CN115834250A - Encryption communication method for medical equipment interior - Google Patents
Encryption communication method for medical equipment interior Download PDFInfo
- Publication number
- CN115834250A CN115834250A CN202310108246.XA CN202310108246A CN115834250A CN 115834250 A CN115834250 A CN 115834250A CN 202310108246 A CN202310108246 A CN 202310108246A CN 115834250 A CN115834250 A CN 115834250A
- Authority
- CN
- China
- Prior art keywords
- equipment
- path
- model
- path model
- accessory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006854 communication Effects 0.000 title claims abstract description 47
- 238000004891 communication Methods 0.000 title claims abstract description 45
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000005538 encapsulation Methods 0.000 claims description 14
- 238000004806 packaging method and process Methods 0.000 claims description 6
- 238000007789 sealing Methods 0.000 claims description 6
- 238000012790 confirmation Methods 0.000 claims description 4
- 241001505100 Succisa pratensis Species 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000012795 verification Methods 0.000 description 9
- 238000012856 packing Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 101150049349 setA gene Proteins 0.000 description 1
Images
Landscapes
- Medical Treatment And Welfare Office Work (AREA)
Abstract
The invention provides an encryption communication method used in medical equipment, and particularly relates to the field of digital information transmission. The encryption communication method is mainly applied to communication between accessory equipment and host equipment, the accessory equipment generates a random integer set when being powered on and started, a consensus element table is solidified between the accessory equipment and the host equipment through the random integer set, the host equipment generates the same path model in the accessory equipment and the host equipment through randomly selecting elements and according to a specific algorithm on the basis of the consensus element table, and then a package model which is acknowledged by the accessory equipment and the host equipment is established through the path model. The encryption communication method needs the matching relationship between the built-in data of the accessory equipment and the built-in data of the host equipment, and needs the dynamic participation of the accessory equipment and the host equipment in the communication process, so that the accessory equipment can be effectively verified, and the medical equipment is prevented from generating faults due to the adoption of third-party accessory equipment.
Description
Technical Field
The invention relates to the field of digital information transmission, in particular to an encryption communication method used in medical equipment.
Background
The common medical equipment generally comprises host equipment and accessory equipment, wherein the host equipment is mainly used for processing data, the accessory equipment is generally used for executing operation, the accessory equipment and the host equipment are generally in a detachable connection relation based on the consideration of use cost, the accessory equipment and the host equipment are communicated through packet data, and the accessory equipment can be replaced according to the service life.
At present, some third-party manufacturers on the market develop accessory equipment reversely and manufacture imitations for sale, and since medical equipment is equipment applied to the medical field, unpredictable problems may be caused by using products of the third-party manufacturers, and medical accidents are caused, so that verification and limitation on replaced accessory equipment are necessary.
Since the authentication structure improvement on the physical structure is easily cracked by reverse development, the authentication limitation on the accessory device is generally started from the aspect of software, wherein the most common software authentication limitation mode is encrypted communication between the host device and the accessory device.
The encryption communication mainly means that the transmitted data between two communication parties is encrypted, and the outside cannot restore the essential content of the transmitted data in a mode of intercepting the transmitted data, so that the data cannot be sent and received in a reverse mode and the like in a counterfeit mode.
Disclosure of Invention
The invention provides an encryption communication method for the interior of medical equipment, which is mainly applied to the communication between accessory equipment and host equipment.
Correspondingly, the invention provides an encryption communication method used in medical equipment, which comprises the following steps:
starting and generating random integer set after accessory equipment is connected to host equipmentWherein, in the step (A),,is an integer greater than 2 and is,,is a preset integer;
the accessory device and the host device are based on the set of random integers, respectivelyGenerating a consensus element table, the consensus element table comprisingAn element ofThe polar coordinates of each element are;
The host device selects an element from the consensus element table as a starting element and sends the starting element to the accessory device;
the host device and the accessory device respectively take the initial element as a path starting point and plan a path model traversing all the elements based on a preset algorithm, wherein the path model comprises sequentially arranged path modelsAn element and arranged in said orderIn the individual elements, the firstAn element anddifference between individual elements,;
The host device and the accessory device respectively construct a package model based on the path model, and the package model comprises a plurality of sequentially arranged package modelsA bit data bit, theBit data bits includeBit storage bit andbit redundancy bits ofBit redundancy bit is inThe bit data bits are located at;
The accessory equipment packages target data into a sealing package based on the packaging model and sends the sealing package to the host equipment;
and the host equipment analyzes the encapsulation packet based on the encapsulation model to obtain the target data.
In an optional embodiment, the host device selects an element in the consensus element table as a starting element and sends the starting element to the accessory device:
the host device selects an element from the consensus element table as an initial element according to a preset interval time and sends the initial element to the accessory device;
in an alternative embodiment, the host device and the accessory device each have the same set of algorithms embedded therein,Is as followsThe algorithm is used for the first time and the second time,,is an integer greater than 1;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device is in the set of algorithmsSelecting one algorithm as a target algorithm and sending a number corresponding to the target algorithm to the accessory equipment;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
In an optional embodiment, the host device sends the starting element and the number corresponding to the target algorithm to the accessory device synchronously.
In an alternative embodiment, the host device and the accessory device each have the same set of algorithms embedded therein,Is as followsThe algorithm is used for the first time and the second time,,is an integer greater than 1;
the host device selecting an element in the consensus element table as a starting element and sending the starting element to the accessory device further comprises:
based on a preset functional relationship, the host equipment derives the number of the target algorithm through the number of the initial elementAnd establishing the target algorithm as an algorithm;
The host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
In an optional embodiment, the planning a path model traversing all elements based on a preset algorithm includes:
In an optional embodiment, the path model is determined based on a preset algorithmThe arrangement order of the elements comprises:
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequencesAnd (4) each element.
In an optional embodiment, the path model is determined based on a preset algorithmThe arrangement order of the elements comprises:
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequencesAnd (4) each element.
In an alternative embodiment, the confirmation based on the predetermined algorithm is in the path modelThe arrangement order of the elements comprises:the arrangement order of the elements comprises:
s402: transferring the starting element from the temporary cache space into the path model;
s403: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s404: taking the element with the longest connecting line distance as a second element;
s405: transferring the second element from the temporary cache space into the path model;
s406: repeating the steps S403 to S405 until the path model comprises the sequential orderAnd (4) each element.
In an optional embodiment, the accessory device packaging the target data into a sealed packet based on the packaging model and sending the sealed packet to the host device includes:
the accessory device stores the target data into data bits of a packet model.
In an optional embodiment, the analyzing, by the host device, the encapsulated packet based on the encapsulation model to obtain the target data includes:
and the host equipment reads and analyzes data bit data in the sealed packet according to the packet model.
In summary, the present invention provides an encryption communication method for use in a medical device, the encryption communication method is mainly applied to communication between an accessory device and a host device, the accessory device generates a random integer set when being powered on and started each time, a consensus element table is solidified between the accessory device and the host device through the random integer set, based on the consensus element table, the host device generates a same path model in the accessory device and the host device according to a specific algorithm through randomly selecting elements and through the path model, and then constructs a packet model that both the accessory device and the host device acknowledge, in the encryption communication method, firstly, contents such as a basic model of the consensus element table, a preset algorithm for traversing the element to generate the path model, and a packet model constructed based on the path model in the accessory device need to be consistent with the host device, which can perform preliminary verification on the accessory device; secondly, in order to prevent a third party from developing a communication package between the accessory equipment and the host equipment in a reverse direction, the same package model is fixedly used for communication, and on the basis of the consistency of the built-in contents, the communication encryption method also relates to dynamic verification matching contents such as generation of a random integer set depending on the accessory equipment and selection of an initial element depending on the host equipment, so that the communication verification between the accessory equipment and the host equipment is dynamically changed, and the verification performance of the accessory equipment is further improved; correspondingly, the basic structure of the finally generated package model is dynamically changed, so that the difficulty of reverse direction is greatly increased; in addition, target data itself does not encrypt through too complicated algorithm, only insert a plurality of redundant bits in target data and obscure, target data's order does not change itself, target data's packing and the analysis of adding sealed package can not produce too high demand to hardware, host equipment is when analyzing encryption sealed package, need not carry out complete buffer memory to encryption sealed package and can read each storage bit and directly analyze out target data according to the storage bit order of packet model, this also is favorable to reducing the requirement to the buffer memory space, and has good practicality.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an encrypted communication method used in a medical device according to an embodiment of the present invention.
Fig. 2 is a graphical schematic diagram of a consensus element table according to an embodiment of the present invention.
Description of the preferred embodiment
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of an encrypted communication method used in a medical device according to an embodiment of the present invention.
It should be noted that the encryption communication method described in the embodiment of the present invention refers to a communication method between the accessory device and the host device that meets the specification, and the accessory device that does not meet the specification may generate an error in the encryption communication process with the host device, and the related error will be described later.
Correspondingly, the invention provides an encryption communication method used in medical equipment, which comprises the following steps:
s101: the accessory equipment is started and generates a random integer set after being accessed to the host equipment;
specifically, for ease of reference and description, the set of random integers is defined as,Is a randomly generated value, wherein,i.e. by,Is an integer greater than 2 and is,,is a preset integer.
S102: the accessory device sending the set of random integers to a host device;
it should be noted that the accessory device sends the random integer setInteraction data between the accessory device and the host device is only a randomly integrated setAs such, subsequent consensus element table contents are not included.
S103: the accessory device and the host device generate a consensus element table based on the set of random integers, respectively;
specifically, the consensus element table comprisesAn element ofThe polar coordinates of each element are。
It should be noted that the construction of the consensus element table is essentially to be in the random integer setSubstituting into the polar coordinates of the corresponding elements, the polar angle in the polar coordinates of each element is confirmed,and substituting the polar diameter into the corresponding element. Therefore, the basic structure of the relevant elements needs to be preset in the accessory device and the host device, which provides a requirement for the built-in program of the accessory device.
In order to better describe the content of the consensus element table, the embodiment of the invention providesFor the purpose of illustration, there areThe polar coordinates of the relevant elements are identified in fig. 2, and fig. 2 is a graphical schematic diagram of a consensus element table according to an embodiment of the present invention.
Referring to fig. 2, a polar coordinate definition is adopted, so that a random integer set is converted into two-dimensional coordinate system data to facilitate subsequent operations; regarding the structural definition of the polar coordinates of the elements, in particular practice, all the elements can be always contained in a certain area range along with the change of the total number of the elements, so that the subsequent distance calculation is more traversed; in addition, the definition form of polar coordinates can enable the subsequent path model to generate more variability, thereby improving the uncertainty of the path model, and the content related to the variability is further explained in the following.
S104: the host device selects an element from the consensus element table as a starting element and sends the starting element to the accessory device;
the host device selects the starting elements to have randomness, and different starting elements can change the path model generated in the subsequent steps, and the change of the path model can change the packaging model.
To further improve the dynamic authentication of the accessory device, in an alternative embodiment, the host device selects an element in the consensus element table as a starting element and sends the starting element to the accessory device:
the host device selects an element from the consensus element table as a starting element according to a preset interval time and sends the starting element to the accessory device.
By the implementation mode, the package model between the accessory equipment and the host equipment can be adjusted regularly, the third-party accessory equipment is prevented from being counterfeited by adopting the fixed package model, and the hardware equipment of the accessory equipment and the hardware equipment of the host equipment can be prevented from generating larger load pressure by the regular adjustment mode rather than the mode that each package is adjusted, so that the safety of data verification and the convenience of data processing can be well balanced.
S105: the host device and the accessory device respectively take the initial element as a path starting point and plan and traverse path models of all elements based on a preset algorithm;
specifically, the path model comprises a plurality of path models arranged in sequenceAn element and arranged in said orderIn the individual elements, the firstAn element anddifference between individual elements,;
Specifically, different preset algorithms can derive different path models, and two main contents are mainly related to the path models and are respectively arranged in sequenceAn element (i.e. theThe order of the elements) andan element anddifference between individual elements(i.e., the difference in the pole diameters of two adjacent elements in the aligned sequence). Thus, in essence, the planning of the path model through all elements based on the preset algorithm comprises:
Regarding the content of the preset algorithm, the embodiment of the present invention provides two preset algorithms for reference.
The method comprises the following steps:
the confirmation based on the preset algorithm is in the path modelThe arrangement order of the elements comprises:
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
s306: repeating steps S303 to S305 until the path model comprises sequential sequencesAnd (4) each element.
Referring to FIG. 2 of the drawings, supposeAs the starting element, firstlyMove from the temporary cache space into the path model, as the first element of the sort, and thenAs a first element, calculateIs divided intoThe distance of (d); suppose thatToThe shortest distance between points willTransferring the temporary cache space into the path model as a second ordered element; then is provided withAs a first element, calculateIs divided intoThe distance of (d); suppose thatToThe shortest distance between points willTransferring the temporary cache space into the path model as a third element of the sequence; in turn weighUntil the path model comprises sequential orderingAnd (4) each element.
It should be noted that if the distance is equal, the second-level priority condition regarding clockwise selection or counterclockwise selection can be supplemented.
With reference to fig. 2, if the initial elements are selected differently, the finally derived path model has different element orderings due to the traversal selection, and there is no cyclic condition that the element arrangements are connected end to end, which is beneficial to increasing the uncertainty of the path model.
The second method comprises the following steps:
s402: transferring the starting element from the temporary cache space into the path model;
s403: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s404: taking the element with the longest connecting line distance as a second element;
s405: transferring the second element from the temporary cache space into the path model;
s406: repeating the steps S403 to S405 until the path model comprises the sequential orderAnd (4) each element.
Specifically, the implementation logic of the second method is similar to that of the first method, and no additional description is provided in the embodiments of the present invention.
After confirming the path model, the calculation is neededAn element anddifference between individual elementsThe difference is obtained by subtracting the corresponding pole diameters of the two elements, and the embodiment of the present invention is not further described.
Furthermore, the communication encryption algorithm can be further improved in safety aiming at the budget algorithm.
Specifically, the host device and the accessory device are respectively provided with the same algorithm set,Is as followsThe algorithm is used for the first time and the second time,,the number of the integers is more than 1, that is, the budget algorithm can be various and can be selected according to actual needs.
Correspondingly, the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm includes:
the host device is in the set of algorithmsSelecting one algorithm as a target algorithm and sending a number corresponding to the target algorithm to the accessory equipment;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
By setting various preset algorithm modes, the safety of the communication encryption algorithm can be further improved.
Based on the consideration of communication convenience, the host device synchronously sends the starting element and the number corresponding to the target algorithm to the accessory device.
It should be noted that the numbers of the start element and the target algorithm also refer only to the specifically indicated data and not to the built-in data of the accessory device and the host device, and this embodiment can reverse the data content by the third party in an efficient manner.
Further, based on practical considerations, the number of the target algorithm and the initial element can be functionally associated, and when data is transmitted, the target algorithm can be established only by transmitting the initial element. Specifically, the host device and the accessory device are respectively provided with the same algorithm set,Is as followsThe algorithm of the seed is used for calculating,,is an integer greater than 1;
the host device selecting an element in the consensus element table as a starting element and sending the starting element to the accessory device further comprises:
based on a preset functional relationship, the host equipment derives the number of the target algorithm through the number of the initial elementAnd establishing the target algorithm as an algorithm;
The host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
S106: the host device and the accessory device construct a package model based on the path model respectively;
specifically, the package model comprises a plurality of sequentially arranged packagesA bit data bit, theBit data bits includeBit storage bit andbit redundancy bit, noBit redundancy bit is inThe bit data bits are located at;
Specifically, the data derived by the path model is substantially a point sequence and data of a polar path difference between two adjacent points, and in the packet model, the points in the point sequence are converted into redundant bits and are converted into a corresponding number of storage bits according to the value of the polar path difference.
Specifically, the storage bit is used for storing the target data, the redundant bit is interference data, and if the unpacking mode is not matched, the data derived from the sealed packet constructed by the data model is wrong. Therefore, although the data packed by the packing model still corresponds to a plain text form, the packed data may have non-readability due to the addition of the redundancy bits.
S107: the accessory equipment packages target data into a sealing package based on the packaging model and sends the sealing package to the host equipment;
specifically, the accessory device packages the target data into the encapsulation packet based on the encapsulation model and sends the encapsulation packet to the host device includes:
the accessory device stores the target data into data bits of a packet model.
The data of the redundant bits may be filled in a random number.
S108: and the host equipment analyzes the encapsulation packet based on the encapsulation model to obtain the target data.
Correspondingly, the analyzing, by the host device, the encapsulated packet based on the encapsulation model to obtain the target data includes:
and the host equipment reads and analyzes data bit data in the sealed packet according to the packet model.
The host device builds a package model matched with the accessory device, and accordingly, when the host device reads data of the encrypted package, the host device can directly skip the redundant bits and sequentially read the content of the data bits; after the data content of the redundant bit is eliminated, the arrangement of the target data in the encryption package is ordered, so that the host equipment can directly process the read data immediately without waiting for complete unpacking and then processing the data.
In summary, the present invention provides an encrypted communication method for use in a medical device, the encrypted communication method is mainly applied to communication between an accessory device and a host device, the accessory device generates a random integer set when being powered on and started each time, a consensus element table is solidified between the accessory device and the host device through the random integer set, based on the consensus element table, the host device generates a same path model in the accessory device and the host device according to a specific algorithm by randomly selecting elements, and then constructs a packet model that both the accessory device and the host device acknowledge through the path model, in the encrypted communication method, firstly, the contents such as a basic model of the consensus element table, a preset algorithm for traversing the element to generate the path model, and a packet model constructed based on the path model need to be consistent with the host device, which can perform preliminary verification on the accessory device; secondly, in order to prevent a third party from developing a communication package between the accessory equipment and the host equipment in a reverse direction, the same package model is fixedly used for communication, and on the basis of the consistency of the built-in contents, the communication encryption method also relates to dynamic verification matching contents such as generation of a random integer set depending on the accessory equipment and selection of an initial element depending on the host equipment, so that the communication verification between the accessory equipment and the host equipment is dynamically changed, and the verification performance of the accessory equipment is further improved; correspondingly, the basic structure of the finally generated package model is dynamically changed, so that the difficulty of reverse direction is greatly increased; in addition, target data itself does not encrypt through too complicated algorithm, only insert a plurality of redundant bits in target data and obscure, target data's order does not change, target data's packing and the analysis that adds the encapsulation package can not produce too high demand to hardware, host computer equipment is when analyzing the encryption encapsulation package, need not carry out the complete buffer memory to the encryption encapsulation package and can read each storage bit and directly analyze out target data according to the storage bit order of package model, this also is favorable to reducing the requirement to the buffer memory space, good practicality has.
The encryption communication method for the medical device interior provided by the embodiment of the invention is described in detail above, and the principle and the implementation of the invention are explained in the present document by applying a specific example, and the description of the above embodiment is only used to help understanding the method of the invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (10)
1. An encrypted communication method for use inside a medical device, comprising:
starting and generating random integer set after accessory equipment is connected to host equipmentWherein, in the process,,is an integer greater than 2 and is,,is a preset integer;
the accessory device and the host device are based on the set of random integers, respectivelyGenerating a consensus element table, the consensus element table comprisingAn element ofThe polar coordinates of each element are;
The host device selects an element from the consensus element table as a starting element and sends the starting element to the accessory device;
the host device and the accessory device respectively take the initial element as a path starting point and plan a path model traversing all the elements based on a preset algorithm, wherein the path model comprises sequentially arranged path modelsAn element and arranged in said orderIn the individual elements, the firstAn element anddifference between individual elements,;
The host device and the accessory device respectively construct a package model based on the path model, and the package model comprises a plurality of sequentially arranged package modelsA bit data bit, theBit data bits includeBit storage bit andbit redundancy bits ofBit redundancy bit is inThe bit data bits are located at;
The accessory equipment packages target data into a sealing package based on the packaging model and sends the sealing package to the host equipment;
and the host equipment analyzes the encapsulation packet based on the encapsulation model to obtain the target data.
2. The encrypted communication method for use inside a medical device according to claim 1, wherein the host device selects an element in the consensus element table as a starting element and sends the starting element to the accessory device:
the host device selects an element from the consensus element table as a starting element according to a preset interval time and sends the starting element to the accessory device.
3. The method of claim 1, wherein the host device and the accessory device have the same set of algorithms embedded therein,Is as followsThe algorithm is used for the first time and the second time,,is an integer greater than 1;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device is in the set of algorithmsSelecting one algorithm as a target algorithm and sending a number corresponding to the target algorithm to the accessory equipment;
the host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
4. The encrypted communication method for the interior of the medical device according to claim 3, wherein the host device synchronously sends the starting element and the number corresponding to the target algorithm to the accessory device.
5. The encrypted communication method for use inside a medical device according to claim 3, wherein the host device and the accessory device are respectively built-in with the same set of algorithms,Is as followsThe algorithm is used for the first time and the second time,,is an integer greater than 1;
the host device selecting an element in the consensus element table as a starting element and sending the starting element to the accessory device further comprises:
based on a preset functional relationship, the host equipment derives the number of the target algorithm through the number of the initial elementAnd establishing the target algorithm as an algorithm;
The host device and the accessory device respectively use the starting element as a path starting point, and plan a path model traversing all elements based on a preset algorithm, wherein the path model comprises:
the host device and the accessory device respectively take the starting element as a path starting point and plan a path model for traversing all the elements based on the target algorithm.
6. The encrypted communication method for the interior of the medical equipment according to claim 1, wherein planning a path model traversing all elements based on a preset algorithm comprises:
7. The method according to claim 6, wherein the confirmation based on a predetermined algorithm is performed in the path modelThe arrangement order of the elements comprises:
s302: transferring the starting element from the temporary cache space into the path model;
s303: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s304: taking the element with the shortest connecting line distance as a second element;
s305: transferring the second element from the temporary cache space into the path model;
8. The method according to claim 6, wherein the confirmation based on a predetermined algorithm is performed in the path modelThe arrangement order of the elements comprises:
s402: transferring the starting element from the temporary cache space into the path model;
s403: taking an element which finally enters the path model as a first element, and respectively calculating the connecting line distance from the first element to each element in the temporary cache space;
s404: taking the element with the longest connecting line distance as a second element;
s405: transferring the second element from the temporary cache space into the path model;
9. The cryptographic communication method for the interior of the medical device according to claim 1, wherein the accessory device packages the target data into a sealed packet based on the packet model and sends the sealed packet to the host device includes:
the accessory device stores the target data into data bits of a packet model.
10. The encrypted communication method for the interior of the medical device according to claim 1, wherein the host device parsing the sealed packet based on the packet model to obtain the target data comprises:
and the host equipment reads and analyzes data bit data in the sealed packet according to the packet model.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310108246.XA CN115834250B (en) | 2023-02-14 | 2023-02-14 | Encryption communication method for medical equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310108246.XA CN115834250B (en) | 2023-02-14 | 2023-02-14 | Encryption communication method for medical equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115834250A true CN115834250A (en) | 2023-03-21 |
CN115834250B CN115834250B (en) | 2023-05-09 |
Family
ID=85521184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310108246.XA Active CN115834250B (en) | 2023-02-14 | 2023-02-14 | Encryption communication method for medical equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115834250B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130268357A1 (en) * | 2011-09-15 | 2013-10-10 | Stephan HEATH | Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms |
CN104010301A (en) * | 2014-06-13 | 2014-08-27 | 曾宪钊 | Multi-element random garble encryption algorithm for wireless safe communication |
CN110163233A (en) * | 2018-02-11 | 2019-08-23 | 陕西爱尚物联科技有限公司 | A method of so that machine is competent at more complex works |
CN111740951A (en) * | 2015-01-26 | 2020-10-02 | 卢森堡商创研腾智权信托有限公司 | Method for dynamically transmitting data through cloud security |
CN112525093A (en) * | 2018-09-19 | 2021-03-19 | 成都理工大学 | System for building tunnel three-dimensional model |
CN113128781A (en) * | 2021-04-30 | 2021-07-16 | 大连理工大学 | Distributed industrial energy operation optimization platform for automatically constructing intelligent model and algorithm |
CN113273146A (en) * | 2018-07-10 | 2021-08-17 | 力士塔有限公司 | Decentralized network security privacy network for cloud communication, computing and global e-commerce |
CN114143037A (en) * | 2021-11-05 | 2022-03-04 | 山东省计算中心(国家超级计算济南中心) | Malicious encrypted channel detection method based on process behavior analysis |
US20220150220A1 (en) * | 2019-08-30 | 2022-05-12 | Henry Verheyen | Secure data exchange network |
-
2023
- 2023-02-14 CN CN202310108246.XA patent/CN115834250B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130268357A1 (en) * | 2011-09-15 | 2013-10-10 | Stephan HEATH | Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms |
CN104010301A (en) * | 2014-06-13 | 2014-08-27 | 曾宪钊 | Multi-element random garble encryption algorithm for wireless safe communication |
CN111740951A (en) * | 2015-01-26 | 2020-10-02 | 卢森堡商创研腾智权信托有限公司 | Method for dynamically transmitting data through cloud security |
CN111800375A (en) * | 2015-01-26 | 2020-10-20 | 卢森堡商创研腾智权信托有限公司 | Method for dynamically transmitting data packets through cloud security |
CN110163233A (en) * | 2018-02-11 | 2019-08-23 | 陕西爱尚物联科技有限公司 | A method of so that machine is competent at more complex works |
CN113273146A (en) * | 2018-07-10 | 2021-08-17 | 力士塔有限公司 | Decentralized network security privacy network for cloud communication, computing and global e-commerce |
CN112525093A (en) * | 2018-09-19 | 2021-03-19 | 成都理工大学 | System for building tunnel three-dimensional model |
US20220150220A1 (en) * | 2019-08-30 | 2022-05-12 | Henry Verheyen | Secure data exchange network |
CN113128781A (en) * | 2021-04-30 | 2021-07-16 | 大连理工大学 | Distributed industrial energy operation optimization platform for automatically constructing intelligent model and algorithm |
US11487273B1 (en) * | 2021-04-30 | 2022-11-01 | Dalian University Of Technology | Distributed industrial energy operation optimization platform automatically constructing intelligent models and algorithms |
CN114143037A (en) * | 2021-11-05 | 2022-03-04 | 山东省计算中心(国家超级计算济南中心) | Malicious encrypted channel detection method based on process behavior analysis |
Non-Patent Citations (1)
Title |
---|
周俊;沈华杰;林中允;曹珍富;董晓蕾;: "边缘计算隐私保护研究进展" * |
Also Published As
Publication number | Publication date |
---|---|
CN115834250B (en) | 2023-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109493020B (en) | Block chain based secure transaction method and device | |
CN105468563B (en) | SPI slave devices, SPI communication system and SPI communication method | |
CN104184740A (en) | Credible transmission method, credible third party and credible transmission system | |
CN109922047B (en) | Image transmission system and method | |
US11687365B2 (en) | Method and apparatus for controlling a computational storage processor | |
CN108566368B (en) | Data processing method, server and diagnosis connector | |
CN103563289B (en) | The method and system of the dominant vector in protection encryption system | |
US20220172180A1 (en) | Method for Storing Transaction that Represents Asset Transfer to Distributed Network and Program for Same | |
CN110955896A (en) | Method for realizing safe upgrading of firmware of single chip microcomputer through near field communication | |
CN109257176A (en) | Decruption key segmentation and decryption method, device and medium based on SM2 algorithm | |
JP2003512649A (en) | Cryptographic accelerator | |
CN109861743B (en) | Data safety transmission method based on Beidou short message positioning information transmission protocol | |
JP6279765B2 (en) | Encryption method for communication between bank POS and mobile terminal and bank POS | |
CN110620762A (en) | RDMA (remote direct memory Access) -based data transmission method, network card, server and medium | |
CN110166426A (en) | Information sends terminal, receives terminal and its secret communication method, storage medium | |
CN111192050A (en) | Digital asset private key storage and extraction method and device | |
CN104135496B (en) | RPC data transmission methods and system under a kind of homogeneous environment | |
CN107643992A (en) | PCIe controller and the looping back data path using PCIe controller | |
CN110417553A (en) | Secure Multi-Party communication means, device and user terminal | |
CN111865557B (en) | Verification code generation method and device | |
CN116488919A (en) | Data processing method, communication node and storage medium | |
CN111769945A (en) | Auction processing method based on block chain and block chain link point | |
JP6273226B2 (en) | Encryption system, authentication system, encryption device, decryption device, authenticator generation device, verification device, encryption method, authentication method | |
CN103731424B (en) | A kind of transmission method of network data, apparatus and system | |
CN115834250A (en) | Encryption communication method for medical equipment interior |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |