CN117155711A - Data security transmission method, system, medium and equipment based on serial port - Google Patents
Data security transmission method, system, medium and equipment based on serial port Download PDFInfo
- Publication number
- CN117155711A CN117155711A CN202311419482.XA CN202311419482A CN117155711A CN 117155711 A CN117155711 A CN 117155711A CN 202311419482 A CN202311419482 A CN 202311419482A CN 117155711 A CN117155711 A CN 117155711A
- Authority
- CN
- China
- Prior art keywords
- data
- private key
- serial port
- module
- protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 63
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000006243 chemical reaction Methods 0.000 claims abstract description 19
- 238000004891 communication Methods 0.000 claims abstract description 9
- 238000004590 computer program Methods 0.000 claims description 11
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/06—Transport layer protocols, e.g. TCP [Transport Control Protocol] over wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Communication Control (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a serial port-based data security transmission method, a system, a medium and equipment, wherein the system comprises a serial port protocol conversion module, a system management service module, a private key index generation module, a secret key module, a security transmission module, a data receiving module and a data sending module, and the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module. The invention ensures the security, integrity and encryption transmission of the serial data by adopting the private key index matching mechanism encryption and decryption of the serial data by respectively installing the serial data security transmission system or device on two sides of the serial to protect the network layer.
Description
Technical Field
The invention relates to the technical field of network security, in particular to a serial port-based data security transmission method, a serial port-based data security transmission system, a serial port-based data security transmission medium and serial port-based data security transmission equipment.
Background
With the development of the age, serial ports are used for transmitting data in many industries, the data can easily acquire contents in the data, and serious potential safety hazards exist for malicious damage and modification.
Disclosure of Invention
Therefore, the technical problem to be solved by the invention is to provide a serial port-based data security transmission method, system, medium and equipment, which ensure the security, integrity and encryption transmission of serial port data by adopting a private key index matching mechanism encryption and decryption of serial port data by respectively installing serial port data security transmission systems or devices on two sides of the serial port to protect a network layer.
In order to solve the technical problems, the invention provides the following technical scheme:
a serial port-based data security transmission method comprises the following steps:
s1) after receiving serial port protocol data, the first equipment converts the serial port protocol data into TCP/IP protocol data;
s2) acquiring a private key index according to a predefined strategy, recording the private key index, and then finding a corresponding private key in a shared private key library according to the private key index; the predefined policy is a manner, scheme or method for obtaining the private key index set by the user according to the user's own needs, for example, if 100 private keys in the common private key library are used, the private key index is set to (date 3)% 100);
s3) encrypting the TCP/IP protocol data obtained by conversion by utilizing an encryption algorithm according to the private key;
s4) the first device fills the private key index into the encrypted TCP/IP protocol data, and then the encrypted TCP/IP protocol data filled with the private key index is sent to the second device; the first device fills the private key index into the encrypted TCP/IP protocol data, wherein the private key index used when the first device fills the private key index into the encrypted TCP/IP protocol data is the private key index obtained according to the predefined strategy in the step S2);
s5) after receiving the private key index and the TCP/IP protocol data, the second equipment finds a corresponding private key in the shared private key library according to the received private key index, and decrypts the encrypted TCP/IP protocol data by using the found private key;
s6) the second device converts the decrypted TCP/IP protocol data into serial port data.
In the above serial port-based data security transmission method, in step S6), the second device performs format judgment on serial port data converted from decrypted TCP/IP protocol data, if the serial port data has a Modbus RTU format, it is necessary to update CRC of 2 bytes on the serial port data, if the serial port data has a Modbus ASCII format, it is necessary to update LRC of 2 bytes on the serial port data, and if the serial port data has a Modbus TCP format, it is unnecessary to verify the serial port data.
According to the serial port-based data security transmission method, the private key is an asymmetric private key.
According to the serial port-based data security transmission method, the first equipment and the second equipment are connected through wired or wireless communication.
According to the serial port-based data security transmission method, the shared private key library is a prefabricated private key library.
The system for carrying out data security transmission by using the serial port-based data security transmission method is arranged in the first equipment and the second equipment, and comprises:
the serial port protocol conversion module is used for mutually converting the serial port protocol and the TCP/IP protocol;
the system management service module is used for starting a data receiving service, a data sending service and a safety protection service; the data receiving service is used for receiving data sent by the serial port, the data sending service is used for sending the serial port data, and the safety protection service is used for sending or receiving safe transmission of data of the opposite terminal by using a TCP/IP protocol after encryption;
the private key index generation module is used for generating a private key index; the private key index generation module is internally provided with a predefined strategy;
a key module for providing a private key; the secret key module is internally provided with a shared secret key library;
the safety transmission module is used for encrypting the data processed by the serial port protocol conversion module by using the private key;
the data transmitting module is used for transmitting data;
the data receiving module is used for receiving data;
the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module.
According to the system, the security transmission module encrypts the data processed by the serial port protocol conversion module by using the SM4 algorithm according to the private key.
The system is characterized in that the shared private key library is a prefabricated key library.
A computer readable storage medium having stored thereon a computer program which when executed by a processor implements the above method.
Computer device comprising a readable storage medium, a processor and a computer program stored on the readable storage medium and executable on the processor, which computer program, when executed by the processor, implements the method described above.
The technical scheme of the invention has the following beneficial technical effects:
1. the invention adopts an asymmetric encryption algorithm to provide serial port data safety protection so as to achieve the aims of preventing interception, counterfeiting and replacement of serial port data, thereby ensuring the safety of serial port data transmission.
2. The invention only encrypts or converts serial data without modifying the original data content or the original protocol.
3. If the two devices adopt wireless communication, the wireless network can be a wireless local area network or a mobile network, and the transmission materials and labor cost can be greatly saved.
4. The security, the integrity and the encryption transmission of the serial data are ensured by adopting a private key index matching mechanism encryption and decryption to the serial data by respectively installing a serial data security transmission system or device on two sides of the serial to protect a network layer.
Drawings
FIG. 1 is a schematic diagram of the operation of a serial port based data security transmission system according to the present invention;
FIG. 2 is a flow chart of serial port based data security transmission of serial port data in the present invention;
fig. 3 is a schematic diagram of a computer capable of serial port based secure data transmission.
Detailed Description
The invention is further described below with reference to examples.
As shown in fig. 1, the serial port-based data security transmission system in the invention comprises a serial port protocol conversion module, a system management service module, a private key index generation module, a secret key module, a security transmission module, a data receiving module and a data sending module, wherein the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module.
The serial port protocol conversion module is used for mutually converting the serial port protocol and the TCP/IP protocol; the system management service module is used for starting a data receiving service, a data sending service and a safety protection service; the data receiving service is used for receiving data sent by the serial port, the data sending service is used for sending the serial port data, and the safety protection service is used for sending or receiving safe transmission of data of the opposite terminal by using a TCP/IP protocol after encryption; the private key index generation module is used for generating a private key index; the private key index generation module is internally provided with a predefined strategy; the secret key module is used for providing a secret key, and the provided secret key is an asymmetric secret key; the secret key module is internally provided with a shared secret key library, and the shared secret key library is a prefabricated secret key library; the security transmission module is used for encrypting the data processed by the serial port protocol conversion module by using an SM4 algorithm according to the private key; the data transmitting module is used for transmitting data; and the data receiving module is used for receiving the data.
In this embodiment, the characteristic that the Modbus device supports the ethernet interface is utilized, and an ethernet-to-serial gateway is used to connect the Modbus device to the local area network of the PC. And then, interaction is carried out with Modbus equipment through Ethernet communication based on a Modbus library or an API of the TCP/IP, so that the serial port protocol of RS-232/485 is the TCP/IP protocol and can be mutually converted. The prefabricated private key library is adopted as the shared private key library, so that a user can conveniently select a corresponding predefined strategy according to own needs, the safety of data transmission can be improved, and the user can conveniently update the prefabricated private key library.
The serial-port-based data security transmission system is arranged in the first equipment and the second equipment, and the first equipment and the second equipment communicate by utilizing the serial-port-based data security transmission system.
As shown in fig. 2, the first device and the second device implement secure data transmission by:
s1) after receiving serial port protocol data, the first equipment converts the serial port protocol data into TCP/IP protocol data;
s2) acquiring a private key index according to a predefined strategy, recording the private key index, and then finding a corresponding private key in a shared private key library according to the private key index;
s3) encrypting the TCP/IP protocol data obtained through conversion according to a private key encryption algorithm;
s4) the first device fills the private key index into the encrypted TCP/IP protocol data, and then the encrypted TCP/IP protocol data filled with the private key index is sent to the second device; the first device fills the private key index into the encrypted TCP/IP protocol data, wherein the private key index used when the first device fills the private key index into the encrypted TCP/IP protocol data is the private key index obtained according to the predefined strategy in the step S2);
s5) after receiving the private key index and the TCP/IP protocol data, the second equipment finds a corresponding private key in the shared private key library according to the received private key index, and decrypts the encrypted TCP/IP protocol data by using the found private key;
s6) the second device converts the decrypted TCP/IP protocol data into serial port data.
In step S6), the second device performs format judgment on serial port data converted from decrypted TCP/IP protocol data, if the serial port data has a Modbus RTU format, it is necessary to update CRC of 2 bytes for the serial port data, if the serial port data has a Modbus ASCII format, it is necessary to update LRC of 2 bytes for the serial port data, and if the serial port data has a Modbus TCP format, it is unnecessary to verify the serial port data.
When the serial port-based data security transmission system is used for serial port data transmission, the serial port-based data security transmission system at the transmitting end encrypts data to be transmitted by using an SM4 algorithm according to a private key, and the serial port-based data security transmission system at the receiving end decrypts the data to be transmitted by using the SM4 algorithm according to the private key, and in the data transmission process, the SM4 algorithm ensures the integrity, tamper resistance and the like of the data to ensure security transmission.
In practical application, the serial port-based data security transmission system can be manufactured into a hardware device, then two devices needing serial port data transmission are connected in a communication mode through the two hardware devices, and then serial port data transmission is carried out, so that the security, the integrity and the confidentiality of data transmission of a field controller and control equipment/sensing equipment can be realized.
Based on the serial port-based data security transmission method, correspondingly, in this example, there is also provided a computer readable storage medium storing a computer program, where the computer program when executed by a processor implements the following steps: when the serial port data is used as a serial port data transmitting end, serial port protocol data is converted into TCP/IP protocol data, then a private key index is obtained according to a predefined strategy, the private key index is recorded, a corresponding private key is found in a shared private key library according to the private key index, then the TCP/IP protocol data obtained through conversion is encrypted according to the private key by utilizing an encryption algorithm, the private key index is filled in the encrypted TCP/IP protocol data, and then the TCP/IP protocol data which is encrypted and is filled with the private key index is transmitted to a serial port data receiving end; when the system is used as a serial port data receiving end, a corresponding private key is found in a shared private key library according to the received private key index, encrypted TCP/IP protocol data is decrypted by utilizing an encryption algorithm according to the private key, and then the decrypted TCP/IP protocol data is converted into serial port protocol data.
As shown in fig. 3, based on the above unknown threat discovery method of the industrial control system and the computer readable storage medium, in this embodiment, there is further provided a computer device, which includes a readable storage medium, a processor, and a computer program stored on the readable storage medium and executable on the processor, where the readable storage medium and the processor are both disposed on a bus, and when the processor executes the computer program, the processor implements the following steps: when the serial port data is used as a serial port data transmitting end, serial port protocol data is converted into TCP/IP protocol data, then a private key index is obtained according to a predefined strategy, the private key index is recorded, a corresponding private key is found in a shared private key library according to the private key index, then the TCP/IP protocol data obtained through conversion is encrypted according to the private key by utilizing an encryption algorithm, the private key index is filled in the encrypted TCP/IP protocol data, and then the TCP/IP protocol data which is encrypted and is filled with the private key index is transmitted to a serial port data receiving end; when the system is used as a serial port data receiving end, a corresponding private key is found in a shared private key library according to the received private key index, encrypted TCP/IP protocol data is decrypted by utilizing an encryption algorithm according to the private key, and then the decrypted TCP/IP protocol data is converted into serial port protocol data.
It is apparent that the above examples are given by way of illustration only and are not limiting of the embodiments. Other variations or modifications of the above teachings will be apparent to those of ordinary skill in the art. It is not necessary here nor is it exhaustive of all embodiments. While the obvious variations or modifications which are extended therefrom remain within the scope of the claims of this patent application.
Claims (10)
1. The serial port-based data security transmission method is characterized by comprising the following steps:
s1) after receiving serial port protocol data, the first equipment converts the serial port protocol data into TCP/IP protocol data;
s2) acquiring a private key index according to a predefined strategy, recording the private key index, and then finding a corresponding private key in a shared private key library according to the private key index;
s3) encrypting the TCP/IP protocol data obtained by conversion by utilizing an encryption algorithm according to the private key;
s4) the first device fills the private key index into the encrypted TCP/IP protocol data, and then the encrypted TCP/IP protocol data filled with the private key index is sent to the second device; the first device fills the private key index into the encrypted TCP/IP protocol data, wherein the private key index used when the first device fills the private key index into the encrypted TCP/IP protocol data is the private key index obtained according to the predefined strategy in the step S2);
s5) after receiving the private key index and the TCP/IP protocol data, the second equipment finds a corresponding private key in the shared private key library according to the received private key index, and decrypts the encrypted TCP/IP protocol data by using the found private key;
s6) the second device converts the decrypted TCP/IP protocol data into serial port protocol data.
2. The serial port-based data security transmission method according to claim 1, wherein in step S6), the second device performs format determination on serial port data converted from decrypted TCP/IP protocol data, if the serial port data is in Modbus RTU format, it is necessary to update CRC of 2 bytes on the serial port data, if the serial port data is in Modbus ASCII format, it is necessary to update LRC of 2 bytes on the serial port data, and if the serial port data is in Modbus TCP format, it is unnecessary to verify the serial port data.
3. The serial-based data security transmission method of claim 1, wherein the private key is an asymmetric private key.
4. The serial-based data security transmission method of claim 1, wherein the first device and the second device are connected by wired or wireless communication.
5. The serial port-based data security transmission method according to any one of claims 1 to 4, wherein the shared private key library is a prefabricated private key library.
6. A system for performing data security transmission by using the serial port-based data security transmission method according to any one of claims 1 to 5, wherein the system is provided in each of the first device and the second device, and the system comprises:
the serial port protocol conversion module is used for mutually converting the serial port protocol and the TCP/IP protocol;
the system management service module is used for starting a data receiving service, a data sending service and a safety protection service; the data receiving service is used for receiving data sent by the serial port, the data sending service is used for sending the serial port data, and the safety protection service is used for sending or receiving safe transmission of data of the opposite terminal by using a TCP/IP protocol after encryption;
the private key index generation module is used for generating a private key index; the private key index generation module is internally provided with a predefined strategy;
a key module for providing a private key; the secret key module is internally provided with a shared secret key library;
the safety transmission module is used for encrypting the data processed by the serial port protocol conversion module by using the private key;
the data transmitting module is used for transmitting data;
the data receiving module is used for receiving data;
the system management service module is respectively in communication connection with the serial port protocol conversion module, the private key index generation module, the secret key module, the security transmission module, the data sending module and the data receiving module.
7. The system of claim 6, wherein the secure transmission module encrypts the data processed by the serial protocol conversion module using SM4 algorithm based on the private key.
8. The system of claim 6, wherein the shared secret key store is a pre-made key store.
9. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program, when executed by a processor, implements the method of any of claims 1-5.
10. Computer device comprising a readable storage medium, a processor and a computer program stored on the readable storage medium and executable on the processor, characterized in that the computer program when executed by the processor implements the method according to any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311419482.XA CN117155711A (en) | 2023-10-30 | 2023-10-30 | Data security transmission method, system, medium and equipment based on serial port |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311419482.XA CN117155711A (en) | 2023-10-30 | 2023-10-30 | Data security transmission method, system, medium and equipment based on serial port |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117155711A true CN117155711A (en) | 2023-12-01 |
Family
ID=88910478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311419482.XA Pending CN117155711A (en) | 2023-10-30 | 2023-10-30 | Data security transmission method, system, medium and equipment based on serial port |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117155711A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1653743A (en) * | 2002-05-17 | 2005-08-10 | 诺基亚有限公司 | Method and system in a digital wireless data communication network for arranging data encryption and corresponding server |
CN105635227A (en) * | 2014-11-05 | 2016-06-01 | 北京东土科技股份有限公司 | Point to point communication method and system on the basis of serial server |
CN106817358A (en) * | 2015-12-02 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The encryption and decryption method and equipment of a kind of user resources |
CN106989771A (en) * | 2017-06-06 | 2017-07-28 | 贵州大学 | A kind of method that power distribution cabinet oil machine state parameter is monitored in real time |
KR20210053235A (en) * | 2019-10-30 | 2021-05-11 | 주식회사 대림 | Communication System based on LoRa Protocol with Improved Security and Communication Method using the same |
-
2023
- 2023-10-30 CN CN202311419482.XA patent/CN117155711A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1653743A (en) * | 2002-05-17 | 2005-08-10 | 诺基亚有限公司 | Method and system in a digital wireless data communication network for arranging data encryption and corresponding server |
CN105635227A (en) * | 2014-11-05 | 2016-06-01 | 北京东土科技股份有限公司 | Point to point communication method and system on the basis of serial server |
CN106817358A (en) * | 2015-12-02 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The encryption and decryption method and equipment of a kind of user resources |
CN106989771A (en) * | 2017-06-06 | 2017-07-28 | 贵州大学 | A kind of method that power distribution cabinet oil machine state parameter is monitored in real time |
KR20210053235A (en) * | 2019-10-30 | 2021-05-11 | 주식회사 대림 | Communication System based on LoRa Protocol with Improved Security and Communication Method using the same |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6965992B1 (en) | Method and system for network security capable of doing stronger encryption with authorized devices | |
EP3590242B1 (en) | Communication interface for a low power wide area network, wireless device and server using such communication interface | |
CN102685119A (en) | Data transmitting/receiving method, data transmitting/receiving device, transmission method, transmission system and server | |
CN102196375A (en) | Securing out-of-band messages | |
KR101575862B1 (en) | Security association system between heterogeneous power devices | |
CN102932350B (en) | A kind of method and apparatus of TLS scanning | |
CN213403064U (en) | Industrial network security communication system based on identification password | |
CN101707767B (en) | Data transmission method and devices | |
CN202759475U (en) | Data transmission device, data reception device, data transmission system and server | |
CN110166489B (en) | Data transmission method, system, equipment and computer medium in Internet of things | |
CN103986582A (en) | Data encryption transmission method, device and system based on dynamic encryption technology | |
CN111224974A (en) | Method, system, electronic device and storage medium for network communication content encryption | |
CN114143068A (en) | Electric power internet of things gateway equipment container safety protection system and method thereof | |
CN115242392A (en) | Method and system for realizing industrial information safety transmission based on safety transmission protocol | |
CN103269301A (en) | Desktop type IPSecVPN cryptographic machine and networking method | |
CN114363024A (en) | Data encryption transmission method and device, terminal equipment and storage medium | |
CN107431691A (en) | A kind of data pack transmission method, device, node device and system | |
CN107819778A (en) | A kind of electric energy meter credential initialization method using tls protocol | |
CN117155711A (en) | Data security transmission method, system, medium and equipment based on serial port | |
CN110557383A (en) | Network security data processing method, device, equipment and medium for power monitoring system | |
CN113905108B (en) | Custom protocol analysis device and system for USB communication and operation method thereof | |
EP4020875A1 (en) | Method, first server, second server, and system for transmitting securely a key | |
CN113765900B (en) | Protocol interaction information output transmission method, adapter device and storage medium | |
WO2005057842A1 (en) | A wireless lan system | |
CN111641646A (en) | Safety enhancement type communication positioning terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20231201 |
|
RJ01 | Rejection of invention patent application after publication |