CN117479151A - Data encryption transmission method - Google Patents

Data encryption transmission method Download PDF

Info

Publication number
CN117479151A
CN117479151A CN202311811164.8A CN202311811164A CN117479151A CN 117479151 A CN117479151 A CN 117479151A CN 202311811164 A CN202311811164 A CN 202311811164A CN 117479151 A CN117479151 A CN 117479151A
Authority
CN
China
Prior art keywords
data
terminal
key
task
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311811164.8A
Other languages
Chinese (zh)
Other versions
CN117479151B (en
Inventor
沈丹
贾世斌
卫威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sunkaisens Beijing technology Ltd
Original Assignee
Sunkaisens Beijing technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sunkaisens Beijing technology Ltd filed Critical Sunkaisens Beijing technology Ltd
Priority to CN202311811164.8A priority Critical patent/CN117479151B/en
Publication of CN117479151A publication Critical patent/CN117479151A/en
Application granted granted Critical
Publication of CN117479151B publication Critical patent/CN117479151B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a data encryption transmission method, and relates to the field of data transmission. The invention encrypts the task request and initiates the task request; decrypting the task request when the first terminal is legal, comparing the task request with a database, and requesting data from a central server according to the task serial number when the comparison is consistent; storing and truncating the returned real data to obtain confusion data; encrypting and marking the real data and the confusion data respectively to obtain a data group; marking the generated keys respectively to obtain a key group; packaging the data group, encrypting and transmitting to a corresponding second terminal; when the mobile server is legal, determining the real encrypted data; the mobile server packs the key group and encrypts and sends the key group to the first terminal; when the mobile server is legal, a key list to be sent is generated, encrypted and sent to a corresponding second terminal; when the first terminal is legal, determining a real key; decrypting the encrypted data to parse the encrypted data to obtain the required real data so as to ensure high security of information transmission.

Description

Data encryption transmission method
Technical Field
The invention relates to the technical field of data transmission, in particular to a data encryption transmission method.
Background
In the current mobile space-based system, the terminal often needs to provide instructions and a large amount of data information by the mobile server, and also needs to send the collected latest information to the mobile server, such as the data mode of sending the data from the mobile server to the terminal shown in fig. 1, and such as the data mode of sending the data from the terminal to the mobile server shown in fig. 2. In the data transmission process of the existing mobile space-based system, encrypted data is easy to steal and crack, and in the process of transferring the encrypted data, the information is missed and misplaced, and the encryption process is simple, so that the information is leaked and other problems are solved. Encryption technology is an important means for data security transmission, and the current encryption mode mainly includes symmetric encryption algorithms (such as DES (data encryption standard, data Encryption Standard), AES (advanced encryption standard ) and the like) and asymmetric encryption algorithms (such as RSA encryption algorithm, ECC (error correction code, error Correcting Code) and the like). If a symmetric encryption algorithm is used, the same key is used for encryption and decryption, and besides the key is saved, the other party also knows the key to decrypt the data. If the keys are also passed together, there is a potential for password leakage. The asymmetric encryption algorithm is very inefficient and is not suitable for encrypting large amounts of original information.
Based on this, the prior art needs to solve two problems: firstly, how to encrypt and decrypt information; and how to safely and reliably transmit the key, including key generation, distribution, storage and the like. Further, in order to prevent data from being intercepted and interpreted, causing information leakage, it is necessary to study a working method of data transmission to ensure high security performance at the time of information transmission.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a data encryption transmission method.
In order to achieve the above object, the present invention provides the following.
The data encryption transmission method is realized based on a mobile space-based system; the mobile space-based system comprises a first terminal, a second terminal, a mobile server and a central server; the first terminal and the second terminal perform data interaction with the mobile server through a mobile communication technology; the mobile server performs data interaction with the central server; the first terminal is used for generating a scheduling instruction; the second terminal is used for completing data receiving; the data encryption transmission method comprises the following steps.
Encrypting the task request by using the public key of the mobile server to obtain an encrypted task request; the encryption of the task request is completed in the first terminal; the content of the task request comprises a second terminal serial number and a task serial number.
Decrypting the task request by using a private key of the mobile server, and verifying the validity of the first terminal by adopting a digital signature to obtain a first verification result; the verification process is completed in the mobile server;
and when the first verification result is illegal, not responding.
And when the first verification result is legal, comparing the decrypted task request with data in the database to obtain a comparison result.
And when the comparison result shows that the task scope of the task request belongs to the database, requesting data from a central server according to the task serial number.
And when the comparison result is that the task range of the task request does not belong to the database, the mobile server confirms whether information is wrongly sent to the first terminal, and a confirmation result is obtained.
And when the confirmation result is the information which is sent by mistake, the first terminal resends the task request.
And when the confirmation result is that the information is not wrongly sent, the mobile server requests data from the central server according to the task serial number.
And storing the data returned by the central server and taking the data as real data.
And carrying out truncation and recombination on the real data to obtain confusion data.
Encrypting the real data and the confusion data, respectively generating a real key and a confusion key, marking the encrypted real data and confusion data according to a first setting rule and marking the key according to a second setting rule.
The first setting rule and the second setting rule respectively define a marking position, and define a certain position as a specific marking position of the real data and the real key, and the marking position is used for distinguishing the real data, the confusing data, the real key and the confusing key.
And packaging the marked mixed encrypted data and the marked real encrypted data to obtain packaged data, encrypting the packaged data by using a first fixed password, and transmitting the encrypted packaged data to a corresponding second terminal.
And verifying the validity of the mobile server by adopting the token in the request header to obtain a second verification result.
And when the second verification result is illegal, not responding.
And when the second verification result is legal, the second terminal decrypts according to the first fixed password, determines the real encrypted data according to the marked first set rule and stores the real encrypted data.
The mobile server performs packing processing on the marked confusion encryption key and the real encryption key to obtain a packing key, encrypts a second terminal serial number and task time in packing data corresponding to the packing key and the packing key by using a second fixed password to obtain encrypted data and sends the encrypted data to the first terminal.
And verifying the validity of the mobile server by adopting the token in the request header to obtain a third verification result.
And when the third verification result is illegal, not responding.
When the third verification result is legal, decrypting according to the second fixed password to generate a to-be-sent key list; the key list to be sent comprises a key, a second terminal serial number and task time.
And encrypting the packing key in the key list to be sent by using a third fixed password, sending the encrypted packing key to a second terminal corresponding to the serial number of the second terminal in the key list to be sent, and verifying the legitimacy of the first terminal by adopting a token in the request header by the second terminal to obtain a fourth verification result.
And when the fourth verification result is legal, decrypting by using the third fixed password, determining a real key according to the second set rule, and decrypting the real encrypted data by using the real key to obtain the real data.
And when the fourth verification result is illegal, not responding.
Optionally, the encryption technique employed in encrypting the task request using the mobile server public key to obtain the encrypted task request is an asymmetric encryption technique.
Alternatively, the encryption technique employed when encrypting the real data and the obfuscated data is a symmetric encryption technique.
Optionally, the label position of the confusion data is different from the label position of the task data, and the label position of each confusion data is also different.
Optionally, the first fixed password, the second fixed password and the third fixed password are all determined by negotiation, and one task corresponds to one negotiation result.
The invention further provides another data encryption transmission method, which is realized based on the mobile antenna-based system; the mobile space-based system comprises a first terminal, a second terminal, a mobile server and a central server; the first terminal and the second terminal perform data interaction with the mobile server through a mobile communication technology; the mobile server performs data interaction with the central server; the first terminal is used for generating a scheduling instruction, and the second terminal is used for completing data acquisition; the data encryption transmission method comprises the following steps.
Task data is collected and confusion data is obtained based on the task data.
Encrypting the task data and the confusion data, and obtaining a real key and a confusion key.
Marking the encrypted task data and the encrypted confusion data according to a third setting rule, and marking the real key and the confusion key according to a fourth setting rule.
And packaging the marked encryption task data and the marked encryption confusion data, encrypting the encrypted encryption confusion data by using a fourth fixed password, and transmitting the encrypted encryption confusion data to the mobile server.
And verifying the validity of the second terminal by adopting a token in the request header to obtain a fifth verification result.
And when the fifth verification result is illegal, not responding.
And when the fifth verification result is legal, the mobile server decrypts by using the fourth fixed password, determines the real encrypted task data according to the third set rule and stores the real encrypted task data.
And the packaged and marked real key and the mixed key are used for obtaining a packaged key group, and the packaged key group and the corresponding second terminal serial number are encrypted by using a fifth fixed password and are sent to the first terminal.
And verifying the legitimacy of the second terminal by adopting the token in the request header to obtain a sixth verification result.
And when the sixth verification result is illegal, terminating the operation.
When the sixth verification result is legal, decrypting by using a fifth fixed password to generate a to-be-sent key list; the key list to be sent comprises a packing key and a second terminal serial number.
And packing the to-be-sent key list and sending the to-be-sent key list to the mobile server by using the sixth fixed password encryption.
And verifying the validity of the first terminal by adopting a token in the request header to obtain a seventh verification result.
And when the seventh verification result is illegal, terminating the operation.
And when the seventh verification result is legal, decrypting by using a sixth fixed password, determining a real key according to a fourth set rule, and decrypting corresponding to the serial number of the second terminal to obtain real task data.
Alternatively, the encryption technique employed when encrypting the real data and the obfuscated data is a symmetric encryption technique.
Optionally, the label position of the confusion data is different from the label position of the task data, and the label position of each confusion data is also different.
Optionally, the fourth fixed password, the fifth fixed password and the sixth fixed password are all determined by negotiation, and one task corresponds to one negotiation result.
According to the specific embodiments provided by the invention, the following technical effects are disclosed.
1) The encrypted data and the secret key are sent separately, and the secret key is sent through the third party (namely the first terminal), so that the security can be improved, and the cracking difficulty can be increased.
2) The invention adopts a multitask confusion mode, namely that the real data are mixed in other false data (confusion data), the second terminal and the mobile server make corresponding rules (namely set rules), the real data can be obtained through an algorithm, and even if the real data are intercepted by an adversary, the adversary cannot know which group the real data are.
3) According to the invention, different terminals are adopted for data receiving and collecting and task scheduling, so that the safety can be further improved.
4) The invention carries out secondary encryption on the encrypted data group, thereby improving the security.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a mobile server transmitting data to a terminal in a conventional base communication system.
Fig. 2 is a flow chart of data transmission from a terminal to a mobile server in a conventional base communication system.
Fig. 3 is a flowchart of a first data encryption transmission method provided by the present invention.
Fig. 4 is a flowchart of a second data encryption transmission method according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention aims to provide a data encryption transmission method which can ensure high safety performance during information transmission.
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
In the data transmission process of the mobile space-based system, a communication mobile server usually uses a 3G/4G network as a communication means to communicate with a terminal, and the mobile server of the mobile network based on the 3G network or the 4G network is difficult to meet the transmission requirement of a larger data volume in terms of software and hardware, particularly the requirement of high-definition video data transmission, so that the terminal and the mobile server communicate by using a 5G network in order to solve the problem. The first terminal is a unified scheduling terminal, and the second terminal is a data receiving and collecting terminal. Based on the above, the invention provides two different data encryption transmission methods to ensure high security performance during information transmission.
As shown in fig. 3, the data encryption transmission method provided by the invention comprises the following steps.
Step one, a first terminal encrypts a task request by using a mobile server public key, wherein task request contents comprise a second terminal serial number, a task serial number and the like. Encryption is a common asymmetric encryption mode, because the task request only contains a sequence number, and even if the task request is stolen and cracked, specific contents are not known.
In the actual application process, the first terminal and the mobile server share their own public keys respectively, the mobile server and the second terminal share their own public keys respectively, and the private keys of the first terminal and the mobile server are stored.
And step two, the first terminal initiates a request to the mobile server.
The first terminal and the mobile server are provided with a second terminal serial number list, task time and a task serial number list.
And thirdly, the mobile server receives the first terminal request and decrypts the first terminal request by using the private key of the mobile server, and meanwhile, the validity of the first terminal is verified, if the first terminal is legal, the next step is performed, and if the first terminal is not legal, the first terminal is not responded.
In the practical application process, the validity verification can use digital signature, and the digital signature has two functions: one is to be able to determine that the message was indeed signed and sent out by the first terminal, since someone else cannot impersonate the signature of the first terminal. And secondly, the digital signature can determine the integrity of the message. Because the digital signature is characterized in that it represents a feature of a file, the value of the digital digest will change if the file changes. Different files will get different digital summaries. A digital signature involves a hash function, the public key of the receiver, the private key of the sender.
And step four, comparing the database by the mobile server, and checking whether the requested task scope (namely the task request) is reasonable. If so, requesting data from the central server according to the task sequence number. If not, the mobile server confirms whether the information is wrongly sent to the first terminal, and if so, the first terminal resends the request. If the result is correct, the next step is performed. In the actual application process, whether the request task scope is reasonable refers to whether the task is matched with the given task in the second terminal, for example, the geographical position of the second terminal is A, and the task requirement acts on a far distance B, which is that the request task scope is not matched.
And fifthly, the mobile server requests data from the central server according to the task sequence number. The central server obtains the data and sends the data to the mobile server.
And step six, the mobile server receives and processes the data returned by the central server to obtain a plurality of groups of confusion data. Specifically, after storing the received data, the mobile server truncates and reassembles the real data to finally obtain other data for confusion (for example, the data for confusion may be truncated and reassembled into 9 groups).
And step seven, encrypting the real data and the confusion data in the step six respectively, obtaining a real key and a confusion key, and marking and distinguishing the encrypted data. Specifically, marking is performed at a specific position of the real encrypted data according to a first setting rule of the data marking, and marking is performed at an unspecified position in other confused encrypted data so as to distinguish the data from the real encrypted data.
And step eight, marking and distinguishing the secret key, namely marking the specific position in the real secret key according to a second setting rule of the secret key marking to determine that the secret key is the real secret key. Non-specific locations in other obfuscated keys are marked to determine the key as an obfuscated key.
The first setting rule is for specifying the marker positions of the real data and the marker positions of the confusion data, the marker positions of the real data being specific positions, the marker positions of the confusion data being non-specific positions (taking 1 set of real data and 9 sets of confusion data as an example, the first setting rule specifies 10 marker positions and specifies 1 specific position among the 10 marker positions for distinction). The second setting rule is for specifying a marker position of the real key and a marker position of the confusion key, the marker position of the real key being a specific position, the marker position of the confusion key being an unspecific position. The first set rule and the second set rule are known only to the mobile server and the second terminal and are updated periodically.
And step nine, packaging the encrypted and marked data, encrypting and transmitting to the second terminal. The encrypted data is packaged and sent to the second terminal by using the first fixed password encryption.
In the actual application process, the first fixed password is determined for negotiation, and only the mobile server and the second terminal are aware of each other, so that the negotiation is performed before each task.
And step ten, the second terminal verifies whether the mobile server is legal or not, if so, the next step is that the mobile server is illegal, and if not, the exception processing is carried out, if so, the mobile server is terminated and reported.
Because of the large amount of data, digital signatures are not applicable, where the legitimacy is verified, token in the request header may be used to verify that the source of the data is legitimate.
And step eleven, the second terminal receives the encrypted data to determine the real encrypted data and stores the real encrypted data. Specifically, the second terminal uses the first fixed password to decrypt, and determines and stores the real encrypted data set by software according to a first set rule marked between the mobile server and the second terminal.
And step twelve, the mobile server packages the keys in the step eight to obtain a package key group, encrypts the package key group, the second terminal serial number and the task time by using the second fixed password, and sends the package key group, the second terminal serial number and the task time to the first terminal.
In practical application, the second fixed password is determined for negotiation, and only the mobile server and the first terminal are known, and updated before each task.
And thirteenth, the first terminal decrypts and checks whether the data source is legal. Specifically, the first terminal verifies the validity of the mobile server, and if so, the next step is to be performed; if not, the mobile server does not respond and reports the abnormal situation of the mobile server.
Because of the large amount of data, digital signatures are not applicable, where the legitimacy is verified, token in the request header may be used to verify that the source of the data is legitimate.
And fourteen, the first terminal uses the second fixed password to decrypt, stores the packing key group, the second terminal serial number and the task time, and generates a key list to be sent.
Fifteen, the first terminal uses the third fixed password to encrypt the to-be-sent key group in a packing mode, and sends the encrypted to-be-sent key group to the second terminal with the corresponding sequence number.
In practical application, the third fixed password is determined for negotiation, and only the first terminal and the second terminal are known, and updated before each task.
Step sixteen, the second terminal decrypts and checks whether the first terminal is legal or not, if so, the next step is to be executed; if not, the method does not respond, and performs exception handling, for example, reporting the first terminal exception condition.
Because of the large amount of data, digital signatures are not applicable, where legitimacy verification can be used with the token in the request header to verify the source of the data and that it is legal.
Seventeenth, the second terminal decrypts the third fixed password, determines the real key in the key group by using the software according to the second set rule of the mark between the mobile server and the second terminal, decrypts the real data group in the eleventh step by using the key, and obtains the required data (i.e., the real data).
The key used in the process of decrypting the data by the second terminal has uniqueness, namely the key is used once and then is invalid.
As shown in fig. 4, another data encryption transmission method provided by the present invention includes the following steps.
Step one, the second terminal collects information (task data).
And step two, processing task data (namely original data) by using software to obtain a plurality of groups (for example 9 groups) of confusion data.
And thirdly, encrypting the data, generating a secret key, and marking the encrypted data. Specifically, the real data and the confusion in the second step are respectively encrypted to obtain encrypted real data and encrypted confusion data, the corresponding real key and confusion key, and the encrypted data is marked according to a third set rule.
The third setting rule is for specifying a mark position of the real data and a mark position of the mix-up data, marks of each set of data being different from each other, and determining a specific mark position of the task data. The third set of rules for data is known only to the second terminal and the mobile server, updated before each task.
And step four, packaging the encrypted data after the encryption marking, and encrypting and sending to the mobile server. Specifically, the second terminal packages the encrypted data in the third step, and encrypts and sends the encrypted data to the mobile server by using the fourth fixed password.
In practical application, the fourth fixed password is determined for negotiation, and is only known between the mobile server and the second terminal, and updated before each task.
And fifthly, decrypting and verifying whether the second east segment is legal. Specifically, the mobile server decrypts and verifies the validity of the second terminal, if the second terminal is legal, the next step is illegal, and the second terminal is terminated.
And step six, the mobile server uses the fourth fixed password to decrypt, and determines and stores the true encrypted data according to the third setting rule of the data.
And step seven, the second terminal marks the secret key. Specifically, the second terminal marks the key according to the fourth set rule to distinguish the true key from the mixed key.
The rule four is used for defining the marking position of the real key and the marking position of the confusing key, wherein the marking position of the real key is a specific position, and the marking position of the confusing key is a different nonspecific position. The fourth set-up rule is known only to the second terminal and the mobile server, updated before each task.
And step eight, the second terminal packs the key group, encrypts the packing key group and the second terminal serial number, and sends the first terminal. Specifically, the second terminal packages the key set in the step seven to obtain a packaged key set, encrypts the packaged key set and the second terminal serial number by using a fifth fixed password, and sends the packaged key set and the second terminal serial number to the first terminal.
In practical application, the fifth fixed password is determined for negotiation, and only the first terminal and the second terminal are known, and updated before each task.
And step nine, the first terminal detects whether the second terminal is legal or not, if yes, the next step is performed, and if not, the exception handling is performed.
And step ten, the first terminal packages the key group and the second terminal serial number, encrypts and sends the key group and the second terminal serial number to the mobile server. Specifically, the first terminal uses the fifth fixed password to decrypt, generates a to-be-transmitted key list, wherein the to-be-transmitted key list comprises a packing key group and a second terminal serial number, packs the to-be-transmitted key list, uses the sixth fixed password to encrypt, and sends the to the mobile server.
In practical applications, the sixth fixed password is determined for negotiation, and is only known between the first terminal and the mobile server, and updated before each task.
Step eleven, the mobile server decrypts and verifies whether the first terminal is legal, if so, the next step is to terminate if not.
And step twelve, the mobile server determines the real key, stores the key and the second terminal serial number, and generates a key list. Specifically, the mobile server uses the sixth fixed password to decrypt, determines the real key according to the fourth set rule of the key, and combines the serial number of the second terminal to generate a key list.
Step thirteen, the mobile server decrypts the data and uploads the data to the central server. Specifically, the mobile server decrypts by using the real key, acquires the original information and uploads the original information to the central server.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other.
The principles and embodiments of the present invention have been described herein with reference to specific examples, the description of which is intended only to assist in understanding the methods of the present invention and the core ideas thereof; also, it is within the scope of the present invention to be modified by those of ordinary skill in the art in light of the present teachings. In view of the foregoing, this description should not be construed as limiting the invention.

Claims (9)

1. The data encryption transmission method is characterized by being realized based on a mobile space-based system; the mobile space-based system comprises a first terminal, a second terminal, a mobile server and a central server; the first terminal and the second terminal perform data interaction with the mobile server through a mobile communication technology; the mobile server performs data interaction with the central server; the first terminal is used for generating a scheduling instruction; the second terminal is used for completing data receiving; the data encryption transmission method comprises the following steps:
encrypting the task request by using the public key of the mobile server to obtain an encrypted task request; the encryption of the task request is completed in the first terminal; the content of the task request comprises a second terminal serial number and a task serial number;
decrypting by using a private key of the mobile server, and verifying the validity of the first terminal by adopting a digital signature to obtain a first verification result; the verification process is completed in the mobile server;
when the first verification result is illegal, the first verification result is not responded;
when the first verification result is legal, comparing the decrypted task request with data in the database to obtain a comparison result;
when the comparison result shows that the task scope of the task request belongs to the database, requesting data from a central server according to the task serial number;
when the comparison result is that the task range of the task request does not belong to the database, the mobile server confirms whether information is wrongly sent to the first terminal, and a confirmation result is obtained;
when the confirmation result is the error information, the first terminal resends the task decryption request;
when the confirmation result is that the information is not wrongly sent, the mobile server requests data from the central server according to the task serial number;
storing the data returned by the central server and taking the data as real data;
cutting and reorganizing the real data to obtain confusion data;
encrypting the real data and the confusion data to generate a real key and a confusion key respectively, marking the encrypted real data and confusion data according to a first set rule, and marking the real key and the confusion key according to a second set rule;
the first setting rule and the second setting rule respectively define a marking position, and define a certain position as a specific marking position, and the marking position is used for distinguishing real data, confusing data, a real key and a confusing key;
packaging the marked mixed encrypted data and the marked real encrypted data to obtain packaged data, encrypting the packaged data by using a first fixed password and then sending the encrypted data to a corresponding second terminal;
verifying the validity of the mobile server by adopting a token in the request header to obtain a second verification result;
when the second verification result is illegal, the second verification result is not responded;
when the second verification result is legal, the second terminal decrypts according to the negotiated first fixed password, determines real encrypted data according to a first set rule and stores the real encrypted data;
the mobile server packs the marked confusion encryption key and the real encryption key to obtain a packing key, encrypts a second terminal serial number and task time in packing data corresponding to the packing key and the packing key by using a second fixed password to obtain encrypted data and sends the encrypted data to the first terminal;
verifying the validity of the mobile server by adopting a token in the request header to obtain a third verification result;
when the third verification result is illegal, the third verification result is not responded;
when the third verification result is legal, decrypting according to the second fixed password to generate a to-be-sent key list; the key list to be sent comprises a packing key, a second terminal serial number and task time;
encrypting the packing key in the key list to be sent by using a third fixed password, sending the encrypted packing key to a second terminal corresponding to the serial number of the second terminal in the key list to be sent, and verifying the legitimacy of the first terminal by adopting a token in a request header by the second terminal to obtain a fourth verification result;
when the fourth verification result is legal, decrypting by using a third fixed password, determining a real key according to a second set rule, and decrypting the real encrypted data by using the real key to obtain real data;
and when the fourth verification result is illegal, not responding.
2. The data encryption transmission method according to claim 1, wherein the encryption technology used in the process of encrypting the task request using the mobile server public key to obtain the encrypted task request is an asymmetric encryption technology.
3. The data encryption transmission method according to claim 1, wherein the encryption technique used in encrypting the real data and the obfuscated data is a symmetric encryption technique.
4. The data encryption transmission method according to claim 1, wherein the flag position of the mix-up data is different from the flag position of the task data, and the flag position of each mix-up data is also different.
5. The data encryption transmission method according to claim 1, wherein the first fixed password, the second fixed password and the third fixed password are all determined by negotiation, and one task corresponds to one negotiation result.
6. The data encryption transmission method is characterized by being realized based on a mobile space-based system; the mobile space-based system comprises a first terminal, a second terminal, a mobile server and a central server; the first terminal and the second terminal perform data interaction with the mobile server through a mobile communication technology; the mobile server performs data interaction with the central server; the first terminal is used for generating a scheduling instruction, and the second terminal is used for completing data acquisition; the data encryption transmission method comprises the following steps:
collecting task data and obtaining confusion data based on the task data;
encrypting task data and confusion data, and obtaining a real key and a confusion key;
marking the encrypted task data and the encrypted confusion data according to a third setting rule, and marking the real key and the confusion key according to a fourth setting rule;
the encrypted task data after being packaged and marked and the encrypted confusion data after being marked are encrypted by using a fourth fixed password and are sent to the mobile server;
verifying the legitimacy of the second terminal by adopting a token in the request header to obtain a fifth verification result;
when the fifth verification result is illegal, the method does not respond;
when the fifth verification result is legal, the mobile server uses a fourth fixed password to decrypt, and determines and stores real encryption task data according to a third set rule;
packing the marked real key and the confusion key to obtain a packing key group, encrypting the packing key group and the corresponding second terminal serial number by using a fifth fixed password, and transmitting the packing key group and the corresponding second terminal serial number to the first terminal;
verifying the legitimacy of the second terminal by adopting a token in the request header to obtain a sixth verification result;
when the sixth verification result is illegal, terminating the operation;
when the sixth verification result is legal, decrypting by using a fifth fixed password to generate a to-be-sent key list; the key list to be sent comprises a packing key and a second terminal serial number;
packing a to-be-sent key list and encrypting and sending the to-be-sent key list to the mobile server by using a sixth fixed password;
verifying the validity of the first terminal by adopting a token in the request header to obtain a seventh verification result;
when the seventh verification result is illegal, terminating the operation;
and when the seventh verification result is legal, decrypting by using a sixth fixed password, determining a real key according to a fourth set rule, and decrypting corresponding to the serial number of the second terminal to obtain real task data.
7. The data encryption transmission method according to claim 6, wherein the encryption technique used in encrypting the real data and the obfuscated data is a symmetric encryption technique.
8. The data encryption transmission method according to claim 6, wherein the flag position of the mix-up data is different from the flag position of the task data, and the flag position of each mix-up data is also different.
9. The data encryption transmission method according to claim 6, wherein the fourth fixed password, the fifth fixed password and the sixth fixed password are all determined by negotiation, and a task corresponds to a negotiation result.
CN202311811164.8A 2023-12-27 2023-12-27 Data encryption transmission method Active CN117479151B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311811164.8A CN117479151B (en) 2023-12-27 2023-12-27 Data encryption transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311811164.8A CN117479151B (en) 2023-12-27 2023-12-27 Data encryption transmission method

Publications (2)

Publication Number Publication Date
CN117479151A true CN117479151A (en) 2024-01-30
CN117479151B CN117479151B (en) 2024-03-12

Family

ID=89627811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311811164.8A Active CN117479151B (en) 2023-12-27 2023-12-27 Data encryption transmission method

Country Status (1)

Country Link
CN (1) CN117479151B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010091565A1 (en) * 2009-02-12 2010-08-19 Liu Haiyun Random encryption method in need of using exhaustive method decryption
CN110932851A (en) * 2019-11-29 2020-03-27 四川省数字证书认证管理中心有限公司 PKI-based multi-party cooperative operation key protection method
CN114124572A (en) * 2021-12-07 2022-03-01 建信金融科技有限责任公司 Data transmission method, device, equipment and medium based on unidirectional network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010091565A1 (en) * 2009-02-12 2010-08-19 Liu Haiyun Random encryption method in need of using exhaustive method decryption
CN102013980A (en) * 2009-05-06 2011-04-13 刘海云 Random encryption method for decrypting by adopting exhaustion method
CN110932851A (en) * 2019-11-29 2020-03-27 四川省数字证书认证管理中心有限公司 PKI-based multi-party cooperative operation key protection method
CN114124572A (en) * 2021-12-07 2022-03-01 建信金融科技有限责任公司 Data transmission method, device, equipment and medium based on unidirectional network

Also Published As

Publication number Publication date
CN117479151B (en) 2024-03-12

Similar Documents

Publication Publication Date Title
CN111835752B (en) Lightweight authentication method based on equipment identity and gateway
CN109559122A (en) Block chain data transmission method and block chain data transmission system
US11914754B2 (en) Cryptographic method for verifying data
CN108683647B (en) Data transmission method based on multiple encryption
CN112702318A (en) Communication encryption method, decryption method, client and server
CN111756529B (en) Quantum session key distribution method and system
CN111614621B (en) Internet of things communication method and system
US20200351100A1 (en) Cryptographic method for verifying data
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN104811427A (en) Secure industrial control system communication method
CN115766119A (en) Communication method, communication apparatus, communication system, and storage medium
CN116886288A (en) Quantum session key distribution method and device
WO2022135391A1 (en) Identity authentication method and apparatus, and storage medium, program and program product
KR20010047563A (en) Public key based mutual authentication method in wireless communication system
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN114142995A (en) Key secure distribution method and device for block chain relay communication network
US8782406B2 (en) Secure digital communications
CN112948896A (en) Signature information verification method and information signature method
CN117479151B (en) Data encryption transmission method
CN110995671A (en) Communication method and system
CN112995140B (en) Safety management system and method
CN112437436B (en) Identity authentication method and device
CN112019351B (en) Mobile terminal information interaction method based on SDKey
CN113572755A (en) Intelligent media terminal data secure transmission method
US20050108528A1 (en) Computer network and method for transmitting and authenticating data in the computer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Data Encryption Transmission Method

Granted publication date: 20240312

Pledgee: China CITIC Bank Corporation Limited Beijing Branch

Pledgor: SUNKAISENS(Beijing)TECHNOLOGY Ltd.

Registration number: Y2024110000135