WO2021036952A1 - Procédé de transmission chiffrée de données - Google Patents

Procédé de transmission chiffrée de données Download PDF

Info

Publication number
WO2021036952A1
WO2021036952A1 PCT/CN2020/110620 CN2020110620W WO2021036952A1 WO 2021036952 A1 WO2021036952 A1 WO 2021036952A1 CN 2020110620 W CN2020110620 W CN 2020110620W WO 2021036952 A1 WO2021036952 A1 WO 2021036952A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
key
encryption
receiving end
sending end
Prior art date
Application number
PCT/CN2020/110620
Other languages
English (en)
Chinese (zh)
Inventor
朱小军
肖列
Original Assignee
杭州来布科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州来布科技有限公司 filed Critical 杭州来布科技有限公司
Publication of WO2021036952A1 publication Critical patent/WO2021036952A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Definitions

  • the invention relates to the field of data transmission security, and more specifically, to a data encryption transmission method.
  • the secure transmission of data is an eternal topic in the information age, and the secure transmission of data is related to the privacy of users.
  • the existing data transmission method encrypts the transmitted data, but the encryption key used is only generated by the sender.
  • the encryption key can be cracked by cracking the sender end, and the data can also be intercepted to imitate and deceive, and the security is low. .
  • the technical problem to be solved by the present invention is to provide a data encryption transmission method in view of the above-mentioned defects of the prior art.
  • the technical solution adopted by the present invention to solve its technical problems is: constructing a data encryption transmission method, including:
  • the data sending end generates a first partial data key, and sends the first partial data key to the data receiving end;
  • the data receiving end generates a second partial data key, and sends the second partial data key to the data sending end;
  • the data sending end uses the encryption key to encrypt the data to be transmitted, and sends the generated encrypted data to the data receiving end;
  • the data receiving end uses the decryption key to decrypt the received encrypted data to obtain the data to be transmitted.
  • the step S1 sending the first partial data key to the data receiving end includes:
  • the data receiving end uses a preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the first encryption key to obtain the first partial data key.
  • the step S2 sending the second partial data key to the data sending end includes:
  • the data sending end uses the first partial data key to decrypt the second encryption key to obtain the second partial data key
  • the step S2 sending the second partial data key to the data sending end includes:
  • the data sending end uses a preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the second encryption key to obtain the second partial data key.
  • the preset encryption algorithm is a private key of an asymmetric encryption algorithm
  • the preset decryption algorithm is a public key of the asymmetric encryption algorithm
  • the private key of the asymmetric encryption algorithm is stored in the key storage area of the encryption chip in the data sending end, and the key storage area is an external device Unreadable area.
  • the encryption key in the step S3 is a symmetric algorithm encryption key
  • the decryption key is a symmetric algorithm decryption key
  • the data sending end generating the first partial data key includes: the random number generator of the data sending end generates the first partial data key, and each The key of the first part of the data generated this time is different;
  • the data receiving end generating the second partial data key includes: the random number generator of the data receiving end generates the second partial data key, and the second partial data key generated each time is different .
  • the data to be transmitted in the step S4 is stored in the FLASH memory of the data sending end using a circular queue, and the data between the latest data pointer and the current data pointer is Is the data to be transmitted.
  • the method further includes:
  • the data sending end is a data collection terminal
  • the data receiving end is a server
  • the present invention also provides a data encryption transmission method, which is applied to the data sending end, and includes:
  • the data sending end generates a first partial data key, and sends the first partial data key
  • the data sending end receives the second part of the data key sent by the data receiving end;
  • F3. Generate an encryption key from the first part data key and the second part data key
  • the data sending end uses the encryption key to encrypt the data to be transmitted, and sends the generated encrypted data.
  • the step F1 sending the first part of the data key includes: F11, encrypting the first part of the data key using a preset encryption algorithm, and sending the generated first part of the data key. Encryption key.
  • the step F2 includes:
  • the data sending end receives a second encryption key sent by the data receiving end, where the second encryption key is generated by encrypting the second part of the data key by the first part of the data key;
  • the data sending end uses the first partial data key to decrypt the second encryption key to obtain the second partial data key
  • the step F2 includes:
  • the data sending end receives a second encryption key sent by the data receiving end, where the second encryption key is generated by encrypting the second part of the data key by a preset encryption algorithm;
  • the data sending end uses a preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the second encryption key to obtain the second partial data key.
  • the preset encryption algorithm is a private key of an asymmetric encryption algorithm
  • the private key of the asymmetric encryption algorithm is stored in the encryption chip of the data sending end.
  • a key storage area, and the key storage area is an area that is not readable by an external device.
  • the data sending end generating the first partial data key includes: the random number generator of the data sending end generates the first partial data key, and each The keys of the first part of the data generated this time are different.
  • the data to be transmitted in the step F4 is stored in the FLASH memory of the data sending end using a circular queue, and the data between the latest data pointer and the current data pointer is Is the data to be transmitted.
  • the encryption key in step F3 is a symmetric algorithm encryption key
  • the data sending end is a data collection terminal, and the data receiving end is a server.
  • the present invention also provides a data encryption transmission method, which is applied to the data receiving end, and includes:
  • the data receiving end receives the first part of the data key sent by the data sending end;
  • the data receiving end generates a second partial data key, and sends the second partial data key
  • the data receiving end receives encrypted data sent by the data sending end, where the encrypted data includes data to be transmitted;
  • the data receiving end uses the decryption key to decrypt the received encrypted data to obtain the data to be transmitted.
  • the step J1 includes:
  • the data receiving end receives the first encryption key sent by the data sending end, where the first encryption key is obtained by encrypting the first part of the data key through a preset encryption algorithm;
  • the data receiving end uses a preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the first encryption key to obtain the first partial data key.
  • the sending of the second partial data key in step J2 includes: J21, using the first partial data key to encrypt the second partial data key, Send the generated second encryption key; or
  • J22 Use a preset encryption algorithm to encrypt the second part of the data key, and send the generated second encryption key.
  • the preset encryption algorithm is a private key of an asymmetric encryption algorithm
  • the preset decryption algorithm is a public key of the asymmetric encryption algorithm
  • the data receiving end generating the second partial data key includes: the random number generator of the data receiving end generates the second partial data key, And the second part of the data key generated each time is different.
  • the decryption key is a symmetric algorithm decryption key
  • the data sending end is a data collection terminal, and the data receiving end is a server.
  • a data encryption transmission method implementing the present invention has the following beneficial effects: the encryption key of the present invention is jointly generated by the data sending end and the data receiving end, and only a part of the key is transmitted each time, effectively preventing data interception and data transmission. Crack, improve data transmission security.
  • FIG. 1 is a flowchart of a method for data encryption transmission provided by an embodiment
  • FIG. 2 is a flowchart of a data encryption transmission method provided by an embodiment
  • FIG. 3 is a flowchart of a data encryption transmission method provided by an embodiment
  • FIG. 4 is a flowchart of a data encryption transmission method provided by an embodiment
  • Fig. 5 is a sequence diagram of a data encryption transmission method provided by an embodiment.
  • the data encryption transmission method of this embodiment is applied to data transmission between a data sending end and a data receiving end.
  • a process of transmitting data at a time between the data sending end and the data receiving end is described in this embodiment.
  • the data receiving end can also be used as a data sending end at the same time, and the data sending end can also be used as a data receiving end at the same time, thereby realizing two-way data transmission.
  • the method includes the following steps:
  • the data sending end generates a first part of the data key, and sends the first part of the data key to the data receiving end.
  • the random number generator at the data sending end generates the first part of the data key, and the random number generated each time is different, so that the first part of the data key generated each time is different. Because the key of the first part of the data generated each time is different, it is guaranteed that the key of the first part of the data transmitted to the data receiving end is different each time.
  • this embodiment encrypts the first part of the data key, and sends the encrypted first part of the data key.
  • the specific encryption process is as follows:
  • the data receiving end uses a preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the first encryption key to obtain the first partial data key.
  • the preset encryption algorithm and the preset decryption algorithm correspond to each other, and are stored in the data sending end and the data receiving end in advance.
  • the preset encryption algorithm is the private key of the asymmetric encryption algorithm
  • the corresponding preset decryption algorithm in the decryption process is the public key of the asymmetric encryption algorithm.
  • the private key of the asymmetric encryption algorithm is stored in the key storage area of the encryption chip in the data sending end, and the key storage area is an unreadable area for external devices. Because the private key of the asymmetric encryption algorithm cannot be read, it can only be used internally by the encryption chip, thereby achieving absolute security at the source.
  • the data receiving end generates the second part of the data key, and sends the second part of the data key to the data sending end.
  • the random number generator at the data receiving end generates the second part of the data key, and the second part of the data key generated each time is different. Since the key of the second part of the data generated each time is different, it is guaranteed that the key of the second part of the data transmitted to the data sender is different each time.
  • this embodiment performs encryption processing on the second part of the data key, and sends the encrypted second part of the data key.
  • This embodiment provides two key encryption methods for the second part of the data:
  • the first encryption method of the second part of the data key :
  • the data sending end uses the first partial data key to decrypt the second encryption key to obtain the second partial data key. Since the first part of the data key is generated by the data sender, the data sender has already stored the first part of the data key.
  • the data sending end uses a preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the second encryption key to obtain the second partial data key.
  • the preset encryption algorithm and the preset decryption algorithm correspond to each other, and are stored in the data sending end and the data receiving end in advance.
  • the preset encryption algorithm is the private key of the asymmetric encryption algorithm
  • the preset decryption algorithm is the public key of the asymmetric encryption algorithm.
  • the private key of the asymmetric encryption algorithm is stored in the key storage area of the encryption chip in the data receiving end, and the key storage area is an unreadable area for external devices. Because the private key of the asymmetric encryption algorithm cannot be read, it can only be used internally by the encryption chip, thereby achieving absolute security at the source.
  • the first part of the data key and the second part of the data key are stored on the data sending end and the data receiving end, and the data sending end is encrypted by the first part of the data key and the second part of the data key.
  • the encryption key and the decryption key are generated by the data receiving end from the first part of the data key and the second part of the data key.
  • only one one-way data transmission is described.
  • the data sending end only needs to generate an encryption key from the first part of the data key and the second part of the data key, and the data receiving end is composed of the first part of the data key and the second part of the data.
  • the key only needs to generate the decryption key.
  • the encryption key is a symmetric algorithm encryption key
  • the decryption key is a symmetric algorithm decryption key
  • the symmetric algorithm encryption key is the RC4 encryption key
  • the symmetric algorithm decryption key is the RC4 decryption key.
  • the data sending end uses the encryption key to encrypt the data to be transmitted, and sends the generated encrypted data to the data receiving end.
  • the data to be transmitted in the data sender is stored in the FLASH memory of the data sender using a circular queue, and the data between the latest data pointer and the current data pointer is the data to be transmitted.
  • After reading the data to be transmitted use the encryption key generated from the first part of the data key and the second part of the data key to encrypt the data to be transmitted, generate encrypted data after encryption, and send the generated encrypted data to the data receiving end.
  • the data receiving end uses the decryption key to decrypt the received encrypted data to obtain the data to be transmitted.
  • the data receiving end generates an encryption key and a decryption key from the first part of the data key and the second part of the data key, because the encrypted data is generated by the first part of the data key and the second part of the data key to generate the encryption key to encrypt the data to be transmitted ,
  • the corresponding data receiving end uses the decryption key generated by the first part data key and the second part data key to decrypt the encrypted data to obtain the data to be transmitted, so as to realize the safe transmission of the data.
  • the network between the data sending end and the data receiving end is a wired communication network or a wireless communication network, which is not limited in this embodiment, and any network capable of data transmission can use the data encryption transmission method of this embodiment to transmit The data all belong to the protection scope of this embodiment.
  • the data sending end is a data collection terminal
  • the data receiving end is a server.
  • the encryption key in this embodiment is jointly generated by the data sending end and the data receiving end, and only a part of the key is transmitted each time, which effectively prevents data interception and data cracking, and improves data transmission security.
  • the data encryption transmission method of this embodiment further includes after step S5:
  • S6 Determine whether the session connection duration between the data sending end and the data receiving end reaches a preset duration. The timing starts when the data sending end and the data receiving end establish a session connection, and the preset duration can be set as needed.
  • the session connection between the data sending end and the data receiving end is re-established.
  • the random number generator at the data sending end regenerates the first part data key, and the regenerated first part data key is different from all the first part data keys previously generated.
  • the random number generator at the data receiving end regenerates the second partial data key, and the regenerated second partial data key is different from all the second partial data keys previously generated.
  • the encryption key and the decryption key are generated from the first part of the data key and the second part of the data key again to realize the dynamization of the encryption key and the decryption key.
  • connection between the data sending end and the data receiving end is re-established after the preset session time interval, and the first part of the encryption key and the second part of the encryption key are regenerated at the same time, so that the encryption key and the decryption key are dynamic and improve security. Sex.
  • a data encryption transmission method of this embodiment is applied to a data sending end, and the method includes the following steps:
  • the data sending end generates the first part of the data key, and sends the first part of the data key.
  • the random number generator at the data sending end generates the first part of the data key, and the first part of the data key generated each time is different. Because the key of the first part of the data generated each time is different, it is guaranteed that the key of the first part of the data transmitted to the data receiving end is different each time.
  • this embodiment encrypts the first part of the data key.
  • the specific encryption process is: F11. Use a preset encryption algorithm to encrypt the first part of the data key, and send the generated first encryption Key; the preset encryption algorithm is stored in the data sending end in advance.
  • the data sending end receives the second part of the data key sent by the data receiving end.
  • this embodiment performs encryption processing on the second part data key, and this embodiment provides two encryption methods for the second part data key:
  • the first encryption method of the second part of the data key :
  • the data sending end receives the second encryption key sent by the data receiving end, and the second encryption key is generated by encrypting the second part of the data key by the first part of the data key, and the first part of the data key is sent by the data sending end to At the data receiving end.
  • the data sender uses the first part of the data key to decrypt the second encryption key to obtain the second part of the data key. Since the first part of the data key is generated by the data sender, the data sender has already stored the first part of the data key.
  • the data sending end receives the second encryption key sent by the data receiving end, and the second encryption key is generated by encrypting the second part of the data key with a preset encryption algorithm.
  • the data sending end uses the preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the second encryption key to obtain the second part of the data key.
  • the preset encryption algorithm is the private key of the asymmetric encryption algorithm
  • the private key of the asymmetric encryption algorithm is stored in the key storage area of the encryption chip in the data receiving end, and the key storage area is an unreadable area for external devices . Because the private key of the asymmetric encryption algorithm cannot be read, it can only be used internally by the encryption chip, thereby achieving absolute security at the source.
  • F3. Generate an encryption key from the first part of the data key and the second part of the data key.
  • the first part of the data key and the second part of the data key are stored on the data sending end, and the data sending end generates the encryption key and the decryption key from the first part of the data key and the second part of the data key.
  • the encryption key is a symmetric algorithm encryption key.
  • the symmetric algorithm encryption key is an RC4 encryption key.
  • the data sender uses the encryption key to encrypt the data to be transmitted, and sends the generated encrypted data.
  • the data to be transmitted in the data sender is stored in the FLASH memory of the data sender using a circular queue, and the data between the latest data pointer and the current data pointer is the data to be transmitted.
  • After reading the data to be transmitted use the encryption key generated from the first part of the data key and the second part of the data key to encrypt the data to be transmitted, generate encrypted data after encryption, and send the generated encrypted data to realize safe data transmission.
  • the network between the data sending end and the data receiving end is a wired communication network or a wireless communication network, which is not limited in this embodiment, and any network capable of data transmission can use the data encryption transmission method of this embodiment to transmit The data all belong to the protection scope of this embodiment.
  • the data sending end is a data collection terminal
  • the data receiving end is a server.
  • the encryption key in this embodiment is jointly generated by the data sending end and the data receiving end, and only a part of the key is transmitted each time, which effectively prevents data interception and data cracking, and improves data transmission security.
  • a data encryption transmission method of this embodiment is applied to a data receiving end, and the method includes the following steps:
  • the data receiving end receives the first part of the data key sent by the data sending end.
  • the first part of the data key is generated by the random number generator of the data sending end, and the first part of the data key generated each time is different, that is, the first part of the data key received by the data receiving end is different each time.
  • the data sender encrypts the first part of the data key, that is, the data sender encrypts the first part of the data key using a preset encryption algorithm, and sends the generated first encryption key To the data receiving end.
  • the data receiving end receives the first encryption key sent by the data sending end, and the first encryption key is obtained by encrypting the first part of the data key through a preset encryption algorithm.
  • the data receiving end uses the preset decryption algorithm corresponding to the preset encryption algorithm to decrypt the first encryption key to obtain the first part of the data key.
  • the preset encryption algorithm is the private key of the asymmetric encryption algorithm
  • the preset decryption algorithm is the public key of the asymmetric encryption algorithm.
  • the preset encryption algorithm and the preset decryption algorithm correspond to each other, and the preset encryption algorithm is stored in the data sending end in advance, and the preset decryption algorithm is stored in the data receiving end in advance.
  • the preset encryption algorithm is the private key of the asymmetric encryption algorithm
  • the preset decryption algorithm is the public key of the asymmetric encryption algorithm.
  • the data receiving end generates the second part of the data key and sends the second part of the data key.
  • the random number generator at the data receiving end generates the second part of the data key, and the second part of the data key generated each time is different. Since the key of the second part of the data generated each time is different, it is guaranteed that the key of the second part of the data transmitted to the data sender is different each time.
  • this embodiment performs encryption processing on the second part of the data key, and this embodiment provides two encryption methods for the second part of the data key:
  • the first encryption method of the second part of the data key J21, use the first part of the data key to encrypt the second part of the data key, and send the generated second encryption key; the first part of the data key is sent by the data sender to At the data receiving end.
  • the second encryption method of the second part of the data key J22.
  • the preset encryption algorithm is the private key of the asymmetric encryption algorithm
  • the private key of the asymmetric encryption algorithm is stored in the key storage area of the encryption chip in the data receiving end, and the key storage area is an unreadable area for external devices . Because the private key of the asymmetric encryption algorithm cannot be read, it can only be used internally by the encryption chip, thereby achieving absolute security at the source.
  • the decryption key is a symmetric algorithm decryption key
  • the symmetric algorithm decryption key is an RC4 decryption key
  • the data receiving end receives the encrypted data sent by the data sending end, and the encrypted data includes the data to be transmitted.
  • the data sending end uses the encryption key generated from the first part data key and the second part data key to encrypt the data to be transmitted, generates encrypted data after encryption, and sends the generated encrypted data to the data receiving end.
  • the data receiving end uses the decryption key to decrypt the received encrypted data to obtain the data to be transmitted.
  • the data receiving end generates a decryption key from the first part of the data key and the second part of the data key, because the encrypted data is obtained by encrypting the data to be transmitted by the encryption key of the first part of the data key and the second part of the data key, and the corresponding data
  • the receiving end uses the decryption key generated by the first part data key and the second part data key to decrypt the encrypted data to obtain the data to be transmitted, so as to realize the safe transmission of the data.
  • the network between the data sending end and the data receiving end is a wired communication network or a wireless communication network, which is not limited in this embodiment, and any network capable of data transmission can use the data encryption transmission method of this embodiment to transmit The data all belong to the protection scope of this embodiment.
  • the data sending end is a data collection terminal
  • the data receiving end is a server.
  • the encryption key in this embodiment is jointly generated by the data sending end and the data receiving end, and only a part of the key is transmitted each time, which effectively prevents data interception and data cracking, and improves data transmission security.
  • the data sending end is a data terminal
  • the data terminal includes a sensor and an encryption chip
  • the data receiving end is a server
  • a 5G network connection is used between the data terminal and the server.
  • the first part of the data key is denoted as M1
  • the second part of the data key is denoted as M2
  • the first part of the data key and the second part of the data key are combined into an encryption key and a decryption key M3
  • the first part of the data key and the second part are combined into an encryption key and a decryption key M3.
  • Part of the data key is RC4 key.
  • the data encryption transmission method includes the following steps:
  • Step 1 Data collection: The sensor collects the signal and obtains the data through the analog-to-digital conversion circuit.
  • Step 2 Data storage: Store the data in FLASH memory.
  • Step 3 Setting: Set the current data pointer to the latest value.
  • Step 4 Generate the RC4 key: Generate the RC4 key through the true random number generator of the encryption chip, and the key length can be specified.
  • Step 5 Encrypt the terminal ID: use the RC4 key to encrypt the terminal ID.
  • Step 6 Encrypt the RC4 key: encrypt the RC4 key with the RSA private key through the encryption chip.
  • Step 7 Establish a connection: establish a TCP connection with the server through the 5G module.
  • Step 8 Transmit ID and RC4 key: Transmit the encrypted terminal ID and RC4 key to the server.
  • Step 9 Decrypt the ID and RC4 key: The server decrypts the ID and RC4 key.
  • Step 10 Identity authentication: The server decrypts the RC4 key, decrypts the ID with the RC4 key, and authenticates the identity through ID comparison.
  • Step 11 Generate M2 randomly: The server generates the second half of the RC4 key M2.
  • Step 12. Encrypt M2 Use M1 as the key to encrypt M2.
  • Step 13 Return result: return the encrypted M2 and data serial number.
  • Step 14 Decrypt M2: The sensor uses M1 to decrypt M2.
  • Step 16 Setting: reset the current data serial number to the current data pointer register.
  • Step 18 Read data: read data.
  • Step 19 RC4 encrypts data: Use RC4 to encrypt data with M3 as the key.
  • Step 20 Transmit encrypted data: transmit encrypted data.
  • Step 21 Setting: Set the current data serial number to get the current data pointer register.
  • Step 22 Decrypt the data: The server uses RC4 to decrypt the current data with M3 as the key.
  • the steps of the method or algorithm described in combination with the embodiments disclosed in this document can be directly implemented by hardware, a software module executed by a processor, or a combination of the two.
  • the software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all areas in the technical field. Any other known storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un procédé de transmission chiffrée de données. Le procédé comprend les étapes suivantes : S1, une extrémité d'envoi de données génère une première partie d'une clé de données, et envoie la première partie de la clé de données à une extrémité de réception de données ; S2, l'extrémité de réception de données génère une seconde partie de la clé de données, et envoie la seconde partie de la clé de données à l'extrémité d'envoi de données ; S3, la première partie de la clé de données et la seconde partie de la clé de données génèrent une clé de chiffrement et une clé de déchiffrement ; S4, l'extrémité d'envoi de données utilise la clé de chiffrement pour chiffrer des données à transmettre, et envoie des données chiffrées générées à l'extrémité de réception de données ; et S5, l'extrémité de réception de données utilise la clé de déchiffrement pour déchiffrer les données chiffrées reçues, de façon à obtenir les données à transmettre. Dans la présente invention, la clé de chiffrement est générée conjointement par l'extrémité d'envoi de données et l'extrémité de réception de données, et seule une partie de la clé est transmise chaque fois, ce qui permet d'empêcher efficacement l'interception des données et le piratage des données, et d'améliorer la sécurité de transmission des données.
PCT/CN2020/110620 2019-08-23 2020-08-21 Procédé de transmission chiffrée de données WO2021036952A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910785868.XA CN110572261A (zh) 2019-08-23 2019-08-23 一种数据加密传输方法
CN201910785868.X 2019-08-23

Publications (1)

Publication Number Publication Date
WO2021036952A1 true WO2021036952A1 (fr) 2021-03-04

Family

ID=68776062

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/110620 WO2021036952A1 (fr) 2019-08-23 2020-08-21 Procédé de transmission chiffrée de données

Country Status (2)

Country Link
CN (1) CN110572261A (fr)
WO (1) WO2021036952A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572261A (zh) * 2019-08-23 2019-12-13 杭州来布科技有限公司 一种数据加密传输方法
CN113761542A (zh) * 2020-05-18 2021-12-07 致伸科技股份有限公司 无线输入装置及其信息传输方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281261A (zh) * 2010-06-10 2011-12-14 杭州华三通信技术有限公司 一种数据传输方法、系统和装置
WO2014117275A1 (fr) * 2013-01-31 2014-08-07 Ellison Information Manufacturing Inc. Procédé et système de protection de données à l'aide de passeports de données
CN107040536A (zh) * 2017-04-10 2017-08-11 北京德威特继保自动化科技股份有限公司 数据加密方法、装置和系统
CN110572261A (zh) * 2019-08-23 2019-12-13 杭州来布科技有限公司 一种数据加密传输方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281261A (zh) * 2010-06-10 2011-12-14 杭州华三通信技术有限公司 一种数据传输方法、系统和装置
WO2014117275A1 (fr) * 2013-01-31 2014-08-07 Ellison Information Manufacturing Inc. Procédé et système de protection de données à l'aide de passeports de données
CN107040536A (zh) * 2017-04-10 2017-08-11 北京德威特继保自动化科技股份有限公司 数据加密方法、装置和系统
CN110572261A (zh) * 2019-08-23 2019-12-13 杭州来布科技有限公司 一种数据加密传输方法

Also Published As

Publication number Publication date
CN110572261A (zh) 2019-12-13

Similar Documents

Publication Publication Date Title
US11552792B2 (en) Systems and methods for generating signatures
WO2017097041A1 (fr) Procédé et dispositif de transmission de données
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
CN104796265B (zh) 一种基于蓝牙通信接入的物联网身份认证方法
JP6168415B2 (ja) 端末認証システム、サーバ装置、及び端末認証方法
TWI357250B (en) Method and apparatus for transmitting data using a
US7231526B2 (en) System and method for validating a network session
ES2250771T3 (es) Procdedidmientos para cambiar una contraseña de comunicaciones a distancia.
US20030210791A1 (en) Key management
CN104270242B (zh) 一种用于网络数据加密传输的加解密装置
JP6548172B2 (ja) 端末認証システム、サーバ装置、及び端末認証方法
CA2551113A1 (fr) Systeme d'authentification pour applications informatiques en reseau
WO2012024872A1 (fr) Procédé, système et appareil associé pour un chiffrement de communication dans l'internet mobile
CN108881960B (zh) 基于标识密码的智能摄像头安全控制与数据保密的方法
WO2018137225A1 (fr) Procédé de traitement données d'empreinte digitale et appareil de traitement
WO2015024426A1 (fr) Système, appareil et procédé d'authentification d'identité, et appareil de demande d'authentification d'identité
WO2019127265A1 (fr) Procédé d'écriture de données basé sur un contrat intelligent de chaîne de blocs, et dispositif et support de stockage
CN110336673B (zh) 一种基于隐私保护的区块链设计方法
US6640303B1 (en) System and method for encryption using transparent keys
CN113612797A (zh) 一种基于国密算法的Kerberos身份认证协议改进方法
CN103905384A (zh) 基于安全数字证书的嵌入式终端间会话握手的实现方法
KR100668446B1 (ko) 안전한 인증정보 이동방법
WO2021036952A1 (fr) Procédé de transmission chiffrée de données
TW201633206A (zh) 透過驗證符記的改善安全性
WO2023098389A1 (fr) Procédé de chiffrement de sécurité de fichier informatique, procédé de déchiffrement de sécurité de fichier informatique et support de stockage lisible

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20858963

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20858963

Country of ref document: EP

Kind code of ref document: A1