CN114584320A - Encryption transmission method, device, equipment and storage medium - Google Patents

Encryption transmission method, device, equipment and storage medium Download PDF

Info

Publication number
CN114584320A
CN114584320A CN202210267515.2A CN202210267515A CN114584320A CN 114584320 A CN114584320 A CN 114584320A CN 202210267515 A CN202210267515 A CN 202210267515A CN 114584320 A CN114584320 A CN 114584320A
Authority
CN
China
Prior art keywords
data
transmitted
command
verification
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210267515.2A
Other languages
Chinese (zh)
Inventor
宋昆鸿
李能
唐盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Livefan Information Technology Co ltd
Original Assignee
Livefan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Livefan Information Technology Co ltd filed Critical Livefan Information Technology Co ltd
Priority to CN202210267515.2A priority Critical patent/CN114584320A/en
Publication of CN114584320A publication Critical patent/CN114584320A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention relates to the field of data transmission, and discloses an encryption transmission method, an encryption transmission device, encryption transmission equipment and a storage medium. The method comprises the following steps: receiving an adb command verification request of equipment to be transmitted, and reading callback A _ OPEN type data in the adb command verification request; judging whether callback A _ OPEN type data is input instruction data or not; if the command data is input command data, reading key verification data in the adb command verification request; decrypting the key verification data according to a preset decryption algorithm to obtain a serial number of the equipment to be transmitted; judging whether the serial number of the equipment to be transmitted is consistent with a preset authentication serial number or not; if the authentication serial number is consistent with the authentication serial number, monitoring a data reading instruction of the equipment to be transmitted so as to execute the data reading instruction; if the verification sequence number is not consistent with the authentication sequence number, sending verification failure information to the equipment to be transmitted, and modifying a temporary value for transmission verification.

Description

Encryption transmission method, device, equipment and storage medium
Technical Field
The present invention relates to the field of data transmission, and in particular, to an encryption transmission method, apparatus, device, and storage medium.
Background
Data security has always been an important aspect of the computer transmission field. Many enterprises are lost due to the similar problems that own data is illegally stolen by people, virus files are illegally implanted into own machines or systems, and the like, and many enterprises also think of methods for avoiding the problems, for example, a specific file is written into a machine through a script when the machine is connected, and whether the file exists in the machine is judged after several seconds, so that whether illegal connection exists can be judged, but an invader can complete damage within several seconds, and the safety of the method is not strict enough.
Still other companies can compress and encrypt files, and if decompression is needed, passwords are needed, so that the files can be effectively protected, but due to the fact that a transmission channel with a machine exists all the time, an invader can implant certain destructive viruses, artificially decrypt and destroy the files through scripts, and even implant viruses to destroy the machine.
Therefore, a new technology is needed to solve the problems that the existing data transmission is not strict enough in security and has transmission holes.
Disclosure of Invention
The invention mainly aims to solve the technical problems that the existing data transmission is not strict enough in safety and has transmission loopholes.
The first aspect of the present invention provides an encrypted transmission method, including the steps of:
receiving an adb command verification request of equipment to be transmitted, and reading callback A _ OPEN type data in the adb command verification request;
judging whether the callback A _ OPEN type data is input instruction data or not;
if the command data is input command data, reading key verification data in the adb command verification request;
decrypting the key verification data according to a preset decryption algorithm to obtain a serial number of the equipment to be transmitted;
judging whether the serial number of the equipment to be transmitted is consistent with a preset authentication serial number or not;
if the data reading command is consistent with the authentication serial number, monitoring the data reading command of the equipment to be transmitted so as to execute the data reading command;
if the authentication serial number is inconsistent with the authentication serial number, sending authentication failure information to the equipment to be transmitted, and modifying a temporary value for transmission authentication.
Optionally, in a first implementation manner of the first aspect of the present invention, after the monitoring a data reading instruction of the device to be transmitted, so as to execute the data reading instruction, the method further includes:
monitoring and acquiring transmission disconnection data of the equipment to be transmitted;
and modifying the temporary value for transmission verification according to the transmission disconnection data so as to facilitate the connection re-verification of the equipment to be transmitted.
Optionally, in a second implementation manner of the first aspect of the present invention, the receiving an adb command verification request of a device to be transmitted, and reading callback a _ OPEN type data in the adb command verification request includes:
receiving an adb command verification request of equipment to be transmitted based on a USB connection mode;
and intercepting callback A _ OPEN type data in the adb command verification request in a system C layer.
Optionally, in a third implementation manner of the first aspect of the present invention, handle _ offline callback data of the USB connection mode is monitored and acquired;
and modifying the temporary value for transmission verification according to the handle _ offline callback data so as to facilitate the connection of the equipment to be transmitted to be verified again.
Optionally, in a fourth implementation manner of the first aspect of the present invention, the sending verification failure information to the device to be transmitted, where modifying a temporary value used for transmission verification includes:
and sending verification failure information to the equipment to be transmitted based on a send close instruction of the adb command, and modifying a temporary value for transmission verification.
Optionally, in a fifth implementation manner of the first aspect of the present invention, the decrypting the key verification data according to a preset decryption algorithm to obtain the serial number of the device to be transmitted includes:
based on a preset base64 algorithm, carrying out a preliminary decryption algorithm on the key verification data to obtain a binary code value;
and carrying out XOR decryption processing on the binary code value according to a preset XOR key to obtain the serial number of the equipment to be transmitted.
Optionally, in a sixth implementation manner of the first aspect of the present invention, the monitoring a data reading instruction of the device to be transmitted, so as to execute the data reading instruction, includes:
receiving abd command data of the equipment to be transmitted, and judging whether the abd command data is a data reading instruction or not;
if the command is a data reading command, reading an abd command temporary value of the abd command data;
judging whether the temporary value of the abd command is consistent with the checked temporary value;
and if so, executing the data reading instruction.
A second aspect of the present invention provides an encryption transmission apparatus including:
the receiving and reading module is used for receiving an adb command verification request of the equipment to be transmitted and reading callback A _ OPEN type data in the adb command verification request;
the judging module is used for judging whether the callback A _ OPEN type data is input instruction data or not;
if the command data is input command data, reading key verification data in the adb command verification request;
the decryption module is used for decrypting the key verification data according to a preset decryption algorithm to obtain a serial number of the equipment to be transmitted;
the judging module is used for judging whether the serial number of the equipment to be transmitted is consistent with a preset authentication serial number or not;
the monitoring execution module is used for monitoring a data reading instruction of the equipment to be transmitted if the data reading instruction is consistent with the authentication serial number so as to execute the data reading instruction;
and the modification module is used for sending verification failure information to the equipment to be transmitted and modifying the temporary value for transmission verification if the verification failure information is inconsistent with the authentication serial number.
A third aspect of the present invention provides an encryption transmission apparatus, including: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line; the at least one processor invokes the instructions in the memory to cause the cryptographic transmission apparatus to perform the cryptographic transmission method described above.
A fourth aspect of the present invention provides a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to execute the above-described encrypted transmission method.
In the embodiment of the invention, the authentication is carried out after the machine is connected, any data transmission can not be carried out before the authentication is successful, including the failure of displaying the machine drive letter, the failure of checking the files in the machine, the failure of copying and pushing the files, and the data transmission can be carried out after the user passes the authentication, so that the safety of the current data transmission is solved, and the method is simple to use and convenient to operate.
Drawings
Fig. 1 is a schematic diagram of an embodiment of an encryption transmission method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an embodiment of an encryption transmission apparatus according to an embodiment of the present invention;
fig. 3 is a schematic diagram of another embodiment of an encryption transmission apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an embodiment of an encryption transmission device in the embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an encryption transmission method, an encryption transmission device, encryption transmission equipment and a storage medium.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, a specific flow of the embodiment of the present invention is described below, and referring to fig. 1, an embodiment of an encryption transmission method in the embodiment of the present invention includes the steps of:
101. receiving an adb command verification request of equipment to be transmitted, and reading callback A _ OPEN type data in the adb command verification request;
in this embodiment, the upper computer receives an adb command verification request of the device that needs to transmit data, transmits an instruction to an adbd of a layer C of the system, and then intercepts a callback a _ OPEN type of the adb command in the adbd to determine the type of the command and acquire data transmitted by the command. adb is a generic command line tool that, as a client-server program, includes three components:
client, the component sends the command. The client runs on the development computer. You can call the client from the command line terminal by issuing an adb command.
A daemon that runs commands on the device. The daemon runs as a background process on each simulator or device instance.
A server, the component to manage communications between the client and the daemon. The server runs as a background process on the development computer.
When an adb client is started, the client first checks whether there is an adb server process already running. If not, it will start the server process. When the server starts, it binds with local TCP port 5037 and listens for commands sent from the adb client — all adb clients communicate with the adb server using port 5037.
The server then sets up connections with all running simulator/device instances. It looks for an emulator/device instance by scanning the odd numbered ports between 5555 and 5585 (the range used by the emulator/device). Once the server discovers the adb daemon, it will set up a connection with that port. Note that each simulator/device instance will acquire a pair of sequentially arranged ports — the even numbered port for console connections and the odd numbered port for adb connections. For example:
simulator 1, console: 5554
Simulator 1, adb: 5555
Simulator 2, console: 5556
Simulator 2, adb: 5557
And so on.
As indicated above, the example of the simulator connected to adb at port 5555 is the same as the example of the console listening to port 5554.
When the server has set up connections to all simulator instances, you can access these instances using the adb command. Since the server manages connections to simulator/device instances and handles commands from multiple adb clients, you can control any simulator/device instance from any client (or from some script).
Further, in 101, the following steps may be performed:
1011. receiving an adb command verification request of equipment to be transmitted based on a USB connection mode;
1012. and intercepting callback A _ OPEN type data in the adb command verification request in a system C layer.
In the 1011-step 1012 step, security verification of data is performed in the layer C and the frames of the system, authentication and data transmission are performed by the upper computer or the PC, after the machine is flushed into the system, the machine is connected to the upper computer or the PC, the upper computer or the PC cannot operate data in the machine at this time, including that the drive letter of the machine cannot be displayed, the file cannot be written into the machine, and pull and push cannot be performed through an adb command, the upper computer at this time can only authenticate the machine, and the upper computer needs to transmit an instruction of input + key through adb to perform authentication operation on the machine.
102. Judging whether callback A _ OPEN type data is input instruction data or not;
103. if the command data is input command data, reading key verification data in the adb command verification request;
in the step 102 and 103, if the callback a _ OPEN type data is a pull or push operation instruction, the key carried behind the input needs to be acquired, and then the key is decrypted, where the current key encryption mode is to acquire the serial number of the device, and then the serial number is transmitted to the system layer through an exclusive or encryption mode, and this authentication mode completely avoids the disadvantage that an illegal user can break the authentication after acquiring the device information.
104. Decrypting the key verification data according to a preset decryption algorithm to obtain a serial number of the equipment to be transmitted;
in the embodiment of the invention, the data with the encrypted information is decrypted through the set decryption algorithm to obtain the serial number of the equipment to be transmitted.
Further, at 104, the following steps may be performed:
1041. based on a preset base64 algorithm, carrying out a preliminary decryption algorithm on the key verification data to obtain a binary code value;
1042. and carrying out XOR decryption processing on the binary code value according to a preset XOR key to obtain the serial number of the equipment to be transmitted.
In the 1041-1042 step, the xor encryption is an encryption algorithm, which uses the xor calculation in the computer, and the principle of the xor calculation (the symbol is ^ 1') is that the same value is 0 and the different value is 1, for example:
0^0=0
1^1=0
1^0=1
0^1=1
because the results of 1^0 or 0^1 are both 1, the original plaintext can not be directly deduced from the result 1 to be 0 or 1, and the aim of protecting the plaintext is fulfilled.
Simple xor cipher (english) is an encryption algorithm in cryptography, which operates according to the following principle:
1.A^0=A
2.A^A=0
3.(A^B)^C=A^(B^C)
4.(B^A)^A=B^0=B
and carrying out XOR operation on the same plaintext B by using the key A twice to obtain the plaintext B, and realizing encryption and decryption by using the characteristic.
The XOR encryption algorithm consists of 3 parts, namely, plaintext, a key and an XOR operation rule, wherein the key can be transmitted to a user every time or can be directly appointed with the user by one number, each character of the plaintext is traversed, one or more characters are taken out from the key according to the XOR operation rule, the XOR operation is carried out on the one or more characters and the characters of the plaintext, the XOR result is synthesized into a new character string, but due to the characteristic of the XOR operation, the character string which is possibly subjected to the XOR operation is an invisible character, and a ciphertext cannot be transmitted through the character string, so that base64 encoding is introduced, and the character string which is subjected to the base64 encoding is a visible character.
The encryption algorithm becomes:
1. carrying out XOR operation on the plaintext and the secret key according to an XOR operation rule to generate the secret key;
2. and performing base64 encoding on the obtained ciphertext, and finally returning.
And the decryption algorithm correspondingly becomes:
1. performing base64 decoding on the ciphertext to obtain an original ciphertext;
2. and carrying out XOR on the ciphertext and the ciphertext according to the same XOR operation rule to obtain a plaintext.
Example 1: transmitting plaintext 6, both parties agree on a key 3 (the key can be transmitted to a user each time or can be agreed with the user directly), and encryption is carried out:
1. converting a plaintext and a secret key into a binary system, and then carrying out exclusive-or processing, wherein 6^3 is 110^011 is 101;
2. and carrying out base64 encryption on the number obtained by carrying out exclusive or on the plaintext and the key, and obtaining the MTAx after 101base64 encoding.
And (3) decryption: 1. firstly, decoding a base64 ciphertext through a base64, and decoding an MTAxbase64 to obtain 101;
2. and carrying out exclusive OR on the ciphertext and the key to convert the ciphertext into decimal data, wherein 101^011 ^ 110^ 6.
Example 2: plaintext delivery 123 both parties agree on a key of 5 (the key may be delivered to the user each time, or may be directly agreed with the user), and encryption:
1. firstly, converting a plaintext and a secret key into binary and then carrying out exclusive OR processing, wherein 123^5 is 1111011^0000101 is 1111110;
2. and encrypting the number obtained by exclusive or of the plaintext and the key by base64, and encoding 1111110base64 to obtain the MTExMTExMA.
And (3) decryption: 1. base64 ciphertext is decoded by base64, and MTExMTExMA base64 is decoded to obtain 1111110
2. And carrying out exclusive-or on the cipher text and the key to convert the cipher text and the key into decimal data, wherein 1111110^0000101 ^ 1111011^ 123.
105. Judging whether the serial number of the equipment to be transmitted is consistent with a preset authentication serial number or not;
106. if the authentication serial number is consistent with the authentication serial number, monitoring a data reading instruction of the equipment to be transmitted so as to execute the data reading instruction;
in the step 105 and 106, after the key is decrypted, the temporary value in the system is modified through comparison with the serial number of the local computer, if the comparison is passed, the temporary value is reset in a callback handle _ offset in which the upper computer and the system are disconnected from the USB, that is, the same machine and the same upper computer need to be authenticated during each connection, so that the risk of data leakage after the same equipment is replaced is avoided.
Further, at 106, the following steps may be performed:
1061. receiving abd command data of equipment to be transmitted, and judging whether the abd command data is a data reading instruction or not;
1062. if the command is a data reading command, reading an abd command temporary value of the abd command data;
1063. judging whether the temporary value of the abd command is consistent with the checked temporary value;
1064. if so, the data read instruction is executed.
In the step 1061-1064, after authentication, the user may start sending an adb pull and push command, when the adbd intercepts the command, go to the system to inspect the temporary value, if the temporary value returns to authentication pass, the data may be normally transmitted,
further, after 106, the following steps may also be performed:
1065. monitoring and acquiring transmission disconnection data of equipment to be transmitted;
1066. the temporary value for transmission verification is modified in accordance with the transmission disconnection data so that the connection of the device to be transmitted is re-verified.
In steps 1065-1066, after the data connection is authenticated, a temporary value is generated to mark the validity of the device to be transmitted. If the device to be transmitted is disconnected, the temporary value of the verification is modified and the device to be transmitted needs to be re-verified.
Further, after 106, the following steps may also be performed:
1067. monitoring and acquiring handle _ offline callback data of a USB connection mode;
1068. and modifying the temporary value for transmission verification according to the handle _ offline callback data so as to facilitate the connection re-verification of the equipment to be transmitted.
In the 1067-1068 step, if the comparison is passed, the temporary value in the system is modified, and the temporary value is reset in the callback handle _ offset where the upper computer and the system are disconnected from the USB, that is, the same machine and the same upper computer need to be authenticated each time of connection, so that the risk of data leakage after the same device is replaced is avoided
107. If the verification sequence number is not consistent with the authentication sequence number, sending verification failure information to the equipment to be transmitted, and modifying a temporary value for transmission verification.
In this embodiment, once the verification fails, the temporary value used for verification is modified immediately, so that the possibility of using the temporary value string by brute force cracking is avoided. In a specific scenario, the device a has passed verification, and the device B takes the nonce of the device a to prepare for communication connection with the system layer C by bypassing 104 the decryption step, at this time, the sequence numbers of the verification devices are inconsistent, and the nonce of the device a is also modified directly, thereby protecting against the copy attack of the nonce.
Further, in 107 the following steps may be performed:
1071. and sending verification failure information to the equipment to be transmitted based on the send close instruction of the adb command, and modifying a temporary value for transmission verification.
In this embodiment, if the return is unauthenticated, an error is returned by a send _ close method in the adb command set, and a temporary value of transmission verification is modified, so that a brute force cracking situation is prevented, and the temporary value is modified due to each verification, so that the brute force cracking cannot be performed.
In the embodiment of the invention, the authentication is carried out after the machine is connected, any data transmission can not be carried out before the authentication is successful, including the failure of displaying the machine drive letter, the failure of checking the files in the machine, the failure of copying and pushing the files, and the data transmission can be carried out after the user passes the authentication, so that the safety of the current data transmission is solved, and the method is simple to use and convenient to operate.
With reference to fig. 2, the encryption transmission method in the embodiment of the present invention is described above, and an encryption transmission apparatus in the embodiment of the present invention is described below, where the encryption transmission apparatus in the embodiment of the present invention includes:
a receiving and reading module 201, configured to receive an adb command verification request of a device to be transmitted, and read callback a _ OPEN type data in the adb command verification request;
a judging module 202, configured to judge whether the callback a _ OPEN type data is input instruction data;
if the command data is input command data 203, key verification data in the adb command verification request is read;
the decryption module 204 is configured to decrypt the key verification data according to a preset decryption algorithm to obtain a serial number of the device to be transmitted;
a judging module 205, configured to judge whether the serial number of the device to be transmitted is consistent with a preset authentication serial number;
a monitoring execution module 206, configured to monitor a data reading instruction of the device to be transmitted if the data reading instruction is consistent with the authentication serial number, so as to execute the data reading instruction;
and a modifying module 207, configured to send verification failure information to the device to be transmitted if the verification result is inconsistent with the authentication serial number, and modify a temporary value used for transmission verification.
In the embodiment of the invention, the authentication is carried out after the machine is connected, any data transmission can not be carried out before the authentication is successful, including the failure of displaying the machine drive letter, the failure of checking the files in the machine, the failure of copying and pushing the files, and the data transmission can be carried out after the user passes the authentication, so that the safety of the current data transmission is solved, and the method is simple to use and convenient to operate.
Referring to fig. 3, another embodiment of an encryption transmission apparatus according to an embodiment of the present invention includes:
a receiving and reading module 201, configured to receive an adb command verification request of a device to be transmitted, and read callback a _ OPEN type data in the adb command verification request;
a judging module 202, configured to judge whether the callback a _ OPEN type data is input instruction data;
if the command data is input command data 203, key verification data in the adb command verification request is read;
the decryption module 204 is configured to decrypt the key verification data according to a preset decryption algorithm to obtain a serial number of the device to be transmitted;
a judging module 205, configured to judge whether the serial number of the device to be transmitted is consistent with a preset authentication serial number;
a monitoring execution module 206, configured to monitor a data reading instruction of the device to be transmitted if the data reading instruction is consistent with the authentication serial number, so as to execute the data reading instruction;
and a modifying module 207, configured to send verification failure information to the device to be transmitted if the verification result is inconsistent with the authentication serial number, and modify a temporary value used for transmission verification.
The receiving and reading module 201 is specifically configured to:
receiving an adb command verification request of equipment to be transmitted based on a USB connection mode;
and intercepting callback A _ OPEN type data in the adb command verification request in a system C layer.
Wherein the modification module 207 is specifically configured to:
and sending verification failure information to the equipment to be transmitted based on a send close instruction of the adb command, and modifying a temporary value for transmission verification.
Wherein the decryption module 204 is specifically configured to:
based on a preset base64 algorithm, carrying out a preliminary decryption algorithm on the key verification data to obtain a binary code value;
and carrying out XOR decryption processing on the binary code value according to a preset XOR key to obtain the serial number of the equipment to be transmitted.
The monitoring execution module 206 is specifically configured to:
receiving abd command data of the equipment to be transmitted, and judging whether the abd command data is a data reading instruction or not;
if the command is a data reading command, reading an abd command temporary value of the abd command data;
judging whether the temporary value of the abd command is consistent with the checked temporary value;
and if so, executing the data reading instruction.
The encryption transmission apparatus further includes a numerical modification module 208, where the numerical modification module 208 is specifically configured to:
monitoring and acquiring transmission disconnection data of the equipment to be transmitted;
and modifying the temporary value for transmission verification according to the transmission disconnection data so as to facilitate the connection re-verification of the equipment to be transmitted.
The numerical modification module 208 may be further specifically configured to:
monitoring and acquiring handle _ offline callback data of a USB connection mode;
and modifying the temporary value for transmission verification according to the handle _ offline callback data so as to facilitate the connection of the equipment to be transmitted to be verified again.
In the embodiment of the invention, the authentication is carried out after the machine is connected, any data transmission can not be carried out before the authentication is successful, including the failure of displaying the machine drive letter, the failure of checking the files in the machine, the failure of copying and pushing the files, and the data transmission can be carried out after the user passes the authentication, so that the safety of the current data transmission is solved, and the method is simple to use and convenient to operate.
Fig. 2 and fig. 3 describe the encryption transmission apparatus in the embodiment of the present invention in detail from the perspective of the modular functional entity, and the encryption transmission apparatus in the embodiment of the present invention is described in detail from the perspective of hardware processing.
Fig. 4 is a schematic structural diagram of an encryption transmission apparatus 400 according to an embodiment of the present invention, where the encryption transmission apparatus 400 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 410 (e.g., one or more processors) and a memory 420, and one or more storage media 430 (e.g., one or more mass storage devices) storing an application 433 or data 432. Memory 420 and storage medium 430 may be, among other things, transient or persistent storage. The program stored in the storage medium 430 may include one or more modules (not shown), each of which may include a series of instructions operating on the encryption transmission apparatus 400. Further, the processor 410 may be configured to communicate with the storage medium 430 to execute a series of instruction operations in the storage medium 430 on the encryption transmission apparatus 400.
The encryption-based transport 400 may also include one or more power supplies 440, one or more wired or wireless network interfaces 450, one or more input-output interfaces 460, and/or one or more operating systems 431, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, and the like. Those skilled in the art will appreciate that the encryption transmission device configuration illustrated in fig. 4 does not constitute a limitation on encryption-based transmission devices, and may include more or fewer components than those illustrated, or some components in combination, or a different arrangement of components.
The present invention also provides a computer-readable storage medium, which may be a non-volatile computer-readable storage medium, and which may also be a volatile computer-readable storage medium, having stored therein instructions, which, when run on a computer, cause the computer to perform the steps of the encrypted transmission method.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses, and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An encrypted transmission method, comprising the steps of:
receiving an adb command verification request of equipment to be transmitted, and reading callback A _ OPEN type data in the adb command verification request;
judging whether the callback A _ OPEN type data is input instruction data or not;
if the command data is input command data, reading key verification data in the adb command verification request;
decrypting the key verification data according to a preset decryption algorithm to obtain a serial number of the equipment to be transmitted;
judging whether the serial number of the equipment to be transmitted is consistent with a preset authentication serial number or not;
if the data reading command is consistent with the authentication serial number, monitoring the data reading command of the equipment to be transmitted so as to execute the data reading command;
if the verification is inconsistent with the authentication serial number, sending verification failure information to the equipment to be transmitted, and modifying a temporary value for transmission verification.
2. The encrypted transmission method according to claim 1, further comprising, after the listening for a data read command of the device to be transmitted so as to execute the data read command:
monitoring and acquiring transmission disconnection data of the equipment to be transmitted;
and modifying the temporary value for transmission verification according to the transmission disconnection data so as to facilitate the connection re-verification of the equipment to be transmitted.
3. The encrypted transmission method according to claim 1, wherein the receiving an adb command authentication request of a device to be transmitted, and the reading callback a _ OPEN type data in the adb command authentication request comprises:
receiving an adb command verification request of equipment to be transmitted based on a USB connection mode;
and intercepting callback A _ OPEN type data in the adb command verification request in a system C layer.
4. The encrypted transmission method according to claim 3, wherein after the listening for the data reading instruction of the device to be transmitted so as to execute the data reading instruction, the method further comprises:
monitoring and acquiring handle _ offline callback data of a USB connection mode;
and modifying the temporary value for transmission verification according to the handle _ offline callback data so as to facilitate the connection of the equipment to be transmitted to be verified again.
5. The encrypted transmission method according to claim 1, wherein the sending of the authentication failure information to the device to be transmitted, and the modifying of the nonce value used for the transmission authentication comprises:
and sending verification failure information to the equipment to be transmitted based on a send close instruction of the adb command, and modifying a temporary value for transmission verification.
6. The encryption transmission method according to claim 1, wherein the decrypting the key verification data according to a preset decryption algorithm to obtain the serial number of the device to be transmitted comprises:
based on a preset base64 algorithm, carrying out a preliminary decryption algorithm on the key verification data to obtain a binary code value;
and according to a preset exclusive-or key, carrying out exclusive-or decryption processing on the binary code value to obtain the serial number of the equipment to be transmitted.
7. The encrypted transmission method according to claim 1, wherein the listening for a data reading instruction of the device to be transmitted so as to execute the data reading instruction comprises:
receiving abd command data of the equipment to be transmitted, and judging whether the abd command data is a data reading instruction or not;
if the command is a data reading command, reading an abd command temporary value of the abd command data;
judging whether the temporary value of the abd command is consistent with the checked temporary value;
and if so, executing the data reading instruction.
8. An encryption transmission apparatus, characterized in that the encryption transmission apparatus comprises:
the receiving and reading module is used for receiving an adb command verification request of the equipment to be transmitted and reading callback A _ OPEN type data in the adb command verification request;
the judging module is used for judging whether the callback A _ OPEN type data is input instruction data or not;
if the command data is input command data, reading key verification data in the adb command verification request;
the decryption module is used for decrypting the key verification data according to a preset decryption algorithm to obtain a serial number of the equipment to be transmitted;
the judging module is used for judging whether the serial number of the equipment to be transmitted is consistent with a preset authentication serial number or not;
the monitoring execution module is used for monitoring a data reading instruction of the equipment to be transmitted if the data reading instruction is consistent with the authentication serial number so as to execute the data reading instruction;
and the modification module is used for sending verification failure information to the equipment to be transmitted and modifying the temporary value for transmission verification if the verification failure information is inconsistent with the authentication serial number.
9. An encryption transmission apparatus characterized by comprising: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line;
the at least one processor invokes the instructions in the memory to cause the cryptographic transmission apparatus to perform the cryptographic transmission method of any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the cryptographic transmission method of any one of claims 1 to 7.
CN202210267515.2A 2022-03-17 2022-03-17 Encryption transmission method, device, equipment and storage medium Pending CN114584320A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210267515.2A CN114584320A (en) 2022-03-17 2022-03-17 Encryption transmission method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210267515.2A CN114584320A (en) 2022-03-17 2022-03-17 Encryption transmission method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114584320A true CN114584320A (en) 2022-06-03

Family

ID=81776003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210267515.2A Pending CN114584320A (en) 2022-03-17 2022-03-17 Encryption transmission method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114584320A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1833424A (en) * 2003-07-01 2006-09-13 伊吉斯技术公司 Methods, systems and devices for securing supervisory control and data acquisition (scada) communications
CN106612178A (en) * 2015-10-22 2017-05-03 哈尔滨安天科技股份有限公司 Method and device for protecting security of Android adb data transmission
CN107085675A (en) * 2016-02-16 2017-08-22 爱特梅尔公司 Controlled security code verification
CN107407950A (en) * 2015-04-15 2017-11-28 三星电子株式会社 Electronic installation, the Rouser for connecting electronic installation, wake-up system and its control method
CN108038385A (en) * 2017-11-28 2018-05-15 深圳市金立通信设备有限公司 A kind of data processing method, mobile terminal and computer-readable medium
CN108197438A (en) * 2018-03-26 2018-06-22 大连云观信息技术有限公司 A kind of digital literary property protection method based on complex encryption technology
CN110661797A (en) * 2019-09-23 2020-01-07 深圳传音控股股份有限公司 Data protection method, terminal and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1833424A (en) * 2003-07-01 2006-09-13 伊吉斯技术公司 Methods, systems and devices for securing supervisory control and data acquisition (scada) communications
CN107407950A (en) * 2015-04-15 2017-11-28 三星电子株式会社 Electronic installation, the Rouser for connecting electronic installation, wake-up system and its control method
CN106612178A (en) * 2015-10-22 2017-05-03 哈尔滨安天科技股份有限公司 Method and device for protecting security of Android adb data transmission
CN107085675A (en) * 2016-02-16 2017-08-22 爱特梅尔公司 Controlled security code verification
CN108038385A (en) * 2017-11-28 2018-05-15 深圳市金立通信设备有限公司 A kind of data processing method, mobile terminal and computer-readable medium
CN108197438A (en) * 2018-03-26 2018-06-22 大连云观信息技术有限公司 A kind of digital literary property protection method based on complex encryption technology
CN110661797A (en) * 2019-09-23 2020-01-07 深圳传音控股股份有限公司 Data protection method, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN109309565B (en) Security authentication method and device
CN105471584B (en) A kind of identity identifying method based on quantum key encryption
CN101051904B (en) Method for landing by account number cipher for protecting network application sequence
CN101809964A (en) Method for securing information exchange, and corresponding device and computer software product
CN111770088A (en) Data authentication method, device, electronic equipment and computer readable storage medium
CN111639325B (en) Merchant authentication method, device, equipment and storage medium based on open platform
CN107368737A (en) A kind of processing method for preventing copy-attack, server and client
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
CN105119894A (en) Communication system and communication method based on hardware safety module
CN111800467A (en) Remote synchronous communication method, data interaction method, equipment and readable storage medium
CN114244508A (en) Data encryption method, device, equipment and storage medium
Huang et al. A secure communication over wireless environments by using a data connection core
CN112865965B (en) Train service data processing method and system based on quantum key
CN112989320B (en) User state management system and method for password equipment
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN116743470A (en) Service data encryption processing method and device
CN110968878B (en) Information transmission method, system, electronic equipment and readable medium
CN115001865B (en) Communication processing method and system, client, communication server and supervision server
CN114553566B (en) Data encryption method, device, equipment and storage medium
CN114584320A (en) Encryption transmission method, device, equipment and storage medium
CN111212068B (en) Method for encrypting and decrypting characters by input method
CN114282189A (en) Data security storage method, system, client and server
CN116633530A (en) Quantum key transmission method, device and system
KR20020083551A (en) Development and Operation Method of Multiagent Based Multipass User Authentication Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination