CN113014557A - Data interaction method - Google Patents

Data interaction method Download PDF

Info

Publication number
CN113014557A
CN113014557A CN202110185982.6A CN202110185982A CN113014557A CN 113014557 A CN113014557 A CN 113014557A CN 202110185982 A CN202110185982 A CN 202110185982A CN 113014557 A CN113014557 A CN 113014557A
Authority
CN
China
Prior art keywords
value
difference value
data
encryption key
secure session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110185982.6A
Other languages
Chinese (zh)
Other versions
CN113014557B (en
Inventor
万园华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Baojiu Security Group Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110185982.6A priority Critical patent/CN113014557B/en
Publication of CN113014557A publication Critical patent/CN113014557A/en
Application granted granted Critical
Publication of CN113014557B publication Critical patent/CN113014557B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to a data interaction method. The method comprises the steps of obtaining difference values of measurement data, judging whether each difference value falls into a preset range or not, and replacing the maximum value or the minimum value of the difference value which does not fall into the preset range. Thereby avoiding disconnection of the data measurement link in the presence of invalid values. By distributing and managing the encryption key and the decryption method (key) by the server, compared with the traditional method that a plurality of encryption keys and decryption keys exist and the storage positions of the encryption keys and the decryption keys are different, the data transmission provided by the application has better safety. Meanwhile, the security session is adopted for transmitting the secret key and the decryption method, so that the security of data interaction is further improved.

Description

Data interaction method
Technical Field
The present application relates to the field of data interaction technologies, and in particular, to a data interaction method.
Background
The prior art is used to transmit stored measurement data, which are generated from measured values and are stored and transmitted in the form of binary codes.
In the implementation process, the inventor finds that at least the following problems exist in the conventional technology: the traditional data interaction has the problem of low security.
Disclosure of Invention
In view of the above, it is necessary to provide a data interaction method capable of improving security in view of the above technical problems.
In order to achieve the above object, in one aspect, an embodiment of the present invention provides a data interaction method, including:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining each difference value according to the value of each measured data and a preset initial value;
judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value;
if the judgment result is not, replacing the difference value with the maximum value when the difference value is larger than the maximum value, and replacing the difference value with the minimum value when the difference value is smaller than the minimum value;
encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device;
receiving a data display request sent by a client, and establishing a second secure session;
extracting the encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
In one embodiment, the method further comprises the following steps:
if the judgment result is yes, the step of encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device is carried out.
In one embodiment, the step of suggesting the first secure session comprises:
initializing a cryptographic service;
receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
In one embodiment, each differential value is transmitted in the form of at least an 8-bit binary number.
In one embodiment, the preset initial value is transmitted in a first format, and the differential value is transmitted in a second format; the first format and the second format are different.
In one aspect, an embodiment of the present invention further provides a data interaction apparatus, including:
the differential value acquisition module is used for establishing a first secure session and generating an encryption key; transmitting the encrypted key to the data measurement device through the first secure session; acquiring each measurement data and a preset initial value; obtaining each difference value according to the value of each measured data and a preset initial value; judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value; if the judgment result is not, replacing the difference value with the maximum value when the difference value is larger than the maximum value, and replacing the difference value with the minimum value when the difference value is smaller than the minimum value;
the encryption module is used for encrypting the preset initial value and the replaced difference value by adopting an encryption key and outputting the encrypted difference value to the storage device;
the decryption module is used for receiving a data display request sent by the client and establishing a second secure session; extracting the encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key; transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
In one embodiment, the difference value obtaining module is further configured to enter a step of establishing the first secure session and generating an encryption key if the determination result is yes.
In one embodiment, the difference value obtaining module is further configured to
Initializing a cryptographic service;
receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
In one aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any one of the above methods.
On the other hand, the embodiment of the present invention further provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of any one of the above methods when executing the computer program.
One of the above technical solutions has the following advantages and beneficial effects:
according to the data interaction method, the difference value of the measured data is obtained, whether each difference value falls into the preset range or not is judged, and the maximum value or the minimum value of the difference value which does not fall into the preset range is replaced. Thereby avoiding disconnection of the data measurement link in the presence of invalid values. By distributing and managing the encryption key and the decryption method (key) by the server, compared with the traditional method that a plurality of encryption keys and decryption keys exist and the storage positions of the encryption keys and the decryption keys are different, the data transmission provided by the application has better safety. Meanwhile, the security session is adopted for transmitting the secret key and the decryption method, so that the security of data interaction is further improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a first schematic flow chart diagram illustrating a data interaction method in one embodiment;
FIG. 2 is a second schematic flow chart diagram illustrating a data interaction method in one embodiment;
FIG. 3 is a flow diagram that illustrates the steps of suggesting a first secure session, in one embodiment;
FIG. 4 is a block diagram showing the structure of a data interaction device according to an embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, there is provided a data interaction method, including the steps of:
s110, establishing a first secure session and generating an encryption key;
in particular, proctoring a secure session and generating an encryption key may be performed in any form known in the art. Establishing the first secure session and generating the encryption key may be performed by a server.
S120, acquiring each measurement data and a preset initial value;
the measurement data may be any data in the art, such as a temperature value, a current value, a voltage value, and the like, which may be detected by a data measurement device. The preset initial value may be any value.
S130, obtaining each differential value according to the value of each measurement data and a preset initial value;
wherein, each difference value is the difference between the value of the measured data and a preset initial value. In the data transmission process, the measurement data is generally transmitted and stored in the form of binary codes, and the transmission of the preset initial value and the difference value can be faster. Specifically, the data measurement device obtains each differential value according to the value of each measurement data and a preset initial value.
S140, judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value;
specifically, the data measurement device judges whether each differential value falls into a preset range; wherein the predetermined range includes a maximum value and a minimum value.
S150, if the judgment result is negative, replacing the difference value with the maximum value when the difference value is larger than the maximum value, and replacing the difference value with the minimum value when the difference value is smaller than the minimum value;
specifically, the preset initial value is sent in a first format, and the differential value is sent in a second format; the first format and the second format are different. The preset initial value is stored and transmitted in the form of 16 bits, and the difference value is stored and transmitted in the form of 8 bits, and a so-called simple data type for recording values within a corresponding value range is used as the data type. Comparing the difference determined in each case with a predetermined value range, and if the determined difference lies within the value range, storing the determined difference; if the difference lies outside the value range, storing the maximum or minimum difference for the value range assigns an error value to the maximum or minimum difference. And the error screening is carried out on the difference value, so that the accuracy and the stability of the data are further improved. If the error screening step of the present application is not adopted, the case of 8-bit storage and transmission is taken as an example, and if there is an error measurement value which is far greater than the storage space of 8 bits, an invalid value will be caused, so that the link of data transmission is disconnected and an error is reported. Through the steps, the data transmission can still be carried out under the condition that invalid values exist, and only partial acceptable errors exist. If the data measurement equipment judges that the difference value is larger than the maximum value, the data measurement equipment replaces the difference value with the maximum value, and if the difference value is smaller than the minimum value, the data measurement equipment replaces the difference value with the minimum value;
s160, encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device;
specifically, the server transmits the encryption key to the data measurement device through a first secure session; the data measurement device that receives the encryption key may encrypt the preset initial value and the replaced differential value with the encryption key and output the encrypted value to the storage device. Wherein the replaced difference value includes all the difference values subjected to the replacement processing and all the difference values falling within a preset range.
S170, receiving a data display request sent by a client, and establishing a second secure session;
specifically, the server receives a data display request sent by the client, and establishes a second secure session.
S180, extracting the encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key;
specifically, the server extracts the encryption key from the storage device and queries a corresponding decryption method according to the encryption key, where the decryption method includes one of a full encryption method and a partial encryption method.
S190, transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
The decryption method may also be a decryption key, which corresponds to the encryption key.
Specifically, the server transmits a corresponding decryption method to the client through the second secure session; through the steps, the encryption key and the decryption method (key) are distributed and managed by the server, and compared with the traditional method that a plurality of encryption keys and decryption keys exist and the storage positions of the encryption keys and the decryption keys are different, the data transmission provided by the application has better safety. Meanwhile, the security session is adopted for transmitting the secret key and the decryption method, so that the security of data interaction is further improved. The method can be applied to a set of data measurement system, and the data measurement system comprises a server, a client, data measurement equipment and a memory; by the data interaction method, the data interaction safety and the sustainable measurement capability of the measurement equipment can be effectively improved.
In one embodiment, as shown in fig. 2, further comprising the steps of:
s152, if the result of the determination is yes, the step of encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device is performed.
Specifically, if the determination result is yes, the process proceeds to step S160.
In one embodiment, as shown in fig. 3, the step of suggesting the first secure session includes:
s310, initializing password service;
s320, receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
s330, if the authentication is passed, establishing a first secure session.
In one embodiment, as shown in fig. 4, there is also provided a data interaction apparatus, including:
the differential value acquisition module is used for establishing a first secure session and generating an encryption key; transmitting the encrypted key to the data measurement device through the first secure session; acquiring each measurement data and a preset initial value; obtaining each difference value according to the value of each measured data and a preset initial value; judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value; if the judgment result is not, replacing the difference value with the maximum value when the difference value is larger than the maximum value, and replacing the difference value with the minimum value when the difference value is smaller than the minimum value;
the data transmission module is used for encrypting the preset initial value and the replaced difference value by adopting an encryption key and outputting the encrypted difference value to the storage device;
the decryption module is used for receiving a data display request sent by the client and establishing a second secure session; extracting the encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key; transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
In one embodiment, the difference value obtaining module is further configured to enter a step of establishing the first secure session and generating an encryption key if the determination result is yes.
In one embodiment, the differential value obtaining module is further configured to initialize a cryptographic service;
receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
For specific limitations of the data interaction device, reference may be made to the above limitations of the data interaction method, which is not described herein again. The modules in the data interaction device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data interaction method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining each difference value according to the value of each measured data and a preset initial value;
judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value;
if the judgment result is not, replacing the difference value with the maximum value when the difference value is larger than the maximum value, and replacing the difference value with the minimum value when the difference value is smaller than the minimum value;
encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device;
receiving a data display request sent by a client, and establishing a second secure session;
extracting the encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
if the judgment result is yes, the step of encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device is carried out.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
initializing a cryptographic service;
receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining each difference value according to the value of each measured data and a preset initial value;
judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value;
if the judgment result is not, replacing the difference value with the maximum value when the difference value is larger than the maximum value, and replacing the difference value with the minimum value when the difference value is smaller than the minimum value;
encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device;
receiving a data display request sent by a client, and establishing a second secure session;
extracting the encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the judgment result is yes, the step of encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device is carried out.
In one embodiment, the computer program when executed by the processor further performs the steps of:
initializing a cryptographic service;
receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus DRAM (RDRAM), and interface DRAM (DRDRAM).
In the description herein, references to the description of "some embodiments," "other embodiments," "desired embodiments," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, a schematic description of the above terminology may not necessarily refer to the same embodiment or example.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of data interaction, comprising the steps of:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining each difference value according to the value of each measured data and a preset initial value;
judging whether each differential value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value;
if the judgment result is negative, replacing the difference value with a maximum value when the difference value is larger than the maximum value, and replacing the difference value with a minimum value when the difference value is smaller than the minimum value;
encrypting the preset initial value and the replaced differential value by using the encryption key and outputting the encrypted differential value to storage equipment;
receiving a data display request sent by a client, and establishing a second secure session;
extracting an encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to a client through the second secure session; and the client side receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
2. The data interaction method of claim 1, further comprising the steps of:
if the judgment result is yes, the step of encrypting the preset initial value and the replaced difference value by using the encryption key and outputting the encrypted difference value to the storage device is carried out.
3. The data interaction method of claim 1, wherein the step of suggesting the first secure session comprises:
initializing a cryptographic service;
receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed;
and if the authentication is passed, establishing the first secure session.
4. A data interaction method as claimed in any one of claims 1 to 3, wherein each of said differential values is transmitted in the form of at least 8-bit binary numbers.
5. The data interaction method according to any one of claims 1 to 4, wherein the preset initial value is transmitted in a first format, and the differential value is transmitted in a second format; the first format and the second format are different.
6. A data interaction device, comprising:
the differential value acquisition module is used for establishing a first secure session and generating an encryption key; transmitting the encryption key to a data measurement device through the first secure session; acquiring each measurement data and a preset initial value; obtaining each difference value according to the value of each measured data and a preset initial value; judging whether each differential value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value; if the judgment result is not, replacing the difference value with a maximum value when the difference value is larger than the maximum value, and replacing the difference value with a minimum value when the difference value is smaller than the minimum value;
the encryption module is used for encrypting the preset initial value and the replaced difference value by adopting the encryption key and outputting the encrypted difference value to the storage device;
the decryption module is used for receiving a data display request sent by the client and establishing a second secure session; extracting an encryption key from the storage equipment, and inquiring a corresponding decryption method according to the encryption key; transmitting the corresponding decryption method to a client through the second secure session; and the client side receiving the corresponding decryption method decrypts the data by adopting the corresponding decryption method and displays the decryption result.
7. The data interaction device according to claim 6, wherein the difference value obtaining module is further configured to enter a step of establishing a first secure session and generating an encryption key if a result of the determination is yes.
8. The data interaction device of claim 6, wherein the difference value obtaining module is further configured to initialize a cryptographic service; receiving login information of a security administrator, authenticating, and quitting if the authentication is not passed; and if the authentication is passed, establishing the first secure session.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
10. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 5.
CN202110185982.6A 2021-02-13 2021-02-13 Data interaction method Active CN113014557B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110185982.6A CN113014557B (en) 2021-02-13 2021-02-13 Data interaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110185982.6A CN113014557B (en) 2021-02-13 2021-02-13 Data interaction method

Publications (2)

Publication Number Publication Date
CN113014557A true CN113014557A (en) 2021-06-22
CN113014557B CN113014557B (en) 2023-06-27

Family

ID=76402402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110185982.6A Active CN113014557B (en) 2021-02-13 2021-02-13 Data interaction method

Country Status (1)

Country Link
CN (1) CN113014557B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055582A (en) * 2009-11-06 2011-05-11 Vega格里沙贝两合公司 Data processing device for field device
US20160267150A1 (en) * 2015-02-06 2016-09-15 Josep Gubau i Forné Managing data for regulated environments
CN107864006A (en) * 2017-11-01 2018-03-30 千寻位置网络有限公司 Broadcast differential data authentication and the system and method for encryption
CN110225038A (en) * 2019-06-13 2019-09-10 江苏亨通工控安全研究院有限公司 Method, apparatus and system for industrial information safety
CN110381046A (en) * 2019-07-10 2019-10-25 广东星舆科技有限公司 A kind of encrypted transmission method of GNSS data
CN111917722A (en) * 2020-06-29 2020-11-10 江苏柏勋科技发展有限公司 CDS data security encryption system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055582A (en) * 2009-11-06 2011-05-11 Vega格里沙贝两合公司 Data processing device for field device
US20160267150A1 (en) * 2015-02-06 2016-09-15 Josep Gubau i Forné Managing data for regulated environments
CN107864006A (en) * 2017-11-01 2018-03-30 千寻位置网络有限公司 Broadcast differential data authentication and the system and method for encryption
CN110225038A (en) * 2019-06-13 2019-09-10 江苏亨通工控安全研究院有限公司 Method, apparatus and system for industrial information safety
CN110381046A (en) * 2019-07-10 2019-10-25 广东星舆科技有限公司 A kind of encrypted transmission method of GNSS data
CN111917722A (en) * 2020-06-29 2020-11-10 江苏柏勋科技发展有限公司 CDS data security encryption system

Also Published As

Publication number Publication date
CN113014557B (en) 2023-06-27

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN101939754B (en) Finger sensing apparatus using hybrid matching and associated methods
CN109361669B (en) Identity authentication method, device and equipment of communication equipment
US8145916B2 (en) Finger sensing apparatus using encrypted user template and associated methods
EP1415430B1 (en) A method and a system for processing information in an electronic device
CN101971182B (en) Finger sensing apparatus with credential release and associated methods
US20090070593A1 (en) Finger sensing apparatus using unique session key and associated methods
US20090067685A1 (en) Finger sensing apparatus using template watermarking and associated methods
US20090067689A1 (en) Finger sensing apparatus performing secure software update and associated methods
CN113691502B (en) Communication method, device, gateway server, client and storage medium
US9053351B2 (en) Finger sensing apparatus using image watermarking and associated methods
CN106897631B (en) Data processing method, device and system
CN109462602B (en) Login information storage method, login verification method, device, equipment and medium
CN109768979B (en) Data encryption transmission method and device, computer equipment and storage medium
CN113449338A (en) Information encryption storage method and system based on block chain
CN114793184B (en) Security chip communication method and device based on third-party key management node
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
CN113545022A (en) Data processing method, data encryption method, data decryption method, data encryption equipment, data decryption equipment and storage medium
CN113014557B (en) Data interaction method
CN110968878A (en) Information transmission method, system, electronic device and readable medium
KR100883442B1 (en) Method of delivering direct proof private keys to devices using an on-line service
CN113645198A (en) Computer network information safety monitoring method
CN112995096A (en) Data encryption and decryption method, device and equipment
CN115834077B (en) Control method, control system, electronic device and storage medium
CN114598478B (en) Data encryption method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230531

Address after: Building 1, No. 90 Hongfeng Road, Qingzhen City, Guiyang City, Guizhou Province, 550000

Applicant after: Guizhou Baojiu Security Group Co.,Ltd.

Address before: 330200 unit 1, building 8, KANGYI, Liantang Town, Nanchang County, Nanchang City, Jiangxi Province

Applicant before: Wan Yuanhua

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant