CN113346999B - Splitting encryption-based brain central system - Google Patents

Splitting encryption-based brain central system Download PDF

Info

Publication number
CN113346999B
CN113346999B CN202110909728.6A CN202110909728A CN113346999B CN 113346999 B CN113346999 B CN 113346999B CN 202110909728 A CN202110909728 A CN 202110909728A CN 113346999 B CN113346999 B CN 113346999B
Authority
CN
China
Prior art keywords
key
data
communication station
split
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110909728.6A
Other languages
Chinese (zh)
Other versions
CN113346999A (en
Inventor
司为国
朱炯
李颖毅
乐全明
樊立波
韩志军
孙智卿
徐巍峰
柳志军
黄建平
罗少杰
余彬
向新宇
陈炜
王剑
张晓波
蒋建
方响
宣羿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Zhejiang Xiaoshan District Power Supply Co ltd
State Grid Zhejiang Electric Power Co Ltd
Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Zhejiang Zhongxin Electric Power Engineering Construction Co Ltd
Original Assignee
State Grid Zhejiang Xiaoshan District Power Supply Co ltd
State Grid Zhejiang Electric Power Co Ltd
Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Zhejiang Zhongxin Electric Power Engineering Construction Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Zhejiang Xiaoshan District Power Supply Co ltd, State Grid Zhejiang Electric Power Co Ltd, Hangzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd, Zhejiang Zhongxin Electric Power Engineering Construction Co Ltd filed Critical State Grid Zhejiang Xiaoshan District Power Supply Co ltd
Priority to CN202110909728.6A priority Critical patent/CN113346999B/en
Publication of CN113346999A publication Critical patent/CN113346999A/en
Application granted granted Critical
Publication of CN113346999B publication Critical patent/CN113346999B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a split encryption-based brain central system, which comprises: the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station; the communication station is used for receiving and sending data, splitting and encrypting the data, attaching decryption information and a key number to the central module and uploading the decryption information and the key number to the central module, wherein a key for encryption is encrypted by a specified public key and then is attached with the key number to be sent to the key temporary storage module; the key temporary storage module stores a key and a key number encrypted by a specified public key; the central control module receives the encrypted data from the communication station, asks for the key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the key, and decrypts by using the key and the decryption information to obtain the original data. The invention realizes that the data can not be completely decrypted when any single split data is taken, and embodies the value of split encryption.

Description

Splitting encryption-based brain central system
Technical Field
The invention relates to the field of data processing, in particular to a split encryption-based brain central system.
Background
The power supply enterprises basically realize the fusion and the communication of main system data in the aspect of information construction, and primarily realize the digitization, the visualization and the online of a service level by relying on the data platform construction result. Meanwhile, companies actively develop operation and application work of the big electric power data, a relatively complete index operation monitoring system is formed, various big electric power data operation analysis achievements such as quality improvement and efficiency improvement and basic level load reduction are formed internally, wide data cooperation with government departments, enterprise users and internet platforms is developed externally, and a data value-added service product system combining various application scenes is formed preliminarily. The brain central system is used as a collection part of various data, plays a role similar to the brain, and plays a vital role in daily operation.
While dense information transmission necessarily needs a safer encryption mode, but the current system usually only adopts one of asymmetric encryption or symmetric encryption in information transmission, and the obvious characteristic exists between national network information and information in other fields or industries, namely, a large amount of repeated instruction information and control information exist, and the information presents the same encryption result after being encrypted by a traditional mode, so that an attacker can accurately deduce the real information of each kind of fixed data through a large amount of data analysis even if decryption cannot be performed. In the prior art, for example, the invention application with publication number CN102055580A discloses a method and a communication device for securely sending and receiving enterprise information in an industrial internet, and for example, the invention application with publication number CN112671809A discloses a data transmission method, a source terminal and a receiving terminal. These prior arts all adopt a data splitting encryption scheme, which can solve the above problems to a certain extent, but essentially only perform separate encryption and decryption on each data after splitting, that is, the only change of the whole scheme is splitting before each data is encrypted and splicing after decryption, and the process of encrypting and decrypting each data in the middle of the process is not changed; therefore, when the technology is adopted, no matter whether the data is split or not, the encryption and decryption process of the data does not actually generate difference and new effect, and therefore the safety is not substantially improved.
Disclosure of Invention
Aiming at the problem that the information transmission security of a brain central system is poor in the prior art, the invention provides a split encryption-based brain central system, which improves the information transmission and encryption modes of the brain central system, splits and encrypts data through a communication station, realizes that any single split data cannot be completely decrypted, embodies the split and encrypted values, enables the encryption processes to form linkage and link with each other, and greatly improves the security of the data transmission process.
The technical scheme of the invention is as follows.
A split encryption based brain hub system comprising:
the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station;
the communication station is divided into a first-level communication station and a second-level communication station according to an executed task, the first-level communication station splits and marks data uploaded by the sensing module, encrypts the data by using a first secret key, splits the first secret key used by the encryption into secret key fragments, splices the secret key fragments as decryption information to one end of the split and encrypted data, and then sends the data to a plurality of different second-level communication stations, the second-level communication station secondarily encrypts the data spliced with the secret key fragments by using a second secret key, attaches secret key numbers to the data and sends the data to the central module, and the second secret key is encrypted by using a designated public key and then attaches the secret key numbers to the data and sends the data to the key temporary storage module;
the key temporary storage module stores a second key and a key number which are encrypted by a specified public key;
the central control module receives the encrypted data from the communication station, asks for a second key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the second key, decrypts by using the second key to obtain the encrypted data with the key fragments, splices the corresponding key fragments to obtain a first key, and decrypts by using the first key to obtain the original data.
The invention encrypts the data after splitting, increases the difficulty of intercepting the complete data, simultaneously eliminates the problem of the same content after the same information is encrypted, then ensures that a key transmission channel and an encrypted data transmission channel are not shared by setting a key temporary storage module, cannot acquire the complete information when eavesdropping any communication link, and helps the central control module to decrypt by taking decryption information and key number as indexes. In addition, each data packet sent by the first-level communication station contains the split and encrypted data and the corresponding key fragment, so that any module except the first-level communication station cannot be decrypted temporarily because of no corresponding key; on the basis, the second communication station encrypts the data packet by using the second key, so that any module cannot decrypt the data completely independently, and in addition, because the specified private key is only stored in the central module, other modules cannot decrypt the content encrypted by the specified public key.
Preferably, the key of each communication station is independently generated, and any key is transferred or marked after being used as the first key or the second key and is not used any more.
Preferably, the process of the hub module decrypting the data comprises: screening all split data of the same source data according to marks in the received data, requesting a second key encrypted by an appointed public key from a key temporary storage module according to a key number, decrypting by using an appointed private key to obtain the second key, decrypting for one time to obtain encrypted data with key fragments, splicing the key fragments, decrypting the encrypted data by using a first key obtained by splicing to obtain decrypted data, and splicing the decrypted data according to the marks to obtain original data. After the central pivot module receives a plurality of encrypted data, the encrypted data of the same source data can be classified according to the marks, and then the original data can be obtained by carrying out the decryption step; because the appointed private key is only stored in the central control module, only the central control module can decrypt the key encrypted by the appointed public key, and simultaneously, the split data is only gathered in the central control module, so that the key segments can be spliced only in the central control module, so that the encryption steps which are seemingly irrelevant among different communication stations are linked when the central control module decrypts, and the safety is greatly improved.
Preferably, the hub module generates a designated public key and a designated private key, and broadcasts the designated public key to all communication stations.
Preferably, each communication station selectively performs a primary communication station or a secondary communication station operating mode for each received data: when the received data is sent by the sensing module, the communication station adopts a processing mode of a first-level communication station when processing the data; when the received data is sent by other communication stations, the communication station adopts the processing mode of the secondary communication station when processing the data. In order to improve the working efficiency and the resource utilization rate, each communication station is provided with a working mode of a first-level communication station and a working mode of a second-level communication station.
Preferably, the key temporary storage module returns confirmation information to the corresponding communication station after receiving the second key encrypted by the specified public key and the key number, and the communication station deletes the corresponding key after receiving the confirmation information; and after receiving the second key encrypted by the appointed public key, the hub module returns confirmation information to the key temporary storage module, and the key temporary storage module deletes the corresponding key after receiving the confirmation information. The deletion process may reduce the possibility of key leakage to improve information security.
In addition, when the sensing module acquires the required power grid information data, verification information is attached, finally, after the central control module decrypts the data to obtain original data, the verification information is sent back to the sensing module through a plaintext, and after the sensing module confirms the verification information, a confirmation result is returned to the central control module through the plaintext. The verification information is generally a hash value corresponding to the original data, and the perception module can confirm whether the hash values are consistent after receiving the verification information. An additional confirmation step may be used to confirm whether the message is sent by the corresponding sensing module to avoid being reconciled.
Preferably, when the communication station splits data, the communication station records the time when the data is received, and obtains the splitting number according to the number of seconds at the time, wherein when the unit digit of the number of seconds is 2 to 9, the numerical value corresponds to the splitting number, when the unit digit is 0 or 1, the splitting number is 2, and the splitting is performed according to the data length in average.
The substantial effects of the invention include: through split encryption and secondary encryption, by means of key fragments, key coding and the like, each single encrypted data cannot be completely decrypted, multi-module and multi-step linkage decryption must be performed by the central control module according to the multiple data, the key information decryption method has the advantages of being capable of enabling key information to be generated, stored dispersedly and used in a gathering mode, not prone to cracking and high in information transmission safety.
Drawings
FIG. 1 is a system block diagram of an embodiment of the invention.
Detailed Description
The technical solution of the present application will be described with reference to the following examples. In addition, numerous specific details are set forth below in order to provide a better understanding of the present invention. It will be understood by those skilled in the art that the present invention may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present invention.
Example (b):
a split encryption based brain hub system, as shown in fig. 1, comprising:
the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station;
the communication station is divided into a first-level communication station and a second-level communication station according to an executed task, the first-level communication station splits and marks data uploaded by the sensing module, encrypts the data by using a first secret key, splits the first secret key used by the encryption into secret key fragments, splices the secret key fragments as decryption information to one end of the split and encrypted data, and then sends the data to a plurality of different second-level communication stations, the second-level communication station secondarily encrypts the data spliced with the secret key fragments by using a second secret key, attaches secret key numbers to the data and sends the data to the central module, and the second secret key is encrypted by using a designated public key and then attaches the secret key numbers to the data and sends the data to the key temporary storage module;
the key temporary storage module stores a second key and a key number which are encrypted by a specified public key;
the central control module receives the encrypted data from the communication station, asks for a second key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the second key, decrypts by using the second key to obtain the encrypted data with the key fragments, splices the corresponding key fragments to obtain a first key, and decrypts by using the first key to obtain the original data. The designated public key and the designated private key are generated by the hub module, and the hub module broadcasts the designated public key to all the communication stations.
The sensing module can be programmable equipment consisting of various sensors, a communication module and a processing module; the communication station, the key temporary storage module and the central control module can be programmable equipment consisting of a communication module and a processing module. The sensing module, the communication station, the key temporary storage module and the central hub module may also be used to perform other tasks besides those mentioned in the present disclosure, but since other tasks or functions do not relate to the improvement of the present disclosure, no additional description is provided. The splitting in this embodiment refers to performing average interception according to the number of results split as needed based on the data length of the split object, for example, if the data of N bytes is split into N parts, each part has a length of N/N.
The embodiment encrypts the data after splitting, increases the difficulty of intercepting complete data, simultaneously eliminates the problem that the content is the same after the same information is encrypted, then makes the key transmission channel and the encrypted data transmission channel not shared by setting the key temporary storage module, cannot acquire complete information when eavesdropping any communication link, and helps the central module to decrypt by using decryption information and key numbers as indexes.
The working process of the present embodiment is explained below.
Firstly, the sensing module collects the required power grid information data and uploads the data to the communication station, wherein the communication station can be selected in advance or randomly.
Secondly, each communication station selectively executes the working mode of a first-level communication station or a second-level communication station according to each piece of received data: when the received data is sent by the sensing module, the communication station adopts a processing mode of a first-level communication station when processing the data; when the received data is sent by other communication stations, the communication station adopts the processing mode of the secondary communication station when processing the data. The key of each communication station is independently generated, and any key is transferred or marked after being used as the first key or the second key and is not used any more. When the communication station splits the data, the time of receiving the data is recorded, the splitting number is obtained according to the number of seconds at the time, when the unit digit of the number of seconds is 2 to 9, the numerical value corresponds to the splitting number, when the unit digit is 0 or 1, the splitting number is 2, and the splitting is carried out according to the data length in average. The splitting mode is various and does not have substantial influence on the splitting effect, and a non-fixed splitting mode is selected to improve the safety.
Subsequently, decrypting the data by the hub module, the process comprising: screening all split data of the same source data according to marks in the received data, requesting a second key encrypted by an appointed public key from a key temporary storage module according to a key number, decrypting by using an appointed private key to obtain the second key, decrypting for one time to obtain encrypted data with key fragments, splicing the key fragments, decrypting the encrypted data by using a first key obtained by splicing to obtain decrypted data, and splicing the decrypted data according to the marks to obtain original data.
In addition, the method also comprises a partial confirmation step, the sensing module attaches verification information when acquiring required power grid information data, the central control module finally sends the verification information back to the sensing module through a plaintext after decrypting to obtain original data, and the sensing module returns a confirmation result to the central control module through the plaintext after confirming. The verification information is generally a hash value corresponding to the original data, and the perception module can confirm whether the hash values are consistent after receiving the verification information. An additional confirmation step may be used to confirm whether the message is sent by the corresponding sensing module to avoid being reconciled. After receiving the key encrypted by the appointed public key and the key number, the key temporary storage module returns confirmation information to the corresponding communication station, and the communication station deletes the corresponding key after receiving the confirmation information; and after receiving the key encrypted by the appointed public key, the central hub module returns confirmation information to the key temporary storage module, and the key temporary storage module deletes the corresponding key after receiving the confirmation information. The deletion process may reduce the possibility of key leakage to improve information security.
In this embodiment, in order to improve the work efficiency and the resource utilization rate, each communication station has a primary communication station mode and a secondary communication station mode. Each data packet sent by the first-level communication station contains the split and encrypted data and a corresponding key fragment, so that any module except the first-level communication station cannot be decrypted temporarily because of no corresponding key; on the basis, the secondary communication station encrypts the data packet by using another secret key, so that any module cannot decrypt the data completely, and in addition, because the specified private key is only stored in the central module, other modules cannot decrypt the content encrypted by the specified public key.
In this embodiment, after the central module receives a plurality of encrypted data, the encrypted data of the same source data can be classified according to the marks, and then the original data can be obtained by performing the decryption step; because the appointed private key is only stored in the central control module, only the central control module can decrypt the key encrypted by the appointed public key, and simultaneously, the split data is only gathered in the central control module, so that the key segments can be spliced only in the central control module, so that the encryption steps which are seemingly irrelevant among different communication stations are linked when the central control module decrypts, and the safety is greatly improved.
Therefore, the substantial effects of the present embodiment include: by splitting encryption and secondary encryption, encryption at each time is differentiated by means of key fragments, key codes and the like, and finally multi-module and multi-step linkage decryption is performed by the central module.
Through the description of the above embodiments, those skilled in the art will understand that, for convenience and simplicity of description, only the division of the above functional modules is used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of a specific device is divided into different functional modules to complete all or part of the above described functions.
In the embodiments provided in this application, it should be understood that the disclosed structures and methods may be implemented in other ways. For example, a module or element may be partitioned into only one logical function, and may be physically implemented in another way, such as by combining multiple elements or components, or by integrating multiple elements or components into another structure, or by omitting some features or by performing none of the features. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, structures or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. A split-encryption based brain hub system, comprising:
the sensing module is used for acquiring required power grid information data and uploading the required power grid information data to a specified communication station;
the communication station is divided into a first-level communication station and a second-level communication station according to an executed task, the first-level communication station splits and marks data uploaded by the sensing module, encrypts the data by using a first key, splits the first key used for encryption into key fragments, splices the key fragments as decryption information to one end of the split and encrypted data, and then sends the key fragments to a plurality of different second-level communication stations, wherein each data packet sent by the first-level communication station comprises the split and encrypted data and the corresponding key fragments, the second-level communication station secondarily encrypts the data spliced with the key fragments by using a second key, attaches key numbers and sends the key numbers to the hub module, and the second key is encrypted by using a designated public key and then attaches the key numbers to the key temporary storage module;
the key temporary storage module stores a second key and a key number which are encrypted by a specified public key;
the central control module receives the encrypted data from the communication station, asks for a second key encrypted by the appointed public key from the key temporary storage module according to the key number attached to each piece of data, decrypts by using the appointed private key to obtain the second key, decrypts by using the second key to obtain the encrypted data with the key fragments, splices the corresponding key fragments to obtain a first key, and decrypts by using the first key to obtain the original data.
2. The split encryption based brain hub system of claim 1, wherein the key of each communication station is generated independently, and any key is transferred or marked after being used as the first key or the second key and is not used any more.
3. The split encryption based brain hub system according to claim 2, wherein the hub module decrypts data comprising: screening all split data of the same source data according to marks in the received data, requesting a second key encrypted by an appointed public key from a key temporary storage module according to a key number, decrypting by using an appointed private key to obtain the second key, decrypting for one time to obtain encrypted data with key fragments, splicing the key fragments, decrypting the encrypted data by using a first key obtained by splicing to obtain decrypted data, and splicing the decrypted data according to the marks to obtain original data.
4. The split encryption-based brain hub system according to claim 2 or 3, wherein the hub module generates a designated public key and a designated private key, and the hub module broadcasts the designated public key to all communication stations.
5. The split encryption based brain hub system according to claim 2, wherein each communication station selectively performs the primary communication station or the secondary communication station for each received data: when the received data is sent out by the sensing module, the communication station adopts a processing mode of a first-level communication station when processing the data; when the received data is sent by other communication stations, the communication station adopts the processing mode of the secondary communication station when processing the data.
6. The split encryption-based brain hub system according to claim 2, wherein the key temporary storage module returns confirmation information to the corresponding communication station after receiving the second key encrypted by the designated public key and the key number, and the communication station deletes the corresponding key after receiving the confirmation information; and after receiving the second key encrypted by the appointed public key, the hub module returns confirmation information to the key temporary storage module, and the key temporary storage module deletes the corresponding key after receiving the confirmation information.
7. The split encryption-based brain hub system according to claim 1 or 2, wherein when the communication station splits data, the time when the data is received is recorded, and the split number is obtained according to the number of seconds at the time, wherein when the number of seconds is 2 to 9, the numerical value corresponds to the split number, when the number of seconds is 0 or 1, the split number is 2, and when the split number is split, the split number is split averagely according to the data length.
CN202110909728.6A 2021-08-09 2021-08-09 Splitting encryption-based brain central system Active CN113346999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110909728.6A CN113346999B (en) 2021-08-09 2021-08-09 Splitting encryption-based brain central system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110909728.6A CN113346999B (en) 2021-08-09 2021-08-09 Splitting encryption-based brain central system

