CN114422124A - Data transmission method and device - Google Patents

Data transmission method and device Download PDF

Info

Publication number
CN114422124A
CN114422124A CN202111631073.7A CN202111631073A CN114422124A CN 114422124 A CN114422124 A CN 114422124A CN 202111631073 A CN202111631073 A CN 202111631073A CN 114422124 A CN114422124 A CN 114422124A
Authority
CN
China
Prior art keywords
target
determining
information
revolution
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111631073.7A
Other languages
Chinese (zh)
Inventor
赵轶新
孙科
蒋艳军
王乾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111631073.7A priority Critical patent/CN114422124A/en
Publication of CN114422124A publication Critical patent/CN114422124A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Abstract

The invention discloses a data transmission method and a data transmission device. Wherein, the method comprises the following steps: acquiring data to be transmitted; selecting a target star from a celestial body information set corresponding to a target galaxy; determining revolution information corresponding to the target star, and determining a public key according to the revolution information; encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and sending the encrypted data to a receiving device. The invention solves the technical problem of low data transmission safety caused by public and private keys.

Description

Data transmission method and device
Technical Field
The invention relates to the field of network security, in particular to a data transmission method and device.
Background
The traditional asymmetric encryption algorithm adopts a public key and a private key for encryption, but a public and private key pair is generally fixed or replaced regularly, and by comparing the rule of encrypted data, the risk of cracking exists, so that the safety of data transmission is low.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a data transmission method and a data transmission device, which at least solve the technical problem of low data transmission safety caused by public and private keys.
According to an aspect of an embodiment of the present invention, there is provided a data transmission method, including: acquiring data to be transmitted; selecting a target star from a celestial body information set corresponding to a target galaxy; determining revolution information corresponding to the target star, and determining a public key according to the revolution information; encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and sending the encrypted data to a receiving device.
Optionally, determining revolution information corresponding to the target star includes: acquiring motion state information of the target star revolving for one circle, wherein the motion state information comprises at least one of the following: the revolution time, the average angular velocity, the average linear velocity and the revolution direction of the target star are determined; determining a public key according to the revolution information, comprising: acquiring a random number; and generating the public key at least according to the motion state information and the random number.
Optionally, generating the public key according to at least the motion state information and the random number includes: performing mixed editing processing on a plurality of pieces of information in the motion state information to obtain a key prefix; and generating a key suffix according to the random number and the current timestamp, and combining the key prefix and the key suffix to obtain the public key.
Optionally, selecting a target star from a set of celestial information corresponding to a target galaxy includes: determining the security level of the data to be transmitted; determining a candidate celestial body set corresponding to the security level from the celestial body information set; sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is; and selecting the target celestial body from the candidate celestial body set according to the sorting result.
Optionally, selecting the target celestial body from the candidate celestial body set according to a sorting result, wherein the selecting includes one of: randomly selecting the target star from the top preset number of celestial bodies in the sequencing result; and determining the celestial body at the head position in the sequencing result as the target celestial body.
Optionally, selecting a target star from a set of celestial information corresponding to a target galaxy includes: and randomly selecting the target star from the celestial body information set corresponding to the target galaxy.
Optionally, the method further comprises: determining autobiography information corresponding to the target star, and determining a private key according to the autobiography information; distributing the private key to the recipient device.
Optionally, the method further comprises: and acquiring the distance information between the target star and the revolution center, and establishing the association between the public key and the private key according to the difference between the revolution period and the self-transmission period of the target star.
According to another aspect of the embodiments of the present invention, there is provided another data transmission method, including: receiving encrypted data, wherein the encrypted data is obtained by encrypting data to be transmitted according to a key determined by revolution information of a target star; acquiring self-transmission information corresponding to the target star, and determining a private key according to the self-transmission information; and decrypting the encrypted data by adopting the private key to obtain the data to be transmitted.
Optionally, the determining of the target star comprises: determining the security level of the data to be transmitted; determining a candidate celestial body set corresponding to the security level from a celestial body information set; sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is; and selecting the target celestial body from the candidate celestial body set according to the sorting result.
According to another aspect of the embodiments of the present invention, there is also provided a data transmission apparatus, including: the acquisition module is used for acquiring data to be transmitted; the selection module is used for selecting a target star from the celestial body information set corresponding to the target galaxy; the determining module is used for determining revolution information corresponding to the target star and determining a public key according to the revolution information; the encryption module is used for encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and the sending module is used for sending the encrypted data to the receiving party equipment.
According to another aspect of the embodiments of the present invention, a nonvolatile storage medium is further provided, where the nonvolatile storage medium includes a stored program, and when the program runs, a device in which the nonvolatile storage medium is located is controlled to execute the above data transmission method.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including a memory and a processor; the processor is used for running a program, wherein the program executes the data transmission method when running.
In the embodiment of the invention, the data to be transmitted is acquired; selecting a target star from a celestial body information set corresponding to a target galaxy; determining revolution information corresponding to the target star, and determining a public key according to the revolution information; encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and a public key and a private key are respectively generated by determining the difference between the revolution and the autobiography of the star of the target galaxy and are established through the relation, so that the aim of dynamically obtaining the secret key is fulfilled, the technical effect of improving the difficulty of cracking the secret key is realized, and the technical problem of low data transmission safety caused by the public and private keys is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware structure of a computer terminal (or mobile device) for a determination method of a target emotion classification model according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative data transmission method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an alternative data transmission method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of yet another alternative data transmission method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an alternative data transmission arrangement according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal or a similar operation device. Fig. 1 shows a hardware configuration block diagram of a computer terminal (or mobile device) for implementing a data transmission method. As shown in fig. 1, the computer terminal 10 (or mobile device 10) may include one or more (shown as 102a, 102b, … …, 102 n) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module 106 for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computer terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuit may be a single stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computer terminal 10 (or mobile device). As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the data transmission method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, that is, implementing the vulnerability detection method of the application program. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission module 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission module 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In accordance with an embodiment of the present invention, there is provided a data transmission method embodiment, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
Fig. 2 is a data transmission method according to an embodiment of the present invention, as shown in fig. 2, the method includes the following steps:
step S202, acquiring data to be transmitted;
step S204, selecting a target star from the celestial body information set corresponding to the target star system;
step S206, determining revolution information corresponding to the target star, and determining a public key according to the revolution information;
step S208, encrypting the data to be transmitted by adopting the public key to obtain encrypted data;
step S210, sending the encrypted data to the receiving device.
Through the steps, the purpose of dynamically obtaining the secret key can be achieved by determining the difference between the satellite revolution and the satellite autonomy of the target galaxy, respectively generating the public key and the private key and establishing a public-private key pair through the relation, so that the technical effect of improving the difficulty in cracking the secret key is achieved, and the technical problem of low data transmission safety caused by the public-private key is solved.
It should be noted that the target galaxy is randomly acquired to improve the security of the generated secret key. Revolution is the circular motion of an object along a certain orbit around another object. Autobiography refers to the motion of the object rotating by itself, and the object rotates along an axis passing through the object.
In some embodiments of the present application, determining revolution information corresponding to the target star comprises: acquiring motion state information of the target star revolving for one circle, wherein the motion state information comprises at least one of the following: the revolution time, the average angular velocity, the average linear velocity and the revolution direction of the target star are determined; determining a public key according to the revolution information, comprising: acquiring a random number; and generating the public key at least according to the motion state information and the random number.
The relationship between the angular velocity v, the linear velocity w, the revolution/rotation one-turn time period t, and the revolution radius/rotation radius r is 2 tr/t.
In some embodiments of the present application, generating the public key at least in dependence on the motion state information and the random number comprises: performing mixed editing processing on a plurality of pieces of information in the motion state information to obtain a key prefix; and generating a key suffix according to the random number and the current timestamp, and combining the key prefix and the key suffix to obtain the public key.
It should be noted that the current timestamp may be the time of generating the key or the set time. The number of bits of the random number may be arbitrarily set, for example, 32 bits. In some optional modes, the key prefix generation can prefix the key by respectively carrying out modular operation on the revolution/rotation linear velocity and 16-bit prefix data generation sequences.
The multiple information in the star motion state information is utilized to carry out mixed coding processing and random numbers are added, so that the cracking difficulty of the secret key is improved, and the safety of data transmission is further improved.
In some embodiments of the present application, selecting a target star from a set of celestial information corresponding to a target galaxy comprises: determining the security level of the data to be transmitted; determining a candidate celestial body set corresponding to the security level from the celestial body information set; sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is; and selecting the target celestial body from the candidate celestial body set according to the sorting result.
In some embodiments of the present application, the specific step of selecting the target star from the set of candidate celestial bodies includes: randomly selecting the target star from the top preset number of celestial bodies in the sequencing result; and determining the celestial body at the head position in the sequencing result as the target celestial body.
In some embodiments of the present application, selecting a target star from a set of celestial information corresponding to a target constellation comprises: and randomly selecting the target star from the celestial body information set corresponding to the target galaxy.
In some embodiments of the present application, the private key may also be determined by determining the autobiographical information corresponding to the target star and determining the private key according to the autobiographical information; distributing the private key to the recipient device.
In some embodiments of the present application, the association between the public key and the private key may also be established by obtaining distance information of the target star from a revolution center, and a difference between a revolution period and a self-transmission period of the target star.
The distance information may be an actual distance between stars or a distance reduced by a certain ratio.
Before encryption or decryption, a period difference value T of revolution and rotation is calculated, a public number T R is calculated by combining the radius R of revolution, the public number T R and the prefix data 16 are subjected to one-to-one modular operation respectively, the corresponding relation of the prefixes of the public and private keys is met through inverse operation, and encryption or decryption is performed through a non-stacking encryption algorithm.
Specifically, taking solar system as an example, the data transmission method proposed in the present application is as shown in fig. 3, simulating solar system planet revolution and self-transmission, performing hybrid calculation processing on the revolution and self-transmission cycle, average angular velocity and average linear velocity directions respectively, and then using the processed result as a prefix, and randomly generating a 32-bit random number as a suffix; using the result of revolution calculation as a public key and the result of autorotation calculation as a private key, and associating the public key and the private key to form a key pair through the distance between two celestial bodies and the revolution and autorotation period difference; if the public key generated by the earth revolution is used for encryption, the private key generated by the earth revolution is used for decryption. The data to be encrypted is serialized into binary and the first 16 positions are intercepted from the array.
The method comprises the steps of configuring relevant parameters of revolution and autonomy of the celestial body in advance, obtaining information of revolution and autonomy of the planet at random before data transmission, calculating a public key and a private key, issuing the public key to a client, and encrypting data by using the private key. The solar system has the advantages that the number of big and small planets is not enough, revolution and autobiography of celestial bodies are simulated, so that the randomness of generation of public and private keys is stronger, the data transmission is safer, the randomness of generation of keys is greatly improved, encrypted data is irregular and can be circulated, and the maintenance work of the keys is reduced. The method can also dynamically control the complexity of key generation, execute an encryption mechanism of a synchronous level, control the complexity of key generation and dynamically execute security strategies of different levels by utilizing the characteristic that the revolution and the autonomy are different due to different planets.
S301, randomly acquiring sun system planet revolution and self-transmission related configuration pre-configured in a background through a random function;
step S302, generating a public key and a private key;
respectively carrying out mixed-encoding calculation processing on the revolution and self-transmission periods, the average angular velocity and the average linear velocity to be used as prefixes, and generating 32-bit random numbers and adding the current time stamp to be used as suffixes for splicing; and taking the result of revolution calculation as a public key and the result of autobiography calculation as a private key.
Step S303, associating public and private key pairs;
and associating the public key and the private key to form a key pair through the distance between the celestial body and the sun in revolution, the revolution and rotation period difference value and the calculated prefix.
Step S304, the public key is issued to the client side to encrypt data through the public key;
the public key is issued to the client, the client encrypts data through the public key, and the server decrypts the data through the private key; otherwise, the server side encrypts the data through the private key, and the client side decrypts the data through the public key.
In step S305, the server decrypts the data through the private key.
According to the revolution and rotation calculation result, the complexity of key generation is influenced, and further the encryption efficiency is influenced, and enterprises can utilize the characteristic that the closer the celestial body revolution and rotation is to the sun, the larger the instant linear velocity and the instant angular velocity are, according to the requirement of security level. The weight can be given to the acquisition of the celestial body configuration, so that the probability of acquiring the celestial body with higher/lower key complexity is higher.
It should be noted that the data transmission method provided by the present application can be used for encrypting data with higher security requirement by enterprise or organization software; encrypting the file by enterprise or organization software; the method is used for encrypting data under the scene of multiple security levels by enterprise or organization software.
The embodiment of the present application further provides another data transmission method, as shown in fig. 4, including:
step S401, receiving encrypted data, wherein the encrypted data is obtained by encrypting data to be transmitted according to a key determined by revolution information of a target star;
step S402, obtaining self-transmission information corresponding to the target star, and determining a private key according to the self-transmission information;
step S403, decrypting the encrypted data by using the private key to obtain the data to be transmitted.
In some embodiments of the present application, the determining of the target star comprises: determining the security level of the data to be transmitted; determining a candidate celestial body set corresponding to the security level from the celestial body information set; sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is; and selecting the target celestial body from the candidate celestial body set according to the sorting result.
An embodiment of the present application further provides a data transmission apparatus, as shown in fig. 5, including: an obtaining module 50, configured to obtain data to be transmitted; a selection module 52, configured to select a target star from the celestial information set corresponding to the target galaxy; a determining module 54, configured to determine revolution information corresponding to the target star, and determine a public key according to the revolution information; the encryption module 56 is configured to encrypt the data to be transmitted by using the public key to obtain encrypted data; a sending module 58, configured to send the encrypted data to a receiving device.
The obtaining module 50 includes an association sub-module, where the association sub-module is configured to obtain distance information between the target star and the revolution center, and a difference between the revolution period and the autobiography period of the target star to establish an association between the public key and the private key.
The selection module 52 includes a target sub-module; the target sub-module is used for determining the security level of the data to be transmitted; determining a candidate celestial body set corresponding to the security level from the celestial body information set; sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is; and selecting the target celestial body from the candidate celestial body set according to the sorting result.
The target sub-module includes: the target unit is used for randomly selecting the target star from the top preset number of celestial bodies in the sequencing result; and determining the celestial body at the head position in the sequencing result as the target celestial body.
The determination module 54 includes a public key sub-module and a private key sub-module; the public key submodule is used for determining revolution information corresponding to the target star, and comprises: acquiring motion state information of the target star revolving for one circle, wherein the motion state information comprises at least one of the following: the revolution time, the average angular velocity, the average linear velocity and the revolution direction of the target star are determined; determining a public key according to the revolution information, comprising: acquiring a random number; generating the public key at least according to the motion state information and the random number; the private key submodule is used for determining self-transmission information corresponding to the target star and determining a private key according to the self-transmission information; distributing the private key to the recipient device.
The public key submodule comprises a composition unit, and the composition unit is used for performing mixed editing processing on a plurality of pieces of information in the motion state information to obtain a key prefix; and generating a key suffix according to the random number and the current timestamp, and combining the key prefix and the key suffix to obtain the public key.
According to another aspect of the embodiments of the present invention, a nonvolatile storage medium is further provided, where the nonvolatile storage medium includes a stored program, and when the program runs, a device in which the nonvolatile storage medium is located is controlled to execute the above data transmission method.
The nonvolatile storage medium stores a program for executing the following functions: acquiring data to be transmitted; selecting a target star from a celestial body information set corresponding to a target galaxy; determining revolution information corresponding to the target star, and determining a public key according to the revolution information; encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and sending the encrypted data to a receiving device.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including a memory and a processor; the processor is used for running a program, wherein the program executes the data transmission method when running.
The electronic device is used for storing a program for executing the following functions: acquiring data to be transmitted; selecting a target star from a celestial body information set corresponding to a target galaxy; determining revolution information corresponding to the target star, and determining a public key according to the revolution information; encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and sending the encrypted data to a receiving device.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (13)

1. A method of data transmission, comprising:
acquiring data to be transmitted;
selecting a target star from a celestial body information set corresponding to a target galaxy;
determining revolution information corresponding to the target star, and determining a public key according to the revolution information;
encrypting the data to be transmitted by adopting the public key to obtain encrypted data;
and sending the encrypted data to a receiving device.
2. The method of claim 1, wherein determining revolution information corresponding to the target star and determining a public key according to the revolution information comprises:
determining revolution information corresponding to the target star, including: acquiring motion state information of the target star revolving for one circle, wherein the motion state information comprises at least one of the following: the revolution time, the average angular velocity, the average linear velocity and the revolution direction of the target star are determined;
determining a public key according to the revolution information, comprising: acquiring a random number; and generating the public key at least according to the motion state information and the random number.
3. The method of claim 2, wherein generating the public key based at least on the motion state information and the random number comprises:
performing mixed editing processing on a plurality of pieces of information in the motion state information to obtain a key prefix;
and generating a key suffix according to the random number and the current timestamp, and combining the key prefix and the key suffix to obtain the public key.
4. The method of claim 1, wherein selecting a target constellation from the set of celestial information corresponding to a target constellation comprises:
determining the security level of the data to be transmitted;
determining a candidate celestial body set corresponding to the security level from the celestial body information set;
sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is;
and selecting the target celestial body from the candidate celestial body set according to the sorting result.
5. The method of claim 4, wherein selecting the target celestial object from the set of candidate celestial objects according to a ranking comprises one of:
randomly selecting the target star from the top preset number of celestial bodies in the sequencing result;
and determining the celestial body at the head position in the sequencing result as the target celestial body.
6. The method of claim 1, wherein selecting a target constellation from the set of celestial information corresponding to a target constellation comprises:
and randomly selecting the target star from the celestial body information set corresponding to the target galaxy.
7. The method of claim 1, further comprising:
determining autobiography information corresponding to the target star, and determining a private key according to the autobiography information; distributing the private key to the recipient device.
8. The method of claim 7, further comprising: and acquiring the distance information between the target star and the revolution center, and establishing the association between the public key and the private key according to the difference between the revolution period and the self-transmission period of the target star.
9. A method of data transmission, comprising:
receiving encrypted data, wherein the encrypted data is obtained by encrypting data to be transmitted according to a key determined by revolution information of a target star;
acquiring self-transmission information corresponding to the target star, and determining a private key according to the self-transmission information;
and decrypting the encrypted data by adopting the private key to obtain the data to be transmitted.
10. The method of claim 9, wherein the determination of the target star comprises:
determining the security level of the data to be transmitted;
determining a candidate celestial body set corresponding to the security level from a celestial body information set;
sorting celestial bodies in the candidate celestial body set from high to low in priority, wherein the closer the celestial bodies in the celestial body information set are to the revolution center, the higher the priority of the celestial bodies is;
and selecting the target celestial body from the candidate celestial body set according to the sorting result.
11. A data transmission apparatus, comprising:
the acquisition module is used for acquiring data to be transmitted;
the selection module is used for selecting a target star from the celestial body information set corresponding to the target galaxy;
the determining module is used for determining revolution information corresponding to the target star and determining a public key according to the revolution information;
the encryption module is used for encrypting the data to be transmitted by adopting the public key to obtain encrypted data; and the sending module is used for sending the encrypted data to the receiving party equipment.
12. A non-volatile storage medium, comprising a stored program, wherein when the program runs, a device in which the non-volatile storage medium is located is controlled to execute the data transmission method according to any one of claims 1 to 8.
13. An electronic device comprising a memory and a processor; the processor is configured to execute a program, wherein the program executes the data transmission method according to any one of claims 1 to 8.
CN202111631073.7A 2021-12-28 2021-12-28 Data transmission method and device Pending CN114422124A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111631073.7A CN114422124A (en) 2021-12-28 2021-12-28 Data transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111631073.7A CN114422124A (en) 2021-12-28 2021-12-28 Data transmission method and device

Publications (1)

Publication Number Publication Date
CN114422124A true CN114422124A (en) 2022-04-29

Family

ID=81269932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111631073.7A Pending CN114422124A (en) 2021-12-28 2021-12-28 Data transmission method and device

Country Status (1)

Country Link
CN (1) CN114422124A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826763A (en) * 2022-05-16 2022-07-29 中国电信股份有限公司 Data encryption method and device, electronic equipment and readable storage medium
CN117278108A (en) * 2023-11-16 2023-12-22 上海卫星互联网研究院有限公司 Data transmission method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846296A (en) * 2018-07-12 2018-11-20 深圳市雷赛信息科技有限公司 Data encryption method and device, computer equipment and readable storage medium
CN113254940A (en) * 2021-05-20 2021-08-13 浙江网商银行股份有限公司 Data processing method and device based on remote sensing data
WO2021168614A1 (en) * 2020-02-24 2021-09-02 华为技术有限公司 Data encryption processing method, data decryption processing method, apparatus, and electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846296A (en) * 2018-07-12 2018-11-20 深圳市雷赛信息科技有限公司 Data encryption method and device, computer equipment and readable storage medium
WO2021168614A1 (en) * 2020-02-24 2021-09-02 华为技术有限公司 Data encryption processing method, data decryption processing method, apparatus, and electronic device
CN113254940A (en) * 2021-05-20 2021-08-13 浙江网商银行股份有限公司 Data processing method and device based on remote sensing data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826763A (en) * 2022-05-16 2022-07-29 中国电信股份有限公司 Data encryption method and device, electronic equipment and readable storage medium
CN117278108A (en) * 2023-11-16 2023-12-22 上海卫星互联网研究院有限公司 Data transmission method and device
CN117278108B (en) * 2023-11-16 2024-02-02 上海卫星互联网研究院有限公司 Data transmission method and device

Similar Documents

Publication Publication Date Title
Suárez-Albela et al. A practical performance comparison of ECC and RSA for resource-constrained IoT devices
CN102546600B (en) Deputy-based encryption, decryption method, network equipment, network device and system
CN105162772B (en) A kind of internet of things equipment certifiede-mail protocol method and apparatus
CN114422124A (en) Data transmission method and device
CN111431897B (en) Multi-attribute mechanism attribute-based encryption method with tracking function for cloud-assisted Internet of things
CN108183791B (en) Intelligent terminal data security processing method and system applied to cloud environment
WO2018091084A1 (en) Homomorphic based method and system for securely aggregating data
US20160156470A1 (en) System for sharing a cryptographic key
CN110912682B (en) Data processing method, device and system
US10367640B2 (en) Shared secret data production system
CN103248476B (en) The management method of data encryption key, system and terminal
CN112906030A (en) Data sharing method and system based on multi-party fully homomorphic encryption
CN110519038B (en) Homomorphic processing device and system for data
CN105208028A (en) Data transmission method and related device and equipment
CN113239403A (en) Data sharing method and device
CN105262773A (en) A verification method and apparatus for an IOT system
US9660813B1 (en) Dynamic privacy management for communications of clients in privacy-preserving groups
CN103650457A (en) Detection method, device and terminal device of share access
CN110572261A (en) data encryption transmission method
WO2022239129A1 (en) Key exchange system, device, key exchange method, and program
CN114338009A (en) Data encryption method and device and nonvolatile storage medium
CN114465708A (en) Private data processing method, device, system, electronic equipment and storage medium
CN114285564A (en) Key determination method and device
WO2018011825A1 (en) Encryption and decryption of messages
CN112688909B (en) Data transmission system, method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination