CN116389067A - High-security data transmission method, system and computer readable storage medium - Google Patents

High-security data transmission method, system and computer readable storage medium Download PDF

Info

Publication number
CN116389067A
CN116389067A CN202310220427.1A CN202310220427A CN116389067A CN 116389067 A CN116389067 A CN 116389067A CN 202310220427 A CN202310220427 A CN 202310220427A CN 116389067 A CN116389067 A CN 116389067A
Authority
CN
China
Prior art keywords
data transmission
original
data
target ciphertext
transmission information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310220427.1A
Other languages
Chinese (zh)
Inventor
赵益佩
徐国伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuannian Technology Co ltd
Original Assignee
Beijing Yuannian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuannian Technology Co ltd filed Critical Beijing Yuannian Technology Co ltd
Priority to CN202310220427.1A priority Critical patent/CN116389067A/en
Publication of CN116389067A publication Critical patent/CN116389067A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The application provides a data transmission method and system with high safety and a computer readable storage medium, wherein the data transmission method with high safety comprises the following steps: acquiring original data transmission information sent by sender equipment; encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device; under the condition that the receiver equipment receives the target ciphertext transmitted by the transmitter equipment, acquiring the target ciphertext transmitted by the receiver equipment; decrypting the target ciphertext to obtain original data transmission information; and analyzing the original data transmission information based on a preset threshold value to obtain an analysis result. The method and the device can effectively improve the safety of data transmission.

Description

High-security data transmission method, system and computer readable storage medium
Technical Field
The present application relates to the field of data transmission, and in particular, to a data transmission method, system and computer readable storage medium with high security.
Background
Environmental monitoring refers to the activity of an environmental monitoring agency in monitoring and measuring environmental quality conditions. The environmental pollution condition and the environmental quality are determined by monitoring and measuring indexes reflecting the environmental quality.
In the prior art, when environmental monitoring is performed, data is often collected from a monitored environment through monitoring equipment, the data is then sent to a data center for storage analysis, in the process, the data needs to be controlled by a high-end server controlled by a third party entity, and a user needs to trust the entities to process the environmental monitoring data so as to achieve the aim of environmental quality measurement.
However, the data is easily cracked in a manner of being controlled by a high-end server controlled by a third-party entity, so that the security of the data is not high, and the environmental quality measurement result is reduced.
Therefore, how to improve the security of data transmission is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The embodiment of the application provides a data transmission method, a system and a computer readable storage medium with high security, which can effectively improve the security of data transmission.
In a first aspect, an embodiment of the present application provides a data transmission method with high security, where the method includes:
acquiring original data transmission information sent by sender equipment;
encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device;
under the condition that the receiver equipment receives the target ciphertext transmitted by the transmitter equipment, acquiring the target ciphertext transmitted by the receiver equipment;
decrypting the target ciphertext to obtain original data transmission information;
and analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
Optionally, the original data transmission information includes original monitoring data, encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender device, including:
obtaining a public key of the receiver device;
and encrypting the original monitoring data based on the public key of the receiving device to obtain the target ciphertext.
Optionally, the original data transmission information includes original monitoring data and a data information summary, where the data information summary is configured to mark all the original monitoring data respectively, encrypt the original data transmission information to obtain a target ciphertext and send the target ciphertext to the sender device, and includes:
acquiring a public key of a receiver device and a private key of a sender device;
encrypting the original monitoring data based on the public key of the receiving party equipment to obtain a first ciphertext corresponding to the original monitoring data;
encrypting the data information abstract based on the private key of the sender device to obtain a second ciphertext corresponding to the data information abstract, wherein the second ciphertext and the first ciphertext form a target ciphertext.
Optionally, the original data transmission information includes original monitoring data, and the target ciphertext is decrypted to obtain the original data transmission information, including:
acquiring a private key of the receiver device;
and decrypting the target ciphertext based on the private key of the receiving device to obtain the original monitoring data.
