CN114915457B - Message transmission method, dynamic encryption method, device, electronic equipment and medium - Google Patents

Message transmission method, dynamic encryption method, device, electronic equipment and medium Download PDF

Info

Publication number
CN114915457B
CN114915457B CN202210450192.0A CN202210450192A CN114915457B CN 114915457 B CN114915457 B CN 114915457B CN 202210450192 A CN202210450192 A CN 202210450192A CN 114915457 B CN114915457 B CN 114915457B
Authority
CN
China
Prior art keywords
function
encryption algorithm
byte
time control
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210450192.0A
Other languages
Chinese (zh)
Other versions
CN114915457A (en
Inventor
王源涛
孙立杰
张大强
马珍珍
李学芹
龚亮华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fengtai Technology Beijing Co ltd
Original Assignee
Fengtai Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fengtai Technology Beijing Co ltd filed Critical Fengtai Technology Beijing Co ltd
Priority to CN202210450192.0A priority Critical patent/CN114915457B/en
Publication of CN114915457A publication Critical patent/CN114915457A/en
Application granted granted Critical
Publication of CN114915457B publication Critical patent/CN114915457B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The application is applicable to the technical field of communication security, and provides a message transmission method, a dynamic encryption method, a device, electronic equipment and a medium, wherein the message transmission method comprises the following steps: according to the function security level of each equipment function in the current real-time control scene, determining an encryption algorithm corresponding to each equipment function by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the function security level and the encryption algorithm; for each equipment function, encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data; writing the encrypted data into data byte bits of the secure communication frame for each encrypted data, and writing a corresponding encryption algorithm identification into the identification byte bits to form a corresponding message; and transmitting all the messages. The scheme can save system resources and ensure the information safety of the functional data in the message transmission process.

Description

Message transmission method, dynamic encryption method, device, electronic equipment and medium
Technical Field
The present application belongs to the technical field of communication security, and in particular, relates to a message transmission method, a dynamic encryption method, a device, an electronic apparatus, and a medium.
Background
With the generation of industrial internet of things, new generation information technologies such as internet, big data, artificial intelligence and the like accelerate innovative application in the field of manufacturing industry, wherein the key in realizing online connection and real-time interaction between industrial equipment and users is data transmission, and the data transmission process in the big environment of the internet of things technology is very dependent on a computer information network, so that the data transmission process is easy to face the problem of information security.
In the existing data transmission process, encryption is generally considered to be carried out on transmission data to solve the information security problem in the data transmission process, a single encryption algorithm is generally adopted to encrypt the transmission data, but due to the different importance of the transmission data, the single encryption algorithm cannot ensure the information security of each transmission data, meanwhile, if an advanced encryption algorithm is adopted to encrypt functional data generated when each equipment function in a real-time control scene is executed, due to the complexity of decryption, the real-time data transmission in the real-time control scene cannot be completed, and system resource waste is easy to cause.
Disclosure of Invention
The embodiment of the application provides a message transmission method, a dynamic encryption method, a device, electronic equipment and a medium, which can save system resources and ensure the information security of data transmission in the message transmission process.
A first aspect of an embodiment of the present application provides a method for transmitting a message, where the message is transmitted through a secure communication frame, where the secure communication frame includes an identification byte bit; the identification byte bit is formed by occupying a set byte bit in the secure communication frame; the message transmission method comprises the following steps:
according to the function security level of each equipment function in the current real-time control scene, determining an encryption algorithm corresponding to each equipment function by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the function security level and the encryption algorithm;
for each equipment function, encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data;
writing the encrypted data into data byte bits of the secure communication frame for each encrypted data, and writing a corresponding encryption algorithm identification into the identification byte bits to form a corresponding message;
And transmitting all the messages.
A second aspect of an embodiment of the present application provides a dynamic encryption method, where the dynamic encryption algorithm includes:
according to the function security level of each equipment function in a preset real-time control scene, determining an encryption algorithm corresponding to each equipment function by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the function security level and the encryption algorithm;
and encrypting the function data generated by the equipment function in the preset real-time control scene by adopting a corresponding encryption algorithm aiming at each equipment function to obtain encrypted data.
A third aspect of an embodiment of the present application provides a packet transmission device, where the packet transmission device includes:
the algorithm determining module is used for determining an encryption algorithm corresponding to each equipment function according to the functional security level of each equipment function in the current real-time control scene by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the functional security level and the encryption algorithm;
the encryption module is used for encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm aiming at each equipment function to obtain encrypted data;
The message forming module is used for writing the encrypted data into the data byte bit of the secure communication frame aiming at each encrypted data, and writing the corresponding encryption algorithm identification into the identification byte bit to form a corresponding message;
and the transmission module is used for transmitting all the messages.
A fourth aspect of an embodiment of the present application provides an electronic device, including: the system comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the message transmission method described in the first aspect or realizes the dynamic encryption method described in the second aspect when executing the computer program.
A fourth aspect of the embodiments of the present application provides a computer readable storage medium storing a computer program, which when executed by a processor implements the method for transmitting a message according to the first aspect or implements the method for dynamically encrypting according to the second aspect.
A fifth aspect of an embodiment of the present application provides a computer program product, which when run on an electronic device, causes the electronic device to perform the method for transmitting a message according to the first aspect or the method for dynamically encrypting according to the second aspect.
Compared with the prior art, the embodiment of the application has the beneficial effects that: the message to be transmitted in the embodiment of the application is applied to a real-time control scene, so that the message is required to be transmitted through a safety communication frame. Firstly, according to the function security level of each equipment function in the current real-time control scene, determining an encryption algorithm corresponding to each equipment function by combining a preset encryption algorithm level table; secondly, aiming at each equipment function, encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data; and finally, writing each encrypted data into a data byte bit of the secure communication frame correspondingly, writing a corresponding encryption algorithm identification into the identification byte bit to form a corresponding message, and transmitting all the messages. According to the scheme, the encryption algorithm corresponding to each equipment function is obtained according to the function security level of the corresponding equipment function, and meanwhile, the function security level of each equipment function is dynamically changed according to different real-time control scenes. Therefore, the corresponding encryption algorithms of the device functions under different real-time control scenes are different, and the system resource waste caused by adopting an advanced encryption algorithm can be avoided, wherein when the message transmission is carried out, the corresponding encryption algorithm can be called by utilizing the encryption algorithm identification on the set identification byte bit under the condition of ensuring that the total bytes of the original safety communication frame are unchanged, so that the safety transmission of the message data in the real-time control scene is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a message transmission method according to a first embodiment of the present application;
FIG. 2 is a schematic diagram of a message format including identification byte bits;
FIG. 3 is a diagram of a message format including a counter byte bit;
fig. 4 is a flow chart of a dynamic encryption method according to a second embodiment of the present application;
fig. 5 is a schematic structural diagram of a message transmission device according to a third embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in the present description and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Furthermore, the terms "first," "second," "third," and the like in the description of the present specification and in the appended claims, are used for distinguishing between descriptions and not necessarily for indicating or implying a relative importance.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
Research shows that the key technology of the industrial Internet of things mainly comprises aspects of comprehensive perception, information transmission, intelligent processing, information feedback and the like. The comprehensive perception means that information acquisition and acquisition are carried out on an object at any time and any place by utilizing modern information acquisition technology means; the information transmission means reliable information interaction and sharing at any time and any place through various communication networks and the Internet; the intelligent processing refers to analyzing and processing the collected mass data and information, improving the insight to the industrial production environment and market, and realizing intelligent decision and control; the information feedback means that the processed information is transmitted to each production link in the form of program instructions so as to optimize the production structure and complete the production plan.
Due to the occurrence of the industrial Internet of things, in many industrial control scenes, real-time interaction is required for data interaction between all devices, for example, in a vehicle braking scene, real-time interaction is required for data interaction between a main control device and a braking device; for example, in a vehicle driving scene, data interaction between the main control device and each function device of the vehicle needs to be performed in real time to complete each function in the vehicle driving scene. Meanwhile, in order to realize secure communication, data interaction in a real-time control scene needs to be performed in a form of secure communication frames, and in order to prevent data in the interaction process from being cracked and utilized by an attacker, encryption processing is required to be performed on the data in the secure communication frames, in the prior art, a single encryption algorithm is generally adopted to encrypt transmission data, but due to different importance of transmission data, the single encryption algorithm cannot guarantee information security of each transmission data, and meanwhile, if an advanced encryption algorithm is adopted to encrypt functional data generated when each equipment function in the real-time control scene is executed, due to complexity of decryption, data real-time transmission in the real-time control scene cannot be completed, and system resource waste is easily caused.
In order to solve the technical problems in the data transmission process, the application provides a message transmission method, a dynamic encryption method, a device, electronic equipment and a medium, wherein the function data generated by the equipment function in the current real-time control scene can be encrypted by adopting a corresponding encryption algorithm aiming at each equipment function, wherein the encryption algorithm corresponding to the equipment function is obtained according to the function security level of the equipment function, and the function security level of each equipment function is dynamically changed according to different real-time control scenes. Therefore, the corresponding encryption algorithms of the device functions under different real-time control scenes are different, in order to encrypt corresponding encryption algorithms for corresponding encryption data in real time in the process of message transmission and to transmit the messages under the condition of not changing the total byte number of the original safety communication frames, the identification byte bit is set, the corresponding encryption algorithm identification is written into the identification byte message of the safety communication frames to form corresponding messages and transmit all messages, and the safety communication under the real-time control scenes is realized under the condition of not changing the total byte number in the safety communication frames.
It should be understood that the message transmission is performed without changing the total byte number in the secure communication frame, so that the real-time performance of the message transmission can be ensured, and the transmission speed of the message is not changed.
It should be further understood that the sequence number of each step in this embodiment does not mean the sequence of execution, and the execution sequence of each process should be determined by its function and internal logic, and should not be construed as limiting the implementation process of the embodiment of the present application.
In order to illustrate the technical scheme of the application, the following description is given by specific examples.
Referring to fig. 1, a flow chart of a message transmission method according to a first embodiment of the present application is shown. As shown in fig. 1, the message transmission method may include the following steps:
step 101, determining an encryption algorithm corresponding to each device function according to the function security level of each device function in the current real-time control scene by combining a preset encryption algorithm level table.
In the embodiment of the application, the real-time control scene can refer to a real-time control scene of an industrial field, and a plurality of industrial devices exist in each real-time control scene, and each industrial device corresponds to a corresponding device function. In a real-time control scenario, the criticality of each industrial device is different, and the functional security level of its corresponding device function is also different, wherein the more critical the industrial device is, the higher the functional security level of its corresponding device function is. In a real-time control scenario of an industrial field, the security of function data generated by a device function in the real-time control scenario (the security of the function data can be divided in the form of security levels) corresponds to the security of the device function, the device functions are different, the security levels of the corresponding function data are different, and the encryption algorithm corresponding to the device function is related to the security levels of the function data, i.e. the higher the security level of the function data, the higher the level of the required encryption algorithm (the higher the level, the stronger the encryption effect).
Therefore, it can be known that the more critical the industrial device is, the higher the functional security level of its corresponding device function is, the higher the security level of the functional data is, and the higher the level of the required encryption algorithm is.
For example, assuming that the real-time control scenario is a driving car driving scenario, the corresponding device functions include a car brake control function and a car window control function, since the car brake control function is likely to cause the car to be destroyed by an attacker once being cracked and utilized, and the car window control function is cracked and utilized by the attacker and does not generate fatal risk to personnel, the functional safety level of the car brake control function is higher than the functional safety level of the car window control function, so that the level of the encryption algorithm corresponding to the car brake control function is higher than the level of the encryption algorithm corresponding to the car window control function.
In the embodiment of the application, the preset encryption algorithm level table comprises the mapping relation between the function security level and the encryption algorithm, so that when the function security level of each device function in the current real-time control scene is known, the encryption algorithm corresponding to each device function in the current real-time control scene can be determined according to the mapping relation between the function security level and the encryption algorithm.
For example, assuming that the functional security level of each device in the current real-time control scenario is A, B, C, D from low to high, the encryption algorithm corresponding in sequence may be a TEA encryption algorithm, an XTEA encryption algorithm, an RC4 encryption algorithm, or an AES encryption algorithm. The encryption algorithm level table comprises a mapping relation between an A level and a TEA encryption algorithm, a mapping relation between a B level and an XTEA encryption algorithm, a mapping relation between a C level and an RC4 encryption algorithm and a mapping relation between a D level and an AES encryption algorithm.
It should be understood that the higher the function security level, the higher the level of the corresponding encryption algorithm, and the application is not limited to the type and kind of encryption algorithm.
In one possible implementation manner, before determining the encryption algorithm corresponding to each device function according to the function security level of each device function in the current real-time control scene by combining with the preset encryption algorithm level table, the method further includes:
acquiring a current real-time control scene and functions of each device in the current real-time control scene;
and according to the functions of each device and the current real-time control scene, determining the functional security level of each device in the current real-time control scene by combining the functional security level table corresponding to the current real-time control scene.
In the embodiment of the application, the function security level table corresponding to the current real-time control scene comprises mapping relations between each equipment function in the current real-time control scene and the corresponding function security level. Therefore, when the message is transmitted, the current real-time control scene can be acquired first, and the current real-time control scene can be determined according to the environmental information acquired by the plurality of sensors or can be directly input into the electronic equipment by the user. After the current real-time control scene is acquired, the functional security level of each device in the real-time control scene can be determined by combining the functional security level table corresponding to the current real-time control scene. From the above, it can be known that the functional security levels corresponding to the same device function in different real-time control scenes are different.
For example, assuming that the current real-time control scenario is a driving car driving scenario, the device functions are respectively a car brake control function and a car window control function, and since the car brake control function is more critical when driving a car, the functional safety level corresponding to the car brake control function is higher than the functional safety level corresponding to the car window control function in the driving car driving scenario. If the current real-time control scene is an automobile non-starting scene, the equipment functions are an automobile braking control function and a car window control function respectively, and because the car window control function is more critical when the automobile is not started, the functional safety level corresponding to the car window control function is higher than the functional safety level corresponding to the automobile braking control function under the automobile non-starting scene.
Step 102, for each device function, encrypting the function data generated by the device in the current real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data.
In the embodiment of the application, when each device function is implemented in the current real-time control scene, the electronic device generates corresponding function data, which may refer to a control instruction, for instructing the device to implement the device function, for example, when the device function corresponding to the braking device is braking in the driving automobile driving scene, when the braking function is implemented in the driving automobile driving scene, the electronic device generates a control instruction (i.e., the function data corresponding to the braking function) for controlling the braking, the function data is key in the transmission process, if the function data is cracked and utilized by an attacker, the braking function is invalid, and thus the automobile is likely to be damaged and the automobile is likely to be damaged, so that the corresponding encryption algorithm is required to encrypt the function data to obtain the encrypted data, thereby preventing the attacker from cracking.
Step 103, for each piece of encrypted data, writing the encrypted data into data byte bits of the secure communication frame, and writing the corresponding encryption algorithm identification into the identification byte bits to form a corresponding message.
In the embodiment of the application, the message transmission method is applied to a real-time control scene, so that the process of transmitting the message is required to meet the requirement of instantaneity, if the requirement of instantaneity is required to be met, the data quantity required to be transmitted at one time cannot be large, so that a safe communication frame with small data quantity can be selected for transmission, and the encrypted data is written into the data byte bit of the safe communication frame.
It should be appreciated that the amount of data transmitted by the secure communication frame cannot be increased if the secure communication frame is required to meet the real-time requirement, and thus the increased identification byte bit may occupy the data byte bit in the secure communication frame.
In one possible implementation, the step of forming the identification byte bits includes:
Occupying part of byte bits of an original data field in a secure communication frame to form identification byte bits; wherein the remaining byte bits of the original data field form data byte bits; or alternatively, the process may be performed,
the extended byte bits in the occupied secure communication frame form the identification byte bits.
In the embodiment of the application, the identification byte bit can occupy part of byte bits of the original data field in the secure communication frame to form the identification byte bit, the effective data of the secure communication frame is reduced, the data transmission speed can still meet the real-time requirement, as shown in fig. 2, which is a structural schematic diagram of a message format containing the identification byte bit, and in fig. 2, the occupied byte bit of the effective data of the original data field in the secure communication frame is 0-64bit, so as to occupy as little space of the effective data as possible, save data resources, and the identification byte bit can occupy 8 bits of the least effective bit of the original data field in the secure communication frame for storing the encryption algorithm identification corresponding to the transmission data.
It should be appreciated that the encryption algorithm identifies a string that may be comprised of numbers and letters, with a string length of at most 8 bits and not more than 8 bits.
In the embodiment of the application, in order to avoid that the original data field in the secure communication frame is occupied, so that the transmitted effective data is reduced, the identification byte bit can occupy the extension byte bit of the secure communication frame, and the specific reference can be made to the extension ID part in the prior art data frame.
Step 104, transmitting all the messages.
In the embodiment of the application, the message corresponding to each equipment function in the current real-time application scene can be transmitted based on the message formed for each encrypted data.
In one possible implementation, the secure communication frame further includes a priority byte bit, and the message transmission method further includes:
determining priority information of each piece of encrypted data according to a preset corresponding relation table of equipment functions and priorities;
writing priority information into the priority byte bits;
correspondingly, all messages are transmitted, including:
reading priority information of the priority byte bits, and forming a message transmission sequence based on the priority information;
and transmitting each message in sequence according to the message transmission sequence.
In the embodiment of the application, the higher the function security level of the preset equipment function is, the higher the priority of the preset equipment function is. Therefore, the priority information of each encrypted data can be determined according to the preset corresponding relation table of the device function and the priority, and in the communication data frame, the priority information can be represented by a frame ID, and the smaller the frame ID is, the higher the priority of the encrypted data is. The priority information may be written to priority byte bits, which may refer to byte bits corresponding to arbitration fields in the message format, as shown in the schematic diagram of the message format of fig. 2.
Therefore, under the condition that the priority information is written into the priority byte bit, all messages can be transmitted, the priority information can be read first, each message is transmitted according to the order of the priority from high to low, if the message with higher priority appears suddenly in the process of transmitting each message in sequence, the terminal shall transmit the message with higher priority in sequence currently, and the message with higher priority appears suddenly is transmitted preferentially.
It should be understood that, in the current real-time control scenario, the more critical the device function is, the more the corresponding message needs to be transmitted in time, so in order to make the message corresponding to the high-critical device function be transmitted in time, when the frame ID is allocated, the smaller frame ID may be allocated to the high-critical device function. The range of the frame ID may be 0x 000-0 x7FF, and the range of the frame ID may be allocated according to the criticality of the device function.
In one possible implementation, the step of forming the identification byte bits includes:
occupying part of byte bits of an original data field in a secure communication frame to form identification byte bits; wherein the remaining byte bits of the original data field form data byte bits and counter byte bits;
correspondingly, the message transmission method comprises the following steps: the number of messages currently transmitted is written to a counter byte bit in the secure communication frame before each message is formed.
In the embodiment of the application, the identification byte bit can occupy part of byte bits of an original data field in a secure communication frame, and in order to avoid repeated transmission of a message, the rest byte bits of the original data field can be used as data byte bits and counter byte bits.
For example, as shown in fig. 3, the structure of the message format including the counter byte bit is shown, in order to occupy as little space as possible for valid data, save data resources, the identification byte bit may occupy 3 bytes of the original data field in the secure communication frame, and the counter byte bit may occupy 5 bytes of the original data field in the secure communication frame, where the counter byte bit is used for storing the number of the currently transmitted messages.
In one possible implementation, writing the number of currently transmitted messages to a counter byte bit in a secure communication frame includes:
if the number of the transmitted messages is smaller than or equal to the maximum count of the byte bits of the counter, writing the number of the transmitted messages into the byte bits of the counter;
And if the number of the current transmitted messages is larger than the maximum count of the byte bits of the counter, assigning the number of the current transmitted messages to zero.
In the embodiment of the application, because the message sending speed is high and the number is numerous in a real-time control scene, the counter value (namely the number of the transmitted messages) can be a larger number, and in order to save data resources, the counter byte bit can only occupy 5 bits, so that when the counter byte bit counts, a cycle counting mode can be adopted, for example, the maximum count is set to be 50, and if the number of the current transmitted messages is less than or equal to 50, the number of the current transmitted messages can be written into the counter byte bit; if the number of the transmitted messages is greater than 50, the byte bit of the counter in the current message format is assigned to 0.
In one possible implementation manner, when the electronic device transmits the message from the sending node to the receiving node, the receiving node may obtain the value of the byte bit of the counter of the sending node, and if the value is equal to the value of the counter of the receiving node, it is determined that the message is not attacked; if the value is not equal to the counter value of the receiving node, determining that the message is attacked. At this time, the values of the counter byte bits of the sending node and the receiving node should be assigned to 0, and the attacked message data is retransmitted.
In the embodiment of the application, the electronic equipment firstly determines an encryption algorithm corresponding to each equipment function according to the function security level of each equipment function in the current real-time control scene by combining a preset encryption algorithm level table; secondly, aiming at each equipment function, encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data; and finally, writing each encrypted data into a data byte bit of the secure communication frame correspondingly, writing a corresponding encryption algorithm identification into the identification byte bit to form a corresponding message, and transmitting all the messages. According to the scheme, the encryption algorithm corresponding to each equipment function is obtained according to the function security level of the corresponding equipment function, and meanwhile, the function security level of each equipment function is dynamically changed according to different real-time control scenes. Therefore, the corresponding encryption algorithms of the device functions under different real-time control scenes are different, and the system resource waste caused by adopting an advanced encryption algorithm can be avoided, wherein when the message transmission is carried out, the corresponding encryption algorithm can be called by utilizing the encryption algorithm identification on the set identification byte bit under the condition of ensuring that the total bytes of the original safety communication frame are unchanged, so that the safety transmission of the message data in the real-time control scene is ensured.
Referring to fig. 4, a flow chart of a dynamic encryption method according to a second embodiment of the present application is shown. As shown in fig. 4, the dynamic encryption method may include the steps of:
step 401, determining an encryption algorithm corresponding to each device function according to the function security level of each device function in the preset real-time control scene and combining a preset encryption algorithm level table.
In the embodiment of the application, a real-time control scene can be preset first, and the functional security level of each device function in the preset real-time control scene is determined according to each device function in the preset real-time control scene and the functional security level table corresponding to the preset real-time control scene.
It should be understood that the functional security levels corresponding to the same device function in different real-time control scenarios are different, so that the encryption algorithms corresponding to the same device function in different real-time control scenarios are also different, and the encryption methods dynamically change according to different scenarios.
Step 402, for each device function, encrypting the function data generated by the function in a preset real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data.
In the embodiment of the application, the encryption algorithm can encrypt the function data generated by the corresponding equipment function under the preset real-time control scene, and the function data can refer to a control instruction for indicating the equipment to realize the equipment function. The functional data is the key in the transmission process, if the functional data is cracked and utilized by an attacker, the braking function is invalid, and the vehicle is possibly damaged and the vehicle is possibly dead, so that the functional data is required to be encrypted by adopting a corresponding encryption algorithm to obtain encrypted data for data transmission (for example, the data is transmitted in a message form), and the attacker is prevented from cracking.
It should be understood that the dynamic encryption algorithm in the embodiment of the present application may be used in any application scenario where data transmission is required.
In the embodiment of the application, according to the function security level of each equipment function in the preset real-time control scene, the encryption algorithm corresponding to each equipment function is determined by combining the preset encryption algorithm level table. After the corresponding encryption algorithm is determined, for each equipment function, the function data generated by the function under the preset real-time control scene is encrypted by adopting the corresponding encryption algorithm, so that encrypted data is obtained for data transmission. According to the scheme, the encryption algorithm corresponding to each equipment function is obtained according to the function security level of each equipment function under the preset real-time control scene, and because the function security level is dynamically changed according to the real-time control scene corresponding to the equipment function, the encryption algorithm is dynamically changed according to the real-time control scene corresponding to the equipment function, and the encryption algorithms corresponding to the same equipment function in different real-time control scenes are different, and the dynamically changed encryption algorithm can pointedly ensure the information security of the functional data in the data transmission process while saving the system resources.
Referring to fig. 5, a schematic structural diagram of a message transmission device according to a third embodiment of the present application is shown, and for convenience of explanation, only a portion related to the embodiment of the present application is shown.
The message transmission device specifically may include the following modules:
the algorithm determining module 501 is configured to determine an encryption algorithm corresponding to each device function according to a function security level of each device function in the current real-time control scenario in combination with a preset encryption algorithm level table, where the encryption algorithm level table includes a mapping relationship between the function security level and the encryption algorithm;
the encryption module 502 is configured to encrypt, for each device function, function data generated by the device function in a current real-time control scenario by using a corresponding encryption algorithm, so as to obtain encrypted data;
a message forming module 503, configured to write, for each piece of encrypted data, the encrypted data into a data byte of the secure communication frame, and write a corresponding encryption algorithm identifier into an identifier byte to form a corresponding message;
a transmission module 504, configured to transmit all the messages.
In the embodiment of the present application, the message transmission device may specifically further include the following modules:
the acquisition module is used for acquiring the current real-time control scene and the functions of each device in the current real-time control scene;
The grade determining module is used for determining the functional safety grade of each device under the current real-time control scene according to the functions of each device and the current real-time control scene and combining the functional safety grade table corresponding to the current real-time control scene; the function security level table corresponding to the current real-time control scene comprises mapping relations between each device function in the current real-time control scene and the corresponding function security level.
In the embodiment of the present application, the message transmission device may specifically further include the following modules:
the first identification module is used for occupying part of byte bits of an original data field in the secure communication frame to form identification byte bits; wherein the remaining byte bits of the original data field form data byte bits; or alternatively, the process may be performed,
the second identification module is used for occupying extended byte bits in the secure communication frame to form identification byte bits.
In the embodiment of the application, in the case that the secure communication frame also comprises a priority byte bit; the message transmission device specifically may further include the following modules:
the priority determining module is used for determining the priority information of each piece of encrypted data according to a preset corresponding relation table of the equipment function and the priority;
the writing module is used for writing the priority information into the priority byte bit;
Correspondingly, the transmission module 504 may specifically include the following sub-modules:
the reading sub-module is used for reading priority information of the priority byte bits and forming a message transmission sequence based on the priority information;
and the transmission sub-module is used for sequentially transmitting each message according to the message transmission sequence.
In the embodiment of the present application, the message transmission device may specifically further include the following modules:
the third identification module is used for occupying part of byte bits of an original data field in the secure communication frame to form identification byte bits; wherein the remaining byte bits of the original data field form data byte bits and counter byte bits;
correspondingly, the transmission module 504 may specifically include the following sub-modules:
and the quantity writing submodule is used for writing the quantity of the current transmitted messages into the byte bit of the counter in the safety communication frame before each message is formed.
In the embodiment of the present application, the number writing submodule may specifically include the following units:
the first judging unit is used for writing the number of the current transmitted messages into the byte bit of the counter if the number of the current transmitted messages is smaller than or equal to the maximum count of the byte bit of the counter;
and the second judging unit is used for assigning the number of the current transmitted messages to zero if the number of the current transmitted messages is larger than the maximum count of the byte bits of the counter.
The message transmission device provided in the embodiment of the present application may be applied to the first embodiment of the foregoing method, and details refer to the description of the first embodiment of the foregoing method, which is not repeated herein.
The embodiment of the application also provides a dynamic encryption device. The dynamic encryption device specifically may include the following modules:
the preset algorithm determining module is used for determining an encryption algorithm corresponding to each equipment function according to the function security level of each equipment function in a preset real-time control scene and combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the function security level and the encryption algorithm;
the preset encryption module is used for encrypting the function data generated by the equipment function in a preset real-time control scene by adopting a corresponding encryption algorithm aiming at each equipment function to obtain encrypted data.
The dynamic encryption device provided in the embodiment of the present application may be applied to the second embodiment of the foregoing method, and details refer to the description of the second embodiment of the foregoing method, which is not repeated herein.
Fig. 6 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application. As shown in fig. 6, the electronic device 600 of this embodiment includes: at least one processor 610 (only one is shown in fig. 6), a memory 620, and a computer program 621 stored in the memory 620 and executable on the at least one processor 610, the processor 610 implementing the steps in the above-described message transmission method embodiments or implementing the steps in the above-described dynamic encryption method embodiments when executing the computer program 621.
The electronic device 600 may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, etc. The electronic device may include, but is not limited to, a processor 610, a memory 620. It will be appreciated by those skilled in the art that fig. 6 is merely an example of an electronic device 600 and is not intended to limit the electronic device 600, and may include more or fewer components than shown, or may combine certain components, or may include different components, such as input-output devices, network access devices, etc.
The processor 610 may be a central processing unit (Central Processing Unit, CPU), the processor 610 may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 620 may be an internal storage unit of the electronic device 600, such as a hard disk or a memory of the electronic device 600, in some embodiments. The memory 620 may also be an external storage device of the electronic device 600 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device 600. Further, the memory 620 may also include both internal storage units and external storage devices of the electronic device 600. The memory 620 is used to store an operating system, application programs, boot loader (BootLoader), data, and other programs, such as program code of the computer program. The memory 620 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/electronic device and method may be implemented in other manners. For example, the apparatus/electronic device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
The present application may also be implemented as a computer program product for implementing all or part of the steps of the method embodiments described above, when the computer program product is run on an electronic device, causing the electronic device to execute the steps of the method embodiments described above.
The above embodiments are only for illustrating the technical solution of the present application, and are not limited thereto. Although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (9)

1. The message transmission method is characterized in that the message is transmitted through a secure communication frame, and the secure communication frame comprises an identification byte bit; the identification byte bit is formed by occupying a set byte bit in the secure communication frame; the message transmission method comprises the following steps:
according to the function security level of each equipment function in the current real-time control scene, determining an encryption algorithm corresponding to each equipment function by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the function security level and the encryption algorithm;
For each equipment function, encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm to obtain encrypted data;
writing the encrypted data into data byte bits of the secure communication frame for each encrypted data, and writing a corresponding encryption algorithm identification into the identification byte bits to form a corresponding message;
transmitting all messages;
the step of forming the identification byte bit includes:
occupying part of byte bits of an original data field in the secure communication frame to form the identification byte bit; wherein the remaining byte bits of the original data field form the data byte bits and counter byte bits;
correspondingly, the message transmission method comprises the following steps: before each message is formed, the number of messages currently transmitted is written to the counter byte bit in the secure communication frame.
2. The method for transmitting a message according to claim 1, wherein before determining the encryption algorithm corresponding to each device function according to the function security level of each device function in the current real-time control scenario in combination with the preset encryption algorithm level table, the method further comprises:
acquiring the current real-time control scene and the functions of each device in the current real-time control scene;
According to the functions of the devices and the current real-time control scene, determining the functional security level of the devices in the current real-time control scene by combining a functional security level table corresponding to the current real-time control scene;
the function security level table corresponding to the current real-time control scene comprises mapping relations between each equipment function in the current real-time control scene and the corresponding function security level.
3. The message transmission method as claimed in claim 1, wherein the step of forming the identification byte bits comprises:
occupying part of byte bits of an original data field in the secure communication frame to form the identification byte bit; wherein the remaining byte bits of the original data field form the data byte bits; or alternatively, the process may be performed,
occupying extended byte bits in the secure communication frame to form the identification byte bits.
4. The message transmission method of claim 1, wherein the secure communication frame further comprises: priority byte bits; the message transmission method further comprises the following steps:
determining priority information of each piece of encrypted data according to a preset corresponding relation table of equipment functions and priorities;
writing the priority information to the priority byte bits;
Correspondingly, the transmitting all the messages includes:
reading priority information of the priority byte bits, and forming a message transmission sequence based on the priority information;
and transmitting each message in sequence according to the message transmission sequence.
5. The message transmission method according to claim 1, wherein the writing the number of currently transmitted messages to the counter byte bit in the secure communication frame includes:
if the number of the transmitted messages is smaller than or equal to the maximum count of the byte bits of the counter, writing the number of the transmitted messages into the byte bits of the counter;
and if the number of the current transmitted messages is larger than the maximum count of the byte bits of the counter, assigning the number of the current transmitted messages to zero.
6. A dynamic encryption method, characterized in that the dynamic encryption method comprises:
according to the function security level of each equipment function in a preset real-time control scene, determining an encryption algorithm corresponding to each equipment function by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the function security level and the encryption algorithm;
and encrypting the function data generated by the equipment function in the preset real-time control scene by adopting a corresponding encryption algorithm aiming at each equipment function to obtain encrypted data.
7. A message transmission device, characterized in that the message transmission device comprises:
the algorithm determining module is used for determining an encryption algorithm corresponding to each equipment function according to the functional security level of each equipment function in the current real-time control scene by combining a preset encryption algorithm level table, wherein the encryption algorithm level table comprises a mapping relation between the functional security level and the encryption algorithm;
the encryption module is used for encrypting the function data generated by the equipment function in the current real-time control scene by adopting a corresponding encryption algorithm aiming at each equipment function to obtain encrypted data;
the message forming module is used for writing the encrypted data into the data byte bit of the secure communication frame aiming at each encrypted data, and writing the corresponding encryption algorithm identification into the identification byte bit to form a corresponding message;
the transmission module is used for transmitting all the messages;
the message transmission device further comprises the following modules:
the third identification module is used for occupying part of byte bits of an original data field in the secure communication frame to form identification byte bits; wherein the remaining byte bits of the original data field form data byte bits and counter byte bits;
Correspondingly, the transmission module specifically comprises the following sub-modules:
and the quantity writing submodule is used for writing the quantity of the current transmitted messages into the byte bit of the counter in the safety communication frame before each message is formed.
8. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any one of claims 1 to 5 or the method according to claim 6 when executing the computer program.
9. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the method of any one of claims 1 to 5 or the method of claim 6.
CN202210450192.0A 2022-04-27 2022-04-27 Message transmission method, dynamic encryption method, device, electronic equipment and medium Active CN114915457B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210450192.0A CN114915457B (en) 2022-04-27 2022-04-27 Message transmission method, dynamic encryption method, device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210450192.0A CN114915457B (en) 2022-04-27 2022-04-27 Message transmission method, dynamic encryption method, device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN114915457A CN114915457A (en) 2022-08-16
CN114915457B true CN114915457B (en) 2023-08-25

Family

ID=82765489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210450192.0A Active CN114915457B (en) 2022-04-27 2022-04-27 Message transmission method, dynamic encryption method, device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN114915457B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208701B (en) * 2022-09-15 2022-12-20 广州万协通信息技术有限公司 Data packet selective encryption method and device
CN115208697A (en) * 2022-09-15 2022-10-18 广州万协通信息技术有限公司 Adaptive data encryption method and device based on attack behavior
CN115208705B (en) * 2022-09-16 2022-12-20 广州万协通信息技术有限公司 Encryption and decryption method and device based on link data self-adaptive adjustment
CN117201191B (en) * 2023-11-06 2024-01-02 戎行技术有限公司 Dynamic encryption method and system for data transmission

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192919A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 Method for realizing user-defined security level
CN102932382A (en) * 2011-08-08 2013-02-13 中兴通讯股份有限公司 Safety on-demand supply method and system, and service type acquisition method
CN107292183A (en) * 2017-06-29 2017-10-24 国信优易数据有限公司 A kind of data processing method and equipment
CN109787759A (en) * 2019-01-23 2019-05-21 郑州云海信息技术有限公司 A kind of data transmission method, system, device and computer readable storage medium
CN110033174A (en) * 2019-03-20 2019-07-19 烽台科技(北京)有限公司 A kind of industrial information efficient public security system building method
CN111740963A (en) * 2020-05-29 2020-10-02 深圳市优博讯科技股份有限公司 Data communication method and device
CN112804227A (en) * 2021-01-11 2021-05-14 北京鼎轩科技有限责任公司 Data one-way transmission device and method, electronic equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7140044B2 (en) * 2000-11-13 2006-11-21 Digital Doors, Inc. Data security system and method for separation of user communities

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192919A (en) * 2006-11-21 2008-06-04 中兴通讯股份有限公司 Method for realizing user-defined security level
CN102932382A (en) * 2011-08-08 2013-02-13 中兴通讯股份有限公司 Safety on-demand supply method and system, and service type acquisition method
CN107292183A (en) * 2017-06-29 2017-10-24 国信优易数据有限公司 A kind of data processing method and equipment
CN109787759A (en) * 2019-01-23 2019-05-21 郑州云海信息技术有限公司 A kind of data transmission method, system, device and computer readable storage medium
CN110033174A (en) * 2019-03-20 2019-07-19 烽台科技(北京)有限公司 A kind of industrial information efficient public security system building method
CN111740963A (en) * 2020-05-29 2020-10-02 深圳市优博讯科技股份有限公司 Data communication method and device
CN112804227A (en) * 2021-01-11 2021-05-14 北京鼎轩科技有限责任公司 Data one-way transmission device and method, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114915457A (en) 2022-08-16

Similar Documents

Publication Publication Date Title
CN114915457B (en) Message transmission method, dynamic encryption method, device, electronic equipment and medium
US10841243B2 (en) NIC with programmable pipeline
CN112035258B (en) Data processing method, device, electronic equipment and medium
US20220138349A1 (en) Cryptographic architecture for cryptographic permutation
CN110958215B (en) Secure on-line received network packet processing
CN113608483B (en) Method for acquiring vehicle signal value, electronic equipment and electronic control unit
CN115208701B (en) Data packet selective encryption method and device
JP7411895B2 (en) Information processing device, abnormality detection method and computer program
CN117640256B (en) Data encryption method, recommendation device and storage medium of wireless network card
CN116070240B (en) Data encryption processing method and device of multi-chip calling mechanism
CN110958216B (en) Secure online network packet transmission
CN114885045B (en) Method and device for saving DMA channel resources in high-speed intelligent network card/DPU
CN115102701B (en) Multi-chip data encryption and decryption processing method and device
EP4084484B1 (en) Method and device for encryption of video stream, communication equipment, and storage medium
CN112035866B (en) Data encryption method, device, equipment and computer readable storage medium
CN114980083A (en) Secure communication method based on self-adaptive application and server
CN113645025A (en) Data encryption storage method, storage device, user equipment and storage medium
CN106612266B (en) Network forwarding method and equipment
WO2023030475A1 (en) Message processing method, apparatus, and system
CN109190394B (en) Mail transmission method based on encryption technology and terminal equipment
WO2023040330A1 (en) Data processing method, device, and system
CN117851093A (en) Equipment calling method and device, electronic equipment and storage medium
CN111143897A (en) Data security processing device, system and processing method
CN115827212A (en) Data processing method, device and system
CN117640676A (en) Signal processing method, device, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant