CN113014557B - Data interaction method - Google Patents

Data interaction method Download PDF

Info

Publication number
CN113014557B
CN113014557B CN202110185982.6A CN202110185982A CN113014557B CN 113014557 B CN113014557 B CN 113014557B CN 202110185982 A CN202110185982 A CN 202110185982A CN 113014557 B CN113014557 B CN 113014557B
Authority
CN
China
Prior art keywords
value
data
encryption key
differential
differential value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110185982.6A
Other languages
Chinese (zh)
Other versions
CN113014557A (en
Inventor
万园华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Baojiu Security Group Co ltd
Original Assignee
Guizhou Baojiu Security Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Baojiu Security Group Co ltd filed Critical Guizhou Baojiu Security Group Co ltd
Priority to CN202110185982.6A priority Critical patent/CN113014557B/en
Publication of CN113014557A publication Critical patent/CN113014557A/en
Application granted granted Critical
Publication of CN113014557B publication Critical patent/CN113014557B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The application relates to a data interaction method. And obtaining differential values of the measurement data, judging whether each differential value falls into a preset range, and replacing the differential value which does not fall into the preset range with the maximum value or the minimum value. Thereby avoiding the disconnection of the data measurement link in the presence of invalid values. By distributing and managing the encryption key and the decryption method (key) by the server, compared with the traditional method in which a plurality of encryption keys and decryption keys exist and the storage positions of the encryption keys and decryption keys are different, the data transmission provided by the application has better security. Meanwhile, a secure session is adopted to carry out a transmission secret key and decryption method, so that the security of data interaction is further improved.

Description

Data interaction method
Technical Field
The application relates to the technical field of data interaction, in particular to a data interaction method.
Background
The prior art is used to transmit stored measurement data generated from measured values, which are stored and transmitted in the form of binary codes.
In the implementation process, the inventor finds that at least the following problems exist in the conventional technology: the traditional data interaction has the problem of low security.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a data interaction method that can improve security.
In order to achieve the above object, in one aspect, an embodiment of the present invention provides a data interaction method, including the steps of:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining differential values according to the values of the measurement data and preset initial values;
judging whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value;
if the judging result is that the differential value is larger than the maximum value, replacing the differential value with the maximum value, and if the differential value is smaller than the minimum value, replacing the differential value with the minimum value;
encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to a storage device;
receiving a data display request sent by a client, and establishing a second secure session;
extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to the client through a second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
In one embodiment, the method further comprises the steps of:
if yes, the step of encrypting the preset initial value and the replaced differential value by adopting the encryption key and outputting the encrypted differential value to the storage equipment is carried out.
In one embodiment, the step of establishing the first secure session comprises:
initializing a password service;
receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
In one embodiment, each differential value is transmitted in the form of at least an 8-bit binary number.
In one embodiment, the preset initial value is sent in a first format and the differential value is sent in a second format; the first format and the second format are different.
In one aspect, an embodiment of the present invention further provides a data interaction device, including:
the differential value acquisition module is used for establishing a first secure session and generating an encryption key; transmitting the encryption key to the data measurement device via the first secure session; acquiring each measurement data and a preset initial value; obtaining differential values according to the values of the measurement data and preset initial values; judging whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value; if the judging result is that the differential value is larger than the maximum value, replacing the differential value with the maximum value, and if the differential value is smaller than the minimum value, replacing the differential value with the minimum value;
the encryption module is used for encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to the storage equipment;
the decryption module is used for receiving a data display request sent by the client and establishing a second secure session; extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key; transmitting the corresponding decryption method to the client through a second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
In one embodiment, the differential value obtaining module is further configured to enter a step of establishing a first security session and generating an encryption key if the result of the determination is yes.
In one embodiment, the differential value acquisition module is further configured to
Initializing a password service;
receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
In one aspect, embodiments of the present invention also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of any of the methods described above.
In another aspect, an embodiment of the present invention further provides a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the steps of any one of the methods described above when executing the computer program.
One of the above technical solutions has the following advantages and beneficial effects:
according to the data interaction method, the differential values of the measured data are obtained, whether the differential values fall into a preset range or not is judged, and the maximum value or the minimum value of the differential values which do not fall into the preset range is replaced. Thereby avoiding the disconnection of the data measurement link in the presence of invalid values. By distributing and managing the encryption key and the decryption method (key) by the server, compared with the traditional method in which a plurality of encryption keys and decryption keys exist and the storage positions of the encryption keys and decryption keys are different, the data transmission provided by the application has better security. Meanwhile, a secure session is adopted to carry out a transmission secret key and decryption method, so that the security of data interaction is further improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 is a first schematic flow diagram of a data interaction method in one embodiment;
FIG. 2 is a second schematic flow diagram of a data interaction method in one embodiment;
FIG. 3 is a flow chart illustrating steps for establishing a first secure session in one embodiment;
FIG. 4 is a block diagram of the structure of a data interaction device in one embodiment;
fig. 5 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, there is provided a data interaction method, including the steps of:
s110, establishing a first security session and generating an encryption key;
specifically, the secure session may be managed and the encryption key may be generated in any form known in the art. Establishing the first secure session and generating the encryption key may be performed by a server.
S120, acquiring each measurement data and a preset initial value;
the measurement data may be any data in the art, for example, a temperature value, a current value, a voltage value, etc., which may be detected by the data measurement device. The preset initial value may be any value.
S130, obtaining differential values according to the values of the measurement data and preset initial values;
wherein, each differential value is the difference between the value of the measured data and the preset initial value. In the data transmission process, the measurement data is generally transmitted and stored in the form of binary codes, and the preset initial value and the differential value can be transmitted more quickly. Specifically, the data measurement device obtains each differential value according to the value of each measurement data and a preset initial value.
S140, judging whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value;
specifically, the data measurement device judges whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value.
S150, if the judgment result is negative, replacing the differential value with a maximum value when the differential value is larger than the maximum value, and replacing the differential value with a minimum value when the differential value is smaller than the minimum value;
specifically, the preset initial value is sent in a first format, and the differential value is sent in a second format; the first format and the second format are different. The preset initial value is stored and transmitted in 16-bit form, and the difference value is stored and transmitted in 8-bit form, and a so-called simple data type for recording a value within a corresponding value range is used as the data type. Comparing the determined difference value in each case with a predetermined value range, and if the determined difference value lies within the value range, storing the determined difference value; if the difference is outside the range of values, storing the largest or smallest difference value for the range of values assigns an error value to the largest or smallest difference value. The accuracy and stability of the data are further improved by error screening of the differential values. If the error filtering step is not adopted, the case of 8-bit storage and transmission is exemplified, and if an error measurement value exists, the error measurement value is far larger than the 8-bit storage space, an invalid value can be caused to appear, so that a link of data transmission is disconnected and reported wrongly. By the above steps, the present application still enables data transmission in the presence of invalid values, but only with some acceptable errors. The data measurement device replaces the differential value with the maximum value when the differential value is larger than the maximum value and replaces the differential value with the minimum value when the differential value is smaller than the minimum value if the judging result is negative;
s160, encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to a storage device;
specifically, the server transmits the encryption key to the data measurement device through a first secure session; the data measurement device that receives the encryption key may encrypt the preset initial value and the replaced differential value using the encryption key and output the encrypted differential value to the storage device. The replaced differential values comprise all differential values after the replacement processing and all differential values falling into a preset range.
S170, receiving a data display request sent by a client, and establishing a second secure session;
specifically, the server receives a data display request sent by the client, and establishes a second secure session.
S180, extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key;
specifically, the server extracts the encryption key from the storage device, and queries a corresponding decryption method according to the encryption key, where the decryption method includes one of a full encryption method and a partial encryption method.
S190, transmitting the corresponding decryption method to the client through a second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
The decryption method may also be a decryption key, which corresponds to the encryption key.
Specifically, the server transmits a corresponding decryption method to the client through a second secure session; by the steps, the encryption key and the decryption method (key) are distributed and managed by the server, and compared with the traditional method in which a plurality of encryption keys and decryption keys exist and the storage positions of the encryption keys and decryption keys are different, the data transmission provided by the application has better security. Meanwhile, a secure session is adopted to carry out a transmission secret key and decryption method, so that the security of data interaction is further improved. The application can be applied to a set of data measurement system, wherein the data measurement system comprises a server, a client, data measurement equipment and a memory; by the data interaction method, the safety of data interaction and the sustainable measurement capability of the measurement equipment can be effectively improved.
In one embodiment, as shown in fig. 2, the method further comprises the steps of:
and S152, if the judgment result is yes, a step of encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to the storage device is carried out.
Specifically, if the determination result is yes, the process proceeds to step S160.
In one embodiment, as shown in fig. 3, the step of establishing a first secure session includes:
s310, initializing a password service;
s320, receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
s330, if the authentication is passed, a first secure session is established.
In one embodiment, as shown in fig. 4, there is also provided a data interaction device, including:
the differential value acquisition module is used for establishing a first secure session and generating an encryption key; transmitting the encryption key to the data measurement device via the first secure session; acquiring each measurement data and a preset initial value; obtaining differential values according to the values of the measurement data and preset initial values; judging whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value; if the judging result is that the differential value is larger than the maximum value, replacing the differential value with the maximum value, and if the differential value is smaller than the minimum value, replacing the differential value with the minimum value;
the data transmission module is used for encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to the storage equipment;
the decryption module is used for receiving a data display request sent by the client and establishing a second secure session; extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key; transmitting the corresponding decryption method to the client through a second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
In one embodiment, the differential value obtaining module is further configured to enter a step of establishing a first security session and generating an encryption key if the result of the determination is yes.
In one embodiment, the differential value acquisition module is further configured to initialize a cryptographic service;
receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
For specific limitations of the data interaction device, reference may be made to the above limitation of the data interaction method, and no further description is given here. The modules in the data interaction device may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data interaction method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining differential values according to the values of the measurement data and preset initial values;
judging whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value;
if the judging result is that the differential value is larger than the maximum value, replacing the differential value with the maximum value, and if the differential value is smaller than the minimum value, replacing the differential value with the minimum value;
encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to a storage device;
receiving a data display request sent by a client, and establishing a second secure session;
extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to the client through a second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
In one embodiment, the processor when executing the computer program further performs the steps of:
if yes, the step of encrypting the preset initial value and the replaced differential value by adopting the encryption key and outputting the encrypted differential value to the storage equipment is carried out.
In one embodiment, the processor when executing the computer program further performs the steps of:
initializing a password service;
receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
establishing a first secure session and generating an encryption key;
acquiring each measurement data and a preset initial value;
obtaining differential values according to the values of the measurement data and preset initial values;
judging whether each differential value falls into a preset range; the preset range comprises a maximum value and a minimum value;
if the judging result is that the differential value is larger than the maximum value, replacing the differential value with the maximum value, and if the differential value is smaller than the minimum value, replacing the differential value with the minimum value;
encrypting the preset initial value and the replaced differential value by adopting an encryption key and outputting the encrypted differential value to a storage device;
receiving a data display request sent by a client, and establishing a second secure session;
extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key;
transmitting the corresponding decryption method to the client through a second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if yes, the step of encrypting the preset initial value and the replaced differential value by adopting the encryption key and outputting the encrypted differential value to the storage equipment is carried out.
In one embodiment, the computer program when executed by the processor further performs the steps of:
initializing a password service;
receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
and if the authentication is passed, establishing a first secure session.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus dynamic random access memory (RDRAM), and interface dynamic random access memory (DRDRAM).
In the description of the present specification, reference to the terms "some embodiments," "other embodiments," "desired embodiments," and the like, means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic descriptions of the above terms do not necessarily refer to the same embodiment or example.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (9)

1. A method of data interaction, comprising the steps of:
the server establishes a first secure session and generates an encryption key;
transmitting the encryption key to a data measurement device via the first secure session; the data measurement device acquires measurement data and preset initial values; the data measurement equipment obtains differential values according to the values of the measurement data and preset initial values;
the data measurement device judges whether each differential value falls into a preset range; wherein the preset range comprises a maximum value and a minimum value;
if the judging result is no, the data measuring equipment replaces the differential value with a maximum value when the differential value is larger than the maximum value, and replaces the differential value with a minimum value when the differential value is smaller than the minimum value; the preset initial value is sent in a first format, and the differential value is sent in a second format; the first format and the second format are different;
the data measurement device encrypts the preset initial value and the replaced differential value by adopting the encryption key and outputs the encrypted initial value and the replaced differential value to the storage device;
the server receives a data display request sent by the client and establishes a second secure session;
the server extracts the encryption key from the storage equipment and inquires a corresponding decryption method according to the encryption key;
the server transmits the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
2. The data interaction method of claim 1, further comprising the step of:
if the judgment result is yes, the step of encrypting the preset initial value and the replaced differential value by adopting the encryption key and outputting the encrypted differential value to the storage equipment is carried out.
3. The data interaction method of claim 1, wherein the step of establishing a first secure session comprises:
initializing a password service;
receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed;
and if the authentication is passed, establishing the first secure session.
4. A data interaction method as claimed in any one of claims 1 to 3, wherein each of said differential values is transmitted in the form of at least an 8-bit binary number.
5. A data interaction device, comprising:
the differential value acquisition module is used for establishing a first secure session and generating an encryption key; transmitting the encryption key to a data measurement device via the first secure session; acquiring each measurement data and a preset initial value; obtaining differential values according to the values of the measurement data and preset initial values; judging whether each difference value falls into a preset range or not; wherein the preset range comprises a maximum value and a minimum value; if the judging result is that the difference value is larger than the maximum value, replacing the difference value with the maximum value, and if the difference value is smaller than the minimum value, replacing the difference value with the minimum value; the preset initial value is sent in a first format, and the differential value is sent in a second format; the first format and the second format are different;
the encryption module is used for encrypting the preset initial value and the replaced differential value by adopting the encryption key and outputting the encrypted differential value to the storage equipment;
the decryption module is used for receiving a data display request sent by the client and establishing a second secure session; extracting an encryption key from the storage device, and inquiring a corresponding decryption method according to the encryption key; transmitting the corresponding decryption method to the client through the second secure session; and the client receiving the corresponding decryption method adopts the corresponding decryption method to decrypt the data and display the decryption result.
6. The data interaction device of claim 5, wherein the differential value obtaining module is further configured to enter a step of establishing a first security session and generating an encryption key if the determination is yes.
7. The data interaction device of claim 5, wherein the differential value acquisition module is further configured to initialize a cryptographic service; receiving login information of a security administrator and authenticating, and exiting if the authentication is not passed; and if the authentication is passed, establishing the first secure session.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
CN202110185982.6A 2021-02-13 2021-02-13 Data interaction method Active CN113014557B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110185982.6A CN113014557B (en) 2021-02-13 2021-02-13 Data interaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110185982.6A CN113014557B (en) 2021-02-13 2021-02-13 Data interaction method

Publications (2)

Publication Number Publication Date
CN113014557A CN113014557A (en) 2021-06-22
CN113014557B true CN113014557B (en) 2023-06-27

Family

ID=76402402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110185982.6A Active CN113014557B (en) 2021-02-13 2021-02-13 Data interaction method

Country Status (1)

Country Link
CN (1) CN113014557B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864006A (en) * 2017-11-01 2018-03-30 千寻位置网络有限公司 Broadcast differential data authentication and the system and method for encryption

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2320285A1 (en) * 2009-11-06 2011-05-11 VEGA Grieshaber KG Data processing device for a field device
WO2016127182A1 (en) * 2015-02-06 2016-08-11 I Forne Josep Gubau Managing data for regulated environments
CN110225038B (en) * 2019-06-13 2022-05-17 江苏亨通工控安全研究院有限公司 Method, device and system for industrial information security
CN110381046B (en) * 2019-07-10 2021-12-07 广东星舆科技有限公司 GNSS data encryption transmission method
CN111917722A (en) * 2020-06-29 2020-11-10 江苏柏勋科技发展有限公司 CDS data security encryption system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864006A (en) * 2017-11-01 2018-03-30 千寻位置网络有限公司 Broadcast differential data authentication and the system and method for encryption

Also Published As

Publication number Publication date
CN113014557A (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN112637166B (en) Data transmission method, device, terminal and storage medium
CN101939754B (en) Finger sensing apparatus using hybrid matching and associated methods
CN109361669B (en) Identity authentication method, device and equipment of communication equipment
CN108197485B (en) Terminal data encryption method and system and terminal data decryption method and system
CN101971182B (en) Finger sensing apparatus with credential release and associated methods
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN112019332A (en) Encryption and decryption method based on micro-service, API gateway system and equipment
CN106897631B (en) Data processing method, device and system
CN110099064A (en) A kind of document handling method based on Internet of Things, device, equipment and storage medium
CN110690956B (en) Bidirectional authentication method and system, server and terminal
CN109768979B (en) Data encryption transmission method and device, computer equipment and storage medium
CN209803788U (en) PCIE credible password card
CN103679000A (en) Apparatus and method for remotely deleting critical information
CN111400728A (en) Data encryption and decryption method and device applied to block chain
CN113449338A (en) Information encryption storage method and system based on block chain
US11128455B2 (en) Data encryption method and system using device authentication key
CN111901304A (en) Registration method and device of mobile security equipment, storage medium and electronic device
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
CN113591059A (en) User login authentication method
CN116049802B (en) Application single sign-on method, system, computer equipment and storage medium
CN113014557B (en) Data interaction method
CN113545022A (en) Data processing method, data encryption method, data decryption method, data encryption equipment, data decryption equipment and storage medium
US20230068650A1 (en) Method for testing if a data element belongs to a list of reference data elements
CN110659522B (en) Storage medium security authentication method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230531

Address after: Building 1, No. 90 Hongfeng Road, Qingzhen City, Guiyang City, Guizhou Province, 550000

Applicant after: Guizhou Baojiu Security Group Co.,Ltd.

Address before: 330200 unit 1, building 8, KANGYI, Liantang Town, Nanchang County, Nanchang City, Jiangxi Province

Applicant before: Wan Yuanhua

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant