CN115915122A - Data processing method and device, network side equipment and terminal - Google Patents

Data processing method and device, network side equipment and terminal Download PDF

Info

Publication number
CN115915122A
CN115915122A CN202110896549.3A CN202110896549A CN115915122A CN 115915122 A CN115915122 A CN 115915122A CN 202110896549 A CN202110896549 A CN 202110896549A CN 115915122 A CN115915122 A CN 115915122A
Authority
CN
China
Prior art keywords
key
target
optimization
optimized
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110896549.3A
Other languages
Chinese (zh)
Inventor
何申
王峰生
粟栗
杜海涛
田野
孙玲玲
王华华
王丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110896549.3A priority Critical patent/CN115915122A/en
Publication of CN115915122A publication Critical patent/CN115915122A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a data processing method, a data processing device, network side equipment and a terminal, and relates to the technical field of communication. The method comprises the following steps: acquiring a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and a terminal; processing the access stratum encryption key by using the target optimization key to obtain an optimized target access stratum encryption key; and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data. The scheme of the invention solves the problem of low security of the communication system.

Description

Data processing method and device, network side equipment and terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data processing method and apparatus, a network side device, and a terminal.
Background
With the development of mobile communication networks, more and more users rely on mobile phones to perform a series of financial and information services, and mobile communication systems become an indispensable part of daily life, so that the security of the mobile communication systems is receiving more and more attention. The second generation mobile communication system adopts one-way authentication, namely, the authentication response parameter is generated by encrypting a root key Ki through A3 so as to complete the authentication of the network to the terminal, but a lawbreaker can quickly acquire the Ki value of a Subscriber Identity Module (SIM) card of a target terminal by cracking an A3 algorithm, thereby realizing SIM card copying and stealing personal information and telephone charge of a mobile Subscriber. Compared with the second generation mobile communication system, the third generation mobile communication system adopts bidirectional authentication, and after the bidirectional authentication, the Universal Subscriber Identity Module (USIM) and the service network generate the same CK and IK for encryption and Integrity protection, but both algorithms are implemented based on the Kasumi algorithm, and the a53 encryption algorithm of the Kasumi has been broken, and a certain security risk still exists. The Long Term Evolution (LTE) network not only adopts bidirectional authentication, but also introduces a layered encryption mechanism to further generate K on the basis of generating CK and IK by a root key K ASME Reuse of K ASME Generating non-access stratum and access stratum related keys, and then using the derived keys for further encryption and integrity protection, but due to the access stratum key K at the base station side eNB By the core networkThe transmission gets so that it still has a risk of leakage, and K eNB The disclosure may further lead to an access stratum encryption key K rrcenc Access layer integrity protection key K rrcint And a user plane encryption key K upenc And (4) leakage.
In several communication systems, since an eavesdropper can obtain the keys of both communication parties through a series of ways in the encrypted communication between the end user and the base station device, the communication content is no longer "encrypted" content for the eavesdropper, which seriously threatens the communication security of the mobile communication system.
Disclosure of Invention
The invention aims to provide a data processing method, a data processing device, network side equipment and a terminal, which can solve the problem of poor security in a communication system.
To achieve the above object, an embodiment of the present invention provides a data processing method applied to a network device, including:
acquiring a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and a terminal;
processing the access stratum encryption key by using the target optimization key to obtain an optimized target access stratum encryption key;
and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
Optionally, the obtaining the target optimization key includes:
acquiring the channel characteristic information;
and generating the target optimization key according to the channel characteristic information.
Optionally, the generating the target optimization key according to the channel feature information includes:
at least one of down-sampling, normalization and quantization processing is carried out on the channel characteristic information to generate an initial optimization key;
and negotiating with the terminal aiming at the initial optimization key, and determining the target optimization key.
Optionally, the obtaining the target optimization key includes:
at least one optimization key is selected from the plurality of optimization keys in the optimization key table as a target optimization key.
Optionally, before selecting one of the optimization keys in the optimization key table as the target optimization key, the method further includes:
acquiring the channel characteristic information;
generating a plurality of optimized keys according to the channel characteristic information obtained by multiple times;
and constructing the optimized key table according to the optimized keys.
Optionally, the constructing the optimized key table according to the optimized keys includes:
negotiating with the terminal for the plurality of optimized keys;
and constructing the optimized key table by adopting a plurality of optimized keys determined by negotiation.
Optionally, the acquiring the channel characteristic information includes:
and detecting a pilot frequency sequence, and performing channel estimation on the wireless channel to obtain the channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, the access stratum encryption key is processed by using the target optimized key to obtain an optimized target access stratum encryption key, where the optimized target access stratum encryption key includes one of the following items:
performing modulo-two addition operation on the target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
interweaving the target optimization secret key, and performing modulo two addition operation on the interwoven target optimization secret key and the access stratum encryption secret key to generate an optimized target access stratum encryption secret key;
and when the target optimization key comprises at least two optimization keys, performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and the access stratum encryption key to generate an optimized target access stratum encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
To achieve the above object, an embodiment of the present invention provides a data processing method, applied to a terminal, including:
acquiring a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and a terminal;
processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key;
and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
Optionally, the obtaining the target optimization key includes:
acquiring the channel characteristic information;
and generating the target optimization key according to the channel characteristic information.
Optionally, the acquiring the channel characteristic information includes:
and detecting a pilot frequency sequence, and performing channel estimation on the wireless channel to obtain the channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, the generating the target optimization key according to the channel feature information includes:
at least one of down-sampling, normalization and quantization processing is carried out on the channel characteristic information to generate an initial optimization key;
and negotiating with a terminal aiming at the initial optimization key, and determining the target optimization key.
Optionally, the obtaining the target optimization key includes:
receiving a sequence number of a target optimization key from the network side equipment;
and selecting at least one optimized key from the optimized keys in the optimized key table as a target optimized key according to the sequence number.
Optionally, before selecting at least one of the plurality of optimization keys in the optimization key table as the target optimization key according to the sequence number, the method further includes:
receiving the optimized key table from the network side device.
Optionally, the access stratum encryption key is processed by using the target optimized key to obtain an optimized target access stratum encryption key, where the optimized target access stratum encryption key includes one of the following items:
performing modulo-two addition operation on the target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
interweaving the target optimization secret key, and performing modulo two addition operation on the interwoven target optimization secret key and the access stratum encryption secret key to generate an optimized target access stratum encryption secret key;
and when the target optimization key comprises at least two optimization keys, performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and the access layer encryption key to generate an optimized target access layer encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
To achieve the above object, an embodiment of the present invention provides a data processing apparatus, applied to a network device, including:
the first acquisition module is used for acquiring a target optimization key, and the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and a terminal;
the first optimization module is used for processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key;
and the first processing module is used for carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
Optionally, the first obtaining module includes:
the first obtaining submodule is used for obtaining the channel characteristic information;
and the first generation submodule is used for generating the target optimization key according to the channel characteristic information.
Optionally, the first generation submodule includes:
a first generating unit, configured to perform at least one of downsampling, normalization, and quantization on the channel feature information to generate an initial optimization key;
and the first negotiation unit is used for negotiating the initial optimization key with the terminal and determining the target optimization key.
Optionally, the first obtaining module includes:
and the second obtaining submodule is used for selecting at least one of the optimization keys in the optimization key table as a target optimization key.
Optionally, the data processing apparatus further includes:
a second obtaining module, configured to obtain the channel characteristic information;
the first generation module is used for generating a plurality of optimized keys according to the channel characteristic information obtained by multiple times of acquisition;
a first construction module configured to construct the optimized key table according to the optimized keys.
Optionally, the first building block comprises:
the first negotiation submodule is used for negotiating with the terminal aiming at the plurality of optimized keys;
and the first construction submodule is used for constructing the optimized key table by adopting the plurality of optimized keys determined by negotiation.
Optionally, the first obtaining sub-module or the second obtaining sub-module is configured to:
and detecting a pilot frequency sequence, and performing channel estimation on the wireless channel to obtain the channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, the first optimization module comprises one of:
the first optimization submodule is used for performing modulo-two addition operation on the target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
the second optimization submodule is used for interweaving the target optimization secret key, and performing modulo two addition operation on the interwoven target optimization secret key and the access stratum encryption secret key to generate an optimized target access stratum encryption secret key;
and the third optimization sub-module is configured to, when the target optimization key includes at least two optimization keys, perform modulo two addition operation on an operation key constructed according to the at least two optimization keys and the access stratum encryption key to generate an optimized target access stratum encryption key, where the operation key is composed of a plurality of fragments of preset length extracted from each optimization key in the target optimization key.
To achieve the above object, an embodiment of the present invention provides a data processing apparatus, applied to a terminal, including:
a third obtaining module, configured to obtain a target optimization key, where the target optimization key is generated based on channel characteristic information of a wireless channel between a network side device and a terminal;
the second optimization module is used for processing the access stratum encryption key by using the target optimization key to obtain an optimized target access stratum encryption key;
and the second processing module is used for carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
Optionally, the third obtaining module includes:
a third obtaining submodule, configured to obtain the channel characteristic information;
and the second generation submodule is used for generating the target optimization key according to the channel characteristic information.
Optionally, the third obtaining module is specifically configured to:
and detecting a pilot frequency sequence, and performing channel estimation on the wireless channel to obtain the channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, the second generation submodule includes:
the second generating unit is used for performing at least one of down-sampling, normalization and quantization processing on the channel characteristic information to generate an initial optimization key;
and the second negotiation unit is used for negotiating the initial optimized key and the terminal and determining the target optimized key.
Optionally, the third obtaining module includes:
the receiving submodule is used for receiving the sequence number of the target optimization key from the network side equipment;
and the third obtaining submodule is used for selecting at least one of the optimized keys in the optimized key table as a target optimized key according to the sequence number.
Optionally, the data processing apparatus further includes:
a receiving module, configured to receive the optimized key table from the network side device.
Optionally, the second optimization module comprises one of:
the fourth optimization submodule is used for performing modulo two addition operation on the target optimization secret key and the access stratum encryption secret key to generate an optimized target access stratum encryption secret key;
a fifth optimization submodule, configured to interleave the target optimization key, and perform modulo-two addition operation on the interleaved target optimization key and the access stratum encryption key to generate an optimized target access stratum encryption key;
and the sixth optimization submodule is used for performing modulo-two addition operation on an operation key constructed according to the at least two optimization keys and the access stratum encryption key when the target optimization key comprises the at least two optimization keys to generate an optimized target access stratum encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
To achieve the above object, an embodiment of the present invention provides a network-side device, which includes a transceiver, a processor, a memory, and a program or an instruction stored in the memory and executable on the processor; the processor, when executing the program or instructions, implements the data processing method as described above.
To achieve the above object, an embodiment of the present invention provides a terminal, including a transceiver, a processor, a memory, and a program or instructions stored in the memory and executable on the processor; the processor, when executing the program or instructions, implements the data processing method as described above.
To achieve the above object, an embodiment of the present invention provides a readable storage medium, on which a program or instructions are stored, and the program or instructions, when executed by a processor, implement the steps in the data processing method of the network side device or the terminal side.
The technical scheme of the invention has the following beneficial effects:
in the encryption method, the encryption device, the network side equipment and the terminal of the embodiment of the invention, the target optimization secret key is obtained and generated based on the channel characteristic information of the wireless channel between the network side equipment and the terminal, the access layer encryption secret key is processed by using the target optimization secret key to obtain the optimized target access layer encryption secret key, the encryption/decryption algorithm operation is carried out on the data stream by using the target access layer encryption secret key to obtain the target data, and the randomness is extracted for the further optimization operation of the secret key based on the randomness existing in the wireless channel between the terminal user and the base station equipment, so that the safety and the reliability of both sides of legal communication are improved. Furthermore, the embodiment of the present invention further obtains channel state information based on a channel estimation method of the pilot symbols, generates a consistent key sequence key by using the channel state information, and performs an optimization operation on the access layer related key by using the generated key sequence key. Because the third party eavesdropper cannot obtain the channel state information consistent with the two legal communication parties, the generated key sequence key is inconsistent with the key sequence key of the two legal communication parties, namely the eavesdropper cannot obtain the optimized key, and the communication safety between the two legal communication parties is ensured.
Drawings
Fig. 1 is a flowchart of a data processing method of a network side device according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of acquiring channel characteristic information according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a key optimization according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating a data processing procedure according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of a data processing method of a terminal according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of data transmission according to an embodiment of the present invention;
fig. 7 is a schematic block diagram of a data processing apparatus of a network device according to an embodiment of the present invention;
fig. 8 is a block diagram of a data processing apparatus of a terminal according to an embodiment of the present invention;
fig. 9 is a block diagram of a network device according to an embodiment of the present invention;
fig. 10 is a block diagram of a terminal according to an embodiment of the present invention.
Detailed Description
To make the technical problems, technical solutions and advantages of the present invention more apparent, the following detailed description is given with reference to the accompanying drawings and specific embodiments.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
In various embodiments of the present invention, it should be understood that the sequence numbers of the following processes do not mean the execution sequence, and the execution sequence of each process should be determined by the function and the inherent logic of the process, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Additionally, the terms "system" and "network" are often used interchangeably herein.
In the embodiments provided herein, it should be understood that "B corresponding to a" means that B is associated with a from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
The embodiment of the invention provides a data processing method, which comprises the steps of obtaining a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and a terminal; processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key; and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data. The embodiment of the invention considers that the randomness of the channel characteristics between a single user and the base station is utilized to further optimize the key based on the characteristic that the wireless channel between the terminal user and the base station equipment has randomness. When a user is in a static state, the measured randomness characteristics are reduced and are easily acquired by a third party eavesdropper, so that the communication safety of the two parties is influenced, and the problem that the randomness is reduced and is easily acquired by the third party due to the fact that a new randomness characteristic (such as channel state information) is added is solved. Because the same channel characteristics are difficult to acquire by a third party, after the key is further optimized by utilizing the channel characteristics, the communication safety of both communication parties is improved, and the reliability of communication at an air interface transmission stage is guaranteed.
As shown in fig. 1, a data processing method according to an embodiment of the present invention is applied to a network device, and includes:
step 11: and acquiring a target optimization key, wherein the target optimization key is generated based on the channel characteristic information of the wireless channel between the network side equipment and the terminal.
The Channel characteristic Information is Information with randomness characteristics of a wireless Channel between the network side device and the terminal, such as Channel State Information (CSI) and the like. The radio channel randomness includes signal strength, relative position of the user and the base station, etc.
Step 12: and processing the encryption key of the access layer by using the target optimization key to obtain the optimized encryption key of the target access layer.
Access layer encryption key (e.g., access layer encryption key K) using target-optimized key associated with channel characterization information rrcenc Access layer integrity protection key K rrcint And a user plane encryption key K upenc ) Optimization is carried out, and the problem that the key is easily stolen by an eavesdropper can be avoided.
Step 13: and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
For example: the encryption/decryption algorithm operation may be performed on the data stream by using the target access stratum encryption key based on an Evolved Encryption Algorithm (EEA) to obtain the target data.
In the following behavior example, before sending data to the terminal, the network side device performs steps 11 to 13 to encrypt the data to obtain encrypted target data, and sends the encrypted target data to the terminal. In the above behavior example, after receiving the data sent by the terminal, the network side device executes steps 11 to 13 to decrypt the received data, so as to obtain decrypted target data.
Optionally, step 11 includes, but is not limited to, the following two ways:
the method comprises the steps of firstly, acquiring channel characteristic information; and generating a target optimization key according to the channel characteristic information.
In the method, the network side equipment generates the target optimization key in real time to take effect for a period of time, acquires the channel characteristic information when data needs to be sent or received, and generates the target optimization key according to the channel characteristic information. Optionally, after updating the channel characteristic information, the network side device regenerates the target optimization key.
Further, generating a target optimization key according to the channel characteristic information includes: and performing at least one of down-sampling, normalization and quantization processing on the channel characteristic information to generate a target optimization key. Because the wireless channel has the characteristics of randomness and short-time reciprocity, CSI obtained by both the network side equipment and the terminal are very similar in coherent time, and the CSI is respectively subjected to down-sampling, normalization and quantization by both the network side equipment and the terminal to generate a preliminary key sequence.
Alternatively, due to interference in the channel or other hardware factors, the key sequences generated by the two parties in the above steps are approximate but not completely consistent, and further mutual reconciliation of the key sequences is required. Optionally, generating the target optimization key according to the channel characteristic information includes: at least one of down-sampling, normalization and quantization processing is carried out on the channel characteristic information to generate an initial optimization key; and negotiating with the terminal aiming at the initial optimization key, and determining a target optimization key. The interaction between the terminal user and the base station device is controlled and completed by Uplink Control Information (UCI) and Downlink Control Information (DCI), and after a plurality of interactions, both parties obtain a completely consistent target optimized key (such as a target key sequence key).
And selecting at least one optimized key from the optimized keys in the optimized key table as a target optimized key.
Among them, the optimized key table (keyTable) may also be referred to as an optimized key list (keyList). The optimization key table includes a plurality of optimization keys. When communication needs exist, the base station equipment randomly selects a group of target optimization keys from the keyTable for optimization operation of the original key K, and informs the sequence number of the selected target optimization key to the terminal through the control information.
Optionally, before selecting one of the optimization keys in the optimization key table as the target optimization key, the method further includes: and constructing an optimized key table. The construction method includes but is not limited to: acquiring channel characteristic information; generating a plurality of optimized keys according to the channel characteristic information obtained by multiple times; an optimization key table is constructed from the plurality of optimization keys. Wherein, each time the channel characteristic information is acquired, an optimized key can be generated. The generation process of each optimized key in this manner is similar to the generation process of the target optimized key in the first manner.
For example, generating a plurality of optimization keys according to the channel characteristic information obtained by the plurality of times of acquisition includes: and performing at least one of downsampling, normalization and quantization processing on the channel characteristic information acquired each time to generate an optimized key. Because the wireless channel has the characteristics of randomness and short-time reciprocity, CSI obtained by both the network side equipment and the terminal are very similar in coherent time, and the CSI is respectively subjected to down-sampling, normalization and quantization by both the network side equipment and the terminal to generate a preliminary key sequence.
Alternatively, due to interference in the channel or other hardware factors, the key sequences generated by the two parties in the above steps are approximate but not completely consistent, and further mutual reconciliation of the key sequences is required. Optionally, constructing the optimization key table according to a plurality of optimization keys comprises: negotiating with the terminal aiming at a plurality of optimized keys; and constructing an optimized key table by adopting a plurality of optimized keys determined by negotiation. That is, generating a plurality of optimized keys according to the channel characteristic information obtained by multiple times of acquisition, and constructing an optimized key table according to the plurality of optimized keys includes: and performing at least one of down-sampling, normalization and quantization processing on the channel characteristic information acquired each time to generate respective initial optimization keys. And negotiating with the terminal aiming at each initial optimization key, and determining a plurality of optimization keys. Interaction coordination between the terminal user and the base station equipment is controlled and completed by UCI and DCI, and after multiple interactions, both parties obtain a completely consistent target optimization key.
In both the first and second manners, the channel characteristic information needs to be acquired, and optionally, the acquiring the channel characteristic information includes: and detecting a pilot frequency sequence, and performing channel estimation on a wireless channel to obtain channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI). Specifically, as shown in fig. 2, before formal communication, both parties of communication send pilot sequences (uplink reference sequence and downlink reference sequence) to each other for channel estimation, so as to obtain state information CSI of the channel. The network side equipment detects the uplink reference sequence to carry out channel estimation, and CSI of an uplink channel is obtained. And the terminal detects the downlink reference sequence to carry out channel estimation so as to obtain the CSI of the downlink channel. Due to reciprocity of the uplink and downlink channels, the CSI of the uplink and downlink channels are very similar, and the optimized key generated by the network side device based on the CSI of the uplink channel is similar to the optimized key generated by the terminal based on the CSI of the downlink channel, so that the two parties can further negotiate to obtain a completely consistent optimized key.
Optionally, step 12 comprises: and scrambling the encryption key of the access layer by using the target optimization key to obtain the optimized encryption key of the target access layer. Specific scrambling means include, but are not limited to, the following:
the optimization method comprises the following steps: and performing modulo two addition operation on the target optimization secret key and the access layer encryption secret key to generate an optimized target access layer encryption secret key.
As shown in FIG. 3, a key is randomly selected from the keyTable for the K rrcenc Performing modulo two addition operation to generate new secret key K r ' rcenc
And the second optimization mode is as follows: and interleaving the target optimization key, and performing modulo two addition operation on the interleaved target optimization key and the access stratum encryption key to generate an optimized target access stratum encryption key.
Firstly interweaving the key sequence, and then completing K pairing by utilizing the interweaved sequence rrcenc Modulo two addition.
The optimization mode is three: and when the target optimization key comprises at least two optimization keys, performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and an access stratum encryption key to generate an optimized target access stratum encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
Selecting two or more keys with different serial numbers from the keyTable, extracting fixed length from each key to form a new key for matching with K rrcenc Performing modulo two addition to generate K r ' rcenc New secret key K r ' rcenc For encrypted communication.
Optionally, there are multiple key optimization ways, specifically which one of them can be signaled to the terminal by the high-level parameters, and the terminal performs the same way for the terminal K eNB Generated K rrcenc And finishing scrambling.
As shown in fig. 4 (a), a data processing method in the related art includes: and encrypting the data by using the key K at the high layer to obtain target data D, and transmitting the target data through an air interface.
As shown in fig. 4 (b), the data processing method according to the embodiment of the present invention includes: and obtaining a target optimization key, performing modular two operation by using the key and an access layer encryption key K to obtain an optimized key K ', encrypting data by using the key K ' at a high layer to obtain target data D ', and transmitting the target data through an air interface.
The embodiment of the invention extracts the randomness for further optimizing operation of the secret key based on the randomness existing in the wireless channel between the terminal user and the base station equipment, thereby improving the safety and reliability of both legal communication parties. Furthermore, the embodiment of the present invention further obtains channel state information based on a channel estimation method of the pilot symbol, generates a consistent key sequence key by using the channel state information, and performs an optimization operation on the access layer related key by using the generated key sequence key. Because the third party eavesdropper cannot obtain the channel state information consistent with both the legal communication parties, the generated key sequence key is inconsistent with the key sequence key of both the legal communication parties, namely, the eavesdropper cannot obtain the optimized key, and the communication safety between both the legal communication parties is ensured.
The data processing method of the network side device is described above, and the data processing method of the terminal side device will be further described below with reference to the accompanying drawings.
As shown in fig. 5, an embodiment of the present invention provides a data processing method, which is applied to a terminal, and includes:
step 51: acquiring a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and a terminal;
step 52: processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key;
step 53: and carrying out decryption/encryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
For example: the data stream can be decrypted/encrypted by using the encryption key of the target access layer based on the EEA to obtain target data.
Optionally, obtaining the target optimization key includes:
acquiring channel characteristic information;
and generating a target optimization key according to the channel characteristic information.
Optionally, the obtaining of the channel characteristic information includes:
and detecting a pilot frequency sequence, and performing channel estimation on a wireless channel to obtain channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, generating a target optimization key according to the channel characteristic information includes:
at least one of down-sampling, normalization and quantization processing is carried out on the channel characteristic information to generate an initial optimization key;
and negotiating with the terminal aiming at the initial optimization key, and determining a target optimization key.
Optionally, obtaining the target optimization key includes:
receiving a sequence number of a target optimization key from network side equipment; optionally, the network side device may send the sequence number of the target optimization key to the terminal through a high-level signaling or downlink control information.
At least one of the plurality of optimization keys in the optimization key table is selected as a target optimization key according to the sequence number.
Optionally, before selecting at least one of the plurality of optimization keys in the optimization key table as the target optimization key according to the sequence number, the method further includes:
an optimization key table is received from a network side device. Optionally, the network side device may send the optimized key table to the terminal through a high-level signaling or downlink control information.
Optionally, the access stratum encryption key is processed by using a target optimization key to obtain an optimized target access stratum encryption key, where the optimized target access stratum encryption key includes one of the following items:
performing modulo two addition operation on the target optimization secret key and the access stratum encryption secret key to generate an optimized target access stratum encryption secret key;
interweaving the target optimization key, and performing modulo two addition operation on the interwoven target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
and when the target optimization key comprises at least two optimization keys, performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and an access layer encryption key to generate an optimized target access layer encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
It is worth pointing out that the data processing method of the terminal side corresponds to the data processing method of the network side device, and various implementation manners in the embodiment of the data processing method of the network side device are all applicable to the embodiment of the data processing method of the terminal, and can achieve the same technical effect, and therefore are not described herein again.
Aiming at the problem of safe communication between a terminal and a base station, the embodiment of the invention utilizes the property of a wireless channel between two communication parties to generate a scrambling sequence key for completing scrambling of a related key of an access layer and providing safe and reliable encrypted communication for the two communication parties. Specifically, the embodiment of the present invention utilizes the randomness characteristic of the wireless channel where both communication parties are located in the mobile communication system, first extracts the randomness characteristic (such as the state information of the channel), then generates a consistent key sequence key based on the obtained randomness characteristic, and finally performs an optimization operation on the original access stratum related key by using the key sequence key to generate a secure session key. The method comprises the following steps:
s1, obtaining randomness characteristics: the terminal user and the base station equipment complete channel estimation by using a specific channel estimation mode according to a known pilot frequency sequence to acquire the randomness characteristic CSI of a wireless channel, and the stage is usually completed before both sides formally send data.
S2, randomness characteristic utilization: after obtaining the CSI, the two communication parties respectively carry out quantization and interactive reconciliation. The purpose of quantization is to reduce the influence of noise and obtain discrete sampling values; the purpose of interactive reconciliation is to complete consistency negotiation on the generated key sequence, and further obtain a completely consistent key sequence key.
S3, key optimization operation: and the terminal user and the base station equipment scramble the relevant key of the access layer according to the consistent key sequence key and a specific scrambling mode, and the scrambled key sequence is used for subsequent encrypted communication of both communication parties.
Taking downlink encrypted data transmission as an example, as shown in fig. 6, the base station device performs randomness feature acquisition to generate a key, and uses the key to perform K matching rrcenc Performing key optimization to generate K r ' rcenc By using K r ' rcenc EEC operation is carried out on the data (data) to obtain D ', and the D' is sent to the terminal through a wireless channel of the air interface. Correspondingly, the terminal executes the random feature acquisition, generates a key, and utilizes the key to K rrcenc Performing key optimization to generate K r ' rcenc By using K r ' rcenc And EEA is carried out on the received D' to obtain the decrypted data.
The data processing method of the network side device and the terminal side according to the embodiments of the present invention is described above, and the corresponding apparatuses will be further described with reference to the accompanying drawings.
As shown in fig. 7, an embodiment of the present invention provides a data processing apparatus, which is applied to a network device, and is characterized by including:
a first obtaining module 710, configured to obtain a target optimization key, where the target optimization key is generated based on channel characteristic information of a wireless channel between a network side device and a terminal;
a first optimization module 720, configured to process the access stratum encryption key by using the target optimization key to obtain an optimized target access stratum encryption key;
the first processing module 730 is configured to perform encryption/decryption algorithm operation on the data stream by using the target access stratum encryption key, so as to obtain target data.
Optionally, the first obtaining module 710 includes:
the first acquisition submodule is used for acquiring channel characteristic information;
and the first generation submodule is used for generating a target optimization key according to the channel characteristic information.
Optionally, the first generation submodule includes:
the first generation unit is used for performing at least one of down-sampling, normalization and quantization processing on the channel characteristic information to generate an initial optimization key;
and the first negotiation unit is used for negotiating with the terminal aiming at the initial optimized key and determining a target optimized key.
Optionally, the first obtaining module 710 includes:
and the second obtaining submodule is used for selecting at least one optimized key from the optimized keys in the optimized key table as a target optimized key.
Optionally, the data processing apparatus further comprises:
the second acquisition module is used for acquiring the channel characteristic information;
the first generation module is used for generating a plurality of optimized keys according to the channel characteristic information obtained by multiple times of acquisition;
the first construction module is used for constructing an optimized key table according to the optimized keys.
Optionally, the first building block comprises:
the first negotiation submodule is used for negotiating with the terminal aiming at a plurality of optimized keys;
and the first construction submodule is used for constructing an optimized key table by adopting the optimized keys determined by negotiation.
Optionally, the first obtaining sub-module or the second obtaining sub-module is configured to:
and detecting a pilot frequency sequence, and performing channel estimation on a wireless channel to obtain channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, the first optimization module 720 comprises one of:
the first optimization submodule is used for performing modulo-two addition operation on the target optimization secret key and the access layer encryption secret key to generate an optimized target access layer encryption secret key;
the second optimization submodule is used for interweaving the target optimization secret key, and performing modulo two addition operation on the interwoven target optimization secret key and the access layer encryption secret key to generate an optimized target access layer encryption secret key;
and the third optimization sub-module is used for performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and the access stratum encryption key when the target optimization keys comprise the at least two optimization keys to generate an optimized target access stratum encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization keys.
As shown in fig. 8, an embodiment of the present invention provides a data processing apparatus, which is applied to a terminal, and includes:
a third obtaining module 810, configured to obtain a target optimization key, where the target optimization key is generated based on channel characteristic information of a wireless channel between a network side device and a terminal;
a second optimization module 820, configured to process the access stratum encryption key by using the target optimization key to obtain an optimized target access stratum encryption key;
the second processing module 830 is configured to perform decryption/encryption algorithm operation on the data stream by using the target access stratum encryption key, so as to obtain target data.
Optionally, the third obtaining module 810 includes:
a third obtaining submodule, configured to obtain channel characteristic information;
and the second generation submodule is used for generating a target optimization key according to the channel characteristic information.
Optionally, the third obtaining module 810 is specifically configured to:
and detecting a pilot frequency sequence, and performing channel estimation on a wireless channel to obtain channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
Optionally, the second generation submodule includes:
the second generating unit is used for performing at least one of down-sampling, normalization and quantization processing on the channel characteristic information to generate an initial optimization key;
and the second negotiation unit is used for negotiating the initial optimization key with the terminal and determining a target optimization key.
Optionally, the third obtaining module 810 includes:
the receiving submodule is used for receiving the serial number of the target optimization key from the network side equipment;
and the third obtaining submodule is used for selecting at least one of the optimization keys in the optimization key table as a target optimization key according to the sequence number.
Optionally, the data processing apparatus further comprises:
and the receiving module is used for receiving the optimized key table from the network side equipment.
Optionally, the second optimization module 820 comprises one of:
the fourth optimization submodule is used for performing modulo-two addition operation on the target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
the fifth optimization submodule is used for interweaving the target optimization secret key, and performing modulo two addition operation on the interwoven target optimization secret key and the access layer encryption secret key to generate an optimized target access layer encryption secret key;
and the sixth optimization submodule is used for performing modulo-two addition operation on an operation key constructed according to the at least two optimization keys and the access stratum encryption key when the target optimization key comprises the at least two optimization keys to generate an optimized target access stratum encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
It should be noted that the data processing apparatus in the embodiment of the present invention is a product embodiment corresponding to the data processing method of the network side device or the terminal, and all implementation manners of the method embodiment may be applied to the apparatus embodiment and achieve the same technical effect, and therefore are not described again.
As shown in fig. 9, a network side device 900 according to an embodiment of the present invention includes a processor 910 and a transceiver 920, wherein,
the processor is used for acquiring a target optimization key, and the target optimization key is generated based on channel characteristic information of a wireless channel between the network side equipment and the terminal; processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key; and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
The transceiver is used for transceiving data under the control of the processor.
The network side device of the embodiment extracts the randomness for further optimization operation of the secret key based on the randomness existing in the wireless channel between the terminal user and the base station device, and improves the safety and reliability of both legal communication parties.
A terminal according to another embodiment of the present invention, as shown in fig. 10, includes a transceiver 1010, a processor 1000, a memory 1020, and a program or instructions stored in the memory 1020 and executable on the processor 1000; the processor 700, when executing the program or the instruction, implements the above-mentioned obtaining of the target optimization key, where the target optimization key is generated based on channel characteristic information of a wireless channel between the network side device and the terminal; processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key; and (3) carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
The transceiver 1010 is used for receiving and transmitting data under the control of the processor 1000.
Where in fig. 10, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, particularly one or more processors represented by processor 1000 and memory represented by memory 1020. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1010 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The user interface 1030 may also be an interface capable of interfacing with a desired device for different user devices, including but not limited to a keypad, display, speaker, microphone, joystick, etc.
The processor 1000 is responsible for managing the bus architecture and general processing, and the memory 1020 may store data used by the processor 1000 in performing operations.
The readable storage medium of the embodiment of the present invention stores a program or an instruction thereon, and the program or the instruction, when executed by the processor, implements the steps in the data processing method described above, and can achieve the same technical effects, and the details are not repeated here to avoid repetition.
The processor is the processor in the network side device or the terminal described in the above embodiments. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It is further noted that the terminals described in this specification include, but are not limited to, smart phones, tablets, etc., and that many of the functional components described are referred to as modules in order to more particularly emphasize their implementation independence.
In embodiments of the present invention, modules may be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be constructed as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different bits which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Likewise, operational data may be identified within the modules and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network.
When a module can be implemented by software, considering the level of existing hardware technology, a module implemented by software may build a corresponding hardware circuit to implement a corresponding function, without considering cost, and the hardware circuit may include a conventional Very Large Scale Integration (VLSI) circuit or a gate array and an existing semiconductor such as a logic chip, a transistor, or other discrete components. A module may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like.
The exemplary embodiments described above are described with reference to the drawings, and many different forms and embodiments of the invention may be made without departing from the spirit and teaching of the invention, therefore, the invention is not to be construed as limited to the exemplary embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. In the drawings, the size and relative sizes of elements may be exaggerated for clarity. The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Unless otherwise indicated, a range of values, when stated, includes the upper and lower limits of the range and any subranges therebetween.
While the foregoing is directed to the preferred embodiment of the present invention, it will be appreciated by those skilled in the art that various changes and modifications may be made therein without departing from the principles of the invention as set forth in the appended claims.

Claims (20)

1. A data processing method is applied to network side equipment and is characterized by comprising the following steps:
acquiring a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between the network side equipment and a terminal;
processing the encryption key of the access layer by using the target optimization key to obtain an optimized encryption key of the target access layer;
and carrying out encryption/decryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
2. The data processing method of claim 1, wherein the obtaining a target optimization key comprises:
acquiring the channel characteristic information;
and generating the target optimization key according to the channel characteristic information.
3. The data processing method of claim 2, wherein the generating the target optimization key according to the channel characteristic information comprises:
at least one of down-sampling, normalization and quantization processing is carried out on the channel characteristic information to generate an initial optimization key;
and negotiating with the terminal aiming at the initial optimization key, and determining the target optimization key.
4. The data processing method of claim 1, wherein obtaining the target optimization key comprises:
at least one of the plurality of optimization keys in the optimization key table is selected as a target optimization key.
5. The data processing method of claim 4, wherein before selecting one of the plurality of optimization keys in the optimization key table as the target optimization key, further comprising:
acquiring the channel characteristic information;
generating a plurality of optimized keys according to the channel characteristic information obtained by multiple times;
and constructing the optimization key table according to the optimization keys.
6. The data processing method of claim 5, wherein the building the optimized key table from the plurality of optimized keys comprises:
negotiating with the terminal for the plurality of optimized keys;
and constructing the optimized key table by adopting a plurality of optimized keys determined by negotiation.
7. The data processing method according to claim 2 or 5, wherein the obtaining the channel characteristic information comprises:
and detecting a pilot frequency sequence, and performing channel estimation on the wireless channel to obtain the channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
8. The data processing method according to any one of claims 1 to 6, wherein processing the access stratum encryption key with the target optimization key to obtain an optimized target access stratum encryption key comprises one of:
performing modulo-two addition operation on the target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
interweaving the target optimization key, and performing modulo-two addition operation on the interwoven target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
and when the target optimization key comprises at least two optimization keys, performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and the access stratum encryption key to generate an optimized target access stratum encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
9. A data processing method is applied to a terminal and is characterized by comprising the following steps:
acquiring a target optimization key, wherein the target optimization key is generated based on channel characteristic information of a wireless channel between network side equipment and the terminal;
processing the encryption key of the access layer by using the target optimization key to obtain an optimized encryption key of the target access layer;
and carrying out decryption/encryption algorithm operation on the data stream by using the encryption key of the target access layer to obtain target data.
10. The data processing method of claim 9, wherein the obtaining a target optimization key comprises:
acquiring the channel characteristic information;
and generating the target optimization key according to the channel characteristic information.
11. The data processing method of claim 10, wherein the obtaining the channel characteristic information comprises:
and detecting a pilot frequency sequence, and performing channel estimation on the wireless channel to obtain the channel characteristic information, wherein the channel characteristic information comprises Channel State Information (CSI).
12. The data processing method of claim 10, wherein the generating the target optimization key according to the channel characteristic information comprises:
at least one of down-sampling, normalization and quantization processing is carried out on the channel characteristic information to generate an initial optimization key;
and negotiating with the terminal aiming at the initial optimization key, and determining the target optimization key.
13. The data processing method of claim 9, wherein obtaining the target optimization key comprises:
receiving a sequence number of a target optimization key from the network side equipment;
and selecting at least one optimized key from the optimized keys in the optimized key table as a target optimized key according to the sequence number.
14. The data processing method of claim 13, wherein before selecting at least one of the plurality of optimization keys in the optimization key table as the target optimization key according to the sequence number, further comprising:
receiving the optimized key table from the network side device.
15. The data processing method according to any one of claims 9 to 14, wherein processing the access stratum encryption key with the target optimization key to obtain an optimized target access stratum encryption key comprises one of:
performing modulo-two addition operation on the target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
interweaving the target optimization key, and performing modulo-two addition operation on the interwoven target optimization key and the access layer encryption key to generate an optimized target access layer encryption key;
and when the target optimization key comprises at least two optimization keys, performing modulo two addition operation on an operation key constructed according to the at least two optimization keys and the access layer encryption key to generate an optimized target access layer encryption key, wherein the operation key is composed of a plurality of fragments with preset lengths extracted from each optimization key in the target optimization key.
16. A data processing device is applied to network side equipment, and is characterized by comprising:
a first obtaining module, configured to obtain a target optimization key, where the target optimization key is generated based on channel characteristic information of a wireless channel between the network side device and a terminal;
the first optimization module is used for processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key;
and the first processing module is used for carrying out encryption/decryption algorithm operation on the data stream by using the target access layer encryption key to obtain target data.
17. A data processing device applied to a terminal is characterized by comprising:
a third obtaining module, configured to obtain a target optimization key, where the target optimization key is generated based on channel characteristic information of a wireless channel between a network side device and the terminal;
the second optimization module is used for processing the access layer encryption key by using the target optimization key to obtain an optimized target access layer encryption key;
and the second processing module is used for carrying out decryption/encryption algorithm operation on the data stream by utilizing the target access layer encryption key to obtain target data.
18. A network-side device, comprising: a transceiver, a processor, a memory, and a program or instructions stored on the memory and executable on the processor; characterized in that the processor, when executing the program or instructions, implements the data processing method of any of claims 1-8.
19. A terminal, comprising: a transceiver, a processor, a memory, and a program or instructions stored on the memory and executable on the processor; characterized in that the processor, when executing the program or instructions, implements the data processing method of any of claims 9-15.
20. A readable storage medium on which a program or instructions are stored, which program or instructions, when executed by a processor, carry out the steps in the data processing method according to any one of claims 1 to 15.
CN202110896549.3A 2021-08-05 2021-08-05 Data processing method and device, network side equipment and terminal Pending CN115915122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110896549.3A CN115915122A (en) 2021-08-05 2021-08-05 Data processing method and device, network side equipment and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110896549.3A CN115915122A (en) 2021-08-05 2021-08-05 Data processing method and device, network side equipment and terminal

Publications (1)

Publication Number Publication Date
CN115915122A true CN115915122A (en) 2023-04-04

Family

ID=86478201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110896549.3A Pending CN115915122A (en) 2021-08-05 2021-08-05 Data processing method and device, network side equipment and terminal

Country Status (1)

Country Link
CN (1) CN115915122A (en)

Similar Documents

Publication Publication Date Title
KR101091793B1 (en) Method of handling security key change and related communication device
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN111566990A (en) Secure key agreement with untrusted devices
CN101420303B (en) Communication method for audio data and apparatus thereof
CN105553951A (en) Data transmission method and data transmission device
US11329801B2 (en) Initialization vector generation when performing encryption and authentication in wireless communications
CN102025505A (en) Advanced encryption standard (AES) algorithm-based encryption/decryption method and device
CN106162537B (en) A kind of method, wireless telecom equipment and the terminal of safety certification connection
CN107707562B (en) Method and device for encrypting and decrypting algorithm of asymmetric dynamic token
CN105024807A (en) Data processing method and system
CN106571915A (en) Terminal master key setting method and apparatus
CN101242264A (en) Data transmission method, device and system and mobile terminal
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
WO2010023506A1 (en) Methods, apparatuses, computer program products, and systems for providing secure pairing and association for wireless devices
CN105208028A (en) Data transmission method and related device and equipment
CN105007163A (en) Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN103167494A (en) Information sending method and information sending system
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
CN111641500B (en) Encryption and decryption method for wireless video transmission safety of unmanned aerial vehicle
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
Naraei et al. Optimizing IEEE 802.11 i resource and security essentials: for mobile and stationary devices
CN115915122A (en) Data processing method and device, network side equipment and terminal
CN112054905B (en) Secure communication method and system of mobile terminal
CN105744354B (en) Scramble the de-scrambling method and system of transmitting stream

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination