CN115714658A - Encryption and decryption method and device for cloud-ground interactive communication - Google Patents

Encryption and decryption method and device for cloud-ground interactive communication Download PDF

Info

Publication number
CN115714658A
CN115714658A CN202110960812.0A CN202110960812A CN115714658A CN 115714658 A CN115714658 A CN 115714658A CN 202110960812 A CN202110960812 A CN 202110960812A CN 115714658 A CN115714658 A CN 115714658A
Authority
CN
China
Prior art keywords
key
user
result
request
request information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110960812.0A
Other languages
Chinese (zh)
Inventor
张云业
李启坤
刘圣杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Holding Co Ltd
Original Assignee
Jingdong Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Holding Co Ltd filed Critical Jingdong Technology Holding Co Ltd
Priority to CN202110960812.0A priority Critical patent/CN115714658A/en
Publication of CN115714658A publication Critical patent/CN115714658A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosure provides an encryption and decryption method and device for cloud-ground interactive communication, wherein the method is used for a ground-end system and comprises the following steps: generating a request key and a response key corresponding to the user according to the user information; storing the public key and the private key of the request key and the response key in a cloud system and a ground system respectively; receiving encrypted user request information sent by a cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system; decrypting the content of the request information of the user according to the private key of the request key, and executing business logic according to the content of the request information; and encrypting the result of executing the service logic through a private key of the response secret key, and then sending the result to the cloud end system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the cloud end system. According to the cloud data transmission method and device, data are subjected to differentiation verification, encryption and decryption by combining the concept of the user, and the safety of data transmission between the cloud and the ground is guaranteed.

Description

Encryption and decryption method and device for cloud-ground interactive communication
Technical Field
The present disclosure relates to the field of information security technologies, and in particular, to an encryption and decryption method and apparatus for cloud-to-ground interactive communication.
Background
At present, clear text transmission is adopted for communication between ABS clouds, so that the communication between the ABS clouds is exposed to the outside, and the risk of intercepting data by an external hacker exists. In order to improve the safety of cloud-to-ground communication, ABS cloud-to-ground interactive communication is executed in an encryption and decryption mode. The current encryption mode is generally to encrypt and decrypt communication data in a symmetric or asymmetric mode, and cannot perform differential verification and encryption and decryption on data according to the concept of a user.
Disclosure of Invention
The invention provides an encryption and decryption method and device for cloud-to-ground interactive communication, which are used for overcoming the defect that data cannot be subjected to differential verification and encryption and decryption aiming at the concept of a user in the prior art and realizing the aim of different users.
In a first aspect, the present disclosure provides an encryption and decryption method for cloud-to-ground interactive communication, where the method is used for a ground-end system, and the method includes:
generating a request key and a response key corresponding to the user according to the user information;
storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system;
receiving encrypted user request information sent by the cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system through a public key of the request secret key;
decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing business logic according to the content of the request information to obtain a result of executing the business logic;
and encrypting the result of executing the service logic by using the private key of the response secret key and then sending the result of executing the service logic to the cloud system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the encrypted result of executing the service logic by using the cloud system according to the public key of the response secret key.
According to the encryption and decryption method for cloud interactive communication provided by the present disclosure, before the decrypting the request information of the user according to the private key of the request key, the method further comprises:
the ground system receives the request information of the user and then verifies the identity information of the user;
if the identity information of the user is not verified, returning response information to the user;
and if the identity information of the user passes the verification, executing to decrypt the request information of the user according to the private key of the request secret key.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the disclosure, after receiving request information of a user, the ground-end system verifies the identity information of the user, and specifically includes:
acquiring header data of the request information of the user;
and comparing the head data with encrypted data of user identification and timestamp information of the user stored in the ground end system, and judging whether the head data is consistent with the encrypted data.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the encrypted request information of the user is obtained by encrypting, by the cloud system, the request information of the user through the public key of the request key, and specifically includes:
the encrypted request information of the user is obtained by encrypting the request information of the user by using a symmetric encryption key through the cloud system to obtain a first encryption result and encrypting the first encryption result by using the request public key.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the decrypting the request information of the user according to the private key of the request key and determining the content of the request information of the user specifically includes:
decrypting the request information of the user according to the public key of the request secret key to obtain a first decryption result;
and decrypting the first decryption result by using a symmetric encryption key to determine the content of the request information of the user.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the encrypting the result of executing the service logic by using the private key of the response key specifically includes:
encrypting the result of executing the service logic according to the symmetric encryption key to obtain a second encryption result;
and encrypting the second encryption result by adopting a private key of the response secret key to obtain the encrypted result of executing the business logic.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the result of the request information is obtained by the cloud system decrypting the encrypted result of the execution service logic according to the public key of the response key, and specifically includes:
and the result of the request information is obtained by the cloud system decrypting the encrypted result of the execution service logic according to the public key of the response secret key to obtain a second decryption result, and decrypting the second decryption result by adopting a symmetric encryption secret key.
In a second aspect, the present disclosure provides an encryption and decryption method for cloud-to-cloud interactive communication, which is used for a cloud system, and the method includes:
receiving and storing a public key of a request key and a public key of a response key, wherein the request key and the response key are generated by a ground end system according to user information, and storing a private key of the request key and a private key of the response key in the ground end system;
encrypting the request information of the user through the public key of the request secret key to obtain the encrypted request information of the user, and sending the encrypted request information of the user to the ground end system;
receiving a result of executing the service logic sent by the end system, wherein the result of executing the service logic is obtained by executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of a request secret key to obtain the request information of the user;
and decrypting the encrypted result of executing the service logic according to the public key of the response secret key to obtain the result of the request information of the user, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system by using the private key of the response secret key.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the encrypting the request information of the user through the public key of the request key to obtain the encrypted request information of the user specifically includes:
encrypting the request information of the user by using a symmetric encryption key to obtain a third encryption result;
and encrypting the third encryption result by using the request public key to obtain the encrypted request information of the user.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the result of executing the service logic is obtained by the ground-end system decrypting the received encrypted request information of the user by using the private key of the request key to obtain the request information of the user, and then executing the service logic according to the content of the request information, and specifically includes:
the result of executing the service logic is that the ground end system decrypts the request information of the user according to the private key of the request secret key to obtain a third decryption result;
decrypting the third decryption result by using a symmetric encryption key to determine the request information of the user;
and executing service logic according to the content of the request information to obtain the request information.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system using the private key of the response key, and specifically includes:
the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system according to a symmetric encryption key;
and encrypting the fourth encryption result by using a private key of the response secret key.
According to the encryption and decryption method for cloud-to-ground interactive communication provided by the present disclosure, the obtaining of the request result of the user according to the result of executing the service logic after the public key decryption of the response key specifically includes:
decrypting the encrypted result of executing the business logic according to the public key of the response secret key to obtain a fourth decryption result;
and decrypting the fourth decryption result by adopting the symmetric encryption key to determine the request result of the user.
In a third aspect, the present disclosure provides an encryption and decryption apparatus for cloud-to-ground interactive communication, which is used for a ground-end system, and includes:
the first processing module is used for generating a request key and a response key corresponding to the user according to user information;
the second processing module is used for storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system;
the third processing module is configured to receive encrypted user request information sent by the cloud system, where the encrypted user request information is obtained by encrypting, by the cloud system, the user request information through a public key of the request key;
the fourth processing module is used for decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing the business logic according to the content of the request information to obtain a result of executing the business logic;
and a fifth processing module, configured to encrypt the result of executing the service logic by using the private key of the response key and send the encrypted result to the cloud system, so as to obtain a result of requesting information, where the result of requesting information is obtained by decrypting, by the cloud system, the encrypted result of executing the service logic according to the public key of the response key.
In a fourth aspect, the present disclosure provides an encryption and decryption apparatus for cloud-to-ground interactive communication, which is used in a cloud system, and includes:
the sixth processing module is configured to receive and store a public key of a request key and a public key of a response key, where the request key and the response key are generated by a ground system according to user information, and store a private key of the request key and a private key of the response key in the ground system;
the seventh processing module is configured to encrypt the request information of the user through the public key of the request key to obtain encrypted request information of the user, and send the encrypted request information of the user to the end system;
the eighth processing module is configured to receive a result of executing the service logic, where the result of executing the service logic is obtained by the end system executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of the request key to obtain the request information of the user;
and the ninth processing module is configured to decrypt the encrypted result of executing the service logic according to the public key of the response key, and obtain the result of requesting information of the user, where the encrypted result of executing the service logic is obtained by encrypting, by the end-to-end system, the result of executing the service logic by using the private key of the response key.
The present disclosure also provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the encryption and decryption method for cloud-based interactive communication as described in any one of the above.
The present disclosure also provides a non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the encryption and decryption method for cloud-based interactive communication as described in any one of the above.
The encryption and decryption method and device for cloud-to-ground interactive communication are used for a ground end system, and a request key and a response key corresponding to a user are generated according to user information; storing the public key of the request key and the public key of the response key in a cloud system, and storing the private key of the request key and the private key of the response key in the ground system; and then, the distributed private key and public key are used for encrypting and decrypting the request information and encrypting and decrypting the request result obtained according to the request information, so that differential verification and encryption and decryption are performed on data by combining the concept of the user, and the safety of motion information transmission is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the present disclosure or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of an encryption and decryption method for cloud-to-ground interactive communication of a ground-end system according to the present disclosure;
fig. 2 is an interaction diagram of encryption and decryption modes of cloud-to-cloud interactive communication provided by the present disclosure;
fig. 3 is a flowchart illustrating an encryption and decryption method for cloud-to-cloud interactive communication of a cloud system according to the present disclosure;
fig. 4 is a schematic structural diagram of an encryption and decryption apparatus for cloud-ground interactive communication of a ground-end system provided by the present disclosure;
fig. 5 is a schematic structural diagram of an encryption and decryption apparatus for cloud-to-ground interactive communication of a cloud-based system according to the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device provided by the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions in the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all, of the embodiments of the present disclosure. All other embodiments, which can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present disclosure, belong to the protection scope of the embodiments of the present disclosure.
An encryption and decryption method for cloud-ground interactive communication according to an embodiment of the present disclosure is described below with reference to fig. 1 to fig. 2, where the method is used for a ground-side system, and includes:
step 100: generating a request key and a response key corresponding to the user according to the user information;
specifically, the method and the device have the advantage that different keys are used for encrypting and decrypting the request data and the response data when the ABS system performs cloud interactive communication on different users, so that the safety of front-end and back-end data interaction of the ABS system is greatly improved and guaranteed. Therefore, in the present disclosure, after each user applies for the authority in the ABS system, the end-to-end system generates a request key and a response key for the user according to different user information for encrypting and decrypting data. The ABS ground system refers to a background system in the ABS system for executing service logic.
Step 200: storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system;
specifically, the local system respectively includes a public key and a private key in a set of request keys and a set of response keys generated for each user, and then distributes the public key in the request keys and the public key in the response keys to the cloud system, and leaves the private key in the request keys and the private key in the response keys in the local system. The ABS cloud system is a system externally provided in the ABS system and available for user customized operation.
The public key cryptosystem is obviously different from the traditional symmetric cryptosystem. For traditional symmetric cryptography, the security of the ciphertext is completely dependent on the confidentiality of the key, and once the key is leaked, no confidentiality is known. But the public key cryptosystem drastically changes this situation. In the public key cryptosystem, the public key is public and only the private key needs to be kept secret. Knowing the public key and the cryptographic algorithm to infer the private key is computationally infeasible. Thus, as long as the private key is secure, the encryption is trusted.
Step 300: receiving encrypted user request information sent by the cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system through a public key of the request secret key;
specifically, when a user acquires information to be requested, the information to be acquired needs to be encrypted and then transmitted to a local system. Since the cloud system stores the public key of the request key, the request information is encrypted by using the public key of the request key.
The encrypted request information of the user is obtained by encrypting the request information of the user by using a symmetric encryption key through the cloud system to obtain a first encryption result and encrypting the first encryption result by using the request public key. In the symmetric encryption algorithm, a data sender processes a plaintext (original data) and an encryption key together through a special encryption algorithm, and then the plaintext and the encryption key are changed into a complex encryption ciphertext to be sent out. After the receiver receives the ciphertext, if the receiver wants to decode the original text, the receiver needs to decrypt the ciphertext by using the key used for encryption and the inverse algorithm of the same algorithm so as to recover the ciphertext into readable plaintext. In the symmetric encryption algorithm, only one key is used, and both the sender and the receiver use the key to encrypt and decrypt data, so that the encryption key must be known by a secret party in advance.
Step 400: decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing business logic according to the content of the request information to obtain a result of executing the business logic;
specifically, the local system stores a private key of the request key of the user, and for the user, the private key of the request key and a public key of the request key are matched to each other for performing an encryption or decryption task, respectively. The method specifically comprises the following steps: decrypting the request information of the user according to the public key of the request secret key to obtain a first decryption result; and decrypting the first decryption result by using a symmetric encryption key to determine the content of the request information of the user.
And then, the ground end system executes the corresponding service according to the decrypted request information and acquires the result of executing the service. The business logic is the rule mapping of the real business realized only by the code, in short, what logic exists in a business can be formed into a list by drawing the connection and the constraint between different business objects on paper and listing the connection and the constraint, each rule in the list is a rule, and the sum of the rules is the business logic of the business and all the business logics. The result obtained by executing the business logic, namely the result obtained after executing various association and constraint rules.
Step 500: and encrypting the result of executing the service logic by using the private key of the response secret key and then sending the result of executing the service logic to the cloud system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the encrypted result of executing the service logic by using the cloud system according to the public key of the response secret key.
Specifically, after the service logic is executed, the execution result of the service logic, that is, the request information of the user, in the end-to-end system is obtained. And the user needs to send the execution result to the cloud end system when obtaining the execution result, and the execution result is encrypted by a private key of a response secret key stored in the end system in the sending process. Wherein the encrypting the result of executing the service logic by the private key of the response key specifically includes: encrypting the result of executing the service logic according to the symmetric encryption key to obtain a second encryption result; and encrypting the second encryption result by adopting a private key of the response secret key to obtain the encrypted result of executing the business logic.
The cloud system receives the encrypted information sent by the ground system, and decrypts the encrypted information by adopting a private key of the response secret key to obtain a result of the ground system executing the service logic, namely a content result required by the request information sent by the user. Specifically, the cloud system may decrypt the encrypted result of executing the service logic according to the public key of the response key to obtain a second decryption result, and decrypt the second decryption result with a symmetric encryption key.
Referring to fig. 2, the above process may be expressed as that, for any user a in the ABS cloud system, request data is encrypted and sent to the ABS ground system, the ABS ground system decrypts the received request information and then performs corresponding service processing, after the service processing is completed, a result of the service processing is returned to the cloud system in a response encryption manner, and the cloud system decrypts the received response confidential information and then transmits the result to the user a, thereby completing the whole process of requesting and responding for the user a.
The encryption and decryption method for cloud-ground interactive communication is used for a ground-end system, and generates a request key and a response key corresponding to a user according to user information; storing the public key of the request key and the public key of the response key in a cloud system, and storing the private key of the request key and the private key of the response key in the ground system; and then, the distributed private key and public key are used for encrypting and decrypting the request information and encrypting and decrypting the request result obtained according to the request information, so that differential verification and encryption and decryption are performed on data by combining the concept of the user, and the safety of motion information transmission is ensured.
In the present disclosure, an encryption and decryption method for cloud-to-cloud interactive communication is provided according to the present disclosure, before the decrypting the request information of the user according to the private key of the request key, the method further includes:
the ground system receives the request information of the user and then verifies the identity information of the user;
if the identity information of the user is not verified, returning response information to the user;
and if the identity information of the user passes the verification, executing the decryption of the request information of the user according to the private key of the request secret key.
Specifically, the user identification ID and the time stamp of each user are stored in an MD5 encryption mode, wherein the precision of the time stamp is accurate to day. And the ground end system updates the MD5 encrypted information formed by the IDs and the time stamps of different users at regular time every day. For example, at zero point, the ID and the timestamp of the user are updated, and the specific update time is not limited in this disclosure. For any user to initiate a request, the user ID of the user and the timestamp are firstly encrypted by the MD5 and stored to the head of the request data, then the request information is encrypted by using a symmetric encryption key, the symmetric encryption key is encrypted by using an asymmetric encryption public key, and the encrypted request information is transmitted to a ground system.
After receiving the request information of the user, the end-to-end system verifies the identity information of the user, and specifically includes:
acquiring header data of the request information of the user;
meanwhile, the encryption information of the MD5 of updated IDs and time stamps of different users is stored in the system of the ground end, and the encryption information stored in the ground end is compared with the header data of the received request information to judge whether the data of the encryption information and the header data are consistent.
If the data of the two are not consistent, namely the received data are not consistent in storage in the end-to-end system, the authentication of the identity information of the user is proved to be failed, response information is returned to the user, namely different information of the identity authentication of the user is fed back to the user.
If the data of the two are consistent, the received data is proved to have corresponding stored data in the end-to-end system, that is, the identity information of the user is proved to be passed through verification, and the request information of the user is decrypted according to the private key of the request secret key.
With reference to fig. 2 and fig. 3, an encryption and decryption method for cloud-to-cloud interactive communication disclosed in an embodiment of the present disclosure is described, where the method is used in a cloud-end system, and includes:
step 600: receiving and storing a public key of a request key and a public key of a response key, wherein the request key and the response key are generated by a ground end system according to user information, and storing a private key of the request key and a private key of the response key in the ground end system;
specifically, the method and the device have the advantage that different keys are used for encrypting and decrypting the request data and the response data when the ABS system performs cloud interactive communication on different users, so that the safety of front-end and back-end data interaction of the ABS system is greatly improved and guaranteed. Therefore, in the present disclosure, after each user applies for the authority in the ABS system, the end-to-end system generates the request key and the response key for the user according to different user information for encrypting and decrypting data. The ABS ground system refers to a background system in the ABS system for executing service logic.
The local system respectively comprises a public key and a private key in a set of request keys and a set of response keys generated by each user, and then distributes the public key in the request keys and the public key in the response keys to the cloud system, and leaves the private key in the request keys and the private key in the response keys in the local system. The ABS cloud system is a system externally provided in the ABS system and available for user customized operation.
The public key cryptosystem is obviously different from the traditional symmetric cryptosystem. For traditional symmetric cryptography, the security of the ciphertext depends entirely on the confidentiality of the key, which is not known at all once the key is compromised. But the public key cryptosystem drastically changes this situation. In the public key cryptosystem, the public key is public and only the private key needs to be kept secret. Knowing the public key and the cryptographic algorithm to infer the private key is computationally infeasible. Thus, as long as the private key is secure, the encryption is trusted.
Step 700: encrypting the request information of the user through the public key of the request secret key to obtain the encrypted request information of the user, and sending the encrypted request information of the user to the ground end system;
specifically, when a user acquires information to be requested, the information to be acquired needs to be encrypted and then transmitted to a local system. Since the cloud system stores the public key of the request key, the request information is encrypted by using the public key of the request key.
The encrypted request information of the user is obtained by encrypting the request information of the user by using a symmetric encryption key through the cloud system to obtain a third encryption result and encrypting the third encryption result by using the request public key. In the symmetric encryption algorithm, a data sender processes a plaintext (original data) and an encryption key together through a special encryption algorithm, and then the plaintext and the encryption key are changed into a complex encrypted ciphertext to be sent out. After the receiver receives the ciphertext, if the receiver wants to decode the original text, the receiver needs to decrypt the ciphertext by using the key used for encryption and the inverse algorithm of the same algorithm so as to recover the ciphertext into readable plaintext. In the symmetric encryption algorithm, only one key is used, and both the sender and the receiver use the key to encrypt and decrypt data, so that the encryption key must be known by a secret party in advance.
Step 800: receiving a result of executing the service logic sent by the end system, wherein the result of executing the service logic is obtained by executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of a request secret key to obtain the request information of the user;
specifically, the local system stores a private key of the request key of the user, and for the user, the private key of the request key and a public key of the request key are matched to each other for performing an encryption or decryption task, respectively. The method specifically comprises the following steps: decrypting the request information of the user according to the public key of the request secret key to obtain a third decryption result; and decrypting the third decryption result by using a symmetric encryption key to determine the content of the request information of the user.
And then, the ground end system executes the corresponding service according to the decrypted request information and acquires the result of executing the service. The business logic is the rule mapping of the real business realized only by the code, in short, what logic exists in a business can be formed into a list by drawing the connection and the constraint between different business objects on paper and listing the connection and the constraint, each rule in the list is a rule, and the sum of the rules is the business logic of the business and all the business logics. The result obtained by executing the business logic, namely the result obtained after executing various association and constraint rules.
And after the end system finishes the result of the service logic, sending the obtained result to the cloud end system.
Step 900: and decrypting the encrypted result of executing the service logic according to the public key of the response secret key, and acquiring the result of the request information of the user, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end system by using the private key of the response secret key.
Specifically, after the service logic is executed, the execution result of the service logic, that is, the request information of the user, in the end-to-end system is obtained. And the user needs to send the execution result to the cloud end system when obtaining the execution result, and the execution result is encrypted by a private key of a response secret key stored in the end system in the sending process. Wherein the encrypting the result of executing the service logic by the private key of the response key specifically includes: encrypting the result of executing the service logic according to the symmetric encryption key to obtain a fourth encryption result; and encrypting the fourth encryption result by adopting a private key of the response secret key to obtain the encrypted result of executing the business logic.
The cloud system receives the encrypted information sent by the ground system, and decrypts the encrypted information by adopting a private key of the response secret key to obtain a result of the ground system executing the service logic, namely a content result required by the request information sent by the user. Specifically, the cloud system may decrypt the encrypted result of executing the service logic according to the public key of the response key to obtain a fourth decryption result, and decrypt the fourth decryption result with a symmetric encryption key.
With reference to fig. 4, an encryption and decryption apparatus for cloud-to-ground interactive communication is provided in an embodiment of the present disclosure, and is used for a ground-side system, including:
a first processing module 41, configured to generate a request key and a response key corresponding to the user according to the user information;
the second processing module 42 is configured to store the public key of the request key and the public key of the response key in the cloud system, and store the private key of the request key and the private key of the response key in the end system;
a third processing module 43, configured to receive encrypted user request information sent by the cloud system, where the encrypted user request information is obtained by encrypting, by the cloud system, the user request information through a public key of the request key;
a fourth processing module 44, configured to decrypt the request information of the user according to the private key of the request key, determine the content of the request information of the user, and execute a service logic according to the content of the request information, so as to obtain a result of executing the service logic;
a fifth processing module 45, configured to encrypt the result of executing the service logic by using the private key of the response key and send the result to the cloud system, so as to obtain a result of requesting information, where the result of requesting information is obtained by the cloud system decrypting the encrypted result of executing the service logic according to the public key of the response key.
Since the apparatus provided by the embodiment of the present invention can be used for executing the method described in the above embodiment, and the operation principle and the beneficial effect are similar, detailed descriptions are omitted here, and specific contents can be referred to the description of the above embodiment.
According to the encryption and decryption apparatus for cloud-to-ground interactive communication provided by the embodiment of the present disclosure, the third processing module 43 is further configured to
The ground system receives the request information of the user and then verifies the identity information of the user;
if the identity information of the user is not verified, returning response information to the user;
and if the identity information of the user passes the verification, executing the decryption of the request information of the user according to the private key of the request secret key.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided by the embodiment of the present disclosure, the third processing module 43 is further specifically configured to:
acquiring header data of the request information of the user;
and comparing the head data with encrypted data of user identification and timestamp information of the user stored in the ground end system, and judging whether the head data is consistent with the encrypted data.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided by the embodiment of the present disclosure, the third processing module 43 is further configured to:
the encrypted request information of the user is obtained by encrypting the request information of the user by using a symmetric encryption key through the cloud system to obtain a first encryption result and encrypting the first encryption result by using the request public key.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided in the embodiment of the present disclosure, the fourth processing module 44 is specifically configured to:
decrypting the request information of the user according to the public key of the request secret key to obtain a first decryption result;
and decrypting the first decryption result by using a symmetric encryption key to determine the content of the request information of the user.
According to the encryption and decryption apparatus for cloud-to-ground interactive communication provided by the embodiment of the present disclosure, the fifth processing module 45 is specifically configured to:
encrypting the result of executing the service logic according to the symmetric encryption key to obtain a second encryption result;
and encrypting the second encryption result by adopting a private key of the response secret key to obtain the encrypted result of executing the service logic.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided by the embodiment of the present disclosure, the fifth processing module 45 is further configured to:
and the result of the request information is obtained by the cloud system decrypting the encrypted result of the execution service logic according to the public key of the response secret key to obtain a second decryption result, and decrypting the second decryption result by adopting a symmetric encryption secret key.
With reference to fig. 5, the present disclosure provides an encryption and decryption apparatus for cloud-to-ground interactive communication, which is used in a cloud system, and includes:
a sixth processing module 51, configured to receive and store a public key of a request key and a public key of a response key, where the request key and the response key are generated by a peer system according to user information, and store a private key of the request key and a private key of the response key in the peer system;
a seventh processing module 52, configured to encrypt the request information of the user through the public key of the request key to obtain encrypted request information of the user, and send the encrypted request information of the user to the end system;
an eighth processing module 53, configured to receive a result of executing a service logic sent by the end system, where the result of executing the service logic is obtained by the end system performing the service logic according to a content of the request information after the end system obtains the request information of the user by decrypting the received encrypted request information of the user with a private key of a request key;
a ninth processing module 54, configured to decrypt the encrypted result of executing the service logic according to the public key of the response key, and obtain the result of requesting information of the user, where the encrypted result of executing the service logic is obtained by encrypting, by the end-to-end system, the result of executing the service logic by using the private key of the response key.
Since the apparatus provided by the embodiment of the present invention can be used for executing the method described in the above embodiment, and the operation principle and the beneficial effect are similar, detailed descriptions are omitted here, and specific contents can be referred to the description of the above embodiment.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided in the embodiment of the present disclosure, the seventh processing module 52 is specifically configured to:
encrypting the request information of the user by using a symmetric encryption key to obtain a third encryption result;
and encrypting the third encryption result by using the request public key to obtain the encrypted request information of the user.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided by the embodiment of the present disclosure, the eighth processing module 53 is specifically configured to:
the result of executing the service logic is that the ground end system decrypts the request information of the user according to the private key of the request secret key to obtain a third decryption result;
decrypting the third decryption result by using a symmetric encryption key to determine the request information of the user;
and executing service logic according to the content of the request information to obtain the request information.
According to the encryption and decryption apparatus for cloud-to-cloud interactive communication provided by the embodiment of the present disclosure, the ninth processing module 54 is specifically configured to:
the encrypted result of executing the service logic is that the ground end system encrypts the result of executing the service logic according to the symmetric encryption key to obtain a fourth encryption result;
and encrypting the fourth encryption result by using a private key of the response secret key.
According to the encryption and decryption apparatus for cloud-to-ground interactive communication provided by the embodiment of the present disclosure, the loss processing module 54 is further configured to:
decrypting the encrypted result of executing the business logic according to the public key of the response secret key to obtain a fourth decryption result;
and decrypting the fourth decryption result by adopting the symmetric encryption key to determine the request result of the user.
Fig. 6 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 6: a processor (processor) 610, a communication Interface (Communications Interface) 620, a memory (memory) 630 and a communication bus 640, wherein the processor 610, the communication Interface 620 and the memory 630 communicate with each other via the communication bus 640. The processor 610 may invoke logic instructions in the memory 630 to perform a method of encryption and decryption for cloud-based interactive communication, the method comprising: the system is used for the ground end system to generate a request key and a response key corresponding to the user according to the user information; storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system; receiving encrypted user request information sent by the cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system through a public key of the request secret key; decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing the service logic according to the content of the request information to obtain a result of executing the service logic; and encrypting the result of executing the service logic by using the private key of the response secret key and then sending the result of executing the service logic to the cloud system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the encrypted result of executing the service logic by using the cloud system according to the public key of the response secret key. Or executing an encryption and decryption method for cloud interactive communication, wherein the method comprises the following steps: the cloud system receives and stores a public key of a request key and a public key of a response key, wherein the request key and the response key are generated by a ground system according to user information, and a private key of the request key and a private key of the response key are stored in the ground system; encrypting the request information of the user through the public key of the request secret key to obtain the encrypted request information of the user, and sending the encrypted request information of the user to the ground end system; receiving a result of executing the service logic sent by the end system, wherein the result of executing the service logic is obtained by executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of a request secret key to obtain the request information of the user; and decrypting the encrypted result of executing the service logic according to the public key of the response secret key to obtain the result of the request information of the user, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system by using the private key of the response secret key.
In addition, the logic instructions in the memory 630 may be implemented in software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
In another aspect, the present disclosure also provides a computer program product, the computer program product including a computer program stored on a non-transitory computer-readable storage medium, the computer program including program instructions, when the program instructions are executed by a computer, the computer being capable of executing the encryption and decryption method provided by the above methods to perform a cloud-based interactive communication, the method including: the system is used for the ground end system to generate a request key and a response key corresponding to the user according to the user information; storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system; receiving encrypted user request information sent by the cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system through a public key of the request secret key; decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing business logic according to the content of the request information to obtain a result of executing the business logic; and encrypting the result of executing the service logic by using the private key of the response secret key and then sending the result of executing the service logic to the cloud system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the encrypted result of executing the service logic by using the cloud system according to the public key of the response secret key. Or executing an encryption and decryption method for cloud interactive communication, wherein the method comprises the following steps: the cloud system receives and stores a public key of a request key and a public key of a response key, wherein the request key and the response key are generated by a ground system according to user information, and a private key of the request key and a private key of the response key are stored in the ground system; encrypting the request information of the user through the public key of the request secret key to obtain the encrypted request information of the user, and sending the encrypted request information of the user to the ground end system; receiving a result of executing the service logic sent by the end system, wherein the result of executing the service logic is obtained by executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of a request secret key to obtain the request information of the user; and decrypting the encrypted result of executing the service logic according to the public key of the response secret key to obtain the result of the request information of the user, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system by using the private key of the response secret key.
In yet another aspect, the present disclosure also provides a non-transitory computer readable storage medium having stored thereon a computer program, which when executed by a processor is implemented to perform the above-mentioned encryption and decryption methods provided to perform cloud-based interactive communication, the method including: the system is used for the ground end system to generate a request key and a response key corresponding to the user according to the user information; storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system; receiving encrypted user request information sent by the cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system through a public key of the request secret key; decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing business logic according to the content of the request information to obtain a result of executing the business logic; and encrypting the result of executing the service logic by using the private key of the response secret key and then sending the result of executing the service logic to the cloud system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the encrypted result of executing the service logic by using the cloud system according to the public key of the response secret key. Or executing an encryption and decryption method for cloud interactive communication, wherein the method comprises the following steps: the cloud system receives and stores a public key of a request key and a public key of a response key, wherein the request key and the response key are generated by a ground system according to user information, and a private key of the request key and a private key of the response key are stored in the ground system; encrypting the request information of the user through the public key of the request secret key to obtain the encrypted request information of the user, and sending the encrypted request information of the user to the ground end system; receiving a result of executing the service logic sent by the end system, wherein the result of executing the service logic is obtained by executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of a request secret key to obtain the request information of the user; and decrypting the encrypted result of executing the service logic according to the public key of the response secret key to obtain the result of the request information of the user, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system by using the private key of the response secret key.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solutions of the present disclosure, not to limit them; although the present disclosure has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present disclosure.

Claims (16)

1. An encryption and decryption method for cloud-ground interactive communication, which is used for a ground-end system, and comprises the following steps:
generating a request key and a response key corresponding to the user according to the user information;
storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the local system;
receiving encrypted user request information sent by the cloud system, wherein the encrypted user request information is obtained by encrypting the user request information by the cloud system through a public key of the request secret key;
decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing business logic according to the content of the request information to obtain a result of executing the business logic;
and encrypting the result of executing the service logic by using the private key of the response secret key and then sending the result of executing the service logic to the cloud system to obtain a result of requesting information, wherein the result of requesting information is obtained by decrypting the encrypted result of executing the service logic by using the cloud system according to the public key of the response secret key.
2. The encryption and decryption method for cloud-to-cloud interactive communication according to claim 1, further comprising, before the decrypting the requested information of the user according to the private key of the request key:
the ground system receives the request information of the user and then verifies the identity information of the user;
if the identity information of the user is not verified, returning response information to the user;
and if the identity information of the user passes the verification, executing the decryption of the request information of the user according to the private key of the request secret key.
3. The encryption and decryption method for cloud-to-ground interactive communication according to claim 2, wherein the verification of the identity information of the user after the end system receives the request information of the user specifically comprises:
acquiring header data of the request information of the user;
and comparing the head data with encrypted data of user identification and timestamp information of the user stored in the ground end system, and judging whether the head data is consistent with the encrypted data.
4. The encryption and decryption method for cloud-to-ground interactive communication according to claim 1, wherein the encrypted request information of the user is obtained by the cloud system encrypting the request information of the user through a public key of the request key, and specifically comprises:
the encrypted request information of the user is obtained by encrypting the request information of the user by using a symmetric encryption key through the cloud system to obtain a first encryption result and encrypting the first encryption result by using the request public key.
5. The encryption and decryption method for cloud-to-ground interactive communication according to claim 1, wherein the decrypting the request information of the user according to the private key of the request key and determining the content of the request information of the user specifically includes:
decrypting the request information of the user according to the public key of the request secret key to obtain a first decryption result;
and decrypting the first decryption result by using a symmetric encryption key to determine the content of the request information of the user.
6. The encryption and decryption method for cloud-to-cloud interactive communication according to claim 1, wherein the encrypting the result of executing the service logic with a private key of the response key specifically includes:
encrypting the result of executing the service logic according to the symmetric encryption key to obtain a second encryption result;
and encrypting the second encryption result by adopting a private key of the response secret key to obtain the encrypted result of executing the business logic.
7. The encryption and decryption method for cloud-to-ground interactive communication according to claim 1, wherein the result of the request message is obtained by the cloud system decrypting the encrypted result of the execution service logic according to the public key of the response key, and specifically includes:
and the result of the request information is obtained by the cloud system decrypting the encrypted result of the execution service logic according to the public key of the response secret key to obtain a second decryption result, and decrypting the second decryption result by adopting a symmetric encryption secret key.
8. An encryption and decryption method for cloud-ground interactive communication, which is used for a cloud system, and comprises the following steps:
receiving and storing a public key of a request secret key and a public key of a response secret key, wherein the request secret key and the response secret key are generated by a ground end system according to user information, and storing a private key of the request secret key and a private key of the response secret key in the ground end system;
encrypting the request information of the user through the public key of the request secret key to obtain the encrypted request information of the user, and sending the encrypted request information of the user to the ground end system;
receiving a result of executing the service logic sent by the end system, wherein the result of executing the service logic is obtained by executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of a request secret key to obtain the request information of the user;
and decrypting the encrypted result of executing the service logic according to the public key of the response secret key to obtain the result of the request information of the user, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system by using the private key of the response secret key.
9. The encryption and decryption method for cloud-to-ground interactive communication according to claim 8, wherein the encrypting the request information of the user through the public key of the request key to obtain the encrypted request information of the user specifically comprises:
encrypting the request information of the user by using a symmetric encryption key to obtain a third encryption result;
and encrypting the third encryption result by using the request public key to obtain the encrypted request information of the user.
10. The encryption and decryption method for cloud-to-ground interactive communication according to claim 8, wherein the executing of the service logic is that the end-system performs the service logic according to the content of the request information after obtaining the request information of the user by decrypting the request information of the user with a private key of a request key according to the received encrypted request information of the user, and specifically comprises:
the result of executing the service logic is that the ground end system decrypts the request information of the user according to the private key of the request secret key to obtain a third decryption result;
decrypting the third decryption result by using a symmetric encryption key to determine the request information of the user;
and executing service logic according to the content of the request information to obtain the request information.
11. The encryption and decryption method for cloud-to-ground interactive communication according to claim 8, wherein the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-ground system using a private key of the response key, and specifically includes:
the encrypted result of executing the service logic is obtained by encrypting the result of executing the service logic by the end-to-end system according to a symmetric encryption key;
and encrypting the fourth encryption result by using a private key of the response secret key.
12. The encryption and decryption method for cloud-to-ground interactive communication according to claim 8, wherein the obtaining of the request result of the user according to the result of executing the service logic after the decryption of the encrypted public key of the response key specifically comprises:
decrypting the encrypted result of executing the business logic according to the public key of the response secret key to obtain a fourth decryption result;
and decrypting the fourth decryption result by adopting the symmetric encryption key to determine the request result of the user.
13. An encryption and decryption device for cloud-ground interactive communication, which is used for a ground-end system and comprises:
the first processing module is used for generating a request key and a response key corresponding to the user according to user information;
the second processing module is used for storing the public key of the request secret key and the public key of the response secret key in a cloud system, and storing the private key of the request secret key and the private key of the response secret key in the ground system;
the third processing module is configured to receive encrypted user request information sent by the cloud system, where the encrypted user request information is obtained by encrypting, by the cloud system, the user request information through a public key of the request key;
the fourth processing module is used for decrypting the request information of the user according to the private key of the request key, determining the content of the request information of the user, and executing the business logic according to the content of the request information to obtain a result of executing the business logic;
and the fifth processing module is configured to encrypt the result of executing the service logic by using the private key of the response key and send the result to the cloud system to obtain a result of requesting information, where the result of requesting information is obtained by the cloud system decrypting the encrypted result of executing the service logic according to the public key of the response key.
14. An encryption and decryption device for cloud-to-ground interactive communication, which is used for a cloud system, and comprises:
a sixth processing module, configured to receive and store a public key of a request key and a public key of a response key, where the request key and the response key are generated by a local system according to user information, and store a private key of the request key and a private key of the response key in the local system;
the seventh processing module is configured to encrypt the request information of the user through the public key of the request key to obtain encrypted request information of the user, and send the encrypted request information of the user to the end system;
the eighth processing module is configured to receive a result of executing the service logic, where the result of executing the service logic is obtained by the end system executing the service logic according to the content of the request information after the end system decrypts the received encrypted request information of the user by using a private key of the request key to obtain the request information of the user;
and the ninth processing module is configured to decrypt the encrypted result of executing the service logic according to the public key of the response key, and obtain the result of requesting information of the user, where the encrypted result of executing the service logic is obtained by encrypting, by the end-to-end system, the result of executing the service logic by using the private key of the response key.
15. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program implements the steps of the encryption and decryption method of the cloud-based interactive communication according to any one of claims 1 to 7 or 8 to 12.
16. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the encryption and decryption method for cloud-based interactive communication according to any one of claims 1 to 7 or 8-12.
CN202110960812.0A 2021-08-20 2021-08-20 Encryption and decryption method and device for cloud-ground interactive communication Pending CN115714658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110960812.0A CN115714658A (en) 2021-08-20 2021-08-20 Encryption and decryption method and device for cloud-ground interactive communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110960812.0A CN115714658A (en) 2021-08-20 2021-08-20 Encryption and decryption method and device for cloud-ground interactive communication

Publications (1)

Publication Number Publication Date
CN115714658A true CN115714658A (en) 2023-02-24

Family

ID=85230208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110960812.0A Pending CN115714658A (en) 2021-08-20 2021-08-20 Encryption and decryption method and device for cloud-ground interactive communication

Country Status (1)

Country Link
CN (1) CN115714658A (en)

Similar Documents

Publication Publication Date Title
US10785019B2 (en) Data transmission method and apparatus
EP3642997B1 (en) Secure communications providing forward secrecy
US10015159B2 (en) Terminal authentication system, server device, and terminal authentication method
EP3349393B1 (en) Mutual authentication of confidential communication
JP2019533384A (en) Data transmission method, apparatus and system
US8396218B2 (en) Cryptographic module distribution system, apparatus, and program
US11870891B2 (en) Certificateless public key encryption using pairings
CN109800588B (en) Dynamic bar code encryption method and device and dynamic bar code decryption method and device
EP3476078B1 (en) Systems and methods for authenticating communications using a single message exchange and symmetric key
US8452015B2 (en) Propagating keys from servers to clients
CN108259407B (en) Symmetric encryption method and system based on timestamp
CN108199847B (en) Digital security processing method, computer device, and storage medium
US12010216B2 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
KR20150079489A (en) Instant messaging method and system
CN112351037B (en) Information processing method and device for secure communication
CN111914291A (en) Message processing method, device, equipment and storage medium
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN115378587B (en) Key acquisition method, device, equipment and readable storage medium
CN111010399A (en) Data transmission method and device, electronic equipment and storage medium
KR20060078768A (en) System and method for key recovery using distributed registration of private key
CN115766119A (en) Communication method, communication apparatus, communication system, and storage medium
CN112769759B (en) Information processing method, information gateway, server and medium
CN114157488A (en) Key acquisition method and device, electronic equipment and storage medium
CN115714658A (en) Encryption and decryption method and device for cloud-ground interactive communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination