CN115361669A - Vehicle-mounted data encryption method and device, computer equipment and communication system - Google Patents
Vehicle-mounted data encryption method and device, computer equipment and communication system Download PDFInfo
- Publication number
- CN115361669A CN115361669A CN202211065590.7A CN202211065590A CN115361669A CN 115361669 A CN115361669 A CN 115361669A CN 202211065590 A CN202211065590 A CN 202211065590A CN 115361669 A CN115361669 A CN 115361669A
- Authority
- CN
- China
- Prior art keywords
- data
- encrypted
- encryption
- encryption method
- character string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 73
- 238000004891 communication Methods 0.000 title claims abstract description 46
- 238000012545 processing Methods 0.000 claims abstract description 7
- 238000004590 computer program Methods 0.000 claims description 9
- 238000005070 sampling Methods 0.000 claims description 6
- 230000000903 blocking effect Effects 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims description 4
- 230000017105 transposition Effects 0.000 claims description 3
- 238000004422 calculation algorithm Methods 0.000 abstract description 17
- 230000008569 process Effects 0.000 abstract description 12
- 238000004364 calculation method Methods 0.000 abstract description 8
- 125000004122 cyclic group Chemical group 0.000 abstract description 4
- 201000001858 Wilson-Turner syndrome Diseases 0.000 description 11
- 238000012049 whole transcriptome sequencing Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 9
- 238000012360 testing method Methods 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 4
- 101100435070 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) APN2 gene Proteins 0.000 description 3
- 101100401199 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) SAM2 gene Proteins 0.000 description 3
- 101100268779 Solanum lycopersicum ACO1 gene Proteins 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
- H04W4/42—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for mass transport vehicles, e.g. buses, trains or aircraft
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Aviation & Aerospace Engineering (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
技术领域technical field
本发明涉及通信技术领域,尤其涉及车载数据的加密方法、装置、计算机设备及通信系统。The invention relates to the field of communication technology, in particular to an encryption method, device, computer equipment and communication system for vehicle data.
背景技术Background technique
近年来,随着我国轨道交通发展,标准化的实施以及LKJ、TCMS、6A等车载系统的全面推广,我国轨道交通已经具备了车辆信息采集的条件,车地的数据传输的实时性、安全性需求越来越高。In recent years, with the development of my country's rail transit, the implementation of standardization and the comprehensive promotion of vehicle-mounted systems such as LKJ, TCMS, and 6A, my country's rail transit has already met the conditions for vehicle information collection, and the real-time and safety requirements for vehicle-to-ground data transmission Higher and higher.
传统的车地移动通信专网、4G移动通信网络、WLAN、卫星通信等车地通信无线技术均存在一定局限性,不能完全满足智能运维等系统对车地无缝数据传输的要求。随着通信技术的发展5G通信技术逐渐应用于轨道交通数据传输中。目前,国内外都已开始进行5G通信在铁路领域中的应用研究和试验。通信作为新基建之首。目前,国内外都已开始进行5G通信在铁路领域中的应用研究和试验。欧洲铁路研究了基于5G技术的列控系统(EuropeTrainControl System,ETCS),并开展了200km/h以下的列控系统试验;韩国在其专用轨道测试线上开展了基于5G技术的列车自动控制系统的试验;日本采用28GHz频谱完成了4K监控视频传输测试;我国在部分车站和线路实施了公网5G覆盖工程,在几个典型站场开展了毫米波点对点大容量数据传输应用,并正在环行铁道试验基地搭建铁路5G-R专网试验环境,准备开展相关试验。Traditional vehicle-ground mobile communication private network, 4G mobile communication network, WLAN, satellite communication and other vehicle-ground communication wireless technologies have certain limitations, and cannot fully meet the requirements of intelligent operation and maintenance systems for vehicle-ground seamless data transmission. With the development of communication technology, 5G communication technology is gradually applied to rail transit data transmission. At present, both at home and abroad have begun to carry out research and experiments on the application of 5G communication in the railway field. Communication is the first of the new infrastructure. At present, both at home and abroad have begun to carry out research and experiments on the application of 5G communication in the railway field. European Railways has researched a 5G-based train control system (Europe Train Control System, ETCS), and carried out train control system tests below 200km/h; South Korea has carried out a 5G-based train automatic control system test on its dedicated track test line. Test; Japan has completed 4K surveillance video transmission test using 28GHz spectrum; my country has implemented public network 5G coverage project in some stations and lines, carried out millimeter-wave point-to-point large-capacity data transmission application in several typical stations, and is testing circular railway The base builds a railway 5G-R private network test environment and prepares to carry out relevant tests.
现有地铁用车地无线传输系统是将车辆的运行状态信息和故障信息实时传递到运营监控中心,并对信息进行实时分析处理,实现对车辆运行状况的全程跟踪及故障预警。通常的实现方法是:车载主机通常按照500ms或1s的采样周期,采集车辆MVB总线和以太网总线数据,然后通过4G或者WLAN两种方式将数据发送至服务器。The existing subway vehicle-to-ground wireless transmission system transmits the operating status information and fault information of the vehicles to the operation monitoring center in real time, and analyzes and processes the information in real time, so as to realize the full tracking of the vehicle operating status and early warning of faults. The usual implementation method is: the vehicle host usually collects the vehicle MVB bus and Ethernet bus data according to the sampling period of 500ms or 1s, and then sends the data to the server through 4G or WLAN.
由于一条地铁线路通常有几十列列车同时运行,每列列车都需要实时向地面云服务器推送数据,若数据加密解密算法复杂,会导致服务器解析数据负荷过重,甚至造成严重丢包得现象,因此鉴于地铁列车车地通讯的特点,车地传输中的数据加解密算法需要即保证数据安全可靠又需要加密解密快捷高效,这就对加解密算法提出较高的特殊要求。Since a subway line usually has dozens of trains running at the same time, each train needs to push data to the ground cloud server in real time. If the data encryption and decryption algorithm is complicated, the server will overload the analysis data, and even cause serious packet loss. Therefore, in view of the characteristics of the train-to-ground communication of subway trains, the data encryption and decryption algorithms in train-to-ground transmission need to ensure data security and reliability as well as fast and efficient encryption and decryption, which puts forward higher special requirements for encryption and decryption algorithms.
发明内容Contents of the invention
为了解决上述现有技术中存在的技术问题,本发明提供了一种车载数据的加密方法、装置、计算机设备及存储介质,提供组raid功能的全自动化实现后,在自动化测试系统可将多个用例放在同一任务中按照顺序自动执行测试,每条用例的组raid操作自动完成。In order to solve the technical problems existing in the above-mentioned prior art, the present invention provides a kind of encryption method, device, computer equipment and storage medium of vehicle-mounted data, after providing the fully automatic realization of group raid function, multiple Use cases are placed in the same task to automatically execute tests in sequence, and the group raid operation of each use case is automatically completed.
为实现上述目的,本发明实施例提供了如下的技术方案:In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
根据本发明的第一方面,提供一种车载数据的加密方法,该方法包括以下步骤:According to a first aspect of the present invention, there is provided a method for encrypting vehicle-mounted data, the method comprising the following steps:
获取待加密数据,待加密数据为待加密字符串;Obtain the data to be encrypted, the data to be encrypted is a character string to be encrypted;
随机选择加密方法并生成随机数字,基于待加密字符串和随机数字获取指定字符串;Randomly select the encryption method and generate a random number, and obtain the specified string based on the string to be encrypted and the random number;
根据随机选择的加密方法对指定字符串进行加密处理,并生成加密指定字符串;Encrypt the specified string according to a randomly selected encryption method, and generate an encrypted specified string;
加密处理后的加密指定字符串排列组合,生成加密字符串。The encrypted specified character strings are permuted and combined after encryption processing to generate encrypted character strings.
作为本发明的进一步方案,其中,待加密数据来自列车的两种总线数据,分别是MVB总线数据和以太网总线数据。As a further solution of the present invention, wherein the data to be encrypted comes from two types of bus data of the train, namely MVB bus data and Ethernet bus data.
作为本发明的进一步方案,MVB总线数据使用采样方式获取,以太网总线数据使用阻塞监听方式获取。As a further solution of the present invention, the MVB bus data is obtained by sampling, and the Ethernet bus data is obtained by blocking monitoring.
作为本发明的进一步方案,指定字符串为根据所述随机数字的值从待加密字符串的编辑位起选定的部分,指定字符为随机数字的值在指定字符串的对应字符。As a further solution of the present invention, the specified character string is a part selected from the editing bit of the character string to be encrypted according to the value of the random number, and the specified character is the corresponding character of the value of the random number in the specified character string.
作为本发明的进一步方案,加密方法包括:As a further solution of the present invention, the encryption method includes:
随机排序待加密字符串的通讯的数据帧,每个数据帧在随机排序中都被分配一个编号n;Randomly sort the communication data frames of the character strings to be encrypted, and each data frame is assigned a number n in the random sorting;
选取数据帧的编号n和数据帧的有效数据长度m两个随机量作为加密解密因子。Two random quantities, the number n of the data frame and the effective data length m of the data frame, are selected as encryption and decryption factors.
根据本发明的第二方面,提供一种轨道交通车载数据的加密装置,该装置包括:According to a second aspect of the present invention, there is provided an encryption device for rail transit on-board data, the device comprising:
数据获取模块,其配置用于获取待加密数据,待加密数据为待加密字符串。The data acquisition module is configured to acquire data to be encrypted, and the data to be encrypted is a character string to be encrypted.
加密模块,其配置用用于随机选择加密方法并生成随机数字,基于待加密字符串和随机数字获取指定字符串,并根据随机选择的加密方法对指定字符串进行加密处理,并生成加密指定字符串;The encryption module is configured to randomly select an encryption method and generate a random number, obtain a specified string based on the string to be encrypted and the random number, encrypt the specified string according to the randomly selected encryption method, and generate encrypted specified characters string;
加密字符串生成,其配置用用于对加密处理后的加密指定字符进行串排列组合,生成加密字符串。Encrypted character string generation, its configuration is used to perform string arrangement and combination of encrypted specified characters after encryption processing to generate an encrypted character string.
根据本发明的第三方面,提供一种计算机设备,包括存储器和处理器,存储器存储有计算机程序,处理器加载并执行计算机程序时实现如上所述的车载数据的加密方法的步骤。According to a third aspect of the present invention, a computer device is provided, including a memory and a processor, the memory stores a computer program, and when the processor loads and executes the computer program, the steps of the method for encrypting vehicle-mounted data as described above are realized.
根据本发明的第四方面,提供一种通信系统,该通信系统包括至少一个计算机设备和地面应用设备。其中计算机设备与地面应用设备通信连接。According to a fourth aspect of the present invention there is provided a communication system comprising at least one computer device and ground application equipment. Wherein the computer equipment communicates with the ground application equipment.
作为本发明的进一步方案,计算机设备设置有多路以太网通讯接口和一路MVB通讯接口。As a further solution of the present invention, the computer equipment is provided with multiple Ethernet communication interfaces and one MVB communication interface.
本发明提供的技术方案,具有如下有益效果:The technical scheme provided by the invention has the following beneficial effects:
本发明提供的车载数据的加密方法、装置、计算机设备及存储介质,本发明由于加密解密过程使用的时字节直接异或操作,不涉及类似其他算法的循环冗余计算,因此计算速度高效,CPU负荷较低。又因为每个密钥序列都具备较强的随机性和变化性,因此数据安全能够最大限度保证。本发明的数据帧加密算法有效解决了列车彻底传输数据安全加密问题。The encryption method, device, computer equipment and storage medium of the vehicle-mounted data provided by the present invention, because the encryption and decryption process used in the present invention is directly XOR operation, does not involve cyclic redundancy calculation similar to other algorithms, so the calculation speed is efficient, CPU load is low. And because each key sequence has strong randomness and variability, data security can be guaranteed to the maximum extent. The data frame encryption algorithm of the present invention effectively solves the problem of safe encryption of train transmission data.
附图说明Description of drawings
图1为本发明一个实施例的轨道交通车载数据的加密方法的流程图;Fig. 1 is the flow chart of the encryption method of rail transit vehicle-mounted data of an embodiment of the present invention;
图2为本发明一个实施例的轨道交通车载数据的加密装置结构框图;Fig. 2 is the structural block diagram of the encryption device of rail transit vehicle-mounted data of an embodiment of the present invention;
图3为本发明一个实施例的通信系统的结构框图。Fig. 3 is a structural block diagram of a communication system according to an embodiment of the present invention.
图中:数据获取模块-100、加密模块-200、加密字符串生成模块-300。In the figure: data acquisition module-100, encryption module-200, encrypted character string generation module-300.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
附图中所示的流程图仅是示例说明,不是必须包括所有的内容和操作/步骤,也不是必须按所描述的顺序执行。例如,有的操作/步骤还可以分解、组合或部分合并,因此实际执行的顺序有可能根据实际情况改变。The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations/steps, nor must they be performed in the order described. For example, some operations/steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation.
应当理解,在此本发明说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本发明。如在本发明说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。It should be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include plural referents unless the context clearly dictates otherwise.
目前通用的加密算法是一种加密算法和解密算法的统称,是密码体制的核心。密码算法可以看成一些交换的组合,当输入为明文时,经过这些变换,输出就为密文。反之,当输入为密文时,经过密码变换,输出为明文,这就是揭秘交换的过程。常用的加密算法为:AES/RSA/ECC/Diffie-heliman,SHA-1/SHA-256。缺点是这些方法解密的时候都需要逐位运算,CPU负荷较大。同时,由于加密解密算法公开,都具备了破解方法,因此无论从效率还是安全都不够好。The current general encryption algorithm is a general term for encryption algorithm and decryption algorithm, which is the core of the cryptosystem. A cryptographic algorithm can be regarded as a combination of exchanges. When the input is plaintext, after these transformations, the output is ciphertext. Conversely, when the input is ciphertext, the output is plaintext after cipher transformation, which is the process of exchanging secrets. Commonly used encryption algorithms are: AES/RSA/ECC/Diffie-heliman, SHA-1/SHA-256. The disadvantage is that these methods require bit-by-bit operations when decrypting, and the CPU load is relatively large. At the same time, since the encryption and decryption algorithms are publicly available, there are cracking methods, so neither efficiency nor security is good enough.
本发明加密解密过程使用的时字节直接异或操作,不涉及类似其他算法的循环冗余计算,因此计算速度高效,CPU负荷较低。The encryption and decryption process of the present invention uses direct XOR operation of bytes, and does not involve cyclic redundancy calculation similar to other algorithms, so the calculation speed is high and the CPU load is low.
具体地,下面结合附图,对本发明实施例作进一步阐述。Specifically, the embodiments of the present invention will be further described below in conjunction with the accompanying drawings.
请参阅图1,图1是本发明实施例提供的一种车载数据的加密方法的流程图,如图1所示,该车载数据的加密方法包括步骤S10至步骤S30。Please refer to FIG. 1 . FIG. 1 is a flowchart of a method for encrypting vehicle-mounted data provided by an embodiment of the present invention. As shown in FIG. 1 , the method for encrypting vehicle-mounted data includes steps S10 to S30.
S10、获取待加密数据,所述待加密数据为待加密字符串。S10. Acquire data to be encrypted, where the data to be encrypted is a character string to be encrypted.
其中,所述待加密数据来自列车的两种总线数据,分别是MVB总线数据和以太网总线数据,两种总线数据均是二进制字节流数组。Wherein, the data to be encrypted comes from two kinds of bus data of the train, namely MVB bus data and Ethernet bus data, both of which are binary byte stream arrays.
在本发明的实施例中,MVB总线数据使用采样方式获取,针对每个宿端口(每个列车子系统都会分配一个或若干个端口地址用于发送MVB控车数据),按照特征周期采样,特征周期分别有32ms、64ms、128ms、256ms、512ms和1024ms。数据长度在4~32字节范围内。In an embodiment of the present invention, the MVB bus data is acquired using a sampling method, and for each sink port (each train subsystem will allocate one or several port addresses for sending MVB vehicle control data), it is sampled according to the characteristic period, and the characteristic The periods are 32ms, 64ms, 128ms, 256ms, 512ms and 1024ms respectively. The data length is in the range of 4 to 32 bytes.
在本发明的实施例中,以太网总线数据使用阻塞监听方式获取,即主机设备始终监听总线,当子系统发送UDP组播数据报文时,即可抓取进入应用程序。In the embodiment of the present invention, the Ethernet bus data is obtained by blocking monitoring, that is, the host device always monitors the bus, and when the subsystem sends a UDP multicast data message, it can be captured and entered into the application program.
S20、随机选择加密方法并生成随机数字,基于待加密字符串和随机数字获取指定字符串;S20. Randomly select an encryption method and generate a random number, and obtain a specified character string based on the character string to be encrypted and the random number;
根据随机选择的加密方法对指定字符串进行加密处理,并生成加密指定字符串。Encrypts the specified character string according to a randomly selected encryption method, and generates an encrypted specified character string.
其中,所述加密方法包括字符添加加密方法、换位加密方法。Wherein, the encryption method includes a character adding encryption method and a transposition encryption method.
所述指定字符串为根据所述随机数字的值从待加密字符串的编辑位起选定的部分,指定字符为随机数字的值在所述指定字符串的对应字符。The specified character string is a part selected from the editing bit of the character string to be encrypted according to the value of the random number, and the specified character is a corresponding character of the value of the random number in the specified character string.
其中,所述加密方法包括:Wherein, the encryption method includes:
随机排序待加密字符串的通讯的数据帧,每个数据帧在随机排序中都被分配一个编号n;Randomly sort the communication data frames of the character strings to be encrypted, and each data frame is assigned a number n in the random sorting;
选取数据帧的编号n和数据帧的有效数据长度m两个随机量作为加密解密因子。Two random quantities, the number n of the data frame and the effective data length m of the data frame, are selected as encryption and decryption factors.
在本发明的实施例中,本发明按照列车相关子系统的人为系统调试顺序,随机排序车地通讯的所有数据帧,每个数据帧在随机排序中都被分配了一个编号n,编号n的范围在1≤n≤311。另外,每个通讯数据帧都有一个自己的有效数据长度m,例如最短的数据帧有效数据长度4字节,最长的则3792字节,他们也是根据子系统相关数据帧和项目要求随时变化的不确定量。本发明选取这两个随机量作为加密解密因子,即数据帧编号n和数据帧长度m。由于调试过程中,文档会有插入,数据长度也会有变更,因此n和m都是在调车过程中变化的,提前捕获的概率极小。能够保证数据的安全。In the embodiment of the present invention, the present invention randomly sorts all data frames of the train-ground communication according to the artificial system debugging sequence of the train-related subsystems, and each data frame is assigned a number n in the random sorting, and the number n The range is 1≤n≤311. In addition, each communication data frame has its own effective data length m. For example, the shortest data frame has an effective data length of 4 bytes, and the longest is 3792 bytes. They also change at any time according to the subsystem-related data frames and project requirements. uncertain amount. The present invention selects these two random quantities as encryption and decryption factors, namely the data frame number n and the data frame length m. During the debugging process, the document will be inserted and the data length will also be changed, so n and m are changed during the shunting process, and the probability of early capture is extremely small. Data security can be guaranteed.
基于上文的数据帧编号n和数据长度m,唯一生成一组跟数据长度一致的密钥。这个密钥的初始值为n与255的余数,位置编号为0。记作key[0]=n%255。Based on the above data frame number n and data length m, uniquely generate a set of keys consistent with the data length. The initial value of this key is the remainder of n and 255, and the position number is 0. It is recorded as key[0]=n%255.
用位置为0的密钥key[0]的值与同位置的待加密数据data[0]的值相异或得到0位置加密数据secret[0]的值。Use the value of key[0] whose position is 0 to be different from the value of data[0] to be encrypted at the same position or obtain the value of encrypted data secret[0] at position 0.
在本发明的实施例中,对待加密数据之后的m-1长度数据,同样生成m-1长度的密钥序列,每个密钥序列位置的值为key[m]=(n+m-1)%255。即,整个密钥序列的值为(n)%255,(n+1)%255,(n+2)%255……(n+m-1)%255的数据序列。由于每个数据帧的编号和数据长度两个维度唯有确定,因此每个数据帧的密钥序列唯一确定。加密的时候,发送端直接用数据帧的有效数据的每个字节异或其密钥序列的对应字节生成密文,即secret[i]=key[i]^data[i],其中0≤i≤m-1。In an embodiment of the present invention, for the m-1 length data after the data to be encrypted, a key sequence of m-1 length is also generated, and the value of each key sequence position is key[m]=(n+m-1 )% 255. That is, the value of the entire key sequence is a data sequence of (n)%255, (n+1)%255, (n+2)%255...(n+m-1)%255. Since the number and data length of each data frame are uniquely determined, the key sequence of each data frame is uniquely determined. When encrypting, the sender directly uses each byte of the valid data of the data frame and the corresponding byte of the key sequence to generate the ciphertext, that is, secret[i]=key[i]^data[i], where 0 ≤i≤m-1.
通过S20方式生成的密钥序列后,添加明文的识别信息(端口地址、时间戳、长度)构成明文密文混合的加密数据流。After the key sequence generated by S20, plaintext identification information (port address, time stamp, length) is added to form an encrypted data stream in which plaintext and ciphertext are mixed.
S30、加密处理后的加密指定字符串排列组合,生成加密字符串。S30. Arranging and combining the encrypted designated character strings after the encryption processing to generate an encrypted character string.
本发明由于每个数据帧的编号和数据长度两个维度唯有确定,因此每个数据帧的密钥序列唯一确定。加密的时候,发送端直接用数据帧的有效数据的每个字节异或其密钥序列的对应字节生成密文,即data[0]^(n)%255,data[1]^(n+1)%255……data[m-1]^(n+m)%255。之加密有效数据部分,不加密头部信息,可进一步节省CPU负荷。解密的时候,算法一致,可用收到的密文序列的各个字节,依次异或密钥序列的各个字节得到明文。In the present invention, since the number and data length of each data frame are uniquely determined, the key sequence of each data frame is uniquely determined. When encrypting, the sender directly uses each byte of the valid data of the data frame and its corresponding byte of the key sequence to generate the ciphertext, that is, data[0]^(n)%255, data[1]^( n+1)%255...data[m-1]^(n+m)%255. The effective data part is encrypted, and the header information is not encrypted, which can further save CPU load. When decrypting, the algorithm is consistent, and each byte of the received ciphertext sequence can be used to sequentially XOR each byte of the key sequence to obtain the plaintext.
本发明由于加密解密过程使用的时字节直接异或操作,不涉及类似其他算法的循环冗余计算,因此计算速度高效,CPU负荷较低。又因为每个密钥序列都具备较强的随机性和变化性,因此数据安全能够最大限度保证。本发明的数据帧加密算法有效解决了列车彻底传输数据安全加密问题。Because the encryption and decryption process of the present invention uses direct XOR operation of bytes and does not involve cyclic redundancy calculation similar to other algorithms, the calculation speed is high and the CPU load is low. And because each key sequence has strong randomness and variability, data security can be guaranteed to the maximum extent. The data frame encryption algorithm of the present invention effectively solves the problem of safe encryption of train transmission data.
应该理解的是,上述虽然是按照某一顺序描述的,但是这些步骤并不是必然按照上述顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,本实施例的一部分步骤可以包括多个步骤或者多个阶段,这些步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤中的步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the above description is in a certain order, these steps are not necessarily executed in sequence in the above order. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, some of the steps in this embodiment may include multiple steps or stages, and these steps or stages are not necessarily executed at the same time, but may be executed at different times, and the order of execution of these steps or stages is also different. It must be performed sequentially, but may be performed alternately or alternately with other steps or at least a part of steps or stages in other steps.
在一个实施例中,参见图3所示,在本发明的实施例中还提供了轨道交通车载数据的加密装置,该装置包括数据获取模块100、加密模块200和加密字符串生成模块300。In one embodiment, as shown in FIG. 3 , an encryption device for rail transit on-board data is also provided in an embodiment of the present invention, and the device includes a
数据获取模块100,用于获取待加密数据,所述待加密数据为待加密字符串。The
其中,所述数据获取模块100,从MVB总线以太网总线获取待加密数据,获取的所述待加密数据的均是二进制字节流数组。Wherein, the
在本发明的实施例中,MVB总线的待加密数据使用采样方式获取,针对每个宿端口(每个列车子系统都会分配一个或若干个端口地址用于发送MVB控车数据),按照特征周期采样,特征周期分别有32ms、64ms、128ms、256ms、512ms和1024ms。数据长度在4~32字节范围内。In an embodiment of the present invention, the data to be encrypted of the MVB bus is acquired using a sampling method, and for each sink port (each train subsystem will allocate one or several port addresses for sending MVB vehicle control data), according to the characteristic period Sampling, the characteristic periods are 32ms, 64ms, 128ms, 256ms, 512ms and 1024ms respectively. The data length is in the range of 4 to 32 bytes.
在本发明的实施例中,以太网总线的待加密数据使用阻塞监听方式获取,即主机设备始终监听总线,当子系统发送UDP组播数据报文时,即可抓取进入应用程序。In the embodiment of the present invention, the data to be encrypted on the Ethernet bus is obtained using a blocking monitoring method, that is, the host device always monitors the bus, and when the subsystem sends a UDP multicast data message, it can be captured and entered into the application program.
加密模块200,用于随机选择加密方法并生成随机数字,基于待加密字符串和随机数字获取指定字符串;根据随机选择的加密方法对指定字符串进行加密处理,并生成加密指定字符串。The
其中,所述加密方法包括字符添加加密方法、换位加密方法。Wherein, the encryption method includes a character adding encryption method and a transposition encryption method.
所述指定字符串为根据所述随机数字的值从待加密字符串的编辑位起选定的部分,指定字符为随机数字的值在所述指定字符串的对应字符。The specified character string is a part selected from the editing bit of the character string to be encrypted according to the value of the random number, and the specified character is a corresponding character of the value of the random number in the specified character string.
其中,所述加密方法包括:Wherein, the encryption method includes:
随机排序待加密字符串的通讯的数据帧,每个数据帧在随机排序中都被分配一个编号n;Randomly sort the communication data frames of the character strings to be encrypted, and each data frame is assigned a number n in the random sorting;
选取数据帧的编号n和数据帧的有效数据长度长度m两个随机量作为加密解密因子。Two random quantities, the number n of the data frame and the effective data length m of the data frame, are selected as encryption and decryption factors.
在本发明的实施例中,本发明按照列车相关子系统的人为系统调试顺序,随机排序车地通讯的所有数据帧,每个数据帧在随机排序中都被分配了一个编号n,编号n的范围在1≤n≤311。另外,每个通讯数据帧都有一个自己的有效数据长度m,例如最短的数据帧有效数据长度4字节,最长的则3792字节,他们也是根据子系统相关数据帧和项目要求随时变化的不确定量。本发明选取这两个随机量作为加密解密因子,即数据帧编号n和数据帧长度m。由于调试过程中,文档会有插入,数据长度也会有变更,因此n和m都是在调车过程中变化的,提前捕获的概率极小。能够保证数据的安全。In the embodiment of the present invention, the present invention randomly sorts all data frames of the train-ground communication according to the artificial system debugging sequence of the train-related subsystems, and each data frame is assigned a number n in the random sorting, and the number n The range is 1≤n≤311. In addition, each communication data frame has its own effective data length m. For example, the shortest data frame has an effective data length of 4 bytes, and the longest is 3792 bytes. They also change at any time according to the subsystem-related data frames and project requirements. uncertain amount. The present invention selects these two random quantities as encryption and decryption factors, namely the data frame number n and the data frame length m. During the debugging process, the document will be inserted and the data length will also be changed, so n and m are changed during the shunting process, and the probability of early capture is extremely small. Data security can be guaranteed.
基于上文的数据帧编号n和数据长度m,唯一生成一组跟数据长度一致的密钥。这个密钥的初始值为n与255的余数,位置编号为0。记作key[0]=n%255。Based on the above data frame number n and data length m, uniquely generate a set of keys consistent with the data length. The initial value of this key is the remainder of n and 255, and the position number is 0. It is recorded as key[0]=n%255.
用位置为0的密钥key[0]的值与同位置的待加密数据data[0]的值相异或得到0位置加密数据secret[0]的值。Use the value of key[0] whose position is 0 to be different from the value of data[0] to be encrypted at the same position or obtain the value of encrypted data secret[0] at position 0.
在本发明的实施例中,对待加密数据之后的m-1长度数据,同样生成m-1长度的密钥序列,每个密钥序列位置的值为key[m]=(n+m-1)%255。即,整个密钥序列的值为(n)%255,(n+1)%255,(n+2)%255……(n+m-1)%255的数据序列。由于每个数据帧的编号和数据长度两个维度唯有确定,因此每个数据帧的密钥序列唯一确定。加密的时候,发送端直接用数据帧的有效数据的每个字节异或其密钥序列的对应字节生成密文,即secret[i]=key[i]^data[i],其中0≤i≤m-1。In an embodiment of the present invention, for the m-1 length data after the data to be encrypted, a key sequence of m-1 length is also generated, and the value of each key sequence position is key[m]=(n+m-1 )% 255. That is, the value of the entire key sequence is a data sequence of (n)%255, (n+1)%255, (n+2)%255...(n+m-1)%255. Since the number and data length of each data frame are uniquely determined, the key sequence of each data frame is uniquely determined. When encrypting, the sender directly uses each byte of the valid data of the data frame and the corresponding byte of the key sequence to generate the ciphertext, that is, secret[i]=key[i]^data[i], where 0 ≤i≤m-1.
生成的密钥序列后,添加明文的识别信息(端口地址、时间戳、长度)构成明文密文混合的加密数据流。After the key sequence is generated, add plaintext identification information (port address, time stamp, length) to form an encrypted data stream in which plaintext and ciphertext are mixed.
加密字符串生成300,用于对加密处理后的加密指定字符进行串排列组合,生成加密字符串。The encrypted
本发明由于每个数据帧的编号和数据长度两个维度唯有确定,因此每个数据帧的密钥序列唯一确定。加密的时候,发送端直接用数据帧的有效数据的每个字节异或其密钥序列的对应字节生成密文,即data[0]^(n)%255,data[1]^(n+1)%255……data[m-1]^(n+m)%255。之加密有效数据部分,不加密头部信息,可进一步节省CPU负荷。解密的时候,算法一致,可用收到的密文序列的各个字节,依次异或密钥序列的各个字节得到明文。In the present invention, since the number and data length of each data frame are uniquely determined, the key sequence of each data frame is uniquely determined. When encrypting, the sender directly uses each byte of the valid data of the data frame and its corresponding byte of the key sequence to generate the ciphertext, that is, data[0]^(n)%255, data[1]^( n+1)%255...data[m-1]^(n+m)%255. The effective data part is encrypted, and the header information is not encrypted, which can further save CPU load. When decrypting, the algorithm is consistent, and each byte of the received ciphertext sequence can be used to sequentially XOR each byte of the key sequence to obtain the plaintext.
在一个实施例中,在本发明的实施例中还提供了一种计算机设备,包括至少一个处理器,以及与所述至少一个处理器通信连接的存储器,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行所述的车载数据的加密方法,该处理器执行指令时实现上述方法实施例中的步骤。In one embodiment, the embodiment of the present invention also provides a computer device, including at least one processor, and a memory connected to the at least one processor in communication, and the memory stores information that can be accessed by the at least one processor. An instruction executed by a processor, the instruction is executed by the at least one processor, so that the at least one processor executes the method for encrypting vehicle-mounted data, and when the processor executes the instruction, the method in the above method embodiment is implemented step.
所述计算机设备包括用户设备与网络设备。其中,所述用户设备包括但不限于电脑、智能手机、PDA等;所述网络设备包括但不限于单个网络服务器、多个网络服务器组成的服务器组或基于云计算(Cloud Computing)的由大量计算机或网络服务器构成的云,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个超级虚拟计算机。其中,所述计算机设备可单独运行来实现本发明,也可接入网络并通过与网络中的其他计算机设备的交互操作来实现本发明。其中,所述计算机设备所处的网络包括但不限于互联网、广域网、城域网、局域网、VPN网络等。The computer equipment includes user equipment and network equipment. Wherein, the user equipment includes, but is not limited to, computers, smart phones, PDAs, etc.; Or a cloud composed of network servers, among them, cloud computing is a kind of distributed computing, a super virtual computer composed of a group of loosely coupled computer sets. Wherein, the computer device can operate independently to realize the present invention, and can also be connected to a network and realize the present invention by interacting with other computer devices in the network. Wherein, the network where the computer device is located includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
还应当进理解,在本发明说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。It should also be understood that the term "and/or" used in the description of the present invention and the appended claims refers to any combination and all possible combinations of one or more of the associated listed items, and includes these combinations .
在本发明的一个实施例中还提供了一种存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现上述方法实施例中的步骤。An embodiment of the present invention also provides a storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps in the above method embodiments are implemented.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述方法的实施例的流程。其中,本发明所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented through computer programs to instruct related hardware, and the computer programs can be stored in a non-volatile computer-readable memory In the medium, when the computer program is executed, it may include the process of the above-mentioned method embodiment. Wherein, any reference to memory, storage, database or other media used in the embodiments of the present invention may include at least one of non-volatile and volatile memory.
在一个实施例中,参见图3所示,在本发明的实施例中还提供了通信系统,该通信系统包括不少于一个的计算机设备和地面应用设备;计算机设备与地面应用设备通信连接。In one embodiment, as shown in FIG. 3 , a communication system is also provided in the embodiment of the present invention, the communication system includes no less than one computer device and ground application equipment; the computer equipment and the ground application equipment are communicatively connected.
在本发明的实施例中,其中计算机设备设置在车辆上,所述车辆上设置有不少于两个的计算机设备。In the embodiment of the present invention, wherein the computer equipment is arranged on a vehicle, the vehicle is provided with no less than two computer equipment.
所述计算机设备设置有多路以太网通讯接口和一路MVB通讯接口。The computer equipment is provided with multiple Ethernet communication interfaces and one MVB communication interface.
在本发明的实施例中,所述以太网通讯接口包括ETH1通讯接口和ETH2通讯接口。In an embodiment of the present invention, the Ethernet communication interface includes an ETH1 communication interface and an ETH2 communication interface.
在本发明的实施例中,所述ETH1通讯接口主要负责采集列车各以太网通讯子系统数据,并负责同一列车两端WTS的冗余联络通讯,同时允许RDAS(WTS适配桌面数据分析软件)连接。In an embodiment of the present invention, the ETH1 communication interface is mainly responsible for collecting the data of each Ethernet communication subsystem of the train, and is responsible for the redundant communication of the WTS at both ends of the same train, while allowing RDAS (WTS to adapt to desktop data analysis software) connect.
在本发明的实施例中,同一列车两端的WTS使用ETH1实现冗余联络。两端WTS分别使用UDP间隔100ms发送联络报文,报文中携带主从标识。主从机同时工作,但只有主机给地面应用设备上报实时数据。In the embodiment of the present invention, the WTSs at both ends of the same train use ETH1 to realize redundant communication. The WTSs at both ends use UDP to send contact messages at an interval of 100ms, and the messages carry the master-slave identifier. The master and slave work at the same time, but only the master reports real-time data to the ground application equipment.
在本发明的实施例中,主机上电启动,自检完成后即可开始正常工作,不判断从机工作状态。In the embodiment of the present invention, the master is powered on and starts to work normally after the self-check is completed, and the working status of the slave is not judged.
在本发明的实施例中,从机上电启动30s内或正常工作期间连续1s内,如果未接收到主机冗余联络信号,则接管上报实时数据的工作。当从机接管上报实时数据期间,如果突然接收到主机冗余联络报文后,则立刻终止上报实时数据工作,转为从机默认工作方式。此时主机接接管上报工作。In the embodiment of the present invention, within 30s of power-on start-up or continuous 1s during normal operation, if the slave does not receive the redundant contact signal from the master, it will take over the work of reporting real-time data. When the slave machine takes over and reports real-time data, if it suddenly receives a redundant contact message from the master machine, it will immediately stop reporting real-time data and switch to the default working mode of the slave machine. At this point the host takes over the reporting work.
在本发明的实施例中,所述ETH2通讯接口主要负责WTS与地面应用设备的通讯联络。WTS通过ETH2通讯接口,使用TCP方式,每隔500ms将实时数据发送给地面应用设备。每个WTS与地面应用设备维持TCP长连接方式,仅有作为主的WTS实时上报数据。同时WTS定期(可配置)将数据记录文件通过FTP方式传送给地面应用设备。In the embodiment of the present invention, the ETH2 communication interface is mainly responsible for the communication between the WTS and the ground application equipment. WTS sends real-time data to the ground application equipment every 500ms through the ETH2 communication interface and TCP mode. Each WTS maintains a TCP long connection with the ground application equipment, and only the main WTS reports data in real time. At the same time, WTS regularly (configurable) transmits data record files to ground application equipment through FTP.
实时数据TCP连接端口:32100Real-time data TCP connection port: 32100
实时数据上报周期:500msReal-time data reporting cycle: 500ms
维持TCP长连接(连上后始终保持连接,一旦断开,立刻重新尝试连接)。Maintain TCP long connection (always keep connected after connection, once disconnected, try to connect again immediately).
在本发明的实施例中,所述MVB通讯接口主要负责采集列车各MVB通讯子系统数据。列车MVB子系统包括CCU等(TBD)。In an embodiment of the present invention, the MVB communication interface is mainly responsible for collecting data of each MVB communication subsystem of the train. The train MVB subsystem includes CCU, etc. (TBD).
WTS每隔固定时间(周期可修改)生成一个历史数据记录文件并上传至地面专家系统,历史数据记录文件中包含该固定时间内以太网及MVB总线所有数据帧的飞行记录(总线上传输的数据帧)。文件大小不固定,文件内数据帧的飞行记录存储顺序按照飞行时间戳排列。为了防止数据丢失,WTS内部带有64G的本地存储空间,可以分布式备份历史数据记录文件。同时为了节省存储空间,文件使用zip压缩方式(可压缩10~15倍)。WTS generates a historical data record file every fixed time (period can be modified) and uploads it to the ground expert system. The historical data record file contains the flight records of all data frames of the Ethernet and MVB bus within the fixed time (data transmitted on the bus frame). The file size is not fixed, and the flight record storage sequence of the data frame in the file is arranged according to the flight time stamp. In order to prevent data loss, WTS has a 64G local storage space inside, which can back up historical data record files in a distributed manner. At the same time, in order to save storage space, the file uses the zip compression method (can be compressed by 10 to 15 times).
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements and improvements made within the spirit and principles of the present invention should be included in the protection of the present invention. within range.
以上是本发明公开的示例性实施例,但是应当注意,在不背离权利要求限定的本发明实施例公开的范围的前提下,可以进行多种改变和修改。根据这里描述的公开实施例的方法权利要求的功能、步骤和/或动作不需以任何特定顺序执行。此外,尽管本发明实施例公开的元素可以以个体形式描述或要求,但除非明确限制为单数,也可以理解为多个。The above are the exemplary embodiments disclosed in the present invention, but it should be noted that various changes and modifications can be made without departing from the scope of the disclosed embodiments of the present invention defined in the claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. In addition, although the elements disclosed in the embodiments of the present invention may be described or required in an individual form, they may also be understood as a plurality unless explicitly limited to a singular number.
应当理解的是,在本文中使用的,除非上下文清楚地支持例外情况,单数形式“一个”旨在也包括复数形式。还应当理解的是,在本文中使用的“和/或”是指包括一个或者一个以上相关联地列出的项目的任意和所有可能组合。上述本发明实施例公开实施例序号仅仅为了描述,不代表实施例的优劣。It should be understood that as used herein, the singular form "a" and "an" are intended to include the plural forms as well, unless the context clearly supports an exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items. The serial numbers of the embodiments disclosed in the above-mentioned embodiments of the present invention are only for description, and do not represent the advantages and disadvantages of the embodiments.
所属领域的普通技术人员应当理解:以上任何实施例的讨论仅为示例性的,并非旨在暗示本发明实施例公开的范围(包括权利要求)被限于这些例子;在本发明实施例的思路下,以上实施例或者不同实施例中的技术特征之间也可以进行组合,并存在如上的本发明实施例的不同方面的许多其它变化,为了简明它们没有在细节中提供。因此,凡在本发明实施例的精神和原则之内,所做的任何省略、修改、等同替换、改进等,均应包含在本发明实施例的保护范围之内。Those of ordinary skill in the art should understand that: the discussion of any of the above embodiments is exemplary only, and is not intended to imply that the scope (including claims) disclosed by the embodiments of the present invention is limited to these examples; under the idea of the embodiments of the present invention , the technical features in the above embodiments or different embodiments can also be combined, and there are many other changes in different aspects of the above embodiments of the present invention, which are not provided in details for the sake of brevity. Therefore, within the spirit and principle of the embodiments of the present invention, any omissions, modifications, equivalent replacements, improvements, etc., shall be included in the protection scope of the embodiments of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211065590.7A CN115361669A (en) | 2022-09-01 | 2022-09-01 | Vehicle-mounted data encryption method and device, computer equipment and communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211065590.7A CN115361669A (en) | 2022-09-01 | 2022-09-01 | Vehicle-mounted data encryption method and device, computer equipment and communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115361669A true CN115361669A (en) | 2022-11-18 |
Family
ID=84004603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211065590.7A Pending CN115361669A (en) | 2022-09-01 | 2022-09-01 | Vehicle-mounted data encryption method and device, computer equipment and communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115361669A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579392A (en) * | 2024-01-16 | 2024-02-20 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972927A (en) * | 2017-03-31 | 2017-07-21 | 杭州翼兔网络科技有限公司 | A kind of encryption method and system for different safety class |
CN110266682A (en) * | 2019-06-18 | 2019-09-20 | 杭州情咖网络技术有限公司 | Data encryption method, device, mobile terminal and decryption method |
CN111404692A (en) * | 2020-03-05 | 2020-07-10 | 湖南城市学院 | A blockchain identity information confirmation system and confirmation method based on big data |
CN114553491A (en) * | 2022-01-24 | 2022-05-27 | 大唐互联科技(武汉)有限公司 | Data grading encryption method, system and storage medium |
-
2022
- 2022-09-01 CN CN202211065590.7A patent/CN115361669A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106972927A (en) * | 2017-03-31 | 2017-07-21 | 杭州翼兔网络科技有限公司 | A kind of encryption method and system for different safety class |
CN110266682A (en) * | 2019-06-18 | 2019-09-20 | 杭州情咖网络技术有限公司 | Data encryption method, device, mobile terminal and decryption method |
CN111404692A (en) * | 2020-03-05 | 2020-07-10 | 湖南城市学院 | A blockchain identity information confirmation system and confirmation method based on big data |
CN114553491A (en) * | 2022-01-24 | 2022-05-27 | 大唐互联科技(武汉)有限公司 | Data grading encryption method, system and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579392A (en) * | 2024-01-16 | 2024-02-20 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
CN117579392B (en) * | 2024-01-16 | 2024-04-16 | 北京富通亚讯网络信息技术有限公司 | Reliable data transmission method, device, equipment and medium based on encryption processing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN206712810U (en) | A kind of high speed password card based on PCI E buses | |
CN102497377B (en) | Method for remote-monitoring data safety transmission of fuel cell standby power supply of communication base station | |
KR101512502B1 (en) | Ami security system applied with hardware security module | |
CN106960166A (en) | A kind of smart jack management system and its method based on distributed general ledger technology | |
CN115361669A (en) | Vehicle-mounted data encryption method and device, computer equipment and communication system | |
CN109309688B (en) | New energy power station operation control method based on cloud monitoring and data encryption transmission | |
CN104283854A (en) | IPsec based method for transmitting large data volume in VPN | |
CN101408756A (en) | Remote monitoring and anglicizing system and method of nuclear power steam turbine regulation system | |
JP2001103045A (en) | Encryption key backup storage device | |
CN105551220A (en) | Remote data acquisition method for dry dust removal of converter gas | |
CN114866778B (en) | Monitoring video safety system | |
CN111163108A (en) | A system and method for compound encryption of security terminal chip of power internet of things | |
CN216391430U (en) | A distribution automation terminal admission control system with quantum encryption | |
CN106411559A (en) | Low voltage transformer area anti-electricity-stealing diagnosis system | |
CN114372595A (en) | Automatic power grid dispatching control operation state inspection system and method | |
CN111510916B (en) | A WAMS data encryption and decryption method, device and system | |
CN103746974B (en) | Secure communication system and method based on instant messaging software | |
CN113489725A (en) | Computer electronic information storage method based on cloud server | |
CN201188626Y (en) | System for remotely monitoring and analyzing nuclear electricity steam turbine regulation system | |
CN110765475A (en) | Virtual electric meter data encryption method, encryption device and encryption system | |
CN201993768U (en) | Encryption card with network interfaces | |
CN113055881A (en) | 5G network technology-based large-flow high-speed data transmission method | |
CN111030804A (en) | Fault information transmission method, device, system, equipment and storage medium | |
CN118368064B (en) | Quantum load management intelligent terminal | |
CN113784341B (en) | Data transfer card compatible with 5G network for logging instrument and logging data sharing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |