CN115834250A - Encryption communication method for medical equipment interior - Google Patents

Encryption communication method for medical equipment interior Download PDF

Info

Publication number
CN115834250A
CN115834250A CN202310108246.XA CN202310108246A CN115834250A CN 115834250 A CN115834250 A CN 115834250A CN 202310108246 A CN202310108246 A CN 202310108246A CN 115834250 A CN115834250 A CN 115834250A
Authority
CN
China
Prior art keywords
equipment
path
model
path model
accessory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310108246.XA
Other languages
Chinese (zh)
Other versions
CN115834250B (en
Inventor
彭玉家
梁伟福
雷晓兵
孙人爽
张苏娣
黄斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Peninsula Medical Technology Co ltd
Original Assignee
Hunan Peninsula Medical Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Peninsula Medical Technology Co ltd filed Critical Hunan Peninsula Medical Technology Co ltd
Priority to CN202310108246.XA priority Critical patent/CN115834250B/en
Publication of CN115834250A publication Critical patent/CN115834250A/en
Application granted granted Critical
Publication of CN115834250B publication Critical patent/CN115834250B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention provides an encryption communication method used in medical equipment, and particularly relates to the field of digital information transmission. The encryption communication method is mainly applied to communication between accessory equipment and host equipment, the accessory equipment generates a random integer set when being powered on and started, a consensus element table is solidified between the accessory equipment and the host equipment through the random integer set, the host equipment generates the same path model in the accessory equipment and the host equipment through randomly selecting elements and according to a specific algorithm on the basis of the consensus element table, and then a package model which is acknowledged by the accessory equipment and the host equipment is established through the path model. The encryption communication method needs the matching relationship between the built-in data of the accessory equipment and the built-in data of the host equipment, and needs the dynamic participation of the accessory equipment and the host equipment in the communication process, so that the accessory equipment can be effectively verified, and the medical equipment is prevented from generating faults due to the adoption of third-party accessory equipment.

Description

Encryption communication method for medical equipment interior
Technical Field
The invention relates to the field of digital information transmission, in particular to an encryption communication method used in medical equipment.
Background
The common medical equipment generally comprises host equipment and accessory equipment, wherein the host equipment is mainly used for processing data, the accessory equipment is generally used for executing operation, the accessory equipment and the host equipment are generally in a detachable connection relation based on the consideration of use cost, the accessory equipment and the host equipment are communicated through packet data, and the accessory equipment can be replaced according to the service life.
At present, some third-party manufacturers on the market develop accessory equipment reversely and manufacture imitations for sale, and since medical equipment is equipment applied to the medical field, unpredictable problems may be caused by using products of the third-party manufacturers, and medical accidents are caused, so that verification and limitation on replaced accessory equipment are necessary.
Since the authentication structure improvement on the physical structure is easily cracked by reverse development, the authentication limitation on the accessory device is generally started from the aspect of software, wherein the most common software authentication limitation mode is encrypted communication between the host device and the accessory device.
The encryption communication mainly means that the transmitted data between two communication parties is encrypted, and the outside cannot restore the essential content of the transmitted data in a mode of intercepting the transmitted data, so that the data cannot be sent and received in a reverse mode and the like in a counterfeit mode.
Disclosure of Invention
The invention provides an encryption communication method for the interior of medical equipment, which is mainly applied to the communication between accessory equipment and host equipment.
Correspondingly, the invention provides an encryption communication method used in medical equipment, which comprises the following steps:
starting and generating random integer set after accessory equipment is connected to host equipment
Figure SMS_1
Wherein, in the step (A),
Figure SMS_2
Figure SMS_3
is an integer greater than 2 and is,
Figure SMS_4
Figure SMS_5
is a preset integer;
the accessory device combines the set of random integers
Figure SMS_6
Sending to the host device;
the accessory device and the host device are based on the set of random integers, respectively
Figure SMS_7
Generating a consensus element table, the consensus element table comprising
Figure SMS_8
An element of
Figure SMS_9
The polar coordinates of each element are
Figure SMS_10
The host device selects an element from the consensus element table as a starting element and sends the starting element to the accessory device;
the host device and the accessory device respectively take the initial element as a path starting point and plan a path model traversing all the elements based on a preset algorithm, wherein the path model comprises sequentially arranged path models
Figure SMS_11
An element and arranged in said order
Figure SMS_12
In the individual elements, the first
Figure SMS_13
An element and
Figure SMS_14
difference between individual elements
Figure SMS_15
Figure SMS_16
The host device and the accessory device respectively construct a package model based on the path model, and the package model comprises a plurality of sequentially arranged package models
Figure SMS_17
A bit data bit, the
Figure SMS_18
Bit data bits include
Figure SMS_19
Bit storage bit and
Figure SMS_20
bit redundancy bits of
Figure SMS_21
Bit redundancy bit is in
Figure SMS_22
The bit data bits are located at
Figure SMS_23
The accessory equipment packages target data into a sealing package based on the packaging model and sends the sealing package to the host equipment;
and the host equipment analyzes the encapsulation packet based on the encapsulation model to obtain the target data.
In an optional embodiment, the host device selects an element in the consensus element table as a starting element and sends the starting element to the accessory device:
the host device selects an element from the consensus element table as an initial element according to a preset interval time and sends the initial element to the accessory device;
in an alternative embodiment, the host device and the accessory device each have the same set of algorithms embedded therein
Figure SMS_24
Figure SMS_25
Is as follows
Figure SMS_26
The algorithm is used for the first time and the second time,
Figure SMS_27
Figure SMS_28
is an integer greater than 1;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device is in the set of algorithms
Figure SMS_29
Selecting one algorithm as a target algorithm and sending a number corresponding to the target algorithm to the accessory equipment;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
In an optional embodiment, the host device sends the starting element and the number corresponding to the target algorithm to the accessory device synchronously.
In an alternative embodiment, the host device and the accessory device each have the same set of algorithms embedded therein
Figure SMS_30
Figure SMS_31
Is as follows
Figure SMS_32
The algorithm is used for the first time and the second time,
Figure SMS_33
Figure SMS_34
is an integer greater than 1;
the host device selecting an element in the consensus element table as a starting element and sending the starting element to the accessory device further comprises:
based on a preset functional relationship, the host equipment derives the number of the target algorithm through the number of the initial element
Figure SMS_35
And establishing the target algorithm as an algorithm
Figure SMS_36
The host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
In an optional embodiment, the planning a path model traversing all elements based on a preset algorithm includes:
confirming in the path model based on a preset algorithm
Figure SMS_37
The arrangement order of the elements;
calculate the first
Figure SMS_38
An element and
Figure SMS_39
difference between individual elements
Figure SMS_40
In an optional embodiment, the path model is determined based on a preset algorithm
Figure SMS_41
The arrangement order of the elements comprises:
s301: including the consensus element table in
Figure SMS_42
Importing the elements into a temporary cache space;
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequences
Figure SMS_43
And (4) each element.
In an optional embodiment, the path model is determined based on a preset algorithm
Figure SMS_44
The arrangement order of the elements comprises:
s301: including the consensus element table in
Figure SMS_45
Importing the elements into a temporary cache space;
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequences
Figure SMS_46
And (4) each element.
In an alternative embodiment, the confirmation based on the predetermined algorithm is in the path model
Figure SMS_47
The arrangement order of the elements comprises:
Figure SMS_48
the arrangement order of the elements comprises:
s401: including the consensus element table in
Figure SMS_49
Importing the elements into a temporary cache space;
s402: transferring the starting element from the temporary cache space into the path model;
s403: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s404: taking the element with the longest connecting line distance as a second element;
s405: transferring the second element from the temporary cache space into the path model;
s406: repeating the steps S403 to S405 until the path model comprises the sequential order
Figure SMS_50
And (4) each element.
In an optional embodiment, the accessory device packaging the target data into a sealed packet based on the packaging model and sending the sealed packet to the host device includes:
the accessory device stores the target data into data bits of a packet model.
In an optional embodiment, the analyzing, by the host device, the encapsulated packet based on the encapsulation model to obtain the target data includes:
and the host equipment reads and analyzes data bit data in the sealed packet according to the packet model.
In summary, the present invention provides an encryption communication method for use in a medical device, the encryption communication method is mainly applied to communication between an accessory device and a host device, the accessory device generates a random integer set when being powered on and started each time, a consensus element table is solidified between the accessory device and the host device through the random integer set, based on the consensus element table, the host device generates a same path model in the accessory device and the host device according to a specific algorithm through randomly selecting elements and through the path model, and then constructs a packet model that both the accessory device and the host device acknowledge, in the encryption communication method, firstly, contents such as a basic model of the consensus element table, a preset algorithm for traversing the element to generate the path model, and a packet model constructed based on the path model in the accessory device need to be consistent with the host device, which can perform preliminary verification on the accessory device; secondly, in order to prevent a third party from developing a communication package between the accessory equipment and the host equipment in a reverse direction, the same package model is fixedly used for communication, and on the basis of the consistency of the built-in contents, the communication encryption method also relates to dynamic verification matching contents such as generation of a random integer set depending on the accessory equipment and selection of an initial element depending on the host equipment, so that the communication verification between the accessory equipment and the host equipment is dynamically changed, and the verification performance of the accessory equipment is further improved; correspondingly, the basic structure of the finally generated package model is dynamically changed, so that the difficulty of reverse direction is greatly increased; in addition, target data itself does not encrypt through too complicated algorithm, only insert a plurality of redundant bits in target data and obscure, target data's order does not change itself, target data's packing and the analysis of adding sealed package can not produce too high demand to hardware, host equipment is when analyzing encryption sealed package, need not carry out complete buffer memory to encryption sealed package and can read each storage bit and directly analyze out target data according to the storage bit order of packet model, this also is favorable to reducing the requirement to the buffer memory space, and has good practicality.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an encrypted communication method used in a medical device according to an embodiment of the present invention.
Fig. 2 is a graphical schematic diagram of a consensus element table according to an embodiment of the present invention.
Description of the preferred embodiment
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of an encrypted communication method used in a medical device according to an embodiment of the present invention.
It should be noted that the encryption communication method described in the embodiment of the present invention refers to a communication method between the accessory device and the host device that meets the specification, and the accessory device that does not meet the specification may generate an error in the encryption communication process with the host device, and the related error will be described later.
Correspondingly, the invention provides an encryption communication method used in medical equipment, which comprises the following steps:
s101: the accessory equipment is started and generates a random integer set after being accessed to the host equipment;
specifically, for ease of reference and description, the set of random integers is defined as
Figure SMS_51
Figure SMS_52
Is a randomly generated value, wherein,
Figure SMS_53
i.e. by
Figure SMS_54
Figure SMS_55
Is an integer greater than 2 and is,
Figure SMS_56
Figure SMS_57
is a preset integer.
S102: the accessory device sending the set of random integers to a host device;
it should be noted that the accessory device sends the random integer set
Figure SMS_58
Interaction data between the accessory device and the host device is only a randomly integrated set
Figure SMS_59
As such, subsequent consensus element table contents are not included.
S103: the accessory device and the host device generate a consensus element table based on the set of random integers, respectively;
specifically, the consensus element table comprises
Figure SMS_60
An element of
Figure SMS_61
The polar coordinates of each element are
Figure SMS_62
It should be noted that the construction of the consensus element table is essentially to be in the random integer set
Figure SMS_63
Substituting into the polar coordinates of the corresponding elements, the polar angle in the polar coordinates of each element is confirmed,
Figure SMS_64
and substituting the polar diameter into the corresponding element. Therefore, the basic structure of the relevant elements needs to be preset in the accessory device and the host device, which provides a requirement for the built-in program of the accessory device.
In order to better describe the content of the consensus element table, the embodiment of the invention provides
Figure SMS_65
For the purpose of illustration, there areThe polar coordinates of the relevant elements are identified in fig. 2, and fig. 2 is a graphical schematic diagram of a consensus element table according to an embodiment of the present invention.
Referring to fig. 2, a polar coordinate definition is adopted, so that a random integer set is converted into two-dimensional coordinate system data to facilitate subsequent operations; regarding the structural definition of the polar coordinates of the elements, in particular practice, all the elements can be always contained in a certain area range along with the change of the total number of the elements, so that the subsequent distance calculation is more traversed; in addition, the definition form of polar coordinates can enable the subsequent path model to generate more variability, thereby improving the uncertainty of the path model, and the content related to the variability is further explained in the following.
S104: the host device selects an element from the consensus element table as a starting element and sends the starting element to the accessory device;
the host device selects the starting elements to have randomness, and different starting elements can change the path model generated in the subsequent steps, and the change of the path model can change the packaging model.
To further improve the dynamic authentication of the accessory device, in an alternative embodiment, the host device selects an element in the consensus element table as a starting element and sends the starting element to the accessory device:
the host device selects an element from the consensus element table as a starting element according to a preset interval time and sends the starting element to the accessory device.
By the implementation mode, the package model between the accessory equipment and the host equipment can be adjusted regularly, the third-party accessory equipment is prevented from being counterfeited by adopting the fixed package model, and the hardware equipment of the accessory equipment and the hardware equipment of the host equipment can be prevented from generating larger load pressure by the regular adjustment mode rather than the mode that each package is adjusted, so that the safety of data verification and the convenience of data processing can be well balanced.
S105: the host device and the accessory device respectively take the initial element as a path starting point and plan and traverse path models of all elements based on a preset algorithm;
specifically, the path model comprises a plurality of path models arranged in sequence
Figure SMS_66
An element and arranged in said order
Figure SMS_67
In the individual elements, the first
Figure SMS_68
An element and
Figure SMS_69
difference between individual elements
Figure SMS_70
Figure SMS_71
Specifically, different preset algorithms can derive different path models, and two main contents are mainly related to the path models and are respectively arranged in sequence
Figure SMS_72
An element (i.e. the
Figure SMS_73
The order of the elements) and
Figure SMS_74
an element and
Figure SMS_75
difference between individual elements
Figure SMS_76
(i.e., the difference in the pole diameters of two adjacent elements in the aligned sequence). Thus, in essence, the planning of the path model through all elements based on the preset algorithm comprises:
confirming in the path model based on a preset algorithm
Figure SMS_77
The arrangement order of the elements;
calculate the first
Figure SMS_78
An element and
Figure SMS_79
difference between individual elements
Figure SMS_80
Regarding the content of the preset algorithm, the embodiment of the present invention provides two preset algorithms for reference.
The method comprises the following steps:
the confirmation based on the preset algorithm is in the path model
Figure SMS_81
The arrangement order of the elements comprises:
s301: including the consensus element table in
Figure SMS_82
Importing the elements into a temporary cache space;
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequences
Figure SMS_83
And (4) each element.
Referring to FIG. 2 of the drawings, suppose
Figure SMS_85
As the starting element, firstly
Figure SMS_91
Move from the temporary cache space into the path model, as the first element of the sort, and then
Figure SMS_95
As a first element, calculate
Figure SMS_86
Is divided into
Figure SMS_89
The distance of (d); suppose that
Figure SMS_94
To
Figure SMS_96
The shortest distance between points will
Figure SMS_84
Transferring the temporary cache space into the path model as a second ordered element; then is provided with
Figure SMS_88
As a first element, calculate
Figure SMS_93
Is divided into
Figure SMS_98
The distance of (d); suppose that
Figure SMS_87
To
Figure SMS_90
The shortest distance between points will
Figure SMS_92
Transferring the temporary cache space into the path model as a third element of the sequence; in turn weighUntil the path model comprises sequential ordering
Figure SMS_97
And (4) each element.
It should be noted that if the distance is equal, the second-level priority condition regarding clockwise selection or counterclockwise selection can be supplemented.
With reference to fig. 2, if the initial elements are selected differently, the finally derived path model has different element orderings due to the traversal selection, and there is no cyclic condition that the element arrangements are connected end to end, which is beneficial to increasing the uncertainty of the path model.
The second method comprises the following steps:
s401: including the consensus element table in
Figure SMS_99
Importing the elements into a temporary cache space;
s402: transferring the starting element from the temporary cache space into the path model;
s403: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s404: taking the element with the longest connecting line distance as a second element;
s405: transferring the second element from the temporary cache space into the path model;
s406: repeating the steps S403 to S405 until the path model comprises the sequential order
Figure SMS_100
And (4) each element.
Specifically, the implementation logic of the second method is similar to that of the first method, and no additional description is provided in the embodiments of the present invention.
After confirming the path model, the calculation is needed
Figure SMS_101
An element and
Figure SMS_102
difference between individual elements
Figure SMS_103
The difference is obtained by subtracting the corresponding pole diameters of the two elements, and the embodiment of the present invention is not further described.
Furthermore, the communication encryption algorithm can be further improved in safety aiming at the budget algorithm.
Specifically, the host device and the accessory device are respectively provided with the same algorithm set
Figure SMS_104
Figure SMS_105
Is as follows
Figure SMS_106
The algorithm is used for the first time and the second time,
Figure SMS_107
Figure SMS_108
the number of the integers is more than 1, that is, the budget algorithm can be various and can be selected according to actual needs.
Correspondingly, the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm includes:
the host device is in the set of algorithms
Figure SMS_109
Selecting one algorithm as a target algorithm and sending a number corresponding to the target algorithm to the accessory equipment;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
By setting various preset algorithm modes, the safety of the communication encryption algorithm can be further improved.
Based on the consideration of communication convenience, the host device synchronously sends the starting element and the number corresponding to the target algorithm to the accessory device.
It should be noted that the numbers of the start element and the target algorithm also refer only to the specifically indicated data and not to the built-in data of the accessory device and the host device, and this embodiment can reverse the data content by the third party in an efficient manner.
Further, based on practical considerations, the number of the target algorithm and the initial element can be functionally associated, and when data is transmitted, the target algorithm can be established only by transmitting the initial element. Specifically, the host device and the accessory device are respectively provided with the same algorithm set
Figure SMS_110
Figure SMS_111
Is as follows
Figure SMS_112
The algorithm of the seed is used for calculating,
Figure SMS_113
Figure SMS_114
is an integer greater than 1;
the host device selecting an element in the consensus element table as a starting element and sending the starting element to the accessory device further comprises:
based on a preset functional relationship, the host equipment derives the number of the target algorithm through the number of the initial element
Figure SMS_115
And establishing the target algorithm as an algorithm
Figure SMS_116
The host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
S106: the host device and the accessory device construct a package model based on the path model respectively;
specifically, the package model comprises a plurality of sequentially arranged packages
Figure SMS_117
A bit data bit, the
Figure SMS_118
Bit data bits include
Figure SMS_119
Bit storage bit and
Figure SMS_120
bit redundancy bit, no
Figure SMS_121
Bit redundancy bit is in
Figure SMS_122
The bit data bits are located at
Figure SMS_123
Specifically, the data derived by the path model is substantially a point sequence and data of a polar path difference between two adjacent points, and in the packet model, the points in the point sequence are converted into redundant bits and are converted into a corresponding number of storage bits according to the value of the polar path difference.
Specifically, the storage bit is used for storing the target data, the redundant bit is interference data, and if the unpacking mode is not matched, the data derived from the sealed packet constructed by the data model is wrong. Therefore, although the data packed by the packing model still corresponds to a plain text form, the packed data may have non-readability due to the addition of the redundancy bits.
S107: the accessory equipment packages target data into a sealing package based on the packaging model and sends the sealing package to the host equipment;
specifically, the accessory device packages the target data into the encapsulation packet based on the encapsulation model and sends the encapsulation packet to the host device includes:
the accessory device stores the target data into data bits of a packet model.
The data of the redundant bits may be filled in a random number.
S108: and the host equipment analyzes the encapsulation packet based on the encapsulation model to obtain the target data.
Correspondingly, the analyzing, by the host device, the encapsulated packet based on the encapsulation model to obtain the target data includes:
and the host equipment reads and analyzes data bit data in the sealed packet according to the packet model.
The host device builds a package model matched with the accessory device, and accordingly, when the host device reads data of the encrypted package, the host device can directly skip the redundant bits and sequentially read the content of the data bits; after the data content of the redundant bit is eliminated, the arrangement of the target data in the encryption package is ordered, so that the host equipment can directly process the read data immediately without waiting for complete unpacking and then processing the data.
In summary, the present invention provides an encrypted communication method for use in a medical device, the encrypted communication method is mainly applied to communication between an accessory device and a host device, the accessory device generates a random integer set when being powered on and started each time, a consensus element table is solidified between the accessory device and the host device through the random integer set, based on the consensus element table, the host device generates a same path model in the accessory device and the host device according to a specific algorithm by randomly selecting elements, and then constructs a packet model that both the accessory device and the host device acknowledge through the path model, in the encrypted communication method, firstly, the contents such as a basic model of the consensus element table, a preset algorithm for traversing the element to generate the path model, and a packet model constructed based on the path model need to be consistent with the host device, which can perform preliminary verification on the accessory device; secondly, in order to prevent a third party from developing a communication package between the accessory equipment and the host equipment in a reverse direction, the same package model is fixedly used for communication, and on the basis of the consistency of the built-in contents, the communication encryption method also relates to dynamic verification matching contents such as generation of a random integer set depending on the accessory equipment and selection of an initial element depending on the host equipment, so that the communication verification between the accessory equipment and the host equipment is dynamically changed, and the verification performance of the accessory equipment is further improved; correspondingly, the basic structure of the finally generated package model is dynamically changed, so that the difficulty of reverse direction is greatly increased; in addition, target data itself does not encrypt through too complicated algorithm, only insert a plurality of redundant bits in target data and obscure, target data's order does not change, target data's packing and the analysis that adds the encapsulation package can not produce too high demand to hardware, host computer equipment is when analyzing the encryption encapsulation package, need not carry out the complete buffer memory to the encryption encapsulation package and can read each storage bit and directly analyze out target data according to the storage bit order of package model, this also is favorable to reducing the requirement to the buffer memory space, good practicality has.
The encryption communication method for the medical device interior provided by the embodiment of the invention is described in detail above, and the principle and the implementation of the invention are explained in the present document by applying a specific example, and the description of the above embodiment is only used to help understanding the method of the invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. An encrypted communication method for use inside a medical device, comprising:
starting and generating random integer set after accessory equipment is connected to host equipment
Figure QLYQS_1
Wherein, in the process,
Figure QLYQS_2
Figure QLYQS_3
is an integer greater than 2 and is,
Figure QLYQS_4
Figure QLYQS_5
is a preset integer;
the accessory device combines the set of random integers
Figure QLYQS_6
Sending the data to the host equipment;
the accessory device and the host device are based on the set of random integers, respectively
Figure QLYQS_7
Generating a consensus element table, the consensus element table comprising
Figure QLYQS_8
An element of
Figure QLYQS_9
The polar coordinates of each element are
Figure QLYQS_10
The host device selects an element from the consensus element table as a starting element and sends the starting element to the accessory device;
the host device and the accessory device respectively take the initial element as a path starting point and plan a path model traversing all the elements based on a preset algorithm, wherein the path model comprises sequentially arranged path models
Figure QLYQS_11
An element and arranged in said order
Figure QLYQS_12
In the individual elements, the first
Figure QLYQS_13
An element and
Figure QLYQS_14
difference between individual elements
Figure QLYQS_15
Figure QLYQS_16
The host device and the accessory device respectively construct a package model based on the path model, and the package model comprises a plurality of sequentially arranged package models
Figure QLYQS_17
A bit data bit, the
Figure QLYQS_18
Bit data bits include
Figure QLYQS_19
Bit storage bit and
Figure QLYQS_20
bit redundancy bits of
Figure QLYQS_21
Bit redundancy bit is in
Figure QLYQS_22
The bit data bits are located at
Figure QLYQS_23
The accessory equipment packages target data into a sealing package based on the packaging model and sends the sealing package to the host equipment;
and the host equipment analyzes the encapsulation packet based on the encapsulation model to obtain the target data.
2. The encrypted communication method for use inside a medical device according to claim 1, wherein the host device selects an element in the consensus element table as a starting element and sends the starting element to the accessory device:
the host device selects an element from the consensus element table as a starting element according to a preset interval time and sends the starting element to the accessory device.
3. The method of claim 1, wherein the host device and the accessory device have the same set of algorithms embedded therein
Figure QLYQS_24
Figure QLYQS_25
Is as follows
Figure QLYQS_26
The algorithm is used for the first time and the second time,
Figure QLYQS_27
Figure QLYQS_28
is an integer greater than 1;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device is in the set of algorithms
Figure QLYQS_29
Selecting one algorithm as a target algorithm and sending a number corresponding to the target algorithm to the accessory equipment;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
4. The encrypted communication method for the interior of the medical device according to claim 3, wherein the host device synchronously sends the starting element and the number corresponding to the target algorithm to the accessory device.
5. The encrypted communication method for use inside a medical device according to claim 3, wherein the host device and the accessory device are respectively built-in with the same set of algorithms
Figure QLYQS_30
Figure QLYQS_31
Is as follows
Figure QLYQS_32
The algorithm is used for the first time and the second time,
Figure QLYQS_33
Figure QLYQS_34
is an integer greater than 1;
the host device selecting an element in the consensus element table as a starting element and sending the starting element to the accessory device further comprises:
based on a preset functional relationship, the host equipment derives the number of the target algorithm through the number of the initial element
Figure QLYQS_35
And establishing the target algorithm as an algorithm
Figure QLYQS_36
The host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
6. The encrypted communication method for the interior of the medical equipment according to claim 1, wherein planning a path model traversing all elements based on a preset algorithm comprises:
confirming in the path model based on a preset algorithm
Figure QLYQS_37
The arrangement order of the elements;
calculate the first
Figure QLYQS_38
An element and
Figure QLYQS_39
difference between individual elements
Figure QLYQS_40
7. The method according to claim 6, wherein the confirmation based on a predetermined algorithm is performed in the path model
Figure QLYQS_41
The arrangement order of the elements comprises:
s301: including the consensus element table in
Figure QLYQS_42
Importing the elements into a temporary cache space;
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequences
Figure QLYQS_43
And (4) each element.
8. The method according to claim 6, wherein the confirmation based on a predetermined algorithm is performed in the path model
Figure QLYQS_44
The arrangement order of the elements comprises:
s401: including the consensus element table in
Figure QLYQS_45
Importing the elements into a temporary cache space;
s402: transferring the starting element from the temporary cache space into the path model;
s403: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s404: taking the element with the longest connecting line distance as a second element;
s405: transferring the second element from the temporary cache space into the path model;
s406: repeating the steps S403 to S405 until the path model comprises the sequential order
Figure QLYQS_46
And (4) each element.
9. The cryptographic communication method for the interior of the medical device according to claim 1, wherein the accessory device packages the target data into a sealed packet based on the packet model and sends the sealed packet to the host device includes:
the accessory device stores the target data into data bits of a packet model.
10. The encrypted communication method for the interior of the medical device according to claim 1, wherein the host device parsing the sealed packet based on the packet model to obtain the target data comprises:
and the host equipment reads and analyzes data bit data in the sealed packet according to the packet model.
CN202310108246.XA 2023-02-14 2023-02-14 Encryption communication method for medical equipment Active CN115834250B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310108246.XA CN115834250B (en) 2023-02-14 2023-02-14 Encryption communication method for medical equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310108246.XA CN115834250B (en) 2023-02-14 2023-02-14 Encryption communication method for medical equipment

Publications (2)

Publication Number Publication Date
CN115834250A true CN115834250A (en) 2023-03-21
CN115834250B CN115834250B (en) 2023-05-09

Family

ID=85521184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310108246.XA Active CN115834250B (en) 2023-02-14 2023-02-14 Encryption communication method for medical equipment

Country Status (1)

Country Link
CN (1) CN115834250B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130268357A1 (en) * 2011-09-15 2013-10-10 Stephan HEATH Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms
CN104010301A (en) * 2014-06-13 2014-08-27 曾宪钊 Multi-element random garble encryption algorithm for wireless safe communication
CN110163233A (en) * 2018-02-11 2019-08-23 陕西爱尚物联科技有限公司 A method of so that machine is competent at more complex works
CN111740951A (en) * 2015-01-26 2020-10-02 卢森堡商创研腾智权信托有限公司 Method for dynamically transmitting data through cloud security
CN112525093A (en) * 2018-09-19 2021-03-19 成都理工大学 System for building tunnel three-dimensional model
CN113128781A (en) * 2021-04-30 2021-07-16 大连理工大学 Distributed industrial energy operation optimization platform for automatically constructing intelligent model and algorithm
CN113273146A (en) * 2018-07-10 2021-08-17 力士塔有限公司 Decentralized network security privacy network for cloud communication, computing and global e-commerce
CN114143037A (en) * 2021-11-05 2022-03-04 山东省计算中心(国家超级计算济南中心) Malicious encrypted channel detection method based on process behavior analysis
US20220150220A1 (en) * 2019-08-30 2022-05-12 Henry Verheyen Secure data exchange network

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130268357A1 (en) * 2011-09-15 2013-10-10 Stephan HEATH Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms
CN104010301A (en) * 2014-06-13 2014-08-27 曾宪钊 Multi-element random garble encryption algorithm for wireless safe communication
CN111740951A (en) * 2015-01-26 2020-10-02 卢森堡商创研腾智权信托有限公司 Method for dynamically transmitting data through cloud security
CN111800375A (en) * 2015-01-26 2020-10-20 卢森堡商创研腾智权信托有限公司 Method for dynamically transmitting data packets through cloud security
CN110163233A (en) * 2018-02-11 2019-08-23 陕西爱尚物联科技有限公司 A method of so that machine is competent at more complex works
CN113273146A (en) * 2018-07-10 2021-08-17 力士塔有限公司 Decentralized network security privacy network for cloud communication, computing and global e-commerce
CN112525093A (en) * 2018-09-19 2021-03-19 成都理工大学 System for building tunnel three-dimensional model
US20220150220A1 (en) * 2019-08-30 2022-05-12 Henry Verheyen Secure data exchange network
CN113128781A (en) * 2021-04-30 2021-07-16 大连理工大学 Distributed industrial energy operation optimization platform for automatically constructing intelligent model and algorithm
US11487273B1 (en) * 2021-04-30 2022-11-01 Dalian University Of Technology Distributed industrial energy operation optimization platform automatically constructing intelligent models and algorithms
CN114143037A (en) * 2021-11-05 2022-03-04 山东省计算中心(国家超级计算济南中心) Malicious encrypted channel detection method based on process behavior analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周俊;沈华杰;林中允;曹珍富;董晓蕾;: "边缘计算隐私保护研究进展" *

Also Published As

Publication number Publication date
CN115834250B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
CN109493020B (en) Block chain based secure transaction method and device
CN105468563B (en) SPI slave devices, SPI communication system and SPI communication method
CN104184740A (en) Credible transmission method, credible third party and credible transmission system
CN109922047B (en) Image transmission system and method
US11687365B2 (en) Method and apparatus for controlling a computational storage processor
CN108566368B (en) Data processing method, server and diagnosis connector
CN103563289B (en) The method and system of the dominant vector in protection encryption system
US20220172180A1 (en) Method for Storing Transaction that Represents Asset Transfer to Distributed Network and Program for Same
CN110955896A (en) Method for realizing safe upgrading of firmware of single chip microcomputer through near field communication
CN109257176A (en) Decruption key segmentation and decryption method, device and medium based on SM2 algorithm
JP2003512649A (en) Cryptographic accelerator
CN109861743B (en) Data safety transmission method based on Beidou short message positioning information transmission protocol
JP6279765B2 (en) Encryption method for communication between bank POS and mobile terminal and bank POS
CN110620762A (en) RDMA (remote direct memory Access) -based data transmission method, network card, server and medium
CN110166426A (en) Information sends terminal, receives terminal and its secret communication method, storage medium
CN111192050A (en) Digital asset private key storage and extraction method and device
CN104135496B (en) RPC data transmission methods and system under a kind of homogeneous environment
CN107643992A (en) PCIe controller and the looping back data path using PCIe controller
CN110417553A (en) Secure Multi-Party communication means, device and user terminal
CN111865557B (en) Verification code generation method and device
CN116488919A (en) Data processing method, communication node and storage medium
CN111769945A (en) Auction processing method based on block chain and block chain link point
JP6273226B2 (en) Encryption system, authentication system, encryption device, decryption device, authenticator generation device, verification device, encryption method, authentication method
CN103731424B (en) A kind of transmission method of network data, apparatus and system
CN115834250A (en) Encryption communication method for medical equipment interior

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant