WO2022199404A1 - Chiffrement de communication - Google Patents

Chiffrement de communication Download PDF

Info

Publication number
WO2022199404A1
WO2022199404A1 PCT/CN2022/080432 CN2022080432W WO2022199404A1 WO 2022199404 A1 WO2022199404 A1 WO 2022199404A1 CN 2022080432 W CN2022080432 W CN 2022080432W WO 2022199404 A1 WO2022199404 A1 WO 2022199404A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
ciphertext
mixed data
unmanned
data
Prior art date
Application number
PCT/CN2022/080432
Other languages
English (en)
Chinese (zh)
Inventor
方超
Original Assignee
北京三快在线科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京三快在线科技有限公司 filed Critical 北京三快在线科技有限公司
Publication of WO2022199404A1 publication Critical patent/WO2022199404A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the present application relates to the technical field of information encryption.
  • Embodiments of the present disclosure provide a communication encryption system, method, and apparatus.
  • the present disclosure provides a communication encryption system, the system includes an unmanned device and a control station, and the control station pre-stores the equipment of the unmanned device identification, wherein: the unmanned device is configured to generate a key through a symmetric encryption algorithm and send the key to the control station; the control station is configured to The device identifier of the device and the target data to be sent are XOR-encrypted to determine the first mixed data; the control station is configured to encrypt the first mixed data according to the key to obtain the first ciphertext, and send the first ciphertext to the unmanned device; the unmanned device is configured to decrypt the received first ciphertext according to the key, and determine the first ciphertext. Mix data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data.
  • the present disclosure also provides a communication encryption method, including: performing XOR encryption according to a pre-stored device identifier of an unmanned device and target data to be sent to determine the first mixed data;
  • the first mixed data is encrypted to obtain a first ciphertext, and the first ciphertext is sent to the unmanned device, so that the unmanned device can, according to the key, Decrypt the first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data; wherein, the key is the unmanned
  • the driving device is generated and sent through a symmetric encryption algorithm.
  • the present disclosure provides a communication encryption device, comprising: a mixing module that performs XOR encryption according to a pre-stored device identifier of an unmanned device and target data to be sent to determine the first mixed data; an encryption and decryption module , encrypting the first mixed data according to the key to obtain the first ciphertext, and sending the first ciphertext to the unmanned device, so that the unmanned device, according to the key, Decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein the key is The unmanned vehicle is generated and sent through a symmetric encryption algorithm.
  • the present disclosure provides a computer-readable storage medium, where a computer program is stored in the storage medium, and when the computer program is executed by a processor, the foregoing communication encryption method is implemented.
  • the unmanned device in the system can generate a key through a symmetric encryption algorithm and send it to the control station, and the control station in the system can generate a key by using a symmetric encryption algorithm.
  • the target data to be sent can be encrypted according to the pre-stored device identification of the unmanned device, the first mixed data can be determined, and the first mixed data can be re-encrypted according to the received key to obtain the first ciphertext. Sent to the unmanned device.
  • the unmanned device After receiving the first ciphertext, the unmanned device can decrypt the first ciphertext by using the key generated by the symmetric encryption algorithm to obtain the first mixed data, and then according to its own device identification, decrypt the obtained first ciphertext. A mixed data is decrypted again to obtain the target data. Both parties in the system perform XOR encryption and decryption on the transmitted target data through the device identification of the unmanned device, which further enhances the security of information transmission.
  • FIG. 1 is a schematic diagram of a communication encryption system according to an embodiment of the present disclosure
  • FIG. 2 is an interactive schematic diagram of a ground terminal transmitting information to an unmanned aerial vehicle according to an embodiment of the present disclosure
  • FIG. 3 is an interactive schematic diagram of a UAV transmitting information to a ground terminal according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of transmitting a key based on an asymmetric encryption algorithm according to an embodiment of the present disclosure
  • FIG. 5 is a schematic flowchart of a communication encryption method according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a communication encryption apparatus according to an embodiment of the present disclosure.
  • the unmanned equipment needs to communicate with the control station in real time to transmit control instructions or collected images and other information.
  • the information transmitted between the two parties can be encrypted.
  • Common encryption algorithms include symmetric encryption algorithms and asymmetric encryption algorithms.
  • the symmetric encryption algorithm means that both the sender and the receiver use the same key for encryption and decryption
  • the asymmetric encryption algorithm means that the sender and the receiver use different keys for encryption and decryption
  • the sender uses the public key to encrypt and decrypt the transmitted data.
  • the information is encrypted, and the recipient decrypts the encrypted ciphertext through the private key.
  • the unmanned device and the control station need to exchange the key first, and then transmit the encrypted ciphertext to decrypt the encrypted ciphertext through the key.
  • the key transmitted by both parties is hijacked, the subsequent encryption is invalid, so the security of the symmetric encryption algorithm is low.
  • the unmanned device When an asymmetric encryption algorithm is used to encrypt the information transmitted between the two parties, if the unmanned device sends information to the control station, the control station needs to generate the first public key and the first private key through the asymmetric encryption algorithm, and Send the generated first public key to the unmanned device, then the unmanned device can encrypt the information to be transmitted with the first public key, and send the encrypted ciphertext to the control station, so that the control station can pass the first private key. key to decrypt the encrypted ciphertext.
  • the unmanned device When the control station sends information to the unmanned device, the unmanned device can generate a second public key and a second private key through an asymmetric encryption algorithm, and send the generated second public key to the control station, then the control station can The information to be transmitted is encrypted with the second public key, and the encrypted ciphertext is sent to the unmanned device, so that the unmanned device can decrypt the encrypted ciphertext through the second private key.
  • the information receiver needs to generate a new public key and private key through an asymmetric encryption algorithm, and send the newly generated public key to the information sender. Therefore, the preparation time for both parties in the information transmission process is long, that is, the time required to generate and exchange keys is long, resulting in long information transmission time and low transmission efficiency.
  • the present disclosure provides a communication encryption system, which can reduce the information transmission delay caused by key exchange while enhancing the security of information transmission.
  • the system includes an unmanned device 100 and a control station 102, wherein the unmanned device 100 may be an unmanned aerial vehicle, an unmanned vehicle, an unmanned boat, and a control station 102.
  • the control station 102 refers to a control center that controls the unmanned device 100 to perform tasks.
  • the unmanned device 100 as an unmanned aerial vehicle and the control station 102 corresponding to the unmanned aerial vehicle as a ground terminal as an example.
  • the drone and the ground terminal transmit information through wireless transmission technology
  • the drone can transmit the key required for information encryption and decryption to the ground terminal
  • the ground terminal can encrypt based on the key to obtain the first key. ciphertext, and send the first ciphertext to the drone.
  • the ground terminal can also transmit flight control instructions to the UAV, and the UAV can transmit the collected images and other information to the ground terminal.
  • the ground terminal usually refers to the server on the ground that controls the flight of the UAV, which may be a single server or a system composed of multiple servers, such as a distributed server system, which is not limited in this disclosure. Can be set as required.
  • the present disclosure provides a low-latency communication encryption system, which can further shorten the information transmission time on the premise of ensuring security.
  • FIG. 2 is a schematic diagram of the interaction between the ground end transmitting information to the UAV.
  • the drone generates a key through a symmetric encryption algorithm and sends it to the ground terminal as an example for description.
  • the corresponding information encryption systems and methods are similar, and only subject exchange is implemented. Therefore, although the present disclosure
  • the information encryption system and method based on one information transmission direction are described, but the information encryption system and method based on another information transmission direction also belong to the protection scope of this application.
  • the ground terminal can, according to the pre-stored device identification of the drone, identify the key to be sent.
  • the target data is XOR-encrypted to generate first mixed data. Since the device identification of the drone is pre-agreed between the ground and the drone and is not carried in the information for transmission, even if a third party hijacks the key, the encrypted ciphertext cannot be decrypted according to the key.
  • the target data to be transmitted is usually larger than the data of the device identification of the drone, and the data length is longer, so when performing XOR encryption, the device identification of the drone can be used to perform a zero-fill operation, Or repeat the device identification of the drone several times to ensure that the data for XOR processing is the same as the data bits of the target data to be transmitted, which is convenient for XOR processing.
  • the target data to be transmitted is 0110
  • the device ID of the drone is 01
  • a 0-fill operation can be performed to make it match the bit of the target data.
  • the numbers are the same, and the target data is XORed by adding 0 to the data 0100.
  • the device identification of the drone can also be repeated several times to make it the same as the number of data bits of the target data, and the target data can be XORed through the repeated data 0101.
  • the ground terminal can encrypt the first mixed data to obtain the first ciphertext according to the received key, and send the first ciphertext to the drone.
  • the drone can decrypt the received first ciphertext according to the key generated by itself and the symmetric encryption algorithm used to determine the first mixed data.
  • the UAV can decrypt the received first ciphertext according to the key generated by itself to determine the first mixed data.
  • the UAV can perform XOR decryption on the first mixed data according to its own device identification, and determine the target data transmitted by the ground terminal, so as to perform corresponding operations according to the target data. For example, when the target data is a flight control command, the UAV can adjust flight parameters according to the flight control command.
  • the data volume of the first mixed data is often larger than the data volume of the device identifier of the drone, when using the device identifier to XOR decrypt the first mixed data, it is necessary to adopt the same method as the above for the device identifier.
  • the same operation as XOR encryption If the device ID is filled with 0 and then XOR encryption is performed, the device ID needs to be filled with 0 and then XOR decrypted. Similarly, if the device ID is repeated and then XOR encryption is performed, it is also necessary to The device identification is repeated and then XOR decrypted.
  • the information transmission process shown in Figure 2 above is the process of transmitting information from the ground terminal to the UAV.
  • the interactive schematic diagram of the information transmission from the UAV to the ground terminal is shown in Figure 3.
  • the drone can also perform XOR encryption according to its own device identification and the reply data to be sent to determine the second mixed data. After that, encrypt the second mixed data again according to the self-generated key to obtain a third ciphertext, and send the third ciphertext to the ground terminal.
  • the ground terminal When the ground terminal receives the third ciphertext sent by the UAV, it can decrypt the third ciphertext according to the previously received key to obtain the second mixed data. Device identification, XOR decryption of the second mixed data, and get the reply data actually transmitted by the drone.
  • the drone generates a key through a symmetric encryption algorithm and sends the generated key to the ground terminal as an example for description.
  • both the UAV and the ground side that use the symmetric encryption algorithm for encrypted transmission use the same encryption key, and only need to exchange the key before the encrypted transmission. Therefore, the key can also be generated by the ground terminal through a symmetric encryption algorithm, and the generated key can be sent to the UAV, which is not limited in the present disclosure, and can be set as required.
  • the key in order to ensure the security of key transmission, may be encrypted and transmitted through an asymmetric encryption algorithm.
  • the ground terminal in order to encrypt and transmit the key, before the UAV sends the key to the ground terminal, the ground The terminal generates a public key and a private key through an asymmetric encryption algorithm, and sends the public key to the drone.
  • the UAV After the UAV generates a key through a symmetric encryption algorithm, it can encrypt the key according to the received public key, generate a second ciphertext, and send the second ciphertext to the ground terminal to ensure the transmission of the key security.
  • the ground terminal can decrypt the received second ciphertext according to the private key generated by itself and the used asymmetric encryption algorithm to obtain the transmitted key.
  • the ground terminal can decrypt the received second ciphertext according to the private key generated by itself to obtain the transmitted key.
  • the drone can pass the asymmetric encryption before the ground terminal sends the key to the drone.
  • the algorithm generates a public key and a private key, and sends the public key to the ground terminal. So that the ground terminal encrypts the key to be transmitted according to the received public key, obtains the second ciphertext, and sends the second ciphertext to the drone. After that, the drone can decrypt the second ciphertext according to the private key generated by the asymmetric encryption algorithm to obtain the key.
  • the above-mentioned symmetric encryption algorithm may specifically use a stream cipher, then when the ground terminal uses the key to encrypt the first mixed data, the ground terminal can first encrypt the
  • the initial key input pseudo-random number generator (pseudo-random number generator, PRNG), generates a pseudo-random key stream (pseudo-random keystream), and uses the pseudo-random key stream to XOR the first mixed data Encrypt, determine the first ciphertext.
  • PRNG pseudo-random number generator
  • the drone When the drone decrypts the received first ciphertext, it also needs to input the initial key into the pseudo-random number generator to generate a pseudo-random key stream, and through the pseudo-random key stream, the first encrypted XOR decryption is performed on the text to obtain the first mixed data.
  • the drone when the drone uses the key to encrypt the second mixed data, the drone may also first input the initial key into a pseudo-random number generator, generate a pseudo-random key stream, and use The pseudo-random key stream performs XOR encryption on the second mixed data to determine the third ciphertext.
  • the initial key also needs to be input into the pseudo-random number generator to generate a pseudo-random key stream, and through the pseudo-random key stream, the third ciphertext is differentiated. or decryption to obtain the second mixed data.
  • the UAV and the ground end need to re-determine the key before each communication, and the two parties exchange keys. That is to say, every time the drone and the ground end communicate, they need to regenerate the key through the above steps and exchange the key, and then use the key for encrypted transmission.
  • each communication process between the UAV and the ground end can last for a period of time, and during the communication process, the two parties can transmit information to each other multiple times. Moreover, since the same key is used in each communication process, only one key needs to be generated and one key transmission is performed in each communication process.
  • both the UAV and the ground terminal may use an asymmetric encryption algorithm to encrypt and transmit the key when transmitting the key. Since the UAV and the ground end only need to transmit the key once in each communication process, the UAV and the ground end only need to use an asymmetric encryption algorithm once in each communication process to encrypt the transmitted key. . Among them, in each communication process between the UAV and the ground terminal, after the two parties exchange keys, each subsequent information transmission between the two parties can directly use the exchanged key to encrypt and decrypt the transmitted information.
  • the ground terminal can control the flight of multiple drones at the same time, the ground terminal can communicate with several drones at the same time. Therefore, when the two parties transmit information, the transmitted information should also be It includes the unique identifier of the UAV that is communicating, so that the ground terminal can determine the device identifier of the UAV from the device identifiers of the UAVs stored in advance according to the unique identifier of the UAV, and use the unique identifier of the UAV. The device identification of the drone, and decrypt the information transmitted by the drone.
  • the UAV in the system can generate a key through a symmetric encryption algorithm and send it to the ground terminal.
  • the target data to be sent is encrypted, the first mixed data is determined, and the first mixed data is encrypted again according to the received key to obtain the first ciphertext and send it to the drone.
  • the drone After the drone receives the first ciphertext, it can decrypt the first ciphertext through the key generated by the symmetric encryption algorithm to obtain the first mixed data, and then according to its own device identification, decrypt the obtained first ciphertext.
  • the mixed data is decrypted again to obtain the target data.
  • both the UAV and the ground terminal perform XOR encryption and decryption on the transmitted target data through the device identification of the UAV, which further enhances the security of information transmission.
  • the key transmission can also be encrypted by an asymmetric encryption algorithm to ensure the security of the key transmission.
  • the UAV and the ground end only need to pass the asymmetric encryption algorithm in each communication process.
  • the key is transmitted once, so under the premise of ensuring the security of information transmission, the delay of information transmission is small.
  • the communication encryption system shown in this disclosure can also be used for information transmission between unmanned vehicles 100 such as unmanned vehicles and unmanned ships and their corresponding control stations 102, which will not be described in detail in this disclosure.
  • the present disclosure also provides a communication encryption method used in the communication encryption system, as shown in FIG. 5 .
  • FIG. 5 is a schematic flowchart of a communication encryption method provided by an embodiment of the present disclosure, wherein the communication encryption method may be used in a communication encryption system, and may specifically include the following steps:
  • S200 Perform XOR encryption according to the pre-stored device identifier of the unmanned device and the target data to be sent to determine the first mixed data.
  • the communication encryption system in the present disclosure includes an unmanned device and a control station, wherein the unmanned device may be one of devices such as an unmanned aerial vehicle, an unmanned vehicle, an unmanned ship, and a robot.
  • the control center where the manned device performs the mission.
  • the unmanned equipment is an unmanned aerial vehicle
  • the control station of the unmanned aerial vehicle is the ground terminal as an example.
  • the ground terminal usually refers to a server on the ground that controls the flight of the drone.
  • the server can send flight control instructions to the drone, receive information such as images collected by the drone, and transmit information with the drone.
  • the server may be a single server, or a system composed of multiple servers, such as a distributed server system, etc., which is not limited in the present disclosure, and can be specifically set as required.
  • the communication encryption method provided by the present disclosure can be specifically executed by either the drone or the ground terminal in the communication encryption system.
  • the present disclosure takes the ground terminal as the execution subject as an example for description.
  • the ground terminal when the ground terminal transmits information to the drone, the ground terminal may perform XOR encryption on the target data to be sent according to the pre-stored device identifier of the drone to obtain the first mixed data.
  • the data length of the device identification of the UAV when the data length of the device identification of the UAV is less than the data length of the target data, it can be processed by a 0-fill operation or a repeated operation, which has been described in detail on the above-mentioned system side, and will not be repeated here.
  • S202 Encrypt the first mixed data according to the key to obtain a first ciphertext, and send the first ciphertext to the unmanned device, so that the unmanned device, according to the key, The received first ciphertext is decrypted to determine the first mixed data, and the first mixed data is XOR decrypted according to its own device identification to determine the target data.
  • a key generated by a symmetric encryption algorithm can be used for the first mixed data. data encryption.
  • the ground terminal can encrypt the first mixed data obtained in step S200 again according to the key to obtain the first ciphertext, and send the first ciphertext to the drone.
  • the key may be generated by the ground terminal through a symmetric encryption algorithm, or may be generated by the drone through a symmetric encryption algorithm and sent to the ground terminal, which is not limited in this disclosure, and can be set as required.
  • the ground terminal also needs to transmit the key to the UAV, so that the UAV can decrypt the transmitted encrypted information through the key.
  • the drone when it receives the first ciphertext sent by the ground terminal, it can decrypt the first ciphertext through the key to obtain the first mixed data, and use its own device identification to decrypt the obtained first ciphertext again. Decrypt the mixed data to obtain the target data.
  • the ground terminal in the system can first perform XOR encryption according to the pre-stored device identification of the UAV and the target data to be sent to determine the first mixed data. After that, encrypt the first mixed data according to the key to obtain the first ciphertext, and send the first ciphertext to the drone, so that the drone decrypts the first ciphertext according to the key to determine the first ciphertext. Mix the data, and perform XOR decryption on the decrypted first mixed data according to its own device identification to determine the target data. The XOR encryption and decryption of the transmitted information is carried out through the device identification of the drone, which greatly improves the security of information transmission.
  • the communication encryption method can be used in the above-mentioned communication encryption system.
  • the communication encryption process please refer to the detailed description of information encryption transmission in the communication encryption system provided in this disclosure.
  • the detailed description reference can be made to the foregoing description, which will not be repeated in the present disclosure.
  • the UAV when the UAV is used as the execution subject to execute the communication encryption method, the UAV can generate a key and send the key to the ground terminal, and then can receive the information sent by the control station. the first ciphertext, and decrypt the received first ciphertext according to the key to determine the first mixed data, and then perform XOR decryption on the first mixed data according to its own device identification to determine the target data.
  • the specific encryption transmission method on the UAV side has been described in detail in the above-mentioned communication encryption system, so reference can be made to the foregoing, which will not be repeated in this disclosure.
  • the communication encryption method provided by the present disclosure can be specifically used in the process of unmanned distribution.
  • the control station and the unmanned device can transmit the delivery instruction and the unmanned device through the communication encryption method in the present disclosure. Real-time location and other information to ensure the security of information transmission between the two parties and further improve the security of unmanned distribution.
  • an embodiment of the present disclosure also provides a schematic structural diagram of a communication encryption device, as shown in FIG. 6 .
  • FIG. 6 is a schematic structural diagram of a communication encryption device provided by an embodiment of the present disclosure, including:
  • the mixing module 300 performs XOR encryption according to the pre-stored device identifier of the unmanned device and the target data to be sent to determine the first mixed data;
  • the encryption and decryption module 302 encrypts the first mixed data according to the key to obtain a first ciphertext, and sends the first ciphertext to the unmanned device, so that the unmanned device can obtain the first ciphertext according to the encryption key.
  • key decrypt the received first ciphertext to determine the first mixed data, and perform XOR decryption on the first mixed data according to its own device identification to determine the target data, wherein the key is
  • the unmanned vehicle is generated and sent through a symmetric encryption algorithm.
  • An embodiment of the present disclosure further provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program can be used to execute the communication encryption method provided in FIG. 5 above.
  • a Programmable Logic Device (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device.
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller may be implemented in any suitable manner, for example, the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the control logic of the memory.
  • the controller may take the form of eg a microprocessor or processor and a computer readable medium storing computer readable program code (eg software or firmware) executable by the (micro)processor , logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers
  • ASICs application specific integrated circuits
  • controllers include but are not limited to
  • the controller in addition to implementing the controller in the form of pure computer-readable program code, the controller can be implemented as logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded devices by logically programming the method steps.
  • the same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure within the hardware component. Or even, the means for implementing various functions can be regarded as both a software module implementing a method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
  • embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
  • the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include forms of non-persistent memory, random access memory (RAM) and/or non-volatile memory in computer readable media, such as read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • ROM read only memory
  • flash RAM flash memory
  • Computer readable media includes both persistent and non-permanent, removable and non-removable media, and can be implemented by any method or technology for storage of information.
  • Information may be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
  • computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
  • embodiments of the present disclosure may be provided as a method, system or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including, but not limited to, disk storage, CD-ROM, optical storage, etc.
  • program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
  • the disclosure may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote computer storage media including storage devices.

Abstract

La présente divulgation concerne un système, un procédé et un appareil de chiffrement de communication. Un dispositif sans pilote dans le système peut générer une clé au moyen d'un algorithme de chiffrement symétrique et envoyer celle-ci à une station de commande ; et la station de commande dans le système peut, en fonction d'un identifiant de dispositif pré-stocké du dispositif sans pilote, chiffrer des données cibles à envoyer, déterminer des premières données hybrides et chiffrer de nouveau les premières données hybrides selon une clé reçue de façon à obtenir un premier texte chiffré et les envoyer au dispositif sans pilote. Après réception du premier texte chiffré, le dispositif sans pilote peut déchiffrer le premier texte chiffré au moyen de la clé générée par l'algorithme de chiffrement symétrique pour obtenir les premières données hybrides, puis déchiffrer les premières données hybrides obtenues en fonction d'un identifiant de dispositif de celui-ci pour obtenir des données cibles. Dans le système, deux parties effectuent un chiffrement et un déchiffrement XOR sur les données cibles transmises au moyen de l'identifiant de dispositif du dispositif sans pilote, ce qui améliore davantage la sécurité de la transmission d'informations.
PCT/CN2022/080432 2021-03-26 2022-03-11 Chiffrement de communication WO2022199404A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110324354.1 2021-03-26
CN202110324354.1A CN112906037A (zh) 2021-03-26 2021-03-26 一种通信加密系统、方法及装置

Publications (1)

Publication Number Publication Date
WO2022199404A1 true WO2022199404A1 (fr) 2022-09-29

Family

ID=76108775

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/080432 WO2022199404A1 (fr) 2021-03-26 2022-03-11 Chiffrement de communication

Country Status (2)

Country Link
CN (1) CN112906037A (fr)
WO (1) WO2022199404A1 (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906037A (zh) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 一种通信加密系统、方法及装置
CN113645209A (zh) * 2021-07-30 2021-11-12 北京三快在线科技有限公司 一种基于白盒的车机端软件加解密方法及装置
CN113724482B (zh) * 2021-08-05 2023-05-30 北京三快在线科技有限公司 一种射频遥控方法、装置、存储介质及电子设备
CN113891312A (zh) * 2021-09-27 2022-01-04 深圳市道通智能航空技术股份有限公司 无人机数据加密传输方法、装置、设备及存储介质
CN114282232A (zh) * 2021-11-22 2022-04-05 岚图汽车科技有限公司 车辆通信密钥的管理方法、装置、存储介质及设备
CN116150796B (zh) * 2023-04-18 2023-12-08 安羚科技(杭州)有限公司 用于数据防泄露系统的数据防护方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603496A (zh) * 2016-11-18 2017-04-26 新智数字科技有限公司 一种数据传输的保护方法、智能卡、服务器及通信系统
CN109218266A (zh) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 行车数据获取方法和装置
CN111448812A (zh) * 2018-12-27 2020-07-24 深圳市大疆软件科技有限公司 信息传输方法、存储介质、信息传输系统及无人飞行器
CN112543189A (zh) * 2020-11-27 2021-03-23 北京中电飞华通信有限公司 数据安全传输方法和系统
CN112906037A (zh) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 一种通信加密系统、方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019119238A1 (fr) * 2017-12-18 2019-06-27 深圳市大疆创新科技有限公司 Procédé et système d'échange de données basés sur un véhicule aérien sans pilote, et terminal de commande et serveur au sol
CN108683665A (zh) * 2018-05-15 2018-10-19 国家电网公司 光纤通信中的数据加密方法、系统及数据发送设备
CN109474667B (zh) * 2018-10-12 2021-05-25 广州雷迅创新科技股份有限公司 一种基于tcp和udp的无人机通信方法
CN110224821B (zh) * 2019-06-06 2021-11-09 安徽问天量子科技股份有限公司 一种无人移动平台的通信加密方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603496A (zh) * 2016-11-18 2017-04-26 新智数字科技有限公司 一种数据传输的保护方法、智能卡、服务器及通信系统
CN109218266A (zh) * 2017-07-04 2019-01-15 百度在线网络技术(北京)有限公司 行车数据获取方法和装置
CN111448812A (zh) * 2018-12-27 2020-07-24 深圳市大疆软件科技有限公司 信息传输方法、存储介质、信息传输系统及无人飞行器
CN112543189A (zh) * 2020-11-27 2021-03-23 北京中电飞华通信有限公司 数据安全传输方法和系统
CN112906037A (zh) * 2021-03-26 2021-06-04 北京三快在线科技有限公司 一种通信加密系统、方法及装置

Also Published As

Publication number Publication date
CN112906037A (zh) 2021-06-04

Similar Documents

Publication Publication Date Title
WO2022199404A1 (fr) Chiffrement de communication
US20220021534A1 (en) Location aware cryptography
CN110008735B (zh) 区块链中实现合约调用的方法及节点、存储介质
CN111541725B (zh) 区块链一体机及其密码加速卡、密钥管理方法和装置
CN110661618B (zh) 数据传输方法、装置和电子设备
TWI743651B (zh) 網路卡、資料發送/接收方法及設備
WO2021022794A1 (fr) Procédé de transmission de données fondée sur un rdma, carte réseau, serveur et support
CN111555880B (zh) 数据碰撞方法、装置、存储介质及电子设备
CN105099653A (zh) 分布式数据处理方法、装置及系统
Avdonin et al. A method of creating perfectly secure data transmission channel between unmanned aerial vehicle and ground control station based on one-time pads
CN110650119B (zh) 数据传输方法、装置和电子设备
CN110598416B (zh) 交易调度方法及装置
CN114301677B (zh) 秘钥协商方法、装置、电子设备及存储介质
CN109711178B (zh) 一种键值对的存储方法、装置、设备及存储介质
JP6058514B2 (ja) 暗号処理方法、暗号システム、およびサーバ
WO2024001037A1 (fr) Procédé et appareil de transmission de message, dispositif électronique et support de stockage
WO2022171177A1 (fr) Procédé et appareil de configuration de clé de communication
CN114327255A (zh) 存储器接口控制器及存储器
CN113961931A (zh) adb工具使用方法、装置和电子设备
KR20170107818A (ko) 사용자 단말 및 속성 재암호 기반의 사용자 단말 데이터 공유 방법
WO2021031828A1 (fr) Procédé, dispositif et appareil de transmission de données
AU2019238635A1 (en) Method and terminal for establishing security infrastructure and device
US11201856B2 (en) Message security
EP4145762B1 (fr) Procédé et système permettant le traitement sécurisé de données à l'aide d'application de traitement
WO2021027598A1 (fr) Procédé et appareil permettant de déterminer un paramètre de modèle, et dispositif électronique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22774066

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22774066

Country of ref document: EP

Kind code of ref document: A1