Optionally, the original data transmission information includes original monitoring data and a data information abstract, and the target ciphertext is decrypted to obtain the original data transmission information, including:
acquiring a private key of a receiver device and a public key of a sender device;
decrypting the original monitoring data based on the private key of the receiver device to obtain the original monitoring data;
decrypting the data information abstract based on the public key of the sender device to obtain the data information abstract.
Optionally, the method further comprises:
comparing the decrypted data information abstract with the data information abstract sent by the sender equipment to generate a comparison result;
and judging whether the original monitoring data has the missing or not based on the comparison result.
Optionally, encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender device, including:
determining the category of the original monitoring data;
and encrypting the original data transmission information based on the category of the original monitoring data to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment.
Optionally, after decrypting the target ciphertext to obtain the original data transmission information, the method further includes:
carrying out integrity check on the original monitoring data to generate a check result;
and controlling the receiver equipment to uplink the original monitoring data under the condition that the verification result is that the original monitoring data are correct.
In a second aspect, an embodiment of the present application provides a data transmission system with high security, where the system includes:
the device comprises a sender device, a receiver device and a data transmission device;
the data transmission device is configured in the block chain and comprises: the first acquisition module is used for acquiring the original data transmission information sent by the sender equipment;
the encryption module is used for encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment;
the second acquisition module is used for acquiring the target ciphertext transmitted by the receiver device under the condition that the receiver device receives the target ciphertext transmitted by the transmitter device;
the decryption module is used for decrypting the target ciphertext to obtain the original data transmission information; the analysis module is used for analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the high security data transmission method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium, where computer program instructions are stored, which when executed by a processor implement a data transmission method with high security as in the first aspect.
According to the data transmission method and the system computer readable storage medium with high safety, original data transmission information sent by the sender equipment can be encrypted to generate the target ciphertext, the target ciphertext is sent to the receiver equipment, and the receiver equipment decrypts the target ciphertext to obtain a plaintext, namely a high-end server controlled by a third-party entity is not needed, so that the safety of data transmission is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described below, it will be obvious that the drawings in the description below are some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a high security data transmission method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a high security data transmission system according to an embodiment of the present application; and
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application are described in detail below to make the objects, technical solutions and advantages of the present application more apparent, and to further describe the present application in conjunction with the accompanying drawings and the detailed embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative of the application and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by showing examples of the present application.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
Based on the background technology, the data is easy to crack in a mode that the data is controlled by a high-end server controlled by a third-party entity, so that the safety of the data is not high, and the environmental quality measurement result is reduced.
In order to solve the problems in the prior art, embodiments of the present application provide a data transmission method, system and computer readable storage medium with high security. Wherein the system comprises a data transmission device which is configured in a blockchain, the data transmission method with high security in the application can be executed by the data transmission device in the system of the embodiment of the application, the data transmission device is configured in the blockchain and can be configured to propagate, verify or execute computer protocols (namely intelligent contracts) of contracts in an informationized mode, the intelligent contracts allow trusted transactions to be carried out without third parties, and the transactions can be tracked and irreversible, thereby the application realizes the trusted transmission between data based on the intelligent contracts.
The following first describes a data transmission method with high security provided by the embodiments of the present application. Fig. 1 is a flow chart illustrating a high security data transmission method according to an embodiment of the present application.
As shown in fig. 1, the data transmission method with high security of the present application at least includes step S11, step S13, step S15, step S17 and step S19.
Step S11, obtaining the original data transmission information sent by the sender equipment.
And step S13, encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment.
Step S15, under the condition that the receiver device receives the target ciphertext sent by the sender device, the target ciphertext sent by the receiver device is obtained.
And S17, decrypting the target ciphertext to obtain the original data transmission information.
Specifically, in the present application, the smart contracts are configured on the blockchain as the execution subject of the present application. The intelligent contract and the sender equipment establish a communication relationship, the intelligent contract and the receiver equipment establish a communication relationship, a plurality of functional modules can be configured in the intelligent contract, original data transmission information sent by the sender equipment can be encrypted based on an encryption module in the intelligent contract to generate a target ciphertext, then the target ciphertext of the sender is sent to the receiver equipment, then an acquisition module in the intelligent contract acquires the target ciphertext, and then a decryption module in the intelligent contract decrypts the target ciphertext, so that the original data transmission information is obtained. At which point the data is transferred from the sender device to the receiver device. According to the method and the device, the intelligent contract is utilized to encrypt and decrypt the data in the data transmission process, a high-end server controlled by a third-party entity is not needed, so that the problem that the data is leaked on the third-party entity is avoided, and the safety of the data transmission is effectively improved.
And S19, analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
Specifically, in the present application, after the original data transmission information is obtained, an analysis module and a preset threshold may be configured in the intelligent contract, and the analysis module analyzes the original data transmission information, that is, the analysis module analyzes the original data transmission information and the preset threshold to obtain an analysis result. And then deciding whether to adjust the receiving party equipment according to the analysis result. The original data transmission information does not meet a preset threshold value and needs to be adjusted.
It should be noted that, the analysis result may be that the original data transmission information is greater than or equal to or less than a preset threshold value. The preset threshold value can be multiple, and is determined by different categories of the original data transmission information. The correspondence between the threshold and the different types of data and the comparison step will be described below in the case where the original data transmission information includes the different types of data.
According to the method and the device, the intelligent contract is utilized to encrypt and decrypt the data in the data transmission process, a high-end server controlled by a third-party entity is not needed, so that the problem that the data is leaked on the third-party entity is avoided, the safety of data transmission is effectively improved, after the decrypted original data transmission information is obtained, the original data transmission information is analyzed based on a preset threshold value, things corresponding to the original data transmission information are adjusted according to an analysis result, and the accuracy of the original data transmission information is guaranteed.
In an alternative embodiment, the original data transmission information includes original monitoring data, where encrypting the original data transmission information in step S13, to obtain a target ciphertext and transmitting the target ciphertext to the sender device includes:
a public key of the recipient device is obtained.
And encrypting the original monitoring data based on the public key of the receiving device to obtain the target ciphertext.
In step S17, the target ciphertext is decrypted to obtain the original data transmission information, which includes:
a private key of the recipient device is obtained.
And decrypting the target ciphertext based on the private key of the receiving device to obtain the original data transmission information.
In this embodiment, an asymmetric encryption algorithm may be used to encrypt the raw monitoring data. It should be noted that there are two keys for the asymmetric encryption algorithm: public keys (public keys for short) and private keys (private keys for short). The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted only by the corresponding private key. The intelligent contract can acquire the public key of the receiver device, and then encrypt the original monitoring data according to the public key of the receiver device to obtain the target ciphertext. And the sender equipment sends the target ciphertext to the receiver equipment, and then the intelligent contract acquires the target ciphertext and the private key of the receiver equipment, and decrypts the target ciphertext according to the private key of the receiver equipment to obtain the original data transmission information. Because the asymmetric encryption algorithm does not need to transmit the secret key of the asymmetric encryption algorithm to the other party, the confidentiality of data is effectively improved, and the security of data transmission is further improved.
Alternatively, the asymmetric encryption algorithm may be at least an RSA algorithm, a knapsack algorithm, and an Elgamal algorithm.
In an alternative embodiment, the original data transmission information includes original monitoring data and a data information summary, and the data information summary is used for marking all the original monitoring data respectively; in step S13, the encrypting the original data transmission information to obtain the target ciphertext and transmitting the target ciphertext to the sender device includes:
a public key of the receiver device and a private key of the sender device are obtained.
And encrypting the original monitoring data based on the public key of the receiving device to obtain a first ciphertext corresponding to the original monitoring data.
Encrypting the data information abstract based on the private key of the sender device to obtain a second ciphertext corresponding to the data information abstract, wherein the second ciphertext and the first ciphertext form a target ciphertext.
In step S17, the target ciphertext is decrypted to obtain the original data transmission information, which includes:
a private key of the receiver device and a public key of the sender device are obtained.
And decrypting the original monitoring data based on the private key of the receiving device to obtain the original monitoring data.
Decrypting the data information abstract based on the public key of the sender device to obtain the data information abstract.
In this embodiment, the original data transmission information includes original monitoring data and a data information summary; the encryption and decryption methods of the original monitoring data are described in the above embodiments, and are not described herein.
The data information abstract can mark the original monitoring data, that is, the original monitoring data of different types can be marked, under the condition that all the original monitoring data are marked, the intelligent contract can acquire the private key of the sender device, encrypt the data information abstract by using the private key of the sender device to obtain a second ciphertext, then send the second ciphertext to the sender device, send the second ciphertext to the receiver device by the sender device, acquire the second ciphertext acquired by the receiver device and the public key of the receiver device, decrypt the second ciphertext according to the public key of the receiver device, and obtain the decrypted data information abstract. According to the method and the device, the accuracy of the original monitoring data can be effectively determined through encryption and decryption transmission of the data information abstract. The specific judgment step is described in detail below.
In an alternative embodiment, after decrypting the data message digest based on the public key of the sender device, the method further comprises:
and comparing the decrypted data information abstract with the data information abstract sent by the sender equipment to generate a comparison result.
And judging whether the original monitoring data has the missing or not based on the comparison result.
In this embodiment, after obtaining the decrypted data information summaries, the number of the decrypted data information summaries is compared with the number of the original data information summaries to obtain whether the original monitoring data transmitted has a defect.
Such as: the original data message digest is 10 signatures, namely, the 10 types of original monitoring data are marked, however, after transmission, the original monitoring data is deleted in the transmission process when the data message digest is 8 signatures.
It should be noted that when the original data transmission information includes the original monitoring data and the data information abstract, the encryption and decryption transmission of the original monitoring data may be recorded as a first condition, the judgment of the data information abstract is recorded as a second condition, and after the encryption and decryption transmission of the original monitoring data is completed, i.e. after the first condition is implemented, the second condition is implemented, and when the second condition is established (the original monitoring data does not have a missing condition), the original monitoring data is characterized that there is no problem.
In an alternative embodiment, when the original monitoring data is missing in the transmission process, the missing original monitoring data can be determined according to the type of the signature, so that the tracing operation is performed, and the missing data is obtained again.
In an alternative embodiment, obtaining the private key of the sender device includes:
determining a first device identification of the sender device; wherein the sender device has a first device identification.
A private key of the sender device is obtained based on the first device identification.
In this embodiment, each sender device has a corresponding first device identifier (e.g., a device ID and a device number), where the first device identifiers are already set by the sender device when shipped, and the corresponding first device identifiers are marked on the original monitoring data when the sender device transmits the original monitoring data, i.e., the original monitoring data has the corresponding first device identifiers, so that the smart contract can determine from which sender device the original monitoring data comes according to the first device identifiers, thereby obtaining the private key of the sender device to encrypt the data summary information.
It should be noted that, the public key and the private key of the receiving device may be obtained by the smart contract through the second device identifier.
In an alternative embodiment, the encrypting the original data transmission information in step S13, to obtain the target ciphertext and transmitting the target ciphertext to the sender device, includes:
the category of the raw monitoring data is determined.
And encrypting the original monitoring data based on the category of the original monitoring data to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment.
In this embodiment, the sender device may be a plurality of micro sensors, where the plurality of micro sensors are stored in the wireless transmission network, each micro sensor may monitor an environment or a monitored object and collect original monitoring data, so that the types of the original monitoring data may be various (for example, PM10, PM2.5, DO, SS, etc.), and it is required to determine the type of each original monitoring data, encrypt the original monitoring data according to different types, obtain a target ciphertext, and send the target ciphertext to the sender device. By determining the category, the original monitoring data can be more conveniently classified, so that the transmission and encryption of the original monitoring data are more convenient.
In an alternative embodiment, the raw monitoring data may be categorized according to the type of environmental factors, which may include at least climate factors, land factors, and biological factors.
In an alternative embodiment, at step S17: after decrypting the target ciphertext to obtain the original data transmission information, the method further comprises the following steps:
carrying out integrity check on the original monitoring data to generate a check result;
and controlling the receiver equipment to uplink the original monitoring data under the condition that the verification result is that the original monitoring data are correct.
In this embodiment, after the target ciphertext is decrypted by the smart contract to obtain the original data transmission information, the original monitoring data in the original data transmission information needs to be uploaded by the blockchain, and the security of the original monitoring data can be ensured due to the characteristic that the data uploaded by the blockchain cannot be changed.
However, since the data uploaded in the blockchain cannot be changed, when the original monitoring data is uploaded, the integrity of the original monitoring data needs to be checked to generate a check result. It should be noted that, when receiving the original monitoring data, the receiving device may malfunction, for example: if the original monitoring data is not received at a certain moment or the receiving device sends a short fault, which causes that the data of the original monitoring data is too large or too small, the intelligent contract can judge the integrity of the original monitoring data by judging whether the original monitoring data to be uploaded has blank or is in a value conforming to the theorem, and the original monitoring data conforming to the integrity is uplink in a blockchain.
In an alternative embodiment, after step S19, the method further comprises:
and under the condition that the analysis result is that the original monitoring data in the original data transmission information does not accord with a preset threshold value, the intelligent contract determines a response event corresponding to the original monitoring data.
It should be noted that, the response event is already configured in the smart contract, that is, each category of the original monitoring data corresponds to a response event, for example: at too high a pH, the response event may be to adjust the acidity of the soil. Wherein the response event may be executed by the recipient device or an additional processing device may be provided in communication with the smart contract, the processing device being configured to execute the response event.
It should be noted that the preset threshold value is also configured in the smart contract, and may correspond to different types of raw monitoring data. Such as: the original monitoring data is air monitoring data, and then the preset threshold value can be a sound decibel value; for another example: the original monitoring data is soil monitoring data, and then the preset threshold value can be a PH value.
In an alternative embodiment, in case the original monitoring data does not meet a preset threshold value, the method further comprises:
the intelligent contract sends the original monitoring data to the early warning platform.
In this embodiment, the intelligent contract sends the original monitoring data which does not meet the preset threshold to the early warning platform, so that a certain prompting effect can be played for monitoring personnel.
Fig. 2 is a schematic structural diagram of a data transmission system with high security according to an embodiment of the present application. As shown in fig. 2, the data transmission system with high security of the present application includes: a sender device 1, a receiver device 3, and a data transmission apparatus 2; the data transmission device is configured in the block chain and comprises: a first obtaining module 21, configured to obtain original data transmission information sent by a sender device; the encryption module 22 is configured to encrypt the original data transmission information to obtain a target ciphertext and send the target ciphertext to the sender device; a second obtaining module 23, configured to obtain, when the receiver device receives the target ciphertext sent by the sender device, the target ciphertext sent by the receiver device; the decryption module 24 is configured to decrypt the target ciphertext to obtain original data transmission information; the analysis module 25 is configured to analyze the original data transmission information based on a preset threshold value, and obtain an analysis result.
In this embodiment, the data transmission device 2 may be the above-mentioned smart contract, the smart contract is configured in the blockchain, the smart contract cannot be edited again after deployment, and the original contract must be revoked and a new contract deployed in order to update or replace the contract. Wherein the smart contract establishes a communication relationship with the sender device 1 and the receiver device 3, comprising: a first acquisition module 21, an encryption module 22, a second acquisition module 23, a decryption module 24, and an analysis module 25. Wherein, the original data transmission information sent by the sender device 1 is acquired by the first acquisition module 21; encrypting the original data transmission information by an encryption module 22 to obtain a target ciphertext and transmitting the target ciphertext to the sender device 1; acquiring, by the second acquisition module 23, the target ciphertext transmitted by the receiver device 27 when the receiver device 3 receives the target ciphertext transmitted by the sender device 1; decrypting the target ciphertext through a decryption module 24 to obtain original data transmission information; the analysis module 25 analyzes the original data transmission information based on a preset threshold value to obtain an analysis result.
According to the method and the device, the intelligent contract is utilized to encrypt and decrypt the data in the data transmission process, a high-end server controlled by a third-party entity is not needed, so that the problem that the data is leaked on the third-party entity is avoided, the safety of data transmission is effectively improved, after the decrypted original data transmission information is obtained, the original data transmission information is analyzed based on a preset threshold value, things corresponding to the original data transmission information are adjusted according to an analysis result, and the accuracy of the original data transmission information is guaranteed.
Each module/unit in the system shown in fig. 2 has a function of implementing each step in fig. 1, and can achieve a corresponding technical effect, which is not described herein for brevity.
Fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
The electronic device may comprise a processor 301 and a memory 302 storing computer program instructions.
In particular, the processor 301 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of embodiments of the present application.
Memory 302 may include mass storage for data or instructions. By way of example, and not limitation, memory 302 may comprise a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, magnetic tape, or universal serial bus (Universal Serial Bus, USB) Drive, or a combination of two or more of the foregoing. Memory 302 may include removable or non-removable (or fixed) media, where appropriate. The memory 302 may be internal or external to the electronic device, where appropriate. In particular embodiments, memory 302 may be a non-volatile solid state memory.
In one embodiment, memory 302 may be Read Only Memory (ROM). In one embodiment, the ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory, or a combination of two or more of these.
The processor 301 reads and executes the computer program instructions stored in the memory 302 to implement any of the high security data transmission methods of the above embodiments.
In one example, the electronic device may also include a communication interface 303 and a bus 310. As shown in fig. 3, the processor 301, the memory 302, and the communication interface 303 are connected to each other by a bus 310 and perform communication with each other.
The communication interface 303 is mainly used to implement communication between each module, device, unit and/or apparatus in the embodiments of the present application.
Bus 310 includes hardware, software, or both, that couple components of the electronic device to one another. By way of example, and not limitation, the buses may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a HyperTransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a micro channel architecture (MCa) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus, or a combination of two or more of the above. Bus 310 may include one or more buses, where appropriate. Although embodiments of the present application describe and illustrate a particular bus, the present application contemplates any suitable bus or interconnect.
In addition, in combination with the data transmission method with high security in the above embodiments, the embodiments of the present application may be implemented by providing a computer readable storage medium. The computer readable storage medium has stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the highly secure data transmission methods of the above embodiments.
It should be clear that the present application is not limited to the particular arrangements and processes described above and illustrated in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions, or change the order between steps, after appreciating the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented in hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine readable medium or transmitted over transmission media or communication links by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuitry, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and the like. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be different from the order in the embodiments, or several steps may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to being, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware which performs the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In the foregoing, only the specific embodiments of the present application are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, which are intended to be included in the scope of the present application.

Claims (10)

1. A high security data transmission method, the method comprising:
acquiring original data transmission information sent by sender equipment;
encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device;
under the condition that the receiver equipment receives the target ciphertext transmitted by the transmitter equipment, acquiring the target ciphertext transmitted by the receiver equipment;
decrypting the target ciphertext to obtain original data transmission information;
and analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
2. The method for transmitting data with high security according to claim 1, wherein the original data transmission information includes original monitoring data, the encrypting the original data transmission information, obtaining a target ciphertext and transmitting the target ciphertext to a sender device, includes:
obtaining a public key of the receiver device;
and encrypting the original monitoring data based on the public key of the receiving party equipment to obtain a target ciphertext.
3. The high security data transmission method according to claim 1, wherein the original data transmission information includes original monitoring data and a data information summary, wherein the data information summary is used for marking all the original monitoring data respectively, and the encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device includes:
acquiring a public key of a receiver device and a private key of a sender device;
encrypting the original monitoring data based on the public key of the receiver device to obtain a first ciphertext corresponding to the original monitoring data;
encrypting the data information abstract based on the private key of the sender equipment to obtain a second ciphertext corresponding to the data information abstract, wherein the second ciphertext and the first ciphertext form the target ciphertext.
4. The method for transmitting data with high security according to claim 2, wherein decrypting the target ciphertext to obtain the original data transmission information comprises:
acquiring a private key of the receiver device;
and decrypting the target ciphertext based on the private key of the receiver device to obtain the original data transmission information.
5. The method for transmitting data with high security according to claim 3, wherein decrypting the target ciphertext to obtain the original data transmission information comprises:
acquiring a private key of a receiver device and a public key of a sender device;
decrypting the original monitoring data based on the private key of the receiver device to obtain the original monitoring data;
and decrypting the data information abstract based on the public key of the sender equipment to obtain the data information abstract.
6. The high security data transmission method of claim 5, further comprising:
comparing the decrypted data information abstract with the data information abstract sent by the sender equipment to generate a comparison result;
and judging whether the original monitoring data has a deletion or not based on the comparison result.
7. A data transmission method with high security according to claim 2 or 3, wherein encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device comprises:
determining the category of the original monitoring data;
encrypting the original monitoring data based on the category of the original monitoring data to obtain a target ciphertext and transmitting the target ciphertext to a sender device.
8. A method for transmitting data with high security according to claim 2 or 3, wherein after decrypting the target ciphertext to obtain the original data transmission information, the method further comprises:
carrying out integrity check on the original monitoring data to generate a check result;
and controlling the receiving device to uplink the original monitoring data under the condition that the verification result is that the original monitoring data are correct.
9. The data transmission system with high security is characterized by comprising a sender device, a receiver device and a data transmission device;
the data transmission device is configured in a blockchain and includes: the first acquisition module is used for acquiring the original data transmission information sent by the sender equipment;
the encryption module is used for encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment;
the second acquisition module is used for acquiring the target ciphertext transmitted by the receiver device under the condition that the receiver device receives the target ciphertext transmitted by the transmitter device;
the decryption module is used for decrypting the target ciphertext to obtain original data transmission information; the analysis module is used for analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
10. A computer-readable storage medium, on which computer program instructions are stored which, when executed by a processor, implement the high security data transmission method according to any one of claims 1-8.
CN202310220427.1A 2023-03-08 2023-03-08 High-security data transmission method, system and computer readable storage medium Pending CN116389067A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310220427.1A CN116389067A (en) 2023-03-08 2023-03-08 High-security data transmission method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310220427.1A CN116389067A (en) 2023-03-08 2023-03-08 High-security data transmission method, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116389067A true CN116389067A (en) 2023-07-04

Family

ID=86966532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310220427.1A Pending CN116389067A (en) 2023-03-08 2023-03-08 High-security data transmission method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116389067A (en)

Similar Documents

Publication Publication Date Title
CN111125737B (en) Environmental monitoring system based on block chain
CN1933396B (en) System and method for collecting traffic data using probe vehicles
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
CN109660346B (en) Information hosting method, device, equipment and computer storage medium
CN109190362B (en) Secure communication method and related equipment
EP3384629B1 (en) System and method for tamper-resistant device usage metering
CN113569267B (en) Privacy safety data set intersection method, device, equipment and storage medium
CN107636669B (en) Control of undesirable network traffic
CN109586920A (en) A kind of trust authentication method and device
CN110955921A (en) Electronic signature method, device, equipment and storage medium
CN116132989A (en) Industrial Internet security situation awareness system and method
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN115147956A (en) Data processing method and device, electronic equipment and storage medium
CN116781263B (en) Identity authentication and secret key self-updating method among in-vehicle ECUs and readable storage medium
CN116389067A (en) High-security data transmission method, system and computer readable storage medium
CN114584370A (en) Server data interaction network security system
Kneib A survey on sender identification methodologies for the controller area network
CN112995096B (en) Data encryption and decryption methods, devices and equipment
CN112765266A (en) Method, device and equipment for managing data assets and computer storage medium
CN110311911B (en) Traffic facility monitoring method and device and server
CN114358222B (en) System and method for identifying and preventing fraudulent use by multi-node positioning
CN116245525A (en) Transaction data processing method, device and equipment of blockchain and storage medium
US11256796B2 (en) Ensuring authenticity of at least one value of a device property
CN111193685B (en) Method, device, equipment and medium for verifying authenticity of log information
CN116132034A (en) Data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination