CN113286297B - Wireless data encryption transmission method and device, computer equipment and storage medium - Google Patents

Wireless data encryption transmission method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113286297B
CN113286297B CN202110828655.8A CN202110828655A CN113286297B CN 113286297 B CN113286297 B CN 113286297B CN 202110828655 A CN202110828655 A CN 202110828655A CN 113286297 B CN113286297 B CN 113286297B
Authority
CN
China
Prior art keywords
data
variable
characteristic value
key
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110828655.8A
Other languages
Chinese (zh)
Other versions
CN113286297A (en
Inventor
庄俊森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tongfu Information Technology Co ltd
Original Assignee
Shenzhen Tongfu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tongfu Information Technology Co ltd filed Critical Shenzhen Tongfu Information Technology Co ltd
Priority to CN202110828655.8A priority Critical patent/CN113286297B/en
Publication of CN113286297A publication Critical patent/CN113286297A/en
Application granted granted Critical
Publication of CN113286297B publication Critical patent/CN113286297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention is applicable to the technical field of digital information transmission, and particularly relates to a wireless data encryption transmission method, a device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring an environment variable and data to be transmitted, wherein the environment variable at least comprises an electric signal in a data transmitting end; converting the environment variable to generate a variable characteristic value; reading a corresponding encryption key from a key database according to the variable characteristic value; encrypting the data to be transmitted according to the encryption key to obtain encrypted data; and sending the encrypted data and the variable characteristic value to a data receiving end, and reading a corresponding decryption key by the data receiving end according to the variable characteristic value and decrypting the encrypted data. According to the wireless data encryption transmission method provided by the embodiment of the invention, the external environment is used as a variable to generate the key, and the generated key is used for encrypting and decrypting data, so that a small amount of data leakage can be caused even if the key is cracked, and the security is higher.

Description

Wireless data encryption transmission method and device, computer equipment and storage medium
Technical Field
The invention belongs to the technical field of digital information transmission, and particularly relates to a wireless data encryption transmission method, a wireless data encryption transmission device, computer equipment and a storage medium.
Background
Wireless transmission is one of the data transmission means widely used in today's society. The wireless transmission is used as a corresponding information transmission mode of a wired transmission technology, and data transmission can be completed only by arranging a data sending end and a data receiving end during installation, so that the wireless transmission has the characteristics of convenience in installation, high flexibility, high cost performance and the like. Wireless image transmission is a typical application of wireless transmission, and is applied to various aspects in the society.
In the current wireless transmission process, the method is suitable for transmitting the data generated by the information acquisition point to a background for storage or processing, in the transmission process, the data is generally transmitted directly without encryption, some data are encrypted by adopting a specific encryption mode, and after the data transmission is finished, the data are decrypted. For example, the public key is used to encrypt the data, and the private key is used to decrypt the data after the data transmission is completed, so as to finally obtain the complete data.
In the prior art, short-distance wireless transmission is generally encrypted by using a fixed secret key, and once the secret key is cracked, data transmitted wirelessly is leaked, so that the existing wireless transmission encryption mode has certain safety risk.
Disclosure of Invention
An object of the embodiments of the present invention is to provide a method for encrypting and transmitting wireless data, which aims to solve the problems in the background art.
The embodiment of the invention is realized in such a way that a wireless data encryption transmission method comprises the following steps:
acquiring an environment variable and data to be transmitted, wherein the environment variable at least comprises an electric signal in a data transmitting end;
converting the environment variable to generate a variable characteristic value, and encrypting the variable characteristic value;
reading a corresponding encryption key from a key database according to the variable characteristic value;
encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
and sending the encrypted data and the variable characteristic value to a data receiving end, and reading a corresponding decryption key by the data receiving end according to the variable characteristic value and decrypting the encrypted data.
Preferably, the step of obtaining the environment variable and the data to be transmitted specifically includes:
acquiring an environment variable, wherein the environment variable comprises a current value and a voltage value in a data sending end;
generating an environment variable sampling value according to a preset pseudorandom function;
selecting a current value or a voltage value as an environment variable according to the environment variable sampling value;
and acquiring the data to be transmitted, wherein the acquisition time of the environment variable is prior to the acquisition time of the data to be transmitted.
Preferably, the step of converting the environment variable to generate a variable characteristic value and encrypting the variable characteristic value specifically includes:
selecting a corresponding conversion relation table according to the content contained in the environment variable, wherein the conversion relation table is preset in a data sending end;
and extracting the characteristic value of the environment variable according to the conversion relation table to obtain the characteristic value of the variable, and encrypting the characteristic value of the variable.
Preferably, the step of encrypting the data to be transmitted according to the encryption key to obtain encrypted data specifically includes:
segmenting data to be transmitted to obtain at least two groups of segmented data blocks;
randomly selecting N groups of segmentation data blocks, and encrypting the segmentation data blocks by using an encryption key to obtain N groups of encryption data blocks, wherein the number N of the selected segmentation data blocks is not zero;
continuously numbering the unencrypted segmented data blocks and the N groups of encrypted data blocks, and generating a numbering information table;
recombining the unencrypted segmented data blocks with the N groups of encrypted data blocks according to the serial number sequence to obtain recombined transmission data;
and integrating and recombining the transmission data and the number information table to obtain encrypted data.
Preferably, the step of reading the corresponding decryption key according to the decrypted variable characteristic value and decrypting the encrypted data includes:
decrypting the variable characteristic value, and extracting a decryption key from a decryption database preset in a data receiving end according to the decrypted variable characteristic value, wherein the decryption key and the encryption key both correspond to the same variable characteristic value;
and decrypting the encrypted data according to the decryption key.
Preferably, the key database reads the corresponding encryption key and updates the encryption key periodically, and the decryption key and the encryption key are updated synchronously.
Preferably, the encryption keys in the key database are classified and stored in different storage areas according to key types, and in the process of reading corresponding encryption keys from the key database according to the variable characteristic values, the key types are determined according to the variable characteristic values, and then the corresponding encryption keys are obtained by searching in the corresponding storage areas.
Another objective of an embodiment of the present invention is to provide a wireless data encryption transmission apparatus, including:
the information acquisition module is used for acquiring environment variables and data to be transmitted, wherein the environment variables at least comprise electric signals in the data transmitting end;
the conversion module is used for converting the environment variable, generating a variable characteristic value and encrypting the variable characteristic value;
the information extraction module is used for reading a corresponding encryption key from the key database according to the variable characteristic value;
the encryption module is used for encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
and the data sending module is used for sending the encrypted data and the variable characteristic value to a data receiving end, and the data receiving end reads a corresponding decryption key according to the decrypted variable characteristic value and decrypts the encrypted data.
It is a further object of an embodiment of the present invention to provide a computer device, including a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, causes the processor to execute the steps of the wireless data encryption transmission method as described above.
It is a further object of an embodiment of the present invention to provide a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, causes the processor to perform the steps of the wireless data encryption transmission method as described above.
According to the wireless data encryption transmission method provided by the embodiment of the invention, the external environment is used as a variable to generate the key, and the generated key is used for encrypting and decrypting data, so that a small amount of data leakage can be caused even if the key is cracked, and the security is higher.
Drawings
Fig. 1 is a flowchart of a wireless data encryption transmission method according to an embodiment of the present invention;
FIG. 2 is a flowchart of steps for obtaining environment variables and data to be transmitted according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps for transforming environment variables to generate variable feature values according to an embodiment of the present invention;
fig. 4 is a flowchart of a step of encrypting data to be transmitted according to an encryption key to obtain encrypted data according to an embodiment of the present invention;
fig. 5 is a flowchart of a step in which the data receiving end reads a corresponding decryption key according to a variable feature value and decrypts encrypted data according to the variable feature value, according to an embodiment of the present invention;
fig. 6 is an architecture diagram of a wireless data encryption transmission apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
In the prior art, short-distance wireless transmission is generally encrypted by using a fixed secret key, and once the secret key is cracked, data transmitted wirelessly is leaked, so that the existing wireless transmission encryption mode has certain safety risk.
According to the wireless data encryption transmission method provided by the embodiment of the invention, the external environment is used as a variable to generate the key, and the generated key is used for encrypting and decrypting data, so that a small amount of data leakage can be caused even if the key is cracked, and the security is higher.
Fig. 1 is a method for transmitting encrypted wireless data according to an embodiment of the present invention, where the method includes:
s100, obtaining an environment variable and data to be transmitted, wherein the environment variable at least comprises an electric signal in a data transmitting end.
The current encryption modes are divided into a symmetric encryption mode and an asymmetric encryption mode, in a symmetric encryption algorithm, only one key is used, both a sender and a receiver use the key to encrypt and decrypt data, and therefore, the secret party needs to know the encryption key in advance; the asymmetric encryption algorithm needs two keys, a public key and a private key are a pair, and if the public key is used for encrypting data, only the corresponding private key can be used for decrypting the data. In both of the above two ways, the key is fixed, and once broken, all data is lost.
In this step, the environment variable is obtained, the environment variable is directly obtained from the data sending end, when the random variable needs to be generated in the current system, the random variable is generally generated by using a random function, but because the computer itself cannot realize randomness, the above steps can only be completed in a pseudo-random manner, the pseudo-random number is a random number sequence which is uniformly distributed from [0,1] and is not truly random by using a deterministic algorithm, the environment variable is directly obtained from the data sending end, the obtained environment variable is unpredictable, the content of the environment variable can be a variable in a natural environment, such as wind speed, air pressure value or temperature at different moments, and the like, and can also be a variable generated by the data sending end itself, such as an electric signal in the data sending end, because the strength of the electric signal in the data sending end varies along with the work thereof, the method is unpredictable, so that true randomness is realized, the environment variable is a true random variable, the data to be transmitted is obtained, the data to be transmitted is data needing to be transmitted in a wireless transmission mode, and if the data to be transmitted is directly transmitted, risks exist, so that the data needs to be encrypted.
And S200, converting the environment variable to generate a variable characteristic value, and encrypting the variable characteristic value.
In this step, the environment variable is converted, and since the environment variable is an external parameter directly obtained, the value thereof cannot be directly used, and the environment variable is converted into a variable characteristic value that can be used, and encrypted for security.
And S300, reading a corresponding encryption key from the key database according to the variable characteristic value.
In this step, a corresponding encryption key is read from a key database according to a variable characteristic value, the obtained variable characteristic value after the environmental variable is converted corresponds to a standard value, for example, the environmental variable is a current value of 1.2A, at this time, the variable characteristic value is converted into the standard value according to different variable characteristic values corresponding to different currents, after the variable characteristic value is obtained, the key database is retrieved, the key database is preset in a data sending end, a plurality of encryption keys are stored in the key database, and a decryption key corresponding to the encryption key is stored in a data receiving end, in other words, each variable characteristic value corresponds to one encryption key and one decryption key at the same time, after the variable characteristic value is generated, the corresponding encryption key and decryption key are generated, since the variable characteristic value is obtained by conversion according to the environmental variable, and the environmental variable is truly randomly generated, therefore, the finally obtained encryption key and decryption key are also randomly selected, and compared with the pseudo-random key, the security is higher; reading a corresponding encryption key from the key database, and updating the decryption key and the encryption key at regular intervals; and during the process of reading the corresponding encryption key from the key database according to the variable characteristic value, determining the key type according to the variable characteristic value, and then retrieving the corresponding encryption key in the corresponding storage area.
S400, encrypting the data to be transmitted according to the encryption key to obtain encrypted data.
In this step, the data to be transmitted is encrypted according to the encryption key, after the encryption key is obtained, the specific encryption mode is determined, at this time, a part of data or all data in the data to be transmitted can also be encrypted according to the requirement, the encryption effect can also be achieved by encrypting a part of data to be transmitted, and the data processing time can be reduced.
And S500, sending the encrypted data and the variable characteristic value to a data receiving end, reading a corresponding decryption key by the data receiving end according to the decrypted variable characteristic value, and decrypting the encrypted data.
In the step, the encrypted data and the variable characteristic value are sent to a data receiving end, the data receiving end decrypts the variable characteristic value and extracts a corresponding decryption key to finish the decryption work of the encrypted data, the data sending end sends the encrypted data and the variable characteristic value out simultaneously after encryption, even if the encrypted data and the variable characteristic value are hijacked, the decryption key which can be used for decryption cannot be obtained, and even if the encrypted data and the variable characteristic value are cracked, only the data is lost, in the next cycle, the environment variable is changed, the encryption mode is changed accordingly, the situation that the data is continuously cracked does not occur, and the safety is greatly improved.
As shown in fig. 2, as a preferred embodiment of the present invention, the step of obtaining the environment variable and the data to be transmitted specifically includes:
s101, obtaining environment variables, wherein the environment variables comprise current values and voltage values in a data sending end.
In this step, an environment variable is obtained, the environment variable includes a current value and a voltage value in the data sending end, in the current data sending end, although the current data sending end works under an external constant voltage during working, the voltage is not absolutely stable in practice, except for fluctuation of a power supply, the working strength of the data sending end can also affect the voltage, and similarly, the current value in the data sending end is always in a changing state, and the current value and the voltage value in the data sending end are directly obtained at this time, which means that two sets of random variables obtained at the same time are used for selection.
And S102, generating an environment variable sampling value according to a preset pseudorandom function.
In this step, an environment variable sampling value is generated according to a preset pseudorandom function, the pseudorandom function is preset to determine whether a current value or a voltage value is currently selected as the environment variable sampling value, a result generated by the pseudorandom function is 0 or 1, if the types of the environment variables are continuously increased to 3, a result generated by the pseudorandom function is 0 or 1 or 2, and the number of the results generated by the pseudorandom function is the same as the number of the types of the environment variables.
And S103, selecting a current value or a voltage value as an environment variable according to the environment variable sampling value.
In the step, a current value or a voltage value is selected as an environment variable according to an environment variable sampling value, if the result generated by the pseudorandom function is 0, the current value is selected as the current environment variable according to a preset corresponding relation, otherwise, the voltage value is selected as the environment variable.
And S104, acquiring the data to be transmitted, wherein the acquisition time of the environment variable is prior to the acquisition time of the data to be transmitted.
In this step, the data to be transmitted is acquired, and the acquisition time of the environment variable is prior to the acquisition time of the data to be transmitted, so that the encryption mode can be determined first, and then the data is encrypted, so that the data transmitting end can continuously process the data.
As shown in fig. 3, as a preferred embodiment of the present invention, the step of converting the environment variable, generating the variable characteristic value, and encrypting the variable characteristic value specifically includes:
s201, selecting a corresponding conversion relation table according to contents contained in the environment variables, wherein the conversion relation table is preset in the data sending end.
In this step, a corresponding conversion relation table is selected according to the content included in the environment variable, the conversion relation tables corresponding to different types of the environment variable are different, for example, there are two types of the environment variable, which are respectively a voltage value and a current value, and then the conversion relation table is divided into a voltage conversion relation table and a current conversion relation table, and the conversion relation table is preset in the data sending end.
And S202, extracting the characteristic value of the environment variable according to the conversion relation table, generating a variable characteristic value and encrypting the variable characteristic value.
In this step, extracting a characteristic value of the environment variable according to the conversion relation table, taking a current value as the environment variable as an example, taking three digits behind a decimal point of the current value as the environment variable, if the current value is 1.2456a, the environment variable is 245, and searching for the characteristic value corresponding to the environment variable 245 from the conversion relation table, namely a variable characteristic value; in order to avoid clear code transmission, the variable characteristic value is encrypted, and a decrypted key is preset in the data receiving end and is stored separately from the decrypted key.
As shown in fig. 4, as a preferred embodiment of the present invention, the step of encrypting data to be transmitted according to an encryption key to obtain encrypted data specifically includes:
s401, segmenting data to be transmitted to obtain at least two groups of segmented data blocks.
In this step, the data to be transmitted is divided, and in order to further improve the effectiveness of encryption, the data to be transmitted is divided to obtain at least two groups of divided data blocks, for example, the divided data blocks are divided into five groups, and the sizes of the five groups of divided data blocks may be the same or different.
S402, randomly selecting N groups of segmentation data blocks, and encrypting the segmentation data blocks by using an encryption key to obtain N groups of encryption data blocks, wherein the number N of the selected segmentation data blocks is not zero.
In the step, N groups of segmentation data blocks are randomly selected, the number N of the selected segmentation data blocks is not zero, the N groups of the selected segmentation data blocks are encrypted, and finally N groups of encrypted data blocks are obtained.
And S403, continuously numbering the unencrypted split data blocks and the N groups of encrypted data blocks, and generating a numbering information table.
In the step, the unencrypted split data blocks and the N groups of encrypted data blocks are numbered continuously, five groups of split data blocks are generated in the splitting process, the data blocks are numbered after being encrypted, a numbering information table is generated, and the original positions of the unencrypted split data blocks and the N groups of encrypted data blocks in the data to be transmitted are recorded in the numbering information table, so that the data can be spliced again according to the numbering information table.
S404, the unencrypted segmented data blocks and the N groups of encrypted data blocks are recombined according to the numbering sequence to obtain recombined transmission data.
S405, integrating and recombining the transmission data and the number information table to obtain encrypted data.
In the step, the unencrypted segmented data blocks and the N groups of encrypted data blocks are recombined according to the numbering sequence, the recombination sequence is different from the segmentation sequence, so that the purpose of disturbing the data is achieved, and finally, the numbering information table is also integrated into the encrypted data, so that a basis is provided for subsequent splicing.
As shown in fig. 5, as a preferred embodiment of the present invention, the step of reading a corresponding decryption key according to the decrypted variable characteristic value and decrypting the encrypted data includes:
s501, decrypting the variable characteristic value, and extracting a decryption key from a decryption database preset in the data receiving end according to the decrypted variable characteristic value, wherein the decryption key and the encryption key both correspond to the same variable characteristic value.
In this step, the variable characteristic value is received and then decrypted, and since the variable characteristic value corresponds to a specific decryption key, the decryption key can be determined according to the correspondence.
S501, the encrypted data is decrypted according to the decryption key.
In the step, the encrypted data is decrypted according to the decryption key, firstly, a number information table is extracted from the encrypted data, then the retransmission data is split according to the number information table, the unencrypted split data block and the N groups of encrypted data blocks are obtained after splitting, the N groups of encrypted data blocks are decrypted by using the decryption key, so that all the split data blocks are obtained, the split data blocks are spliced again according to the number information table, and therefore complete data are obtained.
As shown in fig. 6, the wireless data encryption transmission apparatus provided by the present invention includes:
the information obtaining module 100 is configured to obtain an environment variable and data to be transmitted, where the environment variable at least includes an electrical signal in a data transmitting end.
In the device, an information acquisition module 100 acquires an environment variable, the environment variable is directly acquired from a data sending end, and because the strength of an electric signal in the data sending end is variable along with the work of the data sending end, which is unpredictable, real randomness is realized, the environment variable is a true random variable, and then data to be transmitted is acquired, and the data to be transmitted is data to be transmitted in a wireless transmission mode.
And the conversion module 200 is configured to convert the environment variable, generate a variable characteristic value, and encrypt the variable characteristic value.
In the present apparatus, the conversion module 200 converts the environment variable, which is an external parameter directly obtained, and the value of the environment variable cannot be directly used, and converts the environment variable into a variable characteristic value that can be used.
And an information extraction module 300, configured to read a corresponding encryption key from the key database according to the variable feature value.
In the device, an information extraction module 300 reads a corresponding encryption key from a key database according to a variable characteristic value, the obtained variable characteristic value is equivalent to a standard value after an environment variable is converted, the variable characteristic value is converted into the standard value according to different variable characteristic values corresponding to different currents, and after the variable characteristic value is obtained, a key database is searched, the key database is preset in a data sending end, a plurality of encryption keys are stored in the key database, and a decryption key corresponding to the encryption key is stored in a data receiving end.
The encryption module 400 is configured to encrypt data to be transmitted according to the encryption key to obtain encrypted data.
In the device, the encryption module 400 encrypts the data to be transmitted according to the encryption key, and after the encryption key is obtained, the specific encryption mode is determined, at this time, a part of data or all data in the data to be transmitted can be encrypted according to the requirement, the encryption function can be also played by encrypting a part of data to be transmitted, and the data processing time can be reduced.
And the data sending module 500 is configured to send the encrypted data and the variable characteristic value to a data receiving end, where the data receiving end reads a corresponding decryption key according to the decrypted variable characteristic value and decrypts the encrypted data.
In the device, the data sending module 500 sends the encrypted data and the variable characteristic value to the data receiving end, the data sending end sends the encrypted data and the variable characteristic value simultaneously after encryption, even if the encrypted data and the variable characteristic value are hijacked, a decryption key which can be used for decryption cannot be obtained, even if the encrypted data and the variable characteristic value are cracked, only the data at this time is lost, in the next cycle, the environment variable is changed, the encryption mode is changed accordingly, the situation that the data is continuously cracked does not occur, and the safety is greatly improved.
In one embodiment, a computer device is proposed, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
acquiring an environment variable and data to be transmitted, wherein the environment variable at least comprises an electric signal in a data transmitting end;
converting the environment variable to generate a variable characteristic value, and encrypting the variable characteristic value;
reading a corresponding encryption key from a key database according to the variable characteristic value;
encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
and sending the encrypted data and the variable characteristic value to a data receiving end, and reading a corresponding decryption key by the data receiving end according to the decrypted variable characteristic value and decrypting the encrypted data.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of:
acquiring an environment variable and data to be transmitted, wherein the environment variable at least comprises an electric signal in a data transmitting end;
the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for converting environment variables, generating variable characteristic values and encrypting the variable characteristic values;
reading a corresponding encryption key from a key database according to the variable characteristic value;
encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
and sending the encrypted data and the variable characteristic value to a data receiving end, and reading a corresponding decryption key by the data receiving end according to the decrypted variable characteristic value and decrypting the encrypted data.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (9)

1. A method for encrypted transmission of wireless data, the method comprising:
acquiring an environment variable and data to be transmitted, wherein the environment variable at least comprises an electric signal in a data transmitting end;
converting the environment variable to generate a variable characteristic value, and encrypting the variable characteristic value;
reading a corresponding encryption key from a key database according to the variable characteristic value;
encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
sending the encrypted data and the variable characteristic value to a data receiving end, reading a corresponding decryption key by the data receiving end according to the decrypted variable characteristic value, and decrypting the encrypted data;
the step of obtaining the environment variable and the data to be transmitted specifically includes:
acquiring an environment variable, wherein the environment variable comprises a current value and a voltage value in a data sending end;
generating an environment variable sampling value according to a preset pseudorandom function;
selecting a current value or a voltage value as an environment variable according to the environment variable sampling value;
and acquiring the data to be transmitted, wherein the acquisition time of the environment variable is prior to the acquisition time of the data to be transmitted.
2. The method for encrypted transmission of wireless data according to claim 1, wherein the step of converting the environment variable to generate the variable characteristic value and encrypting the variable characteristic value specifically includes:
selecting a corresponding conversion relation table according to the content contained in the environment variable, wherein the conversion relation table is preset in a data sending end;
and extracting the characteristic value of the environment variable according to the conversion relation table to obtain the characteristic value of the variable, and encrypting the characteristic value of the variable.
3. The method for encrypting and transmitting wireless data according to claim 1, wherein the step of encrypting the data to be transmitted according to the encryption key to obtain the encrypted data specifically comprises:
segmenting data to be transmitted to obtain at least two groups of segmented data blocks;
randomly selecting N groups of segmentation data blocks, encrypting the segmentation data blocks by using an encryption key to obtain N groups of encryption data blocks, and selecting the number N of the segmentation data blocks not to be zero;
continuously numbering the unencrypted segmented data blocks and the N groups of encrypted data blocks, and generating a numbering information table;
recombining the unencrypted segmented data blocks with the N groups of encrypted data blocks according to the serial number sequence to obtain recombined transmission data;
and integrating and recombining the transmission data and the number information table to obtain encrypted data.
4. The method for encrypted transmission of wireless data according to claim 1, wherein the step of reading the corresponding decryption key according to the decrypted variable characteristic value and decrypting the encrypted data comprises:
decrypting the variable characteristic value, and extracting a decryption key from a decryption database preset in a data receiving end according to the decrypted variable characteristic value, wherein the decryption key and the encryption key both correspond to the same variable characteristic value;
and decrypting the encrypted data according to the decryption key.
5. The method for wireless data encryption transmission according to claim 3, wherein the key database reads the corresponding encryption key and updates the encryption key periodically, and the decryption key is updated synchronously with the encryption key.
6. The method according to claim 1, wherein the encryption keys in the key database are classified and stored in different storage areas according to key types, and in the process of reading the corresponding encryption keys from the key database according to the variable characteristic values, the key types are determined according to the variable characteristic values, and then the corresponding encryption keys are retrieved in the corresponding storage areas.
7. A wireless data encryption transmission apparatus, the apparatus comprising:
the information acquisition module is used for acquiring environment variables and data to be transmitted, wherein the environment variables at least comprise electric signals in the data transmitting end;
the conversion module is used for converting the environment variable, generating a variable characteristic value and encrypting the variable characteristic value;
the information extraction module is used for reading a corresponding encryption key from the key database according to the variable characteristic value;
the encryption module is used for encrypting the data to be transmitted according to the encryption key to obtain encrypted data;
and the data sending module is used for sending the encrypted data and the variable characteristic value to a data receiving end, and the data receiving end reads a corresponding decryption key according to the decrypted variable characteristic value and decrypts the encrypted data.
8. A computer arrangement, comprising a memory and a processor, the memory having stored therein a computer program that, when executed by the processor, causes the processor to carry out the steps of the wireless data encryption transmission method of any one of claims 1 to 6.
9. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the method for wireless data encrypted transmission according to any one of claims 1 to 6.
CN202110828655.8A 2021-07-22 2021-07-22 Wireless data encryption transmission method and device, computer equipment and storage medium Active CN113286297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110828655.8A CN113286297B (en) 2021-07-22 2021-07-22 Wireless data encryption transmission method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110828655.8A CN113286297B (en) 2021-07-22 2021-07-22 Wireless data encryption transmission method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113286297A CN113286297A (en) 2021-08-20
CN113286297B true CN113286297B (en) 2021-10-12

Family

ID=77287101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110828655.8A Active CN113286297B (en) 2021-07-22 2021-07-22 Wireless data encryption transmission method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113286297B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114884716B (en) * 2022-04-28 2024-02-27 世融能量科技有限公司 Encryption and decryption method, device and medium
CN115987698B (en) * 2023-03-22 2023-05-30 深圳市移联通信技术有限责任公司 GPS positioning information encryption transmission method and system
CN116506201B (en) * 2023-05-12 2024-03-01 天翼安全科技有限公司 Network communication safety protection system based on big data
CN117272356A (en) * 2023-11-22 2023-12-22 江西科技学院 Encryption method, system and storage medium of computer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104662570A (en) * 2012-05-18 2015-05-27 欧姆里斯有限公司 System and method for transmitting data
CN111818078A (en) * 2020-07-21 2020-10-23 成都英孚克斯科技有限公司 Weighing data safe transmission method and system based on environmental factors
WO2021008227A1 (en) * 2019-07-18 2021-01-21 大唐移动通信设备有限公司 Link state monitoring method for sidelink, and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9674162B1 (en) * 2015-03-13 2017-06-06 Amazon Technologies, Inc. Updating encrypted cryptographic key pair
FR3057374B1 (en) * 2016-10-12 2019-10-25 Ingenico Group ENCRYPTION METHOD, DECRYPTION METHOD, DEVICE AND CORRESPONDING COMPUTER PROGRAM.

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104662570A (en) * 2012-05-18 2015-05-27 欧姆里斯有限公司 System and method for transmitting data
WO2021008227A1 (en) * 2019-07-18 2021-01-21 大唐移动通信设备有限公司 Link state monitoring method for sidelink, and terminal
CN111818078A (en) * 2020-07-21 2020-10-23 成都英孚克斯科技有限公司 Weighing data safe transmission method and system based on environmental factors

Also Published As

Publication number Publication date
CN113286297A (en) 2021-08-20

Similar Documents

Publication Publication Date Title
CN113286297B (en) Wireless data encryption transmission method and device, computer equipment and storage medium
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN109889333B (en) Firmware data encryption method and device, computer equipment and storage medium
CN108173885B (en) Data encryption method, data decryption method and related devices
CN110855616B (en) Digital key generation system
CN110505054B (en) Data processing method, device and equipment based on dynamic white box
CN109194701B (en) Data processing method and device
CN114285575A (en) Image encryption and decryption method and device, storage medium and electronic device
KR101413427B1 (en) Apparatas and method for security message transmission and reception of vehicle network
CN110011959B (en) Data storage method, data query method and system
CN104794243B (en) Third party's cipher text retrieval method based on filename
JP5411034B2 (en) Database encryption system and method
CN111277605B (en) Data sharing method and device, computer equipment and storage medium
CN111510282A (en) Information encryption algorithm and device, information decryption algorithm and device and communication method
CN115022346B (en) Online data synchronization method based on block chain
CN113518244B (en) Digital television signal data transmission method and device based on substitute text combination
CN114124469B (en) Data processing method, device and equipment
CN113032802B (en) Data security storage method and system
CN111314270A (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
CN114567878A (en) Internet of things base station, data return processing system and data return processing method
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium
KR101772203B1 (en) Password extension system and method for improving security
JP6493402B2 (en) Addition device, deletion device, addition request device, data search system, data search method, and computer program
TW201929477A (en) Encryption method and decryption method
CN113360859B (en) Python interpreter-based encrypted file security control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant