[go: up one dir, main page]

CN114786176A - Wireless communication encryption method, decryption method, computer device and storage medium - Google Patents

Wireless communication encryption method, decryption method, computer device and storage medium Download PDF

Info

Publication number
CN114786176A
CN114786176A CN202210701890.3A CN202210701890A CN114786176A CN 114786176 A CN114786176 A CN 114786176A CN 202210701890 A CN202210701890 A CN 202210701890A CN 114786176 A CN114786176 A CN 114786176A
Authority
CN
China
Prior art keywords
encryption
encryption code
preset
wireless communication
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210701890.3A
Other languages
Chinese (zh)
Inventor
陈福远
龙敏丽
黄冰
黄海鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Topway Network Co ltd
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Original Assignee
Guangdong Topway Network Co ltd
Foshan Power Supply Bureau of Guangdong Power Grid Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Topway Network Co ltd, Foshan Power Supply Bureau of Guangdong Power Grid Corp filed Critical Guangdong Topway Network Co ltd
Priority to CN202210701890.3A priority Critical patent/CN114786176A/en
Publication of CN114786176A publication Critical patent/CN114786176A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a wireless communication encryption method, a decryption method, computer equipment and a storage medium, wherein the encryption code is checked through a preset password table for storing used encryption codes in the encryption method, original data is encrypted after the check, then the encryption code is checked through the preset password table for storing the used encryption codes in the decryption method, if the password is used in the check process, the data is regarded as cloned data, and the verification is not passed.

Description

Wireless communication encryption method, decryption method, computer device and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a wireless communication encryption method, a wireless communication decryption method, a computer device, and a storage medium.
Background
Encryption technologies used in the current data transmission process, such as DES and AES encryption technologies, encrypt data through a complex encryption algorithm and transmit the encrypted data, and decrypt the data using the same algorithm after receiving the encrypted data. However, the encryption is realized by the algorithm, the requirements on software and hardware resources are high, the CPU operation capability of general Internet of things equipment is limited, and a single chip microcomputer for example is not easy to realize a complex encryption algorithm. If a simple encryption method is adopted, access of illegal equipment and monitoring and tampering of data are easy to happen, and data security is low.
Disclosure of Invention
The invention mainly aims to provide a wireless communication encryption method, a wireless communication encryption device, computer equipment and a storage medium, which can solve the technical problem that the data security is not high due to the fact that an illegal device is easily accessed and data is easily monitored and tampered by adopting a simple encryption method in the prior art.
The invention provides a wireless communication encryption method, which comprises the following steps:
the method comprises the following steps: acquiring original data;
step two: generating an encryption code based on the original data;
step three: checking the encryption code based on a preset password table, and judging whether the encryption code is used or not, wherein the password table is used for storing the used encryption code;
step four: if yes, executing the step two; if not, encrypting the original data based on a preset encryption rule to obtain encrypted data.
Further, the checking the encryption code based on a preset password table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the method comprises:
detecting whether the storage space of the password table is completely occupied or not;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
Further, the cryptographic table is created on a memory of the CPU.
Further, the preset encryption rule includes: and inserting the encryption code at a preset position of the original data.
A wireless communication decryption method, comprising:
acquiring encrypted data;
acquiring an encryption code according to the encrypted data;
checking the encryption code based on a preset password table, and judging whether the encryption code is used or not, wherein the password table is used for storing the used encryption code;
if yes, the verification is not passed; if not, the encrypted data is decrypted based on a preset decryption rule to obtain decrypted data, and then the decrypted data is further obtained.
Further, the checking the encryption code based on a preset encryption table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the checking comprises:
detecting whether the storage space of the password table is completely occupied or not;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used currently.
Further, the cryptographic table is created on a memory of the CPU.
Further, the preset decryption rule includes: and removing the encryption code at a preset position of the encrypted data.
The invention also provides a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the above methods when the processor executes the computer program.
The invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of any one of the above.
Compared with the prior art, the invention provides a wireless communication encryption method, a decryption method, computer equipment and a storage medium, wherein the encryption code is checked through a preset password table for storing used encryption codes in the encryption method, the original data is encrypted after the check, then the encryption code is checked through the preset password table for storing the used encryption codes in the decryption method, the data is regarded as cloned data after the password is used in the check process, and the verification fails.
Drawings
Fig. 1 is a schematic diagram illustrating steps of a wireless communication encryption method according to an embodiment of the present application;
FIG. 2 is a diagram illustrating steps of a wireless communication decryption method according to an embodiment of the present application;
FIG. 3 is a block diagram illustrating a computer device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, a wireless communication encryption method according to an embodiment of the present invention includes:
the invention provides a wireless communication encryption method, which comprises the following steps:
s11, step one: acquiring original data;
s12, step two: generating an encryption code based on the original data;
s13, step three: checking the encryption code based on a preset password table, and judging whether the encryption code is used or not, wherein the password table is used for storing the used encryption code;
s14, step four: if yes, executing the step two; if not, encrypting the original data based on a preset encryption rule to obtain encrypted data.
In the above step S11, the original data may include a start bit, a data field, a check field, and an end bit. Wherein the start bit indicates the start of a frame data packet (i.e., a data frame); the end bit indicates the end of a frame data packet; the data field comprises data which needs to be transmitted actually; the Check field includes a Check value for ensuring correctness of data transmission, and in practical application, a CRC (cyclic redundancy Check) mode, a parity mode, and the like may be adopted, which is not specifically limited in the embodiment of the present invention. Wherein, the content of the data field can be customized according to the service requirement. In a specific application, the data frame format may further include a packet length (indicating a total length of a data packet of a frame), a data type (e.g., service data, management data), and the like, which may be defined according to actual requirements.
In the above step S12, when the terminal receives the original data, the encryption code may be randomly generated by the terminal through some algorithm based on the C language. For example, c + +11 < random > c + +11 introduces a < random > header file for generating random numbers. It comprises two parts: random engine, used to generate random bit stream; distribution is used to generate random numbers that meet user requirements. The generated random number may be used as an encryption code. The application method comprises the following steps: random _ device is initialized by using seed, preferably std:, random _ device generates different random bit streams each time the random _ device runs, and if the same sequence is generated at each start-up, a constant int is used for initializing a distribution object by using a min-max range value. The randomly generated encryption code may be obtained in various ways, and is not limited in any way.
In the step S13, after generating the encryption code, it is required to query whether the encryption code of the corresponding original data has been used by table lookup, otherwise, the encryption code is considered to be illegal. Since the encryption code is randomly generated, a repetition with a previously used password is generated with a certain probability. If the cipher table is not set, when the randomly generated encryption code is repeated with the previously used cipher, and when the receiving end decrypts the encrypted data, the used cipher is stored in the cipher table of the receiving end, and the receiving end misunderstands that the encrypted data is cloned, so that the information cannot be decrypted normally. Therefore, when the original data is encrypted at the sending end, the encryption code is checked by using the cipher table, so that the receiving end can be prevented from misjudging the encrypted information, and the normal transmission of the encrypted data is ensured.
At the above step S14, if it is judged that the currently generated encryption code corresponds to the password stored in the password table, it is verified that the encryption code has been used previously. Therefore, a new encryption code needs to be generated again, and then the new encryption code is compared with the password table until the encryption code is verified to be unused, and the original data is encrypted based on a preset encryption rule to obtain encrypted data.
Further, the checking the encryption code based on a preset encryption table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the checking comprises:
detecting whether the storage space of the password table is completely occupied;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used currently.
Since the storage space of the cipher table is limited, if the storage space of the cipher table is completely occupied, the subsequent storage of the encryption code is affected. Therefore, by removing the encryption code added at the first position, the problems that the performance of the terminal equipment is influenced when the storage space is too much and the storage capacity is full, the program operation error is caused, the new encryption code cannot be stored and the like can be avoided by adding the currently used encryption code.
Further, the cryptographic table is created on a memory of the CPU.
The common wireless communication encryption is generally realized by a complex AES encryption mode, a DES encryption mode, an RC4 encryption mode, a Rabbit encryption mode and a tripleles encryption mode, and the requirements on software and hardware resources are high. The general internet of things equipment has limited CPU computing capability, such as a single chip microcomputer and the like, complex encryption algorithm is not easy to realize, cloning is easy to realize by using a common simple encryption method, illegal equipment access and data monitoring and tampering are difficult to prevent, and the safety of data acquisition cannot be guaranteed. The method and the device are suitable for point-to-point communication in the Internet of things technology, and are used in occasions with small information amount and high encryption requirements, the encryption technology is upgraded by using small cost (CPU (Central processing Unit) operation resources and time), the hardware cost is low, the encryption strength is improved, and information cloning in wireless communication is effectively prevented.
Further, the preset encryption rule comprises: and inserting the encryption code at a preset position of the original data.
Specifically, the encryption code is inserted into the first bit of the original data, the encryption code is inserted into the last bit of the original data, the encryption code is inserted into every predetermined position (for example, 1 bit, 2 bits or 3 bits or more) in the original data, and the like, so as to perform operations such as addition, subtraction, multiplication, division, modulo addition, modulo subtraction, modulo multiplication, and modulo exponentiation. The preset encryption rule can adopt some simple encryption methods to realize the upgrade of the encryption technology with low cost (CPU operation resource and time).
Referring to fig. 2, a wireless communication decryption method includes:
s21, acquiring encrypted data;
s22, acquiring an encryption code according to the encrypted data;
s23, checking the encryption codes based on a preset encryption code table, and judging whether the encryption codes are used or not, wherein the encryption code table is used for storing the used encryption codes;
s24, if yes, the verification is not passed; if not, the encrypted data is decrypted based on a preset decryption rule to obtain decrypted data, and then the decrypted data is further obtained.
The encrypted data in step S21 has the following two cases: the wireless communication encryption method is used for encrypting and sending the original data; or accessed by illegal equipment and data is monitored and tampered. Therefore, the encrypted data described above needs to be identified by the following steps.
In the step S22, the encryption code is identified and extracted according to the rule agreed between the transmitting end and the receiving end. In this step, either the normal encrypted data or the illegally cloned encrypted data needs to obtain the encryption code, so as to facilitate the next identification of the encrypted data.
In the above steps S23 and S24, before each communication confirmation, whether the encryption code of the encrypted data has been used is checked by means of table lookup, and if not, it is determined that the encrypted data is legal; and if used, is deemed illegal. And in the communication verification process, if the password is found to be used, the data is regarded as cloned data, discarded and the verification is not passed. In short, the encryption code is only allowed to be used once, so as to prevent the clone from being reused.
Further, the checking the encryption code based on a preset password table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the method comprises:
detecting whether the storage space of the password table is completely occupied;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
Since the storage space of the cipher table is limited, if the storage space of the cipher table is completely occupied, the subsequent storage of the encryption code is affected. Therefore, by removing the first added encryption code, the problems that the performance of the terminal equipment is affected when the storage space is too much and the storage capacity is full, the program operation is wrong, the new encryption code cannot be stored and the like can be avoided by adding the currently used encryption code.
Further, the cryptographic table is created on a memory of the CPU.
The common wireless communication decryption is realized by a complex AES decryption mode, a DES decryption mode, an RC4 decryption mode, a Rabbit decryption mode and a TripleEes decryption mode, and the requirements on software and hardware resources are high. The general internet of things equipment has limited CPU computing capability, such as a single chip microcomputer and the like, complex decryption algorithms are not easy to realize, cloning is easy to be performed by using a common simple decryption method, illegal equipment access and data monitoring and tampering are difficult to prevent, and the safety of data acquisition cannot be guaranteed. The method and the device are suitable for point-to-point communication in the Internet of things technology, and are used in occasions with small information amount and high decryption requirements, the decryption technology is upgraded by using small cost (CPU (Central processing Unit) operation resources and time), the hardware cost is low, the decryption strength is improved, and information cloning in wireless communication is effectively prevented.
Further, the preset decryption rule includes: and removing the encryption code at a preset position of the encrypted data.
The decryption rules correspond to the encryption rules. And removing the encryption code at the preset position of the encrypted data to obtain the original data, and completing decryption. The decryption process performs operations such as addition, subtraction, multiplication, division, modulo addition, modulo subtraction, modulo multiplication, and modulo exponentiation. The preset decryption rule can adopt some simple encryption methods to realize the upgrade of the encryption technology with low cost (CPU operation resource and time).
Referring to fig. 3, in an embodiment of the present application, there is further provided a computer device, and an internal structure of the computer device may be as shown in fig. 3. The computer equipment comprises a processor, a memory, a network interface, a display device and an input device which are connected through a system bus. Wherein, the network interface of the computer equipment is used for connecting and communicating with an external terminal through a network. The display device of the computer equipment is used for displaying the interactive page. The input means of the computer device is for receiving input from a user. The computer device is designed with a processor for providing computing and control capabilities. The memory of the computer device includes non-volatile storage media. The non-volatile storage medium stores an operating system, a computer program, and a database. The database of the computer device is used for storing the original data. The computer program is executed by a processor to implement an encryption method/decryption method.
The processor executes the wireless communication encryption method, and the method comprises the following steps: the method comprises the following steps: acquiring original data; step two: generating an encryption code based on the original data; step three: checking the encryption code based on a preset password table, and judging whether the encryption code is used or not, wherein the password table is used for storing the used encryption code; step four: if yes, executing the step two; if not, encrypting the original data based on a preset encryption rule to obtain encrypted data.
Further, the checking the encryption code based on a preset password table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the method comprises:
detecting whether the storage space of the password table is completely occupied or not;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
Further, the cryptographic table is created on a memory of the CPU.
Further, the preset encryption rule includes: and inserting the encryption code at a preset position of the original data.
The processor executes the wireless communication decryption method, and the method comprises the following steps: acquiring encrypted data; acquiring an encryption code according to the encrypted data; checking the encryption codes based on a preset encryption table, and judging whether the encryption codes are used or not, wherein the encryption table is used for storing the used encryption codes; if yes, the verification is not passed; if not, the encrypted data is decrypted based on a preset decryption rule to obtain decrypted data, and then the decrypted data is further obtained.
Further, the checking the encryption code based on a preset encryption table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the checking comprises:
detecting whether the storage space of the password table is completely occupied;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used currently.
Further, the cryptographic table is created on a memory of the CPU.
Further, the preset decryption rule includes: and removing the encryption code at a preset position of the encrypted data.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by the processor, implements a wireless communication encryption method/decryption method.
The processor executes the wireless communication encryption method, and the method comprises the following steps: the method comprises the following steps: acquiring original data; step two: generating an encryption code based on the original data; step three: checking the encryption codes based on a preset encryption table, and judging whether the encryption codes are used or not, wherein the encryption table is used for storing the used encryption codes; step four: if yes, executing the step two; if not, encrypting the original data based on a preset encryption rule to obtain encrypted data.
Further, the checking the encryption code based on a preset password table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the method comprises:
detecting whether the storage space of the password table is completely occupied;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
Further, the cryptographic table is created on a memory of the CPU.
Further, the preset encryption rule includes: and inserting the encryption code at a preset position of the original data.
The processor executes the wireless communication decryption method, and the method comprises the following steps: acquiring encrypted data; acquiring an encryption code according to the encrypted data; checking the encryption code based on a preset password table, and judging whether the encryption code is used or not, wherein the password table is used for storing the used encryption code; if yes, the verification is not passed; if not, the encrypted data is decrypted based on a preset decryption rule to obtain decrypted data, and then the decrypted data is further obtained.
Further, the checking the encryption code based on a preset encryption table to determine whether the encryption code is used, wherein after the step of storing the used encryption code, the checking comprises:
detecting whether the storage space of the password table is completely occupied or not;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
Further, the cryptographic table is created on a memory of the CPU.
Further, the preset decryption rule includes: and removing the encryption code at a preset position of the encrypted data.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all the equivalent structures or equivalent processes that can be directly or indirectly applied to other related technical fields by using the contents of the specification and the drawings of the present application are also included in the scope of the present application.

Claims (10)

1. A method for encrypting wireless communications, comprising:
the method comprises the following steps: acquiring original data;
step two: generating an encryption code based on the original data;
step three: checking the encryption codes based on a preset encryption table, and judging whether the encryption codes are used or not, wherein the encryption table is used for storing the used encryption codes;
step four: if yes, executing the step two; if not, encrypting the original data based on a preset encryption rule to obtain encrypted data.
2. The wireless communication encryption method according to claim 1, wherein the checking of the encryption code based on a preset encryption table to determine whether the encryption code is used, wherein the step of storing the used encryption code is followed by:
detecting whether the storage space of the password table is completely occupied;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
3. The wireless communication encryption method of claim 1, wherein the cipher table is created on a memory of a CPU.
4. The wireless communication encryption method of claim 1, wherein the preset encryption rule comprises: and inserting the encryption code at a preset position of the original data.
5. A method of decrypting wireless communications, comprising:
acquiring encrypted data;
acquiring an encryption code according to the encrypted data;
checking the encryption code based on a preset password table, and judging whether the encryption code is used or not, wherein the password table is used for storing the used encryption code;
if yes, the verification is not passed; if not, decrypting the encrypted data based on a preset decryption rule to obtain decrypted data.
6. The wireless communication decryption method of claim 5, wherein the checking of the encryption codes based on a predetermined encryption table to determine whether the encryption codes are used, wherein the step of storing the used encryption codes is followed by:
detecting whether the storage space of the password table is completely occupied or not;
if so, clearing the encryption code added at the first position, and adding the encryption code which is used at present.
7. The wireless communication decryption method of claim 5, wherein the cipher table is created on a memory of the CPU.
8. The wireless communication decryption method of claim 5, wherein the preset decryption rule comprises: and removing the encryption code at a preset position of the encrypted data.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program performs the steps of the method of any of claims 1 to 4/the steps of the method of any of claims 5 to 8.
10. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4/the steps of the method of any one of claims 5 to 8.
CN202210701890.3A 2022-06-21 2022-06-21 Wireless communication encryption method, decryption method, computer device and storage medium Pending CN114786176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210701890.3A CN114786176A (en) 2022-06-21 2022-06-21 Wireless communication encryption method, decryption method, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210701890.3A CN114786176A (en) 2022-06-21 2022-06-21 Wireless communication encryption method, decryption method, computer device and storage medium

Publications (1)

Publication Number Publication Date
CN114786176A true CN114786176A (en) 2022-07-22

Family

ID=82420761

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210701890.3A Pending CN114786176A (en) 2022-06-21 2022-06-21 Wireless communication encryption method, decryption method, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN114786176A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098307A (en) * 2011-02-11 2011-06-15 重庆梦彩科技发展有限公司 Password type instant message (IM) encryption method and system in self-service bank
EP2515499A1 (en) * 2011-04-21 2012-10-24 Wibu-Systems AG Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
CN105871901A (en) * 2016-05-25 2016-08-17 深圳时瑞鸿科技有限公司 Dynamic security encryption method for Internet of Things
CN108810017A (en) * 2018-07-12 2018-11-13 中国工商银行股份有限公司 Business processing safe verification method and device
US20190229925A1 (en) * 2019-03-29 2019-07-25 Michael Kounavis Systems and methods of using cryptographic primitives for error location, correction, and device recovery
US20200228331A1 (en) * 2019-01-10 2020-07-16 Nxp B.V. Key derivation scheme for data frame transmission in ultra-wide band ranging in keyless entry systems
CN112615824A (en) * 2020-12-03 2021-04-06 清华大学 Anti-leakage one-time pad communication method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102098307A (en) * 2011-02-11 2011-06-15 重庆梦彩科技发展有限公司 Password type instant message (IM) encryption method and system in self-service bank
EP2515499A1 (en) * 2011-04-21 2012-10-24 Wibu-Systems AG Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
CN105871901A (en) * 2016-05-25 2016-08-17 深圳时瑞鸿科技有限公司 Dynamic security encryption method for Internet of Things
CN108810017A (en) * 2018-07-12 2018-11-13 中国工商银行股份有限公司 Business processing safe verification method and device
US20200228331A1 (en) * 2019-01-10 2020-07-16 Nxp B.V. Key derivation scheme for data frame transmission in ultra-wide band ranging in keyless entry systems
US20190229925A1 (en) * 2019-03-29 2019-07-25 Michael Kounavis Systems and methods of using cryptographic primitives for error location, correction, and device recovery
CN112615824A (en) * 2020-12-03 2021-04-06 清华大学 Anti-leakage one-time pad communication method and device

Similar Documents

Publication Publication Date Title
CN109756343B (en) Authentication method and device for digital signature, computer equipment and storage medium
US11797296B2 (en) Hot updating method of script file package and hot updating device of script file package
US6996723B1 (en) Data generating apparatus and data verifying apparatus
CN110868287B (en) Authentication encryption ciphertext coding method, system, device and storage medium
CN111131278B (en) Data processing method and device, computer storage medium and electronic equipment
CN112995138B (en) Data communication method and device, electronic equipment and readable storage medium
US20200044838A1 (en) Data encryption method and system using device authentication key
CN113595982B (en) Data transmission method and device, electronic equipment and storage medium
CN110995720B (en) Encryption method, device, host terminal and encryption chip
CN114430346A (en) Login method and device and electronic equipment
CN110941861A (en) File protection method and device, computer equipment and medium
EP4544439A1 (en) Aerosol-generating device with encrypted data management
CN111294359B (en) Pressure testing method, pressure testing device, computer equipment and storage medium
US20180145829A1 (en) Data management method
CN113158218A (en) Data encryption method and device and data decryption method and device
CN116886317B (en) Method, system and equipment for distributing secret key between server and terminal equipment
CN112817615A (en) File processing method, device, system and storage medium
CN112491879A (en) Method for remotely updating firmware, computer equipment and storage medium
CN114786176A (en) Wireless communication encryption method, decryption method, computer device and storage medium
CN114697119B (en) Data checking method, device, computer readable storage medium and electronic equipment
CN114491593B (en) Data protection method of NFC (near field communication) tag
JP7397403B2 (en) Electronic information storage medium, authentication code generation method, authentication code verification method, and program
CN115361140A (en) Method and device for verifying security chip key
CN114424193B (en) Flash package encryption method, device, electronic device and computer storage medium
CN113111990A (en) Data processing method and system for OFD electronic file

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220722

RJ01 Rejection of invention patent application after publication