CN112769547A - Key fragment transmission method and device and corresponding receiving method and device - Google Patents

Key fragment transmission method and device and corresponding receiving method and device Download PDF

Info

Publication number
CN112769547A
CN112769547A CN201911069217.7A CN201911069217A CN112769547A CN 112769547 A CN112769547 A CN 112769547A CN 201911069217 A CN201911069217 A CN 201911069217A CN 112769547 A CN112769547 A CN 112769547A
Authority
CN
China
Prior art keywords
key
fragment
module
sending
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911069217.7A
Other languages
Chinese (zh)
Inventor
张耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TD Tech Chengdu Co Ltd
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN201911069217.7A priority Critical patent/CN112769547A/en
Publication of CN112769547A publication Critical patent/CN112769547A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method for carrying out fragment transmission on a secret key, which is applied to a secret key sending end and comprises the following steps: the key to be sent is sliced, and each slice has 18 bytes; taking each fragment as a message body, and taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the key as message headers to construct a key fragment; and sending the key slice to a key receiving end through the HIFI DSP. Corresponding to the method, the invention also discloses a corresponding key sending end device, a method for receiving the key fragments and a key receiving end device. By applying the technical scheme disclosed by the application, the encryption key transmission can be realized between the two call terminals through the HIFI DSP.

Description

Key fragment transmission method and device and corresponding receiving method and device
Technical Field
The present application relates to the field of encrypted communication technologies, and in particular, to a method and an apparatus for performing fragment transmission on a key, and a corresponding receiving method and apparatus.
Background
The two mobile phone terminals can carry out encrypted communication. Before encrypted communication, a calling terminal and a called terminal need to perform key negotiation, namely key transmission, and the calling terminal applies for a calling terminal communication encryption key and a called terminal communication encryption key from a key center. The called end communication encryption key is transmitted to the called end through the communication processing module after key data is changed into code stream by a High-Fidelity Digital Signal Processor (HIFI DSP), and finally the communication processing module transmits the called end communication encryption key to the called end through an air interface. At present, data is transmitted through the HIFI DSP, only 32 bytes of data can be transmitted to the opposite-end mobile phone at one time, and the data used for transmitting the encrypted call key can only be transmitted 24 bytes at one time except 8 bytes of protocol control information transmitted by the HIFI.
The called end conversation encryption key applied by the conversation calling end in the key center is transmitted to the called end at one time by calling the HIFI DSP interface, and the transmission fails, but if a small amount of key data is simulated, the key data can be normally transmitted to the called end by calling the HIFI DSP.
The inventors of the present application found through analysis that: the main called key (namely, the calling terminal call encryption key and the called terminal call encryption key) applied in the key center has the length far greater than the maximum length 32 bytes which can be transmitted by the HIFI DSP one-time transmission, so that the transmission fails when the HIFI DSP transmits the encrypted call key.
Disclosure of Invention
The application provides a method and a device for transmitting a secret key in a slicing manner, and a corresponding method and a corresponding device for receiving the secret key in the slicing manner, so that the encryption secret key transmission between two call terminals through a HIFI DSP is realized.
The application discloses a method for carrying out fragment transmission on a secret key, which is applied to a secret key sending end and comprises the following steps:
the key to be sent is sliced, and each slice has 18 bytes;
taking each fragment as a message body, and taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the key as message headers to construct a key fragment;
and sending the key slice to a key receiving end through the HIFI DSP.
Preferably, the method further comprises:
and after the HIFI DSP sequentially sends each key slice, continuously circularly sending all the key slices until a notice that the key receiving is finished is received from the key receiving end or the number of circulation times reaches N times, wherein N is more than or equal to 2.
Preferably, the starting position, the ending position and the slice number of the slice, and the total number of the slices and the total length of the key occupy 1 byte respectively.
The application also discloses a key sending end device, which is used for carrying out fragment transmission on the key, and comprises the following steps: the device comprises a key slicing module, a message construction module and a key sending module, wherein:
the key fragmentation module is used for fragmenting a key to be sent, wherein each fragment has 18 bytes;
the message construction module is used for taking each fragment as a message body, taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the secret key as message headers, and constructing a secret key fragment;
and the key sending module is used for sending the key slice to a key receiving end through the HIFI DSP.
Preferably, after each key slice is sequentially sent by the key sending module through the HIFI DSP, all the key slices are continuously sent in a cycle until a notification that the key reception is completed is received from the key receiving end or the cycle number reaches N times, where N is greater than or equal to 2.
Preferably, the starting position, the ending position and the slice number of the slice, and the total number of the slices and the total length of the key occupy 1 byte respectively.
The application also discloses a method for receiving the key fragment, which is applied to a key receiving end and comprises the following steps:
receiving a key slice from an air interface through a HIFI DSP;
analyzing a message body of the key piece to obtain a piece, and analyzing a message header of the key piece to obtain a starting position, an ending position and a piece number of the piece, the total piece number of the piece and the total length of a key; wherein the length of each fragment is 18 bytes;
and creating a key assembly buffer area according to the total length of the key, and placing the fragments obtained by analysis to the corresponding positions of the key assembly buffer area according to the initial position and the end position of the fragments.
Preferably, the method further comprises:
and judging whether the key is completely received according to the total number of the fragments and the number of each fragment, and if the key is completely received, sending a key receiving completion notification to a key sending end.
The application also discloses a key receiving end device, which is used for receiving the key in a slicing way, and comprises: the device comprises a key receiving module, a key analyzing module and a key assembling module, wherein:
the key receiving module is used for receiving a key sheet from an air interface through the HIFI DSP;
the key analysis module is used for analyzing the message body of the key piece to obtain fragments, and analyzing the message header of the key piece to obtain the starting position, the ending position and the piece number of the fragments, the total piece number of the fragments and the total length of the key; wherein the length of each fragment is 18 bytes;
and the key assembly module is used for creating a key assembly buffer area according to the total length of the key and placing the fragments obtained by analysis at the corresponding positions of the key assembly buffer area according to the initial position and the end position of the fragments.
Preferably, the key assembly module is further configured to determine whether the key is completely received according to the total number of the fragments and the fragment number of each fragment, and if the key is completely received, send a notification that the key is completely received to the key sending end.
According to the technical scheme, the following technical problems to be solved in the transmission of the key fragments are solved from the following aspects:
(1) the problem of which information the fragmented transport protocol header needs to contain is:
the method and the device adopt 5 bytes as the transmitted header information, and mainly comprise the total number of the fragments, the fragment number of the current fragment, the total byte length of the key, the initial position of the current fragment in the total key length and the final position of the current fragment in the total key length. Through the header information, the key receiving end can be assisted to assemble the key fragments, so that a complete key is obtained, and encrypted communication is realized in the subsequent communication process.
(2) The problem of how to fragment the key to be transmitted is:
according to the requirement that the HIFI DSP transmits 32 bytes at the longest each time, only 31 bytes can be actually transmitted, and 23 bytes are required besides 8 bytes which are occupied by the HIFI internal protocol. The method introduces the header information of the key fragment of 5 bytes, and the rest 18 bytes are the size of the key fragment. The key is sliced according to 18 bytes of each slice, and 5 bytes of header information is added to each slice.
(3) The problem of how to fragment the transmission key to improve the transmission efficiency is as follows:
in order to improve the transmission efficiency of the key fragments, all the key fragments are continuously transmitted to the HIFI DSP every time, then all the key fragments are continuously transmitted in a circulating mode until a notice that the key receiving is finished is received from the key receiving end or the circulating times reach N times, and retransmission is stopped.
(4) The problem of how to assemble the fragmented keys for the key receiver:
because the header information of each key piece contains the total length of the key and the initial position and the end position of the current piece in the total length and other information in the key piece sent by the key sending end, the key receiving end can complete the assembly of the key through the information and determine whether the whole key is completely received through the piece number of each piece.
Drawings
Fig. 1 is a schematic flowchart of a method for transmitting a secret key in a fragmented manner according to the present application;
fig. 2 is a schematic structural view of a key blade head according to the present application;
fig. 3 is a schematic diagram of a composition structure of a key sending end device according to the present application;
fig. 4 is a schematic flowchart of a method for receiving a key fragment according to the present application;
fig. 5 is a schematic diagram of a composition structure of a key receiving end device according to the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is further described in detail below by referring to the accompanying drawings and examples.
Because the secret key can not be transmitted to the called mobile phone at one time, in order to solve the technical problem, the secret key is transmitted to the called mobile phone by the fragment transmission method, and when a fragment transmission protocol is designed, the following problems need to be solved:
(1) which information the fragmentation transmission protocol header needs to contain;
(2) how to fragment the key to be transmitted;
(3) how to transmit the key in a slicing way, the transmission efficiency is improved;
(4) how the receiving end assembles the fragmented keys.
As described above, before performing an encrypted call, two mobile phone terminals need to perform key agreement, that is, perform key transmission, and therefore, the present invention provides a method for performing fragment transmission on a key, as shown in fig. 1, the method includes the following steps:
step 101: the keys to be transmitted are sliced, 18 bytes each.
The called key obtained from the key center can only transmit 31 bytes according to the requirement of transmitting 32 bytes at the longest time by the HIFI DSP, and the 23 bytes are provided besides 8 bytes occupied by the HIFI internal protocol, the 23 bytes are called 'key slice' in the application, and the inside of the key slice is divided as follows: a message header and a message body.
A preferred division method is: the message header of the key slice occupies 5 bytes, and the message body of the key slice occupies 18 bytes, so that when the key is sliced, the key is divided according to 18 bytes of each split screen.
Step 102: and taking each fragment as a message body, and taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the key as a message header to construct a key fragment.
In this application, the message header includes 5 parts, each part occupies 1 byte, which is respectively: the total number of fragments, the fragment number of the fragment, the total length of the key, the starting position of the fragment in the total length, and the ending position of the fragment in the total length, as shown in fig. 2. And taking each fragment as a message body, and taking the header information corresponding to the fragment as a message header, thereby constructing the key sheet containing each fragment.
Step 103: and sending the key slice to a key receiving end through the HIFI DSP.
In order to improve the transmission efficiency of the key slice, all the key slices are directly sent to the HIFI DSP by the HIFI DSP, and the key slices are sent to the key receiving end through an air interface after the HIFI DSP adds 8 bytes of a HIFI internal protocol at the head of the key slices.
Preferably, the two key pads sent to the HIFI DSP are spaced by M milliseconds (e.g., 20 milliseconds). After all the key slices are completely sent once, the key slices are continuously sent circularly until a notice that the key receiving is finished is received from the key receiving end or the number of circulation times is obtained for N times (for example, 10 times). That is, once the called side has received all the key patches, the round-robin transmission is terminated. If the called end does not receive the key piece completely after 10 times of circulation, the encrypted conversation is stopped.
Corresponding to the above method, the present application discloses a key sending end device, configured to perform fragment transmission on a key, where a composition structure of the key sending end device is shown in fig. 3, and the key sending end device includes: the device comprises a key slicing module, a message construction module and a key sending module, wherein:
the key fragmentation module is used for fragmenting a key to be sent, wherein each fragment has 18 bytes;
the message construction module is used for taking each fragment as a message body, taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the secret key as message headers, and constructing a secret key fragment;
and the key sending module is used for sending the key slice to a key receiving end through the HIFI DSP.
Preferably, after the key sending module in the key sending end device shown in fig. 2 sequentially sends each key slice through the HIFI DSP, the key sending module continues to send all the key slices in a cycle until a notification that the key reception is completed is received from the key receiving end or the cycle number reaches N times, where N is greater than or equal to 2.
Preferably, the starting position, the ending position and the slice number of the slice, and the total number of the slices and the total length of the key occupy 1 byte respectively.
Corresponding to the method described in fig. 1, the present application also discloses a method for receiving a key fragment, which is applied to a key receiving end, and a flow diagram of the method is shown in fig. 4, and includes the following steps:
step 401: and receiving the key slice from an air interface through the HIFI DSP.
Step 402: analyzing a message body of the key piece to obtain a piece, and analyzing a message header of the key piece to obtain a starting position, an ending position and a piece number of the piece, the total piece number of the piece and the total length of a key; wherein each slice is 18 bytes in length.
As mentioned above, the key fragment includes a message body and a message header, and after receiving the key fragment, the key receiving end may parse the key fragment to obtain the key fragment and related information about the key fragment, for example: the starting position, the ending position and the slice number of the slice, and the total number of the slices and the total length of the key.
Step 403: and creating a key assembly buffer area according to the total length of the key, and placing the fragments obtained by analysis to the corresponding positions of the key assembly buffer area according to the initial position and the end position of the fragments.
The called end is used as a key receiving end, and the header of each received key slice comprises the information of the total length of the key, the starting position and the ending position of the slice and the like. In this step, the called end creates a key assembly buffer according to the total length of the key. When a key piece is received, the head information is analyzed to obtain the initial position and the end position of the key piece in the total length, and then the key piece is placed in the corresponding position of the key assembly buffer area. Meanwhile, the key receiving end can confirm whether all the key pieces are completely received or not according to the piece numbers and the total piece number of the head of the key piece, and if the key pieces are completely received, the key receiving end sends a key receiving completion notification to the key sending end so as to notify the calling end to stop the circular sending.
Corresponding to the above method for receiving the key fragment, the present application further provides a key receiving end device, configured to receive the key fragment, where the key receiving end device has a structure as shown in fig. 5, and includes: the device comprises a key receiving module, a key analyzing module and a key assembling module, wherein:
the key receiving module is used for receiving a key sheet from an air interface through the HIFI DSP;
the key analysis module is used for analyzing the message body of the key piece to obtain fragments, and analyzing the message header of the key piece to obtain the starting position, the ending position and the piece number of the fragments, the total piece number of the fragments and the total length of the key; wherein the length of each fragment is 18 bytes;
and the key assembly module is used for creating a key assembly buffer area according to the total length of the key and placing the fragments obtained by analysis at the corresponding positions of the key assembly buffer area according to the initial position and the end position of the fragments.
Preferably, the key assembling module in the key receiving end apparatus shown in fig. 5 is further configured to determine whether the key is completely received according to the total number of the fragments and the fragment number of each fragment, and if the key is completely received, send a notification that the key is completely received to the key sending end.
According to the technical scheme provided by the application, the following technical problems to be solved in the transmission of the key fragments are solved from the following aspects:
(1) the problem of which information the fragmented transport protocol header needs to contain is:
the method and the device adopt 5 bytes as the transmitted header information, and mainly comprise the total number of the fragments, the fragment number of the current fragment, the total byte length of the key, the initial position of the current fragment in the total key length and the final position of the current fragment in the total key length. Through the header information, the key receiving end can be assisted to assemble the key fragments, so that a complete key is obtained, and encrypted communication is realized in the subsequent communication process.
(2) The problem of how to fragment the key to be transmitted is:
according to the requirement that the HIFI DSP transmits 32 bytes at the longest each time, only 31 bytes can be actually transmitted, and 23 bytes are required besides 8 bytes which are occupied by the HIFI internal protocol. The method introduces the header information of the key fragment of 5 bytes, and the rest 18 bytes are the size of the key fragment. The key is sliced according to 18 bytes of each slice, and 5 bytes of header information is added to each slice.
(3) The problem of how to fragment the transmission key to improve the transmission efficiency is as follows:
in order to improve the transmission efficiency of the key fragments, all the key fragments are continuously transmitted to the HIFI DSP every time, then all the key fragments are continuously transmitted in a circulating mode until a notice that the key receiving is finished is received from the key receiving end or the circulating times reach N times, and retransmission is stopped.
(4) The problem of how to assemble the fragmented keys for the key receiver:
because the header information of each key piece contains the total length of the key and the initial position and the end position of the current piece in the total length and other information in the key piece sent by the key sending end, the key receiving end can complete the assembly of the key through the information and determine whether the whole key is completely received through the piece number of each piece.
The technical solution of the present application is further described in detail by a preferred embodiment.
In the specific implementation of the invention, the key transmission medium is a call link after the call is connected, and the HIFI DSP interface of the mobile phone system layer is called to send the key data to the call link. Since the HIFI DSP can only transmit 32 bytes at a time, the key is transmitted in pieces by using this embodiment. In this embodiment, a session key transport layer is specially designed, and the session key transport layer includes: the key sheet sending module receives and assembles the key sheet module.
And the key sheet sending module is used for obtaining a key to be sent from an upper layer, then carrying out fragmentation according to 18 bytes of each key sheet, calculating the starting position, the ending position and the sheet number of each key sheet, assembling the parameters including the total sheet number and the total key length to a sheet header, finally assembling the content of the key sheet to a content main body, adding 8 byte headers of the HIFI internal protocol, and finally calling an HIFI DSP interface to send the content to an opposite-end mobile phone. Meanwhile, the callback notice after the opposite-end mobile phone is registered is received, and the repeated sending is performed for 10 times until all the secret key slices are sent. For the key sending function, in this embodiment, a new thread is enabled to process, and once receiving the notification that the receiving of the key of the mobile phone at the opposite end is completed, the life cycle of the key sending thread is immediately ended.
And the key receiving and assembling module is used for injecting a key receiving function into the bottom HIFI DSP, and calling the injected key receiving function after the HIFI receives a key from an air interface (a mobile phone communication module). In the embodiment of the invention, the key receiving function mainly completes the analysis of the head information and the message body information of the key sheet, the content of the key sheet is put at the corresponding position in the total length of the key according to the analyzed initial position, the analyzed end position and the total length of the key, whether the key is received completely is judged according to the total number of the sheets and the sheet number, and once the key is received completely, the HIFI DSP is called to inform the transmitting end. And simultaneously, providing the assembled key for the upper application, and carrying out the next encrypted conversation process.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A method for carrying out fragment transmission on a secret key is applied to a secret key sending end and is characterized by comprising the following steps:
the key to be sent is sliced, and each slice has 18 bytes;
taking each fragment as a message body, and taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the key as message headers to construct a key fragment;
and sending the key slice to a key receiving end through the HIFIPDSP.
2. The method of claim 1, further comprising:
and after the HIFIDSP sequentially sends each key slice, continuously circularly sending all the key slices until a notice that the key receiving is finished is received from the key receiving end or the number of circulation times reaches N times, wherein N is more than or equal to 2.
3. The method according to claim 1 or 2, characterized in that:
the starting position, the ending position and the slice number of the slice, the total number of the slices and the total length of the key respectively occupy 1 byte.
4. A key sending end device is used for carrying out fragment transmission on keys and is characterized by comprising the following components: the device comprises a key slicing module, a message construction module and a key sending module, wherein:
the key fragmentation module is used for fragmenting a key to be sent, wherein each fragment has 18 bytes;
the message construction module is used for taking each fragment as a message body, taking the starting position, the ending position and the fragment number of the fragment, the total fragment number of the fragment and the total length of the secret key as message headers, and constructing a secret key fragment;
and the key sending module is used for sending the key slice to a key receiving end through the HIFI DSP.
5. The apparatus of claim 4, wherein:
and the key sending module continues to circularly send all the key slices after sequentially sending each key slice through the HIFIDSP until receiving a notification that the key is received from the key receiving end or the number of circulation times reaches N times, wherein N is more than or equal to 2.
6. The apparatus of claim 4 or 5, wherein:
the starting position, the ending position and the slice number of the slice, the total number of the slices and the total length of the key respectively occupy 1 byte.
7. A method for receiving a key fragment is applied to a key receiving end, and is characterized by comprising the following steps:
receiving a key sheet from an air interface through a HIFIDSP;
analyzing a message body of the key piece to obtain a piece, and analyzing a message header of the key piece to obtain a starting position, an ending position and a piece number of the piece, the total piece number of the piece and the total length of a key; wherein the length of each fragment is 18 bytes;
and creating a key assembly buffer area according to the total length of the key, and placing the fragments obtained by analysis to the corresponding positions of the key assembly buffer area according to the initial position and the end position of the fragments.
8. The method of claim 7, further comprising:
and judging whether the key is completely received according to the total number of the fragments and the number of each fragment, and if the key is completely received, sending a key receiving completion notification to a key sending end.
9. A key receiving end apparatus, configured to receive a key in a fragmented manner, the apparatus comprising: the device comprises a key receiving module, a key analyzing module and a key assembling module, wherein:
the key receiving module is used for receiving a key sheet from an air interface through the HIFIDSP;
the key analysis module is used for analyzing the message body of the key piece to obtain fragments, and analyzing the message header of the key piece to obtain the starting position, the ending position and the piece number of the fragments, the total piece number of the fragments and the total length of the key; wherein the length of each fragment is 18 bytes;
and the key assembly module is used for creating a key assembly buffer area according to the total length of the key and placing the fragments obtained by analysis at the corresponding positions of the key assembly buffer area according to the initial position and the end position of the fragments.
10. The apparatus of claim 9, wherein:
and the key assembly module is also used for judging whether the key is completely received according to the total number of the fragments and the number of each fragment, and if the key is completely received, sending a key receiving completion notification to a key sending end.
CN201911069217.7A 2019-11-05 2019-11-05 Key fragment transmission method and device and corresponding receiving method and device Pending CN112769547A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911069217.7A CN112769547A (en) 2019-11-05 2019-11-05 Key fragment transmission method and device and corresponding receiving method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911069217.7A CN112769547A (en) 2019-11-05 2019-11-05 Key fragment transmission method and device and corresponding receiving method and device

Publications (1)

Publication Number Publication Date
CN112769547A true CN112769547A (en) 2021-05-07

Family

ID=75692512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911069217.7A Pending CN112769547A (en) 2019-11-05 2019-11-05 Key fragment transmission method and device and corresponding receiving method and device

Country Status (1)

Country Link
CN (1) CN112769547A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110029773A1 (en) * 2009-07-31 2011-02-03 Futurewei Technologies, Inc. Optical Network Terminal Management Control Interface-Based Passive Optical Network Security Enhancement
US20160191509A1 (en) * 2014-12-31 2016-06-30 Nexenta Systems, Inc. Methods and Systems for Key Sharding of Objects Stored in Distributed Storage System
US20160315762A1 (en) * 2013-12-15 2016-10-27 Samsung Electronics Co., Ltd. Secure communication method and apparatus and multimedia device employing the same
US9510201B1 (en) * 2014-05-16 2016-11-29 Amazon Technologies, Inc. Connecting a device to a wireless network
CN107666491A (en) * 2017-11-15 2018-02-06 北京交通大学 The data transmission method of air-ground integrated network based on symmetric cryptography

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110029773A1 (en) * 2009-07-31 2011-02-03 Futurewei Technologies, Inc. Optical Network Terminal Management Control Interface-Based Passive Optical Network Security Enhancement
US20160315762A1 (en) * 2013-12-15 2016-10-27 Samsung Electronics Co., Ltd. Secure communication method and apparatus and multimedia device employing the same
US9510201B1 (en) * 2014-05-16 2016-11-29 Amazon Technologies, Inc. Connecting a device to a wireless network
US20160191509A1 (en) * 2014-12-31 2016-06-30 Nexenta Systems, Inc. Methods and Systems for Key Sharding of Objects Stored in Distributed Storage System
CN107666491A (en) * 2017-11-15 2018-02-06 北京交通大学 The data transmission method of air-ground integrated network based on symmetric cryptography

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谢婉娟: "基于多路密钥协商的物联网安全通信方法", 《计算机与现代化》 *

Similar Documents

Publication Publication Date Title
RU2332798C2 (en) Method and device of error acknowledgement for wireless communications system
EP0663785B1 (en) Method of data transfer and a data interface unit
CN101766003B (en) Method for transmitting status report of PDCP layer in mobile telecommunications system and receiver of mobile telecommunications
CN103875196A (en) Method and apparatus for supporting multiple frequency bands efficiently in mobile communication system
JP2008535364A5 (en)
TW200850017A (en) RRC messages and procedures
CN104365138B (en) Service performance feedback in radio access network
CN102857920A (en) Processing method and device for downlink signal messages by terminal side of LTE (long term evolution) system
KR20070108471A (en) Method and apparatus of default timer configurations of wireless communications system
CN110995750B (en) Terminal device
US20110217997A1 (en) Security mechanisms to protect sms exchange in telecommunication networks
CN104662936B (en) A kind of method, apparatus and system for transmitting data
US20030109252A1 (en) System and method of codec employment in a cellular telephone
WO2018130049A1 (en) Information transmission method and apparatus, and computer storage medium
CN112769547A (en) Key fragment transmission method and device and corresponding receiving method and device
CN115276891A (en) Data transmission method and device and readable storage medium
WO2012028062A1 (en) Method and system for transmitting instant information during call
JP5867506B2 (en) Mobile wireless communication device, mobile wireless communication network device and method.
CN109496402B (en) Identification updating method, device, equipment, system and storage medium
CN105264942B (en) Data transmission transmitting terminal equipment, receiving terminal equipment and method
CN111314978B (en) Wireless communication method, terminal device, network device, system, chip and storage medium
KR20050114021A (en) Method for changing a sms termination call of the asynchronous mobile communication system
CA2715807C (en) Data transmission
CN111836218B (en) Voice information forwarding method and device and data forwarding method and device
CN114189913B (en) Method and system for 5G voice falling back to 4G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210507