[go: up one dir, main page]

CN117459931B - A data encryption method, system and storage medium - Google Patents

A data encryption method, system and storage medium Download PDF

Info

Publication number
CN117459931B
CN117459931B CN202311302304.9A CN202311302304A CN117459931B CN 117459931 B CN117459931 B CN 117459931B CN 202311302304 A CN202311302304 A CN 202311302304A CN 117459931 B CN117459931 B CN 117459931B
Authority
CN
China
Prior art keywords
relay device
server
mobile terminal
dynamic password
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311302304.9A
Other languages
Chinese (zh)
Other versions
CN117459931A (en
Inventor
刘长波
王运成
于士国
王成递
刘立金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongchang College Of Liaocheng University
Shandong Sunsam Information Technology Co ltd
Original Assignee
Dongchang College Of Liaocheng University
Shandong Sunsam Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongchang College Of Liaocheng University, Shandong Sunsam Information Technology Co ltd filed Critical Dongchang College Of Liaocheng University
Priority to CN202311302304.9A priority Critical patent/CN117459931B/en
Publication of CN117459931A publication Critical patent/CN117459931A/en
Application granted granted Critical
Publication of CN117459931B publication Critical patent/CN117459931B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1292Mobile client, e.g. wireless printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to a data encryption method, a system and a storage medium, wherein the method comprises the steps that a mobile terminal obtains a dynamic password sent by a server; searching and connecting the matched relay equipment according to the dynamic password acquired by the mobile terminal, and periodically updating the dynamic password by the server and sending the dynamic password to the relay equipment; the mobile terminal sends the information to be encrypted to a server; the relay equipment sends preset encryption rules to the server, and different relay equipment is preset with corresponding different encryption rules; after receiving the information to be encrypted and the encryption rule, the server encrypts the information to be encrypted and generates printable label information; and sending the printable label information to the mobile terminal for printing and generating by the mobile terminal, wherein the relay equipment establishes short-distance connection with the mobile terminal. The application improves the reliability of the encryption process, and simultaneously ensures that the encryption process needs to be limited in a fixed range and can not be added into the encryption process through a mobile terminal at a different place.

Description

一种数据加密方法、系统及存储介质Data encryption method, system and storage medium

技术领域Technical Field

本申请涉及数据加密的领域,尤其是涉及一种数据加密方法、系统及存储介质。The present application relates to the field of data encryption, and in particular to a data encryption method, system and storage medium.

背景技术Background technique

一般来说,传统的数据加密都是通过终端设备和服务器之间的相互响应来对数据执行对应的加密操作,从而使得从终端上传的数据可以被加密以供后续使用。Generally speaking, traditional data encryption performs corresponding encryption operations on data through mutual responses between terminal devices and servers, so that data uploaded from the terminal can be encrypted for subsequent use.

在某些情况下,当加密后的结果是二维码或条形码的标签时,有可能通过移动设备对标签进行拍摄,并传递至异地的移动设备进行对应的操作,并且这种双向之间的交互容易直接进行干预而影响实际的加密流程,从而容易导致加密结果的修改或是加密过程的泄露,影响实际加密的可靠性。In some cases, when the encrypted result is a QR code or barcode label, it is possible to photograph the label with a mobile device and transmit it to a mobile device in a different location for corresponding operations. This two-way interaction can easily interfere with and affect the actual encryption process, which can easily lead to modification of the encryption result or leakage of the encryption process, affecting the reliability of the actual encryption.

发明内容Summary of the invention

为了提高加密过程的可靠性,本申请提供一种数据加密方法、系统及存储介质。In order to improve the reliability of the encryption process, the present application provides a data encryption method, system and storage medium.

第一方面,本申请提供的一种数据加密方法采用如下的技术方案:In the first aspect, a data encryption method provided by the present application adopts the following technical solution:

一种数据加密方法,包括:A data encryption method, comprising:

移动终端获取服务器发送的动态密码;The mobile terminal obtains the dynamic password sent by the server;

根据移动终端获取的动态密码查找并连接匹配的中继设备,所述服务器定期更新动态密码并发送至中继设备;According to the dynamic password obtained by the mobile terminal, the server searches for and connects to a matching relay device, and the server periodically updates the dynamic password and sends it to the relay device;

移动终端将待加密信息发送至服务器;The mobile terminal sends the information to be encrypted to the server;

中继设备发送预设的加密规则至服务器,不同所述中继设备预设有对应不同的加密规则;The relay device sends a preset encryption rule to the server, and different relay devices are preset with corresponding different encryption rules;

服务器在接收到待加密信息与加密规则后,对待加密信息进行加密并生成可打印标签信息;After receiving the information to be encrypted and the encryption rules, the server encrypts the information to be encrypted and generates printable label information;

将可打印标签信息发送至移动终端以供移动终端打印生成,Send the printable label information to the mobile terminal for printing and generation by the mobile terminal,

其中,所述中继设备与移动终端建立短距离连接。Wherein, the relay device establishes a short-distance connection with the mobile terminal.

通过采用上述技术方案,在该种设计方式下,服务器与移动终端的连接不决定对信息的加密以及解密方式,而是通过中继设备来决定信息的加密以及解密采用什么方式实现。同时,相关流程也决定了移动终端和中继设备的连接也需要用相同的方式解密相同的动态密码才可以进行连接,只有在中继设备和移动终端建立了连接之后,服务器才可以得知对应的加密规则和解密规则以进行对应的加密和解密操作。同时,由于移动终端和中继设备的短距离连接方式也限定了移动终端需要在中继设备的辐射范围内,移动终端没有办法在远距离的情况下通过发送标签照片来进行加密以及解密。而因此这种方式进行加密以及解密的步骤所具有的区域性极强,也难以通过第三方设备进行破解。By adopting the above technical solution, under this design method, the connection between the server and the mobile terminal does not determine the encryption and decryption method of the information, but the encryption and decryption method of the information is determined by the relay device. At the same time, the relevant process also determines that the connection between the mobile terminal and the relay device also needs to decrypt the same dynamic password in the same way before the connection can be established. Only after the relay device and the mobile terminal have established a connection, the server can know the corresponding encryption rules and decryption rules to perform corresponding encryption and decryption operations. At the same time, due to the short-distance connection method between the mobile terminal and the relay device, the mobile terminal is also limited to the radiation range of the relay device. The mobile terminal has no way to encrypt and decrypt by sending tagged photos at a long distance. Therefore, the encryption and decryption steps of this method are highly regional and difficult to crack by third-party devices.

优选的,所述移动终端连接匹配中继设备的方法包括:Preferably, the method for the mobile terminal to connect to the matching relay device includes:

移动终端对动态密码进行解密以获取终端匹配信息;The mobile terminal decrypts the dynamic password to obtain terminal matching information;

中继设备对动态密码进行解密以获取中继匹配信息;The relay device decrypts the dynamic password to obtain relay matching information;

中继设备修改设备标识符,所述中继设备的设备标识符具有预设的表达字段,且所述表达字段包含所述中继匹配信息;The relay device modifies the device identifier, wherein the device identifier of the relay device has a preset expression field, and the expression field includes the relay matching information;

所述移动终端搜索范围内可建立连接的所有设备标识符,并与包含中继匹配信息的设备标识符所对应的设备尝试建立连接。The mobile terminal searches for all device identifiers within a range to which a connection can be established, and attempts to establish a connection with a device corresponding to a device identifier containing relay matching information.

优选的,所述中继设备的设备标识符处于非广播状态,所述中继设备的设备标识符至少由中继匹配信息和时间戳信息构成,所述时间戳信息由中继设备收到服务器发送的动态密码的时刻决定;Preferably, the device identifier of the relay device is in a non-broadcast state, and the device identifier of the relay device is composed of at least relay matching information and timestamp information, and the timestamp information is determined by the moment when the relay device receives the dynamic password sent by the server;

所述移动终端根据终端匹配信息以及当前时刻生成寻址标识符,并在搜索范围内根据寻址标识符搜索处于非广播状态的设备标识符并连接。The mobile terminal generates an addressing identifier according to the terminal matching information and the current time, and searches for a device identifier in a non-broadcast state within a search range according to the addressing identifier and connects.

通过采用上述技术方案,这种状态可以将中继设备的设备标识符进行隐藏,无法得知设备标识符就不容易进行反破译或是连接。这种中继匹配信息和时间戳信息共同构建设备标识符的方式也可以在一定时间内不断更改中继设备的设备标识符,提高破译难度。By adopting the above technical solution, this state can hide the device identifier of the relay device, and it is not easy to reverse decrypt or connect without knowing the device identifier. This method of constructing the device identifier by combining relay matching information and timestamp information can also continuously change the device identifier of the relay device within a certain period of time, increasing the difficulty of decryption.

优选的,所述服务器发送动态密码的时刻具有预设的发送逻辑,所述预设的发送逻辑同步于中继设备以及移动终端;Preferably, the server has a preset sending logic at the moment of sending the dynamic password, and the preset sending logic is synchronized with the relay device and the mobile terminal;

当中继设备收到服务器发送的动态密码时,获取于所述发送逻辑中位于当前时刻之前一个接收时刻的时间戳作为时间戳信息;When the relay device receives the dynamic password sent by the server, it obtains a timestamp at a receiving time before the current time in the sending logic as timestamp information;

移动终端获取服务器发送的动态密码时,获取于所述发送逻辑中位于当前时刻之前一个接收时刻的时间戳作为时间戳信息,并与终端匹配信息组合以生成寻址标识符。When the mobile terminal obtains the dynamic password sent by the server, it obtains the timestamp of a receiving time before the current time in the sending logic as the timestamp information, and combines it with the terminal matching information to generate an addressing identifier.

优选的,所述服务器与中继设备之间通过数据包通信,且所述数据包均包括校验位,所述数据加密方法还包括:Preferably, the server and the relay device communicate via data packets, and the data packets all include check bits, and the data encryption method further includes:

所述中继设备在接收所述服务器发送的数据包后,提取所述数据包中校验位的校验码并进行验证;After receiving the data packet sent by the server, the relay device extracts the check code of the check bit in the data packet and performs verification;

当验证通过后,所述中继设备解析所述数据包;When the verification is passed, the relay device parses the data packet;

在所述中继设备发送数据包至服务器之前,所述中继设备随机生成所述校验码并记录;Before the relay device sends the data packet to the server, the relay device randomly generates and records the verification code;

所述中继设备将所述校验码整合至发送至服务器的数据包的校验位。The relay device integrates the check code into the check digit of the data packet sent to the server.

通过采用上述技术方案,这种方式可以对数据是否被更改或是破译进行有效监控,提高数据传输时的安全性。By adopting the above technical solution, this method can effectively monitor whether the data has been changed or deciphered, thereby improving the security of data transmission.

优选的,所述服务器更新动态密码并发送至中继设备后,中继设备接收所述动态密码并验证所述校验位;Preferably, after the server updates the dynamic password and sends it to the relay device, the relay device receives the dynamic password and verifies the check digit;

当所述校验位验证通过后,对动态密码进行解密;When the check digit is verified, the dynamic password is decrypted;

在服务器更新动态密码之前,中继设备随机生成校验码并与请求更新指令打包生成数据包;Before the server updates the dynamic password, the relay device randomly generates a verification code and packages it with the update request instruction to generate a data packet;

中继设备发送数据包至服务器;The relay device sends the data packet to the server;

服务器响应于中继设备发送的数据包,并拆分校验位以获取校验码;The server responds to the data packet sent by the relay device and splits the check digit to obtain the check code;

服务器生成动态密码,并与所获取的校验码整合生成数据包以发送至中继设备。The server generates a dynamic password and integrates it with the obtained verification code to generate a data packet to be sent to the relay device.

优选的,移动终端与中继设备建立连接之后,中继设备随机生成校验码并与预设的加密规则打包生成数据包;Preferably, after the mobile terminal establishes a connection with the relay device, the relay device randomly generates a verification code and packages it with a preset encryption rule to generate a data packet;

中继设备发送数据包至服务器;The relay device sends the data packet to the server;

服务器响应于中继设备发送的数据包,并拆分校验位以获取校验码;The server responds to the data packet sent by the relay device and splits the check digit to obtain the check code;

服务器生成接收成功指令,并与所获取的校验码整合生成数据包以发送至中继设备;The server generates a successful reception instruction, and integrates it with the obtained verification code to generate a data packet to be sent to the relay device;

中继设备接收服务器发送的数据包并解析以验证校验位;The relay device receives the data packet sent by the server and parses it to verify the check digit;

当校验位验证通过后,中继设备停止流程并等待生成请求更新指令;When the check digit is verified, the relay device stops the process and waits for the generation of the request update instruction;

当中继设备在预设时刻内未收到服务器发送的数据包,则重新发送数据包至服务器。When the relay device does not receive the data packet sent by the server within the preset time, it resends the data packet to the server.

第二方面,本申请提供的一种数据加密系统采用如下的技术方案:In the second aspect, a data encryption system provided by the present application adopts the following technical solution:

一种数据加密系统,包括,A data encryption system, comprising:

移动终端,用于发送待加密信息至服务器、获取服务器发送的动态密码,并根据所获取的动态密码查找并连接匹配的中继设备;The mobile terminal is used to send the information to be encrypted to the server, obtain the dynamic password sent by the server, and search and connect to the matching relay device according to the obtained dynamic password;

中继设备,在于移动终端连接后,向服务器发送预设的加密规则,不同所述中继设备预设有对应不同的加密规则;The relay device sends a preset encryption rule to the server after the mobile terminal is connected, and different relay devices are preset with corresponding different encryption rules;

服务器,用于接收移动终端发送的待加密信息以及中继设备发送的加密规则,并对待加密信息进行加密并生成可打印标签信息;所述服务器定期更新动态密码并发送至中继设备。The server is used to receive the information to be encrypted sent by the mobile terminal and the encryption rules sent by the relay device, and encrypt the information to be encrypted and generate printable label information; the server regularly updates the dynamic password and sends it to the relay device.

第三方面,本申请提供的一种计算机存储介质,能够存储相应的程序,采用如下的技术方案:In a third aspect, the present application provides a computer storage medium capable of storing corresponding programs, using the following technical solution:

一种计算机可读存储介质,存储有能够被处理器加载并执行上述任一种数据加密方法的计算机程序。A computer-readable storage medium stores a computer program that can be loaded by a processor and execute any of the above data encryption methods.

综上所述,本申请包括以下至少一种有益技术效果:In summary, the present application includes at least one of the following beneficial technical effects:

服务器与移动终端的连接不决定对信息的加密以及解密方式,而是通过中继设备来决定信息的加密以及解密采用什么方式实现。同时,相关流程也决定了移动终端和中继设备的连接也需要用相同的方式解密相同的动态密码才可以进行连接,只有在中继设备和移动终端建立了连接之后,服务器才可以得知对应的加密规则和解密规则以进行对应的加密和解密操作;The connection between the server and the mobile terminal does not determine the encryption and decryption methods of the information, but the relay device determines the encryption and decryption methods of the information. At the same time, the relevant process also determines that the connection between the mobile terminal and the relay device also needs to decrypt the same dynamic password in the same way before the connection can be established. Only after the relay device and the mobile terminal have established a connection, the server can know the corresponding encryption and decryption rules to perform the corresponding encryption and decryption operations;

移动终端和中继设备的短距离连接方式也限定了移动终端需要在中继设备的辐射范围内,移动终端没有办法在远距离的情况下通过发送标签照片来进行加密以及解密;The short-distance connection between the mobile terminal and the relay device also limits the mobile terminal to the radiation range of the relay device. The mobile terminal cannot encrypt and decrypt by sending tagged photos at a long distance;

中继匹配信息和时间戳信息共同构建设备标识符的方式也可以在一定时间内不断更改中继设备的设备标识符,提高破译难度。The method of jointly constructing a device identifier using relay matching information and timestamp information can also continuously change the device identifier of the relay device within a certain period of time, thereby increasing the difficulty of deciphering.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是本发明其中一实施例的数据加密方法的流程示意图。FIG. 1 is a schematic flow chart of a data encryption method according to one embodiment of the present invention.

图2是本发明其中一实施例的中继设备与移动终端连接匹配的流程示意图。FIG. 2 is a schematic diagram of a flow chart of connection matching between a relay device and a mobile terminal according to one embodiment of the present invention.

图3是本发明其中一实施例的中继设备与服务器通过数据包进行通讯的流程示意图。FIG. 3 is a schematic diagram of a flow chart of a relay device and a server communicating via data packets according to one embodiment of the present invention.

图4是本发明其中一实施例的服务器生成动态密码时与中继设备之间通过数据包进行通讯的流程示意图。FIG. 4 is a flow chart showing the communication between the server and the relay device through data packets when generating a dynamic password according to one embodiment of the present invention.

图5是本发明其中一实施例的中继设备向服务器发送预设的加密规则时与服务器之间通过数据包进行通讯的流程示意图。FIG. 5 is a flow chart of a relay device communicating with a server through data packets when sending a preset encryption rule to the server according to one embodiment of the present invention.

图6是本发明其中一实施例的解密过程的流程示意图。FIG. 6 is a flowchart of a decryption process according to one embodiment of the present invention.

具体实施方式Detailed ways

以下结合附图1-6对本申请作进一步详细说明。The present application is further described in detail below in conjunction with Figures 1-6.

本申请实施例公开一种数据加密方法,其通过移动终端、中继设备以及服务器三者之间的相互通信来实现对数据进行加密,其中服务器可以架设在运营商的机房,移动终端可以是用户手中的移动设备(例如手持电话)、或是专用于数据加密的可移动设备,这种可移动设备可以集成打印模块,从而使加密结果通过可打印标签的形式进行承载并供后续的使用。中继设备用于与服务器以及移动终端通信连接,而服务器与中继设备可以通过已建立的公用网络实现连接,移动终端与中继设备之间可以采用蓝牙或是WiFi等方式建立短距离的无线连接。The embodiment of the present application discloses a data encryption method, which realizes data encryption through mutual communication between a mobile terminal, a relay device and a server, wherein the server can be set up in the operator's computer room, and the mobile terminal can be a mobile device in the hands of a user (such as a handheld phone), or a removable device dedicated to data encryption, and such a removable device can be integrated with a printing module, so that the encryption result can be carried in the form of a printable label for subsequent use. The relay device is used to communicate with the server and the mobile terminal, and the server and the relay device can be connected through an established public network, and a short-range wireless connection can be established between the mobile terminal and the relay device by using Bluetooth or WiFi.

作为具体的数据加密方法,参照图1,其步骤具体包括:As a specific data encryption method, referring to FIG. 1 , the steps specifically include:

步骤S100:移动终端获取服务器发送的动态密码。Step S100: The mobile terminal obtains the dynamic password sent by the server.

其中,动态密码是通过服务器内置的动态密码生成器来生成的,其可以是一串通过预设算法随机生成的秘钥,或是通过随机数生成规则来随机生成一段长度固定的字符串。一般而言,动态密码会规定为八位或者十六位的长度。The dynamic password is generated by the dynamic password generator built into the server. It can be a string of keys randomly generated by a preset algorithm, or a string of fixed length randomly generated by a random number generation rule. Generally speaking, the dynamic password is specified to be eight or sixteen digits long.

移动终端在通过公用网络与服务器建立连接之后,向服务器发送请求指令,服务器在接收到移动终端发送的请求指令之后,将已生成的动态密码发送至移动终端处,至此,移动终端即获取了服务器发送的动态密码。After the mobile terminal establishes a connection with the server through the public network, it sends a request instruction to the server. After receiving the request instruction sent by the mobile terminal, the server sends the generated dynamic password to the mobile terminal. At this point, the mobile terminal obtains the dynamic password sent by the server.

移动终端在为手机等手持式移动设备时,可以在移动终端上安装对应的APP(手机软件)来运行与服务器以及中继设备进行交互的对应程序,例如移动终端在打开APP后与服务器进行通讯并建立长连接,随后即获取服务器发送的动态密码。在之后的步骤中,通过移动终端发起的各项操作或是流程也可以通过在APP上架设对应的操作按钮来推动对应的流程运作。When the mobile terminal is a handheld mobile device such as a mobile phone, the corresponding APP (mobile software) can be installed on the mobile terminal to run the corresponding program that interacts with the server and the relay device. For example, after opening the APP, the mobile terminal communicates with the server and establishes a long connection, and then obtains the dynamic password sent by the server. In the subsequent steps, various operations or processes initiated by the mobile terminal can also be promoted by setting up corresponding operation buttons on the APP to promote the corresponding process operation.

步骤S200:根据移动终端获取的动态密码查找并连接匹配的中继设备,所述服务器定期更新动态密码并发送至中继设备。Step S200: searching and connecting to a matching relay device according to the dynamic password obtained by the mobile terminal, and the server periodically updates the dynamic password and sends it to the relay device.

其中,在服务器定期更新了动态密码之后,也会将动态密码对应发送至中继设备处,中继设备会存储最新通过服务器下发的动态密码。在同一时刻下,中继设备以及移动终端所接收到的动态密码是相同的,因此即可以通过对动态密码进行验证来将对应的移动终端与中继设备建立对应的连接,也不会导致移动终端与其他的设备建立连接。After the server periodically updates the dynamic password, it will also send the dynamic password to the relay device, and the relay device will store the latest dynamic password sent by the server. At the same time, the dynamic passwords received by the relay device and the mobile terminal are the same, so the corresponding mobile terminal can be connected to the relay device by verifying the dynamic password, and the mobile terminal will not be connected to other devices.

作为一种具体的连接匹配的实现方式,参照图2,具体包括:As a specific implementation method of connection matching, referring to FIG. 2 , it specifically includes:

步骤S210:移动终端对动态密码进行解密以获取终端匹配信息。Step S210: The mobile terminal decrypts the dynamic password to obtain terminal matching information.

步骤S220:中继设备对动态密码进行解密以获取中继匹配信息。Step S220: The relay device decrypts the dynamic password to obtain relay matching information.

其中,步骤S210是移动终端对动态密码的解密,步骤S220是中继设备对动态密码的解密,而步骤S210与步骤S220可以根据实际情况对应的改变其二者的先后步骤。一般来说,中继设备与移动终端对动态密码的解密一般都在接收到服务器发送的动态密码后就开始解密,而中继设备由于始终与服务器保持长连接,因而从时序上来看,中继设备往往会先一步执行对应的解密步骤。Among them, step S210 is the decryption of the dynamic password by the mobile terminal, and step S220 is the decryption of the dynamic password by the relay device, and the order of step S210 and step S220 can be changed according to the actual situation. Generally speaking, the decryption of the dynamic password by the relay device and the mobile terminal generally starts after receiving the dynamic password sent by the server, and since the relay device always maintains a long connection with the server, from the perspective of timing, the relay device often executes the corresponding decryption step first.

此处所述的对动态密码的解密方式可以是对字符串执行预设的运算逻辑,例如插入字符、执行对应的逻辑运算、进行混淆等运算操作,此处可以根据需要自行对运算逻辑进行设置,并没有实际所需限定的需要,但是需要注意的是,移动终端以及中继设备对动态密码的解密方式需相同,且解密方式需要在配置文件时就预设在移动终端以及中继设备中。The decryption method of the dynamic password described here can be to execute a preset operation logic on the character string, such as inserting characters, executing corresponding logical operations, performing obfuscation and other operations. The operation logic can be set as needed here, and there is no actual need to limit it. However, it should be noted that the mobile terminal and the relay device must have the same decryption method for the dynamic password, and the decryption method needs to be preset in the mobile terminal and the relay device when configuring the file.

步骤S230:中继设备修改设备标识符,所述中继设备的设备标识符具有预设的表达字段,且所述表达字段包含所述中继匹配信息。Step S230: the relay device modifies the device identifier, wherein the device identifier of the relay device has a preset expression field, and the expression field includes the relay matching information.

其中,对于中继设备采用WIFI方式与移动终端进行连接时,设备标识符即代表的为SSID,这代表着设备可以被连接的标识信息。当中继设备与移动终端采用蓝牙连接的方式进行连接时,设备标识符即代表中继设备的蓝牙设备名称。表达字段代表的是设备标识符的具体表达字符串,在一种实施方式下,设备标识符可以只由中继匹配信息构成,在另一种方式下,设备标识符可以由中继匹配信息与预设的固定字段构成,例如AAA-BBBBBBBB,此处的AAA可以是预设的固定字段,BBBBBBBB即为通过动态密码解密获得的中继匹配信息的字符串。在本申请中,还可以将动态密码的生成时间作为时间戳而加入到设备标识符的生成中,而时间戳信息的具体值由中继设备收到服务器发送的动态密码的时刻决定。Among them, when the relay device is connected to the mobile terminal using WIFI, the device identifier represents the SSID, which represents the identification information that the device can be connected. When the relay device is connected to the mobile terminal using Bluetooth connection, the device identifier represents the Bluetooth device name of the relay device. The expression field represents the specific expression string of the device identifier. In one embodiment, the device identifier can be composed only of relay matching information. In another embodiment, the device identifier can be composed of relay matching information and a preset fixed field, such as AAA-BBBBBBBB, where AAA can be a preset fixed field, and BBBBBBBB is the string of relay matching information obtained by decrypting the dynamic password. In the present application, the generation time of the dynamic password can also be added as a timestamp to the generation of the device identifier, and the specific value of the timestamp information is determined by the moment when the relay device receives the dynamic password sent by the server.

服务器在生成动态密码的过程中具有预设的逻辑,例如相邻两次动态密码的生成间隔一个预设的固定时刻,并且这个预设的逻辑会同步至中继设备以及移动终端,中继设备可以根据预设的逻辑判断所收到的动态密码所对应的时间戳信息的表达字符串,具体的,所述方法包括:The server has a preset logic in the process of generating a dynamic password. For example, the generation of two adjacent dynamic passwords is separated by a preset fixed time, and this preset logic is synchronized to the relay device and the mobile terminal. The relay device can determine the expression string of the timestamp information corresponding to the received dynamic password according to the preset logic. Specifically, the method includes:

步骤S231:当中继设备收到服务器发送的动态密码时,获取于所述发送逻辑中位于当前时刻之前一个接收时刻的时间戳作为时间戳信息。Step S231: When the relay device receives the dynamic password sent by the server, it obtains a timestamp at a receiving time before the current time in the sending logic as timestamp information.

其中,当预设的发送逻辑被中继设备知晓后,由于服务器发送至中继设备的信息会有延迟,且中继设备收到动态密码的时刻肯定会在服务器生成动态密码的时刻之后,因此中继设备可以根据当前时刻与预设的发送逻辑进行比对,并将发送逻辑中位于当前时刻的之前一个时刻的时间戳作为时间戳信息,此处的时间戳信息代表的是可以表征该时刻的一串字符串,例如2020年12月22日12点45分可以用字符串表征为202012221245,也可以在一种方式中只用每日的小时和分钟来代表时间戳信息所代表的字符串,例如1245。Among them, when the preset sending logic is known by the relay device, since the information sent by the server to the relay device will be delayed, and the time when the relay device receives the dynamic password will definitely be after the time when the server generates the dynamic password, the relay device can compare the current time with the preset sending logic, and use the timestamp of the moment before the current time in the sending logic as the timestamp information. The timestamp information here represents a string that can represent the moment. For example, 12:45 on December 22, 2020 can be represented by the string 202012221245, or in one way, only the hours and minutes of the day can be used to represent the string represented by the timestamp information, such as 1245.

步骤S232:移动终端获取服务器发送的动态密码时,获取于所述发送逻辑中位于当前时刻之前一个接收时刻的时间戳作为时间戳信息,并与终端匹配信息组合以生成寻址标识符。Step S232: When the mobile terminal obtains the dynamic password sent by the server, it obtains the timestamp of a receiving time before the current time in the sending logic as timestamp information, and combines it with the terminal matching information to generate an addressing identifier.

同样的,当预设的发送逻辑被移动终端知晓后,由于服务器发送至移动终端的信息会有延迟,且移动终端收到动态密码的时刻肯定会在服务器生成动态密码的时刻之后,因此移动终端可以根据当前时刻与预设的发送逻辑进行比对,并将发送逻辑中位于当前时刻的之前一个时刻的时间戳作为时间戳信息。一般来说,此处的时间戳信息所代表的需要和中继设备所代表的格式相同,例如在当中继设备的时间戳信息为字符串格式时,移动中断的时间戳信息也需要为字符串格式。Similarly, when the preset sending logic is known by the mobile terminal, since the information sent by the server to the mobile terminal will be delayed, and the moment when the mobile terminal receives the dynamic password will definitely be after the moment when the server generates the dynamic password, the mobile terminal can compare the current moment with the preset sending logic, and use the timestamp of the moment before the current moment in the sending logic as the timestamp information. Generally speaking, the timestamp information here needs to be represented in the same format as the relay device. For example, when the timestamp information of the relay device is in a string format, the timestamp information of the mobile interruption also needs to be in a string format.

一般而言,在相邻两个动态密码更新间隔之间,中继设备的时间戳信息和移动终端的时间戳信息应该是完全等同的,因此通过这种方式生成的寻址表示符可以准确的找到中继设备对应的设备标识符。Generally speaking, between two adjacent dynamic password update intervals, the timestamp information of the relay device and the timestamp information of the mobile terminal should be completely identical, so the addressing identifier generated in this way can accurately find the device identifier corresponding to the relay device.

因此在这种前提下,中继设备的设备标识符可以处于非广播状态,因此其他的终端设备没有办法直接获取中继设备的设备标识符,因此也无法通过中继设备的设备标识符来反向破译相关信息。反而,在所需建立连接的移动终端获取对应的设备标识符后,仍可以和对应的中继设备建立连接。Therefore, under this premise, the device identifier of the relay device can be in a non-broadcast state, so other terminal devices have no way to directly obtain the device identifier of the relay device, and therefore cannot reversely decipher related information through the device identifier of the relay device. On the contrary, after the mobile terminal that needs to establish a connection obtains the corresponding device identifier, it can still establish a connection with the corresponding relay device.

步骤S240:所述移动终端搜索范围内可建立连接的所有设备标识符,并与包含中继匹配信息的设备标识符所对应的设备尝试建立连接。Step S240: The mobile terminal searches for all device identifiers within a range to which a connection can be established, and attempts to establish a connection with a device corresponding to a device identifier containing relay matching information.

其中,中继匹配信息可以不仅仅只包含前述的时间戳信息以及中继匹配信息,还可以包括例如地理位置信息等其他具有代表性的信息来构成中继匹配信息。同时,中继设备可以具有预设的口令密码以供移动终端连接,那么在这种前提下,预设的口令密码也需要供移动终端知晓以供移动终端和中继设备建立连接。一般来说,移动终端搜索范围与中继设备的广播辐射强度有关,中继设备的强度越大,移动终端所能搜索到中继设备的距离也就越远。The relay matching information may not only include the aforementioned timestamp information and relay matching information, but may also include other representative information such as geographic location information to constitute the relay matching information. At the same time, the relay device may have a preset password for the mobile terminal to connect. In this case, the preset password also needs to be known by the mobile terminal so that the mobile terminal and the relay device can establish a connection. Generally speaking, the search range of the mobile terminal is related to the broadcast radiation intensity of the relay device. The greater the intensity of the relay device, the farther the mobile terminal can search for the relay device.

步骤S300:移动终端将待加密信息发送至服务器。Step S300: The mobile terminal sends the information to be encrypted to the server.

其中,移动终端的待加密信息可以通过人工录入的方式将对应的数据录入至移动终端中,移动终端与服务器之间通过公有网络建立连接,移动终端会在该步骤中将录入移动终端的待加密信息通过The information to be encrypted of the mobile terminal can be manually entered into the mobile terminal. The mobile terminal and the server are connected via a public network. The mobile terminal will enter the information to be encrypted into the mobile terminal through the public network.

步骤S400:中继设备发送预设的加密规则至服务器,不同所述中继设备预设有对应不同的加密规则。Step S400: the relay device sends a preset encryption rule to the server, and different relay devices are preset with corresponding different encryption rules.

其中,每一个中继设备都会预存有一个加密规则,这个加密规则通过转换为对应的字符串存储在中继设备中,中继设备在该步骤中会将对应的字符串发送至服务器中。服务器在收到字符串信息后会对应的判断该中继设备属于哪一个加密规则。一般来说,加密规则可以是DES、3DES、AES、RSA、DSA、SHA-1、MD5等,也可以是其他自定规则的加密方式,每一个加密规则所对应的字符串可以通过建立映射表的方式来对应起来,通过对应的字符串即可获得相应的加密规则。Among them, each relay device will pre-store an encryption rule, which is converted into a corresponding string and stored in the relay device. The relay device will send the corresponding string to the server in this step. After receiving the string information, the server will determine which encryption rule the relay device belongs to. Generally speaking, the encryption rule can be DES, 3DES, AES, RSA, DSA, SHA-1, MD5, etc., or it can be other encryption methods with custom rules. The string corresponding to each encryption rule can be matched by establishing a mapping table, and the corresponding encryption rule can be obtained through the corresponding string.

步骤S500:服务器在接收到待加密信息与加密规则后,对待加密信息进行加密并生成可打印标签信息。Step S500: After receiving the information to be encrypted and the encryption rules, the server encrypts the information to be encrypted and generates printable label information.

在经过步骤S400后,服务器得知了中继设备发送的加密规则,并在步骤S300中接收到了移动终端发送的待加密信息,服务器即对待加密信息采用对应的加密规则进行加密,加密后的可打印标签信息即为加密所得到的加密密文字符串。After step S400, the server learns the encryption rules sent by the relay device, and receives the information to be encrypted sent by the mobile terminal in step S300. The server encrypts the information to be encrypted using the corresponding encryption rules, and the encrypted printable label information is the encrypted ciphertext string obtained by encryption.

步骤S600:将可打印标签信息发送至移动终端以供移动终端打印生成。Step S600: Send the printable label information to the mobile terminal for printing by the mobile terminal.

其中,在生成可打印标签信息之后,服务器即将可打印标签信息发送至移动终端,移动终端上可以集成有打印模块,移动终端在接收到可打印标签信息后,将其转为打印模块可识别的信息以供打印模块打印。一般来说,移动终端打印生成的是二维码标签,在某些情况下,也可以打印生成条形码标签。After generating the printable label information, the server will send the printable label information to the mobile terminal, which may be integrated with a printing module. After receiving the printable label information, the mobile terminal converts it into information recognizable by the printing module for printing by the printing module. Generally speaking, the mobile terminal prints and generates a QR code label, and in some cases, a barcode label can also be printed and generated.

在此基础上,服务器与中继设备之间的通信通过数据包的方式来传递所需的信息。其中,数据包中包含有对应的校验码来作为识别位,校验码出于数据包的校验位中,服务器仅仅将接受到的数据包中的校验位进行识别并对应提取校验码,在之后的操作过程中重新将该校验码整合至发送至中继设备的数据包中,而中继设备中具有用于识别判断并生成校验码的校验码单元,可以得知中继设备与服务器的通信过程是否被干扰或是破译,参照图3,具体的:On this basis, the communication between the server and the relay device transmits the required information in the form of data packets. Among them, the data packet contains a corresponding check code as an identification bit. The check code is in the check bit of the data packet. The server only identifies the check bit in the received data packet and extracts the check code accordingly. In the subsequent operation process, the check code is re-integrated into the data packet sent to the relay device. The relay device has a check code unit for identifying, judging and generating the check code. It can be known whether the communication process between the relay device and the server is interfered with or deciphered. Refer to Figure 3, specifically:

步骤S1:中继设备在接收服务器发送的数据包后,提取数据包中校验位的校验码并进行验证。Step S1: After receiving the data packet sent by the server, the relay device extracts the check code of the check bit in the data packet and performs verification.

其中,数据包中至少包括用于存储需要传输数据的传输位以及用于存储校验码的校验位,在一种实施方式中,数据包的整体长度固定、校验位所在的位置固定,因此校验位与传输位的所占用的长度也固定,在另一种实施方式中,校验位的长度以及位置固定,例如在数据包的首段字节或者是末端字节中,其余的位置即为对应的传输位。因此,无论是那种方式,中继设备都可以直接提取数据包中校验位的校验码,并对校验码进行验证。一般来说,此处进行验证的校验码即为中继设备的校验码单元在前次生成的校验码,验证过程只需判断二者是否一致即可。Among them, the data packet at least includes a transmission bit for storing the data to be transmitted and a check bit for storing the check code. In one embodiment, the overall length of the data packet is fixed and the position of the check bit is fixed, so the length occupied by the check bit and the transmission bit is also fixed. In another embodiment, the length and position of the check bit are fixed, for example, in the first byte or the end byte of the data packet, and the remaining position is the corresponding transmission bit. Therefore, no matter which method is used, the relay device can directly extract the check code of the check bit in the data packet and verify the check code. Generally speaking, the check code verified here is the check code generated by the check code unit of the relay device in the previous time, and the verification process only needs to determine whether the two are consistent.

步骤S2:当验证通过后,所述中继设备解析所述数据包。Step S2: When the verification is passed, the relay device parses the data packet.

其中,验证通过即为校验位中的校验码与前次生成的校验码一致,解析数据包在此步骤中指代的是提取数据包中对应于传输位的相关信息。Among them, verification passed means that the check code in the check bit is consistent with the check code generated last time, and parsing the data packet in this step refers to extracting relevant information corresponding to the transmission bit in the data packet.

步骤S3:在所述中继设备发送数据包至服务器之前,所述中继设备随机生成所述校验码并记录。Step S3: Before the relay device sends the data packet to the server, the relay device randomly generates and records the verification code.

其中,中继设备会根据校验码的预设长度随机生成固定长度的校验码,并将这个校验码记录下来,以供下一次接受到服务器发送的数据包时对校验码进行核对并检验。在一种实施方式下,在随机生成校验码之后会覆盖中继设备中先前记录的校验码,以使中继设备始终仅记录一个校验码。The relay device will randomly generate a check code of a fixed length according to the preset length of the check code, and record the check code so that the check code can be checked and verified the next time the data packet sent by the server is received. In one embodiment, after the check code is randomly generated, the check code previously recorded in the relay device will be overwritten, so that the relay device always records only one check code.

步骤S4:所述中继设备将所述校验码整合至发送至服务器的数据包的校验位。Step S4: The relay device integrates the check code into the check digit of the data packet sent to the server.

其中,整合指的是将对应的数据放入数据包中的对应位置中,例如所需发送的数据会被填入至数据包的传输位中,而随机生成的校验码会被填入至数据包的校验位中,校验位以及传输位的位置遵循步骤S1中数据包的构建方式。Among them, integration refers to placing the corresponding data into the corresponding positions in the data packet. For example, the data to be sent will be filled into the transmission bit of the data packet, and the randomly generated check code will be filled into the check bit of the data packet. The positions of the check bit and the transmission bit follow the construction method of the data packet in step S1.

基于此,为了满足服务器与中继设备之间的循环通信,对于动态密码的生成,在服务器生成动态密码之前,中继设备按照固定的发送间隔生成请求更新指令并发送至服务器,服务器通过响应请求更新指令而生成动态密码,由于中继设备的请求更新指令按照规定的间隔发送,因此服务器的动态密码的更新也具有预设的逻辑,在中继设备不向服务器发送加密规则至服务器的情况下,服务器与中继设备之间的通信可以形成完整循环。Based on this, in order to meet the cyclic communication between the server and the relay device, for the generation of dynamic passwords, before the server generates a dynamic password, the relay device generates a request update instruction at a fixed sending interval and sends it to the server. The server generates a dynamic password by responding to the request update instruction. Since the request update instruction of the relay device is sent at a prescribed interval, the update of the server's dynamic password also has a preset logic. When the relay device does not send encryption rules to the server, the communication between the server and the relay device can form a complete cycle.

具体的,参照图4,其步骤包括:Specifically, referring to FIG. 4 , the steps include:

步骤S11:服务器更新动态密码并发送至中继设备后,中继设备接收所述动态密码并验证所述校验位。Step S11: After the server updates the dynamic password and sends it to the relay device, the relay device receives the dynamic password and verifies the check digit.

其中,在该步骤中,动态密码仍是通过数据包的方式发送至中继设备,中继设备通过解析数据包得到出于校验位的校验码,而验证校验码的方式和步骤S1中相同。Among them, in this step, the dynamic password is still sent to the relay device in the form of a data packet, and the relay device obtains the check code from the check bit by parsing the data packet, and the method of verifying the check code is the same as in step S1.

步骤S12:当所述校验位验证通过后,对动态密码进行解密。Step S12: When the check digit is verified, the dynamic password is decrypted.

步骤S13:在服务器更新动态密码之前,中继设备随机生成校验码并与请求更新指令打包生成数据包。Step S13: Before the server updates the dynamic password, the relay device randomly generates a verification code and packages it with the update request instruction to generate a data packet.

其中,请求更新指令是一串固定的字符串,当服务器接收到请求更新指令之后,即会对应的驱动对应模块生成动态密码。而中继设备会在预设的生成逻辑下生成请求更新指令,而服务器又响应于请求更新指令以生成动态密码,那么动态密码也可以被认为是在预设的生成逻辑下而生成的。一般而言,相邻两个请求更新指令的生成是有固定的间隔时刻的。The request update instruction is a fixed string of characters. When the server receives the request update instruction, it will drive the corresponding module to generate a dynamic password. The relay device will generate the request update instruction under the preset generation logic, and the server will respond to the request update instruction to generate a dynamic password. Then the dynamic password can also be considered to be generated under the preset generation logic. Generally speaking, there is a fixed interval between the generation of two adjacent request update instructions.

进一步地,在此基础上,对于前述步骤提到的关于中继设备生成设备标识符所需用到的时间戳信息可以根据中继设备生成请求更新指令的逻辑来进行确定。Further, on this basis, the timestamp information required for the relay device to generate the device identifier mentioned in the aforementioned step can be determined according to the logic of the relay device generating the update request instruction.

步骤S14:中继设备发送数据包至服务器。Step S14: The relay device sends a data packet to the server.

步骤S15:服务器响应于中继设备发送的数据包,并拆分校验位以获取校验码。Step S15: The server responds to the data packet sent by the relay device and splits the check digit to obtain a check code.

其中,在该步骤中,拆分校验位以获取的校验码无需进行验证,其只需将数据包中校验位的字符串提取出来以获取对应的校验码即可。Among them, in this step, the check code obtained by splitting the check bit does not need to be verified, and it only needs to extract the character string of the check bit in the data packet to obtain the corresponding check code.

步骤S16:服务器生成动态密码,并与所获取的校验码整合生成数据包以发送至中继设备。Step S16: The server generates a dynamic password and integrates it with the obtained verification code to generate a data packet to be sent to the relay device.

其中,在完成步骤S16后,在动态密码的生成形成了一个完整的通讯闭环,而且由于动态密码的生成与发送是响应于请求更新指令的生成的,因此请求更新指令的生成、发送以及动态密码的生成和发送可以看做是在短时间内完成的,而且在这期间中继设备也不会向服务器发送加密规则。Among them, after completing step S16, a complete communication closed loop is formed in the generation of the dynamic password, and since the generation and sending of the dynamic password is in response to the generation of the request update instruction, the generation and sending of the request update instruction and the generation and sending of the dynamic password can be regarded as completed in a short time, and during this period the relay device will not send encryption rules to the server.

因而可以得知,中继设备向服务器发送加密规则是在相邻两个动态密码生成的通讯闭环时刻之间的,因而对于中继设备向服务器发送加密规则的情况下,服务器也需要向中继设备返回一个数据包以使中继设备可以在下次与移动终端建立连接或是生成请求更新指令时再生成校验码。具体的,参照图5,对于完整的中继设备向服务器发送加密规则的步骤包括:Therefore, it can be known that the relay device sends the encryption rules to the server between the communication closed loop moments of two adjacent dynamic passwords. Therefore, when the relay device sends the encryption rules to the server, the server also needs to return a data packet to the relay device so that the relay device can regenerate the verification code the next time it establishes a connection with the mobile terminal or generates a request update instruction. Specifically, referring to Figure 5, the steps for the complete relay device to send the encryption rules to the server include:

步骤S21:移动终端与中继设备建立连接之后,中继设备随机生成校验码并与预设的加密规则打包生成数据包。Step S21: After the mobile terminal establishes a connection with the relay device, the relay device randomly generates a verification code and packages it with a preset encryption rule to generate a data packet.

步骤S22:中继设备发送数据包至服务器。Step S22: The relay device sends a data packet to the server.

步骤S23:服务器响应于中继设备发送的数据包,并拆分校验位以获取校验码。Step S23: The server responds to the data packet sent by the relay device and splits the check digit to obtain a check code.

步骤S24:服务器生成接收成功指令,并与所获取的校验码整合生成数据包以发送至中继设备。Step S24: the server generates a successful reception instruction, and integrates it with the obtained verification code to generate a data packet to be sent to the relay device.

其中,在一种实施方式,步骤S23中对数据包的拆分还可以得到传输位的内容,服务器在判断传输位的内容是预设的加密规则后即响应生成接收成功指令,也可以在拆分数据包的过程中同步生成接收成功指令。接收成功指令可以是预设字符长度且内容固定的字符串,例如八位全为1的字符串来代表接收成功指令。若数据包接收失败或者是对数据包的解析失败,可以生成接收失败指令,同样的,接受失败指令可以是八位全为0的字符串。此处的接收成功指令以及接收失败指令均整合至数据包的传输位中。Among them, in one embodiment, the splitting of the data packet in step S23 can also obtain the content of the transmission bit. After determining that the content of the transmission bit is a preset encryption rule, the server responds and generates a successful reception instruction, and can also synchronously generate a successful reception instruction in the process of splitting the data packet. The successful reception instruction can be a string of preset character length and fixed content, for example, a string of eight bits all 1 to represent the successful reception instruction. If the data packet fails to be received or the parsing of the data packet fails, a failed reception instruction can be generated. Similarly, the failed reception instruction can be a string of eight bits all 0. The successful reception instruction and the failed reception instruction here are both integrated into the transmission bit of the data packet.

步骤S25:中继设备接收服务器发送的数据包并解析以验证校验位。Step S25: The relay device receives the data packet sent by the server and parses it to verify the check digit.

其中,在该步骤中,还可以同步对数据包进行解析并对传输位中的数据进行校验,即判断是接收成功指令还是接收失败指令。Among them, in this step, the data packet can also be parsed synchronously and the data in the transmission bit can be checked, that is, it can be determined whether it is a reception success instruction or a reception failure instruction.

步骤S26:当校验位验证通过且接收到接收成功指令后,中继设备停止流程并等待生成请求更新指令。Step S26: When the check digit verification is passed and the reception success instruction is received, the relay device stops the process and waits for the generation of the update request instruction.

其中,中继设备停止流程即指的是停止并跳出S21-S26的流程,此后中继设备会准备在对应的时刻生成请求更新指令。The relay device stopping the process means stopping and jumping out of the process of S21-S26, and then the relay device will prepare to generate a request update instruction at a corresponding time.

步骤S27:当中继设备在预设时刻内未收到服务器发送的数据包,则重新发送数据包至服务器。Step S27: When the relay device does not receive the data packet sent by the server within the preset time, it resends the data packet to the server.

其中,中继设备在预设时刻内未收到服务器发送的数据包可能存在丢包的情况,可能是中继设备没有发送至服务器,也可能是服务器发送至中继设备的数据产生了丢失。同时,当中继设备接收到的数据包包含接收失败指令时,也会重新发送数据包至服务器,此处中继设备发送至服务器的数据包即为步骤S21中生成的数据包。If the relay device does not receive the data packet sent by the server within the preset time, there may be a packet loss situation, which may be that the relay device did not send it to the server, or the data sent by the server to the relay device was lost. At the same time, when the data packet received by the relay device contains a reception failure instruction, it will also resend the data packet to the server. Here, the data packet sent by the relay device to the server is the data packet generated in step S21.

此外,在本申请的实施方式中,对于数据解密的过程通过移动终端发起,移动终端在扫描打印标签后获取加密后的数据,并通过与中继设备的连接来触发中继设备向服务器发送解密规则的流程,随后服务器通过接收移动终端发送的加密信息以及中继设备发送的解密规则来对加密信息进行解密并返回至移动终端中。In addition, in an embodiment of the present application, the data decryption process is initiated by a mobile terminal. After scanning the printed label, the mobile terminal obtains the encrypted data and triggers the relay device to send the decryption rules to the server through the connection with the relay device. Subsequently, the server decrypts the encrypted information by receiving the encrypted information sent by the mobile terminal and the decryption rules sent by the relay device and returns it to the mobile terminal.

具体的,参照图6,其流程包括:Specifically, referring to FIG. 6 , the process includes:

步骤S1000:移动终端获取服务器发送的动态密码。Step S1000: The mobile terminal obtains the dynamic password sent by the server.

同样的,对于移动终端是手机等手持式移动设备的装置,通过运行搭载在移动终端上的APP来获取服务器发送的动态密码。此处具体的执行逻辑与前述步骤S100相同。Similarly, for a mobile terminal that is a handheld mobile device such as a mobile phone, the dynamic password sent by the server is obtained by running an APP installed on the mobile terminal. The specific execution logic here is the same as the aforementioned step S100.

步骤S2000:根据移动终端获取的动态密码查找并连接匹配的中继设备。Step S2000: Search and connect to a matching relay device according to the dynamic password obtained by the mobile terminal.

步骤S3000:移动终端扫描标签以获取加密信息,并发送至服务器。Step S3000: The mobile terminal scans the tag to obtain the encrypted information and sends it to the server.

其中,当加密信息以二维码为载体时,可以通过设置于移动终端上的摄像头来扫描二维码以对应获取加密后的字符串以作为加密信息,当加密信息以调戏码为载体时,可以通过设置于移动终端上的扫描器等来对应获取加密后的字符串。Among them, when the encrypted information is in the form of a QR code, the QR code can be scanned by a camera set on the mobile terminal to obtain the encrypted string as the encrypted information. When the encrypted information is in the form of a teasing code, the encrypted string can be obtained by a scanner set on the mobile terminal.

步骤S4000:中继设备发送预设的解密规则至服务器。Step S4000: The relay device sends a preset decryption rule to the server.

其中,每一个中继设备均有与预设的加密规则所相对应的解密规则,其中,解密规则也是通过字符串的方式在中继设备进行记录,当服务器收到通过中继设备发送的代表解密规则的字符串后,得到与该字符串映射的解密规则,从而使得服务器可以使用该种解密规则对加密信息进行解密。Among them, each relay device has a decryption rule corresponding to the preset encryption rule, and the decryption rule is also recorded in the relay device in the form of a character string. When the server receives the character string representing the decryption rule sent by the relay device, it obtains the decryption rule mapped to the character string, so that the server can use this decryption rule to decrypt the encrypted information.

步骤S5000:服务器在接收到加密信息与解密规则后,对加密信息进行解密并将解密结果发送至移动终端。Step S5000: After receiving the encryption information and the decryption rules, the server decrypts the encrypted information and sends the decryption result to the mobile terminal.

其中,步骤S1000-步骤S5000中涉及到中继设备与服务器之间的信息交互,均通过数据包的方式进行相互传递,其遵从步骤S1-步骤S4中的各项步骤。Among them, the information interaction between the relay device and the server involved in steps S1000 to S5000 is transmitted to each other in the form of data packets, which complies with the steps in steps S1 to S4.

可以看出,在该种设计方式下,服务器与移动终端的连接不决定对信息的加密以及解密方式,而是通过中继设备来决定信息的加密以及解密采用什么方式实现。同时,相关流程也决定了移动终端和中继设备的连接也需要一定的加密方式才可以进行连接,只有在中继设备和移动终端建立了连接之后,服务器才可以得知对应的加密规则和解密规则以进行对应的加密和解密操作。同时,由于移动终端和中继设备的短距离连接方式也限定了移动终端需要在中继设备的辐射范围内,移动终端没有办法在远距离的情况下通过发送标签照片来进行加密以及解密。而因此这种方式进行加密以及解密的步骤所具有的区域性极强,也难以通过第三方设备进行破解。It can be seen that under this design, the connection between the server and the mobile terminal does not determine the encryption and decryption methods of the information, but the relay device determines the encryption and decryption methods of the information. At the same time, the relevant process also determines that the connection between the mobile terminal and the relay device also requires a certain encryption method to connect. Only after the relay device and the mobile terminal have established a connection, the server can know the corresponding encryption rules and decryption rules to perform the corresponding encryption and decryption operations. At the same time, due to the short-distance connection method between the mobile terminal and the relay device, the mobile terminal is also limited to the radiation range of the relay device. The mobile terminal has no way to encrypt and decrypt by sending tagged photos at a long distance. Therefore, the encryption and decryption steps of this method are highly regional and difficult to crack by third-party devices.

一般来说,这种方式适合在办公室、商场等区域固定的场所,而中继设备也可以被隐藏在网关、ONU、OLT、WIFI等独立设备中。通过固定区域内的移动终端可以对应的执行加密以及解密操作。Generally speaking, this method is suitable for fixed places such as offices and shopping malls, and the relay equipment can also be hidden in independent devices such as gateways, ONUs, OLTs, and WIFI. Encryption and decryption operations can be performed correspondingly through mobile terminals in fixed areas.

基于同一发明构思,本申请实施例还公开一种数据加密系统,基于移动终端、中继设备以及服务器实现,其包括:Based on the same inventive concept, the embodiment of the present application also discloses a data encryption system, which is implemented based on a mobile terminal, a relay device and a server, and includes:

移动终端,用于发送待加密信息至服务器、获取服务器发送的动态密码,并根据所获取的动态密码查找并连接匹配的中继设备。The mobile terminal is used to send the information to be encrypted to the server, obtain the dynamic password sent by the server, and search and connect to the matching relay device according to the obtained dynamic password.

中继设备,在于移动终端连接后,向服务器发送预设的加密规则,不同所述中继设备预设有对应不同的加密规则。The relay device sends the preset encryption rules to the server after the mobile terminal is connected, and different relay devices are preset with corresponding different encryption rules.

服务器,用于接收移动终端发送的待加密信息以及中继设备发送的加密规则,并对待加密信息进行加密并生成可打印标签信息;所述服务器定期更新动态密码并发送至中继设备。The server is used to receive the information to be encrypted sent by the mobile terminal and the encryption rules sent by the relay device, and encrypt the information to be encrypted and generate printable label information; the server regularly updates the dynamic password and sends it to the relay device.

其中,中继设备与移动终端建立短距离连接。Among them, the relay device establishes a short-distance connection with the mobile terminal.

对于所公开的数据加密系统,移动终端、中继设备以及服务器还可以执行如图1-图6流程中所述的各个步骤。For the disclosed data encryption system, the mobile terminal, the relay device and the server may also execute the steps described in the processes of FIG. 1 to FIG. 6 .

所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and simplicity of description, only the division of the above-mentioned functional modules is used as an example. In actual applications, the above-mentioned functions can be assigned to different functional modules as needed, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. The specific working process of the above-described system, device and unit can refer to the corresponding process in the aforementioned method embodiment, and will not be repeated here.

在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. For example, the device embodiments described above are only schematic. For example, the division of the modules or units is only a logical function division. There may be other division methods in actual implementation, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be an indirect coupling or communication connection through some interfaces, devices or units, which can be electrical, mechanical or other forms.

所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.

另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.

本发明实施例还提供一种计算机可读存储介质,存储有能够被处理器加载执行时实现如图1-图6流程中所述的各个步骤。An embodiment of the present invention further provides a computer-readable storage medium storing information that can be loaded and executed by a processor to implement the various steps described in the processes of FIG. 1 to FIG. 6 .

所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application is essentially or the part that contributes to the prior art or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including a number of instructions to enable a computer device (which can be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), disk or optical disk and other media that can store program codes.

以上所述,以上实施例仅用以对本申请的技术方案进行了详细介绍,但以上实施例的说明只是用于帮助理解本发明的方法及其核心思想,不应理解为对本发明的限制。本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。As described above, the above embodiments are only used to introduce the technical solution of the present application in detail, but the description of the above embodiments is only used to help understand the method and core idea of the present invention and should not be understood as limiting the present invention. Any changes or substitutions that can be easily thought of by those skilled in the art within the technical scope disclosed by the present invention should be included in the protection scope of the present invention.

Claims (8)

1.一种数据加密方法,其特征在于,包括:1. A data encryption method, comprising: 移动终端获取服务器发送的动态密码;The mobile terminal obtains the dynamic password sent by the server; 根据移动终端获取的动态密码查找并连接匹配的中继设备,所述服务器定期更新动态密码并发送至中继设备;According to the dynamic password obtained by the mobile terminal, the server searches for and connects to a matching relay device, and the server periodically updates the dynamic password and sends it to the relay device; 在移动终端与中继设备建立连接后,移动终端将待加密信息发送至服务器;After the mobile terminal establishes a connection with the relay device, the mobile terminal sends the information to be encrypted to the server; 中继设备发送预设的加密规则至服务器,不同所述中继设备预设有对应不同的加密规则;The relay device sends a preset encryption rule to the server, and different relay devices are preset with corresponding different encryption rules; 服务器在接收到待加密信息与加密规则后,对待加密信息进行加密并生成可打印标签信息;After receiving the information to be encrypted and the encryption rules, the server encrypts the information to be encrypted and generates printable label information; 将可打印标签信息发送至移动终端以供移动终端打印生成,Send the printable label information to the mobile terminal for printing and generation by the mobile terminal, 其中,所述中继设备与移动终端建立短距离连接;Wherein, the relay device establishes a short-distance connection with the mobile terminal; 所述移动终端连接匹配中继设备的方法包括:The method for connecting the mobile terminal to the matching relay device includes: 移动终端对动态密码进行解密以获取终端匹配信息;The mobile terminal decrypts the dynamic password to obtain terminal matching information; 中继设备对动态密码进行解密以获取中继匹配信息;The relay device decrypts the dynamic password to obtain relay matching information; 中继设备修改设备标识符,所述中继设备的设备标识符具有预设的表达字段,且所述表达字段包含所述中继匹配信息;The relay device modifies the device identifier, wherein the device identifier of the relay device has a preset expression field, and the expression field includes the relay matching information; 所述移动终端搜索范围内可建立连接的所有设备标识符,并与包含中继匹配信息的设备标识符所对应的设备尝试建立连接。The mobile terminal searches for all device identifiers within a range to which a connection can be established, and attempts to establish a connection with a device corresponding to a device identifier containing relay matching information. 2.根据权利要求1所述的数据加密方法,其特征在于,所述中继设备的设备标识符处于非广播状态,所述中继设备的设备标识符至少由中继匹配信息和时间戳信息构成,所述时间戳信息由中继设备收到服务器发送的动态密码的时刻决定;2. The data encryption method according to claim 1, characterized in that the device identifier of the relay device is in a non-broadcast state, and the device identifier of the relay device is composed of at least relay matching information and timestamp information, and the timestamp information is determined by the moment when the relay device receives the dynamic password sent by the server; 所述移动终端根据终端匹配信息以及当前时刻生成寻址标识符,并在搜索范围内根据寻址标识符搜索处于非广播状态的设备标识符并连接。The mobile terminal generates an addressing identifier according to the terminal matching information and the current time, and searches for a device identifier in a non-broadcast state within a search range according to the addressing identifier and connects. 3.根据权利要求2所述的数据加密方法,其特征在于,所述服务器发送动态密码的时刻具有预设的发送逻辑,所述预设的发送逻辑同步于中继设备以及移动终端;3. The data encryption method according to claim 2, characterized in that the moment when the server sends the dynamic password has a preset sending logic, and the preset sending logic is synchronized with the relay device and the mobile terminal; 当中继设备收到服务器发送的动态密码时,获取于所述发送逻辑中位于当前时刻之前一个接收时刻的时间戳作为时间戳信息;When the relay device receives the dynamic password sent by the server, it obtains a timestamp at a receiving time before the current time in the sending logic as timestamp information; 移动终端获取服务器发送的动态密码时,获取于所述发送逻辑中位于当前时刻之前一个接收时刻的时间戳作为时间戳信息,并与终端匹配信息组合以生成寻址标识符。When the mobile terminal obtains the dynamic password sent by the server, it obtains the timestamp of a receiving time before the current time in the sending logic as the timestamp information, and combines it with the terminal matching information to generate an addressing identifier. 4.根据权利要求1所述的数据加密方法,其特征在于,所述服务器与中继设备之间通过数据包通信,且所述数据包均包括校验位,所述数据加密方法还包括:4. The data encryption method according to claim 1, characterized in that the server and the relay device communicate via data packets, and the data packets all include check bits, and the data encryption method further comprises: 所述中继设备在接收所述服务器发送的数据包后,提取所述数据包中校验位的校验码并进行验证;After receiving the data packet sent by the server, the relay device extracts the check code of the check bit in the data packet and performs verification; 当验证通过后,所述中继设备解析所述数据包;When the verification is passed, the relay device parses the data packet; 在所述中继设备发送数据包至服务器之前,所述中继设备随机生成所述校验码并记录;Before the relay device sends the data packet to the server, the relay device randomly generates and records the verification code; 所述中继设备将所述校验码整合至发送至服务器的数据包的校验位。The relay device integrates the check code into the check digit of the data packet sent to the server. 5.根据权利要求4所述的数据加密方法,其特征在于,所述服务器更新动态密码并发送至中继设备后,中继设备接收所述动态密码并验证所述校验位;5. The data encryption method according to claim 4, characterized in that after the server updates the dynamic password and sends it to the relay device, the relay device receives the dynamic password and verifies the check digit; 当所述校验位验证通过后,对动态密码进行解密;When the check digit is verified, the dynamic password is decrypted; 在服务器更新动态密码之前,中继设备随机生成校验码并与请求更新指令打包生成数据包;Before the server updates the dynamic password, the relay device randomly generates a verification code and packages it with the update request instruction to generate a data packet; 中继设备发送数据包至服务器;The relay device sends the data packet to the server; 服务器响应于中继设备发送的数据包,并拆分校验位以获取校验码;The server responds to the data packet sent by the relay device and splits the check digit to obtain the check code; 服务器生成动态密码,并与所获取的校验码整合生成数据包以发送至中继设备。The server generates a dynamic password and integrates it with the obtained verification code to generate a data packet to be sent to the relay device. 6.根据权利要求5所述的数据加密方法,其特征在于,6. The data encryption method according to claim 5, characterized in that: 移动终端与中继设备建立连接之后,中继设备随机生成校验码并与预设的加密规则打包生成数据包;After the mobile terminal establishes a connection with the relay device, the relay device randomly generates a verification code and packages it with a preset encryption rule to generate a data packet; 中继设备发送数据包至服务器;The relay device sends the data packet to the server; 服务器响应于中继设备发送的数据包,并拆分校验位以获取校验码;The server responds to the data packet sent by the relay device and splits the check digit to obtain the check code; 服务器生成接收成功指令,并与所获取的校验码整合生成数据包以发送至中继设备;The server generates a successful reception instruction, and integrates it with the obtained verification code to generate a data packet to be sent to the relay device; 中继设备接收服务器发送的数据包并解析以验证校验位;The relay device receives the data packet sent by the server and parses it to verify the check digit; 当校验位验证通过且接收到接收成功指令后,中继设备停止流程并等待生成请求更新指令;When the check digit verification passes and the reception success instruction is received, the relay device stops the process and waits for the generation of the request update instruction; 当中继设备在预设时刻内未收到服务器发送的数据包,则重新发送数据包至服务器。When the relay device does not receive the data packet sent by the server within the preset time, it resends the data packet to the server. 7.一种数据加密系统,其特征在于,包括,7. A data encryption system, comprising: 移动终端,用于获取服务器发送的动态密码,且在移动终端与中继设备建立连接后、发送待加密信息至服务器,并根据所获取的动态密码查找并连接匹配的中继设备;The mobile terminal is used to obtain the dynamic password sent by the server, and after the mobile terminal establishes a connection with the relay device, sends the information to be encrypted to the server, and searches for and connects to a matching relay device according to the obtained dynamic password; 中继设备,在于移动终端连接后,向服务器发送预设的加密规则,不同所述中继设备预设有对应不同的加密规则;The relay device sends a preset encryption rule to the server after the mobile terminal is connected, and different relay devices are preset with corresponding different encryption rules; 服务器,用于接收移动终端发送的待加密信息以及中继设备发送的加密规则,并对待加密信息进行加密并生成可打印标签信息;所述服务器定期更新动态密码并发送至中继设备;The server is used to receive the information to be encrypted sent by the mobile terminal and the encryption rules sent by the relay device, and encrypt the information to be encrypted and generate printable label information; the server regularly updates the dynamic password and sends it to the relay device; 其中,所述中继设备与移动终端建立短距离连接,The relay device establishes a short-distance connection with the mobile terminal. 所述移动终端连接匹配中继设备的方法包括:The method for connecting the mobile terminal to the matching relay device includes: 移动终端对动态密码进行解密以获取终端匹配信息;The mobile terminal decrypts the dynamic password to obtain terminal matching information; 中继设备对动态密码进行解密以获取中继匹配信息;The relay device decrypts the dynamic password to obtain relay matching information; 中继设备修改设备标识符,所述中继设备的设备标识符具有预设的表达字段,且所述表达字段包含所述中继匹配信息;The relay device modifies the device identifier, wherein the device identifier of the relay device has a preset expression field, and the expression field includes the relay matching information; 所述移动终端搜索范围内可建立连接的所有设备标识符,并与包含中继匹配信息的设备标识符所对应的设备尝试建立连接。The mobile terminal searches for all device identifiers within a range to which a connection can be established, and attempts to establish a connection with a device corresponding to a device identifier containing relay matching information. 8.一种计算机可读存储介质,其特征在于,存储有能够被处理器加载并执行如权利要求1至6中任一种方法的计算机程序。8. A computer-readable storage medium, characterized in that it stores a computer program that can be loaded by a processor and executes the method according to any one of claims 1 to 6.
CN202311302304.9A 2023-10-10 2023-10-10 A data encryption method, system and storage medium Active CN117459931B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311302304.9A CN117459931B (en) 2023-10-10 2023-10-10 A data encryption method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311302304.9A CN117459931B (en) 2023-10-10 2023-10-10 A data encryption method, system and storage medium

Publications (2)

Publication Number Publication Date
CN117459931A CN117459931A (en) 2024-01-26
CN117459931B true CN117459931B (en) 2024-05-31

Family

ID=89588257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311302304.9A Active CN117459931B (en) 2023-10-10 2023-10-10 A data encryption method, system and storage medium

Country Status (1)

Country Link
CN (1) CN117459931B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7724514B1 (en) * 2024-11-29 2025-08-18 ボクシーズ株式会社 A management system that automatically connects wearable devices to repeaters to transmit biometric information

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN104660583A (en) * 2014-12-29 2015-05-27 国家电网公司 Encryption service method based on Web encryption service
CN104978542A (en) * 2015-06-11 2015-10-14 福建天晴数码有限公司 Secure data storage and data access method and system
CN108737394A (en) * 2018-05-08 2018-11-02 腾讯科技(深圳)有限公司 Off-line verification system, barcode scanning equipment and server
CN109474583A (en) * 2018-10-26 2019-03-15 温州博盈科技有限公司 A kind of data safety management system
CN114399007A (en) * 2021-11-30 2022-04-26 中国建设银行股份有限公司 Information feedback method and device, computer equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8230235B2 (en) * 2006-09-07 2012-07-24 International Business Machines Corporation Selective encryption of data stored on removable media in an automated data storage library
CN101957958A (en) * 2010-09-19 2011-01-26 中兴通讯股份有限公司 Method and mobile phone terminal for realizing network payment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579627A (en) * 2014-12-06 2015-04-29 上海移远通信技术有限公司 Data encryption method and system
CN104660583A (en) * 2014-12-29 2015-05-27 国家电网公司 Encryption service method based on Web encryption service
CN104978542A (en) * 2015-06-11 2015-10-14 福建天晴数码有限公司 Secure data storage and data access method and system
CN108737394A (en) * 2018-05-08 2018-11-02 腾讯科技(深圳)有限公司 Off-line verification system, barcode scanning equipment and server
CN109474583A (en) * 2018-10-26 2019-03-15 温州博盈科技有限公司 A kind of data safety management system
CN114399007A (en) * 2021-11-30 2022-04-26 中国建设银行股份有限公司 Information feedback method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN117459931A (en) 2024-01-26

Similar Documents

Publication Publication Date Title
US20220131709A1 (en) Mutually Authenticated ECDHE Key Exchange for a Device and a Network Using Multiple PKI Key Pairs
US12003629B2 (en) Secure server digital signature generation for post-quantum cryptography key encapsulations
EP3358805B1 (en) Systems and methods for provisioning a camera with a dynamic qr code and a ble connection
US10397782B2 (en) Wireless access authentication
JP5189066B2 (en) User authentication method, authentication system, terminal device and authentication device in terminal device
US20200288331A1 (en) Method and apparatus for connecting to access point in wlan network
CN108762791A (en) Firmware upgrade method and device
CN100574222C (en) Communication equipment and communication means
CN104967595A (en) Method and apparatus for registering devices on Internet of things platform
US20230224701A1 (en) Network connection method, terminal, device to be connected to network, and storage medium
CN104661219A (en) Communication method of wireless equipment, wireless equipment and server
CN117459931B (en) A data encryption method, system and storage medium
WO2022115491A1 (en) Multiple post-quantum cryptography key encapsulations with authentication and forward secrecy
US20170208465A1 (en) Communication apparatus, method of sharing communication parameters, and program
CN109756451B (en) Information interaction method and device
JP6570355B2 (en) COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
JP2003338814A (en) Communication system, management server, control method therefor, and program
JP2017046274A (en) Information processing system and encryption communication method
CN108471406B (en) Network attack monitoring method, device, equipment and storage medium
EP4184865A1 (en) Data transmission method and apparatus, system, computer device and storage medium
CN117880805A (en) Network distribution method and device of intelligent equipment and electronic equipment
CN112448970A (en) Equipment connection method and system and corresponding Internet of things equipment
US20240243914A1 (en) Method, user device, server, device and system for authenticating a device
CN113099445B (en) Network configuration method, device connection method, device, equipment and system
CN113507707A (en) Network distribution method and system of intelligent teaching equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 252000, 11th Floor, South Fund Building, Lushan Road, East Huaihe Road, Jiuzhou Street, High tech Industrial Development Zone, Liaocheng City, Shandong Province

Patentee after: SHANDONG SUNSAM INFORMATION TECHNOLOGY CO.,LTD.

Country or region after: China

Patentee after: DONGCHANG COLLEGE OF LIAOCHENG University

Address before: No. 111, Changjiang Road, Liaocheng hi tech Zone, Shandong, Shandong

Patentee before: SHANDONG SUNSAM INFORMATION TECHNOLOGY CO.,LTD.

Country or region before: China

Patentee before: DONGCHANG COLLEGE OF LIAOCHENG University

CP03 Change of name, title or address