Publications (2)

Publication Number Publication Date
CN113346999A CN113346999A (en) 2021-09-03
CN113346999B true CN113346999B (en) 2021-10-26

Family

ID=77481055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110909728.6A Active CN113346999B (en) 2021-08-09 2021-08-09 Splitting encryption-based brain central system

Country Status (1)

Country Link
CN (1) CN113346999B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114221783B (en) * 2021-11-11 2023-06-02 杭州天宽科技有限公司 Data selective encryption and decryption system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012106167A1 (en) * 2011-02-04 2012-08-09 Motorola Solutions, Inc. Method and apparatus for protecting security parameters used by a security module
CN111586445A (en) * 2020-05-14 2020-08-25 中国人民公安大学 Video data transmission method and device
CN112115491A (en) * 2020-08-20 2020-12-22 恒安嘉新(北京)科技股份公司 Symmetric encryption key protection method, device, equipment and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013041394A1 (en) * 2011-09-23 2013-03-28 Koninklijke Kpn N.V. Secure distribution of content
CN105450387A (en) * 2014-08-20 2016-03-30 江苏威盾网络科技有限公司 Network distributed storage method based on hybrid encryption
CN109428710A (en) * 2017-08-22 2019-03-05 深圳光启智能光子技术有限公司 Data transmission method, device, storage medium and processor
CN108595973B (en) * 2018-04-27 2021-03-23 广州视源电子科技股份有限公司 Instruction determination method, equipment control method, device and system
CN109474423B (en) * 2018-12-10 2022-10-21 平安科技(深圳)有限公司 Data encryption and decryption method, server and storage medium
CN109902494A (en) * 2019-01-24 2019-06-18 北京融链科技有限公司 Data encryption storage method, device and document storage system
JP2022536645A (en) * 2019-06-10 2022-08-18 ティーゼロ・アイピー,エルエルシー Key Recovery Using Encrypted Secret Share
CN112307454A (en) * 2020-11-09 2021-02-02 深圳市欢太科技有限公司 Data encryption method and device, storage medium and electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012106167A1 (en) * 2011-02-04 2012-08-09 Motorola Solutions, Inc. Method and apparatus for protecting security parameters used by a security module
CN111586445A (en) * 2020-05-14 2020-08-25 中国人民公安大学 Video data transmission method and device
CN112115491A (en) * 2020-08-20 2020-12-22 恒安嘉新(北京)科技股份公司 Symmetric encryption key protection method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113346999A (en) 2021-09-03

Similar Documents

Publication Publication Date Title
CN109033855B (en) Data transmission method and device based on block chain and storage medium
EP3453135B1 (en) System and method for encryption and decryption based on quantum key distribution
CN109040090B (en) A kind of data ciphering method and device
CN104995632B (en) Secret protection Database Systems
CN106209739A (en) Cloud storage method and system
CN111917555B (en) Data processing method and device
CN104809407A (en) Method and system for encrypting, decrypting and verifying cloud storage front end data
CN113536362B (en) Quantum key management method and system based on security chip carrier
CN111274599A (en) Data sharing method based on block chain and related device
CN111837372A (en) System and method for privacy preserving data retrieval for connected power tools
US20120051542A1 (en) Remote communication apparatus including security function and remote electric power metering system using the same
CN102724205B (en) A kind of method to the encryption of industrial circle communication process and data acquisition equipment
CN113346999B (en) Splitting encryption-based brain central system
CN112133386A (en) Block chain-based information processing method, device, equipment and medium
CN103354637B (en) A kind of internet-of-things terminal M2M communication encrypting method
CN104284237A (en) Video transmission method and system
CN104994107A (en) MMS message off-line analysis method based on IEC62351
CN112202808A (en) Data security management system based on cloud computing
CN114244635B (en) Encryption type data coding method of communication equipment
CN105681027A (en) HSM encrypted information synchronization method, device and system
CN111490880B (en) File receiving method and device
CN106972928B (en) Bastion machine private key management method, device and system
CN111506913B (en) Audio encryption method and device, storage medium and electronic device
CN111464496B (en) Data transmission method, device, system, storage medium and electronic device
CN111865891B (en) Data transmission method, user terminal, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant