WO2022199404A1 - Communication encryption - Google Patents

Communication encryption Download PDF

Info

Publication number
WO2022199404A1
WO2022199404A1 PCT/CN2022/080432 CN2022080432W WO2022199404A1 WO 2022199404 A1 WO2022199404 A1 WO 2022199404A1 CN 2022080432 W CN2022080432 W CN 2022080432W WO 2022199404 A1 WO2022199404 A1 WO 2022199404A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
ciphertext
mixed data
unmanned
data
Prior art date
Application number
PCT/CN2022/080432
Other languages
French (fr)
Chinese (zh)
Inventor
方超
Original Assignee
北京三快在线科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京三快在线科技有限公司 filed Critical 北京三快在线科技有限公司
Publication of WO2022199404A1 publication Critical patent/WO2022199404A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the present application relates to the technical field of information encryption.
  • Embodiments of the present disclosure provide a communication encryption system, method, and apparatus.
  • the present disclosure provides a communication encryption system, the system includes an unmanned device and a control station, and the control station pre-stores the equipment of the unmanned device identification, wherein: the unmanned device is configured to generate a key through a symmetric encryption algorithm and send the key to the control station; the control station is configured to The device identifier of the device and the target data to be sent are XOR-encrypted to determine the first mixed data; the control station is configured to encrypt the first mixed data according to the key to obtain the first ciphertext, and send the first ciphertext to the unmanned device; the unmanned device is configured to decrypt the received first ciphertext according to the key, and determine the first ciphertext. Mix data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data.
  • the present disclosure also provides a communication encryption method, including: performing XOR encryption according to a pre-stored device identifier of an unmanned device and target data to be sent to determine the first mixed data;
  • the first mixed data is encrypted to obtain a first ciphertext, and the first ciphertext is sent to the unmanned device, so that the unmanned device can, according to the key, Decrypt the first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data; wherein, the key is the unmanned
  • the driving device is generated and sent through a symmetric encryption algorithm.
  • the present disclosure provides a communication encryption device, comprising: a mixing module that performs XOR encryption according to a pre-stored device identifier of an unmanned device and target data to be sent to determine the first mixed data; an encryption and decryption module , encrypting the first mixed data according to the key to obtain the first ciphertext, and sending the first ciphertext to the unmanned device, so that the unmanned device, according to the key, Decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein the key is The unmanned vehicle is generated and sent through a symmetric encryption algorithm.
  • the present disclosure provides a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, the foregoing communication encryption method is implemented.
  • the unmanned device in the system can generate a key through a symmetric encryption algorithm and send it to the control station, and the control station in the system can generate a key by using a symmetric encryption algorithm.
  • the target data to be sent can be encrypted according to the pre-stored device identification of the unmanned device, the first mixed data can be determined, and the first mixed data can be re-encrypted according to the received key to obtain the first ciphertext. Sent to the unmanned device.
  • the unmanned device After receiving the first ciphertext, the unmanned device can decrypt the first ciphertext by using the key generated by the symmetric encryption algorithm to obtain the first mixed data, and then according to its own device identification, decrypt the obtained first ciphertext. A mixed data is decrypted again to obtain the target data. Both parties in the system perform XOR encryption and decryption on the transmitted target data through the device identification of the unmanned device, which further enhances the security of information transmission.
  • FIG. 1 is a schematic diagram of a communication encryption system according to an embodiment of the present disclosure
  • FIG. 2 is an interactive schematic diagram of a ground terminal transmitting information to an unmanned aerial vehicle according to an embodiment of the present disclosure
  • FIG. 3 is an interactive schematic diagram of a UAV transmitting information to a ground terminal according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of transmitting a key based on an asymmetric encryption algorithm according to an embodiment of the present disclosure
  • FIG. 5 is a schematic flowchart of a communication encryption method according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a communication encryption apparatus according to an embodiment of the present disclosure.
  • the unmanned equipment needs to communicate with the control station in real time to transmit control instructions or collected images and other information.
  • the information transmitted between the two parties can be encrypted.
  • Common encryption algorithms include symmetric encryption algorithms and asymmetric encryption algorithms.
  • the symmetric encryption algorithm means that both the sender and the receiver use the same key for encryption and decryption
  • the asymmetric encryption algorithm means that the sender and the receiver use different keys for encryption and decryption
  • the sender uses the public key to encrypt and decrypt the transmitted data.
  • the information is encrypted, and the recipient decrypts the encrypted ciphertext through the private key.
  • the unmanned device and the control station need to exchange the key first, and then transmit the encrypted ciphertext to decrypt the encrypted ciphertext through the key.
  • the key transmitted by both parties is hijacked, the subsequent encryption is invalid, so the security of the symmetric encryption algorithm is low.
  • the unmanned device When an asymmetric encryption algorithm is used to encrypt the information transmitted between the two parties, if the unmanned device sends information to the control station, the control station needs to generate the first public key and the first private key through the asymmetric encryption algorithm, and Send the generated first public key to the unmanned device, then the unmanned device can encrypt the information to be transmitted with the first public key, and send the encrypted ciphertext to the control station, so that the control station can pass the first private key. key to decrypt the encrypted ciphertext.
  • the unmanned device When the control station sends information to the unmanned device, the unmanned device can generate a second public key and a second private key through an asymmetric encryption algorithm, and send the generated second public key to the control station, then the control station can The information to be transmitted is encrypted with the second public key, and the encrypted ciphertext is sent to the unmanned device, so that the unmanned device can decrypt the encrypted ciphertext through the second private key.
  • the information receiver needs to generate a new public key and private key through an asymmetric encryption algorithm, and send the newly generated public key to the information sender. Therefore, the preparation time for both parties in the information transmission process is long, that is, the time required to generate and exchange keys is long, resulting in long information transmission time and low transmission efficiency.
  • the present disclosure provides a communication encryption system, which can reduce the information transmission delay caused by key exchange while enhancing the security of information transmission.
  • the system includes an unmanned device 100 and a control station 102, wherein the unmanned device 100 may be an unmanned aerial vehicle, an unmanned vehicle, an unmanned boat, and a control station 102.
  • the control station 102 refers to a control center that controls the unmanned device 100 to perform tasks.
  • the unmanned device 100 as an unmanned aerial vehicle and the control station 102 corresponding to the unmanned aerial vehicle as a ground terminal as an example.
  • the drone and the ground terminal transmit information through wireless transmission technology
  • the drone can transmit the key required for information encryption and decryption to the ground terminal
  • the ground terminal can encrypt based on the key to obtain the first key. ciphertext, and send the first ciphertext to the drone.
  • the ground terminal can also transmit flight control instructions to the UAV, and the UAV can transmit the collected images and other information to the ground terminal.
  • the ground terminal usually refers to the server on the ground that controls the flight of the UAV, which may be a single server or a system composed of multiple servers, such as a distributed server system, which is not limited in this disclosure. Can be set as required.
  • the present disclosure provides a low-latency communication encryption system, which can further shorten the information transmission time on the premise of ensuring security.
  • FIG. 2 is a schematic diagram of the interaction between the ground end transmitting information to the UAV.
  • the drone generates a key through a symmetric encryption algorithm and sends it to the ground terminal as an example for description.
  • the corresponding information encryption systems and methods are similar, and only subject exchange is implemented. Therefore, although the present disclosure
  • the information encryption system and method based on one information transmission direction are described, but the information encryption system and method based on another information transmission direction also belong to the protection scope of this application.
  • the ground terminal can, according to the pre-stored device identification of the drone, identify the key to be sent.
  • the target data is XOR-encrypted to generate first mixed data. Since the device identification of the drone is pre-agreed between the ground and the drone and is not carried in the information for transmission, even if a third party hijacks the key, the encrypted ciphertext cannot be decrypted according to the key.
  • the target data to be transmitted is usually larger than the data of the device identification of the drone, and the data length is longer, so when performing XOR encryption, the device identification of the drone can be used to perform a zero-fill operation, Or repeat the device identification of the drone several times to ensure that the data for XOR processing is the same as the data bits of the target data to be transmitted, which is convenient for XOR processing.
  • the target data to be transmitted is 0110
  • the device ID of the drone is 01
  • a 0-fill operation can be performed to make it match the bit of the target data.
  • the numbers are the same, and the target data is XORed by adding 0 to the data 0100.
  • the device identification of the drone can also be repeated several times to make it the same as the number of data bits of the target data, and the target data can be XORed through the repeated data 0101.
  • the ground terminal can encrypt the first mixed data to obtain the first ciphertext according to the received key, and send the first ciphertext to the drone.
  • the drone can decrypt the received first ciphertext according to the key generated by itself and the symmetric encryption algorithm used to determine the first mixed data.
  • the UAV can decrypt the received first ciphertext according to the key generated by itself to determine the first mixed data.
  • the UAV can perform XOR decryption on the first mixed data according to its own device identification, and determine the target data transmitted by the ground terminal, so as to perform corresponding operations according to the target data. For example, when the target data is a flight control command, the UAV can adjust flight parameters according to the flight control command.
  • the data volume of the first mixed data is often larger than the data volume of the device identifier of the drone, when using the device identifier to XOR decrypt the first mixed data, it is necessary to adopt the same method as the above for the device identifier.
  • the same operation as XOR encryption If the device ID is filled with 0 and then XOR encryption is performed, the device ID needs to be filled with 0 and then XOR decrypted. Similarly, if the device ID is repeated and then XOR encryption is performed, it is also necessary to The device identification is repeated and then XOR decrypted.
  • the information transmission process shown in Figure 2 above is the process of transmitting information from the ground terminal to the UAV.
  • the interactive schematic diagram of the information transmission from the UAV to the ground terminal is shown in Figure 3.
  • the drone can also perform XOR encryption according to its own device identification and the reply data to be sent to determine the second mixed data. After that, encrypt the second mixed data again according to the self-generated key to obtain a third ciphertext, and send the third ciphertext to the ground terminal.
  • the ground terminal When the ground terminal receives the third ciphertext sent by the UAV, it can decrypt the third ciphertext according to the previously received key to obtain the second mixed data. Device identification, XOR decryption of the second mixed data, and get the reply data actually transmitted by the drone.
  • the drone generates a key through a symmetric encryption algorithm and sends the generated key to the ground terminal as an example for description.
  • both the UAV and the ground side that use the symmetric encryption algorithm for encrypted transmission use the same encryption key, and only need to exchange the key before the encrypted transmission. Therefore, the key can also be generated by the ground terminal through a symmetric encryption algorithm, and the generated key can be sent to the UAV, which is not limited in the present disclosure, and can be set as required.
  • the key in order to ensure the security of key transmission, may be encrypted and transmitted through an asymmetric encryption algorithm.
  • the ground terminal in order to encrypt and transmit the key, before the UAV sends the key to the ground terminal, the ground The terminal generates a public key and a private key through an asymmetric encryption algorithm, and sends the public key to the drone.
  • the UAV After the UAV generates a key through a symmetric encryption algorithm, it can encrypt the key according to the received public key, generate a second ciphertext, and send the second ciphertext to the ground terminal to ensure the transmission of the key security.
  • the ground terminal can decrypt the received second ciphertext according to the private key generated by itself and the used asymmetric encryption algorithm to obtain the transmitted key.
  • the ground terminal can decrypt the received second ciphertext according to the private key generated by itself to obtain the transmitted key.
  • the drone can pass the asymmetric encryption before the ground terminal sends the key to the drone.
  • the algorithm generates a public key and a private key, and sends the public key to the ground terminal. So that the ground terminal encrypts the key to be transmitted according to the received public key, obtains the second ciphertext, and sends the second ciphertext to the drone. After that, the drone can decrypt the second ciphertext according to the private key generated by the asymmetric encryption algorithm to obtain the key.
  • the above-mentioned symmetric encryption algorithm may specifically use a stream cipher, then when the ground terminal uses the key to encrypt the first mixed data, the ground terminal can first encrypt the
  • the initial key input pseudo-random number generator (pseudo-random number generator, PRNG), generates a pseudo-random key stream (pseudo-random keystream), and uses the pseudo-random key stream to XOR the first mixed data Encrypt, determine the first ciphertext.
  • PRNG pseudo-random number generator
  • the drone When the drone decrypts the received first ciphertext, it also needs to input the initial key into the pseudo-random number generator to generate a pseudo-random key stream, and through the pseudo-random key stream, the first encrypted XOR decryption is performed on the text to obtain the first mixed data.
  • the drone when the drone uses the key to encrypt the second mixed data, the drone may also first input the initial key into a pseudo-random number generator, generate a pseudo-random key stream, and use The pseudo-random key stream performs XOR encryption on the second mixed data to determine the third ciphertext.
  • the initial key also needs to be input into the pseudo-random number generator to generate a pseudo-random key stream, and through the pseudo-random key stream, the third ciphertext is differentiated. or decryption to obtain the second mixed data.
  • the UAV and the ground end need to re-determine the key before each communication, and the two parties exchange keys. That is to say, every time the drone and the ground end communicate, they need to regenerate the key through the above steps and exchange the key, and then use the key for encrypted transmission.
  • each communication process between the UAV and the ground end can last for a period of time, and during the communication process, the two parties can transmit information to each other multiple times. Moreover, since the same key is used in each communication process, only one key needs to be generated and one key transmission is performed in each communication process.
  • both the UAV and the ground terminal may use an asymmetric encryption algorithm to encrypt and transmit the key when transmitting the key. Since the UAV and the ground end only need to transmit the key once in each communication process, the UAV and the ground end only need to use an asymmetric encryption algorithm once in each communication process to encrypt the transmitted key. . Among them, in each communication process between the UAV and the ground terminal, after the two parties exchange keys, each subsequent information transmission between the two parties can directly use the exchanged key to encrypt and decrypt the transmitted information.
  • the ground terminal can control the flight of multiple drones at the same time, the ground terminal can communicate with several drones at the same time. Therefore, when the two parties transmit information, the transmitted information should also be It includes the unique identifier of the UAV that is communicating, so that the ground terminal can determine the device identifier of the UAV from the device identifiers of the UAVs stored in advance according to the unique identifier of the UAV, and use the unique identifier of the UAV. The device identification of the drone, and decrypt the information transmitted by the drone.
  • the UAV in the system can generate a key through a symmetric encryption algorithm and send it to the ground terminal.
  • the target data to be sent is encrypted, the first mixed data is determined, and the first mixed data is encrypted again according to the received key to obtain the first ciphertext and send it to the drone.
  • the drone After the drone receives the first ciphertext, it can decrypt the first ciphertext through the key generated by the symmetric encryption algorithm to obtain the first mixed data, and then according to its own device identification, decrypt the obtained first ciphertext.
  • the mixed data is decrypted again to obtain the target data.
  • both the UAV and the ground terminal perform XOR encryption and decryption on the transmitted target data through the device identification of the UAV, which further enhances the security of information transmission.
  • the key transmission can also be encrypted by an asymmetric encryption algorithm to ensure the security of the key transmission.
  • the UAV and the ground end only need to pass the asymmetric encryption algorithm in each communication process.
  • the key is transmitted once, so under the premise of ensuring the security of information transmission, the delay of information transmission is small.
  • the communication encryption system shown in this disclosure can also be used for information transmission between unmanned vehicles 100 such as unmanned vehicles and unmanned ships and their corresponding control stations 102, which will not be described in detail in this disclosure.
  • the present disclosure also provides a communication encryption method used in the communication encryption system, as shown in FIG. 5 .
  • FIG. 5 is a schematic flowchart of a communication encryption method provided by an embodiment of the present disclosure, wherein the communication encryption method may be used in a communication encryption system, and may specifically include the following steps:
  • S200 Perform XOR encryption according to the pre-stored device identifier of the unmanned device and the target data to be sent to determine the first mixed data.
  • the communication encryption system in the present disclosure includes an unmanned device and a control station, wherein the unmanned device may be one of devices such as an unmanned aerial vehicle, an unmanned vehicle, an unmanned ship, and a robot.
  • the control center where the manned device performs the mission.
  • the unmanned equipment is an unmanned aerial vehicle
  • the control station of the unmanned aerial vehicle is the ground terminal as an example.
  • the ground terminal usually refers to a server on the ground that controls the flight of the drone.
  • the server can send flight control instructions to the drone, receive information such as images collected by the drone, and transmit information with the drone.
  • the server may be a single server, or a system composed of multiple servers, such as a distributed server system, etc., which is not limited in the present disclosure, and can be specifically set as required.
  • the communication encryption method provided by the present disclosure can be specifically executed by either the drone or the ground terminal in the communication encryption system.
  • the present disclosure takes the ground terminal as the execution subject as an example for description.
  • the ground terminal when the ground terminal transmits information to the drone, the ground terminal may perform XOR encryption on the target data to be sent according to the pre-stored device identifier of the drone to obtain the first mixed data.
  • the data length of the device identification of the UAV when the data length of the device identification of the UAV is less than the data length of the target data, it can be processed by a 0-fill operation or a repeated operation, which has been described in detail on the above-mentioned system side, and will not be repeated here.
  • S202 Encrypt the first mixed data according to the key to obtain a first ciphertext, and send the first ciphertext to the unmanned device, so that the unmanned device, according to the key, The received first ciphertext is decrypted to determine the first mixed data, and the first mixed data is XOR decrypted according to its own device identification to determine the target data.
  • a key generated by a symmetric encryption algorithm can be used for the first mixed data. data encryption.
  • the ground terminal can encrypt the first mixed data obtained in step S200 again according to the key to obtain the first ciphertext, and send the first ciphertext to the drone.
  • the key may be generated by the ground terminal through a symmetric encryption algorithm, or may be generated by the drone through a symmetric encryption algorithm and sent to the ground terminal, which is not limited in this disclosure, and can be set as required.
  • the ground terminal also needs to transmit the key to the UAV, so that the UAV can decrypt the transmitted encrypted information through the key.
  • the drone when it receives the first ciphertext sent by the ground terminal, it can decrypt the first ciphertext through the key to obtain the first mixed data, and use its own device identification to decrypt the obtained first ciphertext again. Decrypt the mixed data to obtain the target data.
  • the ground terminal in the system can first perform XOR encryption according to the pre-stored device identification of the UAV and the target data to be sent to determine the first mixed data. After that, encrypt the first mixed data according to the key to obtain the first ciphertext, and send the first ciphertext to the drone, so that the drone decrypts the first ciphertext according to the key to determine the first ciphertext. Mix the data, and perform XOR decryption on the decrypted first mixed data according to its own device identification to determine the target data. The XOR encryption and decryption of the transmitted information is carried out through the device identification of the drone, which greatly improves the security of information transmission.
  • the communication encryption method can be used in the above-mentioned communication encryption system.
  • the communication encryption process please refer to the detailed description of information encryption transmission in the communication encryption system provided in this disclosure.
  • the detailed description reference can be made to the foregoing description, which will not be repeated in the present disclosure.
  • the UAV when the UAV is used as the execution subject to execute the communication encryption method, the UAV can generate a key and send the key to the ground terminal, and then can receive the information sent by the control station. the first ciphertext, and decrypt the received first ciphertext according to the key to determine the first mixed data, and then perform XOR decryption on the first mixed data according to its own device identification to determine the target data.
  • the specific encryption transmission method on the UAV side has been described in detail in the above-mentioned communication encryption system, so reference can be made to the foregoing, which will not be repeated in this disclosure.
  • the communication encryption method provided by the present disclosure can be specifically used in the process of unmanned distribution.
  • the control station and the unmanned device can transmit the delivery instruction and the unmanned device through the communication encryption method in the present disclosure. Real-time location and other information to ensure the security of information transmission between the two parties and further improve the security of unmanned distribution.
  • an embodiment of the present disclosure also provides a schematic structural diagram of a communication encryption device, as shown in FIG. 6 .
  • FIG. 6 is a schematic structural diagram of a communication encryption device provided by an embodiment of the present disclosure, including:
  • the mixing module 300 performs XOR encryption according to the pre-stored device identifier of the unmanned device and the target data to be sent to determine the first mixed data;
  • the encryption and decryption module 302 encrypts the first mixed data according to the key to obtain a first ciphertext, and sends the first ciphertext to the unmanned device, so that the unmanned device can obtain the first ciphertext according to the encryption key.
  • key decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein the key is
  • the unmanned vehicle is generated and sent through a symmetric encryption algorithm.
  • An embodiment of the present disclosure further provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program can be used to execute the communication encryption method provided in FIG. 5 above.
  • a Programmable Logic Device (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device.
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller may be implemented in any suitable manner, for example, the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory.
  • the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers
  • ASICs application specific integrated circuits
  • controllers include but are not limited to
  • the controller in addition to implementing the controller in the form of pure computer-readable program code, the controller can be implemented as logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded devices by logically programming the method steps.
  • the same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as both a software module implementing a method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include forms of non-persistent memory, random access memory (RAM) and/or non-volatile memory in computer readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash memory
  • Computer readable media includes both persistent and non-permanent, removable and non-removable media, and can be implemented by any method or technology for storage of information.
  • Information may be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
  • computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
  • embodiments of the present disclosure may be provided as a method, system or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the disclosure may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including storage devices.

Abstract

The present disclosure discloses a communication encryption system, method and apparatus. An unmanned device in the system may generate a key by means of a symmetric encryption algorithm and send same to a control station; and the control station in the system may, according to a pre-stored device identifier of the unmanned device, encrypt target data to be sent, determine first hybrid data, and re-encrypt the first hybrid data according to a received key so as to obtain first ciphertext and send same to the unmanned device. After receiving the first ciphertext, the unmanned device may decrypt the first ciphertext by means of the key generated by the symmetric encryption algorithm to obtain the first hybrid data, and then decrypt the obtained first hybrid data according to a device identifier thereof to obtain target data. In the system, two parties perform XOR encryption and decryption on the transmitted target data by means of the device identifier of the unmanned device, which further enhances the security of information transmission.

Description

通信加密Communication encryption 技术领域technical field
本申请涉及信息加密技术领域。The present application relates to the technical field of information encryption.
背景技术Background technique
随着无人驾驶技术的发展,无人驾驶设备在军事、工业以及农业等方面得到广泛应用。With the development of unmanned technology, unmanned equipment has been widely used in military, industrial and agricultural fields.
发明内容SUMMARY OF THE INVENTION
本公开实施例提供一种通信加密系统、方法及装置。Embodiments of the present disclosure provide a communication encryption system, method, and apparatus.
本公开实施例采用下述技术方案:第一方面,本公开提供的一种通信加密系统,所述系统包括无人驾驶设备以及控制站,所述控制站预先存储所述无人驾驶设备的设备标识,其中:所述无人驾驶设备,配置为通过对称加密算法生成密钥,并将所述密钥发送至所述控制站;所述控制站,配置为根据预先存储的所述无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据;所述控制站,配置为根据所述密钥,对所述第一混合数据进行加密得到第一密文,并将所述第一密文发送至所述无人驾驶设备;所述无人驾驶设备,配置为根据所述密钥,对接收到的所述第一密文进行解密,确定所述第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据。Embodiments of the present disclosure adopt the following technical solutions: In a first aspect, the present disclosure provides a communication encryption system, the system includes an unmanned device and a control station, and the control station pre-stores the equipment of the unmanned device identification, wherein: the unmanned device is configured to generate a key through a symmetric encryption algorithm and send the key to the control station; the control station is configured to The device identifier of the device and the target data to be sent are XOR-encrypted to determine the first mixed data; the control station is configured to encrypt the first mixed data according to the key to obtain the first ciphertext, and send the first ciphertext to the unmanned device; the unmanned device is configured to decrypt the received first ciphertext according to the key, and determine the first ciphertext. Mix data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data.
第二方面,本公开还提供一种通信加密方法,包括:根据预先存储的无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据;根据密钥对所述第一混合数据进行加密得到第一密文,并将所述第一密文发送至所述无人驾驶设备,以使所述无人驾驶设备根据所述密钥,对接收到的所述第一密文进行解密确定所述第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据;其中,所述密钥为所述无人驾驶设备通过对称加密算法生成并发送的。In a second aspect, the present disclosure also provides a communication encryption method, including: performing XOR encryption according to a pre-stored device identifier of an unmanned device and target data to be sent to determine the first mixed data; The first mixed data is encrypted to obtain a first ciphertext, and the first ciphertext is sent to the unmanned device, so that the unmanned device can, according to the key, Decrypt the first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data; wherein, the key is the unmanned The driving device is generated and sent through a symmetric encryption algorithm.
第三方面,本公开提供一种通信加密装置,包括:混合模块,根据预先存储的无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据;加密解密模块,根据密钥对所述第一混合数据进行加密得到第一密文,并将所述第一密文发送至所述无人驾驶设备,以使所述无人驾驶设备根据所述密钥,对接收到的所述第一密文进行解密确定所述第一混合数据,并根据自身的设备标识,对第一混合数据进行异或 解密,确定所述目标数据,其中,所述密钥为所述无人驾驶设备通过对称加密算法生成并发送的。In a third aspect, the present disclosure provides a communication encryption device, comprising: a mixing module that performs XOR encryption according to a pre-stored device identifier of an unmanned device and target data to be sent to determine the first mixed data; an encryption and decryption module , encrypting the first mixed data according to the key to obtain the first ciphertext, and sending the first ciphertext to the unmanned device, so that the unmanned device, according to the key, Decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein the key is The unmanned vehicle is generated and sent through a symmetric encryption algorithm.
第四方面,本公开提供的一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述通信加密方法。In a fourth aspect, the present disclosure provides a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, the foregoing communication encryption method is implemented.
本公开实施例采用的上述至少一个技术方案能够达到以下有益效果:在本公开中,该系统中的无人驾驶设备可通过对称加密算法生成密钥并发送给控制站,该系统中的控制站可根据预先存储的该无人驾驶设备的设备标识,对待发送的目标数据进行加密,确定第一混合数据,并根据接收到的密钥对该第一混合数据再次加密,得到第一密文并发送给无人驾驶设备。该无人驾驶设备在接收到该第一密文后,可通过对称加密算法生成的密钥对该第一密文进行解密,得到第一混合数据,再根据自身的设备标识,对得到的第一混合数据再次解密,得到目标数据。该系统中的双方通过无人驾驶设备的设备标识对传输的目标数据进行异或加密以及解密,进一步增强了信息传输的安全性。The above-mentioned at least one technical solution adopted in the embodiments of the present disclosure can achieve the following beneficial effects: In the present disclosure, the unmanned device in the system can generate a key through a symmetric encryption algorithm and send it to the control station, and the control station in the system can generate a key by using a symmetric encryption algorithm. The target data to be sent can be encrypted according to the pre-stored device identification of the unmanned device, the first mixed data can be determined, and the first mixed data can be re-encrypted according to the received key to obtain the first ciphertext. Sent to the unmanned device. After receiving the first ciphertext, the unmanned device can decrypt the first ciphertext by using the key generated by the symmetric encryption algorithm to obtain the first mixed data, and then according to its own device identification, decrypt the obtained first ciphertext. A mixed data is decrypted again to obtain the target data. Both parties in the system perform XOR encryption and decryption on the transmitted target data through the device identification of the unmanned device, which further enhances the security of information transmission.
附图说明Description of drawings
此处所说明的附图用来提供对本申请的进一步理解,构成本申请的一部分,本申请的示意性实施例及其说明用于解释本申请,并不构成对本申请的不当限定。在附图中:The drawings described herein are used to provide further understanding of the present application and constitute a part of the present application. The schematic embodiments and descriptions of the present application are used to explain the present application and do not constitute an improper limitation of the present application. In the attached image:
图1为本公开实施例提供的一种通信加密系统示意图;1 is a schematic diagram of a communication encryption system according to an embodiment of the present disclosure;
图2为本公开实施例提供的一种地面端向无人机传输信息的交互示意图;FIG. 2 is an interactive schematic diagram of a ground terminal transmitting information to an unmanned aerial vehicle according to an embodiment of the present disclosure;
图3为本公开实施例提供的一种无人机向地面端传输信息的交互示意图;FIG. 3 is an interactive schematic diagram of a UAV transmitting information to a ground terminal according to an embodiment of the present disclosure;
图4为本公开实施例提供的一种基于非对称加密算法传输密钥的示意图;4 is a schematic diagram of transmitting a key based on an asymmetric encryption algorithm according to an embodiment of the present disclosure;
图5为本公开实施例提供的一种通信加密方法的流程示意图;5 is a schematic flowchart of a communication encryption method according to an embodiment of the present disclosure;
图6为本公开实施例提供的一种通信加密装置的结构示意图。FIG. 6 is a schematic structural diagram of a communication encryption apparatus according to an embodiment of the present disclosure.
具体实施方式Detailed ways
为使本公开的目的、技术方案和优点更加清楚,下面将结合本公开具体实施例及相应的附图对本申请技术方案进行清楚、完整地描述。所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the technical solutions of the present application will be described clearly and completely below with reference to the specific embodiments of the present disclosure and the corresponding drawings. The described embodiments are only some, but not all, embodiments of the present application. Based on the disclosed embodiments, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
一般的,无人驾驶设备在执行任务的过程中,需要实时与控制站进行通信,以传输控制指令或者采集到的图像等信息。为了保证无人驾驶设备与控制站之间的通信安全, 降低通信被劫持或者被篡改的风险,可对双方之间传输的信息进行加密处理。Generally, in the process of performing tasks, the unmanned equipment needs to communicate with the control station in real time to transmit control instructions or collected images and other information. In order to ensure the communication security between the unmanned device and the control station and reduce the risk of communication being hijacked or tampered with, the information transmitted between the two parties can be encrypted.
常见的加密算法有对称加密算法以及非对称加密算法。其中,对称加密算法是指发送方与接收方均使用相同的密钥进行加密解密,非对称加密算法是指发送方与接收方使用不同的密钥进行加密解密,发送方使用公钥对传输的信息进行加密,接收方通过私钥对加密后的密文解密。Common encryption algorithms include symmetric encryption algorithms and asymmetric encryption algorithms. Among them, the symmetric encryption algorithm means that both the sender and the receiver use the same key for encryption and decryption, the asymmetric encryption algorithm means that the sender and the receiver use different keys for encryption and decryption, and the sender uses the public key to encrypt and decrypt the transmitted data. The information is encrypted, and the recipient decrypts the encrypted ciphertext through the private key.
当采用对称加密算法对双方之间传输的信息进行加密时,无人驾驶设备与控制站之间需要先互通密钥,之后再传输加密密文,以通过密钥对加密密文进行解密。但是,若双方传输的密钥被劫持,则后续的加密无效,因此对称加密算法的安全性较低。When a symmetric encryption algorithm is used to encrypt the information transmitted between the two parties, the unmanned device and the control station need to exchange the key first, and then transmit the encrypted ciphertext to decrypt the encrypted ciphertext through the key. However, if the key transmitted by both parties is hijacked, the subsequent encryption is invalid, so the security of the symmetric encryption algorithm is low.
当采用非对称加密算法对双方之间传输的信息进行加密时,若无人驾驶设备向控制站发送信息,则需要由控制站通过非对称加密算法生成第一公钥和第一私钥,并将生成的第一公钥发送给无人驾驶设备,则无人驾驶设备可将待传输的信息通过第一公钥加密,并将加密密文发送给控制站,以使控制站通过第一私钥对加密密文进行解密。When an asymmetric encryption algorithm is used to encrypt the information transmitted between the two parties, if the unmanned device sends information to the control station, the control station needs to generate the first public key and the first private key through the asymmetric encryption algorithm, and Send the generated first public key to the unmanned device, then the unmanned device can encrypt the information to be transmitted with the first public key, and send the encrypted ciphertext to the control station, so that the control station can pass the first private key. key to decrypt the encrypted ciphertext.
当控制站向无人驾驶设备发送信息时,可由无人驾驶设备通过非对称加密算法生成第二公钥和第二私钥,并将生成的第二公钥发送给控制站,则控制站可将待传输的信息通过第二公钥加密,并将加密密文发送给无人驾驶设备,以使无人驾驶设备通过第二私钥对加密密文进行解密。When the control station sends information to the unmanned device, the unmanned device can generate a second public key and a second private key through an asymmetric encryption algorithm, and send the generated second public key to the control station, then the control station can The information to be transmitted is encrypted with the second public key, and the encrypted ciphertext is sent to the unmanned device, so that the unmanned device can decrypt the encrypted ciphertext through the second private key.
出于信息传输安全性要求,每次进行信息传输前均需要由信息接收方通过非对称加密算法生成新的公钥和私钥,并将新生成的公钥发送给信息发送方。因此双方在信息传输过程中的准备时间较长,即,生成密钥以及交换密钥所需的时间较长,导致信息传输时间长,传输效率低。For information transmission security requirements, before each information transmission, the information receiver needs to generate a new public key and private key through an asymmetric encryption algorithm, and send the newly generated public key to the information sender. Therefore, the preparation time for both parties in the information transmission process is long, that is, the time required to generate and exchange keys is long, resulting in long information transmission time and low transmission efficiency.
基于上述存在的技术问题,本公开提供了一种通信加密系统,可在增强信息传输的安全性的同时,降低密钥交换导致的信息传输延时。以下结合附图,详细说明本申请各实施例提供的技术方案。Based on the above existing technical problems, the present disclosure provides a communication encryption system, which can reduce the information transmission delay caused by key exchange while enhancing the security of information transmission. The technical solutions provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.
图1为本公开实施例提供的一种通信加密系统示意图,该系统包括无人驾驶设备100以及控制站102,其中,无人驾驶设备100可以是无人机、无人车、无人船以及机器人等设备中的任意一种,控制站102指的是控制无人驾驶设备100执行任务的控制中心。在本公开中为方便描述,后续以无人驾驶设备100为无人机,该无人机对应的控制站102为地面端为例进行说明。1 is a schematic diagram of a communication encryption system provided by an embodiment of the present disclosure, the system includes an unmanned device 100 and a control station 102, wherein the unmanned device 100 may be an unmanned aerial vehicle, an unmanned vehicle, an unmanned boat, and a control station 102. In any of the devices such as robots, the control station 102 refers to a control center that controls the unmanned device 100 to perform tasks. For the convenience of description in this disclosure, the following description will be given by taking the unmanned device 100 as an unmanned aerial vehicle and the control station 102 corresponding to the unmanned aerial vehicle as a ground terminal as an example.
在一实施例中,该无人机与地面端通过无线传输技术进行信息传输,无人机可向地面端传输信息加密解密所需的密钥,地面端可基于该密钥进行加密得到第一密文,并向 无人机发送第一密文。此外,地面端也可向无人机传输飞行控制指令,无人机可向地面端传输采集的图像等信息。其中,该地面端通常指地面上控制无人机飞行的服务器,可以是单个的服务器,也可以是多个服务器组成的系统,如,分布式服务器系统等,本公开对此不做限制,具体可根据需要设置。In one embodiment, the drone and the ground terminal transmit information through wireless transmission technology, the drone can transmit the key required for information encryption and decryption to the ground terminal, and the ground terminal can encrypt based on the key to obtain the first key. ciphertext, and send the first ciphertext to the drone. In addition, the ground terminal can also transmit flight control instructions to the UAV, and the UAV can transmit the collected images and other information to the ground terminal. The ground terminal usually refers to the server on the ground that controls the flight of the UAV, which may be a single server or a system composed of multiple servers, such as a distributed server system, which is not limited in this disclosure. Can be set as required.
为了保障无人机和地面端双方信息传输的安全性,本公开提供一种低延迟通信加密系统,可在保障安全性的前提下,进一步缩短信息传输时长。In order to ensure the security of information transmission between the UAV and the ground terminal, the present disclosure provides a low-latency communication encryption system, which can further shorten the information transmission time on the premise of ensuring security.
具体的,无人机和地面端双方在进行信息传输时,可先通过对称加密算法生成密钥,并且双方互通密钥,图2为地面端向无人机传输信息的交互示意图。在本公开中,以无人机通过对称加密算法生成密钥,并发送给地面端为例进行说明。需要说明的是,由于基于不同信息传输的方向(无人机到地面端或地面端到无人机),对应的信息加密系统和方法是类似的,只是实施主体互换,因此,虽然本公开对基于一个信息传输方向的信息加密系统和方法进行了说明,但基于另一个信息传输方向的信息加密系统和方法也属于本申请的保护范围。Specifically, when the UAV and the ground end transmit information, they can first generate a key through a symmetric encryption algorithm, and the two parties can exchange the key. Figure 2 is a schematic diagram of the interaction between the ground end transmitting information to the UAV. In this disclosure, the drone generates a key through a symmetric encryption algorithm and sends it to the ground terminal as an example for description. It should be noted that, due to different information transmission directions (UAV to ground terminal or ground terminal to UAV), the corresponding information encryption systems and methods are similar, and only subject exchange is implemented. Therefore, although the present disclosure The information encryption system and method based on one information transmission direction are described, but the information encryption system and method based on another information transmission direction also belong to the protection scope of this application.
若无人机和地面端双方仅通过密钥对传输的信息进行加密,那么第三方可在密钥传输过程中劫持密钥,并通过劫持的密钥对后续传输的加密密文进行解密,信息传输的安全性较低。于是在本公开中,为进一步增强信息传输的安全性,在图2中,当地面端接收到无人机发送的密钥后,可根据预先存储的该无人机的设备标识,对待发送的目标数据进行异或加密,生成第一混合数据。由于无人机的设备标识是地面端与无人机预先约定的,并未携带在信息中进行传输,因此即使第三方劫持了密钥,也无法根据密钥对加密密文进行解密。If both the UAV and the ground terminal only encrypt the transmitted information through the key pair, the third party can hijack the key during the key transmission process and decrypt the encrypted ciphertext transmitted subsequently through the hijacked key. Transmission is less secure. Therefore, in the present disclosure, in order to further enhance the security of information transmission, in FIG. 2, after receiving the key sent by the drone, the ground terminal can, according to the pre-stored device identification of the drone, identify the key to be sent. The target data is XOR-encrypted to generate first mixed data. Since the device identification of the drone is pre-agreed between the ground and the drone and is not carried in the information for transmission, even if a third party hijacks the key, the encrypted ciphertext cannot be decrypted according to the key.
进一步的,通常待传输的目标数据比该无人机的设备标识的数据量大,数据长度较长,因此在进行异或加密时,可采用对该无人机的设备标识进行补0操作,或者多次重复该无人机的设备标识等方式,保证进行异或处理的数据与待传输的目标数据的数据位数相同,便于进行异或处理。例如,假设待传输的目标数据为0110,该无人机的设备标识为01,则在通过该设备标识对该目标数据进行异或加密时,可进行补0操作,使之与目标数据的位数相同,并通过补0后数据0100对该目标数据进行异或处理。或者,也可多次重复该无人机的设备标识,使之与目标数据的数据位数相同,并通过重复后的数据0101对该目标数据进行异或处理。Further, the target data to be transmitted is usually larger than the data of the device identification of the drone, and the data length is longer, so when performing XOR encryption, the device identification of the drone can be used to perform a zero-fill operation, Or repeat the device identification of the drone several times to ensure that the data for XOR processing is the same as the data bits of the target data to be transmitted, which is convenient for XOR processing. For example, assuming that the target data to be transmitted is 0110, and the device ID of the drone is 01, when the target data is XOR-encrypted by the device ID, a 0-fill operation can be performed to make it match the bit of the target data. The numbers are the same, and the target data is XORed by adding 0 to the data 0100. Alternatively, the device identification of the drone can also be repeated several times to make it the same as the number of data bits of the target data, and the target data can be XORed through the repeated data 0101.
之后,该地面端可根据接收到的密钥,对该第一混合数据进行加密得到第一密文,并将第一密文发送给该无人机。After that, the ground terminal can encrypt the first mixed data to obtain the first ciphertext according to the received key, and send the first ciphertext to the drone.
然后,该无人机便可根据自身生成的密钥以及所使用的对称加密算法,对接收到的 第一密文进行解密,确定该第一混合数据。在一个例子中,该无人机可根据自身生成的密钥,对接收到的第一密文进行解密,确定该第一混合数据。Then, the drone can decrypt the received first ciphertext according to the key generated by itself and the symmetric encryption algorithm used to determine the first mixed data. In one example, the UAV can decrypt the received first ciphertext according to the key generated by itself to determine the first mixed data.
最后,该无人机可根据自身的设备标识,对该第一混合数据进行异或解密,确定地面端传输的目标数据,以根据该目标数据执行相应操作。如,当该目标数据为飞行控制指令时,则该无人机可根据该飞行控制指令,调整飞行参数等。Finally, the UAV can perform XOR decryption on the first mixed data according to its own device identification, and determine the target data transmitted by the ground terminal, so as to perform corresponding operations according to the target data. For example, when the target data is a flight control command, the UAV can adjust flight parameters according to the flight control command.
更进一步的,由于第一混合数据的数据量往往大于该无人机的设备标识的数据量,因此在使用该设备标识对该第一混合数据进行异或解密时,需要对设备标识采用与上述异或加密时同样的操作。若是对设备标识进行补0后再进行异或加密,则也需对设备标识进行补0后再进行异或解密,同样的,若是对设备标识进行重复后再进行异或加密,则也需对设备标识进行重复后再进行异或解密。Further, since the data volume of the first mixed data is often larger than the data volume of the device identifier of the drone, when using the device identifier to XOR decrypt the first mixed data, it is necessary to adopt the same method as the above for the device identifier. The same operation as XOR encryption. If the device ID is filled with 0 and then XOR encryption is performed, the device ID needs to be filled with 0 and then XOR decrypted. Similarly, if the device ID is repeated and then XOR encryption is performed, it is also necessary to The device identification is repeated and then XOR decrypted.
上述图2所示的信息传输过程为地面端向无人机传输信息的过程,由无人机向地面端传输信息的交互示意图如图3所示,当无人机向地面端返回信息时,该无人机也可根据自身的设备标识以及待发送的回复数据,进行异或加密,确定第二混合数据。之后,根据自身生成的密钥再次对第二混合数据进行加密得到第三密文,并将第三密文发送给地面端。The information transmission process shown in Figure 2 above is the process of transmitting information from the ground terminal to the UAV. The interactive schematic diagram of the information transmission from the UAV to the ground terminal is shown in Figure 3. When the drone returns information to the ground terminal, The drone can also perform XOR encryption according to its own device identification and the reply data to be sent to determine the second mixed data. After that, encrypt the second mixed data again according to the self-generated key to obtain a third ciphertext, and send the third ciphertext to the ground terminal.
当地面端接收到无人机发送的第三密文后,可根据之前接收到的密钥,对该第三密文进行解密,得到第二混合数据,并根据预先存储的该无人机的设备标识,对该第二混合数据进行异或解密,得到无人机真正传输的回复数据。When the ground terminal receives the third ciphertext sent by the UAV, it can decrypt the third ciphertext according to the previously received key to obtain the second mixed data. Device identification, XOR decryption of the second mixed data, and get the reply data actually transmitted by the drone.
在本公开上述实施例中,是以无人机通过对称加密算法生成密钥,并将生成的密钥发送给地面端为例进行说明的。但实际上采用对称加密算法进行加密传输的无人机和地面端双方,所采用的加密密钥完全相同,仅需在加密传输之前双方互通密钥即可。因此也可由地面端通过对称加密算法生成密钥,并将生成的密钥发送给无人机,本公开对此不做限制,具体可根据需要设置。In the above-mentioned embodiments of the present disclosure, the drone generates a key through a symmetric encryption algorithm and sends the generated key to the ground terminal as an example for description. However, in fact, both the UAV and the ground side that use the symmetric encryption algorithm for encrypted transmission use the same encryption key, and only need to exchange the key before the encrypted transmission. Therefore, the key can also be generated by the ground terminal through a symmetric encryption algorithm, and the generated key can be sent to the UAV, which is not limited in the present disclosure, and can be set as required.
在本公开提供的另一种实施例中,为了保证密钥传输的安全性,可通过非对称加密算法对密钥进行加密传输。具体的,如图4所示,以上述无人机生成并向地面端发送密钥为例,为了对该密钥进行加密传输,在无人机将密钥发送给地面端之前,需要由地面端通过非对称加密算法生成公钥和私钥,并将该公钥发送给该无人机。In another embodiment provided by the present disclosure, in order to ensure the security of key transmission, the key may be encrypted and transmitted through an asymmetric encryption algorithm. Specifically, as shown in Figure 4, taking the above-mentioned UAV generating and sending the key to the ground terminal as an example, in order to encrypt and transmit the key, before the UAV sends the key to the ground terminal, the ground The terminal generates a public key and a private key through an asymmetric encryption algorithm, and sends the public key to the drone.
当该无人机通过对称加密算法生成密钥后,可根据接收到的公钥对该密钥进行加密,生成第二密文,并将第二密文发送给地面端,以保障密钥传输的安全性。After the UAV generates a key through a symmetric encryption algorithm, it can encrypt the key according to the received public key, generate a second ciphertext, and send the second ciphertext to the ground terminal to ensure the transmission of the key security.
之后,该地面端可根据自身生成的私钥以及所使用的非对称加密算法,对接收到的 第二密文进行解密,得到传输的密钥。在一个例子中,该地面端可根据自身生成的私钥,对接收到的第二密文进行解密,得到传输的密钥。After that, the ground terminal can decrypt the received second ciphertext according to the private key generated by itself and the used asymmetric encryption algorithm to obtain the transmitted key. In an example, the ground terminal can decrypt the received second ciphertext according to the private key generated by itself to obtain the transmitted key.
在使用非对称加密算法对密钥进行加密传输时,若由地面端生成密钥并发送给无人机,则在地面端向无人机发送密钥之前,可由该无人机通过非对称加密算法生成公钥和私钥,并将公钥发送给地面端。以使地面端根据接收到的公钥对待传输的密钥进行加密,得到第二密文,并将该第二密文发送给该无人机。之后,该无人机可根据非对称加密算法生成的私钥,对该第二密文进行解密得到密钥。When an asymmetric encryption algorithm is used to encrypt and transmit the key, if the ground terminal generates the key and sends it to the drone, the drone can pass the asymmetric encryption before the ground terminal sends the key to the drone. The algorithm generates a public key and a private key, and sends the public key to the ground terminal. So that the ground terminal encrypts the key to be transmitted according to the received public key, obtains the second ciphertext, and sends the second ciphertext to the drone. After that, the drone can decrypt the second ciphertext according to the private key generated by the asymmetric encryption algorithm to obtain the key.
在本公开提供的又一种实施例中,上述对称加密算法具体可采用流式加密算法(stream cipher),则当地面端使用密钥对第一混合数据进行加密时,该地面端可先将初始的密钥输入伪随机数生成器(pseudo-random number generator,PRNG),生成伪随机密钥流(pseudo-random keystream),并采用该伪随机密钥流,对第一混合数据进行异或加密,确定第一密文。In yet another embodiment provided by the present disclosure, the above-mentioned symmetric encryption algorithm may specifically use a stream cipher, then when the ground terminal uses the key to encrypt the first mixed data, the ground terminal can first encrypt the The initial key input pseudo-random number generator (pseudo-random number generator, PRNG), generates a pseudo-random key stream (pseudo-random keystream), and uses the pseudo-random key stream to XOR the first mixed data Encrypt, determine the first ciphertext.
当无人机对接收到的第一密文进行解密时,也需将初始的密钥输入伪随机数生成器,生成伪随机密钥流,并通过该伪随机密钥流,对第一密文进行异或解密,得到第一混合数据。When the drone decrypts the received first ciphertext, it also needs to input the initial key into the pseudo-random number generator to generate a pseudo-random key stream, and through the pseudo-random key stream, the first encrypted XOR decryption is performed on the text to obtain the first mixed data.
在一些实施例中,当无人机使用密钥对第二混合数据进行加密时,该无人机也可先将初始的密钥输入伪随机数生成器,生成伪随机密钥流,并采用该伪随机密钥流,对第二混合数据进行异或加密,确定第三密文。In some embodiments, when the drone uses the key to encrypt the second mixed data, the drone may also first input the initial key into a pseudo-random number generator, generate a pseudo-random key stream, and use The pseudo-random key stream performs XOR encryption on the second mixed data to determine the third ciphertext.
当地面端对该第三密文进行解密时,也需将初始的密钥输入伪随机数生成器,生成伪随机密钥流,并通过该伪随机密钥流,对第三密文进行异或解密,得到第二混合数据。When the ground terminal decrypts the third ciphertext, the initial key also needs to be input into the pseudo-random number generator to generate a pseudo-random key stream, and through the pseudo-random key stream, the third ciphertext is differentiated. or decryption to obtain the second mixed data.
为了保证信息传输的安全性,通常无人机和地面端双方每次通信前需要重新确定密钥,并且双方进行密钥互通。也就是说,无人机和地面端双方每次进行通信,均需要通过上述步骤重新生成密钥并且互通密钥后,再通过该密钥进行加密传输。In order to ensure the security of information transmission, usually the UAV and the ground end need to re-determine the key before each communication, and the two parties exchange keys. That is to say, every time the drone and the ground end communicate, they need to regenerate the key through the above steps and exchange the key, and then use the key for encrypted transmission.
需要说明的是,无人机和地面端双方的每次通信过程可以持续一段时间,并且在该通信过程中,双方可以互相多次传输信息。而且,由于每次通信过程中所使用的密钥是同一个,因此每次通信过程中仅需生成一个密钥,并且进行一次密钥传输。It should be noted that each communication process between the UAV and the ground end can last for a period of time, and during the communication process, the two parties can transmit information to each other multiple times. Moreover, since the same key is used in each communication process, only one key needs to be generated and one key transmission is performed in each communication process.
在一些实施例中,为了保证密钥传输的安全性,无人机和地面端双方在传输密钥时,可采用非对称加密算法对密钥进行加密传输。由于无人机和地面端双方每次通信过程中仅需传输一次密钥,因此无人机和地面端双方每次通信过程中也仅需采用一次非对称加密算法,对传输的密钥进行加密。其中,在无人机和地面端双方的每次通信过程中,当 双方互通密钥后,接下来双方每次的信息传输可直接采用互通的密钥对传输的信息进行加密以及解密。In some embodiments, in order to ensure the security of key transmission, both the UAV and the ground terminal may use an asymmetric encryption algorithm to encrypt and transmit the key when transmitting the key. Since the UAV and the ground end only need to transmit the key once in each communication process, the UAV and the ground end only need to use an asymmetric encryption algorithm once in each communication process to encrypt the transmitted key. . Among them, in each communication process between the UAV and the ground terminal, after the two parties exchange keys, each subsequent information transmission between the two parties can directly use the exchanged key to encrypt and decrypt the transmitted information.
另外,在一些例子中,由于地面端可同时控制多台无人机的飞行,于是地面端可同时与若干台无人机进行通信,因此双方在进行信息传输时,所传输的信息中还应包含进行通信的无人机的唯一标识,以使地面端可根据该无人机的唯一标识,从预先存储的各无人机的设备标识中,确定出该无人机的设备标识,并采用该无人机的设备标识,对该无人机传输的信息进行解密。In addition, in some cases, since the ground terminal can control the flight of multiple drones at the same time, the ground terminal can communicate with several drones at the same time. Therefore, when the two parties transmit information, the transmitted information should also be It includes the unique identifier of the UAV that is communicating, so that the ground terminal can determine the device identifier of the UAV from the device identifiers of the UAVs stored in advance according to the unique identifier of the UAV, and use the unique identifier of the UAV. The device identification of the drone, and decrypt the information transmitted by the drone.
基于图1所示的通信加密系统,该系统中的无人机可通过对称加密算法生成密钥并发送给地面端,该系统中的地面端可根据预先存储的该无人机的设备标识,对待发送的目标数据进行加密,确定第一混合数据,并根据接收到的密钥对该第一混合数据再次加密,得到第一密文并发送给无人机。该无人机在接收到该第一密文后,可通过对称加密算法生成的密钥对该第一密文进行解密,得到第一混合数据,再根据自身的设备标识,对得到的第一混合数据再次解密,得到目标数据。该系统中的无人机和地面端双方通过无人机的设备标识对传输的目标数据进行异或加密以及解密,进一步增强了信息传输的安全性。Based on the communication encryption system shown in Figure 1, the UAV in the system can generate a key through a symmetric encryption algorithm and send it to the ground terminal. The target data to be sent is encrypted, the first mixed data is determined, and the first mixed data is encrypted again according to the received key to obtain the first ciphertext and send it to the drone. After the drone receives the first ciphertext, it can decrypt the first ciphertext through the key generated by the symmetric encryption algorithm to obtain the first mixed data, and then according to its own device identification, decrypt the obtained first ciphertext. The mixed data is decrypted again to obtain the target data. In the system, both the UAV and the ground terminal perform XOR encryption and decryption on the transmitted target data through the device identification of the UAV, which further enhances the security of information transmission.
并且,在本公开中还可通过非对称加密算法对密钥传输进行加密,保障密钥传输的安全性,而且,由于无人机和地面端双方每次通信过程中仅需通过非对称加密算法传输一次密钥,因此在保障信息传输的安全性的前提下,信息传输的延时较小。In addition, in the present disclosure, the key transmission can also be encrypted by an asymmetric encryption algorithm to ensure the security of the key transmission. Moreover, because the UAV and the ground end only need to pass the asymmetric encryption algorithm in each communication process. The key is transmitted once, so under the premise of ensuring the security of information transmission, the delay of information transmission is small.
当然,本公开所示的通信加密系统也可用于无人车、无人船等无人驾驶设备100与其对应的控制站102之间的信息传输,本公开对此不再详细描述,具体可参见上述无人机与其控制中心地面端之间的信息加密传输过程。Of course, the communication encryption system shown in this disclosure can also be used for information transmission between unmanned vehicles 100 such as unmanned vehicles and unmanned ships and their corresponding control stations 102, which will not be described in detail in this disclosure. The information encryption transmission process between the above-mentioned UAV and its control center ground terminal.
针对上述图1所示的通信加密系统,本公开还对应提供了通信加密系统中所采用的通信加密方法,如图5所示。For the communication encryption system shown in FIG. 1 , the present disclosure also provides a communication encryption method used in the communication encryption system, as shown in FIG. 5 .
图5为本公开实施例提供的通信加密方法的流程示意图,其中,该通信加密方法可用于通信加密系统中,具体可包括以下步骤:5 is a schematic flowchart of a communication encryption method provided by an embodiment of the present disclosure, wherein the communication encryption method may be used in a communication encryption system, and may specifically include the following steps:
S200:根据预先存储的无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据。S200: Perform XOR encryption according to the pre-stored device identifier of the unmanned device and the target data to be sent to determine the first mixed data.
本公开中的通信加密系统包含无人驾驶设备以及控制站,其中,无人驾驶设备可以是无人机、无人车、无人船以及机器人等设备中的一种,该控制站是控制无人驾驶设备执行任务的控制中心。为方便描述,后续以无人驾驶设备为无人机,该无人机的控制站 为地面端为例进行说明。The communication encryption system in the present disclosure includes an unmanned device and a control station, wherein the unmanned device may be one of devices such as an unmanned aerial vehicle, an unmanned vehicle, an unmanned ship, and a robot. The control center where the manned device performs the mission. For the convenience of description, the unmanned equipment is an unmanned aerial vehicle, and the control station of the unmanned aerial vehicle is the ground terminal as an example.
在本公开中,该地面端通常指地面上控制无人机飞行的服务器,该服务器可以向无人机发送飞行控制指令,并接收无人机采集的图像等信息,与无人机进行信息传输。并且,该服务器可以是单个的服务器,也可以是多个服务器组成的系统,如,分布式服务器系统等,本公开对此不做限制,具体可根据需要设置。In the present disclosure, the ground terminal usually refers to a server on the ground that controls the flight of the drone. The server can send flight control instructions to the drone, receive information such as images collected by the drone, and transmit information with the drone. . In addition, the server may be a single server, or a system composed of multiple servers, such as a distributed server system, etc., which is not limited in the present disclosure, and can be specifically set as required.
本公开提供的通信加密方法,具体可由该通信加密系统中的无人机或地面端任一方执行,为方便描述,本公开以地面端作为执行主体为例进行说明。The communication encryption method provided by the present disclosure can be specifically executed by either the drone or the ground terminal in the communication encryption system. For the convenience of description, the present disclosure takes the ground terminal as the execution subject as an example for description.
具体的,地面端在向无人机传输信息时,该地面端可根据预先存储的该无人机的设备标识,对待发送的目标数据进行异或加密,得到第一混合数据。其中,当无人机的设备标识的数据长度小于目标数据的数据长度时,可通过补0操作或者重复操作进行处理,具体在上述系统侧已经进行了详细说明,在此不再赘述。Specifically, when the ground terminal transmits information to the drone, the ground terminal may perform XOR encryption on the target data to be sent according to the pre-stored device identifier of the drone to obtain the first mixed data. Wherein, when the data length of the device identification of the UAV is less than the data length of the target data, it can be processed by a 0-fill operation or a repeated operation, which has been described in detail on the above-mentioned system side, and will not be repeated here.
S202:根据密钥对所述第一混合数据进行加密得到第一密文,并将第一密文发送至所述无人驾驶设备,以使所述无人驾驶设备根据所述密钥,对接收到的第一密文进行解密确定所述第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据。S202: Encrypt the first mixed data according to the key to obtain a first ciphertext, and send the first ciphertext to the unmanned device, so that the unmanned device, according to the key, The received first ciphertext is decrypted to determine the first mixed data, and the first mixed data is XOR decrypted according to its own device identification to determine the target data.
当地面端基于该无人机的设备标识对目标数据进行异或加密,得到第一混合数据后,为了进一步保障信息传输的安全性,可进一步采用对称加密算法生成的密钥对该第一混合数据加密。When the ground terminal performs XOR encryption on the target data based on the device identification of the UAV, and obtains the first mixed data, in order to further ensure the security of information transmission, a key generated by a symmetric encryption algorithm can be used for the first mixed data. data encryption.
具体的,该地面端可根据密钥对步骤S200中得到的第一混合数据再次进行加密得到第一密文,并将第一密文发送给无人机。其中,该密钥可以是地面端通过对称加密算法生成的,也可以是无人机通过对称加密算法生成,并发送给地面端的,本公开对此不做限制,具体可根据需要设置。当密钥由地面端生成时,该地面端还需将该密钥传输给无人机,以使无人机可通过该密钥对传输的加密信息进行解密。Specifically, the ground terminal can encrypt the first mixed data obtained in step S200 again according to the key to obtain the first ciphertext, and send the first ciphertext to the drone. The key may be generated by the ground terminal through a symmetric encryption algorithm, or may be generated by the drone through a symmetric encryption algorithm and sent to the ground terminal, which is not limited in this disclosure, and can be set as required. When the key is generated by the ground terminal, the ground terminal also needs to transmit the key to the UAV, so that the UAV can decrypt the transmitted encrypted information through the key.
之后,当无人机接收到地面端发送的第一密文后,便可通过密钥对该第一密文进行解密,得到第一混合数据,并通过自身的设备标识,再次对得到的第一混合数据进行解密,得到目标数据。After that, when the drone receives the first ciphertext sent by the ground terminal, it can decrypt the first ciphertext through the key to obtain the first mixed data, and use its own device identification to decrypt the obtained first ciphertext again. Decrypt the mixed data to obtain the target data.
基于图5所示的通信加密方法,该系统中的地面端可先根据预先存储的无人机的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据。之后,根据密钥对该第一混合数据进行加密得到第一密文,并将第一密文发送给无人机,以使该无人机根据密钥对第一密文进行解密确定第一混合数据,并根据自身的设备标识,对解密后的第 一混合数据再进行异或解密,确定目标数据。通过无人机的设备标识对传输的信息进行异或加密以及解密,大大提高了信息传输的安全性。Based on the communication encryption method shown in FIG. 5 , the ground terminal in the system can first perform XOR encryption according to the pre-stored device identification of the UAV and the target data to be sent to determine the first mixed data. After that, encrypt the first mixed data according to the key to obtain the first ciphertext, and send the first ciphertext to the drone, so that the drone decrypts the first ciphertext according to the key to determine the first ciphertext. Mix the data, and perform XOR decryption on the decrypted first mixed data according to its own device identification to determine the target data. The XOR encryption and decryption of the transmitted information is carried out through the device identification of the drone, which greatly improves the security of information transmission.
在本公开中,该通信加密方法具体可用于上述通信加密系统中,该通信加密的过程具体可参考本公开提供的通信加密系统对信息加密传输的详细描述,由于信息加密传输过程已经在前文进行过详细描述,因此可参考前文,本公开对此不再重复说明。In the present disclosure, the communication encryption method can be used in the above-mentioned communication encryption system. For the communication encryption process, please refer to the detailed description of information encryption transmission in the communication encryption system provided in this disclosure. For the detailed description, reference can be made to the foregoing description, which will not be repeated in the present disclosure.
在本公开中,当以无人机为执行主体,执行该通信加密方法时,则该无人机可生成密钥,并将该密钥发送至地面端,之后,可接收该控制站发送的第一密文,并根据该密钥,对接收到的第一密文进行解密,确定第一混合数据,再根据自身的设备标识,对该第一混合数据进行异或解密,确定目标数据。其中,该无人机侧的具体加密传输方法已经在上述通信加密系统中进行过详细描述,因此可参考前文,本公开对此不再重复说明。In the present disclosure, when the UAV is used as the execution subject to execute the communication encryption method, the UAV can generate a key and send the key to the ground terminal, and then can receive the information sent by the control station. the first ciphertext, and decrypt the received first ciphertext according to the key to determine the first mixed data, and then perform XOR decryption on the first mixed data according to its own device identification to determine the target data. The specific encryption transmission method on the UAV side has been described in detail in the above-mentioned communication encryption system, so reference can be made to the foregoing, which will not be repeated in this disclosure.
本公开提供的通信加密方法具体可用于无人配送过程中,当执行无人配送任务时,控制站与无人驾驶设备之间可通过本公开中的通信加密方法传输配送指令以及无人驾驶设备的实时位置等信息,以保证双方之间信息传输的安全性,进一步提升无人配送的安全性。The communication encryption method provided by the present disclosure can be specifically used in the process of unmanned distribution. When the unmanned distribution task is performed, the control station and the unmanned device can transmit the delivery instruction and the unmanned device through the communication encryption method in the present disclosure. Real-time location and other information to ensure the security of information transmission between the two parties and further improve the security of unmanned distribution.
基于图5所示的通信加密方法,本公开实施例还对应提供一种通信加密装置的结构示意图,如图6所示。Based on the communication encryption method shown in FIG. 5 , an embodiment of the present disclosure also provides a schematic structural diagram of a communication encryption device, as shown in FIG. 6 .
图6为本公开实施例提供的一种通信加密装置的结构示意图,包括:FIG. 6 is a schematic structural diagram of a communication encryption device provided by an embodiment of the present disclosure, including:
混合模块300,根据预先存储的无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据;The mixing module 300 performs XOR encryption according to the pre-stored device identifier of the unmanned device and the target data to be sent to determine the first mixed data;
加密解密模块302,根据密钥对所述第一混合数据进行加密得到第一密文,并将第一密文发送至所述无人驾驶设备,以使所述无人驾驶设备根据所述密钥,对接收到的第一密文进行解密确定第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据,其中,所述密钥为所述无人驾驶设备通过对称加密算法生成并发送的。The encryption and decryption module 302 encrypts the first mixed data according to the key to obtain a first ciphertext, and sends the first ciphertext to the unmanned device, so that the unmanned device can obtain the first ciphertext according to the encryption key. key, decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein the key is The unmanned vehicle is generated and sent through a symmetric encryption algorithm.
本公开实施例还提供了一种计算机可读存储介质,该存储介质存储有计算机程序,计算机程序可用于执行上述图5提供的通信加密方法。An embodiment of the present disclosure further provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program can be used to execute the communication encryption method provided in FIG. 5 above.
当然,除了软件实现方式之外,本公开并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。Of course, in addition to software implementation, the present disclosure does not exclude other implementations, such as logic devices or a combination of software and hardware, etc., that is to say, the execution subject of the following processing flow is not limited to each logic unit, but can also be hardware or logic device.
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例 如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, improvements in a technology could be clearly differentiated between improvements in hardware (for example, improvements in circuit structures such as diodes, transistors, switches, etc.) or improvements in software (improvements in method flow). However, with the development of technology, the improvement of many methods and processes today can be regarded as a direct improvement of the hardware circuit structure. Designers almost get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by hardware entity modules. For example, a Programmable Logic Device (PLD) (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device. It is programmed by the designer to "integrate" a digital system on a PLD without having to ask the chip manufacturer to design and manufacture a dedicated integrated circuit chip. Moreover, today, instead of making integrated circuit chips by hand, this kind of programming is also mostly implemented using "logic compiler" software, which is similar to the software compiler used in program development and writing, and needs to be compiled before compiling. The original code also has to be written in a specific programming language, which is called Hardware Description Language (HDL), and there is not only one HDL, but many kinds, such as ABEL (Advanced Boolean Expression Language) , AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., currently the most commonly used The ones are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that a hardware circuit for implementing the logic method process can be easily obtained by simply programming the method process in the above-mentioned several hardware description languages and programming it into the integrated circuit.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory. Those skilled in the art also know that, in addition to implementing the controller in the form of pure computer-readable program code, the controller can be implemented as logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded devices by logically programming the method steps. The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as both a software module implementing a method and a structure within a hardware component.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、 媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本公开时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described respectively. Of course, when implementing the present disclosure, the functions of each unit may be implemented in one or more software and/or hardware.
本领域内的技术人员应明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本公开是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include forms of non-persistent memory, random access memory (RAM) and/or non-volatile memory in computer readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法 或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer readable media includes both persistent and non-permanent, removable and non-removable media, and can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device comprising a series of elements includes not only those elements, but also Other elements not expressly listed, or which are inherent to such a process, method, article of manufacture, or apparatus are also included. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in the process, method, article of manufacture, or device that includes the element.
本领域技术人员应明白,本公开的实施例可提供为方法、系统或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本公开可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本公开,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。The present disclosure may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The disclosure may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.
本公开中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。The various embodiments in the present disclosure are described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the system embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for related parts, please refer to the partial descriptions of the method embodiments.
以上所述仅为本公开的实施例而已,并不用于限制本公开。对于本领域技术人员来说,本公开可以有各种更改和变化。凡在本公开的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本公开的权利要求范围之内。The above descriptions are merely embodiments of the present disclosure, and are not intended to limit the present disclosure. Various modifications and variations of the present disclosure will occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included within the scope of the claims of the present disclosure.

Claims (8)

  1. 一种通信加密系统,其特征在于,所述系统包含无人驾驶设备以及控制站,所述控制站预先存储所述无人驾驶设备的设备标识,其中:A communication encryption system, characterized in that the system comprises an unmanned device and a control station, the control station pre-stores the device identifier of the unmanned device, wherein:
    所述无人驾驶设备,配置为生成密钥,并将所述密钥发送至所述控制站;the unmanned device configured to generate a key and send the key to the control station;
    所述控制站,配置为根据预先存储的所述无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据;The control station is configured to perform XOR encryption according to the pre-stored device identification of the unmanned device and the target data to be sent to determine the first mixed data;
    所述控制站,配置为根据所述密钥,对所述第一混合数据进行加密得到第一密文,并将所述第一密文发送至所述无人驾驶设备;The control station is configured to encrypt the first mixed data to obtain a first ciphertext according to the key, and send the first ciphertext to the unmanned vehicle;
    所述无人驾驶设备,配置为根据所述密钥,对接收到的所述第一密文进行解密,确定所述第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据。The unmanned device is configured to decrypt the received first ciphertext according to the key, determine the first mixed data, and decrypt the first mixed data according to its own device identification. XOR decryption is performed to determine the target data.
  2. 如权利要求1所述的系统,其特征在于,所述控制站,还配置为通过非对称加密算法生成公钥和私钥,并将所述公钥发送至所述无人驾驶设备;The system of claim 1, wherein the control station is further configured to generate a public key and a private key through an asymmetric encryption algorithm, and send the public key to the unmanned vehicle;
    所述无人驾驶设备,还配置为根据接收到的所述公钥对所述密钥进行加密,确定第二密文,并发送至所述控制站;The unmanned device is further configured to encrypt the key according to the received public key, determine a second ciphertext, and send it to the control station;
    所述控制站,还配置为根据所述私钥对接收到的所述第二密文进行解密,确定所述密钥。The control station is further configured to decrypt the received second ciphertext according to the private key to determine the key.
  3. 如权利要求1所述的系统,其特征在于,所述控制站还配置为:The system of claim 1, wherein the control station is further configured to:
    根据所述密钥以及伪随机数生成器,确定伪随机密钥流;determining a pseudo-random key stream according to the key and the pseudo-random number generator;
    根据所述伪随机密钥流,对所述第一混合数据进行异或加密,确定所述第一密文。According to the pseudo-random key stream, XOR encryption is performed on the first mixed data to determine the first ciphertext.
  4. 如权利要求3所述的系统,其特征在于,所述无人驾驶设备还配置为:The system of claim 3, wherein the unmanned device is further configured to:
    根据所述密钥以及所述伪随机数生成器,确定所述伪随机密钥流;determining the pseudo-random key stream according to the key and the pseudo-random number generator;
    根据所述伪随机密钥流,对接收到的所述第一密文进行异或解密,确定所述第一混合数据。According to the pseudo-random key stream, XOR decryption is performed on the received first ciphertext to determine the first mixed data.
  5. 如权利要求1所述的系统,其特征在于,所述无人驾驶设备还配置为:The system of claim 1, wherein the unmanned device is further configured to:
    根据自身的设备标识以及待发送的回复数据,进行异或加密,确定第二混合数据;According to its own device identification and the reply data to be sent, XOR encryption is performed to determine the second mixed data;
    根据所述密钥,对所述第二混合数据进行加密生成第三密文,并将所述第三密文发送至所述控制站;According to the key, the second mixed data is encrypted to generate a third ciphertext, and the third ciphertext is sent to the control station;
    所述控制站,还配置为根据所述密钥,对接收到的所述第三密文进行解密,确定所述第二混合数据,并根据所述无人驾驶设备的设备标识,对所述第二混合数据进行异或解密,确定所述回复数据。The control station is further configured to decrypt the received third ciphertext according to the key, determine the second mixed data, and, according to the device identification of the unmanned device, decrypt the received third ciphertext. The second mixed data is XOR decrypted to determine the reply data.
  6. 一种通信加密方法,其特征在于,包括:A communication encryption method, comprising:
    根据预先存储的无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密, 确定第一混合数据;According to the pre-stored device identifier of the unmanned device and the target data to be sent, XOR encryption is performed to determine the first mixed data;
    根据密钥对所述第一混合数据进行加密得到第一密文,并将所述第一密文发送至所述无人驾驶设备,以使所述无人驾驶设备根据所述密钥,对接收到的所述第一密文进行解密确定所述第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据;The first mixed data is encrypted according to the key to obtain a first ciphertext, and the first ciphertext is sent to the unmanned device, so that the unmanned device can, according to the key, Decrypting the received first ciphertext to determine the first mixed data, and performing XOR decryption on the first mixed data according to its own device identification to determine the target data;
    其中,所述密钥为所述无人驾驶设备通过对称加密算法生成并发送的。Wherein, the key is generated and sent by the unmanned device through a symmetric encryption algorithm.
  7. 一种通信加密装置,其特征在于,包括:A communication encryption device, comprising:
    混合模块,根据预先存储的无人驾驶设备的设备标识以及待发送的目标数据,进行异或加密,确定第一混合数据;The mixing module, according to the pre-stored device identifier of the unmanned device and the target data to be sent, performs XOR encryption to determine the first mixed data;
    加密解密模块,根据密钥对所述第一混合数据进行加密得到第一密文,并将所述第一密文发送至所述无人驾驶设备,以使所述无人驾驶设备根据所述密钥,对接收到的所述第一密文进行解密确定所述第一混合数据,并根据自身的设备标识,对所述第一混合数据进行异或解密,确定所述目标数据,其中,所述密钥为所述无人驾驶设备通过对称加密算法生成并发送的。The encryption and decryption module encrypts the first mixed data according to the key to obtain a first ciphertext, and sends the first ciphertext to the unmanned device, so that the unmanned device key, decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein, The key is generated and sent by the unmanned device through a symmetric encryption algorithm.
  8. 一种计算机可读存储介质,其特征在于,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述权利要求6所述的方法。A computer-readable storage medium, characterized in that, the storage medium stores a computer program, and when the computer program is executed by a processor, the method of claim 6 is implemented.
PCT/CN2022/080432 2021-03-26 2022-03-11 Communication encryption WO2022199404A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110324354.1A CN112906037A (en) 2021-03-26 2021-03-26 Communication encryption system, method and device
CN202110324354.1 2021-03-26

Publications (1)

Publication Number Publication Date
WO2022199404A1 true WO2022199404A1 (en) 2022-09-29

Family

ID=76108775

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/080432 WO2022199404A1 (en) 2021-03-26 2022-03-11 Communication encryption

Country Status (2)

Country Link
CN (1) CN112906037A (en)
WO (1) WO2022199404A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device
CN113645209A (en) * 2021-07-30 2021-11-12 北京三快在线科技有限公司 Vehicle end software encryption and decryption method and device based on white box
CN113724482B (en) * 2021-08-05 2023-05-30 北京三快在线科技有限公司 Radio frequency remote control method and device, storage medium and electronic equipment
CN113891312A (en) * 2021-09-27 2022-01-04 深圳市道通智能航空技术股份有限公司 Unmanned aerial vehicle data encryption transmission method, device, equipment and storage medium
CN114282232A (en) * 2021-11-22 2022-04-05 岚图汽车科技有限公司 Vehicle communication key management method and device, storage medium and equipment
CN116150796B (en) * 2023-04-18 2023-12-08 安羚科技(杭州)有限公司 Data protection method and device for data leakage prevention system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603496A (en) * 2016-11-18 2017-04-26 新智数字科技有限公司 Data transmission protection method, intelligent card, server, and communication system
CN109218266A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN111448812A (en) * 2018-12-27 2020-07-24 深圳市大疆软件科技有限公司 Information transmission method, storage medium, information transmission system, and unmanned aerial vehicle
CN112543189A (en) * 2020-11-27 2021-03-23 北京中电飞华通信有限公司 Data secure transmission method and system
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109075967B (en) * 2017-12-18 2020-12-29 深圳市大疆创新科技有限公司 Data interaction method based on unmanned aerial vehicle, ground control terminal, server and system
CN108683665A (en) * 2018-05-15 2018-10-19 国家电网公司 Data ciphering method, system in fiber optic communication and data transmitting equipment
CN109474667B (en) * 2018-10-12 2021-05-25 广州雷迅创新科技股份有限公司 Unmanned aerial vehicle communication method based on TCP and UDP
CN110224821B (en) * 2019-06-06 2021-11-09 安徽问天量子科技股份有限公司 Communication encryption method for unmanned mobile platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603496A (en) * 2016-11-18 2017-04-26 新智数字科技有限公司 Data transmission protection method, intelligent card, server, and communication system
CN109218266A (en) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 Travelling data acquisition methods and device
CN111448812A (en) * 2018-12-27 2020-07-24 深圳市大疆软件科技有限公司 Information transmission method, storage medium, information transmission system, and unmanned aerial vehicle
CN112543189A (en) * 2020-11-27 2021-03-23 北京中电飞华通信有限公司 Data secure transmission method and system
CN112906037A (en) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 Communication encryption system, method and device

Also Published As

Publication number Publication date
CN112906037A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
WO2022199404A1 (en) Communication encryption
US20220021534A1 (en) Location aware cryptography
CN110008735B (en) Method, node and storage medium for realizing contract calling in block chain
CN111541725B (en) Block chain all-in-one machine, password acceleration card thereof, and key management method and device
CN110661618B (en) Data transmission method and device and electronic equipment
TWI743651B (en) Network card, data sending/receiving method and equipment
WO2021022794A1 (en) Rdma-based data transmission method, network card, server and medium
CN111555880B (en) Data collision method and device, storage medium and electronic equipment
CN105099653A (en) Distributed data processing method, device and system
Avdonin et al. A method of creating perfectly secure data transmission channel between unmanned aerial vehicle and ground control station based on one-time pads
CN110650119B (en) Data transmission method and device and electronic equipment
US10339323B2 (en) Group license encryption and decryption
CN110598416B (en) Transaction scheduling method and device
CN114301677B (en) Key negotiation method, device, electronic equipment and storage medium
CN109711178B (en) Key value pair storage method, device, equipment and storage medium
JP6058514B2 (en) Cryptographic processing method, cryptographic system, and server
WO2024001037A1 (en) Message transmission method and apparatus, electronic device and storage medium
WO2022171177A1 (en) Communication key configuration method and apparatus
CN114327255A (en) Memory interface controller and memory
CN113961931A (en) Adb tool using method and device and electronic equipment
KR20170107818A (en) Data sharing system and method based on attributed re-encryption
WO2021031828A1 (en) Data transmission method, device and electronic apparatus
AU2019238635A1 (en) Method and terminal for establishing security infrastructure and device
US11201856B2 (en) Message security
EP4145762B1 (en) Method and system for enabling secure processing of data using a processing application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22774066

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22774066

Country of ref document: EP

Kind code of ref document: A1