CN116389067A - High-security data transmission method, system and computer readable storage medium - Google Patents
High-security data transmission method, system and computer readable storage medium Download PDFInfo
- Publication number
- CN116389067A CN116389067A CN202310220427.1A CN202310220427A CN116389067A CN 116389067 A CN116389067 A CN 116389067A CN 202310220427 A CN202310220427 A CN 202310220427A CN 116389067 A CN116389067 A CN 116389067A
- Authority
- CN
- China
- Prior art keywords
- data transmission
- original
- data
- target ciphertext
- transmission information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 146
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000012544 monitoring process Methods 0.000 claims description 105
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 3
- 238000012217 deletion Methods 0.000 claims 1
- 230000037430 deletion Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 11
- 230000007613 environmental effect Effects 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 230000004044 response Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005259 measurement Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000002689 soil Substances 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 239000003181 biological factor Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000003912 environmental pollution Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
Abstract
The application provides a data transmission method and system with high safety and a computer readable storage medium, wherein the data transmission method with high safety comprises the following steps: acquiring original data transmission information sent by sender equipment; encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device; under the condition that the receiver equipment receives the target ciphertext transmitted by the transmitter equipment, acquiring the target ciphertext transmitted by the receiver equipment; decrypting the target ciphertext to obtain original data transmission information; and analyzing the original data transmission information based on a preset threshold value to obtain an analysis result. The method and the device can effectively improve the safety of data transmission.
Description
Technical Field
The present application relates to the field of data transmission, and in particular, to a data transmission method, system and computer readable storage medium with high security.
Background
Environmental monitoring refers to the activity of an environmental monitoring agency in monitoring and measuring environmental quality conditions. The environmental pollution condition and the environmental quality are determined by monitoring and measuring indexes reflecting the environmental quality.
In the prior art, when environmental monitoring is performed, data is often collected from a monitored environment through monitoring equipment, the data is then sent to a data center for storage analysis, in the process, the data needs to be controlled by a high-end server controlled by a third party entity, and a user needs to trust the entities to process the environmental monitoring data so as to achieve the aim of environmental quality measurement.
However, the data is easily cracked in a manner of being controlled by a high-end server controlled by a third-party entity, so that the security of the data is not high, and the environmental quality measurement result is reduced.
Therefore, how to improve the security of data transmission is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The embodiment of the application provides a data transmission method, a system and a computer readable storage medium with high security, which can effectively improve the security of data transmission.
In a first aspect, an embodiment of the present application provides a data transmission method with high security, where the method includes:
acquiring original data transmission information sent by sender equipment;
encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device;
under the condition that the receiver equipment receives the target ciphertext transmitted by the transmitter equipment, acquiring the target ciphertext transmitted by the receiver equipment;
decrypting the target ciphertext to obtain original data transmission information;
and analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
Optionally, the original data transmission information includes original monitoring data, encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender device, including:
obtaining a public key of the receiver device;
and encrypting the original monitoring data based on the public key of the receiving device to obtain the target ciphertext.
Optionally, the original data transmission information includes original monitoring data and a data information summary, where the data information summary is configured to mark all the original monitoring data respectively, encrypt the original data transmission information to obtain a target ciphertext and send the target ciphertext to the sender device, and includes:
acquiring a public key of a receiver device and a private key of a sender device;
encrypting the original monitoring data based on the public key of the receiving party equipment to obtain a first ciphertext corresponding to the original monitoring data;
encrypting the data information abstract based on the private key of the sender device to obtain a second ciphertext corresponding to the data information abstract, wherein the second ciphertext and the first ciphertext form a target ciphertext.
Optionally, the original data transmission information includes original monitoring data, and the target ciphertext is decrypted to obtain the original data transmission information, including:
acquiring a private key of the receiver device;
and decrypting the target ciphertext based on the private key of the receiving device to obtain the original monitoring data.
Optionally, the original data transmission information includes original monitoring data and a data information abstract, and the target ciphertext is decrypted to obtain the original data transmission information, including:
acquiring a private key of a receiver device and a public key of a sender device;
decrypting the original monitoring data based on the private key of the receiver device to obtain the original monitoring data;
decrypting the data information abstract based on the public key of the sender device to obtain the data information abstract.
Optionally, the method further comprises:
comparing the decrypted data information abstract with the data information abstract sent by the sender equipment to generate a comparison result;
and judging whether the original monitoring data has the missing or not based on the comparison result.
Optionally, encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender device, including:
determining the category of the original monitoring data;
and encrypting the original data transmission information based on the category of the original monitoring data to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment.
Optionally, after decrypting the target ciphertext to obtain the original data transmission information, the method further includes:
carrying out integrity check on the original monitoring data to generate a check result;
and controlling the receiver equipment to uplink the original monitoring data under the condition that the verification result is that the original monitoring data are correct.
In a second aspect, an embodiment of the present application provides a data transmission system with high security, where the system includes:
the device comprises a sender device, a receiver device and a data transmission device;
the data transmission device is configured in the block chain and comprises: the first acquisition module is used for acquiring the original data transmission information sent by the sender equipment;
the encryption module is used for encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment;
the second acquisition module is used for acquiring the target ciphertext transmitted by the receiver device under the condition that the receiver device receives the target ciphertext transmitted by the transmitter device;
the decryption module is used for decrypting the target ciphertext to obtain the original data transmission information; the analysis module is used for analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the high security data transmission method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium, where computer program instructions are stored, which when executed by a processor implement a data transmission method with high security as in the first aspect.
According to the data transmission method and the system computer readable storage medium with high safety, original data transmission information sent by the sender equipment can be encrypted to generate the target ciphertext, the target ciphertext is sent to the receiver equipment, and the receiver equipment decrypts the target ciphertext to obtain a plaintext, namely a high-end server controlled by a third-party entity is not needed, so that the safety of data transmission is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the description of the embodiments or the prior art will be briefly described below, it will be obvious that the drawings in the description below are some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a high security data transmission method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a high security data transmission system according to an embodiment of the present application; and
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application are described in detail below to make the objects, technical solutions and advantages of the present application more apparent, and to further describe the present application in conjunction with the accompanying drawings and the detailed embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative of the application and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by showing examples of the present application.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
Based on the background technology, the data is easy to crack in a mode that the data is controlled by a high-end server controlled by a third-party entity, so that the safety of the data is not high, and the environmental quality measurement result is reduced.
In order to solve the problems in the prior art, embodiments of the present application provide a data transmission method, system and computer readable storage medium with high security. Wherein the system comprises a data transmission device which is configured in a blockchain, the data transmission method with high security in the application can be executed by the data transmission device in the system of the embodiment of the application, the data transmission device is configured in the blockchain and can be configured to propagate, verify or execute computer protocols (namely intelligent contracts) of contracts in an informationized mode, the intelligent contracts allow trusted transactions to be carried out without third parties, and the transactions can be tracked and irreversible, thereby the application realizes the trusted transmission between data based on the intelligent contracts.
The following first describes a data transmission method with high security provided by the embodiments of the present application. Fig. 1 is a flow chart illustrating a high security data transmission method according to an embodiment of the present application.
As shown in fig. 1, the data transmission method with high security of the present application at least includes step S11, step S13, step S15, step S17 and step S19.
Step S11, obtaining the original data transmission information sent by the sender equipment.
And step S13, encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment.
Step S15, under the condition that the receiver device receives the target ciphertext sent by the sender device, the target ciphertext sent by the receiver device is obtained.
And S17, decrypting the target ciphertext to obtain the original data transmission information.
Specifically, in the present application, the smart contracts are configured on the blockchain as the execution subject of the present application. The intelligent contract and the sender equipment establish a communication relationship, the intelligent contract and the receiver equipment establish a communication relationship, a plurality of functional modules can be configured in the intelligent contract, original data transmission information sent by the sender equipment can be encrypted based on an encryption module in the intelligent contract to generate a target ciphertext, then the target ciphertext of the sender is sent to the receiver equipment, then an acquisition module in the intelligent contract acquires the target ciphertext, and then a decryption module in the intelligent contract decrypts the target ciphertext, so that the original data transmission information is obtained. At which point the data is transferred from the sender device to the receiver device. According to the method and the device, the intelligent contract is utilized to encrypt and decrypt the data in the data transmission process, a high-end server controlled by a third-party entity is not needed, so that the problem that the data is leaked on the third-party entity is avoided, and the safety of the data transmission is effectively improved.
And S19, analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
Specifically, in the present application, after the original data transmission information is obtained, an analysis module and a preset threshold may be configured in the intelligent contract, and the analysis module analyzes the original data transmission information, that is, the analysis module analyzes the original data transmission information and the preset threshold to obtain an analysis result. And then deciding whether to adjust the receiving party equipment according to the analysis result. The original data transmission information does not meet a preset threshold value and needs to be adjusted.
It should be noted that, the analysis result may be that the original data transmission information is greater than or equal to or less than a preset threshold value. The preset threshold value can be multiple, and is determined by different categories of the original data transmission information. The correspondence between the threshold and the different types of data and the comparison step will be described below in the case where the original data transmission information includes the different types of data.
According to the method and the device, the intelligent contract is utilized to encrypt and decrypt the data in the data transmission process, a high-end server controlled by a third-party entity is not needed, so that the problem that the data is leaked on the third-party entity is avoided, the safety of data transmission is effectively improved, after the decrypted original data transmission information is obtained, the original data transmission information is analyzed based on a preset threshold value, things corresponding to the original data transmission information are adjusted according to an analysis result, and the accuracy of the original data transmission information is guaranteed.
In an alternative embodiment, the original data transmission information includes original monitoring data, where encrypting the original data transmission information in step S13, to obtain a target ciphertext and transmitting the target ciphertext to the sender device includes:
a public key of the recipient device is obtained.
And encrypting the original monitoring data based on the public key of the receiving device to obtain the target ciphertext.
In step S17, the target ciphertext is decrypted to obtain the original data transmission information, which includes:
a private key of the recipient device is obtained.
And decrypting the target ciphertext based on the private key of the receiving device to obtain the original data transmission information.
In this embodiment, an asymmetric encryption algorithm may be used to encrypt the raw monitoring data. It should be noted that there are two keys for the asymmetric encryption algorithm: public keys (public keys for short) and private keys (private keys for short). The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted only by the corresponding private key. The intelligent contract can acquire the public key of the receiver device, and then encrypt the original monitoring data according to the public key of the receiver device to obtain the target ciphertext. And the sender equipment sends the target ciphertext to the receiver equipment, and then the intelligent contract acquires the target ciphertext and the private key of the receiver equipment, and decrypts the target ciphertext according to the private key of the receiver equipment to obtain the original data transmission information. Because the asymmetric encryption algorithm does not need to transmit the secret key of the asymmetric encryption algorithm to the other party, the confidentiality of data is effectively improved, and the security of data transmission is further improved.
Alternatively, the asymmetric encryption algorithm may be at least an RSA algorithm, a knapsack algorithm, and an Elgamal algorithm.
In an alternative embodiment, the original data transmission information includes original monitoring data and a data information summary, and the data information summary is used for marking all the original monitoring data respectively; in step S13, the encrypting the original data transmission information to obtain the target ciphertext and transmitting the target ciphertext to the sender device includes:
a public key of the receiver device and a private key of the sender device are obtained.
And encrypting the original monitoring data based on the public key of the receiving device to obtain a first ciphertext corresponding to the original monitoring data.
Encrypting the data information abstract based on the private key of the sender device to obtain a second ciphertext corresponding to the data information abstract, wherein the second ciphertext and the first ciphertext form a target ciphertext.
In step S17, the target ciphertext is decrypted to obtain the original data transmission information, which includes:
a private key of the receiver device and a public key of the sender device are obtained.
And decrypting the original monitoring data based on the private key of the receiving device to obtain the original monitoring data.
Decrypting the data information abstract based on the public key of the sender device to obtain the data information abstract.
In this embodiment, the original data transmission information includes original monitoring data and a data information summary; the encryption and decryption methods of the original monitoring data are described in the above embodiments, and are not described herein.
The data information abstract can mark the original monitoring data, that is, the original monitoring data of different types can be marked, under the condition that all the original monitoring data are marked, the intelligent contract can acquire the private key of the sender device, encrypt the data information abstract by using the private key of the sender device to obtain a second ciphertext, then send the second ciphertext to the sender device, send the second ciphertext to the receiver device by the sender device, acquire the second ciphertext acquired by the receiver device and the public key of the receiver device, decrypt the second ciphertext according to the public key of the receiver device, and obtain the decrypted data information abstract. According to the method and the device, the accuracy of the original monitoring data can be effectively determined through encryption and decryption transmission of the data information abstract. The specific judgment step is described in detail below.
In an alternative embodiment, after decrypting the data message digest based on the public key of the sender device, the method further comprises:
and comparing the decrypted data information abstract with the data information abstract sent by the sender equipment to generate a comparison result.
And judging whether the original monitoring data has the missing or not based on the comparison result.
In this embodiment, after obtaining the decrypted data information summaries, the number of the decrypted data information summaries is compared with the number of the original data information summaries to obtain whether the original monitoring data transmitted has a defect.
Such as: the original data message digest is 10 signatures, namely, the 10 types of original monitoring data are marked, however, after transmission, the original monitoring data is deleted in the transmission process when the data message digest is 8 signatures.
It should be noted that when the original data transmission information includes the original monitoring data and the data information abstract, the encryption and decryption transmission of the original monitoring data may be recorded as a first condition, the judgment of the data information abstract is recorded as a second condition, and after the encryption and decryption transmission of the original monitoring data is completed, i.e. after the first condition is implemented, the second condition is implemented, and when the second condition is established (the original monitoring data does not have a missing condition), the original monitoring data is characterized that there is no problem.
In an alternative embodiment, when the original monitoring data is missing in the transmission process, the missing original monitoring data can be determined according to the type of the signature, so that the tracing operation is performed, and the missing data is obtained again.
In an alternative embodiment, obtaining the private key of the sender device includes:
determining a first device identification of the sender device; wherein the sender device has a first device identification.
A private key of the sender device is obtained based on the first device identification.
In this embodiment, each sender device has a corresponding first device identifier (e.g., a device ID and a device number), where the first device identifiers are already set by the sender device when shipped, and the corresponding first device identifiers are marked on the original monitoring data when the sender device transmits the original monitoring data, i.e., the original monitoring data has the corresponding first device identifiers, so that the smart contract can determine from which sender device the original monitoring data comes according to the first device identifiers, thereby obtaining the private key of the sender device to encrypt the data summary information.
It should be noted that, the public key and the private key of the receiving device may be obtained by the smart contract through the second device identifier.
In an alternative embodiment, the encrypting the original data transmission information in step S13, to obtain the target ciphertext and transmitting the target ciphertext to the sender device, includes:
the category of the raw monitoring data is determined.
And encrypting the original monitoring data based on the category of the original monitoring data to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment.
In this embodiment, the sender device may be a plurality of micro sensors, where the plurality of micro sensors are stored in the wireless transmission network, each micro sensor may monitor an environment or a monitored object and collect original monitoring data, so that the types of the original monitoring data may be various (for example, PM10, PM2.5, DO, SS, etc.), and it is required to determine the type of each original monitoring data, encrypt the original monitoring data according to different types, obtain a target ciphertext, and send the target ciphertext to the sender device. By determining the category, the original monitoring data can be more conveniently classified, so that the transmission and encryption of the original monitoring data are more convenient.
In an alternative embodiment, the raw monitoring data may be categorized according to the type of environmental factors, which may include at least climate factors, land factors, and biological factors.
In an alternative embodiment, at step S17: after decrypting the target ciphertext to obtain the original data transmission information, the method further comprises the following steps:
carrying out integrity check on the original monitoring data to generate a check result;
and controlling the receiver equipment to uplink the original monitoring data under the condition that the verification result is that the original monitoring data are correct.
In this embodiment, after the target ciphertext is decrypted by the smart contract to obtain the original data transmission information, the original monitoring data in the original data transmission information needs to be uploaded by the blockchain, and the security of the original monitoring data can be ensured due to the characteristic that the data uploaded by the blockchain cannot be changed.
However, since the data uploaded in the blockchain cannot be changed, when the original monitoring data is uploaded, the integrity of the original monitoring data needs to be checked to generate a check result. It should be noted that, when receiving the original monitoring data, the receiving device may malfunction, for example: if the original monitoring data is not received at a certain moment or the receiving device sends a short fault, which causes that the data of the original monitoring data is too large or too small, the intelligent contract can judge the integrity of the original monitoring data by judging whether the original monitoring data to be uploaded has blank or is in a value conforming to the theorem, and the original monitoring data conforming to the integrity is uplink in a blockchain.
In an alternative embodiment, after step S19, the method further comprises:
and under the condition that the analysis result is that the original monitoring data in the original data transmission information does not accord with a preset threshold value, the intelligent contract determines a response event corresponding to the original monitoring data.
It should be noted that, the response event is already configured in the smart contract, that is, each category of the original monitoring data corresponds to a response event, for example: at too high a pH, the response event may be to adjust the acidity of the soil. Wherein the response event may be executed by the recipient device or an additional processing device may be provided in communication with the smart contract, the processing device being configured to execute the response event.
It should be noted that the preset threshold value is also configured in the smart contract, and may correspond to different types of raw monitoring data. Such as: the original monitoring data is air monitoring data, and then the preset threshold value can be a sound decibel value; for another example: the original monitoring data is soil monitoring data, and then the preset threshold value can be a PH value.
In an alternative embodiment, in case the original monitoring data does not meet a preset threshold value, the method further comprises:
the intelligent contract sends the original monitoring data to the early warning platform.
In this embodiment, the intelligent contract sends the original monitoring data which does not meet the preset threshold to the early warning platform, so that a certain prompting effect can be played for monitoring personnel.
Fig. 2 is a schematic structural diagram of a data transmission system with high security according to an embodiment of the present application. As shown in fig. 2, the data transmission system with high security of the present application includes: a sender device 1, a receiver device 3, and a data transmission apparatus 2; the data transmission device is configured in the block chain and comprises: a first obtaining module 21, configured to obtain original data transmission information sent by a sender device; the encryption module 22 is configured to encrypt the original data transmission information to obtain a target ciphertext and send the target ciphertext to the sender device; a second obtaining module 23, configured to obtain, when the receiver device receives the target ciphertext sent by the sender device, the target ciphertext sent by the receiver device; the decryption module 24 is configured to decrypt the target ciphertext to obtain original data transmission information; the analysis module 25 is configured to analyze the original data transmission information based on a preset threshold value, and obtain an analysis result.
In this embodiment, the data transmission device 2 may be the above-mentioned smart contract, the smart contract is configured in the blockchain, the smart contract cannot be edited again after deployment, and the original contract must be revoked and a new contract deployed in order to update or replace the contract. Wherein the smart contract establishes a communication relationship with the sender device 1 and the receiver device 3, comprising: a first acquisition module 21, an encryption module 22, a second acquisition module 23, a decryption module 24, and an analysis module 25. Wherein, the original data transmission information sent by the sender device 1 is acquired by the first acquisition module 21; encrypting the original data transmission information by an encryption module 22 to obtain a target ciphertext and transmitting the target ciphertext to the sender device 1; acquiring, by the second acquisition module 23, the target ciphertext transmitted by the receiver device 27 when the receiver device 3 receives the target ciphertext transmitted by the sender device 1; decrypting the target ciphertext through a decryption module 24 to obtain original data transmission information; the analysis module 25 analyzes the original data transmission information based on a preset threshold value to obtain an analysis result.
According to the method and the device, the intelligent contract is utilized to encrypt and decrypt the data in the data transmission process, a high-end server controlled by a third-party entity is not needed, so that the problem that the data is leaked on the third-party entity is avoided, the safety of data transmission is effectively improved, after the decrypted original data transmission information is obtained, the original data transmission information is analyzed based on a preset threshold value, things corresponding to the original data transmission information are adjusted according to an analysis result, and the accuracy of the original data transmission information is guaranteed.
Each module/unit in the system shown in fig. 2 has a function of implementing each step in fig. 1, and can achieve a corresponding technical effect, which is not described herein for brevity.
Fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
The electronic device may comprise a processor 301 and a memory 302 storing computer program instructions.
In particular, the processor 301 may include a Central Processing Unit (CPU), or an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of embodiments of the present application.
In one embodiment, memory 302 may be Read Only Memory (ROM). In one embodiment, the ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory, or a combination of two or more of these.
The processor 301 reads and executes the computer program instructions stored in the memory 302 to implement any of the high security data transmission methods of the above embodiments.
In one example, the electronic device may also include a communication interface 303 and a bus 310. As shown in fig. 3, the processor 301, the memory 302, and the communication interface 303 are connected to each other by a bus 310 and perform communication with each other.
The communication interface 303 is mainly used to implement communication between each module, device, unit and/or apparatus in the embodiments of the present application.
In addition, in combination with the data transmission method with high security in the above embodiments, the embodiments of the present application may be implemented by providing a computer readable storage medium. The computer readable storage medium has stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the highly secure data transmission methods of the above embodiments.
It should be clear that the present application is not limited to the particular arrangements and processes described above and illustrated in the drawings. For the sake of brevity, a detailed description of known methods is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions, or change the order between steps, after appreciating the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented in hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine readable medium or transmitted over transmission media or communication links by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transfer information. Examples of machine-readable media include electronic circuitry, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and the like. The code segments may be downloaded via computer networks such as the internet, intranets, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be different from the order in the embodiments, or several steps may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to being, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware which performs the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In the foregoing, only the specific embodiments of the present application are described, and it will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the systems, modules and units described above may refer to the corresponding processes in the foregoing method embodiments, which are not repeated herein. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, which are intended to be included in the scope of the present application.
Claims (10)
1. A high security data transmission method, the method comprising:
acquiring original data transmission information sent by sender equipment;
encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device;
under the condition that the receiver equipment receives the target ciphertext transmitted by the transmitter equipment, acquiring the target ciphertext transmitted by the receiver equipment;
decrypting the target ciphertext to obtain original data transmission information;
and analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
2. The method for transmitting data with high security according to claim 1, wherein the original data transmission information includes original monitoring data, the encrypting the original data transmission information, obtaining a target ciphertext and transmitting the target ciphertext to a sender device, includes:
obtaining a public key of the receiver device;
and encrypting the original monitoring data based on the public key of the receiving party equipment to obtain a target ciphertext.
3. The high security data transmission method according to claim 1, wherein the original data transmission information includes original monitoring data and a data information summary, wherein the data information summary is used for marking all the original monitoring data respectively, and the encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device includes:
acquiring a public key of a receiver device and a private key of a sender device;
encrypting the original monitoring data based on the public key of the receiver device to obtain a first ciphertext corresponding to the original monitoring data;
encrypting the data information abstract based on the private key of the sender equipment to obtain a second ciphertext corresponding to the data information abstract, wherein the second ciphertext and the first ciphertext form the target ciphertext.
4. The method for transmitting data with high security according to claim 2, wherein decrypting the target ciphertext to obtain the original data transmission information comprises:
acquiring a private key of the receiver device;
and decrypting the target ciphertext based on the private key of the receiver device to obtain the original data transmission information.
5. The method for transmitting data with high security according to claim 3, wherein decrypting the target ciphertext to obtain the original data transmission information comprises:
acquiring a private key of a receiver device and a public key of a sender device;
decrypting the original monitoring data based on the private key of the receiver device to obtain the original monitoring data;
and decrypting the data information abstract based on the public key of the sender equipment to obtain the data information abstract.
6. The high security data transmission method of claim 5, further comprising:
comparing the decrypted data information abstract with the data information abstract sent by the sender equipment to generate a comparison result;
and judging whether the original monitoring data has a deletion or not based on the comparison result.
7. A data transmission method with high security according to claim 2 or 3, wherein encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to a sender device comprises:
determining the category of the original monitoring data;
encrypting the original monitoring data based on the category of the original monitoring data to obtain a target ciphertext and transmitting the target ciphertext to a sender device.
8. A method for transmitting data with high security according to claim 2 or 3, wherein after decrypting the target ciphertext to obtain the original data transmission information, the method further comprises:
carrying out integrity check on the original monitoring data to generate a check result;
and controlling the receiving device to uplink the original monitoring data under the condition that the verification result is that the original monitoring data are correct.
9. The data transmission system with high security is characterized by comprising a sender device, a receiver device and a data transmission device;
the data transmission device is configured in a blockchain and includes: the first acquisition module is used for acquiring the original data transmission information sent by the sender equipment;
the encryption module is used for encrypting the original data transmission information to obtain a target ciphertext and transmitting the target ciphertext to the sender equipment;
the second acquisition module is used for acquiring the target ciphertext transmitted by the receiver device under the condition that the receiver device receives the target ciphertext transmitted by the transmitter device;
the decryption module is used for decrypting the target ciphertext to obtain original data transmission information; the analysis module is used for analyzing the original data transmission information based on a preset threshold value to obtain an analysis result.
10. A computer-readable storage medium, on which computer program instructions are stored which, when executed by a processor, implement the high security data transmission method according to any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310220427.1A CN116389067A (en) | 2023-03-08 | 2023-03-08 | High-security data transmission method, system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310220427.1A CN116389067A (en) | 2023-03-08 | 2023-03-08 | High-security data transmission method, system and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116389067A true CN116389067A (en) | 2023-07-04 |
Family
ID=86966532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310220427.1A Pending CN116389067A (en) | 2023-03-08 | 2023-03-08 | High-security data transmission method, system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116389067A (en) |
-
2023
- 2023-03-08 CN CN202310220427.1A patent/CN116389067A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111125737B (en) | Environmental monitoring system based on block chain | |
CN1933396B (en) | System and method for collecting traffic data using probe vehicles | |
CN104660589B (en) | Method, system and terminal for encrypting control and information analysis of information | |
CN109660346B (en) | Information hosting method, device, equipment and computer storage medium | |
CN109190362B (en) | Secure communication method and related equipment | |
EP3384629B1 (en) | System and method for tamper-resistant device usage metering | |
CN113569267B (en) | Privacy safety data set intersection method, device, equipment and storage medium | |
CN107636669B (en) | Control of undesirable network traffic | |
CN109586920A (en) | A kind of trust authentication method and device | |
CN110955921A (en) | Electronic signature method, device, equipment and storage medium | |
CN116132989A (en) | Industrial Internet security situation awareness system and method | |
CN117313122A (en) | Data sharing and exchanging management system based on block chain | |
CN115147956A (en) | Data processing method and device, electronic equipment and storage medium | |
CN116781263B (en) | Identity authentication and secret key self-updating method among in-vehicle ECUs and readable storage medium | |
CN116389067A (en) | High-security data transmission method, system and computer readable storage medium | |
CN114584370A (en) | Server data interaction network security system | |
Kneib | A survey on sender identification methodologies for the controller area network | |
CN112995096B (en) | Data encryption and decryption methods, devices and equipment | |
CN112765266A (en) | Method, device and equipment for managing data assets and computer storage medium | |
CN110311911B (en) | Traffic facility monitoring method and device and server | |
CN114358222B (en) | System and method for identifying and preventing fraudulent use by multi-node positioning | |
CN116245525A (en) | Transaction data processing method, device and equipment of blockchain and storage medium | |
US11256796B2 (en) | Ensuring authenticity of at least one value of a device property | |
CN111193685B (en) | Method, device, equipment and medium for verifying authenticity of log information | |
CN116132034A (en) | Data processing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |