reserved analog board, a digital board, a back board, and a PCBA board, each hardware board is interconnected via a switch board via a network, the main control board is provided with 485 and CAN interfaces, data interaction CAN be realized via USB, the reserved analog board and the digital board CAN receive external analog signals and digital switch signals, the system CAN guarantee data transmission via IIC bus and UART interface in case of network failure, receive various data and write in the storage boards, and mutually confirm online conditions via network heartbeat signals sent via two ethernet networks arranged outside the switch, the back board is provided with four ethernet signals for connecting the main control board, MVB board, reserved analog board and digital board, and the MVB interface is converted into an Ethernet and UART communication interface through the MVB module.
One path of the two paths of Ethernet of the switch is used for receiving train Ethernet data, and the other path of Ethernet is used for redundancy backup.
The PCBA board card adopts a hardware framework of an MCU and a core module.
The core module realizes the function of an MVB data link layer and is interconnected with the MCU through a UART.
And the MCU realizes the interactive butt joint inside the system through the UART, the IIC and the Ethernet.
The encryption algorithm of the system uses an improved 16-round TEA padding interleaving algorithm, and specifically comprises the following steps:
1) performing an XOR operation on data to be encrypted
According to the formula: pDst = pSrc ^ pKey, and carrying out exclusive OR operation on plaintext to be encrypted according to bytes;
2) filling algorithm
Filling regardless of the length of the plaintext, so that N = an original character string +10+ the number N of filling bytes, wherein N is a multiple of 8, and N is less than 8 and is greater than or equal to 0 z;
the specific filling method comprises the following steps: the first byte is: (random () &0xf8) | n, then (n +2) bytes random () &0xff (note that the random before and after is the same number |, is constant), followed by the original data, and finally 7 bytes 0x00, because different random numbers are used, the result of padding makes the result of the ciphertext different even for the same plaintext;
3) interleaving algorithm
The message is divided into a plurality of encryption units, each encryption unit is 8 bytes, TEA is used for encryption, the encryption result is subjected to XOR operation with the next encryption unit and then is used as a plaintext to be encrypted, and the specific encryption process is as follows:
r=code(v^tr,key)^to
the code function is 16 rounds of TEA encryption
v is encrypted 8-byte data
tr is the result of the previous encryption
to is the previously encrypted data, equal to v ^ r
For the first 8 bytes, 'tr' and 'to' are set to zero
4) Example data
The test data are as follows:
random number: random () =0 xad;
plaintext: 00010100000007000000003A FB 95E 7;
and (3) secret key: ef 6236 e 060963 c 24 d2 c 8531 b 7c 5e 177 f;
ciphertext: D781D 20379F 279E 04D 6D B2B 8C 2B 45C A276C 2 CF E599D 6B 5 CE 8814555A E5 CC 0C 4B
Filling process:
1) calculating n, since the plaintext is 15 bytes, (15 +10+ 7)% 8= =0, so n = 7;
2) the first byte is calculated: (0xad &0xf8) |0x07=0 xaf;
3) the next 7+2 bytes: ad adadaadatadad;
4) raw data: 00010100000007000000003A FB 95E 7;
5) padding of last 7 bytes: 00000000000000;
the data after padding is:
af ad adadadadadadadad 00 01 01 00 00 00
07 00 00 00 00 3A FB 95 E7 00 00 00 00 00 00 00
and (3) encryption process:
data as above, it can be seen that the padded data will be divided into 4 groups named P1, P2, P3 and P4, and the encryption result is C1, C2, C3 and C4 by 8 byte group, then the encryption process is as follows:
P1= af ad adadadadadad;
P2= ad ad 00 01 01 00 00 00;
P3= 07 00 00 00 00 3A FB 95;
P4= E7 00 00 00 00 00 00 00;
Sessionkey = ef 62 36 e0 60 96 3c 24 d2 c8 53 1b 7c 5e 17 7f;
the method comprises the following implementation steps:
p1’= p1Xor0 =af ad adadadadadad
C1= E(SessionKey)(P1) = D7 81 D2 03 79 F2 79 E0;
c1’= c1 xor 0= D7 81 D2 03 79 F2 79 E0;
P2’= P2 Xor C1=7A 2C D2 02 78 F2 79 E0;
C2’= E(SessionKey)( P2’)= E2 C0 1F 15 6F 19 F1 0F;
C2= C2’Xor P1=4D 6D B2 B8 C2 B4 5C A2;
P3’= P3 Xor C2=4A 6D B2 B8 C2 8E A7 37;
C3’= E(SessionKey)( P3’)= 0C EE 1D E7 E1 24 CC 2E;
C3= C3’Xor P2’=76 C2 CF E5 99 D6 B5 CE;
P4’= P4 Xor C3=91 C2 CF E5 99 D6 B5 CE;
C4’= E(SessionKey)( P4’)= C2 79 E7 E2 27 42 AB 7C;
C4 = C4’Xor P3’=88 14 55 5A E5 CC 0C 4B;
through the calculation, the four data of C1, C2, C3 and C4 are connected in series to form the final encryption result.
The decryption algorithm of the system comprises:
1) the formula:
x = decipher(v[i:i+8] ^ prePlain, key) ^ preCyrpt
PerPlain is the first 8 bytes encrypted, noting that | he equals the first 8 bytes of data XOR the upper 8 bytes of preplan, not just the first 8 bytes;
perCrypt is the first 8 bytes of the encryption result;
2) after the original data is decrypted, padding bytes added during encryption must be removed, the data required for decryption is pos bytes, pos = strlen ($ v) -P &0x7-10 (P represents the first byte), pos bytes are intercepted from strlen ($ v) -pos-7 in $ v, the obtained data is tail padding which is always 7 bytes and zero, the last 7 bytes can be tested to determine whether the tail padding is correct, and therefore r [ pos +1: -7] is returned;
3) pDst = pSrc ^ pKey, xoring the original plaintext in bytes.
This embodiment still provides a data encryption and storage device with high standard protection, including the aforesaid the system, still include power module, MVB module, data communication module, switch module, core data storage module, each module is through the inside master control board communication connection of system, core data storage module can provide the voltage by oneself when the unexpected outage of equipment power supply is unexpected in order to maintain the data storage function, its implementation: when the voltage is reduced to a set fault voltage value, the chip of the power supply module has a power supply conversion mechanism at the same time of power failure to discharge the super capacitor, so that the parameter data storage record of the vehicle equipment after the power failure is maintained. The maintaining time is about 10ms, and the significance of the protection function is that the integrity and the reliability of the driving parameter data storage record are effectively ensured for the vehicle at the last moment of an accident.
The core data storage module can ensure the safety and the integrity of the stored important data in a severe environment, and the core data storage module realizes the integrity recovery of the stored data under the following test conditions, such as the experiments shown in the following table:
Figure DEST_PATH_IMAGE001
the previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A data encryption and storage system with high standard protection is characterized in that the system comprises a plurality of hardware board cards, a main control board, a reserved analog board, a digital board, a back board and a PCBA board card, wherein the hardware board cards are interconnected through a network through a switch board, the main control board is provided with a 485 and CAN interface, data interaction can be realized through USB, the reserved analog board and the digital board can receive external analog signals and digital quantity switch signals, the system can ensure the transmission of data through the IIC bus and the UART interface under the condition of network failure, receive various data and write the data into the storage board card, then the on-line condition is mutually confirmed by the exchanger through two paths of Ethernet networks arranged outside by the way of sending heartbeat signals through the network, the back board is provided with four paths of Ethernet signals for connecting the main control board, the MVB board, the reserved analog board and the digital board, and the MVB interface is converted into an Ethernet and UART communication interface through the MVB module.
2. The data encryption and storage system with high standard protection of claim 1, wherein one path of the two paths of Ethernet network of the switch is used for receiving train Ethernet data, and the other path is used for redundancy backup.
3. The data encryption and storage system with high standard protection of claim 1, wherein the PCBA board adopts a hardware architecture of MCU plus core module.
4. The system of claim 3, wherein the core module implements MVB data link layer function and is interconnected with the MCU through UART.
5. The system for data encryption and storage with high standard protection of claim 4, wherein the MCU realizes inter-system interfacing via UART, IIC and Ethernet.
6. The system for data encryption and storage with high standard protection according to claim 5, wherein the encryption algorithm of the system uses a modified 16-round TEA padding interleaving algorithm, which specifically includes:
1) performing an XOR operation on data to be encrypted
According to the formula: pDst = pSrc ^ pKey, and carrying out exclusive OR operation on plaintext to be encrypted according to bytes;
2) filling algorithm
Filling regardless of the length of the plaintext, so that N = an original character string +10+ the number N of filling bytes, wherein N is a multiple of 8, and N is less than 8 and is greater than or equal to 0 z;
the specific filling method comprises the following steps: the first byte is: (random () &0xf8) | n, followed by (n +2) bytes random () &0xff, followed by the original data, and finally 7 bytes 0x00, since different random numbers are used, the result of padding makes the result of the ciphertext different even for the same plaintext;
3) interleaving algorithm
The message is divided into a plurality of encryption units, each encryption unit is 8 bytes, TEA is used for encryption, the encryption result is subjected to XOR operation with the next encryption unit and then is used as a plaintext to be encrypted, and the specific encryption process is as follows:
r=code(v^tr,key)^to
the code function is 16 rounds of TEA encryption
v is encrypted 8-byte data
tr is the result of the previous encryption
to is the previously encrypted data, equal to v ^ r
For the first 8 bytes, 'tr' and 'to' are set to zero.
7. The data encryption and storage system with high standard protection according to claim 5, wherein the decryption algorithm of the system comprises:
1) the formula:
x = decipher(v[i:i+8] ^ prePlain, key) ^ preCyrpt
PerPlain is the first 8 bytes encrypted, noting that | he equals the first 8 bytes of data XOR the upper 8 bytes of preplan, not just the first 8 bytes;
perCrypt is the first 8 bytes of the encryption result;
2) after the original data is decrypted, padding bytes added during encryption must be removed, the data required for decryption is pos bytes, pos = strlen ($ v) -p &0x7-10, pos bytes are intercepted from strlen ($ v) -pos-7 in $ v, the obtained data is tail padding which is always 7 bytes of zero, and whether the tail padding is correct can be determined by testing that the last 7 bytes are zero, so r [ pos +1: -7] is returned;
3) pDst = pSrc ^ pKey, xoring the original plaintext in bytes.
8. A data encryption and storage device with high standard protection, which is characterized by comprising the system of claim 1, and further comprising a power module, an MVB module, a data communication module, a switch module and a core data storage module, wherein the modules are in communication connection through a main control board in the system.
9. The data encryption and storage device with high standard protection of claim 8, wherein the core data storage module can provide voltage to maintain data storage function by itself when the device power supply is suddenly and unexpectedly powered off, and the implementation manner is as follows: when the voltage is reduced to a set fault voltage value, the chip of the power supply module has a power supply conversion mechanism at the same time of power failure to discharge the super capacitor, so that the parameter data storage record of the vehicle equipment after the power failure is maintained.
CN202010683980.5A 2020-07-16 2020-07-16 Data encryption and storage system and equipment with high standard protection Pending CN112070926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010683980.5A CN112070926A (en) 2020-07-16 2020-07-16 Data encryption and storage system and equipment with high standard protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010683980.5A CN112070926A (en) 2020-07-16 2020-07-16 Data encryption and storage system and equipment with high standard protection

Publications (1)

Publication Number Publication Date
CN112070926A true CN112070926A (en) 2020-12-11

Family

ID=73656533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010683980.5A Pending CN112070926A (en) 2020-07-16 2020-07-16 Data encryption and storage system and equipment with high standard protection

Country Status (1)

Country Link
CN (1) CN112070926A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10032301A1 (en) * 2000-07-04 2002-01-17 Rbs Netkom Gmbh Driving data acquisition, transmission and output system
CN205582028U (en) * 2016-04-13 2016-09-14 上海铁路通信有限公司 On -vehicle ATC monitoring recording appearance
CN109104347A (en) * 2017-06-21 2018-12-28 比亚迪股份有限公司 Gateway shift process, system and its apparatus based on CANopen agreement transmission data
CN209218118U (en) * 2019-02-20 2019-08-06 大连交通大学 A kind of portable multi-function gateway equipment for train
CN209600514U (en) * 2018-12-10 2019-11-08 中车大连电力牵引研发中心有限公司 Train event recorder and track train
CN110991076A (en) * 2019-12-16 2020-04-10 天津凯发电气股份有限公司 Method for predicting data storage state of NVRAM (non-volatile random Access memory) of relay protection device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10032301A1 (en) * 2000-07-04 2002-01-17 Rbs Netkom Gmbh Driving data acquisition, transmission and output system
CN205582028U (en) * 2016-04-13 2016-09-14 上海铁路通信有限公司 On -vehicle ATC monitoring recording appearance
CN109104347A (en) * 2017-06-21 2018-12-28 比亚迪股份有限公司 Gateway shift process, system and its apparatus based on CANopen agreement transmission data
CN209600514U (en) * 2018-12-10 2019-11-08 中车大连电力牵引研发中心有限公司 Train event recorder and track train
CN209218118U (en) * 2019-02-20 2019-08-06 大连交通大学 A kind of portable multi-function gateway equipment for train
CN110991076A (en) * 2019-12-16 2020-04-10 天津凯发电气股份有限公司 Method for predicting data storage state of NVRAM (non-volatile random Access memory) of relay protection device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XICHEN: "hoxede的QQ填充算法和TEA加解密的python实现", 《CHINAUNIX论坛》 *

Similar Documents

Publication Publication Date Title
CA1103358A (en) Digital signature system and apparatus
EP0709979A2 (en) Apparatus and method for error correction based on transmission code violations and parity
NL8020502A (en)
CN109040063A (en) Determination method, apparatus, equipment and the storage medium of vehicle ECU key
CN110324222A (en) A kind of vehicle CAN bus data interactive system and its exchange method
CN103885853B (en) Track traffic synchrodata voting system and method based on dual processors
CN101084486A (en) Method and system for syndrome generation and data recovery
CN108279995A (en) A kind of storage method for the distributed memory system regenerating code based on safety
JPS58165490A (en) One-way passage type data transmission system
CN112070926A (en) Data encryption and storage system and equipment with high standard protection
CN111010258B (en) Computer interlocking system communication method based on coding
WO2008141582A1 (en) A method and apparatus for information coding/decoding
CN207128886U (en) The output control system of train and there is its train
CN109572754A (en) A kind of ITCS train data downloads mobile unit in real time
US3533067A (en) Error correcting digital coding and decoding apparatus
CN217360579U (en) Navigation telegraph system configured with redundant network
CN209600514U (en) Train event recorder and track train
CN108229193A (en) A kind of wearable device end message encryption method, encryption data precaution device and wearable device terminal
CN113886115A (en) Block chain Byzantine fault-tolerant method and system based on vehicle-road cooperation
EP1979815B1 (en) Method of preserving the safe state of a redundant processor after occurence of a failure
Koopman et al. Analysis of the train communication network protocol error detection capabilities
CN107272503A (en) The unlocking prevention card management method of transformer station five
CN114299656B (en) Voting method
CN114299655B (en) Electronic voting system and working method thereof
CN117775081A (en) Trackside electronic unit and data transmission method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201211